{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:27:30Z","timestamp":1777937250484,"version":"3.51.4"},"reference-count":83,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2023,4]]},"abstract":"<jats:p>This essay makes a case for more critical inquiry in mobile media research around the privilege of taken for grantedness. As a critical supplement to Richard Ling\u2019s important work on the taken for granted dispersion and embedment of technologies such as the mobile phone or automobile into everyday life, we examine the precarity that such reliance involves. Taking certain media for granted makes other, more invisible vulnerabilities harder to see and acknowledge. We make this case using the example of TikTok, a short-form mobile streaming app that has rapidly become a go-to social media platform worldwide\u2014as well as a massively \u201cvisible\u201d infrastructure due to its associated geopolitical tensions and security concerns. In light of recent conversations about banning the platform, TikTok offers an instructive case study for the privilege of taken for grantedness and the deceptively precarious nature of our mobile media practices.<\/jats:p>","DOI":"10.1177\/14614448231158644","type":"journal-article","created":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T07:53:17Z","timestamp":1681717997000},"page":"756-775","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["The privilege of taken for grantedness: On precarity and mobile media"],"prefix":"10.1177","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9093-340X","authenticated-orcid":false,"given":"Chris","family":"Ingraham","sequence":"first","affiliation":[{"name":"The University of Utah, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3247-8733","authenticated-orcid":false,"given":"Justin","family":"Grandinetti","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte, USA"}]}],"member":"179","published-online":{"date-parts":[[2023,4,17]]},"reference":[{"key":"bibr1-14614448231158644","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v6i2.1399"},{"key":"bibr2-14614448231158644","unstructured":"Alton L (2021) How video is reshaping digital advertising. Available at: https:\/\/business.twitter.com\/en\/blog\/how-video-is-reshaping-digital-advertising.html (accessed 14 April 2021)."},{"key":"bibr3-14614448231158644","unstructured":"Baker-White E (2022) Leaked audio from 80 internal TikTok meetings shows that US user data has been repeatedly accessed from China. Available at: https:\/\/www.buzzfeednews.com\/article\/emilybakerwhite\/tiktok-tapes-us-user-data-china-bytedance-access (accessed 15 July 2022)."},{"key":"bibr4-14614448231158644","unstructured":"Bates S (1996) The death of geography, the rise of anonymity, and the Internet. American Enterprises 7(2): 50\u201352."},{"key":"bibr5-14614448231158644","unstructured":"Byford S (2020) TikTok says the Trump administration has forgotten about trying to ban it, would like to know what\u2019s up. Available at: https:\/\/www.theverge.com\/2020\/11\/10\/21559677\/tiktok-cfius-court-petition-ban-deadline (accessed 14 April 2021)."},{"key":"bibr6-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1080\/15205436.2021.1970187"},{"key":"bibr7-14614448231158644","doi-asserted-by":"publisher","DOI":"10.36643\/mjrl.24.2.digital"},{"key":"bibr8-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-5427-0_5"},{"key":"bibr9-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1215\/9780822373476"},{"key":"bibr10-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1002\/9781118426456.ch10"},{"key":"bibr11-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1177\/2050157915592657"},{"key":"bibr12-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1177\/1206331206289022"},{"key":"bibr13-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810393901"},{"key":"bibr14-14614448231158644","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9740.001.0001"},{"key":"bibr15-14614448231158644","volume-title":"Automating Inequality","author":"Eubanks V","year":"2018"},{"key":"bibr16-14614448231158644","unstructured":"Executive Order 13942. 3 C.F.R. Addressing the threat posed by TikTok, and taking additional steps to address the national emergency with respect to the information and communications technology and services supply chain. 48637\u201348639. 6 August 2020."},{"key":"bibr17-14614448231158644","unstructured":"Executive Order 13943. 3 C.F.R. Addressing the threat posed by WeChat, and taking additional steps to address the national emergency with respect to the information and communications technology and services supply chain. 48641\u201348643. 6 August 2020."},{"key":"bibr18-14614448231158644","volume-title":"Custodians of the Internet","author":"Gillespie T","year":"2018"},{"key":"bibr19-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1080\/17450101.2016.1211821"},{"key":"bibr20-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1002\/9781444340679"},{"key":"bibr21-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-021-01270-5"},{"key":"bibr22-14614448231158644","doi-asserted-by":"publisher","DOI":"10.14763\/2021.2.1557"},{"key":"bibr23-14614448231158644","volume-title":"Ghost Work: How to Stop Silicon Valley from Building a New Global Underclass","author":"Gray ML","year":"2019"},{"key":"bibr24-14614448231158644","first-page":"11","volume-title":"Smartphone Cultures","author":"Hartmann M","year":"2018"},{"key":"bibr25-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2012.741860"},{"key":"bibr26-14614448231158644","doi-asserted-by":"publisher","DOI":"10.14763\/2020.3.1502"},{"issue":"3","key":"bibr27-14614448231158644","first-page":"1","volume":"5","author":"Kahancov\u00e1 M","year":"2020","journal-title":"Frontiers in Sociology"},{"key":"bibr28-14614448231158644","unstructured":"Kamiya G (2020) The carbon footprint of streaming video: fact-checking the headlines. The International Energy Agency. Available at: https:\/\/www.iea.org\/commentaries\/the-carbon-footprint-of-streaming-video-fact-checking-the-headlines (accessed 1 October 2021)."},{"key":"bibr29-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1177\/2050157920952120"},{"key":"bibr30-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1177\/1367549420945341"},{"key":"bibr31-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1177\/0306396818823172"},{"key":"bibr32-14614448231158644","unstructured":"Lasen A (2004) Affective technologies\u2014emotions and mobile phones. Receiver Vol 11. Available at: https:\/\/www.academia.edu\/472410\/Affective_Technologies_Emotions_and_Mobile_Phones"},{"key":"bibr33-14614448231158644","unstructured":"Leo H, Lunden I (2021) TikTok emerges as a political battleground in Navalny-stirred Russia. Available at: https:\/\/techcrunch.com\/2021\/02\/11\/tiktok-emerges-as-a-political-battleground-in-navalny-stirred-russia\/ (accessed 14 April 2021)."},{"key":"bibr34-14614448231158644","unstructured":"Lin P (2021) TikTok vs Douyin: a security and privacy analysis. Available at: https:\/\/citizenlab.ca\/2021\/03\/tiktok-vs-douyin-security-privacy-analysis\/ (accessed 14 April 2021)."},{"key":"bibr35-14614448231158644","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7568.001.0001"},{"key":"bibr36-14614448231158644","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/8445.001.0001"},{"key":"bibr37-14614448231158644","doi-asserted-by":"publisher","DOI":"10.4324\/9781315276472-2"},{"key":"bibr38-14614448231158644","doi-asserted-by":"publisher","DOI":"10.2991\/assehr.k.210609.072"},{"key":"bibr39-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-09-2019-0505"},{"key":"bibr40-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1177\/2056305115603386"},{"key":"bibr41-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1177\/2056305120948168"},{"key":"bibr42-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1111\/j.0435-3684.2004.00150.x"},{"key":"bibr43-14614448231158644","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v26i1.11415"},{"key":"bibr44-14614448231158644","unstructured":"Milmo D, Anguiano D (2021) Facebook, Instagram and WhatsApp working again after global outage took down platforms. The Guardian, 4 October. https:\/\/www.theguardian.com\/technology\/2021\/oct\/04\/facebook-instagram-and-whatsapp-hit-by-outage"},{"key":"bibr45-14614448231158644","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/14122.001.0001"},{"issue":"2","key":"bibr46-14614448231158644","first-page":"38","volume":"14","author":"Neyaz A","year":"2020","journal-title":"International Journal of Computer Science and Security"},{"key":"bibr47-14614448231158644","doi-asserted-by":"publisher","DOI":"10.18574\/nyu\/9781479833641.001.0001"},{"key":"bibr48-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1016\/j.resconrec.2020.105389"},{"key":"bibr49-14614448231158644","unstructured":"O\u2019Connor C (2021) Hatescape: An In-Depth Analysis of Extremism and Hate Speech on TikTok. London: Institute for Strategic Dialogue. Available at: https:\/\/www.isdglobal.org\/wp-content\/uploads\/2021\/08\/HateScape_v5.pdf"},{"key":"bibr50-14614448231158644","doi-asserted-by":"publisher","DOI":"10.14763\/2020.3.1488"},{"key":"bibr51-14614448231158644","volume-title":"Weapons of Math Destruction","author":"O\u2019Neil C","year":"2016"},{"key":"bibr52-14614448231158644","first-page":"17","volume":"65","author":"O\u2019Reilly T","year":"2007","journal-title":"Communications and Strategies"},{"key":"bibr53-14614448231158644","unstructured":"Panday J (2020) The hypocrisy of a U.S., TikTok ban. Available at: https:\/\/www.internetgovernance.org\/2020\/07\/28\/the-hypocrisy-of-a-u-s-tiktok-ban\/ (accessed 14 April 2021)."},{"key":"bibr54-14614448231158644","unstructured":"Parham J (2020) TikTok and the evolution of digital blackface. WIRED, 4 August. Available at: https:\/\/www.wired.com\/story\/tiktok-evolution-digital-blackface\/"},{"key":"bibr55-14614448231158644","volume-title":"The Anthrobscene","author":"Parikka J","year":"2014"},{"key":"bibr56-14614448231158644","doi-asserted-by":"publisher","DOI":"10.5749\/minnesota\/9780816695515.001.0001"},{"key":"bibr57-14614448231158644","volume-title":"A Slow Contemporary Violence: Damaged Environments of Technological Culture","author":"Parikka J","year":"2016"},{"key":"bibr58-14614448231158644","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9465.003.0031"},{"key":"bibr59-14614448231158644","unstructured":"Pew Research Center (2021) Social media fact sheet. Available at: https:\/\/www.pewresearch.org\/internet\/fact-sheet\/social-media\/ (accessed 14 April 2021)."},{"key":"bibr60-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816661553"},{"key":"bibr61-14614448231158644","volume-title":"Technoprecarious","author":"Precarity Lab","year":"2020"},{"key":"bibr62-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1215\/9781478002543"},{"key":"bibr63-14614448231158644","doi-asserted-by":"publisher","DOI":"10.12840\/ISSN.2255-4165.031"},{"key":"bibr64-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1177\/1461444805056012"},{"key":"bibr65-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1177\/1461444804042519"},{"key":"bibr66-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810393907"},{"issue":"3","key":"bibr67-14614448231158644","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/ijiit.2014070101","volume":"10","author":"Sey A","year":"2014","journal-title":"Information Technologies and International Development"},{"key":"bibr68-14614448231158644","doi-asserted-by":"publisher","DOI":"10.4135\/9781848608245.n12"},{"key":"bibr69-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1215\/9780822376224"},{"key":"bibr70-14614448231158644","unstructured":"Statista (2021) Most popular social media apps in the U.S. 2019, by engagement. Available at: https:\/\/www.statista.com\/statistics\/579358\/most-popular-us-social-networking-apps-ranked-by-engagement\/ (accessed 14 April 2021)."},{"key":"bibr71-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1177\/2050157915619211"},{"key":"bibr72-14614448231158644","unstructured":"Tankovska H (2021) Facebook access penetration 2021, by device. Available at: https:\/\/www.statista.com\/statistics\/377808\/distribution-of-facebook-users-by-device\/ (accessed 14 April 2021)."},{"key":"bibr73-14614448231158644","volume-title":"The Mushroom at the End of the World: On the Possibilities of Life in Capitalist Ruins","author":"Tsing A","year":"2015"},{"key":"bibr74-14614448231158644","volume-title":"Child Labour and UNICEF in Action: Children at the Centre","author":"UNICEF","year":"2014"},{"key":"bibr75-14614448231158644","volume-title":"The Digital Divide","author":"Van Dijk J","year":"2020"},{"key":"bibr76-14614448231158644","doi-asserted-by":"publisher","DOI":"10.14361\/9783839404034-007"},{"key":"bibr77-14614448231158644","volume-title":"Electronic Emotions: The Mediation of Emotion Via Information and Communication Technologies","author":"Vincent J","year":"2009"},{"key":"bibr78-14614448231158644","doi-asserted-by":"publisher","DOI":"10.18574\/nyu\/9780814795262.001.0001"},{"key":"bibr79-14614448231158644","doi-asserted-by":"publisher","DOI":"10.1080\/1057610X.2020.1780027"},{"key":"bibr80-14614448231158644","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v6i4.1775"},{"key":"bibr81-14614448231158644","unstructured":"World Economic Forum (2020) Making mining safe and fair: Artisanal Cobalt extraction in the democratic republic of the Congo. White Paper. Available at: http:\/\/www3.weforum.org\/docs\/WEF_Making_Mining_Safe_2020.pdf (accessed 28 April 2021)."},{"key":"bibr82-14614448231158644","unstructured":"YouTube (2021) YouTube in numbers. Available at: https:\/\/www.youtube.com\/intl\/en-GB\/about\/press\/ (accessed 14 April 2021)."},{"key":"bibr83-14614448231158644","doi-asserted-by":"publisher","DOI":"10.5210\/spir.v2021i0.12267"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14614448231158644","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14614448231158644","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14614448231158644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:58:17Z","timestamp":1777694297000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14614448231158644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":83,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["10.1177\/14614448231158644"],"URL":"https:\/\/doi.org\/10.1177\/14614448231158644","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4]]}}}