top of page

The Footprints and Risks of Digital Media and Communication Technology

In recent years, digital media and networks have become an integral part of everyone's everyday lives and have influenced how people communicate. Unlike the early times in the development of computers and computer-based media, the presence of digital media is now unexceptional and prevalent. They have been used by a comprehensive range of individuals and institutions from all walks of life, from international health sciences, disaster response social work, and national and global higher education (Alnemary et al., 2015; Bennett, 2008; Ritzel, 2010; Wyatt & Silver, 2015). Although the development in the digital media and communication industry has brought huge benefits to society, challenges such as the spread of disinformation and misinformation, limited freedom of communication, privacy problem, the raise of cyber-crimes, and difficulties in education are inevitable.

The first challenge is the spread of misinformation, disinformation, and propaganda in online messages, advertising, business, political communication, and media publications. During the Covid-19 pandemic, the spread of misinformation has magnified on social media (Allcott et al., 2019), and it has proven to be as much of a threat to global public health as the coronavirus itself. In many Western societies, conspiracies about Covid-19 lead to less willingness to take tests, adhere to social distancing guidance, wear masks, or be vaccinated (Freeman et al., 2020; Romer and Jamieson, 2020). In earlier times, conspiracy theories usually spread among small-scale, local communities, while social media provides a solid foundation for its expansion at a much larger scale (Del Vicario et al., 2016; Tucker et al., 2017).

Figure1: Internet all over the world

Secondly, digital media restrains freedom of expression for it being surveilled and controlled by government bureaucracies and politicians (Castells, 2009). Raising China as an example, the country's internet is completely owned by the government, and whoever wants to set up a website, government approval is required (Jason, 2010). In addition, internet users who want to register on a Chinese social app such as Douyin (TikTok in China - a platform for short videos that had about 600 million daily active users in 2021), WeChat (the biggest Chinese social media), they need to provide their personal information to sign a pledge not to access information that threatens state security; in some cases, users are required to register themselves to the police to surf (Jason 2010, p.102). Additionally, research by Wu and Wall (2019) explains, even when users utilize communication apps such as WeChat, they also need to be aware of the government's censorship and control over the messages for possessing political content.

In January 2021, Trump's social media accounts were held off across Facebook, Twitter, YouTube, Instagram, Snapchat, Twitch, and TikTok, and many conservatives and liberals alike believed they were under censorship and worried about their speech freedom (Romano, 2021). Shahbaz and Funk (2021) conclude, in the digital age, global internet norms have changed dramatically through greater government intervention. In the United States, netizens' online activities are now more largely curbed and detected by tech companies, while they have limited resources in safeguards featured democratic governance, which includes transparency, public accountability, and judicial oversight. Moreover, Shahbaz and Funk (2021) argue that online freedom is decreasing all around the world since governments have been constraining user speech due to the increasing number of misinformation. They emphasize that the lack of regulation in the tech industry has made authoritarian governments harness their tight control of the internet to anticipate misleading information.

Figure 2: Fake information online

The third obstacle is the increased occurrence of cyber violence. Al-Alosi (2017) describes cyber-violence refers to a continuing abuse from one person against a former or present intimate partner, and it contains a series of controlling and coercive behaviors, such as tracking of location, threatening phone calls or smartphones harassment on social media and posting of images of partners without permission. E-device, such as computers and smartphones provide abusers to overcome the spatial and physical distances that would have otherwise stopped them from connecting with their victims. Moreover, digital abuse such as cyberbullying, cyber-stalking, and non-consensual sexting is increasingly experienced by young females, by people they have already known, or by strangers, and some victims are suffering from severe harassment (Al-Alosi, 2017).

Privacy is the fourth issue that comes along with the new digital era. As the potential for manipulating and editing data among technological companies or businesses increases, the risk of privacy also grows (Adams and Sasse, 2001). The users in the Arab world use social media groups, such as Facebook to exchange sensitive health information, which could have serious indications regarding the privacy of the information shared with other members in the group chats; thus, these issues should not be ignored (Househ et al., 2014; Asiri et al., 2017).

The fifth issue of digital media and communication technology is its impact on the younger generation. Kessler (2011) showed that many students were not able to study without a technological device, and they get stressed that they were unable to focus on their studies for over 10 minutes without checking out their social media through laptops or smartphones. This seems to be an emotional need for the students to check their devices, otherwise, anxiety would be generated (Rosen et al., 2013). The use of social media affects people's mental health, and people who spent more time on social media were three times as likely to feel social isolation than those who did not stay on social media as often (Rosenquist, et al. 2011; Brian et al., 2017). Following up on this, McInnerney and Roberts (2004) point out that isolation can influence a student’s attitude to online learning; they believe online interaction lacks intimacy. Unlike face-to-face communication which can give users instant feedback, technology-mediated education leads to isolation instead of warmth and support. Furthermore, the use of technology and virtual classes degrades education in various environments as it distorts the relationship between teachers and students, and it deepens the inequalities among students from different financial backgrounds who can or can not have the access to the internet (Fried, 2008; Wentworth & Middleton, 2014).

Figure 3: Students studying through computers

Lastly, as the internet was initially designed for the U.S. and used for government and military purposes, it has made English the most widely used web language. Therefore, it could potentially create inequalities in access to the world wide web for non-English speaking users. As Jason (2020, p. 62) indicates, non-phonetic languages (such as Mandarin and Japanese) have to be transmitted as images rather than text.

In the digital age, communication technologies provide great opportunities for different areas of industry. However, it has also led the whole world to challenges, such as the expansion of misinformation and disinformation, less freedom of communication, unavoidable invasion of privacy, an increase of cyber-crimes, and negative effects on students' competencies. All these remain a concern that needs to be investigated and discussed as technological advancement continues.


Adams, A., Sasse, A. (2001). Privacy in Multimedia Communications: protecting users, not just data. In: Blandford, A., Vanderdonkt, J., Gray, P. (Eds.). People and Computers XV—Interaction Without Frontiers (pp. 49–64). Springer.

Al-Alosi, H. (2017). Cyber-violence: digital abuse in the context of domestic violence. University Of New South Wales Law Journal, 40(4), 1573-1603.

Allcott, H., Gentzkow, M., & Yu, C. (2019). Trends in the diffusion of misinformation on social media. Research & Politics, 1-8.

Alnemary, F. M., Wallace, M., Symon, J. B. G., & Barry, L. M. (2015). Using international videoconferencing to provide staff training on functional behavioural assessment.

Asiri, E., Khalifa, M., Shabir, S. A., Hossain, M. N., Iqbal, U., Househ, M. (2017). Sharing sensitive health information through social media in the Arab world, International Journal for Quality in Health Care, 29(1), 68–74,

Bennett, W. L. (Ed.). (2008). Civic life online: Learning how digital media can engage youth. MIT Press

Brian A. Primack, Ariel Shensa, Jaime E. Sidani, Erin O. Whaite, Liu yi Lin, Daniel Rosen, Jason B. Colditz, Ana Radovic, Elizabeth Miller (2017). Social Media Use and Perceived Social Isolation Among Young Adults in the U.S. American Journal of Preventive Medicine,53(1), 1-8.

Caiani, M. & Parenti, L. (2013). European and American Extreme Right Groups and the Internet. Ashgate.

Castells, M. (2009). Communication power. Oxford University Press.

Dawson, M. & Foster, B. (1996). Virtual capitalism: the political economy of the

information highway. Monthly Review, 48 (3), p 55.

Del Vicario, M., Bessi, A., Zollo F. (2016) The spreading of misinformation online.

Proceedings of the National Academy of Sciences of the United States of America.113(3):


Drury, I. (2017, October 26). Social media 'fuels crimes by children': From blackmail to squabbles that end in violence, report reveals toxic effects on young. Daily Mail. children.html

Eckler, P, Worsowicz, G. & Rayburn, JW (2010). Social media and health care: An overview. PM & R: the journal of injury, function, and rehabilitation. 2(11),1046–1050. Freeman, D., Waite, F., Rosebrock, L., Petit, A., Causier, C., East, A., . . . Lambe, S. (2020).

Fried, C. B. (2008). In-class laptop use and its effects on student learning. Computers & Education, 50(3), 906-914.

Guess, A., & Lyons, B. (2020). Misinformation, Disinformation, and Online Propaganda. In N. Persily & J. Tucker (Eds.). Social media and Democracy: The State of the Field, Prospects for Reform (SSRC Anxieties of Democracy (pp.10-33). Cambridge University Press.

Hand, T., Chung, D., & Peters, M. (2009). The Use of Information and Communication Technologies to Coerce and Control in Domestic Violence and Following Separation. Australian Domestic & Family Violence Clearinghouse (pp.1-16). Newsletter

Househ, M., Borycki, E., & Kushniruk, A. (2014, February 18). Empowering patients through social media: The benefits and challenges. Health Informatics Journal, 20(1) 50-58.

Jason P, A. (2021). The challenges to the emancipatory potential of the net: Lessons from China and Malaysia. Third World Quarterly, 22(1), 99-114.

Kessler, S. (2011). 38% of college students can’t go 10 minutes without tech [STATS]. Mashable Tech.

McInnerney, J. M., & Roberts, T. S. (2004). Online Learning: Social Interaction and the Creation of a Sense of Community. Educational Technology & Society, 7 (3), 73-81.

Mills, C. E., Freilich, J. D., Chermak, S. M., Holt, T. J. LaFree, G. (2019). Social Learning and Social Control in the Off- and Online Pathways to Hate Crime and Terrorist Violence. Studies in Conflict & Terrorism, 44(9), 701-729.

Ritzel, D. O. (2010). International videoconferencing: A reaction to Burke et al. American Journal of Health Education, 41(1), 62–64.

Romano, A. (2021, January 21). Kicking people off social media isn’t about free speech: The debate over deplatforming Trump has overshadowed how effective social media bans are at fighting extremism. VOX.

Romer D and Jamieson KH (2020). Conspiracy theories as barriers to controlling the spread of COVID-19 in the U.S. Social Science & Medicine, 2020 (263).

Rosen, L. D., Carrier, L. M., & Cheever, N. A. (2013). Facebook and texting made me do it: Media-induced task-switching while studying. Computers in Human Behaviour, 29(3), 948-958.

Rosenquist J. N., Fowler J. H, Christakis N. A. (2011). Social network determinants of depression. Mol Psychiatry,16(3), 273–81.

Shahbaz, A. & Funk, A. (2021). The Global Drive to Control Big Tech. Freedom House.

Van den Hoven, J., Martijn, B., Wolter, P., & Martijn, W. (2020, October 30). Privacy and Information Technology. The Stanford Encyclopaedia of Philosophy.

Wentworth, D., & Middleton, J. (2014). Technology use and academic performance. Computers & Education, 78, 306-311.

Wu, Y. & Wall, M. (2019). The ties that bind: How the dominance of WeChat combines

with guanxi to inhibit and constrain China’s contentious politics. New Media & Society,

21(8), 1714 – 1733.

Wyatt, J., & Silver, P. (2015). Cross-cultural crisis intervention training. International

Social Work 2015, 58(5), 646–658

Visual Sources

Anonymous (2017, April 22). Key crossroads for the digital development [Photomontage].

Ordway, D., & Ordway, D. (n.d.). Fake news and the spread of misinformation: A research roundup [Illustration]. Retrieved November 6, 2022, from

Students studying through computers. (n.d.). (n.a.) [Photograph]. Retrieved from

Anonymous. View: Social media firms are not digital media companies. The new IT guidelines fail to get this fact. The Economic Times. [Illustration].


The rapid expansion of digital media and communication technology has transformed industries, bringing both opportunities and risks. For example, within the hospitality sector, the use of advanced hotel software company like that provided by ChannelRush has revolutionized how hotels operate. ChannelRush offers seamless online distribution, with a robust channel manager, booking engine, CRS, and APIs that keep hotel operations running smoothly and efficiently. However, the reliance on such technologies also introduces risks like data security breaches and a loss of personal touch in customer service. Therefore, while these tools optimize operations and customer interaction, it's crucial for companies to manage these risks by implementing strong security measures and maintaining customer-centric service practices.


Apr 25, 2023

Author Photo


Arcadia _ Logo.png

Arcadia has an extensive catalog of articles on everything from literature to science — all available for free! If you liked this article and would like to read more, subscribe below and click the “Read More” button to discover a world of unique content.

Let the posts come to you!

Thanks for submitting!

  • Instagram
  • Twitter
  • LinkedIn
bottom of page