SlideShare ist ein Scribd-Unternehmen logo
1 von 10
The Digital Divide Dark Social Implications for Society
What is the Digital Divide ,[object Object],Sen. Ted Stevens (R-AK) Putnam (2000) called this phenomena a "cyberapartheid." (175)
 
Who is actually using the Internet? (According to Political Science/Public Opinion Literature) ,[object Object],[object Object],[object Object],[object Object]
Why is the Digital Divide such a problem?
Digital Divide is also a potential problem for social science ,[object Object]
Rural vs. Urban Internet Access
The Echo-chamber problem (an example) http://www.youtube.com/watch?v=2qtzz0gfe2c ORIGINAL STORY: President Obama is holding a bipartisan Health Care Summit at the White House. (Feb. 24, 2010)
The Echo-chamber problem According to Best and Kruger (2005) the internet has an inherent bias because of who is using it: Socially liberal Economically conservative Very few are interested in "hearing the other side" (Mutz 2006).  Maybe Bloggers are doing this (Lawrence, Sides, and Farrell 2010)?
So what should we take away from all of this? ,[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere Àhnliche Inhalte

Was ist angesagt?

Breaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightBreaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightJibril Abubakar
 
Media technology
Media technologyMedia technology
Media technologycgscootr
 
Media technology
Media technologyMedia technology
Media technologycgscootr
 
Critical Debates in Internet Studies
Critical Debates in Internet StudiesCritical Debates in Internet Studies
Critical Debates in Internet StudiesMuhammad Rawaha Saleem
 
Engineering Social Justice Presentation
Engineering Social Justice PresentationEngineering Social Justice Presentation
Engineering Social Justice PresentationNasser Saleh PhD P.Eng
 
Technology creates social isolation and neurosis
Technology creates social isolation and neurosisTechnology creates social isolation and neurosis
Technology creates social isolation and neurosisMelanieWente
 
Actor-Network Theory
Actor-Network TheoryActor-Network Theory
Actor-Network TheoryMedia & Culture
 
Introduction to the Global Digital Divide
Introduction to the Global Digital DivideIntroduction to the Global Digital Divide
Introduction to the Global Digital DivideNiamh Headon
 
Network Technology convergence
Network Technology convergenceNetwork Technology convergence
Network Technology convergencecgscootr
 
Legibility, Privacy and Creativity: Linked Data in a Surveillance Society
Legibility, Privacy and Creativity: Linked Data in a Surveillance SocietyLegibility, Privacy and Creativity: Linked Data in a Surveillance Society
Legibility, Privacy and Creativity: Linked Data in a Surveillance SocietyChristopher Brewster
 
Summing up the early internet
Summing up the early internetSumming up the early internet
Summing up the early internetMsifry
 
Technology Creates Social Isolation and Neurosis
Technology Creates Social Isolation and NeurosisTechnology Creates Social Isolation and Neurosis
Technology Creates Social Isolation and NeurosisH__H
 
Web accessibility: it's not a dirty word
Web accessibility: it's not a dirty wordWeb accessibility: it's not a dirty word
Web accessibility: it's not a dirty wordAccess iQ
 
Technology and Social Isolation
Technology and Social Isolation Technology and Social Isolation
Technology and Social Isolation sashantz
 
Technology creates social isolation and neurosis social impact of technology
Technology creates social isolation and neurosis    social impact of technologyTechnology creates social isolation and neurosis    social impact of technology
Technology creates social isolation and neurosis social impact of technologyrajakalsi
 
Social impact of technology: Social Isolation
Social impact of technology: Social IsolationSocial impact of technology: Social Isolation
Social impact of technology: Social IsolationTonyaClaughton
 

Was ist angesagt? (17)

Breaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightBreaching privacy, censorship and copyright
Breaching privacy, censorship and copyright
 
Media technology
Media technologyMedia technology
Media technology
 
Media technology
Media technologyMedia technology
Media technology
 
Critical Debates in Internet Studies
Critical Debates in Internet StudiesCritical Debates in Internet Studies
Critical Debates in Internet Studies
 
Engineering Social Justice Presentation
Engineering Social Justice PresentationEngineering Social Justice Presentation
Engineering Social Justice Presentation
 
Technology creates social isolation and neurosis
Technology creates social isolation and neurosisTechnology creates social isolation and neurosis
Technology creates social isolation and neurosis
 
Actor-Network Theory
Actor-Network TheoryActor-Network Theory
Actor-Network Theory
 
Introduction to the Global Digital Divide
Introduction to the Global Digital DivideIntroduction to the Global Digital Divide
Introduction to the Global Digital Divide
 
Network Technology convergence
Network Technology convergenceNetwork Technology convergence
Network Technology convergence
 
Legibility, Privacy and Creativity: Linked Data in a Surveillance Society
Legibility, Privacy and Creativity: Linked Data in a Surveillance SocietyLegibility, Privacy and Creativity: Linked Data in a Surveillance Society
Legibility, Privacy and Creativity: Linked Data in a Surveillance Society
 
Summing up the early internet
Summing up the early internetSumming up the early internet
Summing up the early internet
 
Technology Creates Social Isolation and Neurosis
Technology Creates Social Isolation and NeurosisTechnology Creates Social Isolation and Neurosis
Technology Creates Social Isolation and Neurosis
 
Web accessibility: it's not a dirty word
Web accessibility: it's not a dirty wordWeb accessibility: it's not a dirty word
Web accessibility: it's not a dirty word
 
The Next Digital Disruptions
The Next Digital DisruptionsThe Next Digital Disruptions
The Next Digital Disruptions
 
Technology and Social Isolation
Technology and Social Isolation Technology and Social Isolation
Technology and Social Isolation
 
Technology creates social isolation and neurosis social impact of technology
Technology creates social isolation and neurosis    social impact of technologyTechnology creates social isolation and neurosis    social impact of technology
Technology creates social isolation and neurosis social impact of technology
 
Social impact of technology: Social Isolation
Social impact of technology: Social IsolationSocial impact of technology: Social Isolation
Social impact of technology: Social Isolation
 

Ähnlich wie Tech 621 digital_divide

The case for privacy (2012)
The case for privacy (2012)The case for privacy (2012)
The case for privacy (2012)Rob Jewitt
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
Technology and Social Change: Re-Examining Key Assumptions
Technology and Social Change: Re-Examining Key AssumptionsTechnology and Social Change: Re-Examining Key Assumptions
Technology and Social Change: Re-Examining Key Assumptionsevgeny.morozov
 
Mac309 the case for privacy
Mac309 the case for privacyMac309 the case for privacy
Mac309 the case for privacyRob Jewitt
 
TECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docx
TECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docxTECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docx
TECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docxwrite5
 
The New Digital Divide
The New Digital DivideThe New Digital Divide
The New Digital Dividenewdigitaldivide
 
Digital Divide The Factors, Developments and Suggestions
Digital Divide The Factors, Developments and SuggestionsDigital Divide The Factors, Developments and Suggestions
Digital Divide The Factors, Developments and SuggestionsBeth Schoren
 
Developers can Change The World
Developers can Change The WorldDevelopers can Change The World
Developers can Change The Worldjamesturk
 
Mac129 MED102 social media and the new publicness
Mac129 MED102 social media and the new publicnessMac129 MED102 social media and the new publicness
Mac129 MED102 social media and the new publicnessRob Jewitt
 
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docxTECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docxjacqueliner9
 
Democracy_in_a_Network_Society.pptx
Democracy_in_a_Network_Society.pptxDemocracy_in_a_Network_Society.pptx
Democracy_in_a_Network_Society.pptxkarishmanair8
 
Mac Social Media And The New Publicness
Mac Social Media And The New PublicnessMac Social Media And The New Publicness
Mac Social Media And The New PublicnessRob Jewitt
 
New Digital Divide Presentation
New Digital Divide PresentationNew Digital Divide Presentation
New Digital Divide Presentationnewdigitaldivide
 
Day 5 social justice and multiculturalism
Day 5 social justice and multiculturalismDay 5 social justice and multiculturalism
Day 5 social justice and multiculturalismvpriddle
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
Digital divide
Digital divideDigital divide
Digital dividedennismonre
 

Ähnlich wie Tech 621 digital_divide (20)

The case for privacy (2012)
The case for privacy (2012)The case for privacy (2012)
The case for privacy (2012)
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Polinter05
Polinter05Polinter05
Polinter05
 
Polinter05
Polinter05Polinter05
Polinter05
 
Technology and Social Change: Re-Examining Key Assumptions
Technology and Social Change: Re-Examining Key AssumptionsTechnology and Social Change: Re-Examining Key Assumptions
Technology and Social Change: Re-Examining Key Assumptions
 
Mac309 the case for privacy
Mac309 the case for privacyMac309 the case for privacy
Mac309 the case for privacy
 
TECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docx
TECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docxTECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docx
TECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docx
 
The New Digital Divide
The New Digital DivideThe New Digital Divide
The New Digital Divide
 
Digital Divide The Factors, Developments and Suggestions
Digital Divide The Factors, Developments and SuggestionsDigital Divide The Factors, Developments and Suggestions
Digital Divide The Factors, Developments and Suggestions
 
Developers can Change The World
Developers can Change The WorldDevelopers can Change The World
Developers can Change The World
 
Mac129 MED102 social media and the new publicness
Mac129 MED102 social media and the new publicnessMac129 MED102 social media and the new publicness
Mac129 MED102 social media and the new publicness
 
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docxTECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
 
Democracy_in_a_Network_Society.pptx
Democracy_in_a_Network_Society.pptxDemocracy_in_a_Network_Society.pptx
Democracy_in_a_Network_Society.pptx
 
Mac Social Media And The New Publicness
Mac Social Media And The New PublicnessMac Social Media And The New Publicness
Mac Social Media And The New Publicness
 
Polinter05
Polinter05Polinter05
Polinter05
 
New Digital Divide Presentation
New Digital Divide PresentationNew Digital Divide Presentation
New Digital Divide Presentation
 
Day 5 social justice and multiculturalism
Day 5 social justice and multiculturalismDay 5 social justice and multiculturalism
Day 5 social justice and multiculturalism
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Digital divide
Digital divideDigital divide
Digital divide
 
Texas policy 2016
Texas policy 2016Texas policy 2016
Texas policy 2016
 

KĂŒrzlich hochgeladen

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

KĂŒrzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Tech 621 digital_divide

  • 1. The Digital Divide Dark Social Implications for Society
  • 2.
  • 4.
  • 5. Why is the Digital Divide such a problem?
  • 6.
  • 7. Rural vs. Urban Internet Access
  • 8. The Echo-chamber problem (an example) http://www.youtube.com/watch?v=2qtzz0gfe2c ORIGINAL STORY: President Obama is holding a bipartisan Health Care Summit at the White House. (Feb. 24, 2010)
  • 9. The Echo-chamber problem According to Best and Kruger (2005) the internet has an inherent bias because of who is using it: Socially liberal Economically conservative Very few are interested in "hearing the other side" (Mutz 2006).  Maybe Bloggers are doing this (Lawrence, Sides, and Farrell 2010)?
  • 10.