{"id":5,"date":"2023-12-19T22:22:03","date_gmt":"2023-12-19T22:22:03","guid":{"rendered":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/?p=5"},"modified":"2024-05-19T00:44:24","modified_gmt":"2024-05-19T00:44:24","slug":"chapter-1","status":"publish","type":"chapter","link":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/chapter\/chapter-1\/","title":{"raw":"Introduction","rendered":"Introduction"},"content":{"raw":"<p class=\"import-pf\">We\u2019ll begin our exploration into writing for digital media with a fundamental premise that is both obvious and profound: Digital media is <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">ubiquitous<\/em><\/span>. Something that is ubiquitous is everywhere, all the time. Constant. Its prevalence in our lives has deep and enduring consequences, though it\u2019s easy to become desensitized and overlook what those consequences might be. Our devices\u2014our cell phones, smart watches, digital assistants (e.g., Echo Dots), laptops, iPads, smart TVs\u2014are ubiquitous. For many of us, there isn\u2019t a single moment of the day when our cell phone isn\u2019t within arm\u2019s reach so that we can quickly, if not compulsively, check our email, respond to a text message, scroll through social media, read the latest news updates, and so on.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Certainly, we are in the digital age. Reports vary depending on demographics, but many studies, including <span style=\"border: none windowtext 0pt; padding: 0;\"><a href=\"https:\/\/www.forbes.com\/sites\/johnkoetsier\/2020\/09\/26\/global-online-content-consumption-doubled-in-2020\/?sh=5ee231742fde\"><span class=\"import-url\">this one<\/span><\/a><\/span><span style=\"border: none windowtext 0pt; padding: 0;\"><span class=\"import-url\"> from<\/span><em class=\"import-url\"> Forbes<\/em><\/span>, estimate that the average American spends nearly seven hours a day on some form of digital media (Koetsier, \u201cGlobal\u201d). This <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Forbes<\/em><\/span> article describes our usage as \u201cconsumption,\u201d which underscores the idea that we are perpetually compelled to engage in digital spaces and that we internalize those digital interactions as we form ideas about what is valuable or normal or true. So much of what we know about the world, from history to current events to every other subject imaginable, comes from the internet in some form. It not only provides information that helps shape our worldviews, beliefs, and identities, but it mediates most of our communication with other people, and it facilitates many of our daily activities, from ordering food to paying bills to finding the fastest route to our next destination. The word \u201cconsumption\u201d also highlights the commercial aspect of digital media. Not only is digital content a commodity, but users themselves have become commodities as organizations compete for more views, likes, shares, click-throughs, and subscribers.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">It\u2019s no wonder that digital literacy has become such an important topic. In this book, digital literacy is defined as the ability to engage with digital spaces in meaningful, productive, and ethical ways to achieve personal, professional, or civic goals. It includes the strategies we use to find and evaluate information. It also includes our ability to share information and respond to others thoughtfully, strategically, and respectfully. In other words, digital literacy is more than knowing <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">how<\/em><\/span>. Yes, it\u2019s important to know <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">how<\/em><\/span> to publish a website or <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">how<\/em><\/span> to create a social media post. However, it\u2019s equally important to know <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">why<\/em><\/span> you are making certain choices and <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">to what effect<\/em><\/span>. Of particular importance are the ethical consequences of those choices. While many digital writers and designers leverage their rhetorical skills effectively in order to manipulate, dismiss, confuse, and control their audience, this textbook emphasizes digital literacy as an opportunity to develop a deeper awareness of complex power structures and social injustices that are often ignored and to challenge the status quo.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The most recent <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId8\" href=\"https:\/\/www.iste.org\/standards\/iste-standards-for-students\"><span class=\"import-url\">student learning standards<\/span><\/a><\/span> published by the International Society for Technology in Education (ISTE) articulate the goals of digital literacy quite well. In acknowledging how important it is to prepare students \u201cto thrive in a constantly evolving technological landscape,\u201d ISTE identifies seven core objectives:<\/p>\r\n\r\n<ol>\r\n \t<li><strong>Empowered Learner<\/strong>: Students leverage technology to take an active role in choosing, achieving, and demonstrating competency in their learning goals.<\/li>\r\n \t<li><strong>Digital Citizen<\/strong>: Students recognize the rights; responsibilities; and opportunities of living, learning, and working in an interconnected digital world, and they act and model in ways that are safe, legal, and ethical.<\/li>\r\n \t<li><strong>Knowledge Constructor<\/strong>: Students critically curate a variety of resources using digital tools to construct knowledge, produce creative artifacts, and make meaningful learning experiences for themselves and others.<\/li>\r\n \t<li><strong>Innovative Designer<\/strong>: Students use a variety of technologies within a design process to identify and solve problems by creating new, useful, or imaginative solutions.<\/li>\r\n \t<li><strong>Computational Thinker<\/strong>: Students develop and employ strategies for understanding and solving problems in ways that leverage the power of technological methods to develop and test solutions.<\/li>\r\n \t<li><strong>Creative Communicator<\/strong>: Students communicate clearly and express themselves creatively for a variety of purposes using the platforms, tools, styles, formats, and digital media appropriate to their goals.<\/li>\r\n \t<li><strong>Global Collaborator<\/strong>: Students use digital tools to broaden their perspectives and enrich their learning by collaborating with others and working effectively in teams locally and globally. (International Society for Technology in Education)<\/li>\r\n<\/ol>\r\n[caption id=\"\" align=\"alignnone\" width=\"502\"]<img src=\"http:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-content\/uploads\/sites\/64\/2024\/01\/image24.jpg\" alt=\"A graphic with the various components of digital literacy\" width=\"502\" height=\"502\" \/> Digital Literacy Graph, by Cara Miller <a href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">(CC BY)<\/a>[\/caption]\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">These standards underscore the deep critical thinking, developed from a strong sense of social ethics and personal values, that true digital literacy entails. And these skills have never been so important. In the midst of the COVID-19 pandemic, for instance, everything shifted to the digital realm\u2014classes, jobs, church attendance, doctor appointments, grocery shopping, conversations with family and friends. Digital media became our lifeline to the outside world and helped us maintain some sense of normalcy. Social media platforms exploded with chatter from people who were desperate to make connections with other people and to gain perspective on the ongoing crisis. While some of these interactions were positive, strengthening a sense of community and belonging, many were not. Fueled by the political and financial agendas of powerful media and commercial organizations, confusion, misinformation, conflict, and ultimately division have permeated social media. So many posts are hateful. So many people are unwilling (unable?) to listen to perspectives different from their own. Way too many people automatically accept or reject information that either coincides with or contradicts what they already believe\u2014what they <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">want<\/em><\/span> to believe.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Recently, Tim Berners-Lee, the inventor of the World Wide Web, wrote an <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId9\" href=\"https:\/\/webfoundation.org\/2019\/03\/web-birthday-30\/\"><span class=\"import-url\">open letter<\/span><\/a><\/span> about the \u201csources of dysfunction\u201d on the web. He says, \u201cThe fight for the web is one of the most important causes of our time,\u201d advocating for the need to protect human rights, equal access, and the open marketplace of ideas and social progress that the web was designed to provide. It follows, then, that true digital literacy is about much more than scrolling, surfing, liking, posting selfies, gaining followers, influencing buying habits, and spreading your opinions with the intent to shut other people down. It\u2019s also not about being as active as possible on as many platforms as possible. In fact, given the ubiquitous nature of digital media, intentionality and selectivity are crucial. True digital literacy is about meaningful and thoughtful engagement that has a positive impact on you as well as the communities of which you are a part.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Writing for Digital Media<\/em><\/span> was written with these lofty ideals in mind. This first chapter focuses on the historical shift from legacy media to digital media, which gave rise to active participation and personalization by and for everyday citizens, who experienced significantly more control over their media experiences. Even more significant were the fundamental changes to communication patterns and social interactions. The second part of the chapter sets up the remainder of the textbook by describing the overall framework of the remaining chapters and how that framework relates to the definition of digital literacy discussed above.<\/p>\r\n\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li>Understand the history of digital media and how it quickly evolved to transform our daily lives.<\/li>\r\n \t<li>Compare the original intent of the World Wide Web to the current reality of privatization and commercial enterprise.<\/li>\r\n \t<li>Consider the trade-offs as technologies have developed to afford greater access to and participation in a growing marketplace of ideas.<\/li>\r\n \t<li>Recognize the ways that powerful organizations have sought to control the flow of public information throughout history.<\/li>\r\n \t<li>Compare the differences in audience engagement between traditional media and digital media.<\/li>\r\n \t<li>Understand the organizational structure of the textbook and how different forms of literacy create a more holistic and flexible approach to digital writing.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<h1 class=\"import-ah\">The History of Digital Media<\/h1>\r\n<p class=\"import-paft\">A brief history lesson is in order to contextualize our digital media use and the opportunities it affords. It\u2019s actually a pretty short history given that the World Wide Web, which precipitated the mass adoption of digital media, is little more than 30 years old. On the other hand, in that short period of time, it has grown at an astronomical rate. According to Broadband Search, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId10\" href=\"https:\/\/www.broadbandsearch.net\/blog\/internet-statistics\"><span class=\"import-url\">5.25 billion people<\/span><\/a><\/span> worldwide are currently connected to the internet, which represents 66.2% of the world\u2019s population, and that number grows by the millions every year. In fact, the percentage of online users grew by 1,355% from 2020 to 2022. The site goes on with statistics about the millions of people who are active on social media, who write blogs, who utilize video streaming services, and who shop online. Perhaps even more significant is the sharp increase in <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId11\" href=\"https:\/\/news.gallup.com\/poll\/355907\/remote-work-persisting-trending-permanent.aspx\"><span class=\"import-url\">remote working<\/span><\/a><\/span> (Saad and Wigert) and <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId12\" href=\"https:\/\/nces.ed.gov\/fastfacts\/display.asp?id=80\"><span class=\"import-url\">remote learning<\/span><\/a><\/span> (National Center for Education Statistics) in the U.S., along with the recent <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId13\" href=\"https:\/\/www.census.gov\/retail\/mrts\/www\/data\/pdf\/ec_current.pdf\"><span class=\"import-url\">spike in e<\/span><span class=\"import-url\">-<\/span><span class=\"import-url\">commerce<\/span><\/a><\/span> that continues to claim a higher percentage of our total retail sales every year (U.S. Department of Commerce).<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">It\u2019s not an exaggeration by any stretch to say that digital media is a central component of our daily lives\u2014or that most of the world would come to a grinding halt without it. Given this reality, it\u2019s even more startling to consider digital media\u2019s humble beginning. Development happened in stages, beginning with the invention of <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId14\" href=\"https:\/\/www.tnmoc.org\/colossus\"><span class=\"import-url\">Colossus<\/span><\/a><\/span> in 1944 (National Museum of Computing, \u201cColossus\u201d). As its name suggests, Colossus was enormous, approximately the size of a living room and weighing more than five tons. And in contrast to the multifunctional, general-purpose devices we have today, Colossus had one job: to decode encrypted messages between Hitler and his troops during World War II. It was also incredibly slow: <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId15\" href=\"https:\/\/www.britannica.com\/technology\/Colossus-computer\"><span class=\"import-url\">5,000 characters <\/span><span class=\"import-url\">per second<\/span><\/a><\/span> compared with modern computers that process billions of instructions per second (Copeland).<\/p>\r\n\r\n\r\n[caption id=\"\" align=\"alignnone\" width=\"600\"]<a class=\"rId16\" href=\"https:\/\/en.wikipedia.org\/wiki\/Colossus_computer\"><img src=\"http:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-content\/uploads\/sites\/64\/2024\/01\/image2.png\" alt=\"A Colossus Mark 2 codebreaking computer being operated by Dorothy Du Boisson (left) and Elsie Booker (right), 1943.\" width=\"600\" height=\"400\" \/><\/a> <a href=\" https:\/\/en.wikipedia.org\/wiki\/File:Colossus.jpg \">Colossus<\/a>, by author unknown <a href=\"https:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/\">(CC0)<\/a>[\/caption]\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">What made Colossus <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">digital<\/em><\/span> was the way that it processed and stored information using Boolean logic. Though it didn\u2019t have software to direct its operations like today\u2019s digital devices, it did have a series of switches and plugs that worked much the same way to create binary values (positive and nonpositive) that told it what to do and could be expanded to create complex functions. Of course, in this early stage as digital technology became faster and held more memory capacity, its use was strictly limited to governmental purposes. In fact, the very existence of Colossus was kept secret <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId18\" href=\"https:\/\/www.tnmoc.org\/news-releases\/2019\/2\/5\/colossus-decrypts-to-be-revealed-after-75-years\"><span class=\"import-url\">until 1975<\/span><\/a><\/span> so that it could remain a secret weapon of the military (National Museum of Computing, \u201cColossus Decrypts\u201d).<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The internet was also developed as a tool for the U.S. military, this time as a <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId19\" href=\"https:\/\/www.history.com\/topics\/inventions\/invention-of-the-internet\"><span class=\"import-url\">mechanism of defense during the Cold War<\/span><\/a><\/span> (History.com). Out of growing concerns for what might happen if the Soviet Union figured out how to shut down our telephone system\u2014the crux of long-distance communication at the time\u2014ARPAnet was created in 1965 to enable government computers to share information. Developed by electrical engineers and mathematicians at the Defense Advanced Research Projects Agency (DARPA), ARPAnet was special because it used \u201cpacket switching\u201d to break down information into chunks of data that would have unique routing paths to their destination. This made it much less vulnerable to interception or enemy attack. However, development was fairly slow. It wasn\u2019t until 1969 that the first message was sent from one (gigantic) computer to another. The word \u201clogin\u201d was sent as a test, but only \u201clo\u201d made it through before the system crashed. Eventually, electronic mail became one of the most important functions of ARPAnet.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Another challenge was figuring out how to grow the network. In fact, there wasn\u2019t one singular network. ARPAnet, with its handful of computers, became one among several other mini-networks. As the number of packet-switching networks with differing configurations grew and tried to connect to one another, it became increasingly difficult to integrate them into one seamless communication system. As a result, Transmission Control Protocol \/ Internet Protocol (TCP\/IP) was developed in the late 1970s by Vinton Cerf and Robert Kahn, often referred to as the \u201c<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId20\" href=\"https:\/\/www2.computerworld.com.au\/article\/643174\/father-internet-vint-cerf-ipv4-never-production-version\/\"><span class=\"import-url\">fathers of the <\/span><span class=\"import-url\">internet<\/span><\/a><\/span>\u201d (Nott). TCP\/IP was\u2014and still is\u2014the fundamental language that allowed networks with different configurations to communicate, effectively bringing everything together under the umbrella of one global network.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Despite its growing capabilities, the use of the internet was restricted to government officials, military personnel, and university professors throughout the 1980s. The National Science Foundation developed the Computer Science Network (CSNET) for university computer scientists across the country, and as the need for faster communication amid increasing traffic arose, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId21\" href=\"https:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=103050\"><span class=\"import-url\">NSFNET<\/span><\/a><\/span> was developed in 1986 as the \u201cbackbone\u201d of an internet infrastructure that would later support widespread use (National Science Foundation, \u201cA Brief History\u201d). The most popular online communications at the time were email, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId22\" href=\"https:\/\/www.britannica.com\/technology\/USENET\"><span class=\"import-url\">discussion groups (1979)<\/span><\/a><\/span> (Encyclopedia Britannica, \u201cUSENET\u201d), <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId23\" href=\"https:\/\/kimon.hosting.nyu.edu\/physical-electrical-digital\/items\/show\/1363\"><span class=\"import-url\">Internet Relay Chat (IRC<\/span><span class=\"import-url\">; <\/span><span class=\"import-url\">1988)<\/span><\/a><\/span> (Dominquez), and text-based games (i.e., Multi-User Dungeons [MUDs] and MUD Object-Oriented games [MOOs]).<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">In other words, functionality as well as access was still fairly limited throughout the 1980s, but all of that changed in 1991 with the advent of the World Wide Web by Tim Berners-Lee. The web allowed use of the internet to go beyond simply sending information from one computer to another. Users could now post and retrieve information that was intended for mass consumption across the web. The web became a mechanism for sharing information among all participants, and with the release of the first popular web browser (<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId24\" href=\"https:\/\/www.livinginternet.com\/w\/wi_mosaic.htm\"><span class=\"import-url\">Mosaic<\/span><\/a><\/span>, later called Netscape) in 1993, the web became accessible for public use (Andreessen). From that moment on, the number of participants in as well as the varying uses of the internet grew exponentially, which precipitated the rapid advancement of digital media devices and platforms that have transformed our everyday lives.<\/p>\r\n\r\n<h2 class=\"import-bh\">Commercialization of the Internet<\/h2>\r\n<p class=\"import-paft\">If the development of the internet was central to the advancement of digital media, so too was the commercialization of the internet as companies found ways to capitalize on its capabilities for financial gain. This continues to be an <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId25\" href=\"https:\/\/www.washingtonpost.com\/news\/made-by-history\/wp\/2017\/08\/04\/commercialization-brought-the-internet-to-the-masses-it-also-gave-us-spam\/\"><span class=\"import-url\">issue of debate<\/span><\/a><\/span> as large corporations continually pioneer technological advances in order to privatize their services and extend their commercial reach (Goodman). On the one hand, these commercial firms paved the way for mass adoption of the internet and the digital innovations that are fundamental to our personal and professional activities. But on the other hand, the increasing commercialization of the internet has shifted its underlying purpose\u2014from information sharing and collaboration to targeted marketing, clickbait, and commodification of all goods and services. Users themselves have <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId26\" href=\"https:\/\/www.nytimes.com\/2017\/05\/09\/magazine\/how-privacy-became-a-commodity-for-the-rich-and-powerful.html\"><span class=\"import-url\">become commodities<\/span><\/a><\/span> in the fight to capture attention and increase CTRs (click-through rates) (Hess).<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">When the National Science Foundation (NSF) developed NSFNET, its purpose was to further the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId27\" href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/42\/1862\"><span class=\"import-url\">advancement of education and research<\/span><\/a><\/span>, not commercial enterprise (Legal Information Institute). In fact, the use of NSFNET for commercial purposes was banned. It was free for academic institutions to share and access information. The NSF also paid for domain names so that it was free for users to register a website. But as the network grew, extending to university libraries, public schools, small-town libraries, and eventually individual households, it became more difficult for the NSF to keep up with the growing demand, and private companies battled for control. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId28\" href=\"https:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=103050\"><span class=\"import-url\">Commercialization occurred in stages<\/span><\/a><\/span> throughout the 1990s (National Science Foundation, \u201cA Brief History\u201d), which was marked by several pivotal changes:<\/p>\r\n\r\n<ul>\r\n \t<li>\u201cThe World\u201d emerged as the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId29\" href=\"https:\/\/web.archive.org\/web\/20190428045452\/https:\/\/www.exede.com\/blog\/brief-history-internet-service-providers\/\"><span class=\"import-url\">first commercial internet service provider<\/span><\/a><\/span> (ISP; 1989). Though its dial-up service was incredibly slow by today\u2019s standards, the number of customers multiplied (Schuster).<\/li>\r\n \t<li>The NSF lifted the ban that prevented the commercial use of the internet (1991). Private industries could now use the internet for business and commercial purposes. More commercial ISPs became available, including CompuServe, The Source, and America Online (AOL).<\/li>\r\n \t<li>Tim Berners-Lee created the World Wide Web (1991), which is now commonly known as Web 1.0 because it focused on providing information to users, but pages were static and didn\u2019t allow for much user participation. He later advocated for widespread public use of the web by <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId30\" href=\"https:\/\/webfoundation.org\/about\/vision\/history-of-the-web\/\"><span class=\"import-url\">relinquishing proprietary rights<\/span><\/a><\/span> to the code he created (1993) (World Wide Web Foundation). The World Wide Web was the first internet browser, making it possible to search for specific information. Other browsers, including Netscape Navigator and Microsoft\u2019s Internet Explorer, improved the internet\u2019s functionality and prompted increased growth.<\/li>\r\n \t<li>The NSF solicited bids from private companies to manage nonmilitary domain registrations (1993). Network Solutions, Inc. was awarded the five-year contract, and under their management, the number of commercial domains grew rapidly, increasing from 7,500 domain names in 1993 to more than two million at the end of their contract in 1998. In 1995, the NSF began charging a fee for domain registration.<\/li>\r\n \t<li><span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId31\" href=\"https:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=103050\"><span class=\"import-url\">NSFNET was decommissioned (1995)<\/span><\/a><\/span>, which allowed for <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId32\" href=\"https:\/\/www.nsf.gov\/about\/history\/nifty50\/theinternet.jsp\"><span class=\"import-url\">greater public access<\/span><\/a><\/span> as private companies made their internet services available (National Science Foundation, \u201cThe Internet\u201d). The NSF officially and completely discontinued any direct control it had over the management of the internet (1998).<\/li>\r\n \t<li>Technological advances throughout the 1990s and early 2000s made the internet much faster and more versatile. Broadband services included <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId33\" href=\"https:\/\/www.britannica.com\/technology\/DSL\"><span class=\"import-url\">DSL<\/span><\/a><\/span> (Digital Subscriber Line), cable internet, and fiber optic lines, which transferred increasing amounts of data that could travel around the world at the speed of light (Encyclopedia Britannica, \u201cDSL\u201d).<\/li>\r\n \t<li><span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId34\" href=\"https:\/\/about.google\/our-story\/\"><span class=\"import-url\">Google began in 1998<\/span><\/a><\/span> as a search engine and soon offered other services, including email, analytical tools, maps, advertising programs, and a mobile operating system (Google). Of particular importance was the algorithm Google used to <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId35\" href=\"https:\/\/www.forbes.com\/sites\/forbesagencycouncil\/2020\/02\/28\/an-abbreviated-history-of-seo-and-what-it-tells-us-about-seos-future-role\/?sh=40575c6d11ef\"><span class=\"import-url\">rank web pages<\/span><\/a><\/span> in order of relevance and credibility (Star). Soon, companies were paying for ads and also \u201coptimizing\u201d their websites to ensure more prominent placement.<\/li>\r\n \t<li>Mobile internet technology became more advanced with the introduction of the 2G cellular network (1991), which allowed users to access media content and communicate via text message (SMS) and multimedia message (MMS). The <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId36\" href=\"https:\/\/time.com\/4837176\/iphone-10th-anniversary\/\"><span class=\"import-url\">iPhone<\/span><\/a><\/span> 2G was released in 2007, but it was quickly replaced as 3G, 4G, and 5G technology developed, offering higher speeds, more data transfer, higher-quality streaming, and more functionality (Eadicicco).<\/li>\r\n \t<li><span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId37\" href=\"https:\/\/www.britannica.com\/topic\/Web-20\"><span class=\"import-url\">Web 2.0<\/span><\/a><\/span> was introduced (2004) with a focus on user-generated content and increased interaction among users (Encyclopedia Britannica, \u201cWeb 2.0\u201d). Social media platforms like MySpace (launched in 2003), Facebook (2004), YouTube (2005), and X (2006; formerly known as Twitter) became increasingly popular. However, increased user participation also resulted in more marketing opportunities as well as analytical features that allowed companies to collect information about specific behaviors and buying patterns.<\/li>\r\n<\/ul>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Of course, that was just the beginning. In the last two decades, advancing technologies have made it possible to capture people\u2019s attention at all times of the day and night, even as they move from place to place. A recent article from the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId38\" href=\"https:\/\/www.pewresearch.org\/internet\/fact-sheet\/mobile\/\"><span class=\"import-url\">Pew Research Center<\/span><\/a><\/span> reports that 85% of Americans own a smartphone, a number that is up significantly from just 35% in 2011 (\u201cMobile Fact Sheet\u201d). What\u2019s more, people\u2019s digital media usage has more than doubled, as evidenced by the chart below by <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId39\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Daily_hours_spent_with_digital_media,_OWID.svg\"><span class=\"import-url\">Our World In Data<\/span><\/a><\/span>. While people averaged less than three hours a day of digital media usage in 2008, they averaged well above six hours a day by 2018. That number rose above seven hours in 2022, according to <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId40\" href=\"https:\/\/www.insiderintelligence.com\/content\/us-time-spent-with-media-forecast-2023\"><span class=\"import-url\">Insider Intelligence<\/span><\/a><\/span> (Cramer-Flood). More time spent on digital media means more opportunities for companies to advertise to potential consumers, which is why they put so much money into targeted marketing, omnichannel messaging, optimizing their websites, sending push notifications, and tracking users\u2019 online behaviors and buying habits. They want to tap into the digital economy, which rose to a <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId41\" href=\"https:\/\/www.forbes.com\/sites\/johnkoetsier\/2023\/01\/28\/e-commerce-retail-just-passed-1-trillion-for-the-first-time-ever\/?sh=bff541a36df2\"><span class=\"import-url\">record-breaking $1.09 trillion<\/span><\/a><\/span> in 2022 (Koetsier, \u201cE-Commerce Retail\u201d).<\/p>\r\n\r\n\r\n[caption id=\"\" align=\"alignnone\" width=\"680\"]<img src=\"http:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-content\/uploads\/sites\/64\/2024\/01\/image3.png\" alt=\"Bar graph showing the increase in digital media usage in the United States from 2008-2018\" width=\"680\" height=\"480\" \/> <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Daily_hours_spent_with_digital_media,_OWID.svg\">Daily Hours Spend with Digital Media, United States<\/a>, by Our World in Data <a href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">(CC BY)<\/a>[\/caption]\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">As companies increasingly used digital spaces to compete for people\u2019s attention (and money), several trends emerged in the 2010s:<\/p>\r\n\r\n<ul>\r\n \t<li><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Social media marketing.<\/strong><\/span> While just 5% of the adult population used social media in 2005, today more than <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId42\" href=\"https:\/\/www.pewresearch.org\/internet\/fact-sheet\/social-media\/\"><span class=\"import-url\">72% use some sort of social media<\/span><\/a><\/span> (Pew Research Center, \u201cSocial Media\u201d). In fact, about half of Americans use social media as their <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId43\" href=\"https:\/\/www.pewresearch.org\/journalism\/2021\/09\/20\/news-consumption-across-social-media-in-2021\/\"><span class=\"import-url\">primary source <\/span><span class=\"import-url\">of <\/span><span class=\"import-url\">news information<\/span><\/a><\/span> (Pew Research Center, \u201cNews Consumption\u201d). Social media has also become an important tool for social activists (consider the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId44\" href=\"https:\/\/www.wired.com\/2016\/01\/social-media-made-the-arab-spring-but-couldnt-save-it\/\"><span class=\"import-url\">Arab Spring<\/span><\/a><\/span> [Hempel] or the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId45\" href=\"https:\/\/www.cnbc.com\/2019\/08\/16\/social-media-has-become-a-battleground-in-hong-kongs-protests.html\"><span class=\"import-url\">2019 protests in Hong Kong<\/span><\/a><\/span> [Shao], for instance), humanitarian campaigns (e.g., <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId46\" href=\"https:\/\/gospotlite.com\/blog\/social-media-helped-in-the-ukraine-humanitarian-crisis\"><span class=\"import-url\">the war in Ukraine<\/span><\/a><\/span> [Spotlite]), and <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId47\" href=\"https:\/\/knowledge.wharton.upenn.edu\/podcast\/knowledge-at-wharton-podcast\/how-social-media-is-shaping-political-campaigns\/\"><span class=\"import-url\">political campaigns<\/span><\/a><\/span> (Wharton). Most prominent are businesses that use social media to interact with customers and advertise their latest products and services. According to a recent <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Forbes<\/em><\/span> article, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId48\" href=\"https:\/\/www.forbes.com\/advisor\/business\/social-media-statistics\/\"><span class=\"import-url\">77% of small businesses<\/span><\/a><\/span> use social media regularly (Wong). Many companies use <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId49\" href=\"https:\/\/www.prnewswire.com\/news-releases\/small-businesses-value-social-media-over-all-other-digital-marketing-channels-301505849.html\"><span class=\"import-url\">social media as their primary method of marketing<\/span><\/a><\/span>, believing that it is the most effective way to reach their target audience (Cision).<\/li>\r\n \t<li><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Influencers.<\/strong><\/span> Increasingly, businesses hire influencers to engage with potential customers because they already have a large number of social media followers and can leverage those connections to influence people\u2019s buying habits. They test products and make recommendations, and while it might seem that these people have the consumer\u2019s best interest at heart, the reality is sometimes a little different. \u201cOn the consumer side, the relationship between influencers and consumers is based on perceived closeness, authenticity, and trust,\u201d according to <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId50\" href=\"https:\/\/www.europarl.europa.eu\/RegData\/etudes\/STUD\/2022\/703350\/IPOL_STU(2022)703350_EN.pdf\"><span class=\"import-url\">Michaelsen et al.<\/span><\/a><\/span>, who go on to discuss the potentially negative impact of influencers on consumers, particularly more vulnerable populations such as children or consumers with low education. Their study found several negative characteristics of influencer marketing, including \u201clack of transparency and unclear disclosure, lack of separation between advertising and content misleading messages, and targeting vulnerable consumer groups\u201d (Michaelsen et al. 10). While in some instances it\u2019s considered unlawful for an influencer to endorse specific products without fully disclosing that they are being paid to do so\u2014see the anti-touting provision (Section 17b) of the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId51\" href=\"https:\/\/www.govinfo.gov\/content\/pkg\/COMPS-1884\/pdf\/COMPS-1884.pdf\"><span class=\"import-url\">Securities Act<\/span><\/a><\/span> (U.S. Securities and Exchange Commission, \u201cSecurities\u201d) and the recent <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId52\" href=\"https:\/\/www.sec.gov\/news\/press-release\/2022-183\"><span class=\"import-url\">charges against Kim Kardashian<\/span><\/a><\/span> for using social media to endorse an investment opportunity (U.S. Securities and Exchange Commission, \u201cSEC Charges\u201d)\u2014influencers often don\u2019t fully disclose their financial incentives.<\/li>\r\n \t<li><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">App culture and push notifications.<\/strong><\/span> You\u2019re probably familiar with Apple\u2019s catchphrase \u201cThere\u2019s an app for that,\u201d which debuted in a <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId53\" href=\"https:\/\/www.youtube.com\/watch?v=szrsfeyLzyg\"><span class=\"import-url\">2009 commercial<\/span><\/a><\/span> advertising iPhone\u2019s latest capabilities. Since then, app culture has exploded with entertainment, educational, and lifestyle applications, which provide quick and easy access to a variety of activities and information. They also allow for notifications to be pushed out to users, often prompting them to take action to open the application, visit the website, or take advantage of a new product or promotional opportunity. While the Pew Research Center reported in 2010 that fewer than half (43%) of cell phone users had apps on their phones (<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId54\" href=\"https:\/\/www.pewresearch.org\/internet\/2010\/09\/14\/the-rise-of-apps-culture\/\"><span class=\"import-url\">\u201cThe Rise of Apps Culture\u201d<\/span><\/a><\/span>), more recent data suggest that the average cell phone user has <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId55\" href=\"https:\/\/www.simform.com\/blog\/the-state-of-mobile-app-usage\/\"><span class=\"import-url\">40 apps installed on their phone<\/span><\/a><\/span> and consistently accesses 18 of those apps (Kataria).<\/li>\r\n \t<li><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Gig economy.<\/strong><\/span> With more websites, applications, and channels of communication, more businesses and freelancers have emerged in the \u201c<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId56\" href=\"https:\/\/hbr.org\/2018\/03\/thriving-in-the-gig-economy\"><span class=\"import-url\">gig economy<\/span><\/a><\/span>,\u201d which relies mostly on short-term and contract employees who value their independence to accept or decline jobs as they see fit but who also must \u201cproduce or perish\u201d (Petriglieri et al.). In 2015, Hillary Clinton forecasted the \u201cexciting\u201d economic opportunities and new innovations that stemmed from the gig economy (qtd. in Sundararajan), but some people point out that on-demand businesses like Uber, Airbnb, Etsy, and TaskRabbit are the true beneficiaries, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId57\" href=\"https:\/\/www.theguardian.com\/commentisfree\/2015\/jul\/26\/will-we-get-by-gig-economy\"><span class=\"import-url\">making money <\/span><span class=\"import-url\">off<\/span><span class=\"import-url\"> the labor exchange<\/span><\/a><\/span> without having to provide consistent salaries or benefits: \u201cThere\u2019s a risk we might devolve into a society in which the on-demand many end up serving the privileged few\u201d (Sundararajan).<\/li>\r\n \t<li><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">IoT and big data.<\/strong><\/span> The <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId58\" href=\"https:\/\/www.networkworld.com\/article\/3207535\/what-is-iot-the-internet-of-things-explained.html\"><span class=\"import-url\">Internet of Things (IoT)<\/span><\/a><\/span> refers to the emergence of objects and systems that use wireless internet connections to send and receive data, often through the convenience of your phone (Fruhlinger). Think about all of the devices that have emerged in the last 10 years with the word \u201csmart\u201d in front of them\u2014smart watches, smart TVs, smart refrigerators, smart door locks, smart thermostats, smart vacuums. A 2019 <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId59\" href=\"https:\/\/priceonomics.com\/the-iot-data-explosion-how-big-is-the-iot-data\/\"><span class=\"import-url\">article in<\/span><\/a><\/span> <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Priceonomics<\/em><\/span> put it like this:<\/li>\r\n<\/ul>\r\n<p style=\"padding-left: 40px;\">The growth of Internet of Things in terms of number of devices, revenue generated, and data produced has been stunning, but most predictions expect that growth to accelerate. The number of connected devices is expected to grow to 50 billion in 2020 (from 8.7 billion in 2012) and the annual revenue from IoT sales is forecast to hit $1.6 trillion by 2025 (from just $200 billion today). (Team Recurrency)<\/p>\r\n<p style=\"padding-left: 40px;\">The article goes on to discuss the astronomical amount of data (otherwise known as big data) collected by these devices\u2014upward of 4.4 zettabytes in 2020\u2014which is used to track user behaviors and trends, understand consumer needs, make product upgrades, and essentially market more relevant products and services to customers. While this might seem like a benefit in many ways, there are concerns about how closely IoT devices allow large corporations and government entities to track people\u2019s behavior. Josh Fruhlinger used the recent example of a <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId60\" href=\"https:\/\/www.cnn.com\/2020\/04\/04\/tech\/location-tracking-florida-coronavirus\/index.html\"><span class=\"import-url\">map released by X-Mode<\/span><\/a><\/span> (O\u2019Sullivan) in 2020 that was designed to track the location of spring breakers as they left Fort Lauderdale. The purpose was to predict the spread of COVID-19, but it also demonstrated \u201cjust how closely IoT devices can track us\u201d (Fruhlinger).<\/p>\r\n\r\n<ul>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">User tracking.<\/strong><\/span> While we\u2019re on the topic of user tracking, it\u2019s another trend that emerged in the 2010s. Although Urchin was an analytics business that formed in the early days of the web (1995), it wasn\u2019t bought out by Google to become Google Analytics until 2005, and there weren\u2019t sophisticated tracking tools until 2014, when Google released Universal Analytics, which could track individual users across multiple devices and platforms (<span class=\"import-u\">Visualwebz<\/span>). Once more, the benefit is a more enjoyable user experience, though there are significant concerns about user tracking, data security, and the use of data to not only predict but also compel purchasing decisions (Zuboff).<\/li>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Artificial intelligence.<\/strong><\/span> You might be surprised to learn that artificial intelligence (AI) <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId61\" href=\"https:\/\/sitn.hms.harvard.edu\/flash\/2017\/history-artificial-intelligence\/\"><span class=\"import-url\">dates back to the 1950s<\/span><\/a><\/span> as technology advanced allowing computers to more easily store information and use algorithms to complete tasks (Anyoha). However, it wasn\u2019t until the 2010s that AI became commonplace through Alexa devices, GPS, talk-to-text applications, and so on. Most of us encounter AI devices multiple times throughout the day, and our use of those devices (and the data collected as a result) is used in turn to train the AI to become smarter and better at what it does. Many IoT devices use AI to simulate human intelligence and complete tasks. This is called \u201c<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId62\" href=\"https:\/\/www.popularmechanics.com\/technology\/robots\/a14457503\/how-machine-learning-lets-robots-teach-themselves\/\"><span class=\"import-url\">machine learning<\/span><\/a><\/span>,\u201d which David Grossman describes as \u201cexciting and somewhat terrifying\u201d given this potential for complex functionality. Peskoe-Yang explains that as we use AI in our daily lives, \u201cAI is tasked not only with finding the answers to questions about data sets, but with finding the questions themselves; successful deep learning applications require vast amounts of data and the time and computational power to self-test over and over again.\u201d While recent AI technologies like <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId63\" href=\"https:\/\/openai.com\/blog\/chatgpt\"><span class=\"import-url\">ChatGPT<\/span><\/a><\/span> have created some exciting opportunities, there are concerns about the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId64\" href=\"https:\/\/arxiv.org\/pdf\/2307.09009.pdf\"><span class=\"import-url\">performance accuracy<\/span><\/a><\/span> of ChatGPT (Chen et al.) and the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId65\" href=\"https:\/\/www.unesco.org\/en\/artificial-intelligence\/recommendation-ethics\/cases\"><span class=\"import-url\">ethical implications<\/span><\/a><\/span> of relying on AI devices fueled by biased algorithms (UNESCO).<\/li>\r\n \t<li class=\"import-bll\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Scams and security breaches.<\/strong><\/span> Let\u2019s not forget about those scammers, hackers, and phishers who are also hoping to profit from advanced technologies and all the user data out there. While viruses and other types of malware became a concern in the early 2000s, cybercrime became much <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId66\" href=\"https:\/\/cybersecurityventures.com\/the-history-of-cybercrime-and-cybersecurity-1940-2020\/\"><span class=\"import-url\">more profound and sophisticated<\/span><\/a><\/span> in the 2010s as criminals developed \u201cmulti-vector attacks and social engineering\u201d (Chadd). Expensive data breaches have affected not only large corporations and government entities but also individual users, which is why cybersecurity has become such an important (<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId67\" href=\"https:\/\/www.fortunebusinessinsights.com\/industry-reports\/cyber-security-market-101165\"><span class=\"import-url\">and lucrative<\/span><\/a><\/span>) field (Fortune Business Insights).<\/li>\r\n<\/ul>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">We now live in a world where the quality of life seems to hinge on the speed of our internet connection as billions of people spend hours every day streaming their favorite shows, scrolling through social media, and browsing Amazon merchandise. User activities are tracked and assessed for the purposes of providing more targeted, personalized ads and creating a more positive user experience that perpetuates increasing dependence on digital technologies. In so many ways, the commercialization of the internet ushered in the digital age that has provided tangible benefits in communication, entertainment, collaboration, access to information, and countless daily conveniences. But at what cost? According to <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId68\" href=\"https:\/\/www.businessinsider.com\/these-6-corporations-control-90-of-the-media-in-america-2012-6\"><span class=\"import-url\">Business Insider<\/span><\/a><\/span>, 90% of the information we consume is controlled by a handful of powerful corporations (Lutz). Increased surveillance, misuse of personal data, cyberbullying, addiction, burnout, and self-indulgence are equally prevalent. These are issues that we will examine more closely in the first section of the textbook, which focuses on writing and digital media from a critical perspective.<\/p>\r\n\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Acronyms from this Chapter<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<table class=\"lines\" style=\"height: 465px; width: 100%;\">\r\n<tbody>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-tch\">Acronym<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-tch\">Full Name<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-tch\">Description<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-td\">ARPAnet<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-td\">Advanced Research Projects Agency Network<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-td\">The first public packet-switched network, created by DARPA in 1965.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-td\">DARPA<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-td\">Defense Advanced Research Projects Agency<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-td\">Research agency that is part of the United States Department of Defense. It developed ARPAnet.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-td\">CSNET<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-td\">Computer Science Network<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-td\">Network developed in the 1980s by the Computer Science Network for university computer scientists across the country.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-td\">CTR<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-td\">click-through rate<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-td\">The number of times an ad receives a \u201cclick\u201d to see more information divided by the number of views.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-td\">DSL<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-td\">digital subscriber line<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-td\">A collection of technologies that transmit digital data over the telephone line.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-td\">IoT<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-td\">Internet of Things<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-td\">The network of devices that connect to the internet and can exchange data with other devices and systems over the internet.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-td\">IRC<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-td\">Internet Relay Chat<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-td\">Text-based chat system for instant messaging.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-td\">ISP<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-td\">internet service provider<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-td\">Company that provides internet access.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-td\">ISTE<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-td\">International Society for Technology in Education<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-td\">\u201cA passionate community of global educators who believe in the power of technology to transform teaching and learning\u201d (<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId69\" href=\"https:\/\/www.iste.org\/about\/about-iste\"><span class=\"import-url\">ISTE, \u201cAbout\u201d<\/span><\/a><\/span>).<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-td\">MOO<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-td\">MUD Object-Oriented<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-td\">Online virtual reality system in which players are connected at the same time.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-td\">MUD<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-td\">Multi-User Dungeon<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-td\">A multiplayer online space.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-td\">NSF<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-td\">National Science Foundation<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-td\">A government agency that supports research and education in science and engineering.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-td\">NSFNET<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-td\">National Science Foundation Network<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-td\">Network developed by the National Science Foundation in 1986 as the \u201cbackbone\u201d of an internet infrastructure.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\r\n<p class=\"import-td\">TCP\/IP<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\r\n<p class=\"import-td\">Transmission Control Protocol \/ Internet Protocol<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\r\n<p class=\"import-td\">A standardized set of rules for delivering data across a digital network.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<\/div>\r\n<h2 class=\"import-th\"><span style=\"text-align: initial; font-size: 1em;\">The Shift to Participatory Media<\/span><\/h2>\r\n<p class=\"import-paft\">One last historical shift is especially relevant to the scope of this book: that from traditional media, in which audiences took a passive role in their media consumption, to digital media, in which users are actively searching for the information they want and contributing to the pool of information with their own posts, shares, and comments. While this is such common practice in our current daily lives that it hardly seems remarkable, it\u2019s particularly significant when we consider the larger historical context of censorship, in which institutions with centralized authority\u2014such as the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId70\" href=\"https:\/\/www.worldhistory.org\/article\/2018\/index-of-prohibited-books\/\"><span class=\"import-url\">Catholic church in the <\/span><span class=\"import-url\">fourteen<\/span><span class=\"import-url\">th century<\/span><\/a><\/span> (Mark) or the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId71\" href=\"https:\/\/machronicle.com\/the-history-of-censorship-in-america\/\"><span class=\"import-url\">American government during the colonial period<\/span><\/a><\/span> (Lokey)\u2014controlled the flow of information to the masses. In fact, the invention of the Gutenberg Press in 1445 and the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId72\" href=\"https:\/\/blog.ung.edu\/press\/the-creation-of-the-printing-press\/\"><span class=\"import-url\">subsequent increase in literacy rates<\/span><\/a><\/span> (Ormond) was considered a threat to the centralized authority of the church because people had more direct access to information and could read and interpret that information for themselves\u2014and form their own opinions. You probably already know that literacy is a powerful tool for personal and intellectual growth, independence, and expression, which is why marginalized groups have historically been discouraged from reading (e.g., <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId73\" href=\"https:\/\/oaklandliteracycoalition.org\/literacy-by-any-means-necessary-the-history-of-anti-literacy-laws-in-the-u-s\/\"><span class=\"import-url\">anti<\/span><span class=\"import-url\">-<\/span><span class=\"import-url\">literacy laws for <\/span><span class=\"import-url\">slaves<\/span><\/a><\/span>) and especially from writing about their own experiences and perspectives (Maddox; <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId74\" href=\"https:\/\/www.americanantiquarian.org\/proceedings\/44525153.pdf\"><span class=\"import-url\">Monaghan<\/span><\/a><\/span>).<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">We could talk endlessly about how information has been distributed throughout history\u2014<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId75\" href=\"https:\/\/www.library.illinois.edu\/hpnl\/tutorials\/antebellum-newspapers-city\/\"><span class=\"import-url\">penny presses<\/span><\/a><\/span> and wire services, for instance (Illinois University Library), as well as more secretive and subversive methods (<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId76\" href=\"https:\/\/www.history.com\/news\/nat-turner-rebellion-literacy-slavery\"><span class=\"import-url\">Coleman<\/span><\/a><\/span>; <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId77\" href=\"http:\/\/www.harriet-tubman.org\/songs-of-the-underground-railroad\/\"><span class=\"import-url\">Harriet Tubman Historical Society<\/span><\/a><\/span>)\u2014and the social effect this information had, such as <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId78\" href=\"https:\/\/www.mtsu.edu\/first-amendment\/article\/1253\/yellow-journalism\"><span class=\"import-url\">yellow journalism<\/span><\/a><\/span> (Ferguson III), <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId79\" href=\"https:\/\/www.oxfordbibliographies.com\/view\/document\/obo-9780199756841\/obo-9780199756841-0211.xml\"><span class=\"import-url\">muckraking<\/span><\/a><\/span> (Schiffrin), <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId80\" href=\"https:\/\/publicdomainreview.org\/collection\/yellow-journalism-the-fake-news-of-the-19th-century\"><span class=\"import-url\">civic unrest<\/span><\/a><\/span> (Green), and <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId81\" href=\"https:\/\/www.history.com\/news\/nat-turner-rebellion-literacy-slavery\"><span class=\"import-url\">social movements<\/span><\/a><\/span> (Coleman). What seems most important is that the flow of information had a profound effect on people\u2019s thought patterns and worldviews, and the struggle to control that flow of information escalated as more people\u2014usually professional writers\u2014were able to publish their ideas. Further, as traditional media expanded to include radio and television, the amount of information people had access to grew exponentially. Suddenly, people could tune in from the comfort of their living rooms to watch their favorite show, learn about news events across the globe, and even hear directly from the president himself. However, it was a one-way line of communication. People themselves had very little control over the content that was widely dispersed for public consumption. They could tune in or not tune in, read the morning paper or not, but it made no difference in the content itself, and to miss out on the latest news would mean falling behind in public affairs and being left out of the social discourse.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Importantly, the limitations of traditional media stemmed from the technology that was available. Traditional media, also known as legacy media, included newspapers, books, magazines, radio, and television\u2014all of which were defined by key characteristics:<\/p>\r\n\r\n<ul>\r\n \t<li class=\"import-blf\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Intended for a mass audience.<\/strong><\/span> The same information was available to everyone, without distinction, and people couldn\u2019t pick and choose the type of information that seemed most relevant or interesting to them.<\/li>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Limited space.<\/strong><\/span> A television or radio broadcast could only fit so much information into a 30-minute segment. Newspapers, books, and magazines were likewise limited by the amount of space available on the page.<\/li>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Linear format.<\/strong><\/span> No matter the publication, there was always a clear beginning and a clear ending, and people consumed the information in straightforward, chronological order.<\/li>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Fixed.<\/strong><\/span> Once something was published, it was permanently set on the page or the film. It couldn\u2019t be revised.<\/li>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Noninteractive<\/strong><strong class=\"import-b\">.<\/strong><\/span> Audience members could only receive information. There was no way to participate in the conversation.<\/li>\r\n \t<li class=\"import-bll\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Limited access.<\/strong><\/span> Because of the limitations already listed, the role of producing information was reserved for professionals in the industry\u2014journalists, news anchors, actors\/actresses, novelists. There was very little opportunity for everyday people to have their voices heard on a mass scale.<\/li>\r\n<\/ul>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Obviously, digital media ushered in a new era that dramatically altered the relationship between everyday citizens and the flow of information. The emergence of the World Wide Web, cable television, social media, and an onslaught of digital devices that make it possible for people to easily and quickly access the internet from almost anywhere has shifted our role from passive to active. People can actively search for the type of information they are looking for and cultivate an online repertoire of resources that fit their interests and perspectives. They can also contribute to the vast body of information that is available on the internet\u2014without needing special credentials or authorization. In direct contrast to the limitations of traditional media, digital media is defined by qualities that invite user participation:<\/p>\r\n\r\n<ul>\r\n \t<li class=\"import-blf\"><strong>Personalized<\/strong> based on online habits, interests, and the ability to customize your news feed.<\/li>\r\n \t<li class=\"import-bl\"><strong>Unlimited space<\/strong>. The information available online is immeasurable and continues to expand.<\/li>\r\n \t<li class=\"import-bl\"><strong>Nonlinear formatting<\/strong> as information is increasingly hyperlinked and put into chunks that can be viewed in any order.<\/li>\r\n \t<li class=\"import-bl\"><strong>Fluid<\/strong>. Information posted to the internet can easily be updated.<\/li>\r\n \t<li class=\"import-bll\"><strong>Interactive<\/strong> as people like, share, and comment on the information that is posted and can easily post their own information.<\/li>\r\n<\/ul>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">In so many ways, we have come full circle from the era of the Gutenberg Press. As new technologies emerge, they have completely revolutionized the way that we access information, which in turn has a deep and pervasive effect on our ways of thinking, being, and interacting with the world. Once again, as more voices emerge to share new ideas and perspectives, we often sacrifice quality for quantity and must question the credibility of information that is available. And once more, despite the purpose of the World Wide Web to be a marketplace for ideas and social progress, we must recognize the continuing (though certainly evolving) epic battle to control the flow of information and thought patterns for self-serving purposes.<\/p>\r\n\r\n<div class=\"textbox textbox--exercises\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Activity 1.1<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nReview the history of digital media as outlined in this chapter and make a list of key dates and events that you think are most important in understanding our current digital media practices. You might also add events to your list by reading sources that are linked in the text or by conducting your own research.\r\n\r\nOnce you\u2019ve created your list, create some sort of visual representation of the events you\u2019ve selected (a timeline, for instance, or a web). You can draw your visual representation. Or, ideally, you can use Canva, Photoshop, or some other design application of your choice to create a graphic that is informative, easy to understand, and visually appealing.\r\n\r\nYou will share your visual and explain the choices you made.\r\n\r\n<\/div>\r\n<\/div>\r\n<h1 class=\"import-ah\">Looking Ahead: The Framework for This Textbook<\/h1>\r\n<p class=\"import-paft\">At first glance, the topic of digital writing seems fairly straightforward. In fact, it\u2019s true in some ways that digital writing is similar to traditional print media and that some writing skills and strategies will be similar. However, digital writing is also different from traditional forms of writing in fundamental ways and, therefore, often requires different strategies and skills, which we\u2019ll explore in-depth throughout this textbook. However, as discussed in the beginning of this chapter, the goal of this textbook is about more than <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">how<\/em><\/span> to apply certain strategies in digital spaces, but also <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">why<\/em><\/span> and <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">to what effect<\/em><\/span>. It\u2019s about having a deeper theoretical and ethical understanding of the communication choices you make, which will afford you greater intentionality and precision, not just in the things you write but in your interactions with other people and in your own literacy practices. To that end, the textbook casts a wider net to include both practice and theory, challenging readers to think critically about the opportunities that digital media affords as well as the challenges it presents to mental health, civil discourse, social justice, privacy, and so on.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The book is divided into three sections, mirroring the organizational structure of Stuart Selber\u2019s <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Multiliteracies for a Digital Age<\/em><\/span>, which focuses more broadly on computer literacy and targets writing and communication teachers in higher education. However, Selber emphasizes the need to extend conversations about digital literacy far beyond a simple and prescriptive how-to guide. He writes, \u201cIt is clear\u2026that computer literacy programs can take a rather monolithic and one-dimensional approach, ignoring the fact that computer technologies are embedded in a wide range of constitutive contexts, as well as entangled in value systems\u201d (22). In other words, an effective educational approach to digital literacy provides critical-thinking tools that can be applied to different situations and guide a more informed decision-making process based on the context at hand. In that spirit, this textbook offers a top-down approach to writing for digital media by examining three different literacies:<\/p>\r\n\r\n<ol>\r\n \t<li><strong>Critical literacy<\/strong>, which challenges readers to think deeply about the affordances and constraints of digital media, their own practices, and the social ramifications of communication that takes place on digital platforms. In this first section, the word \u201ccritical\u201d has two meanings. It relates to <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">critical thinking<\/em><\/span> about relevant theories that can be used as lenses to examine social norms and personal habits of digital media use from a variety of perspectives. It also relates to <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">critical theory<\/em><\/span>, which focuses on power structures and cultural biases that marginalize certain groups of people while privileging others. The chapters in this first section are intended to provide deeper insights and new ways of thinking about digital media use that will inform the rest of the book.<\/li>\r\n \t<li><strong>Rhetorical literacy<\/strong>, which situates digital media as a communication tool that mediates between writers and their audiences, helping them to convey important ideas and perspectives as clearly as possible. All communication is about forging an understanding. Rhetoric is the study of how language (both verbal and nonverbal) is used in that endeavor, paying special attention to how a message is crafted by a speaker to engage a specific audience to fulfill key purpose(s) in a particular situation. This section of the book focuses on rhetorical considerations and strategies that make a message successful, particularly given the range of digital platforms and tools that are available.<\/li>\r\n \t<li><strong>Functional literacy<\/strong>, which is the nuts and bolts of digital writing, providing guidelines, best practices, and design strategies for a variety of genres. The last section also gives important information about content strategy, search engine optimization, copyright laws, accessibility considerations, and basic editing rules. In essence, this is the <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">how-to<\/em><\/span> part of the textbook that builds from the theoretical and rhetorical considerations of the previous sections.<\/li>\r\n<\/ol>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">If you are familiar with Selber\u2019s work, you might notice that this organization of sections is different from his as he begins with functional and then moves on to critical and then rhetorical. This book begins with critical literacy (arguably the most complex and theoretical) followed by rhetorical literacy because having this type of deeper awareness and reflection should be foundational in guiding the specific writing choices you make, bringing certain issues into focus and informing strategies that will align with your values and resonate more deeply with your audience.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Obviously, digital media is always evolving. The historical shifts outlined in this first chapter are evidence of how quickly digital media has emerged to transform our daily lives. And there\u2019s no telling what digital innovations will arise in the years to come. The goal of this textbook is to provide a foundation of intellectual processes and rhetorical considerations that are flexible and easily adapted to a variety of circumstances, so that as new technologies evolve, so will you.<\/p>\r\n\r\n<div class=\"textbox textbox--examples\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Discussion Questions<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ol>\r\n \t<li>Reflect on your own digital media practices. What types of reading and writing do you do most often? How would your life be different without digital media?<\/li>\r\n \t<li>Review the list of learning standards published by the International Society for Technology in Education (ISTE). Can you come up with specific examples of each objective? How would you rank your own skills in each category?<\/li>\r\n \t<li>Summarize the primary concerns outlined by Tim Berners-Lee in his open letter. In your opinion, which ones seem the most detrimental? Why? Are there other concerns about the state of the World Wide Web that you would add to the list?<\/li>\r\n \t<li>What do you find most surprising about the history of digital media and the ways that technologies have evolved?<\/li>\r\n \t<li>Discuss the advantages and disadvantages of the commercialization of the internet.<\/li>\r\n \t<li>Give some examples of how commercialization and privatization affect your own digital experiences.<\/li>\r\n \t<li>How are the social and intellectual effects of the printing press similar to those of digital media?<\/li>\r\n \t<li>How and why have powerful organizations throughout history controlled the flow of public information? What is your reaction to claims that powerful corporations control the vast majority of information available?<\/li>\r\n \t<li>Summarize the three types of literacies that form the textbook\u2019s framework. Why is it beneficial to study digital writing using this top-down approach?<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Sources<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Anyoha, Rockwell. \u201cThe History of Artificial Intelligence.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">SITNBoston<\/em><\/span>, 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId82\" href=\"https:\/\/sitn.hms.harvard.edu\/flash\/2017\/history-artificial-intelligence\/\"><span class=\"import-url\">https:\/\/sitn.hms.harvard.edu\/flash\/2017\/history-artificial-intelligence\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Andreessen, Marc. \u201cMosaic: The First Global Web Browser.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">LivingInternet.com<\/em><\/span>, 20 Feb. 1993, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId83\" href=\"https:\/\/www.livinginternet.com\/w\/wi_mosaic.htm\"><span class=\"import-url\">https:\/\/www.livinginternet.com\/w\/wi_mosaic.htm<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Apple. \u201ciPhone 3G Commercial: \u2018There\u2019s an App for That\u2019 2009.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">YouTube<\/em><\/span>, 4 Feb. 2009, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId84\" href=\"https:\/\/www.youtube.com\/watch?v=szrsfeyLzyg\"><span class=\"import-url\">https:\/\/www.youtube.com\/watch?v=szrsfeyLzyg<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Berners-Lee, Tim. \u201c30 Years On, What\u2019s Next #ForTheWeb?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Web Foundation<\/em><\/span>, 12 Mar. 2019, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId85\" href=\"https:\/\/webfoundation.org\/2019\/03\/web-birthday-30\/\"><span class=\"import-url\">https:\/\/webfoundation.org\/2019\/03\/web-birthday-30\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">BroadbandSearch. \u201cKey Internet Statistics to Know in 2022 (Including Mobile).\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Broadband Search<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId86\" href=\"https:\/\/www.broadbandsearch.net\/blog\/internet-statistics\"><span class=\"import-url\">https:\/\/www.broadbandsearch.net\/blog\/internet-statistics<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Chadd, Katie. \u201cThe History of Cybercrime and Cybersecurity, 1940\u20132020.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Cybercrime Magazine<\/em><\/span>, 30 Nov. 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId87\" href=\"https:\/\/cybersecurityventures.com\/the-history-of-cybercrime-and-cybersecurity-1940-2020\/\"><span class=\"import-url\">https:\/\/cybersecurityventures.com\/the-history-of-cybercrime-and-cybersecurity-1940-2020\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Chen, Lingjao, et al. \u201cHow Is ChatGPT\u2019s Behavior Changing over Time?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Arxiv.org<\/em><\/span>, 1 Aug. 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId88\" href=\"https:\/\/doi.org\/10.48550\/arXiv.2307.09009\"><span class=\"import-url\">https:\/\/doi.org\/10.48550\/arXiv.2307.09009<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Cision. \u201cSmall Businesses Value Social Media over All Other Digital Marketing Channels.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Cision PR Newswire<\/em><\/span>, 21 Mar. 2022.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Coleman, Colette. \u201cHow Literacy Became a Powerful Weapon in the Fight to End Slavery.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">History.com<\/em><\/span>, 11 July 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId89\" href=\"https:\/\/www.history.com\/news\/nat-turner-rebellion-literacy-slavery\"><span class=\"import-url\">https:\/\/www.history.com\/news\/nat-turner-rebellion-literacy-slavery<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Copeland, B. J. \u201cColossus Computer.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Encyclopedia Britannica<\/em><\/span>, 16 Aug. 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId90\" href=\"https:\/\/www.britannica.com\/technology\/Colossus-computer\"><span class=\"import-url\">https:\/\/www.britannica.com\/technology\/Colossus-computer<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Cramer-Flood, Ethan. \u201cUS Time Spent with Media Forecast 2023: A Slight Decline Overall, Even as CTV Time Surges, and Digital Video Finally Overtakes TV.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Business Insider<\/em><\/span>, 11 July 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId91\" href=\"https:\/\/www.insiderintelligence.com\/content\/us-time-spent-with-media-forecast-2023\"><span class=\"import-url\">https:\/\/www.insiderintelligence.com\/content\/us-time-spent-with-media-forecast-2023<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Dominquez, Amanda. \u201cInternet Relay Chat.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">NYU.edu<\/em><\/span>, n.d., <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId92\" href=\"https:\/\/kimon.hosting.nyu.edu\/physical-electrical-digital\/items\/show\/1363\"><span class=\"import-url\">https:\/\/kimon.hosting.nyu.edu\/physical-electrical-digital\/items\/show\/1363<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Eadicicco, Lisa. \u201cThis Is Why the iPhone Upended the Tech Industry.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Time<\/em><\/span>, 29 June 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId93\" href=\"https:\/\/time.com\/4837176\/iphone-10th-anniversary\/\"><span class=\"import-url\">https:\/\/time.com\/4837176\/iphone-10th-anniversary\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Encyclopedia Britannica. \u201cDSL Networking Technology.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Encyclopedia Britannica<\/em><\/span>, 16 Nov. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId94\" href=\"https:\/\/www.britannica.com\/technology\/DSL\"><span class=\"import-url\">https:\/\/www.britannica.com\/technology\/DSL<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cUSENET: Internet Discussion Network.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Encyclopedia Britannica<\/em><\/span>, 17 May 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId95\" href=\"https:\/\/www.britannica.com\/technology\/USENET\"><span class=\"import-url\">https:\/\/www.britannica.com\/technology\/USENET<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cWeb 2.0 Internet.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Encyclopedia Britannica<\/em><\/span>, 7 Sept. 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId96\" href=\"https:\/\/www.britannica.com\/topic\/Web-20\"><span class=\"import-url\">https:\/\/www.britannica.com\/topic\/Web-20<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Ferguson III, Cleveland. \u201cYellow Journalism.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The First Amendment Encyclopedia<\/em><\/span>, 2009, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId97\" href=\"https:\/\/www.mtsu.edu\/first-amendment\/article\/1253\/yellow-journalism\"><span class=\"import-url\">https:\/\/www.mtsu.edu\/first-amendment\/article\/1253\/yellow-journalism#:~:text=Yellow%20journalism%20usually%20refers%20to,unconventional%20techniques%20of%20their%20rival<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Fortune Business Insights. \u201cCybersecurity Market Size, Share, and Covid19 Impact Analysis\u2026\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Fortune Business Insights<\/em><\/span>, n.d., <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId98\" href=\"https:\/\/www.fortunebusinessinsights.com\/industry-reports\/cyber-security-market-101165\"><span class=\"import-url\">https:\/\/www.fortunebusinessinsights.com\/industry-reports\/cyber-security-market-101165<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Fruhlinger, Josh. \u201cWhat Is IoT? The Internet of Things Explained.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Network World<\/em><\/span>, 7 Aug. 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId99\" href=\"https:\/\/www.networkworld.com\/article\/3207535\/what-is-iot-the-internet-of-things-explained.html\"><span class=\"import-url\">https:\/\/www.networkworld.com\/article\/3207535\/what-is-iot-the-internet-of-things-explained.html<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Goodman, Carly. \u201cCommercialization Brought the Internet to the Masses. It Also Gave Us Spam.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Washington Post<\/em><\/span>, 4 Aug. 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId100\" href=\"https:\/\/www.washingtonpost.com\/news\/made-by-history\/wp\/2017\/08\/04\/commercialization-brought-the-internet-to-the-masses-it-also-gave-us-spam\/\"><span class=\"import-url\">https:\/\/www.washingtonpost.com\/news\/made-by-<\/span><span class=\"import-url\">history\/wp\/2017\/08\/04\/commercialization-brought-the-internet-to-the-masses-it-also-gave-us-spam\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Google. \u201cFrom the Garage to the Googleplex.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Google<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId101\" href=\"https:\/\/about.google\/our-story\/\"><span class=\"import-url\">https:\/\/about.google\/our-story\/#:~:text=In%20August%201998%2C%20Sun%20co,was%20officially%20born<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Green, Adam. \u201cYellow Journalism: The \u2018Fake News\u2019 of the 19th Century.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The Public Domain Review<\/em><\/span>, 21 Feb. 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId102\" href=\"https:\/\/publicdomainreview.org\/collection\/yellow-journalism-the-fake-news-of-the-19th-century\"><span class=\"import-url\">https:\/\/publicdomainreview.org\/collection\/yellow-journalism-the-fake-news-of-the-19th-century<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Grossman, David. \u201cHow Machine Learning Lets Robots Teach Themselves.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Popular Mechanics<\/em><\/span>, 19 Dec. 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId103\" href=\"https:\/\/www.popularmechanics.com\/technology\/robots\/a14457503\/how-machine-learning-lets-robots-teach-themselves\/\"><span class=\"import-url\">https:\/\/www.popularmechanics.com\/technology\/robots\/a14457503\/how-machine-learning-lets-robots-teach-themselves\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Harriet Tubman Historical Society. \u201cSongs of the Underground Railroad.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Harriet Tubman Historical Society<\/em><\/span>, n.d., <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId104\" href=\"http:\/\/www.harriet-tubman.org\/songs-of-the-underground-railroad\/\"><span class=\"import-url\">http:\/\/www.harriet-tubman.org\/songs-of-the-underground-railroad\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Hempel, Jessi. \u201cSocial Media Made the Arab Spring, But Couldn\u2019t Save It.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Wired<\/em><\/span>, 26 Jan. 2016, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId105\" href=\"https:\/\/www.wired.com\/2016\/01\/social-media-made-the-arab-spring-but-couldnt-save-it\/\"><span class=\"import-url\">https:\/\/www.wired.com\/2016\/01\/social-media-made-the-arab-spring-but-couldnt-save-it\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Hess, Amanda. \u201cHow Privacy Became a Commodity for the Rich and Powerful.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">New York Times<\/em><\/span>, 9 May 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId106\" href=\"https:\/\/www.nytimes.com\/2017\/05\/09\/magazine\/how-privacy-became-a-commodity-for-the-rich-and-powerful.html\"><span class=\"import-url\">https:\/\/www.nytimes.com\/2017\/05\/09\/magazine\/how-privacy-became-a-commodity-for-the-rich-and-powerful.html<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">History.com. \u201cThe Invention of the Internet.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">History.com<\/em><\/span>, 28 Oct. 2019, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId107\" href=\"https:\/\/www.history.com\/topics\/inventions\/invention-of-the-internet\"><span class=\"import-url\">https:\/\/www.history.com\/topics\/inventions\/invention-of-the-internet#:~:text=The%20internet%20got%20its%20start,share%20data%20with%20one%20another<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Illinois University Library. \u201cAmerican Newspapers, 1800\u20131860: City Newspapers.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Illinois University Library<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId108\" href=\"https:\/\/www.library.illinois.edu\/hpnl\/tutorials\/antebellum-newspapers-city\/\"><span class=\"import-url\">https:\/\/www.library.illinois.edu\/hpnl\/tutorials\/antebellum-newspapers-city\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">International Society for Technology in Education. \u201cAbout.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">ISTE.org<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId109\" href=\"https:\/\/www.iste.org\/about\/about-iste\"><span class=\"import-url\">https:\/\/www.iste.org\/about\/about-iste<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cISTE Standards: Students.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">ISTE.org<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId110\" href=\"https:\/\/www.iste.org\/standards\/iste-standards-for-students\"><span class=\"import-url\">https:\/\/www.iste.org\/standards\/iste-standards-for-students<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Kataria, Maitrik. \u201cApp Usage Statistics 2022 That\u2019ll Surprise You (Updated).\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Simform<\/em><\/span>, 4 Jan. 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId111\" href=\"https:\/\/www.simform.com\/blog\/the-state-of-mobile-app-usage\/\"><span class=\"import-url\">https:\/\/www.simform.com\/blog\/the-state-of-mobile-app-usage\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Koetsier, John. \u201cE-Commerce Retail Just Passed $1 Trillion for the First Time Ever.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Forbes<\/em><\/span>, 29 Jan. 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId112\" href=\"https:\/\/www.forbes.com\/sites\/johnkoetsier\/2023\/01\/28\/e-commerce-retail-just-passed-1-trillion-for-the-first-time-ever\/?sh=bff541a36df2\"><span class=\"import-url\">https:\/\/www.forbes.com\/sites\/johnkoetsier\/2023\/01\/28\/e-commerce-retail-just-passed-1-trillion-for-the-first-time-ever\/?sh=bff541a36df2<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Koetsier, John. \u201cGlobal Online Content Consumption Doubled in 2020.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Forbes<\/em><\/span>, 26 Sept. 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId113\" href=\"https:\/\/www.forbes.com\/sites\/johnkoetsier\/2020\/09\/26\/global-online-content-consumption-doubled-in-2020\/?sh=d429c9e2fdeb\"><span class=\"import-url\">https:\/\/www.forbes.com\/sites\/johnkoetsier\/2020\/09\/26\/global-online-content-consumption-doubled-in-2020\/?sh=d429c9e2fdeb<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Legal Information Institute. \u201c42 U.S. Code \u00a7 1862\u2014Functions.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Cornell Law School<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId114\" href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/42\/1862\"><span class=\"import-url\">https:\/\/www.law.cornell.edu\/uscode\/text\/42\/1862<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Lokey, Fiona. \u201cThe History of Censorship in America.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">M-A Chronicle<\/em><\/span>, 5 Oct. 2016, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId115\" href=\"https:\/\/machronicle.com\/the-history-of-censorship-in-america\/\"><span class=\"import-url\">https:\/\/machronicle.com\/the-history-of-censorship-in-america\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Louise, Nickie. \u201cThese 6 Corporations Control 90% of the Media Outlets in America: The Illusion of Choice and Objectivity.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Tech.com<\/em><\/span>, 18 Sept. 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId116\" href=\"https:\/\/techstartups.com\/2020\/09\/18\/6-corporations-control-90-media-america-illusion-choice-objectivity-2020\/\"><span class=\"import-url\">https:\/\/techstartups.com\/2020\/09\/18\/6-corporations-control-90-media-america-illusion-choice-objectivity-2020\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Lutz, Ashley. \u201cThese 6 Corporations Control 90% of the Media in America.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Business Insider<\/em><\/span>, 14 June 2012, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId117\" href=\"https:\/\/www.businessinsider.com\/these-6-corporations-control-90-of-the-media-in-america-2012-6\"><span class=\"import-url\">https:\/\/www.businessinsider.com\/these-6-corporations-control-90-of-the-media-in-america-2012-6<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Maddox, Carliss. \u201cLiteracy by Any Means Necessary: The History of Anti-Literacy Laws in the U.S.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Oakland Literacy Coalition<\/em><\/span>, 12 Jan. 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId118\" href=\"https:\/\/oaklandliteracycoalition.org\/literacy-by-any-means-necessary-the-history-of-anti-literacy-laws-in-the-u-s\/\"><span class=\"import-url\">https:\/\/oaklandliteracycoalition.org\/literacy-by-any-means-necessary-the-history-of-anti-literacy-laws-in-the-u-s\/#:~:text=Anti%2Dliteracy%20laws%20made%20it,color%20to%20read%20or%20write<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Mark, Joshua. \u201cIndex of Prohibited Books.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">WorldHistory.org<\/em><\/span>, 21 June 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId119\" href=\"https:\/\/www.worldhistory.org\/article\/2018\/index-of-prohibited-books\/\"><span class=\"import-url\">https:\/\/www.worldhistory.org\/article\/2018\/index-of-prohibited-books\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Michaelsen, Frithjof, et al. \u201cThe Impact of Influencers on Advertising and Consumer Protection in the Single Market.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Policy Department for Economic, Scientific and Quality of Life Policies<\/em><\/span>, Feb. 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId120\" href=\"https:\/\/www.europarl.europa.eu\/RegData\/etudes\/STUD\/2022\/703350\/IPOL_STU(2022)703350_EN.pdf\"><span class=\"import-url\">https:\/\/www.europarl.europa.eu\/RegData\/etudes\/STUD\/2022\/703350\/IPOL_STU(2022)703350_EN.pdf<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Monaghan, E. Jennifer. \u201cReading for the Enslaved, Writing for the Free: Reflections on Liberty and Literacy.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">James Russell Wiggins Lecture in the History of the Book in American Culture<\/em><\/span>, Antiquarian Society, 6 Nov. 1998, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId121\" href=\"https:\/\/www.americanantiquarian.org\/proceedings\/44525153.pdf\"><span class=\"import-url\">https:\/\/www.americanantiquarian.org\/proceedings\/44525153.pdf<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">National Center for Education Statistics. \u201cFast Facts: Distance Learning.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Institute of Educational Practices<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId122\" href=\"https:\/\/nces.ed.gov\/fastfacts\/display.asp?id=80\"><span class=\"import-url\">https:\/\/nces.ed.gov\/fastfacts\/display.asp?id=80<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">National Museum of Computing. \u201cColossus.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Tnmoc.org<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId123\" href=\"https:\/\/www.tnmoc.org\/colossus\"><span class=\"import-url\">https:\/\/www.tnmoc.org\/colossus#:~:text=Colossus%2C%20however%2C%20was%20the%20first,Manchester%20Small%20Scale%20Experimental%20Machine<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cColossus Decrypts to be Revealed After 75 Years.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Tnmoc.org<\/em><\/span>, 19 Feb. 2019, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId124\" href=\"https:\/\/www.tnmoc.org\/news-releases\/2019\/2\/5\/colossus-decrypts-to-be-revealed-after-75-years\"><span class=\"import-url\">https:\/\/www.tnmoc.org\/news-releases\/2019\/2\/5\/colossus-decrypts-to-be-revealed-after-75-years#:~:text=The%20full%20impact%20of%20Colossus,of%20such%20complexity%20using%20valves<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">National Science Foundation. \u201cA Brief History of NSF and the Internet.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">NSF.gov<\/em><\/span>, 13 Aug. 2003, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId125\" href=\"https:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=103050\"><span class=\"import-url\">https:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=103050<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cThe Internet\u2014Nifty 50.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">NSF.gov<\/em><\/span>, 2000, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId126\" href=\"https:\/\/www.nsf.gov\/about\/history\/nifty50\/theinternet.jsp\"><span class=\"import-url\">https:\/\/www.nsf.gov\/about\/history\/nifty50\/theinternet.jsp#:~:text=Internet%20 expansion,expansion%20in%20that%20very%20month<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Nott, George. \u201cFather of the Internet Vint Cerf: IPv4 Was Never Production Version.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Computerworld.com<\/em><\/span>, 2 July 2018, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId127\" href=\"https:\/\/www2.computerworld.com.au\/article\/643174\/father-internet-vint-cerf-ipv4-never-production-version\/\"><span class=\"import-url\">https:\/\/www2.computerworld.com.au\/article\/643174\/father-internet-vint-cerf-ipv4-never-production-version\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Ormond, Cullen. \u201cThe Creation of the Printing Press.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">UNG University Press<\/em><\/span>, 18 July 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId128\" href=\"https:\/\/blog.ung.edu\/press\/the-creation-of-the-printing-press\/\"><span class=\"import-url\">https:\/\/blog.ung.edu\/press\/the-creation-of-the-printing-press\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">O\u2019Sullivan, Donie. \u201cHow the Cell Phones of Spring Breakers Who Flouted Coronavirus Warnings Were Tracked.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">CNN Business<\/em><\/span>, 4 Apr. 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId129\" href=\"https:\/\/www.cnn.com\/2020\/04\/04\/tech\/location-tracking-florida-coronavirus\/index.html\"><span class=\"import-url\">https:\/\/www.cnn.com\/2020\/04\/04\/tech\/location-tracking-florida-coronavirus\/index.html<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Our World In Data. \u201cDaily Hours Spent with Digital Media.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Wikimedia Commons<\/em><\/span>, 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId130\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Daily_hours_spent_with_digital_media,_OWID.svg\"><span class=\"import-url\">https:\/\/commons.wikimedia.org\/wiki\/File:Daily_hours_spent_with_digital_media,_OWID.svg<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Petriglieri, Gianpiero, et al. \u201cThriving in the Gig Economy.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Harvard Business Review<\/em><\/span>, Mar.-Apr. 2018, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId131\" href=\"https:\/\/hbr.org\/2018\/03\/thriving-in-the-gig-economy\"><span class=\"import-url\">https:\/\/hbr.org\/2018\/03\/thriving-in-the-gig-economy<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Pew Research Center. \u201cMobile Fact Sheet.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Pew Research<\/em><\/span>, 7 Apr. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId132\" href=\"https:\/\/www.pewresearch.org\/internet\/fact-sheet\/mobile\/\"><span class=\"import-url\">https:\/\/www.pewresearch.org\/internet\/fact-sheet\/mobile\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cNews Consumption across Social Media in 2021.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Pew Research<\/em><\/span>, 20 Sept. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId133\" href=\"https:\/\/www.pewresearch.org\/journalism\/2021\/09\/20\/news-consumption-across-social-media-in-2021\/\"><span class=\"import-url\">https:\/\/www.pewresearch.org\/journalism\/2021\/09\/20\/news-consumption-across-social-media-in-2021\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cSocial Media Fact Sheet.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Pew Research<\/em><\/span>, 8 Apr. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId134\" href=\"https:\/\/www.pewresearch.org\/internet\/fact-sheet\/social-media\/\"><span class=\"import-url\">https:\/\/www.pewresearch.org\/internet\/fact-sheet\/social-media\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cThe Rise in Apps Culture.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Pew Research<\/em><\/span>, 14 Sept. 2010, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId135\" href=\"https:\/\/www.pewresearch.org\/internet\/2010\/09\/14\/the-rise-of-apps-culture\/\"><span class=\"import-url\">https:\/\/www.pewresearch.org\/internet\/2010\/09\/14\/the-rise-of-apps-culture\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Saad, Lydia, and Ben Wigert. \u201cRemote Work Persisting and Trending Permanent.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Gallup<\/em><\/span>, 13 Oct. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId136\" href=\"https:\/\/news.gallup.com\/poll\/355907\/remote-work-persisting-trending-permanent.aspx\"><span class=\"import-url\">https:\/\/news.gallup.com\/poll\/355907\/remote-work-persisting-trending-permanent.aspx<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Selber, Stuart. <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Multiliteracies for a Digital Age<\/em><\/span>. Southern Illinois University Press, 2004.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Schiffrin, Anya. \u201cMuckraking.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Oxford Bibliographies<\/em><\/span>, 24 July 2018, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId137\" href=\"https:\/\/www.oxfordbibliographies.com\/view\/document\/obo-9780199756841\/obo-9780199756841-0211.xml\"><span class=\"import-url\">https:\/\/www.oxfordbibliographies.com\/view\/document\/obo-9780199756841\/obo-9780199756841-0211.xml<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Schuster, Jenna. \u201cA Brief History of Internet Service Providers.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Internet Archive<\/em><\/span>, 10 June 2016, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId138\" href=\"https:\/\/web.archive.org\/web\/20190428045452\/https:\/\/www.exede.com\/blog\/brief-history-internet-service-providers\/\"><span class=\"import-url\">https:\/\/web.archive.org\/web\/20190428045452\/https:\/\/www.exede.com\/blog\/brief-history-internet-service-providers\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Shao, Grace. \u201cSocial Media Has Become a Battleground in Hong Kong\u2019s Protests.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">CNBC<\/em><\/span>, 16 Aug. 2016, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId139\" href=\"https:\/\/www.cnbc.com\/2019\/08\/16\/social-media-has-become-a-battleground-in-hong-kongs-protests.html\"><span class=\"import-url\">https:\/\/www.cnbc.com\/2019\/08\/16\/social-media-has-become-a-battleground-in-hong-kongs-protests.html<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Spotlite. \u201cHow Social Media Has Helped the Ukraine Humanitarian Crisis.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Spotlite<\/em><\/span>, 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId140\" href=\"https:\/\/gospotlite.com\/blog\/social-media-helped-in-the-ukraine-humanitarian-crisis\"><span class=\"import-url\">https:\/\/gospotlite.com\/blog\/social-media-helped-in-the-ukraine-humanitarian-crisis<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Star, Danny. \u201cAn Abbreviated History Of SEO and What It Tells Us about SEO\u2019s Future Role.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Forbes<\/em><\/span>, 28 Feb. 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId141\" href=\"https:\/\/www.forbes.com\/sites\/forbesagencycouncil\/2020\/02\/28\/an-abbreviated-history-of-seo-and-what-it-tells-us-about-seos-future-role\/?sh=40575c6d11ef\"><span class=\"import-url\">https:\/\/www.forbes.com\/sites\/forbesagencycouncil\/2020\/02\/28\/an-abbreviated-history-of-seo-and-what-it-tells-us-about-seos-future-role\/?sh=40575c6d11ef<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Sundararajan, Arun. \u201cThe Gig Economy\u2019 Is Coming. What Will It Mean for Work?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The <\/em><em class=\"import-i\">Guardian<\/em><\/span>, 26 July 2015, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId142\" href=\"https:\/\/www.theguardian.com\/commentisfree\/2015\/jul\/26\/will-we-get-by-gig-economy\"><span class=\"import-url\">https:\/\/www.theguardian.com\/commentisfree\/2015\/jul\/26\/will-we-get-by-gig-economy<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Team Recurrency. \u201cThe IoT Data Explosion: How Big is the IoT Data Market?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Priceonomics<\/em><\/span>, 9 Jan. 2019, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId143\" href=\"https:\/\/priceonomics.com\/the-iot-data-explosion-how-big-is-the-iot-data\/\"><span class=\"import-url\">https:\/\/priceonomics.com\/the-iot-data-explosion-how-big-is-the-iot-data\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">UNESCO. \u201cArtificial Intelligence: Examples of Ethical Dilemmas.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">UNESCO<\/em><\/span>, 21 Apr. 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId144\" href=\"https:\/\/www.unesco.org\/en\/artificial-intelligence\/recommendation-ethics\/cases\"><span class=\"import-url\">https:\/\/www.unesco.org\/en\/artificial-intelligence\/recommendation-ethics\/cases#:~:text=AI%20is%20not%20neutral%3A%20AI,Rights%20and%20other%20fundamental%20values<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">U.S. Department of Commerce. \u201cQuarterly Retail E-Commerce Sales: 1st Quarter 2022.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Census.gov<\/em><\/span>, 19 May 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId145\" href=\"https:\/\/www.census.gov\/retail\/mrts\/www\/data\/pdf\/ec_current.pdf\"><span class=\"import-url\">https:\/\/www.census.gov\/retail\/mrts\/www\/data\/pdf\/ec_current.pdf<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">U.S. Securities and Exchange Commission. \u201cSEC Charges Kim Kardashian for Unlawfully Touting Crypto Security.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Securities and Exchange Commission<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId146\" href=\"https:\/\/www.sec.gov\/news\/press-release\/2022-183\"><span class=\"import-url\">https:\/\/www.sec.gov\/news\/press-release\/2022-183<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cSecurities Act of 1933.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Securities and Exchange Commission<\/em><\/span>, 24 Jan 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId147\" href=\"https:\/\/www.govinfo.gov\/content\/pkg\/COMPS-1884\/pdf\/COMPS-1884.pdf\"><span class=\"import-url\">https:\/\/www.govinfo.gov\/content\/pkg\/COMPS-1884\/pdf\/COMPS-1884.pdf<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Visualwebz. \u201cHistory of Google Analytics.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Medium<\/em><\/span>, 1 Dec. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId148\" href=\"https:\/\/seattlewebsitedesign.medium.com\/history-of-google-analytics-fb7b23b6dee0\"><span class=\"import-url\">https:\/\/seattlewebsitedesign.medium.com\/history-of-google-analytics-fb7b23b6dee0<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Wharton Staff. \u201cHow Social Media is Shaping Political Campaigns.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Knowledge at Wharton<\/em><\/span>, 17 Aug. 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId149\" href=\"https:\/\/knowledge.wharton.upenn.edu\/podcast\/knowledge-at-wharton-podcast\/how-social-media-is-shaping-political-campaigns\/\"><span class=\"import-url\">https:\/\/knowledge.wharton.upenn.edu\/podcast\/knowledge-at-wharton-podcast\/how-social-media-is-shaping-political-campaigns\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Wong, Belle. \u201cTop Social Media Statistics and Trends of 2023.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Forbes<\/em><\/span>, 18 May 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId150\" href=\"https:\/\/www.forbes.com\/advisor\/business\/social-media-statistics\/\"><span class=\"import-url\">https:\/\/www.forbes.com\/advisor\/business\/social-media-statistics\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">World Wide Web Foundation. \u201cHistory of the Web.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Web Foundation<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId151\" href=\"https:\/\/webfoundation.org\/about\/vision\/history-of-the-web\/\"><span class=\"import-url\">https:\/\/webfoundation.org\/about\/vision\/history-of-the-web\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Zuboff, Shoshana. <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The Age of Surveillance Capitalism<\/em><\/span>. Profile Books, 2019.<\/p>\r\n\r\n<\/div>\r\n<\/div>","rendered":"<p class=\"import-pf\">We\u2019ll begin our exploration into writing for digital media with a fundamental premise that is both obvious and profound: Digital media is <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">ubiquitous<\/em><\/span>. Something that is ubiquitous is everywhere, all the time. Constant. Its prevalence in our lives has deep and enduring consequences, though it\u2019s easy to become desensitized and overlook what those consequences might be. Our devices\u2014our cell phones, smart watches, digital assistants (e.g., Echo Dots), laptops, iPads, smart TVs\u2014are ubiquitous. For many of us, there isn\u2019t a single moment of the day when our cell phone isn\u2019t within arm\u2019s reach so that we can quickly, if not compulsively, check our email, respond to a text message, scroll through social media, read the latest news updates, and so on.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Certainly, we are in the digital age. Reports vary depending on demographics, but many studies, including <span style=\"border: none windowtext 0pt; padding: 0;\"><a href=\"https:\/\/www.forbes.com\/sites\/johnkoetsier\/2020\/09\/26\/global-online-content-consumption-doubled-in-2020\/?sh=5ee231742fde\"><span class=\"import-url\">this one<\/span><\/a><\/span><span style=\"border: none windowtext 0pt; padding: 0;\"><span class=\"import-url\"> from<\/span><em class=\"import-url\"> Forbes<\/em><\/span>, estimate that the average American spends nearly seven hours a day on some form of digital media (Koetsier, \u201cGlobal\u201d). This <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Forbes<\/em><\/span> article describes our usage as \u201cconsumption,\u201d which underscores the idea that we are perpetually compelled to engage in digital spaces and that we internalize those digital interactions as we form ideas about what is valuable or normal or true. So much of what we know about the world, from history to current events to every other subject imaginable, comes from the internet in some form. It not only provides information that helps shape our worldviews, beliefs, and identities, but it mediates most of our communication with other people, and it facilitates many of our daily activities, from ordering food to paying bills to finding the fastest route to our next destination. The word \u201cconsumption\u201d also highlights the commercial aspect of digital media. Not only is digital content a commodity, but users themselves have become commodities as organizations compete for more views, likes, shares, click-throughs, and subscribers.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">It\u2019s no wonder that digital literacy has become such an important topic. In this book, digital literacy is defined as the ability to engage with digital spaces in meaningful, productive, and ethical ways to achieve personal, professional, or civic goals. It includes the strategies we use to find and evaluate information. It also includes our ability to share information and respond to others thoughtfully, strategically, and respectfully. In other words, digital literacy is more than knowing <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">how<\/em><\/span>. Yes, it\u2019s important to know <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">how<\/em><\/span> to publish a website or <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">how<\/em><\/span> to create a social media post. However, it\u2019s equally important to know <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">why<\/em><\/span> you are making certain choices and <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">to what effect<\/em><\/span>. Of particular importance are the ethical consequences of those choices. While many digital writers and designers leverage their rhetorical skills effectively in order to manipulate, dismiss, confuse, and control their audience, this textbook emphasizes digital literacy as an opportunity to develop a deeper awareness of complex power structures and social injustices that are often ignored and to challenge the status quo.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The most recent <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId8\" href=\"https:\/\/www.iste.org\/standards\/iste-standards-for-students\"><span class=\"import-url\">student learning standards<\/span><\/a><\/span> published by the International Society for Technology in Education (ISTE) articulate the goals of digital literacy quite well. In acknowledging how important it is to prepare students \u201cto thrive in a constantly evolving technological landscape,\u201d ISTE identifies seven core objectives:<\/p>\n<ol>\n<li><strong>Empowered Learner<\/strong>: Students leverage technology to take an active role in choosing, achieving, and demonstrating competency in their learning goals.<\/li>\n<li><strong>Digital Citizen<\/strong>: Students recognize the rights; responsibilities; and opportunities of living, learning, and working in an interconnected digital world, and they act and model in ways that are safe, legal, and ethical.<\/li>\n<li><strong>Knowledge Constructor<\/strong>: Students critically curate a variety of resources using digital tools to construct knowledge, produce creative artifacts, and make meaningful learning experiences for themselves and others.<\/li>\n<li><strong>Innovative Designer<\/strong>: Students use a variety of technologies within a design process to identify and solve problems by creating new, useful, or imaginative solutions.<\/li>\n<li><strong>Computational Thinker<\/strong>: Students develop and employ strategies for understanding and solving problems in ways that leverage the power of technological methods to develop and test solutions.<\/li>\n<li><strong>Creative Communicator<\/strong>: Students communicate clearly and express themselves creatively for a variety of purposes using the platforms, tools, styles, formats, and digital media appropriate to their goals.<\/li>\n<li><strong>Global Collaborator<\/strong>: Students use digital tools to broaden their perspectives and enrich their learning by collaborating with others and working effectively in teams locally and globally. (International Society for Technology in Education)<\/li>\n<\/ol>\n<figure style=\"width: 502px\" class=\"wp-caption alignnone\"><img src=\"http:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-content\/uploads\/sites\/64\/2024\/01\/image24.jpg\" alt=\"A graphic with the various components of digital literacy\" width=\"502\" height=\"502\" \/><figcaption class=\"wp-caption-text\">Digital Literacy Graph, by Cara Miller <a href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">(CC BY)<\/a><\/figcaption><\/figure>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">These standards underscore the deep critical thinking, developed from a strong sense of social ethics and personal values, that true digital literacy entails. And these skills have never been so important. In the midst of the COVID-19 pandemic, for instance, everything shifted to the digital realm\u2014classes, jobs, church attendance, doctor appointments, grocery shopping, conversations with family and friends. Digital media became our lifeline to the outside world and helped us maintain some sense of normalcy. Social media platforms exploded with chatter from people who were desperate to make connections with other people and to gain perspective on the ongoing crisis. While some of these interactions were positive, strengthening a sense of community and belonging, many were not. Fueled by the political and financial agendas of powerful media and commercial organizations, confusion, misinformation, conflict, and ultimately division have permeated social media. So many posts are hateful. So many people are unwilling (unable?) to listen to perspectives different from their own. Way too many people automatically accept or reject information that either coincides with or contradicts what they already believe\u2014what they <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">want<\/em><\/span> to believe.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Recently, Tim Berners-Lee, the inventor of the World Wide Web, wrote an <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId9\" href=\"https:\/\/webfoundation.org\/2019\/03\/web-birthday-30\/\"><span class=\"import-url\">open letter<\/span><\/a><\/span> about the \u201csources of dysfunction\u201d on the web. He says, \u201cThe fight for the web is one of the most important causes of our time,\u201d advocating for the need to protect human rights, equal access, and the open marketplace of ideas and social progress that the web was designed to provide. It follows, then, that true digital literacy is about much more than scrolling, surfing, liking, posting selfies, gaining followers, influencing buying habits, and spreading your opinions with the intent to shut other people down. It\u2019s also not about being as active as possible on as many platforms as possible. In fact, given the ubiquitous nature of digital media, intentionality and selectivity are crucial. True digital literacy is about meaningful and thoughtful engagement that has a positive impact on you as well as the communities of which you are a part.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Writing for Digital Media<\/em><\/span> was written with these lofty ideals in mind. This first chapter focuses on the historical shift from legacy media to digital media, which gave rise to active participation and personalization by and for everyday citizens, who experienced significantly more control over their media experiences. Even more significant were the fundamental changes to communication patterns and social interactions. The second part of the chapter sets up the remainder of the textbook by describing the overall framework of the remaining chapters and how that framework relates to the definition of digital literacy discussed above.<\/p>\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>Understand the history of digital media and how it quickly evolved to transform our daily lives.<\/li>\n<li>Compare the original intent of the World Wide Web to the current reality of privatization and commercial enterprise.<\/li>\n<li>Consider the trade-offs as technologies have developed to afford greater access to and participation in a growing marketplace of ideas.<\/li>\n<li>Recognize the ways that powerful organizations have sought to control the flow of public information throughout history.<\/li>\n<li>Compare the differences in audience engagement between traditional media and digital media.<\/li>\n<li>Understand the organizational structure of the textbook and how different forms of literacy create a more holistic and flexible approach to digital writing.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<h1 class=\"import-ah\">The History of Digital Media<\/h1>\n<p class=\"import-paft\">A brief history lesson is in order to contextualize our digital media use and the opportunities it affords. It\u2019s actually a pretty short history given that the World Wide Web, which precipitated the mass adoption of digital media, is little more than 30 years old. On the other hand, in that short period of time, it has grown at an astronomical rate. According to Broadband Search, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId10\" href=\"https:\/\/www.broadbandsearch.net\/blog\/internet-statistics\"><span class=\"import-url\">5.25 billion people<\/span><\/a><\/span> worldwide are currently connected to the internet, which represents 66.2% of the world\u2019s population, and that number grows by the millions every year. In fact, the percentage of online users grew by 1,355% from 2020 to 2022. The site goes on with statistics about the millions of people who are active on social media, who write blogs, who utilize video streaming services, and who shop online. Perhaps even more significant is the sharp increase in <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId11\" href=\"https:\/\/news.gallup.com\/poll\/355907\/remote-work-persisting-trending-permanent.aspx\"><span class=\"import-url\">remote working<\/span><\/a><\/span> (Saad and Wigert) and <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId12\" href=\"https:\/\/nces.ed.gov\/fastfacts\/display.asp?id=80\"><span class=\"import-url\">remote learning<\/span><\/a><\/span> (National Center for Education Statistics) in the U.S., along with the recent <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId13\" href=\"https:\/\/www.census.gov\/retail\/mrts\/www\/data\/pdf\/ec_current.pdf\"><span class=\"import-url\">spike in e<\/span><span class=\"import-url\">&#8211;<\/span><span class=\"import-url\">commerce<\/span><\/a><\/span> that continues to claim a higher percentage of our total retail sales every year (U.S. Department of Commerce).<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">It\u2019s not an exaggeration by any stretch to say that digital media is a central component of our daily lives\u2014or that most of the world would come to a grinding halt without it. Given this reality, it\u2019s even more startling to consider digital media\u2019s humble beginning. Development happened in stages, beginning with the invention of <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId14\" href=\"https:\/\/www.tnmoc.org\/colossus\"><span class=\"import-url\">Colossus<\/span><\/a><\/span> in 1944 (National Museum of Computing, \u201cColossus\u201d). As its name suggests, Colossus was enormous, approximately the size of a living room and weighing more than five tons. And in contrast to the multifunctional, general-purpose devices we have today, Colossus had one job: to decode encrypted messages between Hitler and his troops during World War II. It was also incredibly slow: <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId15\" href=\"https:\/\/www.britannica.com\/technology\/Colossus-computer\"><span class=\"import-url\">5,000 characters <\/span><span class=\"import-url\">per second<\/span><\/a><\/span> compared with modern computers that process billions of instructions per second (Copeland).<\/p>\n<figure style=\"width: 600px\" class=\"wp-caption alignnone\"><a class=\"rId16\" href=\"https:\/\/en.wikipedia.org\/wiki\/Colossus_computer\"><img src=\"http:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-content\/uploads\/sites\/64\/2024\/01\/image2.png\" alt=\"A Colossus Mark 2 codebreaking computer being operated by Dorothy Du Boisson (left) and Elsie Booker (right), 1943.\" width=\"600\" height=\"400\" \/><\/a><figcaption class=\"wp-caption-text\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/File:Colossus.jpg\">Colossus<\/a>, by author unknown <a href=\"https:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/\">(CC0)<\/a><\/figcaption><\/figure>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">What made Colossus <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">digital<\/em><\/span> was the way that it processed and stored information using Boolean logic. Though it didn\u2019t have software to direct its operations like today\u2019s digital devices, it did have a series of switches and plugs that worked much the same way to create binary values (positive and nonpositive) that told it what to do and could be expanded to create complex functions. Of course, in this early stage as digital technology became faster and held more memory capacity, its use was strictly limited to governmental purposes. In fact, the very existence of Colossus was kept secret <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId18\" href=\"https:\/\/www.tnmoc.org\/news-releases\/2019\/2\/5\/colossus-decrypts-to-be-revealed-after-75-years\"><span class=\"import-url\">until 1975<\/span><\/a><\/span> so that it could remain a secret weapon of the military (National Museum of Computing, \u201cColossus Decrypts\u201d).<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The internet was also developed as a tool for the U.S. military, this time as a <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId19\" href=\"https:\/\/www.history.com\/topics\/inventions\/invention-of-the-internet\"><span class=\"import-url\">mechanism of defense during the Cold War<\/span><\/a><\/span> (History.com). Out of growing concerns for what might happen if the Soviet Union figured out how to shut down our telephone system\u2014the crux of long-distance communication at the time\u2014ARPAnet was created in 1965 to enable government computers to share information. Developed by electrical engineers and mathematicians at the Defense Advanced Research Projects Agency (DARPA), ARPAnet was special because it used \u201cpacket switching\u201d to break down information into chunks of data that would have unique routing paths to their destination. This made it much less vulnerable to interception or enemy attack. However, development was fairly slow. It wasn\u2019t until 1969 that the first message was sent from one (gigantic) computer to another. The word \u201clogin\u201d was sent as a test, but only \u201clo\u201d made it through before the system crashed. Eventually, electronic mail became one of the most important functions of ARPAnet.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Another challenge was figuring out how to grow the network. In fact, there wasn\u2019t one singular network. ARPAnet, with its handful of computers, became one among several other mini-networks. As the number of packet-switching networks with differing configurations grew and tried to connect to one another, it became increasingly difficult to integrate them into one seamless communication system. As a result, Transmission Control Protocol \/ Internet Protocol (TCP\/IP) was developed in the late 1970s by Vinton Cerf and Robert Kahn, often referred to as the \u201c<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId20\" href=\"https:\/\/www2.computerworld.com.au\/article\/643174\/father-internet-vint-cerf-ipv4-never-production-version\/\"><span class=\"import-url\">fathers of the <\/span><span class=\"import-url\">internet<\/span><\/a><\/span>\u201d (Nott). TCP\/IP was\u2014and still is\u2014the fundamental language that allowed networks with different configurations to communicate, effectively bringing everything together under the umbrella of one global network.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Despite its growing capabilities, the use of the internet was restricted to government officials, military personnel, and university professors throughout the 1980s. The National Science Foundation developed the Computer Science Network (CSNET) for university computer scientists across the country, and as the need for faster communication amid increasing traffic arose, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId21\" href=\"https:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=103050\"><span class=\"import-url\">NSFNET<\/span><\/a><\/span> was developed in 1986 as the \u201cbackbone\u201d of an internet infrastructure that would later support widespread use (National Science Foundation, \u201cA Brief History\u201d). The most popular online communications at the time were email, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId22\" href=\"https:\/\/www.britannica.com\/technology\/USENET\"><span class=\"import-url\">discussion groups (1979)<\/span><\/a><\/span> (Encyclopedia Britannica, \u201cUSENET\u201d), <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId23\" href=\"https:\/\/kimon.hosting.nyu.edu\/physical-electrical-digital\/items\/show\/1363\"><span class=\"import-url\">Internet Relay Chat (IRC<\/span><span class=\"import-url\">; <\/span><span class=\"import-url\">1988)<\/span><\/a><\/span> (Dominquez), and text-based games (i.e., Multi-User Dungeons [MUDs] and MUD Object-Oriented games [MOOs]).<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">In other words, functionality as well as access was still fairly limited throughout the 1980s, but all of that changed in 1991 with the advent of the World Wide Web by Tim Berners-Lee. The web allowed use of the internet to go beyond simply sending information from one computer to another. Users could now post and retrieve information that was intended for mass consumption across the web. The web became a mechanism for sharing information among all participants, and with the release of the first popular web browser (<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId24\" href=\"https:\/\/www.livinginternet.com\/w\/wi_mosaic.htm\"><span class=\"import-url\">Mosaic<\/span><\/a><\/span>, later called Netscape) in 1993, the web became accessible for public use (Andreessen). From that moment on, the number of participants in as well as the varying uses of the internet grew exponentially, which precipitated the rapid advancement of digital media devices and platforms that have transformed our everyday lives.<\/p>\n<h2 class=\"import-bh\">Commercialization of the Internet<\/h2>\n<p class=\"import-paft\">If the development of the internet was central to the advancement of digital media, so too was the commercialization of the internet as companies found ways to capitalize on its capabilities for financial gain. This continues to be an <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId25\" href=\"https:\/\/www.washingtonpost.com\/news\/made-by-history\/wp\/2017\/08\/04\/commercialization-brought-the-internet-to-the-masses-it-also-gave-us-spam\/\"><span class=\"import-url\">issue of debate<\/span><\/a><\/span> as large corporations continually pioneer technological advances in order to privatize their services and extend their commercial reach (Goodman). On the one hand, these commercial firms paved the way for mass adoption of the internet and the digital innovations that are fundamental to our personal and professional activities. But on the other hand, the increasing commercialization of the internet has shifted its underlying purpose\u2014from information sharing and collaboration to targeted marketing, clickbait, and commodification of all goods and services. Users themselves have <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId26\" href=\"https:\/\/www.nytimes.com\/2017\/05\/09\/magazine\/how-privacy-became-a-commodity-for-the-rich-and-powerful.html\"><span class=\"import-url\">become commodities<\/span><\/a><\/span> in the fight to capture attention and increase CTRs (click-through rates) (Hess).<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">When the National Science Foundation (NSF) developed NSFNET, its purpose was to further the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId27\" href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/42\/1862\"><span class=\"import-url\">advancement of education and research<\/span><\/a><\/span>, not commercial enterprise (Legal Information Institute). In fact, the use of NSFNET for commercial purposes was banned. It was free for academic institutions to share and access information. The NSF also paid for domain names so that it was free for users to register a website. But as the network grew, extending to university libraries, public schools, small-town libraries, and eventually individual households, it became more difficult for the NSF to keep up with the growing demand, and private companies battled for control. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId28\" href=\"https:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=103050\"><span class=\"import-url\">Commercialization occurred in stages<\/span><\/a><\/span> throughout the 1990s (National Science Foundation, \u201cA Brief History\u201d), which was marked by several pivotal changes:<\/p>\n<ul>\n<li>\u201cThe World\u201d emerged as the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId29\" href=\"https:\/\/web.archive.org\/web\/20190428045452\/https:\/\/www.exede.com\/blog\/brief-history-internet-service-providers\/\"><span class=\"import-url\">first commercial internet service provider<\/span><\/a><\/span> (ISP; 1989). Though its dial-up service was incredibly slow by today\u2019s standards, the number of customers multiplied (Schuster).<\/li>\n<li>The NSF lifted the ban that prevented the commercial use of the internet (1991). Private industries could now use the internet for business and commercial purposes. More commercial ISPs became available, including CompuServe, The Source, and America Online (AOL).<\/li>\n<li>Tim Berners-Lee created the World Wide Web (1991), which is now commonly known as Web 1.0 because it focused on providing information to users, but pages were static and didn\u2019t allow for much user participation. He later advocated for widespread public use of the web by <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId30\" href=\"https:\/\/webfoundation.org\/about\/vision\/history-of-the-web\/\"><span class=\"import-url\">relinquishing proprietary rights<\/span><\/a><\/span> to the code he created (1993) (World Wide Web Foundation). The World Wide Web was the first internet browser, making it possible to search for specific information. Other browsers, including Netscape Navigator and Microsoft\u2019s Internet Explorer, improved the internet\u2019s functionality and prompted increased growth.<\/li>\n<li>The NSF solicited bids from private companies to manage nonmilitary domain registrations (1993). Network Solutions, Inc. was awarded the five-year contract, and under their management, the number of commercial domains grew rapidly, increasing from 7,500 domain names in 1993 to more than two million at the end of their contract in 1998. In 1995, the NSF began charging a fee for domain registration.<\/li>\n<li><span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId31\" href=\"https:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=103050\"><span class=\"import-url\">NSFNET was decommissioned (1995)<\/span><\/a><\/span>, which allowed for <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId32\" href=\"https:\/\/www.nsf.gov\/about\/history\/nifty50\/theinternet.jsp\"><span class=\"import-url\">greater public access<\/span><\/a><\/span> as private companies made their internet services available (National Science Foundation, \u201cThe Internet\u201d). The NSF officially and completely discontinued any direct control it had over the management of the internet (1998).<\/li>\n<li>Technological advances throughout the 1990s and early 2000s made the internet much faster and more versatile. Broadband services included <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId33\" href=\"https:\/\/www.britannica.com\/technology\/DSL\"><span class=\"import-url\">DSL<\/span><\/a><\/span> (Digital Subscriber Line), cable internet, and fiber optic lines, which transferred increasing amounts of data that could travel around the world at the speed of light (Encyclopedia Britannica, \u201cDSL\u201d).<\/li>\n<li><span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId34\" href=\"https:\/\/about.google\/our-story\/\"><span class=\"import-url\">Google began in 1998<\/span><\/a><\/span> as a search engine and soon offered other services, including email, analytical tools, maps, advertising programs, and a mobile operating system (Google). Of particular importance was the algorithm Google used to <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId35\" href=\"https:\/\/www.forbes.com\/sites\/forbesagencycouncil\/2020\/02\/28\/an-abbreviated-history-of-seo-and-what-it-tells-us-about-seos-future-role\/?sh=40575c6d11ef\"><span class=\"import-url\">rank web pages<\/span><\/a><\/span> in order of relevance and credibility (Star). Soon, companies were paying for ads and also \u201coptimizing\u201d their websites to ensure more prominent placement.<\/li>\n<li>Mobile internet technology became more advanced with the introduction of the 2G cellular network (1991), which allowed users to access media content and communicate via text message (SMS) and multimedia message (MMS). The <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId36\" href=\"https:\/\/time.com\/4837176\/iphone-10th-anniversary\/\"><span class=\"import-url\">iPhone<\/span><\/a><\/span> 2G was released in 2007, but it was quickly replaced as 3G, 4G, and 5G technology developed, offering higher speeds, more data transfer, higher-quality streaming, and more functionality (Eadicicco).<\/li>\n<li><span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId37\" href=\"https:\/\/www.britannica.com\/topic\/Web-20\"><span class=\"import-url\">Web 2.0<\/span><\/a><\/span> was introduced (2004) with a focus on user-generated content and increased interaction among users (Encyclopedia Britannica, \u201cWeb 2.0\u201d). Social media platforms like MySpace (launched in 2003), Facebook (2004), YouTube (2005), and X (2006; formerly known as Twitter) became increasingly popular. However, increased user participation also resulted in more marketing opportunities as well as analytical features that allowed companies to collect information about specific behaviors and buying patterns.<\/li>\n<\/ul>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Of course, that was just the beginning. In the last two decades, advancing technologies have made it possible to capture people\u2019s attention at all times of the day and night, even as they move from place to place. A recent article from the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId38\" href=\"https:\/\/www.pewresearch.org\/internet\/fact-sheet\/mobile\/\"><span class=\"import-url\">Pew Research Center<\/span><\/a><\/span> reports that 85% of Americans own a smartphone, a number that is up significantly from just 35% in 2011 (\u201cMobile Fact Sheet\u201d). What\u2019s more, people\u2019s digital media usage has more than doubled, as evidenced by the chart below by <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId39\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Daily_hours_spent_with_digital_media,_OWID.svg\"><span class=\"import-url\">Our World In Data<\/span><\/a><\/span>. While people averaged less than three hours a day of digital media usage in 2008, they averaged well above six hours a day by 2018. That number rose above seven hours in 2022, according to <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId40\" href=\"https:\/\/www.insiderintelligence.com\/content\/us-time-spent-with-media-forecast-2023\"><span class=\"import-url\">Insider Intelligence<\/span><\/a><\/span> (Cramer-Flood). More time spent on digital media means more opportunities for companies to advertise to potential consumers, which is why they put so much money into targeted marketing, omnichannel messaging, optimizing their websites, sending push notifications, and tracking users\u2019 online behaviors and buying habits. They want to tap into the digital economy, which rose to a <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId41\" href=\"https:\/\/www.forbes.com\/sites\/johnkoetsier\/2023\/01\/28\/e-commerce-retail-just-passed-1-trillion-for-the-first-time-ever\/?sh=bff541a36df2\"><span class=\"import-url\">record-breaking $1.09 trillion<\/span><\/a><\/span> in 2022 (Koetsier, \u201cE-Commerce Retail\u201d).<\/p>\n<figure style=\"width: 680px\" class=\"wp-caption alignnone\"><img src=\"http:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-content\/uploads\/sites\/64\/2024\/01\/image3.png\" alt=\"Bar graph showing the increase in digital media usage in the United States from 2008-2018\" width=\"680\" height=\"480\" \/><figcaption class=\"wp-caption-text\"><a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Daily_hours_spent_with_digital_media,_OWID.svg\">Daily Hours Spend with Digital Media, United States<\/a>, by Our World in Data <a href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">(CC BY)<\/a><\/figcaption><\/figure>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">As companies increasingly used digital spaces to compete for people\u2019s attention (and money), several trends emerged in the 2010s:<\/p>\n<ul>\n<li><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Social media marketing.<\/strong><\/span> While just 5% of the adult population used social media in 2005, today more than <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId42\" href=\"https:\/\/www.pewresearch.org\/internet\/fact-sheet\/social-media\/\"><span class=\"import-url\">72% use some sort of social media<\/span><\/a><\/span> (Pew Research Center, \u201cSocial Media\u201d). In fact, about half of Americans use social media as their <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId43\" href=\"https:\/\/www.pewresearch.org\/journalism\/2021\/09\/20\/news-consumption-across-social-media-in-2021\/\"><span class=\"import-url\">primary source <\/span><span class=\"import-url\">of <\/span><span class=\"import-url\">news information<\/span><\/a><\/span> (Pew Research Center, \u201cNews Consumption\u201d). Social media has also become an important tool for social activists (consider the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId44\" href=\"https:\/\/www.wired.com\/2016\/01\/social-media-made-the-arab-spring-but-couldnt-save-it\/\"><span class=\"import-url\">Arab Spring<\/span><\/a><\/span> [Hempel] or the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId45\" href=\"https:\/\/www.cnbc.com\/2019\/08\/16\/social-media-has-become-a-battleground-in-hong-kongs-protests.html\"><span class=\"import-url\">2019 protests in Hong Kong<\/span><\/a><\/span> [Shao], for instance), humanitarian campaigns (e.g., <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId46\" href=\"https:\/\/gospotlite.com\/blog\/social-media-helped-in-the-ukraine-humanitarian-crisis\"><span class=\"import-url\">the war in Ukraine<\/span><\/a><\/span> [Spotlite]), and <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId47\" href=\"https:\/\/knowledge.wharton.upenn.edu\/podcast\/knowledge-at-wharton-podcast\/how-social-media-is-shaping-political-campaigns\/\"><span class=\"import-url\">political campaigns<\/span><\/a><\/span> (Wharton). Most prominent are businesses that use social media to interact with customers and advertise their latest products and services. According to a recent <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Forbes<\/em><\/span> article, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId48\" href=\"https:\/\/www.forbes.com\/advisor\/business\/social-media-statistics\/\"><span class=\"import-url\">77% of small businesses<\/span><\/a><\/span> use social media regularly (Wong). Many companies use <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId49\" href=\"https:\/\/www.prnewswire.com\/news-releases\/small-businesses-value-social-media-over-all-other-digital-marketing-channels-301505849.html\"><span class=\"import-url\">social media as their primary method of marketing<\/span><\/a><\/span>, believing that it is the most effective way to reach their target audience (Cision).<\/li>\n<li><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Influencers.<\/strong><\/span> Increasingly, businesses hire influencers to engage with potential customers because they already have a large number of social media followers and can leverage those connections to influence people\u2019s buying habits. They test products and make recommendations, and while it might seem that these people have the consumer\u2019s best interest at heart, the reality is sometimes a little different. \u201cOn the consumer side, the relationship between influencers and consumers is based on perceived closeness, authenticity, and trust,\u201d according to <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId50\" href=\"https:\/\/www.europarl.europa.eu\/RegData\/etudes\/STUD\/2022\/703350\/IPOL_STU(2022)703350_EN.pdf\"><span class=\"import-url\">Michaelsen et al.<\/span><\/a><\/span>, who go on to discuss the potentially negative impact of influencers on consumers, particularly more vulnerable populations such as children or consumers with low education. Their study found several negative characteristics of influencer marketing, including \u201clack of transparency and unclear disclosure, lack of separation between advertising and content misleading messages, and targeting vulnerable consumer groups\u201d (Michaelsen et al. 10). While in some instances it\u2019s considered unlawful for an influencer to endorse specific products without fully disclosing that they are being paid to do so\u2014see the anti-touting provision (Section 17b) of the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId51\" href=\"https:\/\/www.govinfo.gov\/content\/pkg\/COMPS-1884\/pdf\/COMPS-1884.pdf\"><span class=\"import-url\">Securities Act<\/span><\/a><\/span> (U.S. Securities and Exchange Commission, \u201cSecurities\u201d) and the recent <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId52\" href=\"https:\/\/www.sec.gov\/news\/press-release\/2022-183\"><span class=\"import-url\">charges against Kim Kardashian<\/span><\/a><\/span> for using social media to endorse an investment opportunity (U.S. Securities and Exchange Commission, \u201cSEC Charges\u201d)\u2014influencers often don\u2019t fully disclose their financial incentives.<\/li>\n<li><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">App culture and push notifications.<\/strong><\/span> You\u2019re probably familiar with Apple\u2019s catchphrase \u201cThere\u2019s an app for that,\u201d which debuted in a <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId53\" href=\"https:\/\/www.youtube.com\/watch?v=szrsfeyLzyg\"><span class=\"import-url\">2009 commercial<\/span><\/a><\/span> advertising iPhone\u2019s latest capabilities. Since then, app culture has exploded with entertainment, educational, and lifestyle applications, which provide quick and easy access to a variety of activities and information. They also allow for notifications to be pushed out to users, often prompting them to take action to open the application, visit the website, or take advantage of a new product or promotional opportunity. While the Pew Research Center reported in 2010 that fewer than half (43%) of cell phone users had apps on their phones (<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId54\" href=\"https:\/\/www.pewresearch.org\/internet\/2010\/09\/14\/the-rise-of-apps-culture\/\"><span class=\"import-url\">\u201cThe Rise of Apps Culture\u201d<\/span><\/a><\/span>), more recent data suggest that the average cell phone user has <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId55\" href=\"https:\/\/www.simform.com\/blog\/the-state-of-mobile-app-usage\/\"><span class=\"import-url\">40 apps installed on their phone<\/span><\/a><\/span> and consistently accesses 18 of those apps (Kataria).<\/li>\n<li><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Gig economy.<\/strong><\/span> With more websites, applications, and channels of communication, more businesses and freelancers have emerged in the \u201c<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId56\" href=\"https:\/\/hbr.org\/2018\/03\/thriving-in-the-gig-economy\"><span class=\"import-url\">gig economy<\/span><\/a><\/span>,\u201d which relies mostly on short-term and contract employees who value their independence to accept or decline jobs as they see fit but who also must \u201cproduce or perish\u201d (Petriglieri et al.). In 2015, Hillary Clinton forecasted the \u201cexciting\u201d economic opportunities and new innovations that stemmed from the gig economy (qtd. in Sundararajan), but some people point out that on-demand businesses like Uber, Airbnb, Etsy, and TaskRabbit are the true beneficiaries, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId57\" href=\"https:\/\/www.theguardian.com\/commentisfree\/2015\/jul\/26\/will-we-get-by-gig-economy\"><span class=\"import-url\">making money <\/span><span class=\"import-url\">off<\/span><span class=\"import-url\"> the labor exchange<\/span><\/a><\/span> without having to provide consistent salaries or benefits: \u201cThere\u2019s a risk we might devolve into a society in which the on-demand many end up serving the privileged few\u201d (Sundararajan).<\/li>\n<li><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">IoT and big data.<\/strong><\/span> The <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId58\" href=\"https:\/\/www.networkworld.com\/article\/3207535\/what-is-iot-the-internet-of-things-explained.html\"><span class=\"import-url\">Internet of Things (IoT)<\/span><\/a><\/span> refers to the emergence of objects and systems that use wireless internet connections to send and receive data, often through the convenience of your phone (Fruhlinger). Think about all of the devices that have emerged in the last 10 years with the word \u201csmart\u201d in front of them\u2014smart watches, smart TVs, smart refrigerators, smart door locks, smart thermostats, smart vacuums. A 2019 <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId59\" href=\"https:\/\/priceonomics.com\/the-iot-data-explosion-how-big-is-the-iot-data\/\"><span class=\"import-url\">article in<\/span><\/a><\/span> <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Priceonomics<\/em><\/span> put it like this:<\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\">The growth of Internet of Things in terms of number of devices, revenue generated, and data produced has been stunning, but most predictions expect that growth to accelerate. The number of connected devices is expected to grow to 50 billion in 2020 (from 8.7 billion in 2012) and the annual revenue from IoT sales is forecast to hit $1.6 trillion by 2025 (from just $200 billion today). (Team Recurrency)<\/p>\n<p style=\"padding-left: 40px;\">The article goes on to discuss the astronomical amount of data (otherwise known as big data) collected by these devices\u2014upward of 4.4 zettabytes in 2020\u2014which is used to track user behaviors and trends, understand consumer needs, make product upgrades, and essentially market more relevant products and services to customers. While this might seem like a benefit in many ways, there are concerns about how closely IoT devices allow large corporations and government entities to track people\u2019s behavior. Josh Fruhlinger used the recent example of a <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId60\" href=\"https:\/\/www.cnn.com\/2020\/04\/04\/tech\/location-tracking-florida-coronavirus\/index.html\"><span class=\"import-url\">map released by X-Mode<\/span><\/a><\/span> (O\u2019Sullivan) in 2020 that was designed to track the location of spring breakers as they left Fort Lauderdale. The purpose was to predict the spread of COVID-19, but it also demonstrated \u201cjust how closely IoT devices can track us\u201d (Fruhlinger).<\/p>\n<ul>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">User tracking.<\/strong><\/span> While we\u2019re on the topic of user tracking, it\u2019s another trend that emerged in the 2010s. Although Urchin was an analytics business that formed in the early days of the web (1995), it wasn\u2019t bought out by Google to become Google Analytics until 2005, and there weren\u2019t sophisticated tracking tools until 2014, when Google released Universal Analytics, which could track individual users across multiple devices and platforms (<span class=\"import-u\">Visualwebz<\/span>). Once more, the benefit is a more enjoyable user experience, though there are significant concerns about user tracking, data security, and the use of data to not only predict but also compel purchasing decisions (Zuboff).<\/li>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Artificial intelligence.<\/strong><\/span> You might be surprised to learn that artificial intelligence (AI) <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId61\" href=\"https:\/\/sitn.hms.harvard.edu\/flash\/2017\/history-artificial-intelligence\/\"><span class=\"import-url\">dates back to the 1950s<\/span><\/a><\/span> as technology advanced allowing computers to more easily store information and use algorithms to complete tasks (Anyoha). However, it wasn\u2019t until the 2010s that AI became commonplace through Alexa devices, GPS, talk-to-text applications, and so on. Most of us encounter AI devices multiple times throughout the day, and our use of those devices (and the data collected as a result) is used in turn to train the AI to become smarter and better at what it does. Many IoT devices use AI to simulate human intelligence and complete tasks. This is called \u201c<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId62\" href=\"https:\/\/www.popularmechanics.com\/technology\/robots\/a14457503\/how-machine-learning-lets-robots-teach-themselves\/\"><span class=\"import-url\">machine learning<\/span><\/a><\/span>,\u201d which David Grossman describes as \u201cexciting and somewhat terrifying\u201d given this potential for complex functionality. Peskoe-Yang explains that as we use AI in our daily lives, \u201cAI is tasked not only with finding the answers to questions about data sets, but with finding the questions themselves; successful deep learning applications require vast amounts of data and the time and computational power to self-test over and over again.\u201d While recent AI technologies like <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId63\" href=\"https:\/\/openai.com\/blog\/chatgpt\"><span class=\"import-url\">ChatGPT<\/span><\/a><\/span> have created some exciting opportunities, there are concerns about the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId64\" href=\"https:\/\/arxiv.org\/pdf\/2307.09009.pdf\"><span class=\"import-url\">performance accuracy<\/span><\/a><\/span> of ChatGPT (Chen et al.) and the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId65\" href=\"https:\/\/www.unesco.org\/en\/artificial-intelligence\/recommendation-ethics\/cases\"><span class=\"import-url\">ethical implications<\/span><\/a><\/span> of relying on AI devices fueled by biased algorithms (UNESCO).<\/li>\n<li class=\"import-bll\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Scams and security breaches.<\/strong><\/span> Let\u2019s not forget about those scammers, hackers, and phishers who are also hoping to profit from advanced technologies and all the user data out there. While viruses and other types of malware became a concern in the early 2000s, cybercrime became much <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId66\" href=\"https:\/\/cybersecurityventures.com\/the-history-of-cybercrime-and-cybersecurity-1940-2020\/\"><span class=\"import-url\">more profound and sophisticated<\/span><\/a><\/span> in the 2010s as criminals developed \u201cmulti-vector attacks and social engineering\u201d (Chadd). Expensive data breaches have affected not only large corporations and government entities but also individual users, which is why cybersecurity has become such an important (<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId67\" href=\"https:\/\/www.fortunebusinessinsights.com\/industry-reports\/cyber-security-market-101165\"><span class=\"import-url\">and lucrative<\/span><\/a><\/span>) field (Fortune Business Insights).<\/li>\n<\/ul>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">We now live in a world where the quality of life seems to hinge on the speed of our internet connection as billions of people spend hours every day streaming their favorite shows, scrolling through social media, and browsing Amazon merchandise. User activities are tracked and assessed for the purposes of providing more targeted, personalized ads and creating a more positive user experience that perpetuates increasing dependence on digital technologies. In so many ways, the commercialization of the internet ushered in the digital age that has provided tangible benefits in communication, entertainment, collaboration, access to information, and countless daily conveniences. But at what cost? According to <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId68\" href=\"https:\/\/www.businessinsider.com\/these-6-corporations-control-90-of-the-media-in-america-2012-6\"><span class=\"import-url\">Business Insider<\/span><\/a><\/span>, 90% of the information we consume is controlled by a handful of powerful corporations (Lutz). Increased surveillance, misuse of personal data, cyberbullying, addiction, burnout, and self-indulgence are equally prevalent. These are issues that we will examine more closely in the first section of the textbook, which focuses on writing and digital media from a critical perspective.<\/p>\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Acronyms from this Chapter<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<table class=\"lines\" style=\"height: 465px; width: 100%;\">\n<tbody>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-tch\">Acronym<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-tch\">Full Name<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-tch\">Description<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-td\">ARPAnet<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-td\">Advanced Research Projects Agency Network<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-td\">The first public packet-switched network, created by DARPA in 1965.<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-td\">DARPA<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-td\">Defense Advanced Research Projects Agency<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-td\">Research agency that is part of the United States Department of Defense. It developed ARPAnet.<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-td\">CSNET<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-td\">Computer Science Network<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-td\">Network developed in the 1980s by the Computer Science Network for university computer scientists across the country.<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-td\">CTR<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-td\">click-through rate<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-td\">The number of times an ad receives a \u201cclick\u201d to see more information divided by the number of views.<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-td\">DSL<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-td\">digital subscriber line<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-td\">A collection of technologies that transmit digital data over the telephone line.<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-td\">IoT<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-td\">Internet of Things<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-td\">The network of devices that connect to the internet and can exchange data with other devices and systems over the internet.<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-td\">IRC<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-td\">Internet Relay Chat<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-td\">Text-based chat system for instant messaging.<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-td\">ISP<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-td\">internet service provider<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-td\">Company that provides internet access.<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-td\">ISTE<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-td\">International Society for Technology in Education<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-td\">\u201cA passionate community of global educators who believe in the power of technology to transform teaching and learning\u201d (<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId69\" href=\"https:\/\/www.iste.org\/about\/about-iste\"><span class=\"import-url\">ISTE, \u201cAbout\u201d<\/span><\/a><\/span>).<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-td\">MOO<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-td\">MUD Object-Oriented<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-td\">Online virtual reality system in which players are connected at the same time.<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-td\">MUD<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-td\">Multi-User Dungeon<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-td\">A multiplayer online space.<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-td\">NSF<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-td\">National Science Foundation<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-td\">A government agency that supports research and education in science and engineering.<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-td\">NSFNET<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-td\">National Science Foundation Network<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-td\">Network developed by the National Science Foundation in 1986 as the \u201cbackbone\u201d of an internet infrastructure.<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 30px;\">\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 60.3516px;\">\n<p class=\"import-td\">TCP\/IP<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 338.848px;\">\n<p class=\"import-td\">Transmission Control Protocol \/ Internet Protocol<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"padding: 0pt 5.4pt; height: 30px; width: 915.293px;\">\n<p class=\"import-td\">A standardized set of rules for delivering data across a digital network.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<h2 class=\"import-th\"><span style=\"text-align: initial; font-size: 1em;\">The Shift to Participatory Media<\/span><\/h2>\n<p class=\"import-paft\">One last historical shift is especially relevant to the scope of this book: that from traditional media, in which audiences took a passive role in their media consumption, to digital media, in which users are actively searching for the information they want and contributing to the pool of information with their own posts, shares, and comments. While this is such common practice in our current daily lives that it hardly seems remarkable, it\u2019s particularly significant when we consider the larger historical context of censorship, in which institutions with centralized authority\u2014such as the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId70\" href=\"https:\/\/www.worldhistory.org\/article\/2018\/index-of-prohibited-books\/\"><span class=\"import-url\">Catholic church in the <\/span><span class=\"import-url\">fourteen<\/span><span class=\"import-url\">th century<\/span><\/a><\/span> (Mark) or the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId71\" href=\"https:\/\/machronicle.com\/the-history-of-censorship-in-america\/\"><span class=\"import-url\">American government during the colonial period<\/span><\/a><\/span> (Lokey)\u2014controlled the flow of information to the masses. In fact, the invention of the Gutenberg Press in 1445 and the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId72\" href=\"https:\/\/blog.ung.edu\/press\/the-creation-of-the-printing-press\/\"><span class=\"import-url\">subsequent increase in literacy rates<\/span><\/a><\/span> (Ormond) was considered a threat to the centralized authority of the church because people had more direct access to information and could read and interpret that information for themselves\u2014and form their own opinions. You probably already know that literacy is a powerful tool for personal and intellectual growth, independence, and expression, which is why marginalized groups have historically been discouraged from reading (e.g., <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId73\" href=\"https:\/\/oaklandliteracycoalition.org\/literacy-by-any-means-necessary-the-history-of-anti-literacy-laws-in-the-u-s\/\"><span class=\"import-url\">anti<\/span><span class=\"import-url\">&#8211;<\/span><span class=\"import-url\">literacy laws for <\/span><span class=\"import-url\">slaves<\/span><\/a><\/span>) and especially from writing about their own experiences and perspectives (Maddox; <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId74\" href=\"https:\/\/www.americanantiquarian.org\/proceedings\/44525153.pdf\"><span class=\"import-url\">Monaghan<\/span><\/a><\/span>).<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">We could talk endlessly about how information has been distributed throughout history\u2014<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId75\" href=\"https:\/\/www.library.illinois.edu\/hpnl\/tutorials\/antebellum-newspapers-city\/\"><span class=\"import-url\">penny presses<\/span><\/a><\/span> and wire services, for instance (Illinois University Library), as well as more secretive and subversive methods (<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId76\" href=\"https:\/\/www.history.com\/news\/nat-turner-rebellion-literacy-slavery\"><span class=\"import-url\">Coleman<\/span><\/a><\/span>; <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId77\" href=\"http:\/\/www.harriet-tubman.org\/songs-of-the-underground-railroad\/\"><span class=\"import-url\">Harriet Tubman Historical Society<\/span><\/a><\/span>)\u2014and the social effect this information had, such as <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId78\" href=\"https:\/\/www.mtsu.edu\/first-amendment\/article\/1253\/yellow-journalism\"><span class=\"import-url\">yellow journalism<\/span><\/a><\/span> (Ferguson III), <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId79\" href=\"https:\/\/www.oxfordbibliographies.com\/view\/document\/obo-9780199756841\/obo-9780199756841-0211.xml\"><span class=\"import-url\">muckraking<\/span><\/a><\/span> (Schiffrin), <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId80\" href=\"https:\/\/publicdomainreview.org\/collection\/yellow-journalism-the-fake-news-of-the-19th-century\"><span class=\"import-url\">civic unrest<\/span><\/a><\/span> (Green), and <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId81\" href=\"https:\/\/www.history.com\/news\/nat-turner-rebellion-literacy-slavery\"><span class=\"import-url\">social movements<\/span><\/a><\/span> (Coleman). What seems most important is that the flow of information had a profound effect on people\u2019s thought patterns and worldviews, and the struggle to control that flow of information escalated as more people\u2014usually professional writers\u2014were able to publish their ideas. Further, as traditional media expanded to include radio and television, the amount of information people had access to grew exponentially. Suddenly, people could tune in from the comfort of their living rooms to watch their favorite show, learn about news events across the globe, and even hear directly from the president himself. However, it was a one-way line of communication. People themselves had very little control over the content that was widely dispersed for public consumption. They could tune in or not tune in, read the morning paper or not, but it made no difference in the content itself, and to miss out on the latest news would mean falling behind in public affairs and being left out of the social discourse.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Importantly, the limitations of traditional media stemmed from the technology that was available. Traditional media, also known as legacy media, included newspapers, books, magazines, radio, and television\u2014all of which were defined by key characteristics:<\/p>\n<ul>\n<li class=\"import-blf\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Intended for a mass audience.<\/strong><\/span> The same information was available to everyone, without distinction, and people couldn\u2019t pick and choose the type of information that seemed most relevant or interesting to them.<\/li>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Limited space.<\/strong><\/span> A television or radio broadcast could only fit so much information into a 30-minute segment. Newspapers, books, and magazines were likewise limited by the amount of space available on the page.<\/li>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Linear format.<\/strong><\/span> No matter the publication, there was always a clear beginning and a clear ending, and people consumed the information in straightforward, chronological order.<\/li>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Fixed.<\/strong><\/span> Once something was published, it was permanently set on the page or the film. It couldn\u2019t be revised.<\/li>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Noninteractive<\/strong><strong class=\"import-b\">.<\/strong><\/span> Audience members could only receive information. There was no way to participate in the conversation.<\/li>\n<li class=\"import-bll\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Limited access.<\/strong><\/span> Because of the limitations already listed, the role of producing information was reserved for professionals in the industry\u2014journalists, news anchors, actors\/actresses, novelists. There was very little opportunity for everyday people to have their voices heard on a mass scale.<\/li>\n<\/ul>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Obviously, digital media ushered in a new era that dramatically altered the relationship between everyday citizens and the flow of information. The emergence of the World Wide Web, cable television, social media, and an onslaught of digital devices that make it possible for people to easily and quickly access the internet from almost anywhere has shifted our role from passive to active. People can actively search for the type of information they are looking for and cultivate an online repertoire of resources that fit their interests and perspectives. They can also contribute to the vast body of information that is available on the internet\u2014without needing special credentials or authorization. In direct contrast to the limitations of traditional media, digital media is defined by qualities that invite user participation:<\/p>\n<ul>\n<li class=\"import-blf\"><strong>Personalized<\/strong> based on online habits, interests, and the ability to customize your news feed.<\/li>\n<li class=\"import-bl\"><strong>Unlimited space<\/strong>. The information available online is immeasurable and continues to expand.<\/li>\n<li class=\"import-bl\"><strong>Nonlinear formatting<\/strong> as information is increasingly hyperlinked and put into chunks that can be viewed in any order.<\/li>\n<li class=\"import-bl\"><strong>Fluid<\/strong>. Information posted to the internet can easily be updated.<\/li>\n<li class=\"import-bll\"><strong>Interactive<\/strong> as people like, share, and comment on the information that is posted and can easily post their own information.<\/li>\n<\/ul>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">In so many ways, we have come full circle from the era of the Gutenberg Press. As new technologies emerge, they have completely revolutionized the way that we access information, which in turn has a deep and pervasive effect on our ways of thinking, being, and interacting with the world. Once again, as more voices emerge to share new ideas and perspectives, we often sacrifice quality for quantity and must question the credibility of information that is available. And once more, despite the purpose of the World Wide Web to be a marketplace for ideas and social progress, we must recognize the continuing (though certainly evolving) epic battle to control the flow of information and thought patterns for self-serving purposes.<\/p>\n<div class=\"textbox textbox--exercises\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Activity 1.1<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>Review the history of digital media as outlined in this chapter and make a list of key dates and events that you think are most important in understanding our current digital media practices. You might also add events to your list by reading sources that are linked in the text or by conducting your own research.<\/p>\n<p>Once you\u2019ve created your list, create some sort of visual representation of the events you\u2019ve selected (a timeline, for instance, or a web). You can draw your visual representation. Or, ideally, you can use Canva, Photoshop, or some other design application of your choice to create a graphic that is informative, easy to understand, and visually appealing.<\/p>\n<p>You will share your visual and explain the choices you made.<\/p>\n<\/div>\n<\/div>\n<h1 class=\"import-ah\">Looking Ahead: The Framework for This Textbook<\/h1>\n<p class=\"import-paft\">At first glance, the topic of digital writing seems fairly straightforward. In fact, it\u2019s true in some ways that digital writing is similar to traditional print media and that some writing skills and strategies will be similar. However, digital writing is also different from traditional forms of writing in fundamental ways and, therefore, often requires different strategies and skills, which we\u2019ll explore in-depth throughout this textbook. However, as discussed in the beginning of this chapter, the goal of this textbook is about more than <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">how<\/em><\/span> to apply certain strategies in digital spaces, but also <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">why<\/em><\/span> and <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">to what effect<\/em><\/span>. It\u2019s about having a deeper theoretical and ethical understanding of the communication choices you make, which will afford you greater intentionality and precision, not just in the things you write but in your interactions with other people and in your own literacy practices. To that end, the textbook casts a wider net to include both practice and theory, challenging readers to think critically about the opportunities that digital media affords as well as the challenges it presents to mental health, civil discourse, social justice, privacy, and so on.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The book is divided into three sections, mirroring the organizational structure of Stuart Selber\u2019s <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Multiliteracies for a Digital Age<\/em><\/span>, which focuses more broadly on computer literacy and targets writing and communication teachers in higher education. However, Selber emphasizes the need to extend conversations about digital literacy far beyond a simple and prescriptive how-to guide. He writes, \u201cIt is clear\u2026that computer literacy programs can take a rather monolithic and one-dimensional approach, ignoring the fact that computer technologies are embedded in a wide range of constitutive contexts, as well as entangled in value systems\u201d (22). In other words, an effective educational approach to digital literacy provides critical-thinking tools that can be applied to different situations and guide a more informed decision-making process based on the context at hand. In that spirit, this textbook offers a top-down approach to writing for digital media by examining three different literacies:<\/p>\n<ol>\n<li><strong>Critical literacy<\/strong>, which challenges readers to think deeply about the affordances and constraints of digital media, their own practices, and the social ramifications of communication that takes place on digital platforms. In this first section, the word \u201ccritical\u201d has two meanings. It relates to <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">critical thinking<\/em><\/span> about relevant theories that can be used as lenses to examine social norms and personal habits of digital media use from a variety of perspectives. It also relates to <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">critical theory<\/em><\/span>, which focuses on power structures and cultural biases that marginalize certain groups of people while privileging others. The chapters in this first section are intended to provide deeper insights and new ways of thinking about digital media use that will inform the rest of the book.<\/li>\n<li><strong>Rhetorical literacy<\/strong>, which situates digital media as a communication tool that mediates between writers and their audiences, helping them to convey important ideas and perspectives as clearly as possible. All communication is about forging an understanding. Rhetoric is the study of how language (both verbal and nonverbal) is used in that endeavor, paying special attention to how a message is crafted by a speaker to engage a specific audience to fulfill key purpose(s) in a particular situation. This section of the book focuses on rhetorical considerations and strategies that make a message successful, particularly given the range of digital platforms and tools that are available.<\/li>\n<li><strong>Functional literacy<\/strong>, which is the nuts and bolts of digital writing, providing guidelines, best practices, and design strategies for a variety of genres. The last section also gives important information about content strategy, search engine optimization, copyright laws, accessibility considerations, and basic editing rules. In essence, this is the <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">how-to<\/em><\/span> part of the textbook that builds from the theoretical and rhetorical considerations of the previous sections.<\/li>\n<\/ol>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">If you are familiar with Selber\u2019s work, you might notice that this organization of sections is different from his as he begins with functional and then moves on to critical and then rhetorical. This book begins with critical literacy (arguably the most complex and theoretical) followed by rhetorical literacy because having this type of deeper awareness and reflection should be foundational in guiding the specific writing choices you make, bringing certain issues into focus and informing strategies that will align with your values and resonate more deeply with your audience.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Obviously, digital media is always evolving. The historical shifts outlined in this first chapter are evidence of how quickly digital media has emerged to transform our daily lives. And there\u2019s no telling what digital innovations will arise in the years to come. The goal of this textbook is to provide a foundation of intellectual processes and rhetorical considerations that are flexible and easily adapted to a variety of circumstances, so that as new technologies evolve, so will you.<\/p>\n<div class=\"textbox textbox--examples\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Discussion Questions<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ol>\n<li>Reflect on your own digital media practices. What types of reading and writing do you do most often? How would your life be different without digital media?<\/li>\n<li>Review the list of learning standards published by the International Society for Technology in Education (ISTE). Can you come up with specific examples of each objective? How would you rank your own skills in each category?<\/li>\n<li>Summarize the primary concerns outlined by Tim Berners-Lee in his open letter. In your opinion, which ones seem the most detrimental? Why? Are there other concerns about the state of the World Wide Web that you would add to the list?<\/li>\n<li>What do you find most surprising about the history of digital media and the ways that technologies have evolved?<\/li>\n<li>Discuss the advantages and disadvantages of the commercialization of the internet.<\/li>\n<li>Give some examples of how commercialization and privatization affect your own digital experiences.<\/li>\n<li>How are the social and intellectual effects of the printing press similar to those of digital media?<\/li>\n<li>How and why have powerful organizations throughout history controlled the flow of public information? What is your reaction to claims that powerful corporations control the vast majority of information available?<\/li>\n<li>Summarize the three types of literacies that form the textbook\u2019s framework. Why is it beneficial to study digital writing using this top-down approach?<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Sources<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Anyoha, Rockwell. \u201cThe History of Artificial Intelligence.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">SITNBoston<\/em><\/span>, 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId82\" href=\"https:\/\/sitn.hms.harvard.edu\/flash\/2017\/history-artificial-intelligence\/\"><span class=\"import-url\">https:\/\/sitn.hms.harvard.edu\/flash\/2017\/history-artificial-intelligence\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Andreessen, Marc. \u201cMosaic: The First Global Web Browser.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">LivingInternet.com<\/em><\/span>, 20 Feb. 1993, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId83\" href=\"https:\/\/www.livinginternet.com\/w\/wi_mosaic.htm\"><span class=\"import-url\">https:\/\/www.livinginternet.com\/w\/wi_mosaic.htm<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Apple. \u201ciPhone 3G Commercial: \u2018There\u2019s an App for That\u2019 2009.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">YouTube<\/em><\/span>, 4 Feb. 2009, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId84\" href=\"https:\/\/www.youtube.com\/watch?v=szrsfeyLzyg\"><span class=\"import-url\">https:\/\/www.youtube.com\/watch?v=szrsfeyLzyg<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Berners-Lee, Tim. \u201c30 Years On, What\u2019s Next #ForTheWeb?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Web Foundation<\/em><\/span>, 12 Mar. 2019, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId85\" href=\"https:\/\/webfoundation.org\/2019\/03\/web-birthday-30\/\"><span class=\"import-url\">https:\/\/webfoundation.org\/2019\/03\/web-birthday-30\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">BroadbandSearch. \u201cKey Internet Statistics to Know in 2022 (Including Mobile).\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Broadband Search<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId86\" href=\"https:\/\/www.broadbandsearch.net\/blog\/internet-statistics\"><span class=\"import-url\">https:\/\/www.broadbandsearch.net\/blog\/internet-statistics<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Chadd, Katie. \u201cThe History of Cybercrime and Cybersecurity, 1940\u20132020.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Cybercrime Magazine<\/em><\/span>, 30 Nov. 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId87\" href=\"https:\/\/cybersecurityventures.com\/the-history-of-cybercrime-and-cybersecurity-1940-2020\/\"><span class=\"import-url\">https:\/\/cybersecurityventures.com\/the-history-of-cybercrime-and-cybersecurity-1940-2020\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Chen, Lingjao, et al. \u201cHow Is ChatGPT\u2019s Behavior Changing over Time?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Arxiv.org<\/em><\/span>, 1 Aug. 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId88\" href=\"https:\/\/doi.org\/10.48550\/arXiv.2307.09009\"><span class=\"import-url\">https:\/\/doi.org\/10.48550\/arXiv.2307.09009<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Cision. \u201cSmall Businesses Value Social Media over All Other Digital Marketing Channels.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Cision PR Newswire<\/em><\/span>, 21 Mar. 2022.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Coleman, Colette. \u201cHow Literacy Became a Powerful Weapon in the Fight to End Slavery.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">History.com<\/em><\/span>, 11 July 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId89\" href=\"https:\/\/www.history.com\/news\/nat-turner-rebellion-literacy-slavery\"><span class=\"import-url\">https:\/\/www.history.com\/news\/nat-turner-rebellion-literacy-slavery<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Copeland, B. J. \u201cColossus Computer.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Encyclopedia Britannica<\/em><\/span>, 16 Aug. 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId90\" href=\"https:\/\/www.britannica.com\/technology\/Colossus-computer\"><span class=\"import-url\">https:\/\/www.britannica.com\/technology\/Colossus-computer<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Cramer-Flood, Ethan. \u201cUS Time Spent with Media Forecast 2023: A Slight Decline Overall, Even as CTV Time Surges, and Digital Video Finally Overtakes TV.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Business Insider<\/em><\/span>, 11 July 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId91\" href=\"https:\/\/www.insiderintelligence.com\/content\/us-time-spent-with-media-forecast-2023\"><span class=\"import-url\">https:\/\/www.insiderintelligence.com\/content\/us-time-spent-with-media-forecast-2023<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Dominquez, Amanda. \u201cInternet Relay Chat.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">NYU.edu<\/em><\/span>, n.d., <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId92\" href=\"https:\/\/kimon.hosting.nyu.edu\/physical-electrical-digital\/items\/show\/1363\"><span class=\"import-url\">https:\/\/kimon.hosting.nyu.edu\/physical-electrical-digital\/items\/show\/1363<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Eadicicco, Lisa. \u201cThis Is Why the iPhone Upended the Tech Industry.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Time<\/em><\/span>, 29 June 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId93\" href=\"https:\/\/time.com\/4837176\/iphone-10th-anniversary\/\"><span class=\"import-url\">https:\/\/time.com\/4837176\/iphone-10th-anniversary\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Encyclopedia Britannica. \u201cDSL Networking Technology.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Encyclopedia Britannica<\/em><\/span>, 16 Nov. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId94\" href=\"https:\/\/www.britannica.com\/technology\/DSL\"><span class=\"import-url\">https:\/\/www.britannica.com\/technology\/DSL<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cUSENET: Internet Discussion Network.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Encyclopedia Britannica<\/em><\/span>, 17 May 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId95\" href=\"https:\/\/www.britannica.com\/technology\/USENET\"><span class=\"import-url\">https:\/\/www.britannica.com\/technology\/USENET<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cWeb 2.0 Internet.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Encyclopedia Britannica<\/em><\/span>, 7 Sept. 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId96\" href=\"https:\/\/www.britannica.com\/topic\/Web-20\"><span class=\"import-url\">https:\/\/www.britannica.com\/topic\/Web-20<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Ferguson III, Cleveland. \u201cYellow Journalism.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The First Amendment Encyclopedia<\/em><\/span>, 2009, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId97\" href=\"https:\/\/www.mtsu.edu\/first-amendment\/article\/1253\/yellow-journalism\"><span class=\"import-url\">https:\/\/www.mtsu.edu\/first-amendment\/article\/1253\/yellow-journalism#:~:text=Yellow%20journalism%20usually%20refers%20to,unconventional%20techniques%20of%20their%20rival<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Fortune Business Insights. \u201cCybersecurity Market Size, Share, and Covid19 Impact Analysis\u2026\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Fortune Business Insights<\/em><\/span>, n.d., <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId98\" href=\"https:\/\/www.fortunebusinessinsights.com\/industry-reports\/cyber-security-market-101165\"><span class=\"import-url\">https:\/\/www.fortunebusinessinsights.com\/industry-reports\/cyber-security-market-101165<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Fruhlinger, Josh. \u201cWhat Is IoT? The Internet of Things Explained.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Network World<\/em><\/span>, 7 Aug. 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId99\" href=\"https:\/\/www.networkworld.com\/article\/3207535\/what-is-iot-the-internet-of-things-explained.html\"><span class=\"import-url\">https:\/\/www.networkworld.com\/article\/3207535\/what-is-iot-the-internet-of-things-explained.html<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Goodman, Carly. \u201cCommercialization Brought the Internet to the Masses. It Also Gave Us Spam.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Washington Post<\/em><\/span>, 4 Aug. 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId100\" href=\"https:\/\/www.washingtonpost.com\/news\/made-by-history\/wp\/2017\/08\/04\/commercialization-brought-the-internet-to-the-masses-it-also-gave-us-spam\/\"><span class=\"import-url\">https:\/\/www.washingtonpost.com\/news\/made-by-<\/span><span class=\"import-url\">history\/wp\/2017\/08\/04\/commercialization-brought-the-internet-to-the-masses-it-also-gave-us-spam\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Google. \u201cFrom the Garage to the Googleplex.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Google<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId101\" href=\"https:\/\/about.google\/our-story\/\"><span class=\"import-url\">https:\/\/about.google\/our-story\/#:~:text=In%20August%201998%2C%20Sun%20co,was%20officially%20born<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Green, Adam. \u201cYellow Journalism: The \u2018Fake News\u2019 of the 19th Century.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The Public Domain Review<\/em><\/span>, 21 Feb. 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId102\" href=\"https:\/\/publicdomainreview.org\/collection\/yellow-journalism-the-fake-news-of-the-19th-century\"><span class=\"import-url\">https:\/\/publicdomainreview.org\/collection\/yellow-journalism-the-fake-news-of-the-19th-century<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Grossman, David. \u201cHow Machine Learning Lets Robots Teach Themselves.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Popular Mechanics<\/em><\/span>, 19 Dec. 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId103\" href=\"https:\/\/www.popularmechanics.com\/technology\/robots\/a14457503\/how-machine-learning-lets-robots-teach-themselves\/\"><span class=\"import-url\">https:\/\/www.popularmechanics.com\/technology\/robots\/a14457503\/how-machine-learning-lets-robots-teach-themselves\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Harriet Tubman Historical Society. \u201cSongs of the Underground Railroad.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Harriet Tubman Historical Society<\/em><\/span>, n.d., <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId104\" href=\"http:\/\/www.harriet-tubman.org\/songs-of-the-underground-railroad\/\"><span class=\"import-url\">http:\/\/www.harriet-tubman.org\/songs-of-the-underground-railroad\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Hempel, Jessi. \u201cSocial Media Made the Arab Spring, But Couldn\u2019t Save It.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Wired<\/em><\/span>, 26 Jan. 2016, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId105\" href=\"https:\/\/www.wired.com\/2016\/01\/social-media-made-the-arab-spring-but-couldnt-save-it\/\"><span class=\"import-url\">https:\/\/www.wired.com\/2016\/01\/social-media-made-the-arab-spring-but-couldnt-save-it\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Hess, Amanda. \u201cHow Privacy Became a Commodity for the Rich and Powerful.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">New York Times<\/em><\/span>, 9 May 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId106\" href=\"https:\/\/www.nytimes.com\/2017\/05\/09\/magazine\/how-privacy-became-a-commodity-for-the-rich-and-powerful.html\"><span class=\"import-url\">https:\/\/www.nytimes.com\/2017\/05\/09\/magazine\/how-privacy-became-a-commodity-for-the-rich-and-powerful.html<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">History.com. \u201cThe Invention of the Internet.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">History.com<\/em><\/span>, 28 Oct. 2019, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId107\" href=\"https:\/\/www.history.com\/topics\/inventions\/invention-of-the-internet\"><span class=\"import-url\">https:\/\/www.history.com\/topics\/inventions\/invention-of-the-internet#:~:text=The%20internet%20got%20its%20start,share%20data%20with%20one%20another<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Illinois University Library. \u201cAmerican Newspapers, 1800\u20131860: City Newspapers.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Illinois University Library<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId108\" href=\"https:\/\/www.library.illinois.edu\/hpnl\/tutorials\/antebellum-newspapers-city\/\"><span class=\"import-url\">https:\/\/www.library.illinois.edu\/hpnl\/tutorials\/antebellum-newspapers-city\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">International Society for Technology in Education. \u201cAbout.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">ISTE.org<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId109\" href=\"https:\/\/www.iste.org\/about\/about-iste\"><span class=\"import-url\">https:\/\/www.iste.org\/about\/about-iste<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cISTE Standards: Students.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">ISTE.org<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId110\" href=\"https:\/\/www.iste.org\/standards\/iste-standards-for-students\"><span class=\"import-url\">https:\/\/www.iste.org\/standards\/iste-standards-for-students<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Kataria, Maitrik. \u201cApp Usage Statistics 2022 That\u2019ll Surprise You (Updated).\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Simform<\/em><\/span>, 4 Jan. 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId111\" href=\"https:\/\/www.simform.com\/blog\/the-state-of-mobile-app-usage\/\"><span class=\"import-url\">https:\/\/www.simform.com\/blog\/the-state-of-mobile-app-usage\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Koetsier, John. \u201cE-Commerce Retail Just Passed $1 Trillion for the First Time Ever.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Forbes<\/em><\/span>, 29 Jan. 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId112\" href=\"https:\/\/www.forbes.com\/sites\/johnkoetsier\/2023\/01\/28\/e-commerce-retail-just-passed-1-trillion-for-the-first-time-ever\/?sh=bff541a36df2\"><span class=\"import-url\">https:\/\/www.forbes.com\/sites\/johnkoetsier\/2023\/01\/28\/e-commerce-retail-just-passed-1-trillion-for-the-first-time-ever\/?sh=bff541a36df2<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Koetsier, John. \u201cGlobal Online Content Consumption Doubled in 2020.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Forbes<\/em><\/span>, 26 Sept. 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId113\" href=\"https:\/\/www.forbes.com\/sites\/johnkoetsier\/2020\/09\/26\/global-online-content-consumption-doubled-in-2020\/?sh=d429c9e2fdeb\"><span class=\"import-url\">https:\/\/www.forbes.com\/sites\/johnkoetsier\/2020\/09\/26\/global-online-content-consumption-doubled-in-2020\/?sh=d429c9e2fdeb<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Legal Information Institute. \u201c42 U.S. Code \u00a7 1862\u2014Functions.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Cornell Law School<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId114\" href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/42\/1862\"><span class=\"import-url\">https:\/\/www.law.cornell.edu\/uscode\/text\/42\/1862<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Lokey, Fiona. \u201cThe History of Censorship in America.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">M-A Chronicle<\/em><\/span>, 5 Oct. 2016, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId115\" href=\"https:\/\/machronicle.com\/the-history-of-censorship-in-america\/\"><span class=\"import-url\">https:\/\/machronicle.com\/the-history-of-censorship-in-america\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Louise, Nickie. \u201cThese 6 Corporations Control 90% of the Media Outlets in America: The Illusion of Choice and Objectivity.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Tech.com<\/em><\/span>, 18 Sept. 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId116\" href=\"https:\/\/techstartups.com\/2020\/09\/18\/6-corporations-control-90-media-america-illusion-choice-objectivity-2020\/\"><span class=\"import-url\">https:\/\/techstartups.com\/2020\/09\/18\/6-corporations-control-90-media-america-illusion-choice-objectivity-2020\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Lutz, Ashley. \u201cThese 6 Corporations Control 90% of the Media in America.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Business Insider<\/em><\/span>, 14 June 2012, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId117\" href=\"https:\/\/www.businessinsider.com\/these-6-corporations-control-90-of-the-media-in-america-2012-6\"><span class=\"import-url\">https:\/\/www.businessinsider.com\/these-6-corporations-control-90-of-the-media-in-america-2012-6<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Maddox, Carliss. \u201cLiteracy by Any Means Necessary: The History of Anti-Literacy Laws in the U.S.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Oakland Literacy Coalition<\/em><\/span>, 12 Jan. 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId118\" href=\"https:\/\/oaklandliteracycoalition.org\/literacy-by-any-means-necessary-the-history-of-anti-literacy-laws-in-the-u-s\/\"><span class=\"import-url\">https:\/\/oaklandliteracycoalition.org\/literacy-by-any-means-necessary-the-history-of-anti-literacy-laws-in-the-u-s\/#:~:text=Anti%2Dliteracy%20laws%20made%20it,color%20to%20read%20or%20write<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Mark, Joshua. \u201cIndex of Prohibited Books.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">WorldHistory.org<\/em><\/span>, 21 June 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId119\" href=\"https:\/\/www.worldhistory.org\/article\/2018\/index-of-prohibited-books\/\"><span class=\"import-url\">https:\/\/www.worldhistory.org\/article\/2018\/index-of-prohibited-books\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Michaelsen, Frithjof, et al. \u201cThe Impact of Influencers on Advertising and Consumer Protection in the Single Market.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Policy Department for Economic, Scientific and Quality of Life Policies<\/em><\/span>, Feb. 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId120\" href=\"https:\/\/www.europarl.europa.eu\/RegData\/etudes\/STUD\/2022\/703350\/IPOL_STU(2022)703350_EN.pdf\"><span class=\"import-url\">https:\/\/www.europarl.europa.eu\/RegData\/etudes\/STUD\/2022\/703350\/IPOL_STU(2022)703350_EN.pdf<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Monaghan, E. Jennifer. \u201cReading for the Enslaved, Writing for the Free: Reflections on Liberty and Literacy.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">James Russell Wiggins Lecture in the History of the Book in American Culture<\/em><\/span>, Antiquarian Society, 6 Nov. 1998, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId121\" href=\"https:\/\/www.americanantiquarian.org\/proceedings\/44525153.pdf\"><span class=\"import-url\">https:\/\/www.americanantiquarian.org\/proceedings\/44525153.pdf<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">National Center for Education Statistics. \u201cFast Facts: Distance Learning.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Institute of Educational Practices<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId122\" href=\"https:\/\/nces.ed.gov\/fastfacts\/display.asp?id=80\"><span class=\"import-url\">https:\/\/nces.ed.gov\/fastfacts\/display.asp?id=80<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">National Museum of Computing. \u201cColossus.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Tnmoc.org<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId123\" href=\"https:\/\/www.tnmoc.org\/colossus\"><span class=\"import-url\">https:\/\/www.tnmoc.org\/colossus#:~:text=Colossus%2C%20however%2C%20was%20the%20first,Manchester%20Small%20Scale%20Experimental%20Machine<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cColossus Decrypts to be Revealed After 75 Years.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Tnmoc.org<\/em><\/span>, 19 Feb. 2019, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId124\" href=\"https:\/\/www.tnmoc.org\/news-releases\/2019\/2\/5\/colossus-decrypts-to-be-revealed-after-75-years\"><span class=\"import-url\">https:\/\/www.tnmoc.org\/news-releases\/2019\/2\/5\/colossus-decrypts-to-be-revealed-after-75-years#:~:text=The%20full%20impact%20of%20Colossus,of%20such%20complexity%20using%20valves<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">National Science Foundation. \u201cA Brief History of NSF and the Internet.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">NSF.gov<\/em><\/span>, 13 Aug. 2003, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId125\" href=\"https:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=103050\"><span class=\"import-url\">https:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=103050<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cThe Internet\u2014Nifty 50.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">NSF.gov<\/em><\/span>, 2000, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId126\" href=\"https:\/\/www.nsf.gov\/about\/history\/nifty50\/theinternet.jsp\"><span class=\"import-url\">https:\/\/www.nsf.gov\/about\/history\/nifty50\/theinternet.jsp#:~:text=Internet%20 expansion,expansion%20in%20that%20very%20month<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Nott, George. \u201cFather of the Internet Vint Cerf: IPv4 Was Never Production Version.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Computerworld.com<\/em><\/span>, 2 July 2018, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId127\" href=\"https:\/\/www2.computerworld.com.au\/article\/643174\/father-internet-vint-cerf-ipv4-never-production-version\/\"><span class=\"import-url\">https:\/\/www2.computerworld.com.au\/article\/643174\/father-internet-vint-cerf-ipv4-never-production-version\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Ormond, Cullen. \u201cThe Creation of the Printing Press.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">UNG University Press<\/em><\/span>, 18 July 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId128\" href=\"https:\/\/blog.ung.edu\/press\/the-creation-of-the-printing-press\/\"><span class=\"import-url\">https:\/\/blog.ung.edu\/press\/the-creation-of-the-printing-press\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">O\u2019Sullivan, Donie. \u201cHow the Cell Phones of Spring Breakers Who Flouted Coronavirus Warnings Were Tracked.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">CNN Business<\/em><\/span>, 4 Apr. 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId129\" href=\"https:\/\/www.cnn.com\/2020\/04\/04\/tech\/location-tracking-florida-coronavirus\/index.html\"><span class=\"import-url\">https:\/\/www.cnn.com\/2020\/04\/04\/tech\/location-tracking-florida-coronavirus\/index.html<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Our World In Data. \u201cDaily Hours Spent with Digital Media.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Wikimedia Commons<\/em><\/span>, 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId130\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Daily_hours_spent_with_digital_media,_OWID.svg\"><span class=\"import-url\">https:\/\/commons.wikimedia.org\/wiki\/File:Daily_hours_spent_with_digital_media,_OWID.svg<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Petriglieri, Gianpiero, et al. \u201cThriving in the Gig Economy.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Harvard Business Review<\/em><\/span>, Mar.-Apr. 2018, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId131\" href=\"https:\/\/hbr.org\/2018\/03\/thriving-in-the-gig-economy\"><span class=\"import-url\">https:\/\/hbr.org\/2018\/03\/thriving-in-the-gig-economy<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Pew Research Center. \u201cMobile Fact Sheet.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Pew Research<\/em><\/span>, 7 Apr. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId132\" href=\"https:\/\/www.pewresearch.org\/internet\/fact-sheet\/mobile\/\"><span class=\"import-url\">https:\/\/www.pewresearch.org\/internet\/fact-sheet\/mobile\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cNews Consumption across Social Media in 2021.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Pew Research<\/em><\/span>, 20 Sept. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId133\" href=\"https:\/\/www.pewresearch.org\/journalism\/2021\/09\/20\/news-consumption-across-social-media-in-2021\/\"><span class=\"import-url\">https:\/\/www.pewresearch.org\/journalism\/2021\/09\/20\/news-consumption-across-social-media-in-2021\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cSocial Media Fact Sheet.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Pew Research<\/em><\/span>, 8 Apr. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId134\" href=\"https:\/\/www.pewresearch.org\/internet\/fact-sheet\/social-media\/\"><span class=\"import-url\">https:\/\/www.pewresearch.org\/internet\/fact-sheet\/social-media\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cThe Rise in Apps Culture.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Pew Research<\/em><\/span>, 14 Sept. 2010, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId135\" href=\"https:\/\/www.pewresearch.org\/internet\/2010\/09\/14\/the-rise-of-apps-culture\/\"><span class=\"import-url\">https:\/\/www.pewresearch.org\/internet\/2010\/09\/14\/the-rise-of-apps-culture\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Saad, Lydia, and Ben Wigert. \u201cRemote Work Persisting and Trending Permanent.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Gallup<\/em><\/span>, 13 Oct. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId136\" href=\"https:\/\/news.gallup.com\/poll\/355907\/remote-work-persisting-trending-permanent.aspx\"><span class=\"import-url\">https:\/\/news.gallup.com\/poll\/355907\/remote-work-persisting-trending-permanent.aspx<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Selber, Stuart. <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Multiliteracies for a Digital Age<\/em><\/span>. Southern Illinois University Press, 2004.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Schiffrin, Anya. \u201cMuckraking.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Oxford Bibliographies<\/em><\/span>, 24 July 2018, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId137\" href=\"https:\/\/www.oxfordbibliographies.com\/view\/document\/obo-9780199756841\/obo-9780199756841-0211.xml\"><span class=\"import-url\">https:\/\/www.oxfordbibliographies.com\/view\/document\/obo-9780199756841\/obo-9780199756841-0211.xml<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Schuster, Jenna. \u201cA Brief History of Internet Service Providers.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Internet Archive<\/em><\/span>, 10 June 2016, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId138\" href=\"https:\/\/web.archive.org\/web\/20190428045452\/https:\/\/www.exede.com\/blog\/brief-history-internet-service-providers\/\"><span class=\"import-url\">https:\/\/web.archive.org\/web\/20190428045452\/https:\/\/www.exede.com\/blog\/brief-history-internet-service-providers\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Shao, Grace. \u201cSocial Media Has Become a Battleground in Hong Kong\u2019s Protests.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">CNBC<\/em><\/span>, 16 Aug. 2016, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId139\" href=\"https:\/\/www.cnbc.com\/2019\/08\/16\/social-media-has-become-a-battleground-in-hong-kongs-protests.html\"><span class=\"import-url\">https:\/\/www.cnbc.com\/2019\/08\/16\/social-media-has-become-a-battleground-in-hong-kongs-protests.html<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Spotlite. \u201cHow Social Media Has Helped the Ukraine Humanitarian Crisis.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Spotlite<\/em><\/span>, 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId140\" href=\"https:\/\/gospotlite.com\/blog\/social-media-helped-in-the-ukraine-humanitarian-crisis\"><span class=\"import-url\">https:\/\/gospotlite.com\/blog\/social-media-helped-in-the-ukraine-humanitarian-crisis<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Star, Danny. \u201cAn Abbreviated History Of SEO and What It Tells Us about SEO\u2019s Future Role.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Forbes<\/em><\/span>, 28 Feb. 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId141\" href=\"https:\/\/www.forbes.com\/sites\/forbesagencycouncil\/2020\/02\/28\/an-abbreviated-history-of-seo-and-what-it-tells-us-about-seos-future-role\/?sh=40575c6d11ef\"><span class=\"import-url\">https:\/\/www.forbes.com\/sites\/forbesagencycouncil\/2020\/02\/28\/an-abbreviated-history-of-seo-and-what-it-tells-us-about-seos-future-role\/?sh=40575c6d11ef<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Sundararajan, Arun. \u201cThe Gig Economy\u2019 Is Coming. What Will It Mean for Work?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The <\/em><em class=\"import-i\">Guardian<\/em><\/span>, 26 July 2015, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId142\" href=\"https:\/\/www.theguardian.com\/commentisfree\/2015\/jul\/26\/will-we-get-by-gig-economy\"><span class=\"import-url\">https:\/\/www.theguardian.com\/commentisfree\/2015\/jul\/26\/will-we-get-by-gig-economy<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Team Recurrency. \u201cThe IoT Data Explosion: How Big is the IoT Data Market?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Priceonomics<\/em><\/span>, 9 Jan. 2019, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId143\" href=\"https:\/\/priceonomics.com\/the-iot-data-explosion-how-big-is-the-iot-data\/\"><span class=\"import-url\">https:\/\/priceonomics.com\/the-iot-data-explosion-how-big-is-the-iot-data\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">UNESCO. \u201cArtificial Intelligence: Examples of Ethical Dilemmas.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">UNESCO<\/em><\/span>, 21 Apr. 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId144\" href=\"https:\/\/www.unesco.org\/en\/artificial-intelligence\/recommendation-ethics\/cases\"><span class=\"import-url\">https:\/\/www.unesco.org\/en\/artificial-intelligence\/recommendation-ethics\/cases#:~:text=AI%20is%20not%20neutral%3A%20AI,Rights%20and%20other%20fundamental%20values<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">U.S. Department of Commerce. \u201cQuarterly Retail E-Commerce Sales: 1st Quarter 2022.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Census.gov<\/em><\/span>, 19 May 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId145\" href=\"https:\/\/www.census.gov\/retail\/mrts\/www\/data\/pdf\/ec_current.pdf\"><span class=\"import-url\">https:\/\/www.census.gov\/retail\/mrts\/www\/data\/pdf\/ec_current.pdf<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">U.S. Securities and Exchange Commission. \u201cSEC Charges Kim Kardashian for Unlawfully Touting Crypto Security.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Securities and Exchange Commission<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId146\" href=\"https:\/\/www.sec.gov\/news\/press-release\/2022-183\"><span class=\"import-url\">https:\/\/www.sec.gov\/news\/press-release\/2022-183<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cSecurities Act of 1933.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Securities and Exchange Commission<\/em><\/span>, 24 Jan 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId147\" href=\"https:\/\/www.govinfo.gov\/content\/pkg\/COMPS-1884\/pdf\/COMPS-1884.pdf\"><span class=\"import-url\">https:\/\/www.govinfo.gov\/content\/pkg\/COMPS-1884\/pdf\/COMPS-1884.pdf<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Visualwebz. \u201cHistory of Google Analytics.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Medium<\/em><\/span>, 1 Dec. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId148\" href=\"https:\/\/seattlewebsitedesign.medium.com\/history-of-google-analytics-fb7b23b6dee0\"><span class=\"import-url\">https:\/\/seattlewebsitedesign.medium.com\/history-of-google-analytics-fb7b23b6dee0<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Wharton Staff. \u201cHow Social Media is Shaping Political Campaigns.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Knowledge at Wharton<\/em><\/span>, 17 Aug. 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId149\" href=\"https:\/\/knowledge.wharton.upenn.edu\/podcast\/knowledge-at-wharton-podcast\/how-social-media-is-shaping-political-campaigns\/\"><span class=\"import-url\">https:\/\/knowledge.wharton.upenn.edu\/podcast\/knowledge-at-wharton-podcast\/how-social-media-is-shaping-political-campaigns\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Wong, Belle. \u201cTop Social Media Statistics and Trends of 2023.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Forbes<\/em><\/span>, 18 May 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId150\" href=\"https:\/\/www.forbes.com\/advisor\/business\/social-media-statistics\/\"><span class=\"import-url\">https:\/\/www.forbes.com\/advisor\/business\/social-media-statistics\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">World Wide Web Foundation. \u201cHistory of the Web.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Web Foundation<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId151\" href=\"https:\/\/webfoundation.org\/about\/vision\/history-of-the-web\/\"><span class=\"import-url\">https:\/\/webfoundation.org\/about\/vision\/history-of-the-web\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Zuboff, Shoshana. <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The Age of Surveillance Capitalism<\/em><\/span>. Profile Books, 2019.<\/p>\n<\/div>\n<\/div>\n","protected":false},"author":3,"menu_order":1,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[48],"contributor":[],"license":[],"part":22,"_links":{"self":[{"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/pressbooks\/v2\/chapters\/5"}],"collection":[{"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/wp\/v2\/users\/3"}],"version-history":[{"count":19,"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/pressbooks\/v2\/chapters\/5\/revisions"}],"predecessor-version":[{"id":367,"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/pressbooks\/v2\/chapters\/5\/revisions\/367"}],"part":[{"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/pressbooks\/v2\/parts\/22"}],"metadata":[{"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/pressbooks\/v2\/chapters\/5\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/wp\/v2\/media?parent=5"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/pressbooks\/v2\/chapter-type?post=5"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/wp\/v2\/contributor?post=5"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/wp\/v2\/license?post=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}