Professional Documents
Culture Documents
GEC3
LIVING IN THE I.T. ERA
D IS C LAIME R
approach, espoused by CHED in response to the pandemic that has globally affected
educational institutions. Authors and publishers of the contents are well acknowledged. Such
as, the college and its faculty do not claim ownership of all sourced information. This learning
material is solely for instructional purposes and not for commercialization. Moreover, copying
and/or sharing part/s if this learning material in all forms (such as, but not limited to social
LEARNING OUTCOMES
1. Differentiate the utopian and dystopian views of the internet;
2. Determine the rate of progress of acceleration in media and information;
3. Define the causes and effects of internet addiction and isolation; and
4. Distinguish the impact of selective exposure on political polarization.
KEY TERMS
1. Utopia
2. Dystopia
3. Internet invariants
4. Media messages
5. Internet addiction
6. Selective exposure
7. Political polarization
L E S S O N 1 : UT O PI A AN D D YS T O PI AN V I E W S OF T HE I NT E RNE T
A dystopia is an imagined universe in which oppressive societal control or an apocalypse has created
a world in which the conditions of life are miserable, characterized by human misery, poverty,
oppression, violence, disease, and/or pollution. Anti-utopias appear to be utopian or were intended to
be so, but a fatal flaw or other factor has destroyed or twisted the intended utopian world or concept,
such as in The Giver. Dystopias and anti-utopias are maintained through corporate, bureaucratic,
technological, moral, or totalitarian control. Through an exaggerated worst-case scenario, authors make
a criticism about a current trend, societal norm, or political system through their dystopias / anti-utopias.
In order to fully understand the effects of the Internet on society, we should remember that technology
is material culture. It is produced in a social process in a given institutional environment on the basis
of the ideas, values, interests, and knowledge of their producers, both their early producers and their
subsequent producers. In this process we must include the users of the technology, who appropriate
and adapt the technology rather than adopting it, and by so doing they modify it and produce it in an
endless process of interaction between technological production and social use.
Conversely, the impact of the Internet on society has also transformed how we use the Internet. It is no
longer just the home of email, static webpages, and discussion boards. Today’s Internet is so much
more. It’s a dynamic space for collaboration, commerce, and expression. Video currently accounts for
more than two-thirds of all Internet traffic, and people accessing the Internet via smartphones now
dominate.
In spite of all this dynamism, certain properties of the Internet persist. These properties, which we call
“invariants,” have been the foundation for the Internet since its earliest days. At the same time, it’s
because of these invariants that the Internet has become such a dynamic resource. These
characteristics are at the heart of the Internet’s success – they have enabled the Internet to serve as a
platform for seemingly limitless innovation, economic growth and opportunities for people everywhere.
Before detailing what we mean by Internet invariants, it is important to clarify that these fundamental,
unchanging properties of the Internet are aspirational or ideal conditions. As the Internet moves away
from these ideal conditions, we believe the dynamism and innovation that the Internet supports will
necessarily diminish. You can think of the Internet as an idea of how networks of computers
communicate, and the invariants describe the most important features of that idea. This concept of
the Internet as an idea is operationalized through some familiar protocols (e.g., Internet Protocol,
Border Gateway Protocol) and functions (e.g., the Internet Assigned Numbers Authority).
A network that does not have these fundamental properties is not the Internet.
The Internet has global reach and integrity, and is not constrained in terms of supported services and
applications:
8. Global reach, integrity: Any endpoint of the Internet can address any other endpoint, and the
information received at one endpoint is as intended by the sender, wherever the receiver
connects to the Internet. Implicit in this is the requirement for globally-unique addressing and
naming services.
9. General purpose: The Internet is capable of supporting a wide range of demands for its use.
While some networks within it may be optimized for certain traffic patterns or expected uses,
the technology does not place inherent limitations on the applications or services that make use
of it. The Internet supports more than the World Wide Web and email.
The Internet is for everyone – there is no central authority that designates or permits different
classes of Internet activities.
10. Supports innovation without requiring permission: Anyone can create a new service, that
abides by the existing standards and best practices, and make it available to the rest of the
Internet, without requiring special permission. This “permissionless innovation” is crucial to the
Internet’s success — it removes the barriers to entry. From the World W ide Web to social
networking, from BitTorrent to Bitcoins, many of the applications that billions of Internet users
enjoy every day, and the many that will be developed in the future, are a product of this
fundamental characteristic.
11. Accessible: There are no inherent limitations on who can access, build, and study the Internet.
Anyone can connect to the Internet, not just to consume content from others, but also to
contribute content on existing services, create new services, and attach entirely new networks.
The Internet requires some basic agreements and social behaviour between technologies and
between humans
12. Based on interoperability and mutual agreement: The Internet is a network of autonomous
networks. It works because those networks can communicate with each other, based on
voluntary adoption of the open standards for the technologies that support it, and through the
mutual agreements made between network operators.
13. Collaboration: Overall, a spirit of collaboration is required. Beyond the initial basis for
interoperability (open standards and mutual agreements), the best solutions to new issues that
arise stem from willing collaboration between stakeholders. These are sometimes competitive
business interests and sometimes different stakeholders altogether. Addressing new issues in
a collaborative fashion ensures a diversity of views and reduces the risk of unilateral actions
having unintended negative consequences for the Internet and its users.
Although no specific technology defines the Internet, there are some basic characteristics that
describe what works
14. Technology, reusable building blocks: The Internet is comprised of numerous technologies
that together create the Internet as we know it today; however, each individual technology, or
building block, may be used for unintended purposes. For example, the Domain Name System
(DNS) was developed to provide a distributed name-to-address mapping service, but is now
also used to share keying material for securing online transactions. Operational restrictions on
the generalized functionality of technologies as originally designed have a negative impact on
their viability as building blocks for future solutions.
And, finally, the more the Internet stays the same, the more it changes:
15. No permanent favourites: The Internet has no permanent favourites. In the 1990s, Netscape
and Mosaic were among the most popular web browsers on the Internet. And before the Web
itself there was Gopher. Before Facebook and Twitter, MySpace was the dominant social
network. Today, more people access the Internet with a mobile device than from a desktop
computer. Continued success depends on continued relevance and utility, not strictly some
favoured status. Good ideas are overtaken by better ideas and this is part of the natural
evolution of the Internet.
1) that the utopian ideology always rose when new technologies like telephones and airplanes
were invented, believing that they would bring “universal wealth, enhanced freedom, revitalized
politics, satisfying community, and personal fulfillment.” (p. 2) and;
2) that the “techno-utopianism’ (p.2) is self-serving to a new virtual class.
Therefore, the technological progress has created the utopianist ideology of how it can help to manage
or order structural and cultural problems of the high-tech world, but it has also created a new
transnational class that supports their position in society.
The changing image of the Hackers from being hippies to doing actual useful work in the digital world
reflects how the importance of utopianism has increased after established for the first time in the 90s,
in the form of conferences.
Additionally, after interviewing a large share of respondents at Pew Research Centre: Internet and
Technology, experts share their educated prediction on the potential impact of the internet for the next
50 years. Here are some of their collated positive ideologies of the future of the internet:
1. Entering the era of complex automation, will revolutionize the world in certain areas such that:
• In transportation, self-driving vehicles would become prevalent, making transportation
of goods and people would become more global, faster and with less energy, and would
massively reduce needed vehicles;
• In industries, automated mining and manufacturing will further reduce the need for
human workers to engage in routinary work;
• In communication, machine language translation will finally close the language barrier,
while digital tutors, teachers and personal assistants with human qualities will make
everything from learning new subjects to booking salon appointments faster and
easier.
• In business, automated secretaries, salespeople, waiters, waitress, baristas and
customer support personnel will lead to cost savings, efficiency gains and improved
customer experiences.
• In entertainment, immersive Artificial Intelligence (AI) experiences will come to
supplement traditional passive forms of media making media far more interactive;
• In energy and healthcare, improvement will be inevitable as more powerful AI tools will
take systems-level view of operations and locate opportunities to gain efficiencies in
design and operation;
• In warfare, AI-driven robotics (e.g. drones) would be a thing and;
• In research, AI will contribute immensely to basic research likely begin to create
scientific discoveries of its own.
2. On an individual basis, we will think about our digital assets as much as our physical ones .
There will be greater integration of technology with our physical selves.
3. On a societal level, AI will have affected many jobs. Not only the truck drivers and the factory
workers, but professions that have been largely impossibly irreplaceable with human
intervention – law, medicine – will have gone through a painful transformation.
4. Ideally, we will have more transparent control over our data, and the ability to understand where
it resides and exchange it for value.
5. Some children born today are named with search engine-optimization in mind.
6. Governments will have a higher level of regulation and protection of individual data.
8. A technological shift would have transpired from personal and mobile computing to ambient (in
surrounding area) computing.
The theory of cultural lag specifies that societies as a whole do not universally change in response to
introductions of new technology. Ogburn points out that there are four stages to a cultural lag:
technological, industrial, governmentmental, and social philosophical (1964, p. 134). With the
introduction of a new technology, different sectors of society accept and adopt it at different speeds.
The theory states that industry is the first sector to adjust to and acquire the technology.
As digital and ‘smart’ technology disrupts and transforms our lives at an ever-increasing speed, breadth,
and depth, the ‘culture lag’ widens and manifests along many aspects of our daily lives – and most often
without us noticing it consciously, unless we know what to look for.
Hackers could access critical infrastructure such as power grids, hydroelectric dams, chemical plants
and more. SmartHome devices could allow manufacturers or hackers to use connected devices to
virtually or physically invade a person’s home.
85% of companies intend to offer IoT devices, yet only 10% of the aforementioned companies are
confident that they could offer devices secure from hackers.
Securing an IoT device means more than securing the actual device — companies would have to build
security into linked software applications and network connections as well.
Companies could also use legally collected data from consumers to make employment decisions. You
might agree to the use of cookies, but do you really know what these companies can see? A company
could gather information from you about driving habits while calculating your insurance rate — the same
goes for tracking fitness when it comes to health or life insurance.