Monday, November 30, 2020

Post 11: Theories (Presentations #2)

Gatekeeping Theory

Gatekeeping theory, conceptualized by Kurt Lewin in 1943, describes the process in which unnecessary information is blocked and filtered through the use of a metaphorical "gate." Those who act as  "gatekeepers" decide as to what information should and should not be publicized. One example of a gatekeeper is a news editor. Those who act as news editors are tasked with figuring out what news is relevant enough to be published. Each day, several note-worthy events occur, however, it is impossible for all of them to be covered. Therefore, gatekeeping plays a vital role in media. Gatekeeping is different than censorship, in that it has to do with maintaining relevant information. Censorship, on the other hand, deliberately removes unwanted information.

Factors of Gatekeeping

According to Shoemaker and Vos, there are five main factors to gatekeeping: 

(1)  Individual: The "force" at the gate, they have the most influence over what is being released. This includes the journalist who makes the report. 

(2) Routine: The themes shown in the media are always in a pattern. News sources typically have schedules for when subjects within a certain category should be publicized. 

(3) Organization: Media organizations have their own narratives they want to portray, all of them have their own views, opinions, and biases. The organizations hire the journalists (the gatekeepers) and make the rules. 

(4) Extra-Media: Many media outlets are governed by related people/institutions who have a say in what is published (i.e. sponsors, advertisers, government, etc). Financial supporters highly influence media companies, therefore, negative news will not intentionally pass through the gate.

(5) Ideology: The media must follow societal ideologies to maintain relevancy.  Ideologies change over time, so it is important that the media respects social norms.



Model of Gate Keeping Theory
















Monday, November 16, 2020

Post 10: Social Media Influencers (EOTO)

EOTO: Influencer Marketing

Who is an "Influencer"

With the rise of the internet, social media has begun to see a growth in its number of users, specifically on the platforms Facebook, Instagram, and Twitter; all having a reported 80+ million visitors a month in 2019. Social media has paved a more accessible way for the average person to gain fame, allowing them to become "social media influencers". These so-called influencers are internet celebrities who, due to their use of social media, have gained a large audience. Influencers typically gain their following from platforms such as YouTube, Instagram, TikTok, and Twitter. The rise of social media influencers has created a new phenomenon; influencer marketing. This type of marketing uses social media influencers to endorse and promote their products, typically to a younger audience. The younger demographic, adolescents, are known for easily being influenced, therefore, they play a crucial role in marketing.

Downside of Social Media Influencers

Influencer marketing relies heavily on parasocial relationships, which can be defined as, "one sided connections imagined with celebrities and media figures" (Gleason et al. 2017). These types of relationships mixed with social media celebrity endorsement has made room for fraud. An example of this is influencer Tana Mongeau's 2018 convention, TanaCon. The convention was created as a response to her past negative experiences with YouTube's VidCon. TanaCon was intended to be a two-day free event that would be purposely be held near VidCon and would take place the exact same days. It was supposed to include concerts and opportunities for attendees to meet several influencers including Mongeau herself. However, she was unorganized and planned the convention in less than 40 days. On the day of the event, the event space quickly hit capacity and the hotel was incapable of letting more in. Due to this, thousands of fans lined up in the parking lot and stood there for hours in the boiling sun. Some fans received severe sunburns as well as passed out due to them having to stand in line for hours upon hours without water. Additionally, fans who bought VIP tickets were promised "line skipping, a gift bag worth more than quadruple the price of the ticket [and] private meet and greets".
https://pbs.twimg.com/media/DgU0uZ0VAAATH5E?format=jpg&name=large
VIP gift bag worth "quadruple the price"
came with a condom, smartphone grip,
and a wristband.










 

Friday, November 13, 2020

Post 9: Privacy

                    Privacy and Prejudice

As technology has become more available, more people have begun to express their worries with the invasion of privacy that comes with the rise of this new form of media. However, this concern is more geared towards the internet rather than other forms of technology. In Catherine Crump's Ted Talk entitled "The Small and Surprisingly Dangerous Detail the Police Track About You," she mentions that concerns with technology should not be just with the internet. Instead, she expresses that technology also plays a role in knowing your current location. With the existence of automatic license plate readers, the government has access to where you go, "if you drive your car around the United States, it can reveal if you go to a therapist, attend an Alcoholics Anonymous meeting, if you go to church or if you don't go to church," she states. She later mentions that specifically in New York City, the NYPD has used these automatic license plate readers past mosques to figure out who is attending.


Hearing that police used this sort of technology to figure out who is attending mosque left me quite intrigued. This practice seemed to be inherently Islamophobic, in that those who practice islam are targeted by the use of automatic license plate readers. According to an article published by The Associated Press in 2012, congregations at mosques were recorded and reported back to the NYPD. The tactics that were used to target the mosques are normally reserved for criminal organizations. For this reason, it is important to acknowledge that a lack of privacy has a strong correlation with prejudice and hurtful stereotypes. 

Sunday, November 1, 2020

Post 8: Diffusion Theory

 Diffusion of Innovation 

Everett Rogers, a notable communication theorist and professor, theorized the diffusion of innovations in his 1962 book, Diffusion of Innovations. The theory seeks to analyze how new ideas and technologies spread throughout society. There are five main categories to this theory: (1) pioneers, (2) early adopters, (3) early majority, (4) late majority, and (5) laggards. 


The theory can be applied to any ideas, including that of women's suffrage in the United States. In this post, I will explore the ways in which the diffusion of innovations can be applied to the idea of women within the United States earning their right to vote.






 

 Applying the Theory to Women's Suffrage 

Step 1: The Pioneers

The first step of the theory is innovation. During this step, those who act as the pioneers willingly take risks in order to achieve their goals. The beginning of the women's suffrage movement in the United States exemplifies this step. The road to women's suffrage in the United States began in July 1848 with the Seneca Falls Convention. Prior to the convention, feminists Lucretia Mott, Martha C. Wright, Elizabeth Cady Stanton, and Mary Ann McClintock met to assemble the Declaration of Sentiments. The declaration, modeled after the Declaration of Independence, explained the rights women should have as citizens of the United States. It begins by stating that both men and women should have unalienable rights to life, liberty, and the pursuit of happiness. It continues by illustrating the 16 ways that women are oppressed.


1848 Senaca Falls Convention

Step 2: Early Adopters

Next is the early adopters. In this step, those who are known to have a higher social status join in on the innovation. Once Stanton announced the declaration at the convention, one hundred of the attendees signed, including Frederick Douglass. The signing of the declaration marked the start of the women's rights movement. 19 years after the convention, in 1867, the 15th Amendment was drafted; which was strongly opposed by Stanton, Susan B. Anthony, Sojourner Truth, and other feminists. They made the racist claim that women should be granted the right to vote before former slaves. Other feminists, such as Lucy Stone, disagreed. 

Step 3: Early Majority

After the early adopters comes the early majority. While in this step, those who have an average social status connect with the early adopters in order to hold a position of leadership. The disagreement between between the groups led to the formation of two different suffrage organizations: Stone's American Woman Suffrage Association (AWSA) and Stanton and Anthony's National Woman Suffrage Association (NWSA). In 1890, the two competing organizations decide to merge, becoming the National American Woman Suffrage Association (NAWSA).  

Step 4: Late Majority 

The fourth step to the diffusion of innovations is the inclusion of late adopters. They adopt the innovation after the average participant. This step is also known as the "tipping point." The 1920 passage of the 19th Amendment, which guaranteed woman the right to vote, is an example of this. 

Step 5: Laggards

The final part of the diffusion of innovations is the laggards. Laggards are those who typically do not desire change. Despite the passing of the 19th, women have (and still are) campaigning for the passage of the Equal Rights Amendment. The amendment, first proposed in 1921 by Alice Paul, states that "equality of rights under the law shall not be denied or abridged by the United States or by any State on account of sex." In 1970, the amendment passed the House of Representatives. In 1972, it passed the Senate and went to the states for ratification. However, it received 35 of the necessary 38 state ratifications; ultimately making it fail. Although women have been given more rights, there is more work needed to be done in order to achieve equality.