Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Managing Ubiquity of Information on Social Media - Essay Example

Comments (0) Cite this document
Social media user’s self-presented identity should not emphasize certain aspects of their identity or obscure areas inconsistent with their constructed being. Instead, the political communicators should seek to strength the link between actual and ideal identity. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Managing Ubiquity of Information on Social Media
Read TextPreview

Extract of sample "Managing Ubiquity of Information on Social Media"

Managing Ubiquity of Information on Social Media Managing Ubiquity of Information on Social Media Social media have revolutionized the public’s ability to communicate, as anyone can share or find information instantly and from anywhere. The latest innovation in technology is ubiquitous, society wide phenomenon with benefits in key aspects of life. The populations within democratic societies have historically been educated and informed via the media, which facilitate political systems.
Currently, the political world has embraced social media in engaging with constituents. Discussions on the political impact or utilization of social media have largely focussed on the potential of social media in sustaining public sphere and civil society. 21st Century leaders, political communicators, or digital activists face an uphill task dealing with the ubiquity of the internet and social media. Social media can derive massive benefits to political communicators, but can also inflict tremendous damage.
Social media can facilitate identity exploration; whether constructing profiles in MySpace, creating video and posting it on YouTube, or utilizing chat rooms, political communicators are constantly creating, recreating, and shaping their identities. This demands a constant reflection on who the person is, who they wish to become, shaped by values, strengths, and weaknesses. Identity in this case represents the character or personality of a person or group and encompasses unique characteristics of a person inclusive of personal values, opinions, and preferences. Social media has availed exciting new channels to share and connect with others. For political communicators, social media has aided in building and strengthening their connection between themselves and the public. Political communicators use social media to convey messages, promote events, or reach out to the community, nation, or the world at large.
The utilization of social media tools such as text messaging, e-mail, social networking, and photo sharing does not necessarily deliver a single preordained outcome. Social media has dramatically altered the landscape of identity construction whereby its use has mobilized people around the world to re-conceptualize their image. Technological advancement has enabled individuals to move from rooted identities based on place towards hybrid and flexible forms of identity (Pole, 2010). The virtual image created through the social media yields both actual and ideal identities. When used properly, social media can be used to create an icon. Nevertheless, the social media can also ruin one’s image or identity.
When done effectively, the political communicator can control the message the public is receiving. This affords them the chance to decide the information the public has access to, which aids to shape identity. However, individual’s personal lives are exposed by social media whereby people can post damaging, anonymous, or even in accurate information concerning others with little to no recourse. In direct contrast to control what the political communicators may have over their web page, the communicator bear totally no control over what is said, by whom, or how they say it over social media (Pole, 2010).
Political communicators, when using the social media, must decide how best to control messages that the public is given. Respect for copyrights and fair use coupled with protection of confidential and proprietary information should be the guiding principles (Pole, 2010). Instituting a policy for monitoring and reviewing comments to ensure that they are appropriate can reap benefits, especially in building credibility. Political communicators should be responsible in their communications as the key to success in social media hinges on honesty, thoughtfulness, and an adequate awareness of the audience.
Social media user’s self-presented identity should not emphasize certain aspects of their identity or obscure areas inconsistent with their constructed being. Instead, the political communicators should seek to strength the link between actual and ideal identity. The communications should be in good taste whereby political communicator’s sensitivity aligns with the content. In addition, it is essential for social media users to be transparent and authentic demonstrated by honesty on identity and accuracy of facts.
Pole, A. (2010). Blogging the political: Political participation in a networked society. New York, NY: Routledge. Read More
Cite this document
  • APA
  • MLA
(“Managing Ubiquity of Information on Social Media Essay”, n.d.)
Managing Ubiquity of Information on Social Media Essay. Retrieved from
(Managing Ubiquity of Information on Social Media Essay)
Managing Ubiquity of Information on Social Media Essay.
“Managing Ubiquity of Information on Social Media Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Managing Ubiquity of Information on Social Media

Managing Information

...?Managing Information Managing Information 0. Introduction Marston Tools founded in London in the year 1901 as a worldwide gallery and being strong, famous for its tourism and academic projects have attracted artists from all over. The exhibitions are of interest to the citizens and providing carriers and employment (Effy, 2008). Emerging artists from Marston Tools motivated to other areas creating a displacement by newer venues but later, the company reopened some years later. This company have the ability to exhibit its products anywhere in world for it has promising records first to its community and entire universe. It has good experience of these exhibitions...
10 Pages(2500 words)Coursework

Information assurance and security: Social media power

..., unite! The challenges and opportunities of social media. Business Horizons 53, pp. 59-68. Lewis, B. K. (2010). Social media and strategic communication: attitudes and perceptions among college students. Public Relations Journal 4(3). Milovic, B. (2012). Social media and eCRM as a prerequisite for hotel success. Management Information Systems 7(3), pp. 26-31. Oracle. (2012). Is social media transforming your business? Retrieved from Oliver, C. (2008). Social...
15 Pages(3750 words)Term Paper

Managing Information

..., political and social history, which is related to the increasing appreciation of new values, such as openness, freedom, interdependency, networking and collaboration. It is accompanied by the acceleration of technological changes and impetuous development of computer and electronic communications. In the organisational context these processes entailed significant shifts in strategic management thinking and implementations: from information to knowledge and wisdom; from bureaucracies to networks; from training / development to learning; from local / national to transnational / global and meta-national; from competitive to collaborative thinking; from single and multi-connective...
12 Pages(3000 words)Essay

Managing Information Technology

...query and resolve an issue. Absence of socialization was also termed as a major drawback of telecommuting. Indulging into gossips with colleagues at lunch time gatherings often revitalized workers. Moreover, working from home made employees work more hours on an average than they would work while being at office. ROLE OF WILEY’S LEADERSHIP The General Manager of operations in the state of Indiana in the year 1992 was Michael W Wiley. He came when IBM was in the middle of extensive downsizing. Being an old IBMer the last thing on the manager’s list was cutting down any more of his employees. The company was still going in losses even though extensive downsizing had been done. He fully...
8 Pages(2000 words)Case Study


...?Managing Information and Technology This essay intends to analyse the role of information technology (IT) in the contemporary business scenario. Contextually, the essay will also include providing a comprehensive understanding about the viewpoints of Nicolas Carr, where he depicted that IT does not matter in business. This viewpoint of Carr can be analysed by taking into concern the role of IT in Tesco PLC. It has been noted that IT is used in various sections of the businesses and its significance cannot be ignored. This aspect can be supported from the fact that Tesco is involved in the implementation of IT in various domains of its business. In-fact, the operational efficiency of the company largely owes due to the application... that IT...
12 Pages(3000 words)Essay

Managing Information

...Managing Information Today we are in the 'information age', which effectively means We have plenty of sources of information. 2. We cannot survivein this fierce world of competition, without credible information and analysis. It can be safely said that, 'Information is power! It is an asset that can help overcome uncertainty and open new avenues for opportunity. There are three primary elements of information which answer the questions:1 What is needed - Relevance: Here we need to take stock of the publishing industry and relevance of a new magazine for snow skiers. When is it required - Timeliness: The launch is to be...
4 Pages(1000 words)Essay

Managing Information Systems

...Chad M. Olson SM-563 Managing Information Systems Term Project/Paper Outline Data Warehousing I. Overview of Data Warehousing What is a data warehouse Data warehousing rose out of a need top compile a company's interesting data that was stored in disparate database. Data is therefore copied from operational databases, transformed and exported into a warehouse in a predetermined format that will allow it to be queried. "A data warehouse is a logical collection of information gathered from many different operational databases used to create business intelligence that supports business analysis activities and decision-making tasks, primarily, a record of an enterprise's past transactional...
15 Pages(3750 words)Essay

Managing Resources and Information

..., the report also covers the recruitment process for the employees and the evaluation of the adopted practice. In a nutshell, the report examines the implementation and assessment of the child safety awareness program comprehensively. Recruitment of staff Failure in the recruitment of eligible and competent staff not only effects the functioning due to inappropriate levels of skills but also has an adverse outcome on the profitability of a firm. Recruiting employees does not only include the selection of the candidates but it is the complex and widespread process involving the decision making and planning capabilities of the management to select and employ the best and apposite workforce. Skills required for different...
10 Pages(2500 words)Essay

Managing information

...Managing information By The sample method involves taking a representative selection of the population and using the data collected as research information. A sample is a “subgroup of a population” (Frey et al. 125). It has also been described as a representative “taste” of a group (Berinstein 17). The sample should be “representative in the sense that each sampled unit will represent the characteristics of a known number of units in the population” (Lohr 3). All disciplines conduct research using sampling of the population as a method, and the definition is standard across these disciplines. Advantages Less biased (unlikely to match pattern in landscape) Disadvantages Does nothing to distribute samples in areas of high Difficult... to...
4 Pages(1000 words)Assignment


...Ubiquity/Hand Washing al Affiliation Ubiquity/hand washing experiment The ubiquity refers to the fact that microorganisms areall over. The microorganisms can survive the harshest environments and reproduce thereafter. For instance, some Archaea manage to survive in temperatures exceeding the boiling point hence increasing the frequency of the microorganisms. At the same time, other bacteria have been revived after millions of years fossilized tree sap. The microorganism in quite a number of times develops to establish an infection in the human body (Langford, Lunn, & Panter-Brick, 2011). The hand washing coupled ubiquity experiment is aimed at determining the effect of hand washing in reducing the number of microorganism... Washing al...
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Managing Ubiquity of Information on Social Media for FREE!

Contact Us