Computers in Mass Media

<<2/”>a >h4 style=”text-align: center;”>Social and Electronic Media

  • Social Media can be defined as any web or mobile based platform that enables an individual or agency to communicate interactively and enables exchange of user generated content and it is explained by a number of tools, which includes blogs, Wikis, discussion forums, micro-blogs, twitter and social networking sites. Internet has become a platform for coordination of plans of attack, Communication with cells, or propaganda and information and spread of hate campaign or messages that can hurt the sentiments of people.

 

  • Social Media in recent times has become synonymous with Social Networking sites such as Facebook or Micro Blogging sites such as Twitter.

  • The advantages of Social media are so many but they are posing threat to Internal Security in various forms like Cyber Terrorism, Fraud, crime, spreading violence, etc.

 

  • According to the Cisco 2013 Annual Security Report, the highest concentration of online security threats are on mass audience sites, including social media.

 

  • The rapid spread of false information through social media is among the emerging risks identified by the World Economic Forum in its Global Risks 2013 Report.

 

  • National Security is of prime importance for any nation to maintain peace and harmony. Nations face numerous internal security challenges and Social Media act as the platform for that. Social media is not security threat in itself but the users of these Services can pose the threats by their anti-social endeavours.

 

  • With limited government oversight, Industry standards or incentives to educate users on security, privacy and identity protection, users are exposed to identity theft and fraud. Additionally, these platforms have huge confidential user information, and are likely vulnerable to outside or inside attack which is detrimental to Internal Security.

 

Different Internal Security threats due to Social Media are:

 

 

  • Cyber Terrorism:

 

The biggest challenge for internal security of nation through social networking site is cyber terrorism.

 

Today terrorists select Social Media as a practical alternative to disturb the function of nations and other business activities because this technique has potential to cause huge damage. It poses enormous threat in international system and attracts the mass media, the security community, and the information technology corporation.

 

At the same time, due to the convenience, affordability and broad reach of social media platforms like YouTube, Facebook and Twitter, terrorist groups have increasingly used social media to further their goals and spread their message.

 

Social Media became a platform for coordination of plans of attack, communication with cells, or propaganda and information and spread of hate campaign or messages that can hurt the sentiments of people.

These groups now have their own websites where they can convey their propaganda and, for most of them, they advise their readers and followers not to trust the media which are seen as the enemy.

 

The chat service like Skype, which includes voice and video capabilities, has become particularly popular with terrorist cells. Chat rooms and electronic forums enable the insurgent and extremists groups to communicate with members and supporters all over the world, to recruit new followers and to share information at little risk of identification by authorities.

 

Youths are especially targeted for propaganda, incitement and recruitment purposes by terrorist groups.

 

  • Fraud: 

 

Social networking sites also invite fraudsters to take excellent opportunity to become wealthy by applying deceiver schemes.

 

  • Criminal Activity and Money laundering:

 

Internet Media is a major resource for developing serious crime. As Internet is growing explosively, online criminals try to present fraudulent plans in many ways. Social networking sites also pose major challenge in financial and organized crime which destabilizes the system. It creates threat to a company’s security because of what employees might disclose and they are on prime target for cyber criminals.

 

  • International users:

 

The other national and international users such as the Political Parties, NGO’s, hackers pose a serious threat using the social media. For example, during the civil turmoil in the Arab Spring Uprising, the various governments were threatened through the social media.

 

  • To Bring Revolution: 

 

Some countries in the world feel threatened by the fact that social media can bring the people together and thus, create a revolution. This in turn can cause political instability

 

  • Communal Violence and Fanning Tensions: 

 

Importantly, social media also seems to be playing a significant role in polarising different communities in India and compounding India’s Security challenges. The viral Videos and false updates of communal clashes, riots and terrorists attack have created a massive impact in the life of public.

 

The power of media and the process of public opinion formation in a free Society had undergone radical change due to Internet and faster means of communications like SMS, whats app, viber and simplified mobile internet. The chain of events beginning with the clashes in our North-east and which caused very serious and mass exodus of North-east Population from several Indian cities has revealed the fragility of our national Cohesion.

 

  • Virtual Community: 

 

Popular social networking websites are another means of attracting potential members and followers. These types of virtual communities are growing increasingly popular all over the world, especially among younger demographics. This can build Anti-national Sentiments among Society.

 

  • Hacking:

 

Hackers write or use ready-made computer programs to attack the target computer. By using Social Media hackers breach the national security and steal important data of defence or other strategic sectors. This can kneel the whole country without using Arms and Ammunition.

Although social media has the potential to be a threat to national security, it also has the opportunity to strengthen National Security and to be used to benefit the Government.

 

One of the fastest growing ways that Governments are using social media is as a warning or trend prevention tool. As a monitoring tool, the government is able to recognize the first signs of any hostile or potentially dangerous activity by collecting and analyzing messages in order to try to predict events that could be a danger to National Security.

Another important use of social media by the government is as an institutional Communication Tool. Social Media provides a medium that creates cohesion between federal agencies by increasing both communication and transparency.

 ,

Computers have had a profound impact on mass media, from the way news is reported to the way movies are made. Here are some of the ways that computers have changed mass media:

  • Artificial Intelligence (AI) is being used to create more realistic and engaging content. For example, AI is being used to generate realistic-looking fake videos, which can be used to spread misinformation or propaganda. AI is also being used to create more personalized content, such as news feeds that are tailored to each individual user’s interests.
  • Computer-generated imagery (CGI) is used to create special effects in movies and TV shows. CGI can be used to create realistic-looking environments, characters, and objects. It can also be used to create fantastical worlds that would be impossible to create with traditional filmmaking techniques.
  • Computer-mediated communication (CMC) is the use of computers to communicate with others. CMC includes email, instant messaging, social media, and online forums. CMC has made it easier for people to stay connected with friends and family, and it has also made it easier for people to meet new people.
  • Digital media is any type of media that is stored or transmitted in digital form. This includes text, images, audio, video, and data. Digital media has made it easier for people to access and share information. It has also made it easier for people to create and distribute their own content.
  • Electronic publishing is the process of publishing content electronically, such as on the internet or on a CD-ROM. Electronic publishing has made it easier for people to access information, and it has also made it easier for people to publish their own content.
  • Internet television is the delivery of television programming over the internet. Internet television has made it possible for people to watch TV shows and movies on demand, and it has also made it possible for people to watch TV shows and movies from anywhere in the world.
  • Video games are computer-based games that are played on a video game console, a computer, or a mobile device. Video games have become increasingly popular in recent years, and they are now a major form of entertainment.
  • Virtual reality (VR) is a computer-generated simulation that can be used to create a realistic experience. VR can be used for entertainment, Education, and training. It can also be used to treat phobias and other mental Health conditions.

Computers have had a profound impact on mass media. They have changed the way that news is reported, the way that movies are made, and the way that people communicate with each other. Computers have also made it possible for people to access and share information more easily than ever before.

Artificial Intelligence

  • What is artificial intelligence?
    Artificial intelligence (AI) is a branch of computer science that deals with the creation of intelligent agents, which are systems that can reason, learn, and act autonomously.

  • What are some examples of AI?
    Some examples of AI include natural language processing, machine Learning, and computer vision.

  • What are the benefits of AI?
    AI has the potential to improve our lives in many ways, such as by making our homes more efficient, our cars safer, and our healthcare more effective.

  • What are the risks of AI?
    Some people worry that AI could become so intelligent that it poses a threat to humanity. However, most experts believe that this is unlikely to happen, and that AI can be developed safely and responsibly.

Blockchain

  • What is blockchain?
    Blockchain is a distributed Database that allows for secure, transparent, and tamper-proof transactions.

  • How does blockchain work?
    Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system.

  • What are some examples of blockchain?
    Some examples of blockchain include Bitcoin, Ethereum, and Litecoin.

  • What are the benefits of blockchain?
    Blockchain has the potential to revolutionize many industries, such as finance, healthcare, and Supply Chain Management.

  • What are the risks of blockchain?
    Some people worry that blockchain could be used for illegal activities, such as money laundering and drug trafficking. However, most experts believe that these risks can be mitigated through proper regulation.

Cloud Computing

  • What is cloud computing?
    Cloud computing is the on-demand delivery of IT Resources over the Internet with pay-as-you-go pricing.

  • How does cloud computing work?
    Cloud computing works by using a Network of remote servers to store, manage, and process data.

  • What are some examples of cloud computing?
    Some examples of cloud computing include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.

  • What are the benefits of cloud computing?
    Cloud computing offers many benefits, such as scalability, reliability, and cost Savings.

  • What are the risks of cloud computing?
    Some risks of cloud computing include security and privacy concerns. However, these risks can be mitigated through proper security measures.

Cybersecurity

  • What is cybersecurity?
    Cybersecurity is the protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction.

  • What are some common cybersecurity threats?
    Some common cybersecurity threats include malware, phishing, and denial-of-service attacks.

  • What are some ways to protect against cybersecurity threats?
    Some ways to protect against cybersecurity threats include using strong passwords, keeping Software up to date, and being aware of phishing scams.

  • What are the consequences of a cybersecurity breach?
    The consequences of a cybersecurity breach can be severe, such as financial losses, data breaches, and reputational damage.

Data Science

  • What is data science?
    Data science is the field of study that combines domain expertise, programming skills, and knowledge of mathematics and statistics to extract meaningful insights from data.

  • What are some common data science tasks?
    Some common data science tasks include data cleaning, data analysis, and data visualization.

  • What are some benefits of data science?
    Data science can be used to improve decision-making, optimize operations, and develop new products and services.

  • What are some risks of data science?
    Some risks of data science include bias, privacy concerns, and the potential for misuse.

Machine Learning

  • What is machine learning?
    Machine learning is a field of computer science that gives computers the ability to learn without being explicitly programmed.

  • How does machine learning work?
    Machine learning works by using algorithms to analyze data and identify patterns. These patterns can then be used to make predictions or decisions.

  • What are some examples of machine learning?
    Some examples of machine learning include spam filtering, fraud detection, and product recommendations.

  • What are the benefits of machine learning?
    Machine learning can be used to improve efficiency, automate tasks, and make better decisions.

  • What are the risks of machine learning?
    Some risks of machine learning include bias, privacy concerns, and the potential for misuse.

  1. Which of the following is not a type of computer?
    (A) Desktop
    (B) Laptop
    (C) Smartphone
    (D) Mass media

  2. Which of the following is not a function of a computer?
    (A) To store data
    (B) To process data
    (C) To communicate data
    (D) To mass media

  3. Which of the following is not a component of a computer?
    (A) CPU
    (B) RAM
    (C) ROM
    (D) Mass media

  4. Which of the following is not a type of software?
    (A) Operating system
    (B) Application software
    (C) System software
    (D) Mass media

  5. Which of the following is not a way to connect to the internet?
    (A) Dial-up
    (B) Broadband
    (C) Wi-Fi
    (D) Mass media

  6. Which of the following is not a type of website?
    (A) Personal website
    (B) Business website
    (C) Government website
    (D) Mass media website

  7. Which of the following is not a type of social media?
    (A) Facebook
    (B) Twitter
    (C) Instagram
    (D) Mass media

  8. Which of the following is not a type of email?
    (A) Personal email
    (B) Business email
    (C) Government email
    (D) Mass media email

  9. Which of the following is not a type of file?
    (A) Text file
    (B) Image file
    (C) Audio file
    (D) Mass media file

  10. Which of the following is not a type of computer virus?
    (A) Trojan horse
    (B) Worm
    (C) Virus
    (D) Mass media