Social Media And Public Security

Decent Essays
Many researchers have very different approaches in researching about voters/anyone feeling thermometer after their exposure to fact-checking information about their candidates. In Hannak et. al (2014) article, the authors presented the idea that social media is a form of communication that undermining the public security. Social media communication is also a form of communication that can be distracted anyone from important issues. Like Graves and Glaisyer (2012), the article starts off explaining how false information, in term of gossip, was a form of casual talk between peers and that the claims are on what the individuals believe in. while in today, any claims from the individuals have made can be checked with any of the government…show more content…
The second research question that presented in the article is about the behavior between the two groups. In the research, Hannak et. al (2014) explored the two individual’s groups by intervening with fact-checking information by provoking one of the research group. Then they waited to see if any of the two groups will challenge with one another or not. They left the experiment run about half an hour. The result with this second research showed that even with strangers intervened at the challenge with the two groups, they were being ignored. And the establishment between the two groups toward the provoking challenge is recognized within their friend's group circle. Hannak et. al (2014) ended the article by stating that the new form of social communication was increased both by spreading the misleading information and the challenge to provoke by any the individuals. And the result of the twitter intervention showed the social context of the two groups are diverse and it also explained a huge role of the individual’s behaviors. While Bode and Vraga (2015) article are very similar to Hannak et. al (2014) articles, but instead of intervening twitter tweets from two individual groups, Bode and Vraga (2015) did their research based on Facebook posts. In the article, Bode and Vraga (2015)
Get Access