scholarly journals Lonely Together: The Psychological Divide Due to Social Networking Sites

2015 ◽  
Vol 2 (4) ◽  
Author(s):  
Aastha Dhingra

We live in a world full of judgment and competition, inescapably comparing ourselves and being compared to those around us. The types of actions users take and the kinds of information they are adding to their Facebook walls and profiles are a reflection of their identities. You are your Facebook, basically, and despite all its socialness, Facebook is a deeply personal medium. The time spent earlier during a car ride to a daydream, or building fantasies during lunchtime at work, or those small breaks one took to gaze outside the window are now all time to connect with technology, reply to a text, log on to websites and check email or notifications. I feel robbed on my aloneness, to be rather a buzz of constant communication, that hinders my every moment, and there is always someone to reply to. I finalized this topic because I wanted to explore the need of projection of an online identity of one’s self and if it is the performance and the constant simulation that keeps us stimulated and addicted or is it the reflection of the real onto our screens, because some of us project and consume, idealized images through Facebook, and researchers have been trying to figure out how all this flawlessness affects us in the real world.

2015 ◽  
Vol 2 (3) ◽  
Author(s):  
Aastha Dhingra

We live in a world full of judgment and competition, inescapably comparing ourselves and being compared to those around us. The types of actions users take and the kinds of information they are adding to their Facebook walls and profiles are a reflection of their identities. You are your Facebook, basically, and despite all its socialness, Facebook is a deeply personal medium. The time spent earlier during a car ride to a daydream, or building fantasies during lunchtime at work, or those small breaks one took to gaze outside the window are now all time to connect with technology, reply to a text, log on to websites and check email or notifications. I feel robbed on my aloneness, to be rather a buzz of constant communication, that hinders my every moment, and there is always someone to reply to. I finalized this topic because I wanted to explore the need of projection of an online identity of one‟s self and if it is the performance and the constant simulation that keeps us stimulated and addicted or is it the reflection of the real onto our screens, because some of us project and consume, idealized images through Facebook, and researchers have been trying to figure out how all this flawlessness affects us in the real world.


Author(s):  
Gurdeep S Hura

This chapter presents this new emerging technology of social media and networking with a detailed discussion on: basic definitions and applications, how this technology evolved in the last few years, the need for dynamicity under data mining environment. It also provides a comprehensive design and analysis of popular social networking media and sites available for the users. A brief discussion on the data mining methodologies for implementing the variety of new applications dealing with huge/big data in data science is presented. Further, an attempt is being made in this chapter to present a new emerging perspective of data mining methodologies with its dynamicity for social networking media and sites as a new trend and needed framework for dealing with huge amount of data for its collection, analysis and interpretation for a number of real world applications. A discussion will also be provided for the current and future status of data mining of social media and networking applications.


2020 ◽  
Vol 18 (1) ◽  
pp. 147
Author(s):  
Tisna Prabasmoro ◽  
Ferry Parsaulian Pakpahan ◽  
Abdul Hamid

Status updates are one of the most popular features of Facebook, but few local studies have explored the traits and motives that influence the topics that people choose to update about. As many Persib supporters, otoriously called bobotoh, socialize and spend a great deal of time in technology-mediated environments such as fan communities and social networking sites, they develop an online identity as bilingual and knowlegeable Facebook admins and readers. The article explores the notion of identity as a fluid construct that shifts over time with these bobotoh’s longterm participation in a Facebook fan page named Bobotoh ID. It demonstrates how Sundanese (local language for the people in West Java), bobotoh-ship (a distinct identity) –as points of affiliation– and technology converge to provide a context in which these bobotoh are able to develop a powerful local culture identity circulated through a technologically mediated milieu.AbstrakMeskipun pemutakhiran pampangan (status) adalah salah satu fitur terpopular facebook, kajian-kajian lokal yang mendalami sifat dan motif yang memengaruhi pilihan topik status masih belum banyak dilakukan. Dengan banyaknya jumlah pendukung Persib yang dikenal dengan nama bobotoh yang bermasyarakat dan menghabiskan banyak waktu mereka dalam jejaring teknologi, seperti komunitaskomunitas pendukung dan situs jejaring sosial, mereka mengembangkan identitas maya mereka sebagai admin atau pembaca yang berpengetahuan luas dan bilingual. Artikel ini mengeksplorasi makna identitas sebagai konstruksi cair yang bergeserbersama waktu seiring dengan partisipasi jangka panjang bobotoh dalam komunitas penggemar Persib di facebook bernama Bobotoh ID. Artikel ini juga menunjukkan bagaimana bahasa Sunda (sebagai bahasa daerah masyarakat Jawa Barat), kebobotohan (sebagai identitas yang berbeda)–yang berfungsi sebagai titik-titik afiliasi–dan teknologi bertemu dan memberikan konteks sehingga bobotoh mampu mengembangkan identitas budaya lokal yang kuat di lingkungan yang dimediasi teknologi.


2012 ◽  
Vol 2 (1) ◽  
pp. 53-73 ◽  
Author(s):  
Christine Yunn-Yu Sun

This paper explores the construction of identity in online communities and websites for social purposes, and its consequences in terms of how one’s online identity may be utilized to such an extent that one’s real-world identity is either enforced or eroded. It does so by investigating the very nature of Identify, coming predominantly from a cultural studies research and philosophical view, although it also cites some parallel findings in Information Systems (IS) research. In the Section Something Old, the author investigates the concept of identity in the real world, then investigates it in the online world in the Section Something New. Section Something Borrowed examines how an individual positions oneself including who one associates with and why one flags it so to others. And finally this paper looks at some consequences unfolding in our time (in Section: Something Blue), citing several pointed examples for illustration purposes, where values that have been migrated from the real world are amplified via the Internet, causing all sorts of actions and consequences both online and offline. These issues and actions revolve around control and disclosure of ones identity that has consequences upon reputation and trust, and how responsibility needs to be brought forward into how one: positions oneself, manages ones own identity, and acts appropriately in and beyond the Internet. Above all of these, the author concludes, is the responsibility of understanding the nature of identity itself.


Author(s):  
Kannan Balasubramanian

With the arrival of the internet, cell phones, e-mail, instant messaging and social networking sites we can do many wonderful things electronically now that make our lives easier and more productive. We should get used to the idea that a good part of our social life can happen in cyberspace. You can keep up with your friends and meet new ones through a keyboard, microphone and a webcam. You can send a detailed e-mail, send a quick message or alert your circle of friends and followers about the latest details what's happening around you. At the same time, we should come to terms with the fact that the cyberspace is flooded with attacks from people who are unscrupulous in their intent to damage others in the cyberspace. The attacks date back to the time when telephone was invented, when the attackers found way to invade people's privacy. For most users, the web is just part of a well-rounded life that includes both a cyber world and a real world. The internet can be helpful, educational and fun. But It can also become an obsession leading to waste of time and money. Just because cyberspace is virtual, that does not mean that there are not real dangers out there. The same sort of bad people who can cause problems for people in the “real” world are also lurking on the internet. They spend their time looking for ways to steal your money, ruin your name or even cause you harm.


Author(s):  
Gurdeep S Hura

This chapter presents this new emerging technology of social media and networking with a detailed discussion on: basic definitions and applications, how this technology evolved in the last few years, the need for dynamicity under data mining environment. It also provides a comprehensive design and analysis of popular social networking media and sites available for the users. A brief discussion on the data mining methodologies for implementing the variety of new applications dealing with huge/big data in data science is presented. Further, an attempt is being made in this chapter to present a new emerging perspective of data mining methodologies with its dynamicity for social networking media and sites as a new trend and needed framework for dealing with huge amount of data for its collection, analysis and interpretation for a number of real world applications. A discussion will also be provided for the current and future status of data mining of social media and networking applications.


2016 ◽  
Vol 2 (2) ◽  
Author(s):  
PANKAJ PANKAJ

In present scenario an Individual user will have multiple social network accounts to stay involved with friends in several social networking sites. Online social network users aren’t attentive to the varied security attacks like privacy violation, fraud, etc. Different on-line social users can assume it as real users and that they could be capable them that aren’t truly the real user.It is estimated 1.96 billion user are active on social networking sites. Only Facebook have 1.87 billion active user in a month.. During this research paper, I had tried to analyze social network knowledge supported attributes similarity. The planned system will cite as several similar social network profiles as a potential and analyze them so as to seek out whether or not it belongs to same or totally different persons. It makes different user straightforward to speak with one another during a safe and secure manner.


Author(s):  
Andrew Brooks

Education is moving out of the classroom and into the real world, driven by both emerging Information and Communication Technologies (ICT) and new economic models. The boom of the web and social networking has revolutionised global communication and collaboration. A DIY culture and industries are emerging because of this. Mobile devices connecting to the digital superhighways are merging the real and digital worlds. This, coupled with the falling cost of the hardware as well as the free software movement may soon place a new model of education into the grasp of almost everyone. A model where education is no longer the process of being fed information, but rather a process of enquiry, exploration, discovery, expression and re-interpretation of the world around us on our own terms. The potential for learning from and with each other at this moment in time is unprecedented.


Sign in / Sign up

Export Citation Format

Share Document