New Media Challenges
Lecture 1:
Introduction, utopian and dystopian views on media infiltration
Trends in media and media-use:
From push to pull: consumers choosing from large offering of media
content (YouTube, on demand, ‘Blendle’ (unlimited reading newspapers/
magazines))
Dissolving media boundaries: browsing internet on your phone, listing
radio on your laptop
Increasing interactivity: online multiplayer games, chat functions on
webpages
Content creation by ‘consumers’: influencing, social media (writing
blogs, reviews, vlogs etc)
Utopia: a community or society that possesses highly desirable or nearly
perfect qualities for its citizen. → Optimistic about the future → Strong belief in
technical development.
Dystopia: a community or society that is undesirable or frightening
Are we now in an industrial revolution? A rapid major change in economy
marked by the general introduction of power-driven machinery. AI, big data,
robotics, autonomous vehicles, internet of things, etc.
Polarization: Division into sharply contrasting groups or sets of options or
beliefs.
Lecture 2:
Introduction to Online Privacy
‘Privacy’ is defined by:
Cultures (cultural differences, Japanese find privacy more important than US
citizens)
Climate
Times (there used to be a lot of public bathhouses now it’s at home, back in
the days when people got arrested, the whole village could watch nowadays
the procedure is way more private)
Individuals (privacy is directed by characteristics, opinions, environment
you’re in etc.)
Three theoretical perspectives on ‘Privacy’
Westin → Political-scientist approach = Privacy in interactions with
others / society as a whole
Altman → Psychological approach = Privacy for the self (wellbeing
and identity regulation)
Petrionio → Communication approach = Privacy as information ownership
and sharing
Westin (1967)
Privacy is a basic need which helps us adjust day-to-day interpersonal
interactions. It is a dynamic process, which we can regulate to momentary
1
, needs and role requirements. As well, it is non-monotonic meaning you can
have such a thing as too little, just enough or not enough privacy.
Four purposes of privacy
1. Personal Autonomy: without personal autonomy you
can’t develop yourself. You must act on your own
behalf and act as an autonomous person.
2. Emotional Release: life can be stressful, people need
opportunity to be able to relax and feel emotions.
3. Self-Evaluation: You need privacy in order to process
information and act upon this.
4. Limited and protected boundaries: Ability to
control privacy and limit access to what information.
Four states of privacy
Observation
1. Solitude: You have no observation from
others.
2. Intimacy: Also freedom to not be observed by
others. Telling your (close) friends your deepest
secrets.
Identification
3. Reserve: You have the right not to share
information respected by others.
4. Anonymity: Right not to share things/ be
identified.
Altman (1975)
The Privacy Regulation Theory: aimed at understanding why individuals
alternate between states of sociality and solitude. So, how privacy can develop
you as an individual.
Five elements of privacy:
1. Dynamic Process: Individuals
regulate what they (do or not) want to
share differently, depending on the
situational or social context.
2. Individuals vs. Group levels:
Individuals perceive their own privacy
differently from that of their
community/groups.
2
, 3. Desired vs. Actual level: Desired level of privacy might be lower/higher
than individuals have in a given context.
4. Non-Monotonic: There is such a thing as both too much and not sufficient
privacy.
5. By-Directional (Inwards and Outwards): Individuals might have
different sensitivities for their actions towards others’ privacy and others’
actions towards them.
Petronio (2002)
The Communication Privacy Management Theory: Privacy is about setting
boundaries between yourself and others, which determine how much info is
shared and kept private.
Boundary regulation, however, has become more and more difficult since our
lives have become an online reality. We have an unlimited range of online
audience that can follow what we do (friends, colleagues, strangers). We tent to
group them together as homogeneous group. We are not careful with sharing.
Introduction to privacy online
Walther, J. B. (2011)
As users of the Internet and Social Media, the more they disclose of themselves,
the more they enjoy the benefits HOWEVER also the more they risk breach of
their privacy.
Three complicating factors confronting the use of Internet:
1. A misplaced presumption that online behaviour is private
2. The nature of Internet at a mechanical level is incommensurate
with privacy
3. One’s expectation of privacy does not constitute privileged
communication by definition
By definition and in practice, it appears, if anyone in the Internet-using public can
see one’s messages, the messages are in the public domain. Educating users
about their online footprint seems to be a better objective rather than changing
laws. Thus, online privacy protection is primarily shouldered by an individuals
own conscious effort.
Normative behaviour in social media adopts over time and shows relation to
personal development for young adults. MUDs (Multi-User Discussions) and
Usenet discussions were used, however newer systems still benefit users’
psychosocial development by providing apparently private communication
opportunities.
Self-disclosure in social media Extending the functional
approach to disclosure motivations and characteristics on social
network sites
Bazarova, N. N., & Choi, Y. H. (2014)
A functional model of self-disclosure on social network sites. According to this
model, people pursue strategic goals and disclose differently depending on social
media affordances, and self-disclosure goals mediate between media affordances
and disclosure intimacy.
3
, Public self-disclosure shared with multiple, diverse, and often ill-defined
audiences blurs boundaries between publicness and privacy.
Self-disclosure: the act of revealing personal information to others. Typically
communicated through verbal behaviour.
Self-disclosure fulfils fundamental needs for social connectedness and belonging
and is intrinsically rewarding, however also carries inherent risks of vulnerability
and information loss. Giving up a degree of privacy and personal control.
Common strategy for optimizing the disclosure rewards–risks ratio: establish a
dyadic boundary/small-group context. Only share personal information with
a trusted recipient. Social media acts upon this need. Example: Instagram best
friend function.
‘‘Stranger on the train phenomenon’’ or ‘‘the
sauna principle’’: People are most comfortable
sharing intimate disclosures with either a complete
stranger or a trusted person within a dyadic boundary.
The least disclosure is between people who do
not know each other well but anticipate future
interaction, and in the presence of uninvolved
and uninterested third parties or observers.
Functional theory of self-disclosure: Different social media activate different
disclosure goals, shaping disclosure intimacy.
Derlega and Grzelak (1979): If we wish to understand and predict individuals’
self-disclosing behaviour, we must identify (and measure) the major sources of
value that self-disclosure has for individuals. → Social rewards hoped to be
attained.
Five basic categories:
1. Social validation
Seeks to validate one’s self-concept and self-value by increasing social
approval, social acceptance, and general liking.
2. Self-expression
Helps relieve distress through venting out negative emotions and
disclosing
problems.
3. Relational development
To increase relational intimacy and closeness with another person.
4. Identity clarification
Conveys information about one’s identity and defines one’s position for
self and others.
5. Social control
Is used to strategically share information about self in an effort to
control social outcomes and resources such as information or social
benefits.
Derlega and Grzelak’s and Omarzu’s approach proposes a mediation model.
Situational cues activate disclosure goals, which shape disclosure characteristics.
4