wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

social media issue

profile
Sanika Angre
May 18, 2022
0 Likes
0 Discussions
87 Reads

since playing with friends from a young age most people are taught principle of faimess and to treat  other liken you treated this has to ne implemeted in persons hinking as early as possible as we get older group become more influential as we mature 

in todays world groups are formed drifferently but have some the same powerful influence they had before social media mibilixed communications and connecting with people  it is  effortless to find a group to supporting a persons interest or causes. because of this affordance to find a group supporting a persons interest or company the "always connected"  morden  lifestyles .in the "the daily we; is the interest really a blessing for democracy ?, sunstein l disccues and metion empirical data about the tendence  of like minded group to make more  extreme 

 a few week a go i saw an eposide of morden family that i continued to forget to mention this eposide depicts the family communicating and intereacting only through skype claire the mother is attemping to patch up things with her daughter haley after a boisterous fightre is trying to find haley to talk things  our thoughts video chatting the rest of her family  a few conspircaries were  started around haley ambigious facebook status and were reiterated by the family who had no knowledge of what haley  was up to .the eposide  refers to how group influence an individual and how this influence is more extreme when derived from a group  


Comments ()


Sign in

Read Next

'C', 'C++' and 'Java': Head-to-Head

Blog banner

What is Virtual Memory

Blog banner

Strengthening Active Directory Security

Blog banner

Online Education

Blog banner

Blockchain in IoT Applications

Blog banner

Booting Process In Operating System

Blog banner

operating system

Blog banner

Proof-of-Stake (PoS)

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Virtual machine

Blog banner

Threads

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

The Right way of cooking

Blog banner

UniProcessor Scheduling

Blog banner

File System

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Vulnerability Assessment

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Data Mining

Blog banner

Virtual Memory

Blog banner

Functions of operating system

Blog banner

Data Warehouse Bus Matrix

Blog banner

Why Data Security Is Important

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Security and E-mail

Blog banner

Fitness regime by Deepesh

Blog banner

Microsoft Windows Overview

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Career v/s Job : Choose your passion

Blog banner

INTRODUCTION

Blog banner

Interrupts

Blog banner

CONCURRENCY

Blog banner

Virtual Machine

Blog banner

Types of email

Blog banner

Cache memory

Blog banner

Multicore CPUs

Blog banner

VIRUS

Blog banner