249 Reading: Conflict Perspective on Media and Technology

Conflict Perspective

In contrast to theories in the functional perspective, the conflict perspective focuses on the creation and reproduction of inequality—social processes that tend to disrupt society rather than contribute to its smooth operation. When we take a conflict perspective, one major focus is the differential access to media and technology embodied in the digital divide. Conflict theorists also look at who controls the media, and how media promotes the norms of upper-middle-class white people in the United States while minimizing the presence of the working class, especially people of color.

Control of Media and Technology

Powerful individuals and social institutions have a great deal of influence over which forms of technology are released, when and where they are released, and what kind of media is available for our consumption, which is a form of gatekeeping. Shoemaker and Voss (2009) define gatekeeping as the sorting process by which thousands of possible messages are shaped into a mass media-appropriate form and reduced to a manageable amount. In other words, the people in charge of the media decide what the public is exposed to, which, as C. Wright Mills (1956) famously noted, is the heart of media’s power. Take a moment to think of the way “new media” evolve and replace traditional forms of hegemonic media. With hegemonic media, a culturally diverse society can be dominated by one race, gender, or class that manipulates the media to impose its worldview as a societal norm. New media weakens the gatekeeper role in information distribution. Popular sites such as YouTube and Facebook not only allow more people to freely share information but also engage in a form of self-policing. Users are encouraged to report inappropriate behavior that moderators will then address.

In addition, some conflict theorists suggest that the way U.S. media are generated results in an unbalanced political arena. Those with the most money can buy the most media exposure, run smear campaigns against their competitors, and maximize their visual presence. Almost a year before the 2012 U.S. presidential election, the candidates––Barack Obama for the Democrats and numerous Republican contenders––had raised more than $186 million (Carmi et al. 2012). Some would say that the Citizens United vs. Federal Election Committee is a major contributing factor to our unbalanced political arena. In Citizens United, the Supreme Court affirmed the right of outside groups, including Super Political Action Committees (SuperPACs) with undisclosed donor lists, to spend unlimited amounts of money on political ads as long as they don’t coordinate with the candidate’s campaign or specifically advocate for a candidate. What do you think a conflict perspective theorist would suggest about the potential for the non-rich to be heard in politics, especially when SuperPACs ensure that the richest groups have the most say?

Technological Social Control and Digital Surveillance

Social scientists take the idea of the surveillance society so seriously that there is an entire journal devoted to its study, Surveillance and Society. The panoptic surveillance envisioned by Jeremy Bentham, depicted in the form of an all-powerful, all-seeing government by George Orwell in 1984, and later analyzed by Michel Foucault (1975) is increasingly realized in the form of technology used to monitor our every move. This surveillance was imagined as a form of constant monitoring in which the observation posts are decentralized and the observed is never communicated with directly. Today, digital security cameras capture our movements, observers can track us through our cell phones, and police forces around the world use facial-recognition software.

Feminist Perspective

A thin female model is shown participating in New York’s fashion week.
What types of women are we exposed to in the media? Some would argue that the range of female images is misleadingly narrow. (Photo courtesy of Cliff1066/flickr)

Take a look at popular television shows, advertising campaigns, and online game sites. In most, women are portrayed in a particular set of parameters and tend to have a uniform look that society recognizes as attractive. Most are thin, white or light-skinned, beautiful, and young. Why does this matter? Feminist perspective theorists believe this idealized image is crucial in creating and reinforcing stereotypes. For example, Fox and Bailenson (2009) found that online female avatars conforming to gender stereotypes enhance negative attitudes toward women, and Brasted (2010) found that media (advertising in particular) promotes gender stereotypes. As early as 1990, Ms. magazine instituted a policy to publish without any commercial advertising.

The gender gap in tech-related fields (science, technology, engineering, and math) is no secret. A 2011 U.S. Department of Commerce Report suggested that gender stereotyping is one reason for this gap which acknowledges the bias toward men as keepers of technological knowledge (US Department of Commerce 2011). But gender stereotypes go far beyond the use of technology. Press coverage in the media reinforces stereotypes that subordinate women; it gives airtime to looks over skills, and coverage disparages women who defy accepted norms.

Recent research in new media has offered a mixed picture of its potential to equalize the status of men and women in the arenas of technology and public discourse. A European agency, the Advisory Committee on Equal Opportunities for Men and Women (2010), issued an opinion report suggesting that while there is the potential for new media forms to perpetuate gender stereotypes and the gender gap in technology and media access, at the same time new media could offer alternative forums for feminist groups and the exchange of feminist ideas. Still, the committee warned against the relatively unregulated environment of new media and the potential for antifeminist activities, from pornography to human trafficking, to flourish there.

Increasingly prominent in the discussion of new media and feminism is cyberfeminism, the application to, and promotion of, feminism online. Research on cyberfeminism runs the gamut from the liberating use of blogs by women living in Iraq during the second Gulf War (Peirce 2011) to an investigation of the Suicide Girls web site (Magnet 2007).

Think It Over

  1. Contrast a functionalist viewpoint of digital surveillance with a conflict perspective viewpoint.
  2. Describe how a cyberfeminist might address the fact that powerful female politicians are often demonized in traditional media.

Practice

1. A parent secretly monitoring the babysitter through the use of GPS, site blocker, and nanny cam is a good example of:

  1. the social construction of reality
  2. technophilia
  3. a neo-Luddite
  4. panoptic surveillance
Show Answer

d

2. When it comes to media and technology, a functionalist would focus on:

  1. the symbols created and reproduced by the media
  2. the association of technology and technological skill with men
  3. the way that various forms of media socialize users
  4. the digital divide between the technological haves and have-nots
Show Answer

c

3. When all media sources report a simplified version of the environmental impact of hydraulic fracturing, with no effort to convey the hard science and complicated statistical data behind the story, ___________ is probably occurring.

  1. gatekeeping
  2. the digital divide
  3. technophilia
  4. market segmentation
Show Answer

a

Show Glossary

cyberfeminism:
the application to and promotion of feminism online
gatekeeping:
the sorting process by which thousands of possible messages are shaped into a mass media-appropriate form and reduced to a manageable amount
panoptic surveillance:
a form of constant monitoring in which the observation posts are decentralized and the observed is never communicated with directly

License

Icon for the Creative Commons Attribution 4.0 International License

Introductory Sociology Copyright © by Lumen Learning is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book