21.10: Social Change, Technology, and Modernization
- Page ID
- 60346
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)
( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\id}{\mathrm{id}}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\kernel}{\mathrm{null}\,}\)
\( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\)
\( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\)
\( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)
\( \newcommand{\vectorA}[1]{\vec{#1}} % arrow\)
\( \newcommand{\vectorAt}[1]{\vec{\text{#1}}} % arrow\)
\( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vectorC}[1]{\textbf{#1}} \)
\( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)
\( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)
\( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)Learning Outcomes
- Describe the influence of media and technology on social change and modernization
We know that technology is one of the major factors that leads to social change. Let’s take a deeper look at how technology and the media play a major role in the accelerated rate of globalization, which in turn, affects social change.
Social Movements and Technology
So what is the real impact of this technology on the world? Did Twitter bring down Mubarak in Egypt? Author Malcolm Gladwell (2010) doesn’t think so. In an article in The New Yorker, Gladwell tackles what he considers the myth that social media gets people more engaged. He points out that most of the tweets relating to the Iran protests were in English and sent from Western accounts (instead of people on the ground). Rather than increasing engagement, he contends that social media only increases participation; after all, the cost of participation is so much lower than the cost of engagement. Instead of risking being arrested, shot with rubber bullets, or sprayed with fire hoses, social media activists can click “like” or retweet a message from the comfort and safety of their desk (Gladwell 2010).
There are, though, good cases to be made for the power of social media in propelling social movements. In the article, “Parrhesia and Democracy: Truth-telling, WikiLeaks and the Arab Spring,” Theresa Sauter and Gavin Kendall (2011) described the importance of social media in the Arab Spring uprisings. Parrhesia means “the practice of truth-telling,” which describes the protestors’ use of social media to make up for the lack of coverage and even misrepresentation of events by state-controlled media. The Tunisian blogger Lina Ben Mhenni posted photographs and videos on Facebook and Twitter of events exposing the violence committed by the government. In Egypt, the journalist Asmaa Mahfouz used Facebook to gather large numbers of people in Tahrir Square in the capital city of Cairo. Sauter and Kendall maintain that it was the use of Web 2.0 technologies that allowed activists not only to share events with the world but also to organize the actions.
When the Egyptian government shut down the Internet to stop the use of social media, the group Anonymous, a hacking organization noted for online acts of civil disobedience initiated “Operation Egypt” and sent thousands of faxes to keep the public informed of their government’s activities (CBS Interactive Inc. 2014) as well as attacking the government’s web site (Wagensiel 2011). In its Facebook press release the group stated the following: “Anonymous wants you to offer free access to uncensored media in your entire country. When you ignore this message, not only will we attack your government websites, Anonymous will also make sure that the international media sees the horrid reality you impose upon your people.”
Sociologists have identified high-risk activism, such as the civil rights movement, as a “strong-tie” phenomenon, meaning that people are far more likely to stay engaged and not run home to safety if they have close friends who are also engaged. The people who dropped out of the movement––who went home after the danger got too great––did not display any less ideological commitment. But they lacked the strong-tie connection to other people who were staying. Social media, by its very makeup, is “weak-tie” (McAdam and Paulsen 1993). People follow or friend people they have never met. But while these online acquaintances are a source of information and inspiration, the lack of engaged personal contact limits the level of risk we’ll take on their behalf.
These weak-tie connections can still affect change, especially as online activism becomes the norm. For example, look at this Wikipedia page explaining Hashtag Activism, to learn more about movements that gained popularity through Twitter hashtags.
Use of Technology and Social Media in Society by Individuals
Research conducted in 2018 showed that 95% of Americans own a cell phone, and 77% of Americans own a smartphone.[1] Access to the internet is often within arm’s reach—26% of people surveyed in 2018 said they were online almost constantly, while 43% said they got online several times a day.[2]
While people report that cell phones make it easier to stay in touch, simplify planning and scheduling their daily activities, and increase their productivity, that’s not the only impact of increased cell phone ownership in the United States. Smith also reports that “roughly one in five cell owners say that their phone has made it at least somewhat harder to forget about work at home or on the weekends; to give people their undivided attention; or to focus on a single task without being distracted” (Smith 2012).
Planned Obsolescence: Technology That’s Built to Crash
Chances are your mobile phone company, as well as the makers of your laptop and your household appliances, are all counting on their products to fail. Not too quickly, of course, or consumers wouldn’t stand for it—but frequently enough that you might find that it costs far more to fix a device than to replace it with a newer model. Or you find the phone company e-mails you saying that you’re eligible for a free new phone, because yours is a whopping two years old. And appliance repair people say that while they might be fixing some machines that are twenty years old, they generally aren’t fixing those that are seven years old; newer models are built to be thrown out. This strategy is called planned obsolescence, and it is the business practice of planning for a product to be obsolete or unusable from the time it is created.
To some extent, planned obsolescence is a natural extension of new and emerging technologies. After all, who is going to cling to an enormous and slow desktop computer from 2000 when a few hundred dollars can buy one that is significantly faster and better? But the practice is not always so benign. The classic example of planned obsolescence is the nylon stocking. Women’s stockings—once an everyday staple of women’s lives––get “runs” or “ladders” after only a few wearings. This requires the stockings to be discarded and new ones purchased. Not surprisingly, the garment industry did not invest heavily in finding a rip-proof fabric; it was in manufacturers’ best interest that their product be regularly replaced.
Those who use Microsoft Windows might feel that like the women who purchased endless pairs of stockings, they are victims of planned obsolescence. Every time Windows releases a new operating system, there are typically not many innovations in it that consumers feel they must have. However, the software programs are upwardly compatible only. This means that while the new versions can read older files, the old version cannot read the newer ones. In short order, those who have not upgraded right away find themselves unable to open files sent by colleagues or friends, and they usually wind up upgrading as well.
Ultimately, whether you are getting rid of your old product because you are being offered a shiny new free one (like the latest smartphone model), or because it costs more to fix than to replace (like the iPod model), or because not doing so leaves you out of the loop (like the Windows model), the result is the same. It might just make you nostalgic for your old Sony Discman and simple DVD player.
With so many people using social media both in the United States and abroad, it is no surprise that social media is a powerful force for social change. Spreading democracy, as evidenced in the Arab Spring example, is just the tip of the iceberg when it comes to using social media to incite change. For example, McKenna Pope, a thirteen-year-old girl, used the Internet to successfully petition Hasbro to fight gender stereotypes by creating a gender-neutral Easy-Bake Oven instead of using only the traditional pink color (Kumar 2014).
Product Advertising
Companies use advertising to sell to us, but the way they reach us is changing. Naomi Klein identified the destructive impact of corporate branding her 1999 text, No Logo, an anti-globalization treatise that focused on sweatshops, corporate power, and anti-consumerist social movements. In the post-millennial society, synergistic advertising practices ensure you are receiving the same message from a variety of sources and on a variety of platforms. For example, you may see billboards for Miller beer on your way to a stadium, sit down to watch a game preceded by a Miller commercial on the big screen, and watch a halftime ad in which people are shown holding up the trademark bottles. Chances are you can guess which brand of beer is for sale at the concession stand.
Advertising has changed, as technology and media have allowed consumers to bypass traditional advertising venues. From the invention of the remote control, which allows us to skip television advertising without leaving our seats, to recording devices that let us watch programs but skip the ads, conventional television advertising is on the wane. And print media is no different. Advertising revenue in newspapers and on television fell significantly in 2009, which shows that companies need new ways of getting their messages to consumers.
One model companies are considering to address this advertising downturn uses the same philosophy as celebrity endorsements, just on a different scale. Companies are hiring college students to be their on-campus representatives, and they are looking for popular students engaged in high-profile activities like sports, fraternities, and music. The marketing team is betting that if we buy perfume because Beyoncé tells us to, we’ll also choose our cell phone or smoothie brand if a popular student encourages that choice. According to an article in the New York Times, fall semester 2011 saw an estimated 10,000 U.S. college students working on campus as brand ambassadors for products from Red Bull energy drinks to Hewlett-Packard computers (Singer 2011). As the companies figure it, college students will trust one source of information above all: other students.
Technological Concerns
With all of the new media (social networking sites, blogs, podcasts, wikis, and virtual worlds, etc.) available to us, there are also some new concerns regarding privacy, security, equality, and polarization. Additionally, there is no guarantee that the information offered by new media is accurate. In fact, the immediacy of new media coupled with the lack of oversight means we must be more careful than ever to ensure our news is coming from accurate sources.
Online Privacy and Security
As we increase our footprints on the web by going online more often to connect socially, share material, conduct business, and store information, we also increase our vulnerability to those with criminal intent. The Pew Research Center recently published a report that indicated the number of Internet users who express concern over the extent of personal information about them available online jumped 17 percent between 2009 and 2013. In that same survey, 12 percent of respondents indicated they had been harassed online, and 11 percent indicated that personal information, such as their Social Security number, had been stolen (Rainie, Kiesler, Kang, and Madden 2013).
Online privacy and security is a key organizational concern as well. Recent large-scale data breaches at retailers such as Target, financial powerhouses such as JP Morgan, the government health insurance site Healthcare.gov, and cell phone providers such as Verizon, exposed millions of people to the threat of identity theft when hackers got access to personal information by compromising website security.
For example, in late August 2014, hackers breached the iCloud data storage site and promptly leaked wave after wave of nude photos from the private accounts of actors such as Jennifer Lawrence and Kirsten Dunst (Lewis 2014). While large-scale data breaches that affect corporations and celebrities are more likely to make the news, individuals may put their personal information at risk simply by clicking a suspect link in an official sounding e-mail.
How can individuals protect their data? Numerous facts sheets available through the government, nonprofits, and the private sector outline common safety measures, including the following: become familiar with privacy rights; read privacy policies when making a purchase (rather than simply clicking “accept”); give out only the minimum information requested by any source; ask why information is being collected, how it is going to be used, and who will have access it; and monitor your credit history for red flags that indicate your identity has been compromised.
Net Neutrality
The issue of net neutrality, the principle that all Internet data should be treated equally by Internet service providers, is part of the national debate about Internet access and the digital divide. On one side of this debate is the belief that those who provide Internet service, like those who provide electricity and water, should be treated as common carriers, legally prohibited from discriminating based on the customer or nature of the goods. Supporters of net neutrality suggest that without such legal protections, the Internet could be divided into “fast” and “slow” lanes. A conflict perspective theorist might suggest that this discrimination would allow bigger corporations, such as Amazon, to pay Internet providers a premium for faster service, which could lead to gaining an advantage that would drive small, local competitors out of business.
The other side of the debate holds the belief that designating Internet service providers as common carriers would constitute an unreasonable regulatory burden and limit the ability of telecommunication companies to operate profitably. A functional perspective theorist might point out that, without profits, companies would not invest in making improvements to their Internet service or expanding those services to underserved areas. The final decision rests with the Federal Communications Commission and the federal government, which must decide how to fairly regulate broadband providers without dividing the Internet into haves and have-nots.
Violence in Media and Video Games: Does It Matter?
A glance through popular video game and movie titles geared toward children and teens shows the vast spectrum of violence that is displayed, condoned, and acted out.
As a way to guide parents in their programming choices, the motion picture industry put a rating system in place in the 1960s. But new media—video games in particular—proved to be uncharted territory. In 1994, the Entertainment Software Rating Board (ERSB) set a ratings system for games that addressed issues of violence, sexuality, drug use, and the like. California took it a step further by making it illegal to sell video games to underage buyers. The case led to a heated debate about personal freedoms and child protection, and in 2011, the U.S. Supreme Court ruled against the California law, stating it violated freedom of speech (ProCon 2012).
Children’s play has often involved games of aggression—from cowboys and Indians, to cops and robbers, to fake sword fights. Many articles report on the controversy surrounding the suggested link between violent video games and violent behavior. Is the link real? Psychologists Anderson and Bushman (2001) reviewed forty-plus years of research on the subject and, in 2003, determined that there are causal linkages between violent video game use and aggression. They found that children who had just played a violent video game demonstrated an immediate increase in hostile or aggressive thoughts, an increase in aggressive emotions, and physiological arousal that increased the chances of acting out aggressive behavior (Anderson 2003).
Ultimately, repeated exposure to this kind of violence leads to increased expectations that violence is a solution, increased violent behavioral scripts, and an increased cognitive accessibility to violent behavior (Anderson 2003). In short, people who play a lot of these games find it easier to imagine and access violent solutions than nonviolent ones, and they are less socialized to see violence as a negative. While these facts do not mean there is no role for video games, it should give players pause. In 2013, The American Psychological Association began an expansive meta-analysis of peer-reviewed research analyzing the effect of media violence. Results are expected in 2014.
Homogenization and Fragmentation
Despite the variety of media at hand, the mainstream news and entertainment you enjoy are increasingly homogenized. Research by McManus (1995) suggests that different news outlets all tell the same stories, using the same sources, resulting in the same message, presented with only slight variations. So whether you are reading the New York Times or the CNN’s web site, the coverage of national events like a major court case or political issue will likely be the same.
Simultaneously with this homogenization among the major news outlets, the opposite process is occurring in the newer media streams. With so many choices, people increasingly customize their news experience, minimizing their opportunity to encounter information that does not jive with their worldview (Prior 2005). For instance, those who are staunchly Republican can avoid centrist or liberal-leaning cable news shows and web sites that would show Democrats in a favorable light. They know to seek out Fox News over MSNBC, just as Democrats know to do the opposite. Further, people who want to avoid politics completely can choose to visit web sites that deal only with entertainment or that will keep them up to date on sports scores. They have an easy way to avoid information they do not wish to hear.
Further Research
- To learn more about new media, visit newmedia.org.
- To understand how independent media coverage differs from major corporate affiliated news outlets, review material from the Democracy Now! website.
- Watch this RSA Animate video “The Internet in Society: Empowering or Censoring Citizens?” to learn more about the power of the internet and its role in global politics.
An interactive or media element has been excluded from this version of the text. You can view it online here: http://pb.libretexts.org/its/?p=608
Modernization
Modernization describes the processes that increase the amount of specialization and differentiation of structure in societies resulting in the move from an undeveloped society to a developed, technologically driven society (Irwin 1975). By this definition, the level of modernity within a society is judged by the sophistication of its technology, particularly as it relates to infrastructure, industry, and the like. However, it is important to note the inherent ethnocentric bias of such assessment. Why do we assume that those living in semi-peripheral and peripheral nations would find it so wonderful to become more like the core nations? Is modernization always positive?
One contradiction of all kinds of technology is that they often promise time-saving benefits, but somehow fail to deliver. How many times have you ground your teeth in frustration at an Internet site that refused to load or at a dropped call on your cell phone? Despite time-saving devices such as dishwashers, washing machines, and, now, remote control vacuum cleaners, the average amount of time spent on housework is the same today as it was fifty years ago. And the dubious benefits of 24/7 e-mail and immediate information have simply increased the amount of time employees are expected to be responsive and available. While once businesses had to travel at the speed of the U.S. postal system, sending something off and waiting until it was received before the next stage, today the immediacy of information transfer means there are no such breaks.
Further, the Internet bought us information, but at a cost. The morass of information means that there is as much poor information available as trustworthy sources. There is a delicate line to walk when core nations seek to bring the assumed benefits of modernization to more traditional cultures. For one, there are obvious pro-capitalist biases that go into such attempts, and it is short-sighted for western governments and social scientists to assume all other countries aspire to follow in their footsteps. Additionally, there can be a kind of neo-liberal defense of rural cultures, ignoring the often crushing poverty and diseases that exist in peripheral nations and focusing only on a nostalgic mythology of the happy peasant. It takes a very careful hand to understand both the need for cultural identity and preservation as well as the hopes for future growth.
Think It Over
- Where and how do you get your news? Do you watch network television? Read the newspaper? Go online? How about your parents or grandparents? Do you think it matters where you seek out information? Why, or why not?
- Document your screen time usage for one 24-hour period. Some phones have built in trackers and there are a variety of free apps to track cell phone screen time. Challenge yourself by documenting how many times you touch your phone and/or look at your phone. Does it also serve as your timepiece? Do you “check” your phone just to see what is there? Do you fiddle with your phone (in a pocket or bag) even when you are not actively using it? How often do you check social media? How many different types of alerts do you receive? Share your responses with your classmates. Were you surprised by the results? Did your habits change because you knew they would be tracked?
- If you are up for another challenge, go for a 24-hour period with essential phone use only. Since most of us use our cell phones as our only means of communication, it might be unreasonable to shut your phone down for the day, especially if you have family or work matters that might require your immediate attention. Other than “emergency-type” situations (you could set a special ring tone), try to not touch or look at your phone for 24 hours. Instead of documenting usage, document each time you thought about “checking something” on your phone. Share your responses with your classmates. Were you surprised by the results? Did your habits change because you knew they would be tracked?
glossary
- new media:
- all interactive forms of information exchange
- net neutrality:
- the principle that all Internet data should be treated equally by internet service providers
- planned obsolescence:
- the act of a technology company planning for a product to be obsolete or unable from the time it’s created
Think It Over
- Can you think of people in your own life who support or defy the premise that access to technology leads to greater opportunities? How have you noticed technology use and opportunity to be linked, or does your experience contradict this idea?
- Should the U.S. government be responsible for providing all citizens with access to the Internet? Or is gaining Internet access an individual responsibility?
- Mobile Fact Sheet (February 2018). Pew Research Center. Retrieved from https://www.pewinternet.org/fact-sheet/mobile/↵
- Perrin, Andrew and Jiang JingJing (March 2018). Pew Research Center. About a quarter of U.S. adults say they are ‘almost constantly’ online. Retrieved from https://www.pewresearch.org/fact-tank/2019/07/25/americans-going-online-almost-constantly/. ↵
- Social Change. Authored by: OpenStax CNX. Located at: https://cnx.org/contents/AgQDEnLI@10.1:vi4eB2eh@5/Social-Change. License: CC BY: Attribution. License Terms: Download for free at http://cnx.org/contents/02040312-72c...9333f3e1d@3.49
- Modernization. Provided by: OpenStax College. Located at: https://cnx.org/contents/AgQDEnLI@12.5:vi4eB2eh@9/21-3-Social-Change. License: CC BY: Attribution. License Terms: Download for free at http://cnx.org/contents/02040312-72c...9333f3e1d@10.1.
- Technology Today. Provided by: OpenStax College. Located at: https://cnx.org/contents/AgQDEnLI@12.5:_5jASD-H@12/8-1-Technology-Today. License: CC BY: Attribution. License Terms: Download for free at http://cnx.org/contents/02040312-72c...9333f3e1d@10.1.
- Media and Technology in Society. Provided by: OpenStax College. Located at: https://cnx.org/contents/AgQDEnLI@12.5:_U5AN6pQ@11/8-2-Media-and-Technology-in-Society. License: CC BY: Attribution. License Terms: Download for free at http://cnx.org/contents/02040312-72c...9333f3e1d@10.1.
- RSA ANIMATE: The Internet in Society: Empowering or Censoring Citizens?. Authored by: The RSA. Located at: https://www.youtube.com/watch?v=Uk8x3V-sUgU. License: All Rights Reserved