100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary New Media Challenges - All exam material summarized (All articles and PowerPoints summarized) $10.84   Add to cart

Summary

Summary New Media Challenges - All exam material summarized (All articles and PowerPoints summarized)

5 reviews
 217 views  32 purchases
  • Course
  • Institution

This document contains all the material you need to learn for the New Media Challenges exam. This includes; - All the articles we needed to read are summarized (only a few with ChatGPT, max 5 or so) - All PowerPoints from all colleges are summarized - Where it added value, I added several images...

[Show more]

Preview 10 out of 104  pages

  • March 23, 2023
  • 104
  • 2022/2023
  • Summary

5  reviews

review-writer-avatar

By: malikenes96 • 9 months ago

review-writer-avatar

By: benthesneeuw • 9 months ago

review-writer-avatar

By: louiselusse • 1 year ago

review-writer-avatar

By: elizavetazakon • 1 year ago

review-writer-avatar

By: martijnwagelaar16 • 1 year ago

avatar-seller
New Media Challenges
Inhoud
Vakken ..................................................................................................................................................... 2
Lectures ................................................................................................................................................... 3
Lecture 1 (07-02-2023)................................................................................................................................ 3
Prep Lecture 2 (08-02-2023) ....................................................................................................................... 4
Lecture 2 (08-02-2023)................................................................................................................................ 7
Prep Lecture 3 (09-02-2023) ..................................................................................................................... 10
Lecture 3 (09-02-2023).............................................................................................................................. 16
Prep Lecture 4 (14-02-2023) ..................................................................................................................... 18
Lecture 4 (14-02-2023).............................................................................................................................. 23
Prep lecture 5 (15-02-2023) ...................................................................................................................... 27
Lecture 5 (15-02-2023).............................................................................................................................. 29
Prep Lecture 6 (16-02-2023) ..................................................................................................................... 30
Lecture 6 (16-02-2023).............................................................................................................................. 35
Prep Lecture 7 (21-02-2023) ..................................................................................................................... 37
Lecture 7 (21-02-2023).............................................................................................................................. 45
Prep Lecture 8 (22-02-2023) ..................................................................................................................... 49
Lecture 8 (22-02-2023).............................................................................................................................. 52
Prep Lecture 9 (28-02-2023) ..................................................................................................................... 54
Lecture 9 (28-02-2023).............................................................................................................................. 56
Prep Lecture 10 (01-03-2023) ................................................................................................................... 60
Lecture 10 (01-03-2023)............................................................................................................................ 65
Prep Lecture 11 (07-03-2023) - ChatGPT .................................................................................................. 67
Lecture 11 (07-03-2023)............................................................................................................................ 69
Prep Lecture 12 (08-03-2023) ................................................................................................................... 72
Lecture 12 (08-03-2023)............................................................................................................................ 74
Prep Lecture 13 (09-03-2023) ................................................................................................................... 75
Lecture 13 (09-03-2023)............................................................................................................................ 77
Prep Lecture 14 (14-03-2023) ................................................................................................................... 78
Lecture 14 (14-03-2023)............................................................................................................................ 82
Prep Lecture 15 (15-03-2023) ................................................................................................................... 84
Lecture 15 (15-03-2023)............................................................................................................................ 89
Prep Lecture 16 (16-03-2023) ................................................................................................................... 92

, Lecture 16 (16-03-2023)............................................................................................................................ 94
Prep Lecture 17 (21-03-2023) ................................................................................................................... 96
Lecture 17 (21-03-2023)............................................................................................................................ 98
Prep Lecture 18 (22-03-2023) ................................................................................................................. 101
Lecture 18 (22-03-2023).......................................................................................................................... 102



Vakken
Vakken Literatuur & Taal Vakcoördinator & Tentamens / Deeltoetsen
Voorbereiding Examinator *
per les +
Overige docenten

New Media Published journal ENG - dr. M.A. Tanis * - Thu 30 Mar(12:15-14:40) TT
articles and relevant
Challenges
book chapters from
(Vakcode; reading list - dr. A.P.M. Krouwel - ????? HERKANSING
S_NM) - dr. W.Y. Tang
Periode 4 (Canvas-> S_NMC->
Written exam with a combination of closed (multiple-
modules)
choice) questions and open questions - The individual
exam will be in English, and answers should also be
provided in English.

,Lectures
Lecture 1 (07-02-2023)
Utopian worldview-> Political or religious philosophies which claim that it is possible to build a new
and perfect society in which everyone is happy.

Function behind an Utopian worldview;
• Optimism about the future
• Strong belief n technological development
• Push to invest in technological developments
• Cultural change toward individuation and individual empowerment

Dystopian worldview-> Political or religious philosophies which claim oppressive societal control and
a society which is maintained through corporate, bureaucratic, technological, moral, or totalitarian
control.

,Prep Lecture 2 (08-02-2023)
ONLY PAGES 3 TO 8 of Walther, J. B. (2011). Introduction to privacy online. In Privacy
online (pp. 3-8). Springer, Berlin, Heidelberg..pdf
Conclusion
In sum, the chapters in this book offer readers much more than a thorough and contemporary
treatment of online privacy and the social web. They offer a sophisticated collection of installments
on topics that are quite traditional in their concern and quite under development as Internet
communication technologies continue to evolve. They offer a glimpse of the future as well, not only
by exploring emergent issues that are arising with new technological applications. They do so by
suggesting theory-based research agendas that can guide inquiry beyond the current incarnation of
social technologies, just as the privacy issues that arose with the development of earlier Internet
communication technologies have morphed but remain with us today.

Theory
Just as it was with the most bare-bones, text-based online communities of the past, it is with
contemporary media: The more users disclose of themselves, the more they may enjoy the benefits
these systems have to offer. At the same time, the more they disclose, the more they risk what they
themselves consider breaches of their privacy.

Three complicating factors that have and continue to confront users of online systems include;
1. A misplaced presumption that online behavior is private;
2. The nature of the Internet at a mechanical level is quite incommensurate with privacy;
3. One’s expectation of privacy does not constitute privileged communication by definition.

It is due to the analogous offline activities which online communication resembles or replaces, that
many Internet users notoriously post information online which they do not anticipate will be seen by
others than the specific group they imagined when posting.

These disparities between traditional communication settings and new media may be due in large
part to the mechanical infrastructure of the Internet. The psychological privacy afforded by
communication channels may lull users into a false assumption of informational privacy, a central
distinction that informs the thesis of Sabine Trepte and Leonard Reinecke’s Chap. 6.

The burden of online privacy protection is primarily shouldered by an individual’s own conscious
effort. Despite norms and customs affecting “privacy issues offline, to which a set of well-established
cultural, social, and legal norms may be applied.

Just as history shows that controversies over online privacy are not new, it also shows that
technological efforts for the protection of privacy have a long line of succession, especially in realms
in which the Internet provides unique benefits to its users.

Anonymity was one of the major attractions for the use of online versus offline social support
(Walther and boyd 2002), where, unlike offline social support, both men and women communicated
similarly (cf. Mike Thelwall in Chap. 18).

Despite growing technological sophistication of anonymous remailers, their use for slander, copyright
violations, or potentially subversive political whistle-blowing (much as WikiLeaks provides today)
made them susceptible to international subpoenas calling on their operators to reveal the identity of
users and thereby abridge the privacy such systems offered.

,Bazarova, N. N., & Choi, Y. H. (2014). Self-disclosure in social media Extending the functional
approach to disclosure motivations and characteristics on social network sites. Journal of
Communication, 64(4), 635-657..pdf
Conclusion
This article presents a functional model of self-disclosure in SNSs based on the functional approach to
self-disclosure (Derlega & Grzelak, 1979; Omarzu, 2000). According to this model, SNS affordances
amplify and make more visible a set of strategic concerns and motivations that shape self-disclosure
characteristics. By analyzing the content of self-disclosing posts and messages on one hand, and the
goal behind these disclosures on the other, this study reveals self-disclosure goals charac- teristic of
different media affordances on SNSs depending on their privacy/publicness and interaction
directedness.

The results suggest that users of SNSs utilize different social media functions for disclosures with
different levels of intimacy, depending on their motives and goals, which help to reconcile traditional
views on self-disclosure as selective behavior typically shared in dyadic contexts with public self-
disclosure on SNSs.

As social media appear to have opened floodgates to self-disclosure of thoughts, feel- ings, and
experiences on the Internet, there has been renewed research interest in what people share, how
and why they do it, and what effects it has on their lives, relationships, and our society as a whole.
The functional approach in this study con- tributes to this body of research by giving insights into
types of motivations underlying self-disclosure on SNSs, and how they vary based on audience
perceptions shaped by media affordances and interfaces. As such, the results suggest that as
technologies expand opportunities for self-broadcasting and building personal connections with
others, people seize these opportunities to satisfy their instrumental needs and adapt their
communication behaviors accordingly.

Theory
Self-disclosure-> Zelfonthulling-> The act of revealing personal information to other. An intentional
act communicated through verbal behavior describing a person’s experiences and feelings.

Self-disclosure decisions-> are guided by a complex dialectics of openness–closedness (Altman,
1975) and the tension of public and private persona management (Westin, 1967).

Disclosure fulfills fundamental needs for social connectedness and belonging and is intrinsically
rewarding (Tamir & Mitchell, 2012), but it also carries inherent risks of vulnerability and information
loss because a discloser gives up some degree of privacy and personal control by sharing information
with others (Altman, 1975).

Disclosure decisions and strategies reflect a balance of conflicting needs aimed at maximizing
strategic rewards and minimizing personal risks (Petronio, 2002).

Dyad-> A type of social network in which there are two individuals that are linked. Also ‘’Being in a
group of two’’.

Optimize the disclosure rewards–risks ratio;
Establish a dyadic boundary which a discloser shares personal information with a trusted recipient
(Pearce & Sharp, 1973). Such selective disclosure minimizes a discloser’s vulnerability and personal
information risks, while still satisfying the desired goals and motivations.

,Self-disclosures can occur in interactions with strangers, example “stranger on the train
phenomenon”;
• People are most comfortable sharing intimate disclosures with either a complete stranger or
a trusted companion within a dyadic boundary.
• The least disclosure occurs between acquaintances who do not know each other well but
anticipate future interaction,
• and in the presence of uninvolved and uninterested third parties or observers due to
increased vulnerability and information control losses (Pearce & Sharp, 1973).

To understand and predict individuals self-disclosing behavior, you need to identify and measure:
The major sources of value that self-disclosure has for individuals”. These sources of value reflect
social rewards hoped to attain through self-disclosure, and they fall into five basic categories:
1. social validation,
2. self-expression,
3. relational development,
4. identity clarification,
5. social control.

The main reason broadcasting disclosures and Dyadic disclosures different from each other, is they
each have different targets/goals;
• Impression management as a main goal in broadcasting disclosures
• Relational development as a prominent goal in dyadic disclosures.

According to Treem and Leonardi (2012), social media affordances reflect users’ perceptions of
media utility in supporting social practices. They define four affordances consistently present in social
media, including SNSs (social network sites-> Social Media):
1. Data permanence (- permanente data)
2. Communal visibility of social information and communication
3. Message editability
4. Associations between individuals, as well as between a message and its creator

Audience diversity complicates self-presentation and disclosure because disclosers have to address
different audience values simultaneously (Krämer & Haferkamp, 2011).

Imagined audience-> People have difficulty in determining who is in their online audience and
grossly underestimate its size as a result of the general online ‘’invisible and ill-defined audiences’’.
Someone's own online behavior is therefore determined by; perceptions of “imagined” audiences or
their mental picture of whom they are communicating with.

,Lecture 2 (08-02-2023)
NMC 2022-2023 slides lecture 2 Intro to Privacy.pdf
Privacy-> The state in which one is not observed or disturbed by other people and is free from public
attention. Privacy is defined by;
• Time
o Back in the day people would go to bathing houses, fulle nude, with friends, family
etc. Nowadays peoples sense of privacy (and intimacy) wouldn’t regulate that.
• Individuals
o Different individuals divine privacy in their own way and approach (For Example);
▪ Westin (1967) - Political-scientific approach:
• Privacy in interaction with others / society as a whole.
• Privacy is a dynamic process (we regulate privacy so as to serve
momentary needs and role requirements)
• Privacy is a non-monotonic (you can have such a thing as too little,
just enough, or not enough privacy)
• Privacy is “the claim of individuals, groups, or institutions to
determine for themselves when, how, and to what extent
information about them is communicated to others”
• THE FOUR PURPOSES OF PRIVACY




• THE FOUR STATES OF PRIVACY;

, • Privacy is a basic need which helps us adjust to day-to-day
interpersonal interactions. Westin believes Privacy should be added
up in the Piramid of Maslov, within the Safety Section;




▪ Altman (1975) - Psychological approach:
• Privacy for the self (wellbeing and identity regulation)
• Privacy Regulation Theory; which aimed at understanding why
individuals alternate between states of sociality and solitude.
• Privacy is “a selective control of access to the self or to one's group”
• FIVE ELEMENTS OF PRIVACY:
o Dynamic Process -> Individuals regulate what they (do or
not) want to share differently, depending on the situational
or social context.
o Individual vs Group Levels-> Individuals perceive their own
privacy differently from that of their community/family.
o Desired vs Actual Level-> Desired level of privacy might be
lower/higher than individuals have in a given context.
o Non-Monotonic-> There is such a thing as both too much
and not sufficient privacy. The Sauna principle;




o By-Directional (Inwards and Outwards)-> Individuals might
have different sensitivities for their actions towards others’
privacy and others’ actions towards them.

, ▪ Petronio (2002) - Communication approach:
• Privacy as information ownership and sharing
• MEDIATION MODEL




Uncertainty Avoidance-> he extent to which a society, or group relies on social norms, rules, and
procedures to minimize the unpredictability of future events.

Context Collapse-> The “flattening out of multiple distinct audiences in one's social network, such
that people from different contexts become part of a singular group of message recipients.”

, Prep Lecture 3 (09-02-2023)
Choi, H., Park, J., & Jung, Y. (2021). The role of privacy fatigue in online privacy behavior.
Computers in Human Behavior, 81, 42-51..pdf
Conclusion
The role of privacy fatigue in online privacy behavior*

Computers in Human Behavior

Theory
Online privacy concern-> An individual's subjective assessment of information privacy risk.

Fatigue-> A “subjective, unpleasant feeling of tiredness that has multiple dimensions varying in
duration, unpleasantness and intensity”. Fatigue arises from situations in which people are faced
with high demands and an inability to meet their goals (Hardy, Shapiro, &Borrill,1997). The
consequences of fatigue have been associated with impaired behavioral performance, such as
inability to concentrate on tasks or make proper decisions.

SNS fatigue-> negative affective responses to SNS activities, in accordance with prior studies of
fatigue that treat it in terms of feelings of tiredness, burnout, and reduced interest (Burke et al.,
1996).

Privacy Fatigue = the psychological state of tiredness with the issue of online privacy. Privacy fatigue
has to do with 2 components:
• Cynicism-> An attitude toward an object accompanied by frustration, hopelessness, and
disillusionment. Because fatigue results from a failure to produce the expected outcomes,
cynicism, which mainly develops from unmet expectations, constitutes a core component of
fatigue.
• Emotional exhaustion-> A “chronic state of emotional and physical depletion”.

Users may ultimately believe that they cannot ensure their own online privacy, causing psychological
stress and fatigue. When faced with privacy threats, individuals may react in a protective way to
enhance their privacy, but with a sense of fatigue, they may not actively engage in privacy protection
behaviors in line with the relationship between fatigue and disengagement.

Online privacy refers to how personal information is collected and used in the online context.

Privacy concern is grounded in the possibility of negative outcomes associated with the misuse of
personal information.

People can avoid the risk of information misuse by choosing not to disclose personal information
whenever they have the option to do so. Therefore, individuals with high levels of privacy concern
would show more reluctance to disclose personal information to online vendors.

People with high levels of privacy concerns are more likely to boycott companies that threaten their
privacy by removing their personal information from the company's care or complaining to the
company (Son & Kim, 2008).

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller keesdevries01. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.84. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

64438 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.84  32x  sold
  • (5)
  Add to cart