wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

social media issue

profile
Sanika Angre
May 18, 2022
0 Likes
0 Discussions
87 Reads

since playing with friends from a young age most people are taught principle of faimess and to treat  other liken you treated this has to ne implemeted in persons hinking as early as possible as we get older group become more influential as we mature 

in todays world groups are formed drifferently but have some the same powerful influence they had before social media mibilixed communications and connecting with people  it is  effortless to find a group to supporting a persons interest or causes. because of this affordance to find a group supporting a persons interest or company the "always connected"  morden  lifestyles .in the "the daily we; is the interest really a blessing for democracy ?, sunstein l disccues and metion empirical data about the tendence  of like minded group to make more  extreme 

 a few week a go i saw an eposide of morden family that i continued to forget to mention this eposide depicts the family communicating and intereacting only through skype claire the mother is attemping to patch up things with her daughter haley after a boisterous fightre is trying to find haley to talk things  our thoughts video chatting the rest of her family  a few conspircaries were  started around haley ambigious facebook status and were reiterated by the family who had no knowledge of what haley  was up to .the eposide  refers to how group influence an individual and how this influence is more extreme when derived from a group  


Comments ()


Sign in

Read Next

Service Operation

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Virtualization

Blog banner

Deadlock and starvation

Blog banner

EMAIL INVESTIGATION

Blog banner

The Features of Blockchain

Blog banner

Power of words

Blog banner

The Right way of cooking

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

Operating System

Blog banner

Memory management

Blog banner

Article on Team Work

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Paid Email

Blog banner

Love is in air.....

Blog banner

Race Condition

Blog banner

Data Science in Mental Health Prediction

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

c

Blog banner

File Management system

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

The Sunny Side of Instagram

Blog banner

Life

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

What is Spyware? and examples of them.

Blog banner

10 Interesting Facts about Death Note

Blog banner

Uber

Blog banner

LTE Technology

Blog banner

Consumer to consumer business mode

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

PPT methodology

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

The art of being alone

Blog banner

Chicken Dum Biryani

Blog banner

MUTUAL EXCLUSION

Blog banner

Evolution of Operating Systems

Blog banner

Big Data

Blog banner

Interrupts in OS

Blog banner

Information of meesho company

Blog banner

I/O Buffering

Blog banner