Posted in DIGC202

The Internet of Things (IoT)

These days everything is connected to the Internet from our phone and computers to our lights and pretty much everything that we use in our everyday life. The term “Internet of Things” has become an increasingly growing topic of conversation both in the workplace and outside of it. 

What exactly is the “Internet of things” and what impact is it going to have on us, if any? 

Simply put, the Internet of things (IoT) is the concept of connecting any device with an on and off switch to the Internet (and/or to each other). This includes everything from mobile phones, coffee makers, washing machines, fridge, headphones, lamps, wearable devices and pretty much everything you can think of.  This also applies to components of machines, for example, a jet engine of an aeroplane or the drill of an oil rig. 

If it has an on and off switch then chances are it can be a part of the IoT.  According to Gartner, there are more than 12 billion devices that can currently connect to the Internet, and researchers at IDC estimate that by 2020 there will be 26 times more connected devices (some even estimate this number to be much higher, over 100 billion).  The IoT is a giant network of connected “things” (which also includes people).  The relationship will be between people-people, people-things, and things-things. Gartner also says that the consumer applications will drive the number of connected things, while enterprise will account for most of the revenue. IoT adoption is growing, with manufacturing and utilities estimated to have the largest installed base of Things by 2020. The McKinsey Global Institute predicts that the innovation enabled by the internet of things is expected to drive as much as an additional $6.2 trillion in value to the global economy by 2025.

Back in 1999, when the term IoT was created by MIT researcher Kevin Ashton back in 1999, the technology didn’t exist to make the Internet of Things a reality outside a very controlled environment, such as factory warehouse. But now the IoT can be applied to material objects to the internet- ranging from shoes to umbrellas or things like transportation networks: “smart cities” which can help us reduce waste and improve efficiency for things such as energy use; this helping us understand and improve how we work and live. Take a look at the visual below to see what something like that can look like this..

The reality is that the IoT allows for virtually endless opportunities and connections to take place, many of which we can’t even think of or fully understand the impact of today and it opens the door to a lot of opportunities but also to many challenges at the same time. For instance, security is a big issue. With billions of devices being connected together, people will face trouble to make sure that their information stays secure and it will be easier for people to maybe get access to your entire network just by sampling hacking into your washing machine. And the issue of privacy and data sharing is a whole other story.

There’s no question that security is a big issue but, it’s not that different than handling your online banking or giving your credit card to any online shopping platform. You need to have the necessary security protocols in place. Putting IoT to work for your business offers an array of opportunities as well as a heightened need to protect what you’ve put in place. But you need to think about how you can leverage those benefits today because its connectivity is already here and growing quickly.

REFERENCES 

Posted in DIGC202

The Phenomena of hacking and cybercrime

In this 21st digital era, we are surrounded by computer technology which obviously has brought great benefits to us but at the same time, it has also brought some negative impacts like hacktivism, cybercrimes cases. 

The phenomena of hacktivist and cybercrime were founded by a hacktivist group called Anonymous back in 2003. They are widely known for publicized distributed denial of services (DDoS) attacks on government, religious and corporate website with whom they have political disagreements. Even if the information is extremely decentralized, they can distribute it in a large quantity. This way they can keep the operation running even if someone is arrested for what is deemed as illegal activity (Sands, 2016). With around 20 members in Hong Kong, they are best known for their cyberattacks on the FBI, the Visa credit-card network and electronics giant Sony. 

So what is DDoS and who would carry out such attack? 

A distributed denial of service (DDoS) attack is an exceptionally malicious form of cybercrime where the hackers’ end goal is to take down a website or flood a corporate network with malicious traffic (such as incoming messages, fake pockets or requests for connection) to deny legitimate traffic and so take it offline (STAGE2DATA).

It could be anyone cyber-criminals or disgruntled employees. Perpetrators execute DDoS attacks for a variety of reasons, such as extortion, revenge, or politics. One of the examples of DDoS attack in Hong Kong was the PopVote DDoS attack which was carried out in 2014 and targeted the Hong Kong-based grassroots movement known as Occupy Central. The movement was campaigning for a more democratic voting system.

The attackers sent large amounts of traffic to three of Occupy Central’s web hosting services, as well as two independent sites, PopVote, an online mock election site, and Apple Daily, a news site, neither of which were owned by Occupy Central but openly supported its cause. Presumably, those responsible were reacting to Occupy Central’s pro-democracy message. The attack barraged servers with packets disguised as legitimate traffic and was executed with not one, not two, but five botnets. This resulted in peak traffic levels of 500 gigabits per second. According to the Hong Kong Law, the Office of the Government Chief Information Officer said: “Anyone convicted of accessing a computer with dishonest or criminal intent under Section 161 of Chapter 200 of the Crime Ordinance faces up to five years in jail.”

Moving onto cybercrime, it is a criminal activity that is committed or facilitates through a computer, networked device or a network that can be either attack against computer hardware and software, financial crimes or the abuse of young people in the form of ‘sexploitation’ (Interpol 2014). According to the U.S. Department of Justice cybercrime is divided into three categories: crimes in which the computing device is the target, for example, to gain network access; crimes in which the computer is used as a weapon, for example, to launch a denial-of-service(DoS) attack; and crimes in which the computer is used as an accessory to a crime, for example, using a computer to store illegally obtained data.

cyber attack concept with hacker in grey hoody with laptop and multimedia icons on screen. digital dollar sign background.

Some of the well-known primary impacts from cybercrime act is financial, which many people have fallen victim of and it can include many different types of profit-driven criminal activity, such as ransomware attacks, email and internet fraud and identity fraud, as well as attempts to steal financial account, credit card or other payment card information. Cybercriminals may target private personal information, as well as corporate data for theft and resale.

Just like any other people I’m sure we all have also experienced cybercrime attack in a form of phishing emails or scam calls in the name of my bank account, where they give you a link to access and in order unlock the access you’re asked to update your security details. Crimes like this have become common now we can also see all the involved authorities like banks have taken this issue seriously by trying to improve their banking securities and fraud-fighting effort to help their customers from getting tricked. But despite their effort we still see many Internet users fallen into this kind of scam. 

In our digital modern world internet piracy is another new form of robbery which is described as the acts of copyright infringement, which is theft, but more complicated than that in the eyes of the law. Copyright is a form of intellectual property and is designed to give the originator of material such as music and movies, the right to be paid for their work and have control over the distribution and selling of their copyrighted material (SafeInternet.org). Internet piracy is when someone knowingly and deliberately carries out an act of copying and distributing something over the internet for others to view, without the express permission of the original owner of the material. 

There are numerous motivational reasons why someone would choose to do this but one of the main incentives seems to be price, due to an unwillingness or even inability to pay the price requested by the legitimate seller. Another key factor seems to be consumers desire for immediacy. When the latest box-office blockbuster is released e.g. “Frozen 2”, there are many movie fans online who simply don’t want to wait any longer than they have to in order to see it, which leads some unscrupulous distributors to encourage internet piracy by illegally copying the film and distributing without permission which affects the sales of music and film industry.

REFERENCES 


Posted in DIGC202

Digital Resistance: Hacktivism, Whistle-blowers

“Hackers solve problems and build things, and they believe in freedom and voluntary mutual help.”

Eric S. Raymond 

Hacktivism is a term that been heard by many people over news and articles and people seemed to be concerned about it. For people that may have never heard of it or don’t have a clear idea of it, hacktivism is a fusion of hacking and activism. It requires the use of computers and computer networks as a means of protest to promote political ends. As defined by Wolchover (2011) it is “a modern form of protest in which savvy programmers use their hacking skills to fight back against social and political injustice”. So why does hacktivism takes place? it usually occurs when the people feel like there is injustice happening and people are not being treated equally that is when hacktivist/ whistle-blowers use digital tools to pursue political ends and expose a person or organization that partakes in criminal behaviour. Their social agenda is in the public interest.

One of the best examples of hacktivism and whistle-blowing is probably WikiLeaks, a non-profit media organization founded by Julian Assange with the aim to disseminate important news and information that the government has been keeping from the public (Wikileaks 2011). WikiLeaks managed to get international recognition by publishing private and confidential documents of a few prominent public figures and governments of the United States, Africa and Western Europe (Fenster 2011). For example, in 2010 WikiLeaks released around 400,000 secret US military logs detailing its operations in Iraq (Fildes 2010) and also a classified U.S. military footage from an attack in 2007 in Baghdad by a U.S. helicopter that killed a dozen people including two journalists (Radford 2010). Those who exposed argued that the hacktivism was illegal and while the mainstream audience was pleased to see what was hidden from them all this time and finally they were able to see it coming to the surface. 

Wikileaks is all about making sure everyone gets the chance to voice out their opinion and know the truth by providing original and trustworthy news/ stories because as said by Julian Assange (the first person to do so hacktivism) such actions can improve transparency and help us build a better society. But is the question is it ethical for Wikileaks to hack into the government and companies secure system to disclose all the private and confidential news to the public?

Everyone has a different opinion and they are entitled to it, while some people think the hacktivists like Assange are doing a great job by revealing all the secret documents that the government has been trying to hide away from the public but some are against this kind of act as it is illegal. As Fester (2011) said, Wikileaks creates a dangerous and illegal disruption to state security and operations because they simply disclose and disseminate important news and information. They have also been criticized for their lack of journalistic ethics as they put individual informants as well as military operations at risk (Vaulasvirta 2012).

Anonymous, another active hacktivist group who are known for publicized distributed denial of services (DDoS) attacks on government, religious and corporate website. They have managed to hack social media accounts associated with ISIS, taken a stand against the KKK, and attacked major credit card companies for not accepting WikiLeaks donations (Jochem, 2015). 

So why is the government so concerned about the groups like Anonymous, Wikileaks? It is particularly because these groups are showing another side of the story that usually been hidden from us and they’re making us think critically and question the government. These groups bring out stories, news that’s usually not covered by the traditional media. 

All in all, I would say its partly good to see Wikileaks exposing secret documents, news to the public as they believe that everyone should have the right to know the truth. The need for transparency is up to that would affect our lives, the need to know what threats are upon us, and the need to know if our government is doing their job. 

And let’s face it, sometimes that is the only path to justice. Even Snowden’s actions — whether you disagree with him or not — led to some startling and relevant revelations about our government’s surveillance programs that otherwise may not have happened had he not broken the law (Benkler, 2011).

But people also need to be more considering and try to understand that if the government or a particular organisation doesn’t want us to get access to certain documents or news they must have a solid reason behind doing so. 

REFERENCES

             Wolchover, N 2011, ‘Best Hacks by the Hacktivist Group’, accessed 

Posted in DIGC202

The emergent trajectories of protest movements

Connectivity is power, and with social media acting as the main organizational tool to communicate with each other, people can share their content in a matter of time. Within moments of big events happening, tweets, Instagram, Facebook posts are circulated, responses and comments made and the originating content is highlighted. We see that the power of social networking has 3 main roles which are to inform, to inspire and to invite people to do something about the situation as showcased in the Euromaidan protest. It all started when a Ukrainian journalist and activist Mustafa Nayem frustrated with the President Viktor Yanukovych decided not to sign the association agreement with the European Union, instead chose to have closer ties with Russia and the Eurasian Economic Union wrote a Facebook post asking others who shared his frustration to comment on his post. 

So how did the role of social media help the Euromaidan movement? 

There were mainly three mechanisms by which social media had affected the protest participation and development: by providing tools for organizing protests; by facilitating the spread of information related to protests; and by building networks that could sustain the protest movement.

The most direct role for social media was organizing protests and mobilizing participation. It is difficult to get the precise effect of social media on motivating participation. But according to survey research conducted during the protest, around  37.2% of people reported coming to protest, at least in part, as a result of reading on Facebook that their friends were going.  Facebook seems to have been the primary site on social media for the organization and coordination of resources and events, although Twitter and VKontakte also played a role. The main Euromaidan page garnered an extraordinary number of followers, setting a record for its growth in followers for Ukraine. Within two weeks, the page had over 125,000 followers, and these numbers continued to grow over the course of the protests. 

Beyond organization, social media also served as an information source. For example, the EuroMaidan Facebook page was the dissemination of information. Most of this information was in Ukrainian or Russian and was directed at informing a domestic audience about the ongoing protests. This was also a role played by online media sources such as Ukrainska Pravda, and by streaming video sites such as Hromadske TV, which served to provide ongoing live coverage in the local language. Beyond the domestic audience in Ukraine, social media (particularly Twitter) were able to play key roles in spreading information about the protests abroad. 

There were several important notes to take away from the role of social media during Euromaidan. Most importantly, the social media was a key tool used for organizing the protest and that at least some of the efforts organized online would have been impossible or extremely difficult using traditional means of organization. Such as the ability to accept donations online, to coordinate carpools across long distances, and to generate widespread shows of support from around the world are all hallmarks of the digital nature of the movement. The movement was largely leaderless, but not disorganized, ideologically diverse but not uncooperative, and, perhaps most importantly, it was able to topple the government.

REFENCES:

Posted in DIGC202

Bridges made of pebbles

With the traditional news media outlets like TV, radio and newspaper there are certain implications like the long tail, data aggregation and citizen journalism. Firstly, the Long Tail is a way marketing functions and works on the Internet. Its a concept defined by Chris Anderson to describe a business model used by the majority of Internet firms and eCommerce stores.

For instance, the online shopping platform like eBay it provides verities of an item for people to choose from and they have managed to attract all types of customers because they don’t have to worry much about the rent. As they collect the internet aggregate data together, it is easier and more convenient to get to the sources quicker than the traditional media.  Citizen journalism is a range of web-based practices such as people will choose to use iPad or iPhone to access to the Internet and get the latest news anytime whereby ‘ordinary’ users engage in journalistic practices (Goode 2009).

What’s the concept of the bridge of pebbles?

For example let’s say when something newsworthy happens immediately, with the introduction of social media we have a constant stream of the snip of information coming at us. We can get access to that immediately but it doesn’t necessarily give us the full story whereas if we wait a little bit longer the information gets aggregated into a more complete narrative. And the better understanding of the story itself. So it’s the difference between getting immediately or getting something later but more accurate. The idea of bridge pebble is idolization of what citizen journalism is and can be. The fact that all these little tiny pieces of information be tweets, videos, event photos to create a story and narrative of what’s happened to the news.

We often see news websites invading tweets in their stories using the story to flow. They start with this is what happened and a better tweet saying here’s the full story of the scene from someone that was at the scene rather having an image from a source to pay and get that image/ story. One of the benefit of the social media is that even though you’re getting immediate responses which are often quite brief and don’t give you the full story through time, you can build a strong understanding of the topic because the sense of community in places like Twitter is that the most important information will get pushed to the top whereas the unimportant tends to get pushed away or deleted.

Once you start compiling the stories into this bridge of pebbles more reliable information of the stories that’s where all the unwanted information get filtered out. The cohesive story put together by all the tiny little pieces of information spread across social media is something the technology has created and very important in the way news today just because of the nature of the social media on how rapid and how much information goes through it. The people that aggregate and build this story, it is important to get the full insight we get the full story out to the audience.  

REFERENCES

Posted in DIGC202

The opposing user philosophies of the iOS and Android mobile operating systems and devices

When it comes to smartphones, usually there’s a sense of superiority depending on phone choice. Talking about phone choice, iOS and Android are the two current dominant giants in the tech field. Google the creator of the Android OS and Apple the iOS. They are the top contenders for sale and managed to grab people’s attention with their rise of smartphones. It has also led to a massive rivalry as people often argue on which platform to choose. To ensure that you make the right choice on which one to get can be very difficult. Well to make your life easier, I’m going to list out some factors to consider. 

First of all, an operating system as it is a software that manages computer hardware which provides appropriate mechanisms to ensure the correct operation of the computer system and to prevent user programs from interfering with the proper operation of the system. It acts as an intermediary between the user of a computer and computer hardware. Its purpose is to provide an environment in which a user can execute programs conveniently and efficiently. Moreover, you should about the technical factors, the business factors and the audience factors. 

iOS is a closed source operating system and is only dedicated to Apple products which also means that the installation software can only be downloaded through Apple’s official store. To reduce the risk of infection from malicious software, it been officially reviewed by Apple with complete control over platform, content, and users. 

One of the benefits of iOS closed source operating system is that its less confusing and provides a unified experience as almost everything from features to layouts are chosen by developers, it can provide a standard experience to each user. Moreover, the closed source operating system can increase the revenue, because the developer can charge other developers the cost of using the API and eliminate competition by not letting designers copy their designs.

In contrast, Android is an open and free operating system. Being a part of Google and an Open Source Operating System it is customizable, the developers can modify the codes, download or post or change for the official/ unofficial Android market with no limitations to choose from a variety of apps.  Which means that it also has higher chances of getting in trouble.  

The Android provides specific application programming interface (API) which supports common media file formats e.g. MPEG, MPEG-3, MPEG-4, H.286, AAC, JPG, PNG, GIF. Whereas the iOS being closed source operating system only provides a standard design which is only accessible for Apple products such as the iPhone, iPad, iPod, Apple Watch/ TV. 

At the end of the day, its all on a person’s choice. If you want something simple, standard and expensive device to show off to your friends you get and iOS. And if you want something less pricy, complex and common device then you go for the Android.

REFRENCES

Posted in DIGC202

The rise of digital feudalism

Classes of Digital Feudalism. Lords of the manor: companies who own and manage platforms. Major gentry: companies with business models based on the manor platforms. Minor gentry: “influencers” who drive users to spend more time on the site. Serfs: people who submit to data collection for the right to exist in digital space

Taking as step back to 14th-15th Century Medieval Europe, feudalism is described as a structural social system under which the King would control all of the land and would hand out this land to nobles, knights, and eventually peasants. All this system was implemented just so he would receive protection, support, and overall control of how that land was used. He would act as the centre or hub and live off the labour of his peasants. 

You might be thinking what’s the point of bringing out old history. How does this former system relate to us in 2019?

Dusting off our history books, in today’s modern tech era, we still uphold the same structure emerge called digital feudalism where the big data acting as the modern day king controls the flow of information. In this structure, the investors (kings) grant resources to the tech entrepreneurs (nobles, knights), who then build software for the masses to use. If you find the you can’t relate to either of these roles, then chances are you’re a modern-day digital serf. The federal lords are tech giants like Facebook, Google, Amazon, Microsoft. We, the users of such giants, are the peasants, working under the reign of such massive companies. They are successful because of our labour, our participation, our attention.

These big data gatekeepers maintain “walled gardens” where they help us control and share our content while gathering large amounts of data from us. We can say the walled garden is beneficial to us as it provides the users protection, high quality free services to keep the interaction flow smooth. However, at the same time we pay for our own data so technically its not completely free. We also unknowingly place a large amount trust into these controllers. For instance, we’re quick to check off terms and agreements, provide our information (gender, phone number, etc.), and allow apps to access our exact location and camera roll. And it seems like the Facebook is more familiar with our personal information than any of our family members or relatives as it knows our every personal information, relationships as well as the health status.

An image designed to show the structure of digital feudalism by The Grand Optimist

It wouldn’t be wrong to say that we are definite a bunch of peasants in the Internet garden. With the information that we feed them, it has led to the rise of digital feudalism.  All in all, just like the 14th-15th Century Medieval Europe Feudalism, the digital feudalism in no different with its closed, hierarchical and centralised system. But, the difference is that the people are now willing to share their data with the companies. We got so comfortable with this system that we forgot to question is it actually risky or not. 

REFERENCES

Posted in DIGC202

Week 4: Development brought by media/technology convergence create a new economy of filtering and access to cloud-storage content

The media convergence brings out the inclusion and interoperability through various devices of computer network . The current revolution in computing and communications shows that the use of the information and technology  has progressed at a rapid pace. With the increase support in the power the usage of new information technologies has proven to be cost effective. 

Now, the innovations in information and technology have effect around various sectors of society on issues such as economic productivity, intellectual property rights, privacy protection, and affordability of and access to information. People need to pay extra attention now as there will be some serious long lasting consequences that may affect social and economic sectors. 

People are now engaged in new way of conducting business, via electronic commerce over the Internet. It can alter economic activities and social environment as its already seen to affect some major sectors such as communications, finance and retail trade and might expand to areas such as education and health services. The application of electronic commerce applies on business, market structure, workplace, labour market,  

Despite its advantages, technological convergence comes with notable drawbacks. Due to the complexity of delivering internet, video and voice services, network providers must make necessarily expensive investments in computing, networks, security and continuous software development. These costs generally will be absorbed by consumers in the form of higher rates or service fees.

Posted in DIGC202

Week 3: Living in an Information Society

According to the Manuel Castellsnetwork society is made of society that is made of networks powered by microelectronics based information and communication technologies. Castells thinks that the societies today are highly facilitated by networks. He thinks the information society as the revolutionary organizational structure of contemporary society, involving changes in the uses of time and space (Hamilton, 2002, p. 113).

As the technology advances, Castells observes the changes in the use of time and space. For instance one of the key aspect of social change is that of the farmers relying on nature to the onset of industrialization with factories and regulatory clock-time. Now, the people are more into less rigidity and more into increased flexibility, a veritable annihilation and de-sequencing of time. The sudden communication and global transactions were promising because things like life-cycle timings were becoming ordinary; reproduction and life expectancy. And it was all successful only due to the development of information and communication technologies (ICTs). 

Space and time are the fundamental, material dimensions of human lives. Physicists have unveiled the complexity of such notions, beyond their fallacious intuitive simplicity. … superstring theory, the latest fashion in physics, advances the hypothesis of a hyperspace that articulates ten dimensions, including time (Castells 1996, p. 376).

The information network was seen as  a new and revolutionary social form which contributed to factors such as the restructuring of capitalism, the increase of social movements, feminism and environmentalism and multiple others. It also influenced the globalization which links closely with the information society and networks theory. Castells sees networks as interconnecting nodes across geographical locations, used to an immediate advantage but disposed of when no longer beneficial. According to Castells these networks and ICTs have had such a significant impact on the reordering of time and space that a new societal form has emerged. 

Castells also states that the impact of technology on a cultural level. The technology available within the home no longer flows one-way. Communication technologies facilitate interactivity and a wide range of information is streamed into the home, creating diversity and agency. These seemingly extensive changes are shown to impact society on a micro-level within the private sphere of the home. This, according to Castells and Thompson, is a characteristic of modernity (Mackay, 2002, p. 144). 

One important way in which information technology is affecting work is by reducing the im- portance of distance. In many industries, the geographic distribution of work is changing significantly. 

References:

RANDOLPH, R. (2018, July 4). Networks, Communication Technologies, and the Reorganization of Urban Space: Challenges for Analyzing the Case of Rio de Janeiro, Brazil. Retrieved September 26, 2019, from https://web.archive.org/web/20070901192601/http:/www.isoc.org/isoc/conferences/inet/99/proceedings/3b/3b_1.htm#Castells_1996.

Trudeau, K. (2019, June 23). The Global Information Network (GIN Evolve) By Kevin Trudeau Looks Like A Scam! Retrieved September 27, 2019, from https://www.livingmoreworkingless.com/global-information-network-gin-evolve/.

Posted in DIGC202

Week 2: Building a global network

The rapid development of technology in recent years has definitely changed our lifestyle, that we now live in an ‘information society’. We can easily communicate and spread message with people via a phone, television, computer and many other devices without no restriction of time and space. It has helped in the growth of global markets to promote efficiency over competition and the division of labour and open doors to diversified and larger markets around the world. Through which the people get access to more capital, technology, cheaper imports and larger exports. In today’s world the generation Y rely heavily on knowledge and information as the economic core unlike the agriculture and manufacturing back in the days. Technology ensures great flow of information hence better quality of communication. Hence, having a global network has proven to be one of the best invention the people. 

In traditional utopias, the abundance has generally been of food, treasure, or other property. The closest equivalents for the Internet are the bits of culture, creativity, and scholarship that fall under the protection of copyright. This includes most static resources on the Internet: Web pages, software code, journal articles, photos, movies, songs, etc. The Internet and any form of digital technology solve the problem of resource scarcity for resources that can be expressed digitally by enabling the copy and transfer of intellectual property at little to no cost, creating abundance. For example, I can send a copy of an essay to a friend, and then we will both have a copy of the paper at no cost. Similarly, the friend could send my paper to hundreds or thousands of people who will all then have the paper at no cost. 

This accounts for much of the Internet’s utopian potential but also creates a great deal of tension between the ideals of the Internet, the reality of common property, and business interests with competing traditional intellectual property rights claims. That is, those who make money by creating and selling pieces of digitized intellectual property are being directly confronted by the practice of unauthorized copying and dissemination of that property by Internet users and the diminishing revenue that results. 

The core element of global network is the expansion of world trade through the reduction of the trade barriers such as import tariffs. With the greater imports the consumers get wide range variety of good in cheaper prices while still supporting the local domestic industries to maintain the competition. Similarly, the developing nations doing the exports also create an economic growth as the exports creates job opportunities by doing a business beyond their nations. 

However, there are some drawbacks led by the global network which is mostly led by Western transnational media corporations such as the impact the on the society, culture, political views etc. For instance, as the cyberspace doesn’t have much restrictions so you can easily get access tom other people’s  personal information, digital footprint, websites which may lead to several dangers as the data gets exposed. There is a risk of cyberbullying, getting virus on your device, and risk of getting hacked all due to the lack of privacy. 

References: 

Pros And Cons Of Media Globalization Media Essay. (2016, December 5). Retrieved September 20, 2019, from https://www.ukessays.com/essays/media/pros-and-cons-of-media-globalization-media-essay.php.

Rouse, M., Kranz, G., Jones, M., Rouse, M., & Rouse, M. (2018, July). What is technological convergence? – Definition from WhatIs.com. Retrieved September 21, 2019, from https://searchconvergedinfrastructure.techtarget.com/definition/convergence.