More Subjects
Student’s name
Course ID
Submitted to
date
Subject
Internet is a very significant thing that has been going on in the few 10 years and has turn into so famous globally. At the start, individuals believed that Internet would be for joy and entertaining, however afterward a while, individuals began to think social medium as a consistent source of communication and data. Hence, there are many people who use the Internet. On February 17th, 2015, one statistical website (internetlivestats.com) reported that the number of internet users reached 3,068,000,000.
Antony, M., & Swinson, R. (2009) states that social media has become a part of our lives. There are several people in this world who communicate through different culture, languages, religions, and ages by using different types of applications. The problem is that people are starting to behave differently from reality. Many are obsessed with making their lives look perfect now (Antony, &Swinson). Everyone is considered an expert, mentor, and high in class. They also want to show off their best clothing, extravagant car, and their most valuable collectibles. These images must be from luxurious places, etc. In this case, we become our fake self. So my topic is going to be “How Social Media Has Made Us Obsessed with Making Our Lives Look Perfect”. This research is important to communication students because they have to find out the causes and how to improve the impacts.
American society is obsessed by its social media for above half of all people of America have a social networking outline (winter). However, what do social media tells us regarding US culture? Is people use of social medium tools a manifestation of behaviors and interests? People are more obsessed by giving to the rest of the humanity that people are having the lives times than having fun for themselves. Today, the latest trend of “selfies” makes the people obsessed. People are not what they act on the social media (Winter). Most of people carefully select the profile pictures on Instagram and Snapchat social networks. Believe it or not, these actions are not as harmless as it seems, they can generate a false sense of self-confidence or even lead to compulsive behavior (Bennett, 12). The more love and likes we get in social networks, the happier we feel. However, this behavior may be a prerequisite for the development of more severe mental health problems in the future. How far can an obsession? British teenager tried to commit suicide after he was unable to take what he felt was the ideal self. He spent about 10 hours a day, making up to 200 selfies in an attempt to get the perfect shot (Fisher, 9). The guy does not leave the house for six months. Although this is an extreme case, it is not too far from that held by many young and even older people.
The right to privacy, or privacy, is a fundamental right in Western democracies. It is a key value for the exercise of individual liberties. For that reason, it is recognized and has constitutional status in Argentina and many countries that signed international agreements in this regard. The right to privacy gives us the possibility to protect our sphere of privacy, what we keep for ourselves and our circle of trust and we do not want it to be known. This right protects the individual from arbitrary interference in his private life. Without privacy, you cannot do anything freely: talk, interact, go to the doctor, etc (Donath, & Boyd, 04).
This right, like many fundamental rights, partially yields when there is a public interest or an interest of the State and requirements of legality, necessity and proportionality are met. These requirements, and those of several other standards (such as data protection laws) are those that govern when talking about information that is "public use" or that can be collected without affecting privacy (Dinev, Hart, & Mullen, 08).
The protection of self-determination and the right to confidentiality on the social media is going by a difficult era (Messitte, 13). By announcing and backup these values in the International policy field, states reject them while it comes to national policy and lawmaking in their own nations. It looks that all road symbols to liberty of speech and the right to confidentiality direct us in one way, although the authorities insist on going to the other, convincing the distressed passengers that this is necessary for their security (Marthews, & Tucker, 17).
It is hardly news for anyone that there are discrepancies between the position of the states they hold on a number of issues in the United Nations and their policies on the same issues at home. And when it comes to restricting rights on the Internet, it seems that states are not even embarrassed. Apparently, evaluating the Internet as something else, more powerful than the old media, they instinctively impose tougher restrictions. Governments are right that the Internet provides people with never-before-existing ability to found and keep cross-border communication and entrance information all over the world (Tomuschat, 08). However this does not defend imposing unparalleled police events, foregoing the privacy rights and freedom of speech. New technologies increase the potential of people (in both good and bad ways) and shorten reserves above many periods, and through this time, worldwide human rights law has unremitting to develop and embellishment.
Not so long ago our country was under the dome of censorship, which strictly protected citizens from thoughts and ideas that were contrary to communist ideology. However, in the last decades of the 20th century, radical changes began to take place: in the 80s the Iron Curtain fell, in 1991 the collapse of the Soviet Union occurred, and at the beginning of the two thousandth, with the advent of the public Internet, the flow of information became virtually impossible. How do you ensure the confidentiality of your data?
On social networking sites? According to a survey conducted Trend Micro, only 38% of users know how to restrict access to the information they publish on the Internet. This low indicator says that many people provide access to more information than they originally wanted would. For example, your relatives or employees can discover on the network compromising your photos that you published on imprudence.
Our days of identity theft, one can judge by the fact that last year in the US: every three seconds a new victim of this crime appeared. Configure privacy settings on the site, solves the problem only partially. On most sites, information about the policy is confidential.
The revolution in the field of communications and information, reached a scale that the generations before themselves could not have imagined, changed the worldview at the turn of the third millennium. Information has become an important resource in all spheres of society.
Any crime is necessarily connected with the environment. Now the Internet is the new medium where a huge amount of information is co-operatively organized. With its advent, a very popular phenomenon has become social networks, in which accounts have up to 82% of all network users (Nissenbaum, Helen). The account, as a rule, contains the information necessary to identify the user when connecting to the system. The account can also contain additional data - photos, name, nickname, religion, date of birth, e-mail address, home address, phone number and others. Thus, thanks to the modern achievements of science and technology, it became much easier to obtain previously inaccessible information. According to experts, social Internet networks greatly facilitate the work of secret agencies, since they allow you to trace the circle of contacts of a particular person. Data from social networks is a valuable resource for the security services , the people themselves provide the information itself, for which a few years ago it was necessary to actively hunt and that was confidential. According to the Ministry of Internal Affairs of U.S over the past year, social networks have helped the police and special services identify and detain more than ten thousand criminals . Such a source of information is sometimes equated with such widespread and effective methods of searching criminals as DNA analysis or dactoscopy.
Social networks, uniting a huge number of people, are a convenient platform for disseminating extremist materials. Behind the subject: "What does the NBU hryvnia exchange rate depend on and Another problem is a sense of impunity, so the reliability of the information laid out is not always checked. At the moment in U.S, the law does not provide for a rule that would directly prohibit the creation of fake accounts, and even the very concept of "account" in the law is missing. It is obvious that the development of social networks is much faster than the development of legislation in this area. It turns out that users can distribute information from someone else's or nonexistent name, and a large number of Wi-Fi zones and Internet cafes make it very difficult to find such intruders. Many believe that terrorists in their activities use not only bombs, but also information bombs. Social networks can be actively used for manipulation, recruitment and ideological training, in which young people are primarily affected. The work is complicated by the fact that on the other side of the monitor there can be both a braggart-inventor and a person presenting a real danger. Thus, special services have to invest immense forces to conduct preventive work in the network for search and exposure of criminals (Madden, Mary, et al).
To conclude, Now, various services and the police have learned to derive significant benefits from information contained in social networks, often forgetting about the confidentiality of such information. But criminals do not lose sight of such a convenient channel for data transmission: new sites are appearing every day and the methods of encryption of information become more complicated, code words and phrases are invented. It follows that law enforcement officers should pay special attention to new approaches and methods for collecting data on criminals while at the same time not forgetting the old and fundamental principles of freedom of speech and the confidentiality of personal information of every person in a democratic society.
References
Antony, M., &Swinson, R. When perfect isn't good enough strategies for coping with perfectionism (2nd ed.). Oakland, CA: New Harbinger Publications. (2009).
Bennett, W. L. The personalization of politics political identity, social media, and changing patterns of participation. The Annals of the American Academy of Political and Social Science, 644(1), 20-39. (2012).
Donath, J., & Boyd, D. Public displays of connection. bt technology Journal, 22(4), 71-
82. (2004).
Fisher, T. ROI in social media: A look at the arguments. Journal of Database Marketing & Customer Strategy Management, 16(3), 189-195. (2009).
Drexler, Peggy. "Obsessive Posting Is A Result Of Obsessive Following." Psychology Today. Peggy Drexler. Web. 14 Feb. 2019. (2015).
How Social Media Has Made Us Obsessed With Making Life Look Perfect. (2019, April 5). Retrieved April 13, 2015, from http://elitedaily.com/life/social-media-made-us-obsessed-making-life-look-perfect/911522/
Messitte, Z. Understanding the global community. Norman: University of Oklahoma Press. (2013).
Tomuschat, C. Human rights between idealism and realism (2nd ed.). Oxford: Oxford University Press. (2008).
Marthews, A., & Tucker, C. E. Government surveillance and internet search behavior. Available at SSRN 2412564. (2017).
Dinev, T., Hart, P., & Mullen, M. R. Internet privacy concerns and beliefs about government surveillance–An empirical investigation. The Journal of Strategic Information Systems, 17(3), 214-233. (2008).
Winter, J. Selfie-loathing. Slate, slate. com. Accessed, 23. (2013).
More Subjects
Join our mailing list
@ All Rights Reserved 2023 info@freeessaywriter.net