SlideShare uma empresa Scribd logo
1 de 25
April 18, 2012
Three Guiding Questions
 To what extent does the Internet media sector mimic
  the long-established patters of concentrated
  ownership in the broader print and broadcast media?
 To what extent has it altered the processes shaping a
  central area of media content: news production and
  distribution?
 What has been the effect of the phenomenon of file
  sharing, the rise of open-source software, and other
  intellectual property disputes?

                Chadwick, chap. 12, p. 289.
Key Scholarly Works on Media
Concentration
 Ben Bagdikian, The Media Monopoly
  (6th edn. 2000)
 Eli Noam, Media Ownership and
  Concentration in America (2009)
 Robert McChesney, Rich Media, Poor
  Democracy (2000)
 Robert McChesney, The Political
  Economy of Media (2008)
Concentration of Control
The Big Seven
 General Electric
 Walt Disney
 News Corporation
 TimeWarner
 Viacom
 CBS
 Bertelsmann
Media Concentration
Film Studio Market Share, 2009
Music Recording, 2008
Key questions
 How does the diffusion of ICTS affect the distribution
  of power?
 Does it empower individuals and small groups or does
  it privilege large organizations and institutions?
 Does it undermine existing hierarchies?
Definitions of Power
 Capabilities-based power
 Relational power
 Structural power
 Metapower
Definitions of Power
 Robert Dahl and Jack Nagel (relational power)
 Bachrach and Baratz (non-decisions)
 Steven Lukes (interests instead of preferences)
 Susan Strange and Steven Lukes(structural power)
 Joseph S. Nye (soft power)



            “A Position of Power” video
ICTs and Firm Capabilities: Power
Transitions among Big Firms
   IBM
   Microsoft/Intel
   Google
   Facebook
   Twitter
   What’s next?
What is Google?
 Founded 1998 by Larry
    Page and Sergey Brin.
   IPO 2004 ($23 billion)
   World’s most popular
    search engine.
   World’s most popular web
    site.
   Built on PageRank
    technology.


    ASU students video on Google
Google Executives
 Larry Page
 Eric Schmidt
 Sergei Brin



  TED video

  Ken Auletta talking about
  his book, Googled
ICTs and national capabilities
 US is ahead in movies, music, software and web-based
  businesses
 Taiwan and China are ahead in PCs
 Korea is ahead in broadband, but also in flat panel
  displays (with Taiwan)
 China is coming up but is not in the top tier yet
Relational power
 Definition: A has power over B if A can get B to act
  against his/her preferences but according to A’s
  preferences.
 Relational power can be coercive or non-coercive.
 If A can persuade B to change his/her preferences to
  be more like A’s, then A has influenced B without
  using coercion.
ICTs and Relational Power
 Google vs. China
 Google vs. print publishers/authors
 Google vs. EU on digitized libraries
 RIAA and MPAA vs. average consumer of digital
  music and video
 Cyberdiplomacy
 Cyber warfare
Google vs. China
 Jan 27, 2006 Google launches Google.cn
 Chinese government forces Google.cn to censor
  certain Internet searches (Dalai Lama, Falun Gong)
 Chinese government hacks into Gmail accounts of
  Chinese human rights activists
 Google redirects Google.cn searches to Google.hk
  (Hong Kong), search results not filtered there
 Google establishes “evil meter” to monitor traffic
  restrictions around the world
                                     Attack of the Show video
Google’s Library of the Future
 Google makes deals with multiple libraries
    Google digitizes books for indexing on Google
    Libraries get free access to full text versions of digitized
     books plus money
 In 2005, The Author’s Guild files a class action suit
  against Google in defense of copyrights
 Nov 2008 settlement gives authors and publishers
  royalties on sales of digitized books in exchange for
  granting Google legal immunity from copyright
  infringement
EU vs. Google
 European Union opposes Google policies of retaining
  user information; wants it to follow EU privacy
  policies
 Google agrees to anonymize data after 18 months; EU
  not satisfied with this response
 Bibliotheque Nationale de France begins project
  called Gallica 2 Project to digitize books of 50
  European publishers; authors support this effort
 Dec 2010: Google opens an e-bookstore, potential rival
  to Amazon
Cyberwarfare
 Wikipedia entry
 2008: Russian and Georgian sites attacked during the
  war in South Ossetia
 2008: Defense Department reports espionage-
  oriented attack in the form of a USB flash drive
 2009: cyber spy network called GhostNet, using
  servers in China, taps into classified documents about
  Tibet in 103 countries
 2010: US government uses Stuxnet worm to attack
  nuclear enrichment facility in Natanz, Iran
Structural Power
 Definition: the ability to control outcomes that
  derives from the ability to shape the rules of the
  system.
 Example: the ability of the RIAA and MPAA to get the
  copyright laws they want.
 Example: the ability of the US government to veto
  decisions by ICANN
        Example of attempt to alter structural power of
        copyright holders via the Creative Commons
New Forms of Structural Power: Architectural
and Algorithmic Power
 Who determines ICT architectures?
   PC platform
   iPod/iTunes
   3G and 4G smart phones
 Who controls central algorithms?
   Google search engine
Meta Power
 Who is able to frame the issues in a way that permits
  people and organizations to redefine their interests
  and preferences?
 How does this reframing occur?
 Consider the cases of net neutrality and SOPA/PIPA
 How important were ICTs in enabling the Arab
  Spring?
Lessons: Impact of Diffusion of ICTs
 Easier to organize and mobilize people who are separated
    by great distances
   Internet users feel more empowered; seem to be more
    active in politics
   Greater concern over the monopolization of control over
    channels for the diffusion of digitized content and power
    of large companies like Google
   Google and open source software may be undermining the
    power of other companies and institutions; in some cases
    this empowers individuals and small groups but not
    always
   An important counterexample in the decline of print

Mais conteúdo relacionado

Mais procurados

Sampsung Xiaoxiang Shi_Can copyright maintain wider access simplified
Sampsung Xiaoxiang Shi_Can copyright maintain wider access  simplifiedSampsung Xiaoxiang Shi_Can copyright maintain wider access  simplified
Sampsung Xiaoxiang Shi_Can copyright maintain wider access simplifiedCCI
 
LECTURE 4 - Cyberculture
LECTURE 4 - CybercultureLECTURE 4 - Cyberculture
LECTURE 4 - CybercultureKim Flintoff
 
Canadian Copyright Reform in Context
Canadian Copyright Reform in ContextCanadian Copyright Reform in Context
Canadian Copyright Reform in Contextmgeist
 
The Future of the Internet 2.0
The Future of the Internet 2.0The Future of the Internet 2.0
The Future of the Internet 2.0sagecast
 
Copying And Copyright
Copying And CopyrightCopying And Copyright
Copying And Copyrightctracey
 
LECTURE 6 - Cyberculture
LECTURE 6 - CybercultureLECTURE 6 - Cyberculture
LECTURE 6 - CybercultureKim Flintoff
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - CybercultureKim Flintoff
 
Piracy, Policy, Participation
Piracy, Policy, ParticipationPiracy, Policy, Participation
Piracy, Policy, ParticipationRob Jewitt
 
Censorship & regulation ocr
Censorship & regulation ocrCensorship & regulation ocr
Censorship & regulation ocrpetefraser
 
Section b contemporary media regulation press film case studies
Section b contemporary media regulation press film case studiesSection b contemporary media regulation press film case studies
Section b contemporary media regulation press film case studiesDB3igs
 
Regulation previous practices
Regulation previous practicesRegulation previous practices
Regulation previous practicesctkmedia
 
Web 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and OpportunitiesWeb 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and Opportunitiesmorganjbruce
 
Essay 3 annotated bibliography rough draft 18 july 2012
Essay 3 annotated bibliography rough draft 18 july 2012Essay 3 annotated bibliography rough draft 18 july 2012
Essay 3 annotated bibliography rough draft 18 july 2012rclambert
 
DEA: the dangerous downloaders act
DEA: the dangerous downloaders actDEA: the dangerous downloaders act
DEA: the dangerous downloaders actrcorrigan
 
The Next Great Copyright Act and the Future of Radio 14 J. Marsh
The Next Great Copyright Act and the Future of Radio 14 J. MarshThe Next Great Copyright Act and the Future of Radio 14 J. Marsh
The Next Great Copyright Act and the Future of Radio 14 J. MarshMaesea McCalpin
 
ICT: Key to a Pandora’s Box?
ICT: Key to a Pandora’s Box?ICT: Key to a Pandora’s Box?
ICT: Key to a Pandora’s Box?Eldis
 

Mais procurados (20)

Sampsung Xiaoxiang Shi_Can copyright maintain wider access simplified
Sampsung Xiaoxiang Shi_Can copyright maintain wider access  simplifiedSampsung Xiaoxiang Shi_Can copyright maintain wider access  simplified
Sampsung Xiaoxiang Shi_Can copyright maintain wider access simplified
 
LECTURE 4 - Cyberculture
LECTURE 4 - CybercultureLECTURE 4 - Cyberculture
LECTURE 4 - Cyberculture
 
Canadian Copyright Reform in Context
Canadian Copyright Reform in ContextCanadian Copyright Reform in Context
Canadian Copyright Reform in Context
 
The Future of the Internet 2.0
The Future of the Internet 2.0The Future of the Internet 2.0
The Future of the Internet 2.0
 
Copying And Copyright
Copying And CopyrightCopying And Copyright
Copying And Copyright
 
LECTURE 6 - Cyberculture
LECTURE 6 - CybercultureLECTURE 6 - Cyberculture
LECTURE 6 - Cyberculture
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - Cyberculture
 
Net Neutrality and The FCC
Net Neutrality and The FCCNet Neutrality and The FCC
Net Neutrality and The FCC
 
Web 2.0 Update
Web 2.0 UpdateWeb 2.0 Update
Web 2.0 Update
 
Piracy, Policy, Participation
Piracy, Policy, ParticipationPiracy, Policy, Participation
Piracy, Policy, Participation
 
Net neutrality, tim dempsey
Net neutrality, tim dempseyNet neutrality, tim dempsey
Net neutrality, tim dempsey
 
Censorship & regulation ocr
Censorship & regulation ocrCensorship & regulation ocr
Censorship & regulation ocr
 
Section b contemporary media regulation press film case studies
Section b contemporary media regulation press film case studiesSection b contemporary media regulation press film case studies
Section b contemporary media regulation press film case studies
 
Regulation previous practices
Regulation previous practicesRegulation previous practices
Regulation previous practices
 
Web 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and OpportunitiesWeb 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and Opportunities
 
Essay 3 annotated bibliography rough draft 18 july 2012
Essay 3 annotated bibliography rough draft 18 july 2012Essay 3 annotated bibliography rough draft 18 july 2012
Essay 3 annotated bibliography rough draft 18 july 2012
 
DEA: the dangerous downloaders act
DEA: the dangerous downloaders actDEA: the dangerous downloaders act
DEA: the dangerous downloaders act
 
Polinter02
Polinter02Polinter02
Polinter02
 
The Next Great Copyright Act and the Future of Radio 14 J. Marsh
The Next Great Copyright Act and the Future of Radio 14 J. MarshThe Next Great Copyright Act and the Future of Radio 14 J. Marsh
The Next Great Copyright Act and the Future of Radio 14 J. Marsh
 
ICT: Key to a Pandora’s Box?
ICT: Key to a Pandora’s Box?ICT: Key to a Pandora’s Box?
ICT: Key to a Pandora’s Box?
 

Destaque (7)

Ipe15
Ipe15Ipe15
Ipe15
 
Ipe19
Ipe19Ipe19
Ipe19
 
Polinter12
Polinter12Polinter12
Polinter12
 
Ipe03
Ipe03Ipe03
Ipe03
 
Ipe17
Ipe17Ipe17
Ipe17
 
Ipe13
Ipe13Ipe13
Ipe13
 
Ipe14
Ipe14Ipe14
Ipe14
 

Semelhante a Polinter12

Web 20 For Government Grow Call Latest Final
Web 20 For Government Grow Call Latest FinalWeb 20 For Government Grow Call Latest Final
Web 20 For Government Grow Call Latest FinalNick Davis
 
Copyright In A New Light Presentation
Copyright In A New Light PresentationCopyright In A New Light Presentation
Copyright In A New Light Presentationtoc
 
Social Governance: Social Media & Public Authorities
Social Governance: Social Media & Public AuthoritiesSocial Governance: Social Media & Public Authorities
Social Governance: Social Media & Public AuthoritiesMathias Klang
 
Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI WorkshopChris Marsden
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
Why and how is the power of big teach increasing?
Why and how is the power of big teach increasing?Why and how is the power of big teach increasing?
Why and how is the power of big teach increasing?Araz Taeihagh
 
Education technology and future implications
Education technology and future implicationsEducation technology and future implications
Education technology and future implicationsTamara Mitchell
 
FUTURE OF COMPUTER ETHICSComputers and the transformations.docx
FUTURE OF COMPUTER ETHICSComputers and the transformations.docxFUTURE OF COMPUTER ETHICSComputers and the transformations.docx
FUTURE OF COMPUTER ETHICSComputers and the transformations.docxbudbarber38650
 
Energing Technology and the Creative Economy
Energing Technology and the Creative EconomyEnerging Technology and the Creative Economy
Energing Technology and the Creative EconomyJerome Glenn
 
Emerging Institutional Paradigms for the Digital Commons
Emerging Institutional Paradigms for the  Digital CommonsEmerging Institutional Paradigms for the  Digital Commons
Emerging Institutional Paradigms for the Digital CommonsBob Chao
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
Is Google Evil 3.0
Is Google Evil 3.0Is Google Evil 3.0
Is Google Evil 3.0Joe Buzzanga
 
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docxTECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docxjacqueliner9
 

Semelhante a Polinter12 (20)

Polinter13
Polinter13Polinter13
Polinter13
 
Polinter13
Polinter13Polinter13
Polinter13
 
Web 20 For Government Grow Call Latest Final
Web 20 For Government Grow Call Latest FinalWeb 20 For Government Grow Call Latest Final
Web 20 For Government Grow Call Latest Final
 
Copyright In A New Light Presentation
Copyright In A New Light PresentationCopyright In A New Light Presentation
Copyright In A New Light Presentation
 
Social Governance: Social Media & Public Authorities
Social Governance: Social Media & Public AuthoritiesSocial Governance: Social Media & Public Authorities
Social Governance: Social Media & Public Authorities
 
Techinnovation
TechinnovationTechinnovation
Techinnovation
 
Social Technology
Social TechnologySocial Technology
Social Technology
 
Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI Workshop
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Why and how is the power of big teach increasing?
Why and how is the power of big teach increasing?Why and how is the power of big teach increasing?
Why and how is the power of big teach increasing?
 
Education technology and future implications
Education technology and future implicationsEducation technology and future implications
Education technology and future implications
 
FUTURE OF COMPUTER ETHICSComputers and the transformations.docx
FUTURE OF COMPUTER ETHICSComputers and the transformations.docxFUTURE OF COMPUTER ETHICSComputers and the transformations.docx
FUTURE OF COMPUTER ETHICSComputers and the transformations.docx
 
It between magic and fashion
It   between magic and fashionIt   between magic and fashion
It between magic and fashion
 
Energing Technology and the Creative Economy
Energing Technology and the Creative EconomyEnerging Technology and the Creative Economy
Energing Technology and the Creative Economy
 
Emerging Institutional Paradigms for the Digital Commons
Emerging Institutional Paradigms for the  Digital CommonsEmerging Institutional Paradigms for the  Digital Commons
Emerging Institutional Paradigms for the Digital Commons
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Is Google Evil 3.0
Is Google Evil 3.0Is Google Evil 3.0
Is Google Evil 3.0
 
Fight against P2P
Fight against P2PFight against P2P
Fight against P2P
 
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docxTECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
TECHNICAL OLIGARCHIES1Technical Oligarchies in.docx
 
Theorist fact files
Theorist fact filesTheorist fact files
Theorist fact files
 

Mais de Jeffrey Hart

Mais de Jeffrey Hart (18)

Berkeley Internet.pptx
Berkeley Internet.pptxBerkeley Internet.pptx
Berkeley Internet.pptx
 
Essays on the History and Politics of the.pptx
Essays on the History and  Politics of the.pptxEssays on the History and  Politics of the.pptx
Essays on the History and Politics of the.pptx
 
Right-Wing Populism in Europe and the United States
Right-Wing Populism in Europe and the United StatesRight-Wing Populism in Europe and the United States
Right-Wing Populism in Europe and the United States
 
The European Union: Challenges and Opportunities
The European Union: Challenges and OpportunitiesThe European Union: Challenges and Opportunities
The European Union: Challenges and Opportunities
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
 
Politics of competitiveness
Politics of competitivenessPolitics of competitiveness
Politics of competitiveness
 
Ipe21
Ipe21Ipe21
Ipe21
 
Ipe20
Ipe20Ipe20
Ipe20
 
Ipe18
Ipe18Ipe18
Ipe18
 
Isa12b
Isa12bIsa12b
Isa12b
 
Polinter09
Polinter09Polinter09
Polinter09
 
Polinter08
Polinter08Polinter08
Polinter08
 
Polinter07
Polinter07Polinter07
Polinter07
 
Ipe12
Ipe12Ipe12
Ipe12
 
Ipe11
Ipe11Ipe11
Ipe11
 
Polinter06
Polinter06Polinter06
Polinter06
 
Polinter05
Polinter05Polinter05
Polinter05
 
Ipe10
Ipe10Ipe10
Ipe10
 

Último

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Último (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

Polinter12

  • 2. Three Guiding Questions  To what extent does the Internet media sector mimic the long-established patters of concentrated ownership in the broader print and broadcast media?  To what extent has it altered the processes shaping a central area of media content: news production and distribution?  What has been the effect of the phenomenon of file sharing, the rise of open-source software, and other intellectual property disputes? Chadwick, chap. 12, p. 289.
  • 3. Key Scholarly Works on Media Concentration  Ben Bagdikian, The Media Monopoly (6th edn. 2000)  Eli Noam, Media Ownership and Concentration in America (2009)  Robert McChesney, Rich Media, Poor Democracy (2000)  Robert McChesney, The Political Economy of Media (2008)
  • 5. The Big Seven  General Electric  Walt Disney  News Corporation  TimeWarner  Viacom  CBS  Bertelsmann
  • 7. Film Studio Market Share, 2009
  • 9. Key questions  How does the diffusion of ICTS affect the distribution of power?  Does it empower individuals and small groups or does it privilege large organizations and institutions?  Does it undermine existing hierarchies?
  • 10. Definitions of Power  Capabilities-based power  Relational power  Structural power  Metapower
  • 11. Definitions of Power  Robert Dahl and Jack Nagel (relational power)  Bachrach and Baratz (non-decisions)  Steven Lukes (interests instead of preferences)  Susan Strange and Steven Lukes(structural power)  Joseph S. Nye (soft power) “A Position of Power” video
  • 12. ICTs and Firm Capabilities: Power Transitions among Big Firms  IBM  Microsoft/Intel  Google  Facebook  Twitter  What’s next?
  • 13. What is Google?  Founded 1998 by Larry Page and Sergey Brin.  IPO 2004 ($23 billion)  World’s most popular search engine.  World’s most popular web site.  Built on PageRank technology. ASU students video on Google
  • 14. Google Executives  Larry Page  Eric Schmidt  Sergei Brin TED video Ken Auletta talking about his book, Googled
  • 15. ICTs and national capabilities  US is ahead in movies, music, software and web-based businesses  Taiwan and China are ahead in PCs  Korea is ahead in broadband, but also in flat panel displays (with Taiwan)  China is coming up but is not in the top tier yet
  • 16. Relational power  Definition: A has power over B if A can get B to act against his/her preferences but according to A’s preferences.  Relational power can be coercive or non-coercive.  If A can persuade B to change his/her preferences to be more like A’s, then A has influenced B without using coercion.
  • 17. ICTs and Relational Power  Google vs. China  Google vs. print publishers/authors  Google vs. EU on digitized libraries  RIAA and MPAA vs. average consumer of digital music and video  Cyberdiplomacy  Cyber warfare
  • 18. Google vs. China  Jan 27, 2006 Google launches Google.cn  Chinese government forces Google.cn to censor certain Internet searches (Dalai Lama, Falun Gong)  Chinese government hacks into Gmail accounts of Chinese human rights activists  Google redirects Google.cn searches to Google.hk (Hong Kong), search results not filtered there  Google establishes “evil meter” to monitor traffic restrictions around the world Attack of the Show video
  • 19. Google’s Library of the Future  Google makes deals with multiple libraries  Google digitizes books for indexing on Google  Libraries get free access to full text versions of digitized books plus money  In 2005, The Author’s Guild files a class action suit against Google in defense of copyrights  Nov 2008 settlement gives authors and publishers royalties on sales of digitized books in exchange for granting Google legal immunity from copyright infringement
  • 20. EU vs. Google  European Union opposes Google policies of retaining user information; wants it to follow EU privacy policies  Google agrees to anonymize data after 18 months; EU not satisfied with this response  Bibliotheque Nationale de France begins project called Gallica 2 Project to digitize books of 50 European publishers; authors support this effort  Dec 2010: Google opens an e-bookstore, potential rival to Amazon
  • 21. Cyberwarfare  Wikipedia entry  2008: Russian and Georgian sites attacked during the war in South Ossetia  2008: Defense Department reports espionage- oriented attack in the form of a USB flash drive  2009: cyber spy network called GhostNet, using servers in China, taps into classified documents about Tibet in 103 countries  2010: US government uses Stuxnet worm to attack nuclear enrichment facility in Natanz, Iran
  • 22. Structural Power  Definition: the ability to control outcomes that derives from the ability to shape the rules of the system.  Example: the ability of the RIAA and MPAA to get the copyright laws they want.  Example: the ability of the US government to veto decisions by ICANN Example of attempt to alter structural power of copyright holders via the Creative Commons
  • 23. New Forms of Structural Power: Architectural and Algorithmic Power  Who determines ICT architectures?  PC platform  iPod/iTunes  3G and 4G smart phones  Who controls central algorithms?  Google search engine
  • 24. Meta Power  Who is able to frame the issues in a way that permits people and organizations to redefine their interests and preferences?  How does this reframing occur?  Consider the cases of net neutrality and SOPA/PIPA  How important were ICTs in enabling the Arab Spring?
  • 25. Lessons: Impact of Diffusion of ICTs  Easier to organize and mobilize people who are separated by great distances  Internet users feel more empowered; seem to be more active in politics  Greater concern over the monopolization of control over channels for the diffusion of digitized content and power of large companies like Google  Google and open source software may be undermining the power of other companies and institutions; in some cases this empowers individuals and small groups but not always  An important counterexample in the decline of print