wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

social media issue

profile
Sanika Angre
May 18, 2022
0 Likes
0 Discussions
87 Reads

since playing with friends from a young age most people are taught principle of faimess and to treat  other liken you treated this has to ne implemeted in persons hinking as early as possible as we get older group become more influential as we mature 

in todays world groups are formed drifferently but have some the same powerful influence they had before social media mibilixed communications and connecting with people  it is  effortless to find a group to supporting a persons interest or causes. because of this affordance to find a group supporting a persons interest or company the "always connected"  morden  lifestyles .in the "the daily we; is the interest really a blessing for democracy ?, sunstein l disccues and metion empirical data about the tendence  of like minded group to make more  extreme 

 a few week a go i saw an eposide of morden family that i continued to forget to mention this eposide depicts the family communicating and intereacting only through skype claire the mother is attemping to patch up things with her daughter haley after a boisterous fightre is trying to find haley to talk things  our thoughts video chatting the rest of her family  a few conspircaries were  started around haley ambigious facebook status and were reiterated by the family who had no knowledge of what haley  was up to .the eposide  refers to how group influence an individual and how this influence is more extreme when derived from a group  


Comments ()


Sign in

Read Next

Modern operating system

Blog banner

Session Hijacking

Blog banner

To-Do List In LISP

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

VPN

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Security requirements for Safe E-Payments

Blog banner

HTML vs HTML5

Blog banner

PERT Overview

Blog banner

Jira Software

Blog banner

Data Exfiltration

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

What is Spyware? and examples of them.

Blog banner

Why is ITSM important in IT organization?

Blog banner

Natural Language Processing(NLP)

Blog banner

What is Virtual Memory

Blog banner

Importance of self defence for girls

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Hosting basics

Blog banner

Functions Of Operating Systems

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

R Programming

Blog banner

Threads

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Virtual Machine

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Fault tolerance

Blog banner

What your Favorite colour says about You?

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Raid

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Data Structures

Blog banner

Constrained Management in IT

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

Business Intelligence v/s Big Data

Blog banner

DIGITAL TECHNOLOGY

Blog banner