Assessing Media Messages

This week note three mass media messages you’ve received in various formats. What was the original message in each? After applying critical thinking, and analyzing the messages, did you note any more subtle messages? If so, what were they and how were they framed?

The response entered here will appear in the performance dashboard and can be viewed by your instructor.


Summary: Mass Media Literacy The vocabulary for media literacy begins with knowing terms like mass media and mass communication. Mass media are vehicles that carry messages to large audiences. Major media are print media (primarily books, newspapers, and magazines), sound media (primarily recordings and radio), and motion media (primarily movies and television). The Internet also is a medium but one whose nature blurs earlier distinctions. Mass communication refers to the process of crafting messages and delivering messages.

1.1 Media Exposure Two-thirds of our waking hours are spent consciously or subconsciously consuming mass media. The media is a major part of our environment. Mass media is so pervasive in our lives that most of us engage in media multitasking without even thinking about it. We can be oblivious to the media’s effects on us and those around us, unless we cultivate an understanding of how the media works and why. This understanding is called media literacy.

1.2 Purposeful Mass Communication Mass communicators have a purpose. Sometimes the purpose is to inform, sometimes to amuse, and sometimes to persuade. Media literacy requires understanding of the purpose of a mass message as part of assessing the content.

1.3 Mediated Communication Technology has expanded the original forms of face-to-face human communication. Today, we send amplified messages to great numbers of diverse people in mass communications. This sometimes is called industrial communication because the underlying technology requires large capital investments. Communication by social media, a 21st century invention, offers low-cost entry for both broad and focused communication and potential for immediate feedback.

1.4 Literacy for Media Consumers Media literacy begins with a factual foundation and becomes keener with an understanding of the dynamics that influence media messages. There are degrees of awareness, including abilities to understand and explain media behavior and effects and to identify significant media issues.

1.5 Assessing Media Messages Media messages come in many different forms—sometimes the message is clear and direct and sometimes it is masked, such as a political message that is designed to be persuasive but is framed to be informational or entertainment.

Chapter 2 Media Technology

Watch Google Tensions. When Google’s Gmail system was hacked in 2011 for access to messages among U.S. diplomats and other government officials, Google blamed the Chinese government. U.S. Secretary of State Hillary Clinton warned that the United States took the cyber-attack seriously and noted that a new U.S. military doctrine provided for military responses. China denied it had authorized the hacking—a skirmish in a new era of cyber-war.

A Cyber-War Tool As an early hacker, John Draper is legendary, bordering on mythical. Maybe that’s why they call him Cap’n Crunch. His hacking often had an edge of carefree whimsy.

When Richard Nixon was president, a 20-something Draper cracked a White House telephone code and used the password “olympus” for a direct line to the president. Then he proceeded to tell the president about a toilet paper shortage in Los Angeles. Or so goes the story.

With the advent of personal computers, hacking assumed dark proportions—far beyond Draper’s sophomoric pranks. Mass-targeted mini-software programs anonymously destroyed the hard drives of personal computers. These programs, known variously as viruses, worms, and trojans, were more than petty annoyances. Some malware from hackers disdainful of establishment institutions focused on banks and other high-visibility targets like government agencies and caused widespread damage. Foreign criminals with an international reach found ways to infect the average user’s personal computers through e-mailed links and other nefarious tactics. More recently, some hackers from as far away as Nigeria have managed to hack into personal computers in the United States and gain control of victims’ personal documents, demanding payment for their release. Police agencies worldwide have created investigative units to catch hackers, but it’s a challenging endeavor due to the international and covert nature of hacking.

Hacking has also made its way into international politics. For instance, Israel and its ally the United States had long suspected that Iran was trying to build nuclear weapons to attack Tel Aviv. Although not officially confirming it, Israel and U.S. agencies designed a worm, Stuxnet, to infiltrate controls in Iran’s uranium-refining centrifuges. Stuxnet was unleashed secretly in 2010. Within months, 384 of Iran’s 3,900 centrifuges were wiped out. Israel and the United States took comfort in believing that an Iranian weapons development program had been slowed by years.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our Guarantees

Money-back Guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism Guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision Policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy Policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation Guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more