wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

social media issue

profile
Sanika Angre
May 18, 2022
0 Likes
0 Discussions
87 Reads

since playing with friends from a young age most people are taught principle of faimess and to treat  other liken you treated this has to ne implemeted in persons hinking as early as possible as we get older group become more influential as we mature 

in todays world groups are formed drifferently but have some the same powerful influence they had before social media mibilixed communications and connecting with people  it is  effortless to find a group to supporting a persons interest or causes. because of this affordance to find a group supporting a persons interest or company the "always connected"  morden  lifestyles .in the "the daily we; is the interest really a blessing for democracy ?, sunstein l disccues and metion empirical data about the tendence  of like minded group to make more  extreme 

 a few week a go i saw an eposide of morden family that i continued to forget to mention this eposide depicts the family communicating and intereacting only through skype claire the mother is attemping to patch up things with her daughter haley after a boisterous fightre is trying to find haley to talk things  our thoughts video chatting the rest of her family  a few conspircaries were  started around haley ambigious facebook status and were reiterated by the family who had no knowledge of what haley  was up to .the eposide  refers to how group influence an individual and how this influence is more extreme when derived from a group  


Comments ()


Sign in

Read Next

Health and fitness

Blog banner

Cache memory

Blog banner

Mumbai Metro 3

Blog banner

Service Strategy In ITSM

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Loneliness

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Emerging threats in cyber Forensics

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

Zoho

Blog banner

Buffer overflow

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Man VS Nature

Blog banner

Facebook marketing

Blog banner

What is Virtual Memory

Blog banner

What is semaphore in operating system?

Blog banner

Service Operations in ITSM

Blog banner

Education?

Blog banner

Modern operating systems (OS)

Blog banner

Landslide Hazard

Blog banner

Big Data Architecture

Blog banner

I/O Buffering

Blog banner

Service transistion under difficult conditions

Blog banner

Self managing devices

Blog banner

Starvation

Blog banner

Evolution of Operating System

Blog banner

From Model Mistakes to Metrics

Blog banner

Jira Software

Blog banner

10 Reasons to date your best friend

Blog banner

Getting started with Android Studio

Blog banner

Blockchain

Blog banner

WINDOWS I/ O

Blog banner

GIS info about Bermuda Triangle

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

What is Internet

Blog banner

Making Money through Instagram

Blog banner

WomenEmpowerment

Blog banner

RAID and It's Levels

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Operation system

Blog banner