Monday, August 12, 2019
The Role of Journalism, Mass Media and Communication in Politics Term Paper
The Role of Journalism, Mass Media and Communication in Politics - Term Paper Example The politicians have mostly used and utilized digital tools legally and illegally with the aim to chase political goals as hacktivists. Hacktivists are the online activity of the special kind that does not generally obey the order. This is to mean that in the digital world, they portray civil disobedience. This idea of hacktivism can be applied by the politicians to the view of digital activists. Online civil disobedience is also encapsulated on this. For various political reasons, activists may behave disobedient in the digital world. These online activists exercise their basic right to freedom of expression and assembly. Politicians can raise various issued or inform the public on certain issues that are happening in the ruling government that may be heating the public. Issues like corruption in the government may be raised by the politicians without being identified through the internet so that the public might provide their opinion. The unique feature of anonymous is the fact that it does not poses a political opinion that is uniform with the apparent omission of the idea of the internets absolute freedom. For an instant, no payment is to be allowed in the opinion provided, no censorship and filtration. There is decentralization of communication over abroad supply of the channels of communication, this includes, mailing list, image boards, and the channels of IRC. Since there is the distribution of information and the people participating are having an opinion that is diverse, there can not be a spokesman or a leader. In short, both the non-digital and the digital protest can at the same time come from anonymous (Slobbe & Verberkt, 2012). The anonymous statement should always be questioned because there are higher possibilities that the statement might not be true. The main method of anonymous entails a target specification and the use of the DDoS method for taking it down while asking for more participants on the internet.Ã Ã
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.