wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

social media issue

profile
Sanika Angre
May 18, 2022
0 Likes
0 Discussions
87 Reads

since playing with friends from a young age most people are taught principle of faimess and to treat  other liken you treated this has to ne implemeted in persons hinking as early as possible as we get older group become more influential as we mature 

in todays world groups are formed drifferently but have some the same powerful influence they had before social media mibilixed communications and connecting with people  it is  effortless to find a group to supporting a persons interest or causes. because of this affordance to find a group supporting a persons interest or company the "always connected"  morden  lifestyles .in the "the daily we; is the interest really a blessing for democracy ?, sunstein l disccues and metion empirical data about the tendence  of like minded group to make more  extreme 

 a few week a go i saw an eposide of morden family that i continued to forget to mention this eposide depicts the family communicating and intereacting only through skype claire the mother is attemping to patch up things with her daughter haley after a boisterous fightre is trying to find haley to talk things  our thoughts video chatting the rest of her family  a few conspircaries were  started around haley ambigious facebook status and were reiterated by the family who had no knowledge of what haley  was up to .the eposide  refers to how group influence an individual and how this influence is more extreme when derived from a group  


Comments ()


Sign in

Read Next

Why Summer Break Is Important for Emotional and Cognitive Growth?

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

objectives and functions of operating system

Blog banner

TRAIN TRAVELING

Blog banner

How to make Pancakes

Blog banner

BrainGate Technology

Blog banner

Importance Of Education.

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

Twisted world

Blog banner

Deadlock

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Hey Aryan here

Blog banner

Health and fitness

Blog banner

Emailing the merger document

Blog banner

BIRYANI ! The history you never knew about

Blog banner

Technical SEO : Total Guide

Blog banner

Deadlock

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Memory Management

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Cyber Security in Data Breaching

Blog banner

My Favorite Sportsperson

Blog banner

Photorec - media recovery tool

Blog banner

Memory Management in Operating System

Blog banner

Memory Management Techniques

Blog banner

Operating System

Blog banner

Theads

Blog banner

Scheduling in Operating Systems

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Deadlock Prevention

Blog banner

Benefits and drawback of web security.

Blog banner

Segmentation and paging concept

Blog banner

Deadlock and Starvation

Blog banner

SAVE TREES

Blog banner

Dudhasagar waterfall ?

Blog banner

Junk food vs healthy food

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Danger assessment in GIS

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner