100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
Summary New Media Challenges - Alle tentamen stof samengevat (Alle artikelen en PowerPoints samengevat) €9,97   In winkelwagen

Samenvatting

Summary New Media Challenges - Alle tentamen stof samengevat (Alle artikelen en PowerPoints samengevat)

5 beoordelingen
 217 keer bekeken  32 keer verkocht

Dit document bevat alle stof die je moet leren voor het tentamen van New Media Challenges. Ik heb het bestand dagelijks bijgehouden, dus alles zit erbij. Denk hierbij aan; - Alle artikelen die we moesten lezen zijn samengevat (slechts een enkeling met ChatGPT, max 5 ofzo) - Alle PowerPoints van a...

[Meer zien]

Voorbeeld 10 van de 104  pagina's

  • 23 maart 2023
  • 104
  • 2022/2023
  • Samenvatting
Alle documenten voor dit vak (40)

5  beoordelingen

review-writer-avatar

Door: malikenes96 • 9 maanden geleden

review-writer-avatar

Door: benthesneeuw • 9 maanden geleden

review-writer-avatar

Door: louiselusse • 1 jaar geleden

review-writer-avatar

Door: elizavetazakon • 1 jaar geleden

review-writer-avatar

Door: martijnwagelaar16 • 1 jaar geleden

avatar-seller
keesdevries01
New Media Challenges
Inhoud
Vakken ..................................................................................................................................................... 2
Lectures ................................................................................................................................................... 3
Lecture 1 (07-02-2023)................................................................................................................................ 3
Prep Lecture 2 (08-02-2023) ....................................................................................................................... 4
Lecture 2 (08-02-2023)................................................................................................................................ 7
Prep Lecture 3 (09-02-2023) ..................................................................................................................... 10
Lecture 3 (09-02-2023).............................................................................................................................. 16
Prep Lecture 4 (14-02-2023) ..................................................................................................................... 18
Lecture 4 (14-02-2023).............................................................................................................................. 23
Prep lecture 5 (15-02-2023) ...................................................................................................................... 27
Lecture 5 (15-02-2023).............................................................................................................................. 29
Prep Lecture 6 (16-02-2023) ..................................................................................................................... 30
Lecture 6 (16-02-2023).............................................................................................................................. 35
Prep Lecture 7 (21-02-2023) ..................................................................................................................... 37
Lecture 7 (21-02-2023).............................................................................................................................. 45
Prep Lecture 8 (22-02-2023) ..................................................................................................................... 49
Lecture 8 (22-02-2023).............................................................................................................................. 52
Prep Lecture 9 (28-02-2023) ..................................................................................................................... 54
Lecture 9 (28-02-2023).............................................................................................................................. 56
Prep Lecture 10 (01-03-2023) ................................................................................................................... 60
Lecture 10 (01-03-2023)............................................................................................................................ 65
Prep Lecture 11 (07-03-2023) - ChatGPT .................................................................................................. 67
Lecture 11 (07-03-2023)............................................................................................................................ 69
Prep Lecture 12 (08-03-2023) ................................................................................................................... 72
Lecture 12 (08-03-2023)............................................................................................................................ 74
Prep Lecture 13 (09-03-2023) ................................................................................................................... 75
Lecture 13 (09-03-2023)............................................................................................................................ 77
Prep Lecture 14 (14-03-2023) ................................................................................................................... 78
Lecture 14 (14-03-2023)............................................................................................................................ 82
Prep Lecture 15 (15-03-2023) ................................................................................................................... 84
Lecture 15 (15-03-2023)............................................................................................................................ 89
Prep Lecture 16 (16-03-2023) ................................................................................................................... 92

, Lecture 16 (16-03-2023)............................................................................................................................ 94
Prep Lecture 17 (21-03-2023) ................................................................................................................... 96
Lecture 17 (21-03-2023)............................................................................................................................ 98
Prep Lecture 18 (22-03-2023) ................................................................................................................. 101
Lecture 18 (22-03-2023).......................................................................................................................... 102



Vakken
Vakken Literatuur & Taal Vakcoördinator & Tentamens / Deeltoetsen
Voorbereiding Examinator *
per les +
Overige docenten

New Media Published journal ENG - dr. M.A. Tanis * - Thu 30 Mar(12:15-14:40) TT
articles and relevant
Challenges
book chapters from
(Vakcode; reading list - dr. A.P.M. Krouwel - ????? HERKANSING
S_NM) - dr. W.Y. Tang
Periode 4 (Canvas-> S_NMC->
Written exam with a combination of closed (multiple-
modules)
choice) questions and open questions - The individual
exam will be in English, and answers should also be
provided in English.

,Lectures
Lecture 1 (07-02-2023)
Utopian worldview-> Political or religious philosophies which claim that it is possible to build a new
and perfect society in which everyone is happy.

Function behind an Utopian worldview;
• Optimism about the future
• Strong belief n technological development
• Push to invest in technological developments
• Cultural change toward individuation and individual empowerment

Dystopian worldview-> Political or religious philosophies which claim oppressive societal control and
a society which is maintained through corporate, bureaucratic, technological, moral, or totalitarian
control.

,Prep Lecture 2 (08-02-2023)
ONLY PAGES 3 TO 8 of Walther, J. B. (2011). Introduction to privacy online. In Privacy
online (pp. 3-8). Springer, Berlin, Heidelberg..pdf
Conclusion
In sum, the chapters in this book offer readers much more than a thorough and contemporary
treatment of online privacy and the social web. They offer a sophisticated collection of installments
on topics that are quite traditional in their concern and quite under development as Internet
communication technologies continue to evolve. They offer a glimpse of the future as well, not only
by exploring emergent issues that are arising with new technological applications. They do so by
suggesting theory-based research agendas that can guide inquiry beyond the current incarnation of
social technologies, just as the privacy issues that arose with the development of earlier Internet
communication technologies have morphed but remain with us today.

Theory
Just as it was with the most bare-bones, text-based online communities of the past, it is with
contemporary media: The more users disclose of themselves, the more they may enjoy the benefits
these systems have to offer. At the same time, the more they disclose, the more they risk what they
themselves consider breaches of their privacy.

Three complicating factors that have and continue to confront users of online systems include;
1. A misplaced presumption that online behavior is private;
2. The nature of the Internet at a mechanical level is quite incommensurate with privacy;
3. One’s expectation of privacy does not constitute privileged communication by definition.

It is due to the analogous offline activities which online communication resembles or replaces, that
many Internet users notoriously post information online which they do not anticipate will be seen by
others than the specific group they imagined when posting.

These disparities between traditional communication settings and new media may be due in large
part to the mechanical infrastructure of the Internet. The psychological privacy afforded by
communication channels may lull users into a false assumption of informational privacy, a central
distinction that informs the thesis of Sabine Trepte and Leonard Reinecke’s Chap. 6.

The burden of online privacy protection is primarily shouldered by an individual’s own conscious
effort. Despite norms and customs affecting “privacy issues offline, to which a set of well-established
cultural, social, and legal norms may be applied.

Just as history shows that controversies over online privacy are not new, it also shows that
technological efforts for the protection of privacy have a long line of succession, especially in realms
in which the Internet provides unique benefits to its users.

Anonymity was one of the major attractions for the use of online versus offline social support
(Walther and boyd 2002), where, unlike offline social support, both men and women communicated
similarly (cf. Mike Thelwall in Chap. 18).

Despite growing technological sophistication of anonymous remailers, their use for slander, copyright
violations, or potentially subversive political whistle-blowing (much as WikiLeaks provides today)
made them susceptible to international subpoenas calling on their operators to reveal the identity of
users and thereby abridge the privacy such systems offered.

,Bazarova, N. N., & Choi, Y. H. (2014). Self-disclosure in social media Extending the functional
approach to disclosure motivations and characteristics on social network sites. Journal of
Communication, 64(4), 635-657..pdf
Conclusion
This article presents a functional model of self-disclosure in SNSs based on the functional approach to
self-disclosure (Derlega & Grzelak, 1979; Omarzu, 2000). According to this model, SNS affordances
amplify and make more visible a set of strategic concerns and motivations that shape self-disclosure
characteristics. By analyzing the content of self-disclosing posts and messages on one hand, and the
goal behind these disclosures on the other, this study reveals self-disclosure goals charac- teristic of
different media affordances on SNSs depending on their privacy/publicness and interaction
directedness.

The results suggest that users of SNSs utilize different social media functions for disclosures with
different levels of intimacy, depending on their motives and goals, which help to reconcile traditional
views on self-disclosure as selective behavior typically shared in dyadic contexts with public self-
disclosure on SNSs.

As social media appear to have opened floodgates to self-disclosure of thoughts, feel- ings, and
experiences on the Internet, there has been renewed research interest in what people share, how
and why they do it, and what effects it has on their lives, relationships, and our society as a whole.
The functional approach in this study con- tributes to this body of research by giving insights into
types of motivations underlying self-disclosure on SNSs, and how they vary based on audience
perceptions shaped by media affordances and interfaces. As such, the results suggest that as
technologies expand opportunities for self-broadcasting and building personal connections with
others, people seize these opportunities to satisfy their instrumental needs and adapt their
communication behaviors accordingly.

Theory
Self-disclosure-> Zelfonthulling-> The act of revealing personal information to other. An intentional
act communicated through verbal behavior describing a person’s experiences and feelings.

Self-disclosure decisions-> are guided by a complex dialectics of openness–closedness (Altman,
1975) and the tension of public and private persona management (Westin, 1967).

Disclosure fulfills fundamental needs for social connectedness and belonging and is intrinsically
rewarding (Tamir & Mitchell, 2012), but it also carries inherent risks of vulnerability and information
loss because a discloser gives up some degree of privacy and personal control by sharing information
with others (Altman, 1975).

Disclosure decisions and strategies reflect a balance of conflicting needs aimed at maximizing
strategic rewards and minimizing personal risks (Petronio, 2002).

Dyad-> A type of social network in which there are two individuals that are linked. Also ‘’Being in a
group of two’’.

Optimize the disclosure rewards–risks ratio;
Establish a dyadic boundary which a discloser shares personal information with a trusted recipient
(Pearce & Sharp, 1973). Such selective disclosure minimizes a discloser’s vulnerability and personal
information risks, while still satisfying the desired goals and motivations.

,Self-disclosures can occur in interactions with strangers, example “stranger on the train
phenomenon”;
• People are most comfortable sharing intimate disclosures with either a complete stranger or
a trusted companion within a dyadic boundary.
• The least disclosure occurs between acquaintances who do not know each other well but
anticipate future interaction,
• and in the presence of uninvolved and uninterested third parties or observers due to
increased vulnerability and information control losses (Pearce & Sharp, 1973).

To understand and predict individuals self-disclosing behavior, you need to identify and measure:
The major sources of value that self-disclosure has for individuals”. These sources of value reflect
social rewards hoped to attain through self-disclosure, and they fall into five basic categories:
1. social validation,
2. self-expression,
3. relational development,
4. identity clarification,
5. social control.

The main reason broadcasting disclosures and Dyadic disclosures different from each other, is they
each have different targets/goals;
• Impression management as a main goal in broadcasting disclosures
• Relational development as a prominent goal in dyadic disclosures.

According to Treem and Leonardi (2012), social media affordances reflect users’ perceptions of
media utility in supporting social practices. They define four affordances consistently present in social
media, including SNSs (social network sites-> Social Media):
1. Data permanence (- permanente data)
2. Communal visibility of social information and communication
3. Message editability
4. Associations between individuals, as well as between a message and its creator

Audience diversity complicates self-presentation and disclosure because disclosers have to address
different audience values simultaneously (Krämer & Haferkamp, 2011).

Imagined audience-> People have difficulty in determining who is in their online audience and
grossly underestimate its size as a result of the general online ‘’invisible and ill-defined audiences’’.
Someone's own online behavior is therefore determined by; perceptions of “imagined” audiences or
their mental picture of whom they are communicating with.

,Lecture 2 (08-02-2023)
NMC 2022-2023 slides lecture 2 Intro to Privacy.pdf
Privacy-> The state in which one is not observed or disturbed by other people and is free from public
attention. Privacy is defined by;
• Time
o Back in the day people would go to bathing houses, fulle nude, with friends, family
etc. Nowadays peoples sense of privacy (and intimacy) wouldn’t regulate that.
• Individuals
o Different individuals divine privacy in their own way and approach (For Example);
▪ Westin (1967) - Political-scientific approach:
• Privacy in interaction with others / society as a whole.
• Privacy is a dynamic process (we regulate privacy so as to serve
momentary needs and role requirements)
• Privacy is a non-monotonic (you can have such a thing as too little,
just enough, or not enough privacy)
• Privacy is “the claim of individuals, groups, or institutions to
determine for themselves when, how, and to what extent
information about them is communicated to others”
• THE FOUR PURPOSES OF PRIVACY




• THE FOUR STATES OF PRIVACY;

, • Privacy is a basic need which helps us adjust to day-to-day
interpersonal interactions. Westin believes Privacy should be added
up in the Piramid of Maslov, within the Safety Section;




▪ Altman (1975) - Psychological approach:
• Privacy for the self (wellbeing and identity regulation)
• Privacy Regulation Theory; which aimed at understanding why
individuals alternate between states of sociality and solitude.
• Privacy is “a selective control of access to the self or to one's group”
• FIVE ELEMENTS OF PRIVACY:
o Dynamic Process -> Individuals regulate what they (do or
not) want to share differently, depending on the situational
or social context.
o Individual vs Group Levels-> Individuals perceive their own
privacy differently from that of their community/family.
o Desired vs Actual Level-> Desired level of privacy might be
lower/higher than individuals have in a given context.
o Non-Monotonic-> There is such a thing as both too much
and not sufficient privacy. The Sauna principle;




o By-Directional (Inwards and Outwards)-> Individuals might
have different sensitivities for their actions towards others’
privacy and others’ actions towards them.

, ▪ Petronio (2002) - Communication approach:
• Privacy as information ownership and sharing
• MEDIATION MODEL




Uncertainty Avoidance-> he extent to which a society, or group relies on social norms, rules, and
procedures to minimize the unpredictability of future events.

Context Collapse-> The “flattening out of multiple distinct audiences in one's social network, such
that people from different contexts become part of a singular group of message recipients.”

, Prep Lecture 3 (09-02-2023)
Choi, H., Park, J., & Jung, Y. (2021). The role of privacy fatigue in online privacy behavior.
Computers in Human Behavior, 81, 42-51..pdf
Conclusion
The role of privacy fatigue in online privacy behavior*

Computers in Human Behavior

Theory
Online privacy concern-> An individual's subjective assessment of information privacy risk.

Fatigue-> A “subjective, unpleasant feeling of tiredness that has multiple dimensions varying in
duration, unpleasantness and intensity”. Fatigue arises from situations in which people are faced
with high demands and an inability to meet their goals (Hardy, Shapiro, &Borrill,1997). The
consequences of fatigue have been associated with impaired behavioral performance, such as
inability to concentrate on tasks or make proper decisions.

SNS fatigue-> negative affective responses to SNS activities, in accordance with prior studies of
fatigue that treat it in terms of feelings of tiredness, burnout, and reduced interest (Burke et al.,
1996).

Privacy Fatigue = the psychological state of tiredness with the issue of online privacy. Privacy fatigue
has to do with 2 components:
• Cynicism-> An attitude toward an object accompanied by frustration, hopelessness, and
disillusionment. Because fatigue results from a failure to produce the expected outcomes,
cynicism, which mainly develops from unmet expectations, constitutes a core component of
fatigue.
• Emotional exhaustion-> A “chronic state of emotional and physical depletion”.

Users may ultimately believe that they cannot ensure their own online privacy, causing psychological
stress and fatigue. When faced with privacy threats, individuals may react in a protective way to
enhance their privacy, but with a sense of fatigue, they may not actively engage in privacy protection
behaviors in line with the relationship between fatigue and disengagement.

Online privacy refers to how personal information is collected and used in the online context.

Privacy concern is grounded in the possibility of negative outcomes associated with the misuse of
personal information.

People can avoid the risk of information misuse by choosing not to disclose personal information
whenever they have the option to do so. Therefore, individuals with high levels of privacy concern
would show more reluctance to disclose personal information to online vendors.

People with high levels of privacy concerns are more likely to boycott companies that threaten their
privacy by removing their personal information from the company's care or complaining to the
company (Son & Kim, 2008).

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper keesdevries01. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €9,97. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 66579 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€9,97  32x  verkocht
  • (5)
  Kopen