SlideShare uma empresa Scribd logo
1 de 10
The Digital Divide Dark Social Implications for Society
What is the Digital Divide ,[object Object],Sen. Ted Stevens (R-AK) Putnam (2000) called this phenomena a "cyberapartheid." (175)
 
Who is actually using the Internet? (According to Political Science/Public Opinion Literature) ,[object Object],[object Object],[object Object],[object Object]
Why is the Digital Divide such a problem?
Digital Divide is also a potential problem for social science ,[object Object]
Rural vs. Urban Internet Access
The Echo-chamber problem (an example) http://www.youtube.com/watch?v=2qtzz0gfe2c ORIGINAL STORY: President Obama is holding a bipartisan Health Care Summit at the White House. (Feb. 24, 2010)
The Echo-chamber problem According to Best and Kruger (2005) the internet has an inherent bias because of who is using it: Socially liberal Economically conservative Very few are interested in "hearing the other side" (Mutz 2006).  Maybe Bloggers are doing this (Lawrence, Sides, and Farrell 2010)?
So what should we take away from all of this? ,[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Breaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightBreaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightJibril Abubakar
 
Media technology
Media technologyMedia technology
Media technologycgscootr
 
Media technology
Media technologyMedia technology
Media technologycgscootr
 
Engineering Social Justice Presentation
Engineering Social Justice PresentationEngineering Social Justice Presentation
Engineering Social Justice PresentationNasser Saleh PhD P.Eng
 
Technology creates social isolation and neurosis
Technology creates social isolation and neurosisTechnology creates social isolation and neurosis
Technology creates social isolation and neurosisMelanieWente
 
Introduction to the Global Digital Divide
Introduction to the Global Digital DivideIntroduction to the Global Digital Divide
Introduction to the Global Digital DivideNiamh Headon
 
Network Technology convergence
Network Technology convergenceNetwork Technology convergence
Network Technology convergencecgscootr
 
Legibility, Privacy and Creativity: Linked Data in a Surveillance Society
Legibility, Privacy and Creativity: Linked Data in a Surveillance SocietyLegibility, Privacy and Creativity: Linked Data in a Surveillance Society
Legibility, Privacy and Creativity: Linked Data in a Surveillance SocietyChristopher Brewster
 
Summing up the early internet
Summing up the early internetSumming up the early internet
Summing up the early internetMsifry
 
Technology Creates Social Isolation and Neurosis
Technology Creates Social Isolation and NeurosisTechnology Creates Social Isolation and Neurosis
Technology Creates Social Isolation and NeurosisH__H
 
Web accessibility: it's not a dirty word
Web accessibility: it's not a dirty wordWeb accessibility: it's not a dirty word
Web accessibility: it's not a dirty wordAccess iQ
 
Technology and Social Isolation
Technology and Social Isolation Technology and Social Isolation
Technology and Social Isolation sashantz
 
Technology creates social isolation and neurosis social impact of technology
Technology creates social isolation and neurosis    social impact of technologyTechnology creates social isolation and neurosis    social impact of technology
Technology creates social isolation and neurosis social impact of technologyrajakalsi
 
Social impact of technology: Social Isolation
Social impact of technology: Social IsolationSocial impact of technology: Social Isolation
Social impact of technology: Social IsolationTonyaClaughton
 

Mais procurados (17)

Breaching privacy, censorship and copyright
Breaching privacy, censorship and copyrightBreaching privacy, censorship and copyright
Breaching privacy, censorship and copyright
 
Media technology
Media technologyMedia technology
Media technology
 
Media technology
Media technologyMedia technology
Media technology
 
Critical Debates in Internet Studies
Critical Debates in Internet StudiesCritical Debates in Internet Studies
Critical Debates in Internet Studies
 
Engineering Social Justice Presentation
Engineering Social Justice PresentationEngineering Social Justice Presentation
Engineering Social Justice Presentation
 
Technology creates social isolation and neurosis
Technology creates social isolation and neurosisTechnology creates social isolation and neurosis
Technology creates social isolation and neurosis
 
Actor-Network Theory
Actor-Network TheoryActor-Network Theory
Actor-Network Theory
 
Introduction to the Global Digital Divide
Introduction to the Global Digital DivideIntroduction to the Global Digital Divide
Introduction to the Global Digital Divide
 
Network Technology convergence
Network Technology convergenceNetwork Technology convergence
Network Technology convergence
 
Legibility, Privacy and Creativity: Linked Data in a Surveillance Society
Legibility, Privacy and Creativity: Linked Data in a Surveillance SocietyLegibility, Privacy and Creativity: Linked Data in a Surveillance Society
Legibility, Privacy and Creativity: Linked Data in a Surveillance Society
 
Summing up the early internet
Summing up the early internetSumming up the early internet
Summing up the early internet
 
Technology Creates Social Isolation and Neurosis
Technology Creates Social Isolation and NeurosisTechnology Creates Social Isolation and Neurosis
Technology Creates Social Isolation and Neurosis
 
Web accessibility: it's not a dirty word
Web accessibility: it's not a dirty wordWeb accessibility: it's not a dirty word
Web accessibility: it's not a dirty word
 
The Next Digital Disruptions
The Next Digital DisruptionsThe Next Digital Disruptions
The Next Digital Disruptions
 
Technology and Social Isolation
Technology and Social Isolation Technology and Social Isolation
Technology and Social Isolation
 
Technology creates social isolation and neurosis social impact of technology
Technology creates social isolation and neurosis    social impact of technologyTechnology creates social isolation and neurosis    social impact of technology
Technology creates social isolation and neurosis social impact of technology
 
Social impact of technology: Social Isolation
Social impact of technology: Social IsolationSocial impact of technology: Social Isolation
Social impact of technology: Social Isolation
 

Semelhante a Tech 621 digital_divide

The case for privacy (2012)
The case for privacy (2012)The case for privacy (2012)
The case for privacy (2012)Rob Jewitt
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
Technology and Social Change: Re-Examining Key Assumptions
Technology and Social Change: Re-Examining Key AssumptionsTechnology and Social Change: Re-Examining Key Assumptions
Technology and Social Change: Re-Examining Key Assumptionsevgeny.morozov
 
Mac309 the case for privacy
Mac309 the case for privacyMac309 the case for privacy
Mac309 the case for privacyRob Jewitt
 
TECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docx
TECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docxTECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docx
TECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docxwrite5
 
Digital Divide The Factors, Developments and Suggestions
Digital Divide The Factors, Developments and SuggestionsDigital Divide The Factors, Developments and Suggestions
Digital Divide The Factors, Developments and SuggestionsBeth Schoren
 
Developers can Change The World
Developers can Change The WorldDevelopers can Change The World
Developers can Change The Worldjamesturk
 
Mac129 MED102 social media and the new publicness
Mac129 MED102 social media and the new publicnessMac129 MED102 social media and the new publicness
Mac129 MED102 social media and the new publicnessRob Jewitt
 
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docxTECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docxjacqueliner9
 
Democracy_in_a_Network_Society.pptx
Democracy_in_a_Network_Society.pptxDemocracy_in_a_Network_Society.pptx
Democracy_in_a_Network_Society.pptxkarishmanair8
 
Mac Social Media And The New Publicness
Mac Social Media And The New PublicnessMac Social Media And The New Publicness
Mac Social Media And The New PublicnessRob Jewitt
 
New Digital Divide Presentation
New Digital Divide PresentationNew Digital Divide Presentation
New Digital Divide Presentationnewdigitaldivide
 
Day 5 social justice and multiculturalism
Day 5 social justice and multiculturalismDay 5 social justice and multiculturalism
Day 5 social justice and multiculturalismvpriddle
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 

Semelhante a Tech 621 digital_divide (20)

The case for privacy (2012)
The case for privacy (2012)The case for privacy (2012)
The case for privacy (2012)
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Polinter05
Polinter05Polinter05
Polinter05
 
Polinter05
Polinter05Polinter05
Polinter05
 
Technology and Social Change: Re-Examining Key Assumptions
Technology and Social Change: Re-Examining Key AssumptionsTechnology and Social Change: Re-Examining Key Assumptions
Technology and Social Change: Re-Examining Key Assumptions
 
Mac309 the case for privacy
Mac309 the case for privacyMac309 the case for privacy
Mac309 the case for privacy
 
TECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docx
TECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docxTECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docx
TECHNOLOGICAL ADVANCEMENT AND A BETTER SOCIETY.docx
 
The New Digital Divide
The New Digital DivideThe New Digital Divide
The New Digital Divide
 
Digital Divide The Factors, Developments and Suggestions
Digital Divide The Factors, Developments and SuggestionsDigital Divide The Factors, Developments and Suggestions
Digital Divide The Factors, Developments and Suggestions
 
Developers can Change The World
Developers can Change The WorldDevelopers can Change The World
Developers can Change The World
 
Mac129 MED102 social media and the new publicness
Mac129 MED102 social media and the new publicnessMac129 MED102 social media and the new publicness
Mac129 MED102 social media and the new publicness
 
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docxTECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
 
Democracy_in_a_Network_Society.pptx
Democracy_in_a_Network_Society.pptxDemocracy_in_a_Network_Society.pptx
Democracy_in_a_Network_Society.pptx
 
Mac Social Media And The New Publicness
Mac Social Media And The New PublicnessMac Social Media And The New Publicness
Mac Social Media And The New Publicness
 
Polinter05
Polinter05Polinter05
Polinter05
 
New Digital Divide Presentation
New Digital Divide PresentationNew Digital Divide Presentation
New Digital Divide Presentation
 
Day 5 social justice and multiculturalism
Day 5 social justice and multiculturalismDay 5 social justice and multiculturalism
Day 5 social justice and multiculturalism
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Digital divide
Digital divideDigital divide
Digital divide
 
Texas policy 2016
Texas policy 2016Texas policy 2016
Texas policy 2016
 

Último

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Tech 621 digital_divide

  • 1. The Digital Divide Dark Social Implications for Society
  • 2.
  • 3.  
  • 4.
  • 5. Why is the Digital Divide such a problem?
  • 6.
  • 7. Rural vs. Urban Internet Access
  • 8. The Echo-chamber problem (an example) http://www.youtube.com/watch?v=2qtzz0gfe2c ORIGINAL STORY: President Obama is holding a bipartisan Health Care Summit at the White House. (Feb. 24, 2010)
  • 9. The Echo-chamber problem According to Best and Kruger (2005) the internet has an inherent bias because of who is using it: Socially liberal Economically conservative Very few are interested in "hearing the other side" (Mutz 2006).  Maybe Bloggers are doing this (Lawrence, Sides, and Farrell 2010)?
  • 10.