Verified Document

Media Theory Essay

Related Topics:

Introduction

Cyberterrorism, illegal (and legal) espionage, piracy, and cybercrimes differ from their pre-digital counterparts in serious and meaningful ways. For one, the nature of online social interactions diverges from that of face-to-face or even voice-only interactions due to the shields of anonymity. Second, technological prophylactics ranging from encryption to skillful network architecture can add multiple levels of protection to shield perpetrators while exposing the weaknesses in a less advanced consumer public. Third, the rapid advancement of artificially intelligent systems creates new possible realities and problems, as non-human actors become part of increasingly complex systems. Finally, digital media has enabled formal and informal surveillance and other forms of illicit behavior, transforming the relationship between actors and objects in ways that could alter political and social realities. Actor-network theory is an ideal lens and process by which to better understand the complex gamut of cybercrime. Developed initially in the 1980s and solidified in the 1990s, actor-network theory views technology within a social science framework. With actor-network theory, technology and media are both viewed as extensions of social and cultural realities, which is why the theory can potentially offer solutions to the problems of cybercrime.

Theoretical Framework



Actor-network theory is an ideal framework for studying the causes, mechanisms, and ramifications of cybercrime, as well as offering potential solutions. The theory is “versatile and well-suited for dealing with the complex interplay of human-technological digital relationships,” (Lippicini, 2014, p. 38). Lin & Lippicini (2011) also point out that actor-network theory can be applied to small and closed networks as well as large and open ones. Perhaps most importantly, actor-network theory has the capacity to deal with the problematic issues related to artificial intelligence and the relationships between humans and non-human actors that frequently characterize cybercrimes and responses to cybercrime. Another reason why actor-network theory is an ideal framework for understanding cybercrime is its systemic approach, as the theory sheds light on the inextricable connections between various social structures, institutions, individuals, and identities. Moreover,...
According to the premises of actor-network theory, all entities within any given network acquire power in several core but relatively stable ways: particularly through the “number, extensiveness, and stability of the connections routed through them, and through nothing else,” (Couldry, 2004, p. 1). Actor-network theory does not become boggled down by semiotics, and can offer instead pragmatic and practical solutions to problems like cybercrime. For instance, many of the most serious cybercrimes occur trans-nationally, and actor-network theory aids the development of cogent solutions to cyberterrorism, hacking, espionage, and other international events.

Review of Literature



A review of literature demonstrates how actor-network theory has already been applied to cybercrime and cybercriminality. Muller (2015) fuses the concept of assemblage and actor-network theory to provide a new approach to international relations that recognizes the centrality of digital networks. Digital networks, like all other social networks, possess an organic nature. When non-human entities are introduced, including artificially intelligent systems, the complexity of networks can complicate solutions to cybercrimes. Although actor-network theory “risks describing endless chains of associations without ever arriving at an explanation,” the theory does not oversimplify the issues related to cybercrime and cyberterrorism (Muller, 2015, p. 30). Muller’s (2015) analysis of actor-network theory as it applies to international relations and politics underscores the relevance of the theory as it applies to trans-national cybercrimes.

Lin & Lippicini (2014) apply actor-network theory directly to cybercrimes related to espionage. The authors note the fundamental ethical conundrums of cyberspace involve four main areas of concern: privacy, accuracy, property, and access (Lin & Lippicini, 2014). Using a case study of GhostNet, the authors show how an espionage enterprise violates ethical terms of privacy and access. Privacy is a presumed right in a democracy, whereas access refers more overtly to social structures and power negotiations. Access is a much-debated subject in the social science of technology; access to…

Cite this Document:
Copy Bibliography Citation

Related Documents

Media Theories Persuasion
Words: 692 Length: 2 Document Type: Essay

Media Persuasion Compare and contrast the media theories presented in the chapter. Using your experience with media, discuss the degree to which each explains your relationship with media. Theorists such as Walter Ong focus on the importance of the medium through which persuasive and other types of communications are conveyed. The electronic media conveys a sense of intimacy. It is possible to follow a politician on Twitter, as well as listen to

Media Audiences
Words: 1397 Length: 5 Document Type: Essay

Media Audiences Marxist media theorists discuss the media in terms of their role as 'ideological apparatuses'. Explain the key notions behind this research, paying particular attention to the concept of hegemony and the media's role within it. What is 'hegemony', and why is it important to audience studies? Marxist theorists emphasizes on the role of mass media in reproduction of status quo, however there is no school of thought regarding his theories.

Media Consumption
Words: 1208 Length: 4 Document Type: Essay

Media In a one day diary of media consumption, it becomes evident that many of my interactions with the world are via media. I receive most of my information through media forms as well. Even when relaxing, media is something that drives the process. There is also a lot of passive consumption of media in my daily life. My media consumption will be analyzed through the lens of different media theories. Turow Turow

Media Archaeology and Video Games
Words: 3097 Length: 12 Document Type: Essay

Media Archaelogy and Videogames In today's world, the rapid development of technology has opened worlds of vast information and entertainment that are instantly accessible at the touch of a button. The relationships created in this way not only involve those we interact with online or via gaming, but also our own perception, the mental imagery we create and the apparatus we use to access these. A researcher who truly wants to

Media Artifact in American Culture Twitter: An
Words: 2998 Length: 9 Document Type: Essay

Media Artifact in American Culture Twitter: An Arising Media Artifact in American Culture In the course of an average year in viewing mainstream American culture, an innumerable amount of fads come and go, gaining their respective fifteen minutes of fame on the stage that is set by the American media industry. After spending what is often a brief time in the spotlight, these media trends tend to fade out nearly as abruptly

Media Culture My Opinion of
Words: 871 Length: 3 Document Type: Essay

Another way that media literacy messages are suppressed is by having them changed. When this happens, the message is not received as intended. The recipient of the message does not learn as much about media literacy as he or she should. This disrupts the ability of the recipient to understand and be critical of the media to which he or she is exposed. Beyond the cognitive dispositions, there is emotional disruption

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now