Lecture 15: Ubiquitous Media – Ontological and Epistemological impact of new media on the digital world

Presentation of Tinder- a slice of Tinder from 2017:

  • The different visual materials, people employ in the development
  • She broke down her presentation in images and text,
  • In images she looked at the simple concept of angles in pertaining to photo development
  • And the different angles in ways in which men and women to

Examples for are own projects:

  • Having a slice of YouTube, Instagram, Facebook, twitter from 2017 examples for final paper

Student Presentations:

Ubiquitous Media – Ontological and Epistemological impact of new media on the digital world

Key term:

  • Ubiquitous:
  • Ontology: the nature of being
  • RFID’s: it scans all information, to make recommendation based off of your interest,
  • Epistemological: “theory of knowledge, especially with regard to its method, validity, and scope”

Author of this theory:

  • Mike Featherstone
    • Sociological professor at the University of London
    • Organized the ubiquitous media conference in Tokyo (2005)

Ontological Impact:

  • Media exists as a medium between sender and receiver
  • The ways in which new social technologies impact
    • The way we vote is one of the ways in which this theory has impacted digital communication
    • The things we buy, advertisements, are a huge impact of media
    • The way we date, the stigma that was once around the topic of online dating has been abolished throughout the development of social technologies
    • Were we work online media sites provide 1000 of individuals with jobs
    • The way we protect ourselves:
      • RFID’s:
      • “new ontological dimension which challenges out conventional ideas about information” – Featherstone (pg.4)

Epistemological impact:

  • Philosophy have been trying to theorize media since Aristotle

Discussion Questions:

  • Do you believe the new RFID technology is primarily for our benefit or just another “in” for surveillance and data mining by government and large cooperation’s:
    • Student responses:
      • If the implementation of RFID’s was socially beneficial for the individual then the public would have been made more aware of its development and rise amidst society
      • This could be beneficial for the individual had the product been developed for the use


Negotiating Privacy:

Main concerns and topics:

  • Legal, platform-specific,


  • Context
  • Privacy
  • Networked privacy

Legal Frameworks:

  • The text mentions two: right to privacy and personally identifiable information

The Individual – Constructing Privacy:

  • The text mention the following methods to privacy management:
    • Deactivating accounts
    • Encoding messages
    • Groups as a means of selecting who sees certain statuses or not
    • Password sharing – shared space
    • Being open to sharing experiences
    • But these methods are not new, not applicable to social media

Social Learning theory:

  • Loosely explained, STL says we learn vicariously through others and don’t need to experience everything first hand. This is how we learn social norms

Applying SLT to social media use re: privacy

  • Based on immediate and secondary social spheres:
    • Decide which information is necessary and acceptable to share
    • Recognizing use and misuse beyond users control (big data, algorithms for marketing, sales of information)
    • Social impact of certain information (emotional affect.. Ext,.  

Lets Discuss:

  • Are there concept of information sharing and information omission equally important, or is one more important than the other? Why?
    • People believe that information sharing is
    • Information omission is far more important because this let people know what you are and are not okay with people knowing about you at all,
      • Just like the text states the best way to maintain privacy is to not partake in sharing

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s