SlideShare a Scribd company logo
1 of 21
Overview

Part 1: Three Phases of New Media Growth

              -- Institutional: Military, industrial, educational

              -- Radical: countercultural visions of cyberspace

              -- Commercial: new business models,
  economies



Part 2: Colonising New Media

              --The Internet as social space

             --Theories of computer mediated
  communication

              --New media identities
Mythologies of new media

 The Internet is a powerful tool for self-realization

 The Internet will spread and promote democracy

 The Internet short-circuits traditional power
  hierarchies
 The Internet will make you cool

 The Internet will make you rich

 The Internet mirrors natural evolution
“The denial of history is central to understanding myth
as depoliticized speech, because to deny history is to
remove from discussion active human agency, the
constraints of social structure, and the real world of
politics.

According to myth, the Information Age transcends
politics because it makes power available to everyone
and in great abundance. The defining characteristic
of politics, the struggle over the scarce resource of
power, is eliminated.”

                         (V. Mosco, 2004; Barthes,
1957)
Institutional Phase
The first computers were used in
institutional settings for:

Code breaking
Performing atomic simulations
Plotting trajectory of rockets
Naval artillery simulation
Analysing the census
Calculating insurance risk

Later in university research
"I think there is a world market for maybe five
    computers.”

   - Thomas John Watson, President of IBM, 1943

"There is no reason anyone would want a computer in
  their home.”

- Ken Olsen, Founder of Digital Equipment Corp, 1977




                                          LINC, MIT Labs 1966
Timeline of Early Computing




The price per transistor on an integrated circuit fell from $50 in 1962 to $1 in
  1971 to $0.001 in 1980 to 1/100,000th of a penny in 2000

A billion operations per second cost $8 trillion in 1961. In 2012 it cost $0.73
Until the 1970s computers were:


 Frightening (primarily used by large institutions to
  measure, control, surveil and kill people)

 Concentrated in centres of power

 Expensive (early PDP-1 cost £500,000 in today’s
  currency)

 Associated with expert knowledge, difficult to use
  unless highly trained

 Imagined to have capabilities beyond real
  performance
The Radical Phase

      Emerging from countercultural
        movements in the 1960s



      libertarian, anti-hierarchical ethic



      radically empowered individuals

      Asserting mastery over the
        autocratic computer
Levy’s ‘Hacker Ethic’
          Access to computers should be
           unlimited and total.
          All information should be free.
          Mistrust authority—promote
           decentralization.
          Hackers should be judged by skill,
           not bogus criteria such as degrees,
           age, race or position.
          You can create art and beauty on a
           computer.
          Computers can change your life for
           the better.
A quaint vision that persists…
Declaration of the Independence of Cyberspace


“Governments of the Industrial World, you weary giants of
  flesh and steel, I come from Cyberspace, the new home of
  Mind. On behalf of the future, I ask you of the past to leave
  us alone. You are not welcome among us. You have no
  sovereignty where we gather. […] We are creating a world
  that all may enter without privilege or prejudice accorded
  by race, economic power, military force, or station of birth.
  Your legal concepts of property, expression, identity,
  movement, and context do not apply to us. They are all
  based on matter, and there is no matter here.
                                     John Perry Barlow (1996)
The world brings even the most radical gestures under its wing.
Opening shot of the commercial phase
             Feedback we have gotten from the
          hundreds of people using BASIC has all been
          positive. Two surprising things are apparent,
          however, 1) Most of these "users" never
          bought BASIC (less than 10% of all Altair
          owners have bought it), and 2) The amount of
          royalties we have received makes the time
          spent on Altair BASIC worth less than $2 an
          hour.
              As the majority of hobbyists must be aware,
          most of you steal your software. Hardware
          must be paid for, but software is something to
          share. Who cares if the people who worked on
          it get paid?
                       “Open Letter to Hobbyists” (1976)
Today, the global semiconductor industry
Is worth $350 billion USD per year

Accounting for 10% of global GDP

Inventory is measured in billions of square
inches

Placed end-to-end, yearly output would circle
the Earth 5 times
Theories of social and economic
                change
 Major social transformations since 1970: Economy,
  Governance, Culture
 Changes to business environment as a consequence of
  digital technology
 Theories of individual and group behaviour in computer-
  mediated environments
Many terms for similar/related processes
 ‘Globalization’

 Late capitalism

 Informational capitalism

 Postindustrialism

 Postfordism

 Information society

 Network society
Effects:
Moderately increased productivity per worker due to
  knowledge economy (but not increased employment)

Declining national sovereignty (transnational economic
  agreements, mobility of capital investment, ratings
  agencies)

Work and workers are increasingly organized around
 flexible arrangements, making it easier for businesses
 to be agile in globally competitive marketplace

Bifurcation of high-skilled/low-skilled workforces along
   axis of knowledge intensity.
Porter (2001)
Internet creates distorted market signals:

 Companies have subsidized online ventures to gain marketshare

 Govts have subsidized online ventures through tax avoidance

 Curiosity, novelty that will presumably wear off

 Lower wages and other forms of remuneration accepted



Competitive advantage:

 Operational effectiveness difficult to sustain in era of internet.
“Postmodern information economies configure all
  communication, even ‘looking’, as part of the
  productive labour process. This is so because
  communication produces information, which makes
  up the core resource of the information economy.”
                                    (Zwick et al, 2008)




2008 is the year we hit peak attention.
                                  Matt Webb
Mark Deuze (2011) Media Life:
 We are increasingly involved as BOTH producers and
  consumers of media
 Media is becoming invisible in daily life: media are
  ‘everywhere and therefore nowhere’.
 We increasingly move through our own personal
  information space
 Everything is mediated: romantic relationships, shopping,
  politics, work and leisure.
 We are moving as a society toward the top of Maslow’s
  pyramid

More Related Content

What's hot

The Informational Economy: Knowledge and Cyberspace
The Informational Economy: Knowledge and CyberspaceThe Informational Economy: Knowledge and Cyberspace
The Informational Economy: Knowledge and Cyberspace
bukky36
 
The Real Computer World
The Real Computer World The Real Computer World
The Real Computer World
ellis12
 
Physical and virtual mobilities
Physical and virtual mobilitiesPhysical and virtual mobilities
Physical and virtual mobilities
Stephen Graham
 
ANIS 2012 - Asia social innovation tour_Japan
ANIS 2012 - Asia social innovation tour_JapanANIS 2012 - Asia social innovation tour_Japan
ANIS 2012 - Asia social innovation tour_Japan
ngoinnovation
 

What's hot (18)

The Informational Economy: Knowledge and Cyberspace
The Informational Economy: Knowledge and CyberspaceThe Informational Economy: Knowledge and Cyberspace
The Informational Economy: Knowledge and Cyberspace
 
The Role of Government in the Digital Society of 2025
The Role of Government in the Digital Society of 2025The Role of Government in the Digital Society of 2025
The Role of Government in the Digital Society of 2025
 
Digital Intermediation: Automating our Media DIversity through Unseen Infrast...
Digital Intermediation: Automating our Media DIversity through Unseen Infrast...Digital Intermediation: Automating our Media DIversity through Unseen Infrast...
Digital Intermediation: Automating our Media DIversity through Unseen Infrast...
 
Roadmap to Society30
Roadmap to Society30Roadmap to Society30
Roadmap to Society30
 
Dharma Drum Univ Digital Philanthropy
Dharma Drum Univ Digital PhilanthropyDharma Drum Univ Digital Philanthropy
Dharma Drum Univ Digital Philanthropy
 
Cyber law ppt
Cyber law pptCyber law ppt
Cyber law ppt
 
Digital Ecosystems
Digital EcosystemsDigital Ecosystems
Digital Ecosystems
 
'Smart cities’ : Seduction, simulation, scepticism
'Smart cities’ :  Seduction, simulation, scepticism'Smart cities’ :  Seduction, simulation, scepticism
'Smart cities’ : Seduction, simulation, scepticism
 
Villa Media 2017
Villa Media 2017Villa Media 2017
Villa Media 2017
 
Introduction to 'How human will posthumans be?'
Introduction to 'How human will posthumans be?'Introduction to 'How human will posthumans be?'
Introduction to 'How human will posthumans be?'
 
The Real Computer World
The Real Computer World The Real Computer World
The Real Computer World
 
Smart cities: how computers are changing our world for the better
Smart cities: how computers are changing our world for the betterSmart cities: how computers are changing our world for the better
Smart cities: how computers are changing our world for the better
 
Physical and virtual mobilities
Physical and virtual mobilitiesPhysical and virtual mobilities
Physical and virtual mobilities
 
Disruption Rules!
Disruption Rules!Disruption Rules!
Disruption Rules!
 
"ImaginaCity" Open Cities Panel, PDF Europe October 2010
"ImaginaCity" Open Cities Panel, PDF Europe October 2010"ImaginaCity" Open Cities Panel, PDF Europe October 2010
"ImaginaCity" Open Cities Panel, PDF Europe October 2010
 
Social Media Murdoch
Social Media MurdochSocial Media Murdoch
Social Media Murdoch
 
Interface
InterfaceInterface
Interface
 
ANIS 2012 - Asia social innovation tour_Japan
ANIS 2012 - Asia social innovation tour_JapanANIS 2012 - Asia social innovation tour_Japan
ANIS 2012 - Asia social innovation tour_Japan
 

Viewers also liked (8)

AVP for Papa's 56th bday! ^_^
AVP for Papa's 56th bday! ^_^AVP for Papa's 56th bday! ^_^
AVP for Papa's 56th bday! ^_^
 
Wobbling Is Normal
Wobbling Is NormalWobbling Is Normal
Wobbling Is Normal
 
Navigating the body
Navigating the bodyNavigating the body
Navigating the body
 
Storyboard Final EDT 631
Storyboard Final EDT 631Storyboard Final EDT 631
Storyboard Final EDT 631
 
Storyboard EDT 631
Storyboard EDT 631Storyboard EDT 631
Storyboard EDT 631
 
Havens week3 digital_issues_copyright
Havens week3 digital_issues_copyrightHavens week3 digital_issues_copyright
Havens week3 digital_issues_copyright
 
Niskayuna Aquaponics Round 1 Report
Niskayuna Aquaponics Round 1 ReportNiskayuna Aquaponics Round 1 Report
Niskayuna Aquaponics Round 1 Report
 
Pneumonia 131028101758-phpapp01
Pneumonia 131028101758-phpapp01Pneumonia 131028101758-phpapp01
Pneumonia 131028101758-phpapp01
 

Similar to A Genealogy of New Media

Securityand policing2015(2.05)
Securityand policing2015(2.05)Securityand policing2015(2.05)
Securityand policing2015(2.05)
guest7227c5
 
Troxler: Third Industrial Revolution?
Troxler: Third Industrial Revolution?Troxler: Third Industrial Revolution?
Troxler: Third Industrial Revolution?
Peter Troxler
 
LECTURE 11 - Cyberculture
LECTURE 11 - CybercultureLECTURE 11 - Cyberculture
LECTURE 11 - Cyberculture
Kim Flintoff
 
Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internet
Vincy
 
Wake me up tomorrow has already happened !
Wake me up tomorrow has already happened !Wake me up tomorrow has already happened !
Wake me up tomorrow has already happened !
suresh sood
 

Similar to A Genealogy of New Media (20)

Japanese Students @ UW
Japanese Students @ UWJapanese Students @ UW
Japanese Students @ UW
 
Technocultures
TechnoculturesTechnocultures
Technocultures
 
Securityand policing2015(2.05)
Securityand policing2015(2.05)Securityand policing2015(2.05)
Securityand policing2015(2.05)
 
May you live in interesting times
May you live in interesting timesMay you live in interesting times
May you live in interesting times
 
Troxler: Third Industrial Revolution?
Troxler: Third Industrial Revolution?Troxler: Third Industrial Revolution?
Troxler: Third Industrial Revolution?
 
Slaughtering Sacred Cows
Slaughtering Sacred CowsSlaughtering Sacred Cows
Slaughtering Sacred Cows
 
Transformed media landscape - and how we can make best use of it
Transformed media landscape - and how we can make best use of itTransformed media landscape - and how we can make best use of it
Transformed media landscape - and how we can make best use of it
 
National & International Aspects Of The Digital Revolution
National & International Aspects Of The Digital RevolutionNational & International Aspects Of The Digital Revolution
National & International Aspects Of The Digital Revolution
 
DOR Futurecast
DOR FuturecastDOR Futurecast
DOR Futurecast
 
Comm 309
Comm 309Comm 309
Comm 309
 
Energing Technology and the Creative Economy
Energing Technology and the Creative EconomyEnerging Technology and the Creative Economy
Energing Technology and the Creative Economy
 
Economics of Digital Information
Economics of Digital InformationEconomics of Digital Information
Economics of Digital Information
 
Computing, cognition and the future of knowing,. by IBM
Computing, cognition and the future of knowing,. by IBMComputing, cognition and the future of knowing,. by IBM
Computing, cognition and the future of knowing,. by IBM
 
Learning to trust artificial intelligence systems accountability, compliance ...
Learning to trust artificial intelligence systems accountability, compliance ...Learning to trust artificial intelligence systems accountability, compliance ...
Learning to trust artificial intelligence systems accountability, compliance ...
 
The Landscape for Grantmaking in 2043
The Landscape for Grantmaking in 2043The Landscape for Grantmaking in 2043
The Landscape for Grantmaking in 2043
 
LECTURE 11 - Cyberculture
LECTURE 11 - CybercultureLECTURE 11 - Cyberculture
LECTURE 11 - Cyberculture
 
Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internet
 
Economic Impact of Digital Revolution_JM_073015
Economic Impact of Digital Revolution_JM_073015Economic Impact of Digital Revolution_JM_073015
Economic Impact of Digital Revolution_JM_073015
 
Wake me up tomorrow has already happened !
Wake me up tomorrow has already happened !Wake me up tomorrow has already happened !
Wake me up tomorrow has already happened !
 
Engineering Social Justice Presentation
Engineering Social Justice PresentationEngineering Social Justice Presentation
Engineering Social Justice Presentation
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

A Genealogy of New Media

  • 1.
  • 2. Overview Part 1: Three Phases of New Media Growth -- Institutional: Military, industrial, educational -- Radical: countercultural visions of cyberspace -- Commercial: new business models, economies Part 2: Colonising New Media --The Internet as social space --Theories of computer mediated communication --New media identities
  • 3. Mythologies of new media  The Internet is a powerful tool for self-realization  The Internet will spread and promote democracy  The Internet short-circuits traditional power hierarchies  The Internet will make you cool  The Internet will make you rich  The Internet mirrors natural evolution
  • 4. “The denial of history is central to understanding myth as depoliticized speech, because to deny history is to remove from discussion active human agency, the constraints of social structure, and the real world of politics. According to myth, the Information Age transcends politics because it makes power available to everyone and in great abundance. The defining characteristic of politics, the struggle over the scarce resource of power, is eliminated.” (V. Mosco, 2004; Barthes, 1957)
  • 5. Institutional Phase The first computers were used in institutional settings for: Code breaking Performing atomic simulations Plotting trajectory of rockets Naval artillery simulation Analysing the census Calculating insurance risk Later in university research
  • 6. "I think there is a world market for maybe five computers.” - Thomas John Watson, President of IBM, 1943 "There is no reason anyone would want a computer in their home.” - Ken Olsen, Founder of Digital Equipment Corp, 1977 LINC, MIT Labs 1966
  • 7. Timeline of Early Computing The price per transistor on an integrated circuit fell from $50 in 1962 to $1 in 1971 to $0.001 in 1980 to 1/100,000th of a penny in 2000 A billion operations per second cost $8 trillion in 1961. In 2012 it cost $0.73
  • 8. Until the 1970s computers were:  Frightening (primarily used by large institutions to measure, control, surveil and kill people)  Concentrated in centres of power  Expensive (early PDP-1 cost £500,000 in today’s currency)  Associated with expert knowledge, difficult to use unless highly trained  Imagined to have capabilities beyond real performance
  • 9. The Radical Phase Emerging from countercultural movements in the 1960s libertarian, anti-hierarchical ethic radically empowered individuals Asserting mastery over the autocratic computer
  • 10. Levy’s ‘Hacker Ethic’  Access to computers should be unlimited and total.  All information should be free.  Mistrust authority—promote decentralization.  Hackers should be judged by skill, not bogus criteria such as degrees, age, race or position.  You can create art and beauty on a computer.  Computers can change your life for the better.
  • 11. A quaint vision that persists… Declaration of the Independence of Cyberspace “Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather. […] We are creating a world that all may enter without privilege or prejudice accorded by race, economic power, military force, or station of birth. Your legal concepts of property, expression, identity, movement, and context do not apply to us. They are all based on matter, and there is no matter here. John Perry Barlow (1996)
  • 12. The world brings even the most radical gestures under its wing.
  • 13. Opening shot of the commercial phase Feedback we have gotten from the hundreds of people using BASIC has all been positive. Two surprising things are apparent, however, 1) Most of these "users" never bought BASIC (less than 10% of all Altair owners have bought it), and 2) The amount of royalties we have received makes the time spent on Altair BASIC worth less than $2 an hour. As the majority of hobbyists must be aware, most of you steal your software. Hardware must be paid for, but software is something to share. Who cares if the people who worked on it get paid? “Open Letter to Hobbyists” (1976)
  • 14. Today, the global semiconductor industry Is worth $350 billion USD per year Accounting for 10% of global GDP Inventory is measured in billions of square inches Placed end-to-end, yearly output would circle the Earth 5 times
  • 15. Theories of social and economic change  Major social transformations since 1970: Economy, Governance, Culture  Changes to business environment as a consequence of digital technology  Theories of individual and group behaviour in computer- mediated environments
  • 16. Many terms for similar/related processes  ‘Globalization’  Late capitalism  Informational capitalism  Postindustrialism  Postfordism  Information society  Network society
  • 17. Effects: Moderately increased productivity per worker due to knowledge economy (but not increased employment) Declining national sovereignty (transnational economic agreements, mobility of capital investment, ratings agencies) Work and workers are increasingly organized around flexible arrangements, making it easier for businesses to be agile in globally competitive marketplace Bifurcation of high-skilled/low-skilled workforces along axis of knowledge intensity.
  • 18.
  • 19. Porter (2001) Internet creates distorted market signals:  Companies have subsidized online ventures to gain marketshare  Govts have subsidized online ventures through tax avoidance  Curiosity, novelty that will presumably wear off  Lower wages and other forms of remuneration accepted Competitive advantage:  Operational effectiveness difficult to sustain in era of internet.
  • 20. “Postmodern information economies configure all communication, even ‘looking’, as part of the productive labour process. This is so because communication produces information, which makes up the core resource of the information economy.” (Zwick et al, 2008) 2008 is the year we hit peak attention. Matt Webb
  • 21. Mark Deuze (2011) Media Life:  We are increasingly involved as BOTH producers and consumers of media  Media is becoming invisible in daily life: media are ‘everywhere and therefore nowhere’.  We increasingly move through our own personal information space  Everything is mediated: romantic relationships, shopping, politics, work and leisure.  We are moving as a society toward the top of Maslow’s pyramid