wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Brain wash of social media

profile
Tejas Parab
Nov 04, 2022
1 Like
0 Discussions
70 Reads

Social media is one of the most readily accessible and powerful tools in this modern day and age. Many of us use our socials to stay in touch with our friends and family, or to keep up with the latest news in whatever we are interested in. 

Social media is run by algorithms. It keeps tags on your activity and interactions to feed you the same type of content, over and over again. This is what we call a “filter bubble” because it filters everything that your activity does not align with and gives you everything that does.

What does that have to do with brainwashing? Well, brainwashing stems from the act of exposing one to the same ideology over and over again, and if no one imposes them, they start to feed into it and believe that it is the most truthful idea. And though saying that social media can brainwash people can sound extreme, it is no secret that it is used to reinforce several brainwashing acts.  

What does that have to do with brainwashing? Well, brainwashing stems from the act of exposing one to the same ideology over and over again, and if no one imposes them, they start to feed into it and believe that it is the most truthful idea. And though saying that social media can brainwash people can sound extreme, it is no secret that it is used to reinforce several brainwashing acts.

How can you know if you are brainwashed? Delusion, despite all the people telling you that you are wrong with supported and truthful evidence, is a huge red flag. If you find yourself getting very defensive over a topic that, when many others are telling you what you believe is wrong, and provide you with several solid pieces of evidence, that you even get disrespectful to them, know that you have fallen victim to brainwash.

To “cure” brainwashing and dismantle the false ideology does not happen overnight. So you must keep the conversation going, even if it takes over 70 years to completely dismantle the false ideology. It is our responsibility as social media users and human beings to fight against falsehood.


Comments ()


Sign in

Read Next

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Some facts about Technology

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Lifestyle of a photographer

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

ONLINE NEWSROOMS

Blog banner

IT Service Continuity Management

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Risk mitigation and management

Blog banner

The seven-step improvement process

Blog banner

An Overivew Of Cache Memory

Blog banner

Functions of Operating System

Blog banner

Direct memory access (DMA)

Blog banner

The New Rules of UI/UX Design Every Website Must Follow in 2026

Blog banner

Service Design Model

Blog banner

Worms, viruses and Bots

Blog banner

Uniprocessor Scheduling

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

VIRTUAL MACHINES

Blog banner

CSI and Organizational Change

Blog banner

Information Technology In E- Commerce

Blog banner

Service stratergy principles

Blog banner

Trends that began during the pandemic

Blog banner

SPEM

Blog banner

Health is Wealth

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Cycling

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Malware Defense

Blog banner

The launch of UniMap by HERE

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

DBMS and various career options related to it.

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Big Data Architecture

Blog banner

SQL Injection

Blog banner

AI and Cyber Security

Blog banner

Natural Language Processing(NLP)

Blog banner

Computer Security

Blog banner

What is Network Security?

Blog banner