It"s belong to digital media. Essay Example
—How do the affordances of a networked media culture (hyperlinks, multimedia, sharing etc.) enhance online communication?
The networked media enhances online communication in many ways that makes it the most effective and reliable form of communication. The networked media culture includes the use of certain unique features like hyperlinks, multimedia, and sharing among many others. Each type of affordance has its unique features and characteristics; therefore, their contributions to networking also vary. All these affordances work together to ensure that the user of online communication has sufficient and more reliable information in a click of a button.
Today’s network culture has transformed from one that relied mostly on audio and text information to one that incorporates even visual transmission. Readers and users are not only able to access written content but also audiovisual information, which is readily available online. The visual content makes it possible for a one-on-one interaction, which is a faster and easier form of transferring information.
The first form of the networked media culture is the hyperlinks. According to Halavais (2008), hyperlinks are channels that present a way in which other authors present more information on a particular author’s work. This makes it possible for the user to obtain mass information regarding a certain topic in one site. Hyperlinks therefore link related information to each other thereby saving the user time to do other things. The use of hyperlinks by networkers makes online communication the most effective and efficient form of transmitting data.
Multimedia networking is another aspect of the networking culture. This entails sending and receiving of audio and video content through a computer network. Network users can upload content in a computer network and stream it to people at different part of the globe. The content is not just limited to stored information but live content can also be relayed. Most television and radio users are the main users of this type of network. One can be able to watch news and favorite programs even without a television set.
Sharing is a new form of networking that has been developed by net workers. In the past, data and files were shared mainly though flash disks and USB cables. Networking has provided a cheaper and more flexible way of doing so by making it possible to share files from one computer to another through network file sharing. This is a faster and convenient process. File sharing can be done via email, local area network, peer-to-peer file sharing, or Bluetooth file transfer (Denko, Tianruo & Zhang, 2009). Different classifications of data can be shared ranging from word documents, audio and visual content.
The uses of hyperlinks, multimedia and sharing forms of networking have revolutionalized the lives of people in terms of how people and corporate bodies do things. A majority of organizations, firms and governments use this platform to collect valuable information from citizens and customers. This information may relate to particular services or commodities that the concerned parties offer. The information collected, which is quite a lot, can be used in decision-making or improving service delivery. All these have made online communication the most preferred form of transmitting information content.
Is there a Cause for Concern?
The excerpt from the fox news reporter and Dr. Keith Ablow is a rather disturbing and traumatizing report. It makes no sense as to why three teenagers would commit murder and go out bragging about it on social media. Such an act is heinous and inhumane; therefore, it is a cause for concern. This cause for concern can be well understood when one knows the concept of human identity
It is true to say that no right thinking individual, be it a minor, teen or adult would commit such and offence in their right thinking minds. A trained psychologist or a behaviorist can only explain the reasons for such kind of behavior. Dr. Keith illustrates that this has to do with the identity of people, which has continued to change over years.
Identity refers to a social category, which is defined by membership rules and an expected form of behavior in that context. Identity is a product of many things, and the first one is the self (Golubović, 1999). Social psychologists claim that individuals can write their own identity through simple ways, such as the way they dress, eat or their tastes and preferences. These factors exist within themselves hence people find themselves engaging in activities that they cannot control.
The other way in which identity is developed is through social situations and interactions. Psychologists claim that people are products of their environment. This means that some social aspects shape and determine the behavior of persons; this includes friends and family members (Kroger, 2007). These people ascribe statuses to an individual hence determine how the individual views himself or herself.
The incident in the mentioned case study is an indication of the influence of the Internet particularly the social media, to the identity of persons. This avenue has made it possible for people to portray different identities and use them to their advantage. The reasons for this are many are depend on what the individuals feels they want the world to view them. The Internet has made it possible and quite easy for this to happen.
The incident is just a tip of the iceberg of the many dangers that the online community posses to the lives of many in the world today. Many Internet users have used the platform to cyber bully their mate, spread rumors, and hate speech among many other vices. This has spoilt the reputation of many people. Since billions of people around the world use the Internet, false information is spread faster than a wild fire within seconds after the click of a button.
The internet has just as many demerits as there are merits (Das, 2008). It proves that the social media is a potential time bomb that can be used spread bad content that is harmful to many. This avenue can and has been used to create content that influences people behavior in a negative way that is harmful to the society that people live in.
In respect to the latest event that caused the murder of a teenager, the relevant authorities can learn a great deal of lessons. The content that is placed on social media should be regulated and monitored to prevent it from causing harm to other users. Until this is effected, the society will remain prone to more dangers. Solutions have been suggested before and thus, should be implemented while searching for enhanced mechanisms.
Das, A. (2008). NETWORKING 2008 Ad Hoc and Sensor Networks, Wireless Networks, Next
Generation Internet: 7th International IFIP-TC6 Networking Conference Singapore, May 5-9, 2008, Proceedings. New York City: Springer.
Denko, M. K., Tianruo, L., & Zhang, Y. (2009). Autonomic Computing and Networking. New
York City: Springer.
Golubović, Z., McLean, G. F. (1999). Models of Identities in Postcommunist Societies: Yugoslav
Philosophical Studies. Washington DC: CRVP.
Halavais, A. (2008). The hyperlinked society: Questioning connections in the digital age.
Michigan: The University of Michigan Press.
Kroger, J. (2007). Identity Development: Adolescence through adulthood, 2nd Ed. California:
More Important Things