Social Theory after the Internet



Download free course Social Theory after the Internet, pdf file on 210 pages by Ralph Schroeder.
The internet has fundamentally transformed society in the past 25 years, yet existing theories of mass or interpersonal communication do not work well in understanding a digital world. Nor has this understanding been helped by disciplinary specialization and a continual focus on the latest innovations. Ralph Schroeder takes a longer-term view, synthesizing perspectives and findings from various social science disciplines in four countries: the United States, Sweden, India and China. His comparison highlights, among other observations, that smartphones are in many respects more important than PC-based internet uses.

Social Theory after the Internet focuses on everyday uses and effects of the internet, including information seeking and big data, and explains how the internet has gone beyond traditional media in, for example, enabling Donald Trump and Narendra Modi to come to power. Schroeder puts forward a sophisticated theory of the role of the internet, and how both technological and social forces shape its significance. He provides a sweeping and penetrating study, theoretically ambitious and at the same time always empirically grounded.The book will be of great interest to students and scholars of digital media and society, the internet and politics, and the social implications of big data.

Table of contents

  • The internet in theory
  • Media systems, digital media and politics
  • Digital media and the rise of right-wing populism
  • The internet in everyday life I: sociability
  • The internet in everyday life II: seeking information
  • Big data: shaping knowledge, shaping everyday life
  • Futures
Pages : 210
Size : 11.7 MB
File type : PDF
Downloads: 74
Created: 2022-02-03
License: CC BY
Author(s): Ralph Schroeder
Social Theory after the Internet

Warning: Trying to access array offset on false in /home/tutovnfz/public_html/article.php on line 233

Others internet Tutorials

Rethinking the Internet of Things

Rethinking the Internet of Things

Demystifying Internet of Things Security

The Second Internet: Reinventing Computer Networking with IPv6

Industrial Internet

Others related eBooks about Social Theory after the Internet

Managing Risk and Information Security

Download free course Managing Risk and Information Security, pdf file on 152 pages by Malcolm Harkins....

Linux Network Administrators Guide

This tutorial provides a best reference for network administration in a Linux environment ,a complet training document under 505 pages for free download....

Internet Firewall

Download free Computer Networking : Firewall Internet Tutorial, training course material, a PDF file on 6 pages by Rob Pickering....

Linux Network Administrator's Guide

Download free course Linux Network Administrator's Guide, pdf file on 507 pages by Olaf Kirch, Terry Dawson....

Cisco ACE to Nginx

Download free course Cisco ACE to Nginx, pdf file on 51 pages by Faisal Memon....

How to configure Voice over IP

This pdf tutorial you will learn how to install, configure, and administer Voice over IP.free training document designated to beginners....

Full Listing of Port Numbers

You will find in this document a complete list of TCP and UDP ports with their descriptions, free pdf file in 13 pages for downloading....

Security Infrastructure Technology for Integrated Utilization of Big Data

Download free course Security Infrastructure Technology for Integrated Utilization of Big Data, pdf file on 171 pages by Atsuko Miyaji, Tomoaki Mimoto....

Security in Computer and Information Sciences

Download free course Security in Computer and Information Sciences, pdf file on 169 pages by Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokratis Katsikas, Ioannis Komnios, Luigi Romano, Dimitrios Tzovaras....

Secrets of Network Cartography: A Comprehensive Guide to Nmap

Ever wonder which Nmap scan was the right one to use? Thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis! - Nmap's operating system fingerprinting can pro...