wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

social media issue

profile
Sanika Angre
May 18, 2022
0 Likes
0 Discussions
87 Reads

since playing with friends from a young age most people are taught principle of faimess and to treat  other liken you treated this has to ne implemeted in persons hinking as early as possible as we get older group become more influential as we mature 

in todays world groups are formed drifferently but have some the same powerful influence they had before social media mibilixed communications and connecting with people  it is  effortless to find a group to supporting a persons interest or causes. because of this affordance to find a group supporting a persons interest or company the "always connected"  morden  lifestyles .in the "the daily we; is the interest really a blessing for democracy ?, sunstein l disccues and metion empirical data about the tendence  of like minded group to make more  extreme 

 a few week a go i saw an eposide of morden family that i continued to forget to mention this eposide depicts the family communicating and intereacting only through skype claire the mother is attemping to patch up things with her daughter haley after a boisterous fightre is trying to find haley to talk things  our thoughts video chatting the rest of her family  a few conspircaries were  started around haley ambigious facebook status and were reiterated by the family who had no knowledge of what haley  was up to .the eposide  refers to how group influence an individual and how this influence is more extreme when derived from a group  


Comments ()


Sign in

Read Next

THREADS (assignment 1)

Blog banner

Benefits of yoga and meditation

Blog banner

How to write a cover letter

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

Fossil Hunting 101 at the Peace River, Arcadia, Florida, USA

Blog banner

Security issues

Blog banner

Mental Health

Blog banner

CONCURRENCY

Blog banner

Why is ITSM important in IT organization?

Blog banner

Service stratergy principles

Blog banner

Session Vulnerabilities

Blog banner

Wedding photographer

Blog banner

security controls

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Excel records

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

E-mail security

Blog banner

GraphQL

Blog banner

Session Hijacking Techniques

Blog banner

HR Automation : Need of the hour

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Deadlock

Blog banner

Have You Explored India Yet?

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

File and File System Structure

Blog banner

Self managing devices

Blog banner

Processes: Process Description and Control.

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Assignment-3

Blog banner

Deadlock and Starvation

Blog banner

MUTUAL EXCLUSION

Blog banner

MEMORY HIERARCHY

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Social media

Blog banner

Deadlock

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Multiprocessor scheduling

Blog banner

Why Users Leave Your Website in 5 Seconds (And How UI/UX Fixes It)

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Data is an asset and it is your responsibility!

Blog banner