#JailSentence
A few months ago, I started following a 17 year old on Twitter, his name is Param Sharma but his Twitter name is Lavish P. My initial reaction to his Twitter page was that it has to be some kind of joke, because most twitter users would not show off how wealthy they are the way Param does unless they want to gain attention through followers hating him. The Twitter post that caused me to think of this idea was when Param posted “Fuck all you peasants, you are not as rich as me” wearing Louis Vuitton clothing and making five iPhones clearly visible in his pocket at a luxurious hotel ( ). Almost all the comments posted in response reflect hatred towards him; one specifically said that “karma is a bitch, everyone that's
…show more content…
Blum identifies that a student such as Param Sharma “perform or enact” in an “ever-changing version of self” on Twitter. Param performs on his Twitter account Lavish P. to demonstrate his humor that is constantly being modified to express his humorous personality. This is related to how McLuhan argues that users of technology such as Twitter can cause users to “transform” themselves, which is what Param is doing on Twitter. The main intent of this is to gain “nimble social connections” this can be referred to as Twitter followers, because they are way of becoming socially connected quickly it is simply clicking the follow button on Twitter. Param seeks to obtain Twitter followers through entertaining them on his “ever-changing” Twitter account Lavish P that uses wealth as comedy. This becomes problematic in policing investigations because it is difficult to distinguish if a Twitter page is a performance conducted by a high school student or …show more content…
Police departments must become responsible for educating their police officers to make sure that they utilize Twitter in a manner that adheres to principles that govern all law enforcement actions. A way for educating police officers is to create a mandatory course part of police training for investigations. To aid against the potential of police officers becoming strongly influenced by a Twitter account, Global Justice Information Sharing Initiative (2013) suggest that, police investigations must be informed on validity and reliability of information obtained on social media. This information must go through evaluation to determine if the information is authentic. The course could consist of tactics to determine if information is authentic. These tactics could consist of becoming aware of high school students “ever-changing version” as Susan Blum argues are present and not making it a crucial part of criminal investigations. This course could also allow police to become aware of trends on Twitter, making them recognize common actions on Twitter such as students trying to gain Twitter followers through making their Twitter page entertaining. These suggestions would allow
In the article “ I Tweet, Therefore I Am” (2010), Peggy Orenstein explains that social media such as twitter can express who you are as a person and make you come to the realization of how your life is defined. Orenstein supports this explanation by giving her own personal experience on her twitter experiment. The author’s purpose is to point out that not all people who are hooked to social media have lost the disconnection of feelings along with relationships between people. Orenstein writes in a reflective tone for students and adults.
In “Youthful Indiscretions: Should Colleges Protect Social Network Users from Themselves and Others?” Dana Fleming presents an essay concerning the safety of social networking sites and how Universities can deal and prevent problems. This article is targeted towards school administrators, faculty, and a social networking user audience who will either agree or disagree with her statement. I believe Fleming presents an excellent, substantial case for why she reasons the way she does. Fleming gives a sound, logical argument according to Toulmin’s Schema. This essay has an evident enthymeme, which has a claim and reasons why she believes in that way. Toulmin refers to this as “grounds."
For most everybody in the world, people tend to have two identities: one in reality and one online. Andrew Lam wrote an essay, called “I Tweet, Therefore I am: Life in the Hall of Mirrors”, in which he described how people are posting videos or statuses which is making social media take a turn. Instead of social media being a place to share very little information, people are now tending to post weird updates. Lam was describing an example where a boy that was going to surgery asked to have his picture taken because his arm got taken off by an alligator. Another example is when Bill Nye was speaking and collapsed from exhaustion. Most of the crowd took their phones out and recorded videos instead of helping Bill Nye out (540-541). With the power of the internet at everyone’s fingertips, most everyone is trying to make the most of it. With all
The Letter from Birmingham Jail was written by Dr. Martin Luther King Jr. in April of 1963. Dr. Martin Luther King Jr. was one of several civil rights activists who were arrested in Birmingham Alabama, after protesting against racial injustices in Alabama. Dr. King wrote this letter in response to a statement titled A Call for Unity, which was published on Good Friday by eight of his fellow clergymen from Alabama. Dr. King uses his letter to eloquently refute the article. In the letter dr. king uses many vivid logos, ethos, and pathos to get his point across. Dr. King writes things in his letter that if any other person even dared to write the people would consider them crazy.
“Nothing is perfect.” Though social media brings us uncountable convenience, there is a trade-off with the convenience. Due to the advanced technology we have, social media has become part of our life, which it means that social media could determine our sociability. In Peggy Orenstein’s “I Tweet, Therefore I Am,” though she praises Tweeter for its convenience, at the same time, she also worries that “(Tweeter) makes the greasepaint permanent, blurring the lines not only between public and private but also between the authentic and contrived self.” Since we don’t care about who we talk to, we might act abnormally due to our feelings, and
Higher education law attorney Dana L. Fleming voices her controversial opinion in favor of institutionalized involvement in social network protection in her article “Youthful Indiscretions: Should Colleges Protect Social Network Users from Themselves and Others?” (Fleming). Posted in the New England Journal of Higher Education, winter of 2008 issue, Fleming poses the question of responsibility in monitoring students’ online social networking activities. With a growing population of students registering on social networks like Facebook and MySpace, she introduces the concern of safety by saying, “like lawmakers, college administrators have not yet determined how to handle the unique issues posed by the public display of their students’ indiscretions.” However, while Dana Fleming emphasizes the horror stories of social networking gone-bad, she neglects the many positive aspects of these websites and suggests school involvement in monitoring these sites when the role of monitoring should lie with parents or the adult user.
In a quote by John Mill, “Does fining a criminal show want of respect for property, or imprisoning him, for personal freedom? Just as unreasonable is it to think that to take the life of a man who has taken that of another is to show want of regard for human life. We show, on the contrary, most emphatically our regard for it, by the adoption of a rule that he who violates that right in another forfeits it for himself, and that while no other crime that he can commit deprives him of his right to live, this shall.” Everyone’s life is precious, but at what price? Is it okay to let a murderer to do as they please? Reader, please take a moment and reflect on this issue. The issue will always be a conflict of beliefs and moral standards. The topic
In a persuasive essay, rhetorical appeals are a very important tool to influence the audience toward the author’s perspective. The three rhetorical appeals, which were first developed by Aristotle, are pathos, logos, and ethos. Pathos appeals to the emotions of the audience, logos appeals to the facts or evidence and ethos exhibits the credibility of the writer.
References Lyman, Michael D. (2005). The 'Secondary'. The Police an Introduction. Pearson Education, Inc., Upper Saddle River, New Jersey. Schmallager, Frank.(2008).
The focus of this analysis will be on Mr. Trump’s use of social media sites, namely Twitter. Mr. Trump has a twitter feed that according to Amber Phillips of the Washington Post, “Trump tweets, at minimum, 10 times a day, nearly every day. On Oct. 31 — a typical day in Trump 's campaign — he tweeted 59 times.” (Phillips). Therefore, Donald uses Twitter quite often. He uses it throught the day everyday as a way of keeping his name in the public’s eye. The message and success of such Twitter posts will be discussed
There are places and content offline that is inappropriate to students and so it is online. This has been a major concern for educators and the society as a whole. However this does not deter the increased use of technology including social media in the classroom. Social media tools have become a part of people’s lives so it is easy to integrate it in the classroom, (Brooks, 2014). However, there are many risks associated with integrating social media tools in the classroom just as there are risks associated with the traditional use of online tools. E-safety issue is one of the major risks involved in the use of social media tools in the classroom as there is a risk of putting students’ safety and privacy at risk. According to (Mackenzie, 2012), several risks involved: computer security, issues relating to antivirus, password and firewall as well as email scams. Faculty and administration along with the students need to be aware of the risks entailed in the use of social media in the classrooms.
In this “Digital Age” that we currently live in, it becomes very easy for an individual to become infatuated with the amount of social media outlets available on the internet. Platforms like Facebook, Twitter, Instagram, and Snapchat all revolve around the idea of showcasing one’s personal life for the sake of receiving positive feedback or attention by peers and strangers from the outside world. An episode of the Netflix sci-fi anthology series, “Black Mirror,” decides to tackle this topic in a surreal yet imaginative way. The episode in particular, “Nosedive,” investigates a hypothetical future or alternate universe where social media profiles and star ratings have become the norm. The plot revolves around a young lady named Lacie, who
The popularity of social media is rapidly increasing in the last few decades. This may be due to the students of colleges and universities as well as youth is widely used for global access. Social networking sites like Twitter and Facebook have become a craze for everyone nowadays. In these cases, some students are more concerned about social media or social networks than on teaching by lecturers and will cause affected their academic performance.
One problem students face, resulting in lower grades, is the distraction that social media has the ability to cause in school. The desire to go on social media in class, results in students not paying attention and eventually lower test scores. (Lederer 1) At some schools teachers are oblivious to the fact that students are on Instagram, twitter, and many other applications f...
...e to get information more quickly. I was having an issue with my cable box and rather than calling up Time Warner and being on hold, I was able to tweet their support handle and get an answer and solution within minutes. I believe that the key to safe and secure social media begins with proper use. Illegal and highly discouraged activities should not be tolerated and consequences should be mandatory. In terms of social media use in teens and young adults, it is important for parents to teach their children what acceptable use of computers and social media is so that they can understand the potential danger and all minors should be monitored while using the Internet to ensure safe usage is being followed. Regardless of age, all users of social media should think twice before clicking the post button about what unintended consequences that post could have.