Typically, people turn to search engines such as Google or Yahoo! when they require information from the internet. These search engines employ algorithms to efficiently manage the extensive amount of available information. Without these algorithms, individuals would have to manually sift through all the information on their own, resulting in a significant time commitment. As an illustration, searching for a brownie recipe generates an astounding forty billion search results.
Having algorithms is crucial, but it's essential to have the freedom to decide which information gets filtered. Algorithms are incapable of determining what information holds significance for us. An analogy can be drawn with our personal bookshelves - if they solely consist of holiday catalogues and I require details about travel advisories in Egypt, I won't be able to find them. My interest lies specifically
...in the destination itself. Consequently, these algorithms will generate distinct "filter bubbles" tailored to my profile.
The user's ability to control the content that enters the bubble and is blocked by binary gatekeepers is a significant concern. It seems that the internet displays what it believes aligns with our preferences rather than what we truly seek. This fact disturbs me. Without awareness of these filtering methods, altering our search behavior and its resulting outcomes becomes unlikely. Numerous websites, such as Facebook, Amazon, and Google, appear to employ these algorithms.
The invisible algorithms on Facebook can have both positive and negative aspects. For example, if I like the posts of friend 'B' before friend 'A', it could mean I won't be able to see friend 'A's posts. This worries me because I may want to read what friend 'A'
posted. These advancements in technology occur without much recognition or consideration for internet security. So, it is important to recognize and care about the impacts of these algorithms.
- Cloud Computing essays
- Computer Science essays
- Consumer Electronics essays
- Data Analysis essays
- Electronics essays
- engineering essays
- Enterprise Technology essays
- Hardware essays
- Impact of Technology essays
- Information Age essays
- Information Technology essays
- Modern Technology essays
- Operating Systems essays
- people search essays
- Robot essays
- Web Search Engine essays
- Android essays
- Application Software essays
- Benchmark essays
- Computer Network essays
- Computer Programming essays
- Computer Security essays
- Computer Software essays
- Cryptography essays
- Data collection essays
- Data Mining essays
- Graphic Design essays
- Information Systems essays
- Internet essays
- Network Security essays
- Website essays
- World Wide Web essays