Friday, April 24, 2015

The Dark Side of CMC

Jessica Toyber
CAS 283
The Dark Side of Computer Mediated Communication



    Through the application of electronics, humans have made jarring leaps in the field of communication. Computer mediated communication is most distinctly defined as any means of communication through the use of the internet between individuals or groups. Only decades ago, people didn’t posses the capability to converse with friends and family if they weren’t in the same general area. Nowadays, it’s as trouble-free to make a call to Hong Kong as it is to fetch a waffle from a toaster. Humans are constantly finding methods to expand and increase their modes of getting in contact with their social circles. Although these fresh advances in this field of study seem to have transformed the process of communication for the better, a dark light has been shined on this topic. A grey area of anonymity surrounding the internet makes it complicated to thoroughly understand who you’re talking to, whether the information you receive is legitimate, and introduces humans a revolting, shocking side of the Internet.
  In a comprehensive article, (https://ohuabunwachris.wordpress.com/2014/09/16/the-dark-side-of-cmc/), blogger ‘OHUABUNWACRHIS’ depicts CMC as a dark subject full of concealment. The author gives examples of different social media websites that can thoroughly corrupt and disturb the Internet peace. He/she discusses ‘catfishing’, and the normality of forging another person’s identity modern day. Why is identity falsification accepted as a rational element in CMC? When was it established to be considered okay to pretend to be someone else? Falsifying identity gives a person the chance to recreate and transform who they are as a person. For example, if ‘Martha’ is unhappy with her weight and struggles with weight loss, she can forge herself as a younger, more skinny female. Although this disguise allows Martha to explore herself in a new way, deceiving others online can have severe consequences. Another severe issue that takes place rather commonly in the online world is bullying. Facelessness allows humans to taunt others online without receiving any F2F ramifications. Utilizing Martha as an example one again; if Martha was severely bullied in F2F communication about her weight, this could lead to feelings of self doubt and low self esteem. To regain the ‘power’ lost in the fighting words, Martha logs online and starts taunting others for their flaws and characteristics. This gives Martha a feeling of power, and she continues to ridicule others on the Internet. Lack of social cues also gives people little to no understanding of the message that the other person is attempting to convey. Body language is everything. Without body language, humans can’t necessarily tell if someone’s happy, annoyed, hurt, e.t.c. No social cues turns human interpretation into a puzzle. If someone were to interpret something online in an improper way, the goal of the communication has not been met and nothing has been accomplished as a result. Perhaps the darkest side of CMC lies beyond cat fishing, bullying, or lack of social cues. A twisted, yet innovative side of the Internet has emerged through ‘shock’/‘gore’ sites. These websites are created to shock the audience through gore and murder and disastrous events being shot on camera and essentially posted on the Internet. When I first discovered that sites like these exist in my CAS 283 class, I was appalled and disgusted. How could this be a part of our Internet? How could people allow themselves to partake in the viewing of pure disaster? What does this mean for the future of CMC?
  Computer mediated communication has accomplished an infinite amount for our modern, technology-based society. Never being private or safe since the start of its time, the Internet has found creative and horrifying ways to keep it’s audiences interested. Although we must embrace all the good that’s come along with these technological advances, we must knowledge ourselves of the bad to ensure a safe and secure Internet experience.

   

No comments:

Post a Comment