Social Media and Misleading Comments

Verified

Added on  2020/05/28

|28
|5073
|215
AI Summary
This assignment explores the impact of misleading comments on social media. It focuses on user experiences with online transactions, negative feedback due to misinformation, and the comfort level of discussing sensitive topics online. The questionnaire includes questions about commercial webpages, customer engagement, and personal experiences with negative feedback related to misleading comments.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Should Social Media Censor Content
By <Name of Student>
<Institutional Affialiation>
<Instructor’s Name>
<Date of Submission>

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Abstract
The internet is recognized as a global network of communication in which passing of the
information from one point to another saturates in seconds. The shared information on the
internet is hardly censored something which exposes threats to the users in many ways. The
threats, which are reviewed in this study, include security, safety, privacy as well as some of
the social issues. The research was conducted among the frequent users of the social media
and on the results that were obtained was analysed and applied to see how the censorship of
the social media content is essential. This research uses empirical and some part of the
theoretical methods in the analysis. The empirical method is based on the interviews and the
analysis of the secondary data. The secondary data analysis entails application of the
various statistical approaches to determine validity of the results. The study also identifies
some substantial gaps, which, should be bridged through internet censorship. Therefore,
after critical analysis of the results, I was able to draw conclusion that there should be
censorship of the content of the social media to protect the users of the internet from these
threats.
2
Document Page
Table of contents
Abstract.............................................................................................................................................2
1 Introduction................................................................................................................................5
1.1 Background of the study.....................................................................................................5
1.2 Objectives............................................................................................................................5
2 Literature review.........................................................................................................................7
2.1 Internet and privacy.........................................................................................................7
2.2 Internet and security as well as safety.............................................................................8
2.3 Internet and social issues..................................................................................................9
2.4 Conceptual framework........................................................................................................9
3 Research methodology.............................................................................................................10
3.1 Target population..............................................................................................................10
3.2 Sampling procedure and sample size................................................................................10
3.3 Data collection methods and tools....................................................................................10
3.4 Research design................................................................................................................11
3.5 Data analysis.....................................................................................................................11
4 Results and Findings..................................................................................................................11
4.1 Descriptive statistics..........................................................................................................11
4.1.1 Gender......................................................................................................................11
4.1.2 Age-range..................................................................................................................11
4.1.3 Internet use...............................................................................................................12
4.1.4 Purpose of using online transactions........................................................................12
4.1.5 Online transaction website........................................................................................13
4.2 Incidents that have happened due to misleading comments within the last 10 years.....13
4.2.1 Hypothesis testing.....................................................................................................14
4.2.2 Relationship between the number of fans and receipt of negative feedback...........14
4.2.3 Relationship between the purpose of the webpage and negative feedback.............14
4.2.4 Relationship between negative feedback and source of webpage popularity..........15
4.3 Why people use social media as a platform for sensitive comments...............................15
4.3.1 Relationship between negative feedback/experience and social media use............16
5 Conclusions and Recommendations.........................................................................................17
5.1 Conclusions.......................................................................................................................17
3
Document Page
5.2 Recommendations............................................................................................................17
References........................................................................................................................................18
APPENDIX..........................................................................................................................................21
4

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1 Introduction
This covers the background of the study, objectives of the study, justification of the study and
study limitations
1.1 Background of the study
In the modern day life, the internet a far-reaching aspect. It has been recognized as one of
the most crucial tools for many people in the globe to express themselves, to freely
communicate and share or receive news and information. In fact, the internet penetration
rates are rising exponentially (Duggan and Smith, 2015). Before social media, sharing of the
opinions, receiving information and news was mostly based on the traditional mass media
forms in which the content of these parameters were censored. The rise of social media over
the last decades has given many states more difficult task of censoring the information that
is shared by the citizens. Likewise, the penetration of internet has also been more influential
in the field of business as companies rely on it for activities such as marketing of the
products and services. Moreover, there are even private companies, which are consistently
improving access to the internet, because of the financial opportunities, which are inherent
in the internet. For example, Facebook intends to introduce the internet to the remotest areas
in the world. Likewise, Google also intends to introduce Google Loon, which is also aimed
at increasing the rates of internet access in different countries. However, the current
adoption rates of the internet also come with their own challenges, which are discussed in
the objectives below.
1.2 Objectives
The main aim of this study is justify whether or not there should be censorship of the social
media content. The social media has rapidly grown faster than any other type of the social
media but the concern is directed over the internet control and censorship, which has formed
an interesting discussion. Hence, the aim is meant to give the yes answer on online
5
Document Page
censorship of the content of the social media. The table below therefore summarizes the
objective of the study.
M BR BR
What kind of censorship
can
be implemented for the
internet by Govt. /policy
maker?
To what extent can free
content of
Internet influence
relationship
breakdown?
1) How many users of
the internet use
social media
content?
2) What is the
frequency of
relationship break
down in the last 10
years due to the
internet?
6
Document Page
To what extent can free
access to the internet be a
threat to safety and security
1) What
percentage
of customers
are using
internet
banking?
2) How many financial
transaction is
occurred throughHow significant can the
internet contribute as a
platform to discuss social
sensitive issues, which
may lead to social unrest?
1) How many incidents
have happened due to
misleading comments
within last 10 years?
2) Why are people
using social media
as a platform for
sensitive
comments?
2 Literature review
2.1 Internet and privacy
The internet is a collection of files about different things. Moreover, each time someone
uses the internet, some information about him or her remains with the internet. In fact,
Zarouali et al. (2017) perceive the use of cookies as one of the biggest privacy contentions
on the internet. The websites use these cookies to monitor the behavioral patterns of their
7

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
users, and in most cases, when someone declines to accept the cookie policy, then they are
denied the services of the aforementioned website. This is a questionable behavior, because
the user might not want to leave a trail behind. In fact, companies use these cookies for big
data analytics to identify consumer-purchasing patterns, which patterns then they use to
serve the customers with greater levels of accuracy. However, it is usually the case that they
do not consult the user about how and when they can use their information, thereby
infringing on personal privacy. Take the example of the father who found out that his
teenage daughter was pregnant, because of a card from Target. The company had been
collecting information about her purchases, and then sent her a congratulations card, with a
baby catalog. Consequently, there is room for more censoring on the internet.
2.2 Internet and security as well as safety
Typically, a person uses a password for their internet accounts to secure their private
information. However, the accuracy of the protection is not always top notch. In most cases,
with a few key strokes, the hackers can access this data. In fact, if a website does not have
strong security, then it might be hacked, and the information of the customers might be
stolen, including credit card data (Kashmiri, Nicol, and Hsu, 2017). Hacking is already
illegal, and therefore, there is no contest about the protection of customers' piracy on that
score. Furthermore, the companies, which fail to implement measures against the human
threat to the security of the user data, also expose their users, and therefore, stronger
legislation is required on that measure. For example, one Eric severally reported to Amazon
that the customer care assistants had provided his information to the identity thieves, but the
issue was never fixed. He had discovered that when someone pretended to be him, the
customer representatives would provide him with information about his credit card, his
previous purchases, and even his home address. The problem therefore arises, that someone
can easily be compromised both line and in their personal lives, without the company
8
Document Page
conducting due diligence to discover where the problem emanated from. On that score,
companies should therefore be held to higher standards of accountability, because their
carelessness could be catastrophic to the users of their services.
2.3 Internet and social issues
The internet is a hive of information, not all of which is correct (Wilkie, Michael and
Plummer-Fernandez, 2015). However, it is never easy to find out which information is
correct, and which is not. It is therefore left to the discretion of the internet sites, to provide
proof of their information, and therefore, they should be held accountable for their
information. The problem however, is that it is not always possible to comb through the
internet for who is posting what. Accordingly, within a matter of hours, information on the
internet can reach millions of people and then advance an agenda, which is either beneficial
or even harmful. For example, there are certifiably manual and automated robots on Twitter
which post flagrant and inciting information, which the users have no means of identifying
whether they is correct or not (Wilkie, Michael and Plummer-Fernandez, 2015). This
information is meant to be inciting, yet people find negative information more accurate than
positive information, and they remember it for longer. Consequently, it should be
mandatory for companies like Twitter to instate measures against the aforementioned bots,
to reduce the extent to which this information spreads without accountability.
2.4 Conceptual framework
9
To what extent can free content of
internet influence relationship
breakdown:
1) How many users of the
internet use social media content?
To what extent can free access to the
internet be a threat to safety and
security:
1) What percentage
of customers are
using internet
banking?
2) How many
financial
transaction is
occurred through
internet?
How significant can the internet
contribute as a platform to discuss
social sensitive issues which may lead
to social unrest:
1) How many incidents have
happened due to misleading
comments within last 10 years?
2) Why are people using social
media as a platform for sensitive
comments?
Document Page
6.
3 Research methodology
This is a systematic method of solving a problem .It is the process by which researchers go about
their work of describing, explaining and predicting phenomena (Kumar, 2014).
3.1 Target population
This is the entire units from which the survey data is to be collected to make statistical inferences
(Feldman, 1990).In our study; the target population is the internet users.
3.2 Sampling procedure and sample size
Purposive sampling was used to acquire the sample that responded to the questionnaires. The
researchers’ judgment was used to select the sample that had characteristics of internet users. This
was to save on time and related costs.Moreso, this sampling method was appropriate because
there was only limited number of primary data sources who could contribute to the study.
Purposive sampling is a non-probability technique of sampling where the researcher relies on
his/her judgment in selection of a sample (Kothari, 2004)
A sample of size 30 was obtained for this study.
3.3 Data collection methods and tools
A structured questionnaire was administered to the sample; this was self-report where the
respondent was supposed to tick the appropriate answer. The questions given were closed-ended
while only one question was open-ended.
10
Internet Censorship

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
3.4 Research design
This study utilized both qualitative and quantitave research design.Qualitative method is used to
describe the characteristics of the study population while quantitave method is used to test
hypothesis and determine relationships between variables.
3.5 Data analysis
Primary data was used for this study, obtained from structured questionnaires. The data for this
study was then, cleaned, coded and entered into SPSS for analysis.
Descriptives are carried out first; this is to describe our sample. Further, inferential statistics is then
carried out to test hypotheses.
4 Results and Findings
4.1 Descriptive statistics
4.1.1 Gender
The bar chart below shows the frequency distribution of gender. The percentage of male
(63.3%) respondents is higher compared to female counterparts (36.7%).
4.1.2 Age-range
The distribution of the ages of the respondents is as shown by the bar chart .Respondents in
the age-range 35-45 were higher (40%), followed by 25-35 with (26.7%), above 45 (20%)
and 15-25(13.3%)
11
Document Page
4.1.3 Internet use
The bar chart below shows the distribution of internet use by the respondents. The
percentage of respondents who use internet daily is higher (33.3%) followed by those who
use it twice a week (30%), once a week (23.3%) and only a few uses it once or more in a
month (13.3%).
4.1.4 Purpose of using online transactions
The bar chart displays the distribution of internet users according to their purposes of using
online transactions. Those using it for trading have the leading percentage (30%), followed
by net banking (26.7%), banking (23.3%) and E-tickets (20%).
12
Document Page
4.1.5 Online transaction website
Online banking website is the mostly used online transaction website (36.7%), eBay and
amazon have the same percentage of (23.3%) and others (16.7%) are not commonly used.
4.2 Incidents that have happened due to misleading comments within the last
10 years
Among the respondents who own a commercial or advertising webpage, 70% have had
negative feedback from buyers due to misleading comments or information while 30%
have not had such experiences. It is as shown in the bar chart below.
13

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Negative feedbacks have cost some entrepreneurs losses. The negative reviews given by
some customers are not legit; some do it out of jealousy and bad intentions.
From our analysis, those entrepreneurs who took the initiative of giving appropriate
responses to the negative feedbacks, like building trust for their customers and being
accountable were taken positively and they gained their customers back.
4.2.1 Hypothesis testing
Chi-square statistic is used to test for any associations between any two categorical
variables.
4.2.2 Relationship between the number of fans and receipt of negative feedback
Null hypothesis: There is no association between the number of fans and receiving of
negative feedback
Alternative hypothesis: There is an association between the number of fans and receiving of
negative feedback
The results from our analysis revealed that(chi-square with 2 degrees of freedom=.018,p-
value=.991).Since .991>.05,we reject the null hypothesis and we conclude there is no
significant relationship between the number of fans one has on his/her webpage and receipt
of negative feedback from customers.
Negative feedbacks are received from the customers irrespective of the number of fans in
the webpage.
4.2.3 Relationship between the purpose of the webpage and negative feedback
Null hypothesis: There is no relationship between the purpose of the webpage and receipt of
negative feedbacks due to misleading information
14
Document Page
Alternative hypothesis: There exist a relationship between the purpose of the webpage and
receipt of negative feedbacks due to misleading information
The chi-square analysis resulted in (chi-square value.049=, degrees of freedom=2, p-
value=.976).Since .049<0.05, we do not reject the null hypothesis. It reveals that there
exist a significant relationship between the use of the webpage and receipt of negative
feedbacks from customers.
Those offering services received more negative feedbacks (46.2%), while only 30.8%
negative feedback was experienced by those offering products and 23.1% for those
offering both products and services.
4.2.4 Relationship between negative feedback and source of webpage popularity
Null hypothesis: There is no association between negative feedback and source of
webpage popularity
Alternative hypothesis: There is no association between negative feedback and source of
webpage popularity
Chi-square tests results gave us (chi-square value with 3 degrees of freedom=.724, p-
value=.868).since .868>.05 we reject the null hypothesis and we conclude that there exist
an association between negative feedback and source of webpage popularity.
Those acquiring its popularity from the customer’s reviews, has the highest percentage of
negative feedback (38.5%) followed by those acquiring its popularity from unknown
source and quality with (23.1%) while those with popularity from known brand name had
15.4%.
4.3 Why people use social media as a platform for sensitive comments
Most respondents were found to be comfortable to negotiate, share and express their
views over social media than in real life. The bar chart below shows the distribution of
their views.
15
Document Page
This can be attributed to the fact that there are many posts at any given time and supervision
is deemed difficult.Therefore, majority of the people feel free to share their views on
various topics. There is no criticism from close people.
Some issues are considered taboo in some cultures and when one finds a platform to express
their feelings on this, and then they take advantage. Our analysis revealed that many
respondents were comfortable discussing through social media than in real life.35.3% of the
respondents socialised on taboo and politics,17.6% on religious topics while 11.8% on other
topics. They find it beneficial as they have freedom of expression.
4.3.1 Relationship between negative feedback/experience and social media use
Null hypothesis: There is no association between negative feedback and social media use
Alternative hypothesis: There is an association between negative feedback and social
media use
The cross-tabulation and chi-square test gave the following results (chi-square value with
4 degrees of freedom=7.091, p-value=.131).This reveals that there is a significant
association between negative feedback and social media use since .131>.05.
Respondents who use social media to express themselves and have experienced negative
feedback or experiences from socialising on some topics do not consider it beneficial to
socialise on those topics.40% of them do not agree on its benefits from the cross-
tabulation table.
16

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5 Conclusions and Recommendations
5.1 Conclusions
For this study, there were more male respondents and respondents in the age-range 35-45 were
higher (40%) as compared to any other age-range.
Respondents who use internet daily were higher(33.3%) compared to any other frequency of
internet usage, respondents using it for trading had the leading percentage(30%) than for
other purpose of online transaction and online banking website is the mostly used online
transaction website (36.7%).
Among the respondents who own a commercial or advertising webpage, 70% have had
negative feedback from buyers due to misleading comments or information while 30%
have not had such experiences.
Negative feedbacks from customers are received irrespective of the number of fans one
has in the webpage but the source of popularity of the webpage is affected by the negative
feedbacks especially those receiving its popularity from customer’s reviews. Webpages
used for products received more negative feedbacks compared to those offering services.
Most respondents find it easier to express themselves through social media than in real life
situations. Respondents who use social media to express themselves and have experienced
negative feedback or experiences on commenting on some topics do not consider it
beneficial to socialise on those topics
5.2 Recommendations
The concerned authorities should make policies to improve on internet security and privacy.
Further studies should be carried out to determine the patterns of internet use and negative
feedbacks.
17
Document Page
References
Zarouali, B., Ponnet, K., Walrave, M. and Poels, K., 2017. “Do you like cookies?”
Adolescents
' skeptical processing of retargeted Facebook-ads and the moderating role of privacy
concern and a textual debriefing. Computers in Human Behavior, 69, pp.157-165.
Duggan, M. and Smith, A., 2015. Social media update 2013. Pew research center, 19.
Kashmiri, S., Nicol, C.D. and Hsu, L., 2017. Birds of a feather: intra-industry spillover of
the
Target customer data breach and the shielding role of IT, marketing, and CSR.
Journal of the Academy of Marketing Science, 45(2), pp.208-228.
Wilkie, A., Michael, M. and Plummer-Fernandez, M., 2015. Speculative method and
Twitter:
Bots, energy and three conceptual characters. The Sociological Review, 63(1), pp.79-
101.
Bamman, D., O’Connor, B., and Smith, N., ‘Censorship and deletion practices in Chinese
social
media’, First Monday, Vol. 17, No. 3-5, 2012,
http://firstmonday.org/article/view/3943/3169 (accessed on 24 June, 2016).
Benkler, Y.(2006). The wealth of networks: How social production transforms markets and
freedom, New Haven, CT, Yale University Press.
18
Document Page
Bertot, J.C., Jaeger, P.T., and Grimes, J (2010). Using ICTs to create a culture of
transparency:
E-government and social media as openness and anti-corruption tools for societies',
Government Information Quarterly, vol. 27.3
Boeder, P., ‘Habermas’ Heritage: The future of the public sphere in the network society’,
First
Monday,Vol 10, no 9, 2005,
http://firstmonday.org/ojs/index.php/fm/article/view/1280/1200
Bruns, A., and Axel, T., ‘Is Habermas on Twitter? Social Media and the Public Sphere’ in
Bruns, Axel, Enli (2015). Companion to Social Media and Politics, New York, NY,
Routledge.
Dahlberg, L., ‘The Habermasian Public Sphere: A Specification of the Idealized Conditions
of
Democratic Communication’, Studies in Social and Political Thought, no. 10, 2004
DeLisle, J., Goldstein, A., and Yang, G. (2010)(ed.) The Internet, Social media, and a
Changing
China, Philadelphia, PA, University of Pennsylvania Press, 2016 Diamond, L.,
‘Liberation Technology’, Journal of Democracy, Vol. 21, Issue 3, 2010
Dutton, W.H. et al.(2011). Freedom of Connection, Freedom of Expression: The changing
legal and regulatory ecology shaping the Internet, Paris, France, UNESCO Publishing,
revolutionary was the digital revolution? Stanford, CA, Stanford Business Books.
Agresti, A. and Kateri, M., 2011. Categorical data analysis. In International encyclopedia of
statistical science (pp. 206-208). Springer Berlin Heidelberg.
19

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Australia, E.F., 2002. Internet censorship: Law & policy around the world. Retrieved
February, 23, p.2005.
Bitso, C., Fourie, I. and Bothma, T.J., 2013. Trends in transition from classical censorship to Internet
censorship: selected country overviews. Innovation: journal of appropriate librarianship and
information work in Southern Africa, 2013(46), pp.166-191.
Feldman, L.E.O.N.A.R.D., 1990. Target population definition. Preserving families, pp.16-38.
Fourie, I., Bitso, C. and JD Bothma, T., 2014. Methods and resources to monitor internet
censorship. Library Hi Tech, 32(4), pp.723-739.
Goggin, G., 2004. Virtual nation: The internet in Australia. UNSW Press.
Kothari, C.R., 2004. Research methodology: Methods and techniques. New Age International.
Kumar, R., 2014. Research methodology: A step-by-step guide for beginners. Sage.
Landau, S., 2004. A handbook of statistical analyses using SPSS. CRC.
McHugh, M.L., 2013. The chi-square test of independence. Biochemia medica: Biochemia medica,
23(2), pp.143-149.
Miller, R. and Acton, C., 2009. SPSS for social scientists. Palgrave Macmillan.
Samuels, M.L., Witmer, J.A. and Schaffner, A., 2012. Statistics for the life sciences. Pearson
education.
Preacher, K.J., 2001. Calculation for the chi-square test: An interactive calculation tool for chi-
square tests of goodness of fit and independence [Computer software].
20
Document Page
APPENDIX
Questionaries:
Question #1: How many fanatical transactions are occurred through interne
Please kindly tick or type below the appropriate option:
1) Please specify your gender:
A) Male
B) Female
2) Please specify your age
A) 15-25
B) 25-35
C) 35-45
D) 45- Above
3) How often do you use the internet?
21
Document Page
A) Once a day
B) Once a week
C) Twice in a week
D) Once or more in a month
4) What is your purpose of using online transaction?
A) Buying
B) Net-banking
C) Trading
D) E-tickets
5) Does anyone recommend you to use online transactions?
A) Family
B) Friends
C) Partner
D) N o n e
6) What is your most used online transaction website?
A) Amazon
B) Online banking website
C) EBay
D) Other
22

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7) Have you had any bad experience of using online transaction?
A) Yes
B) No
8) How do you do your online transaction?
A) Family
B) Friends
C) Alone
D) None
Question # 2: How many incidents have happened due to misleading comments within
last
10 years?
In todays complicated world, one can be held responsible for posts or public comments
made by others on their social media pages which are false or likely to mislead or deceive
consumers.
Please kindly tick or type below the appropriate option:
9) Do you have a commercial or advertising webpage?
A) Yes
B) No
23
Document Page
10) What is the main purpose of this page/what do you offer/sell?
A) Services
B) Products
C) B o t h
11) How many fans does your webpage have?
A) Less than
500people
B) More than 500 people but less than 2000
people
C) More than 2000
people
12) Where does your webpage get its popularity
from?
A) Known brand
name
B) Customers
reviews
C) Quality
24
Document Page
13) Have you had any negative feedback from buyers due to misleading
comments or information?
25

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTERNET CENSORSHIP 26
A) Yes
B) No
14) How did you deal with this situation?
------------------------------------------------
15) Was/were the customer/customers happy with the solution you suggested/why?
A) Yes
B) No
Q3 #3: Why do people use social media as a platform for sensitive comments?
26
Document Page
INTERNET CENSORSHIP 27
While peoples reasons for negotiating, sharing and expressing views over social Medias
vary and differ from one person to another, a wider and hidden speech space is likely the
reason for them to do these things in the virtual environment.
16) Do you find it more comfortable to negotiate, share and express your views over social?
Medias than in real life?
A) Strongly disagree
B) Somehow disagree
C) Agree
D) Somehow agree
E) Strongly Agree
18) What kinds of sensitive topics do you socialise mostly?
A- Taboo topics such as sex
B- Political topics
27
Document Page
INTERNET CENSORSHIP 28
C- Religious topics
D- Others
19) Do you find it beneficial to socialise these topics?
A) Strongly disagree
B) Somehow disagree
C) Agree
D) Somehow agree
E) Strongly Agree
21) Have you ever had bad/negative experience /feedback from socialise these topics?
A- Yes
B- No
28
1 out of 28
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]