Free Essay

Digital Histories

In: English and Literature

Submitted By gigglygirl95
Words 1057
Pages 5
Digital Histories
English Author Arnold Bennett once said, “Any change, even a change for the better, is always accompanied by drawbacks and discomforts”. Change is hardly ever easy. Some people change for the better but are constantly being held back by their past decisions while others change for the worst. What would today’s society be like if change hadn’t ever occurred? The human race would most likely be extinct. So why hold back people who wish to change their lives? People should not expect that others are going to stay the way they are for their whole entire lives: most people change as they grow. It’s not like in before times where, “if a teenager went through ‘a phase,’ generally only his or her family, friends and teachers would know or remember. Those days are gone”(Gerwitz). It’s not necessarily the individual’s fault that his or her life is on display to the world, it’s a new digital age. This digital age is seeming to create an unforgettable history. It is not right to critique individuals on the basis of their digital histories, especially in today’s social media era where nothing can be permanently forgotten once it has been published on the internet.
As time goes on, the social media gets broader. Everyone can know your waking movement and thoughts; just by the pictures posted online. People no matter who they are, are being exploited for the videos and pictures they have posted. Everyone goes through a rough phase and before social media no one else would have known about it except for their friends, family and maybe one or two outsiders but now websites like Instagram, Facebook, Twitter, Tumblr & etc. can see your phase and make judgment and talk about the incriminating photo for days, hours and minutes until it finally everyone who has looked for the picture or searched for the hashtag under the picture. Now the whole world has seen it, judged it and won’t forget about it until someone else post something incriminating. The picture has been forgotten but will always resurface again.
Employers uses social media to determine if an applicant is credible enough to be hired. But once these pictures are forgotten, employers dig and dig until they find all the information they think they can determine if you’re hired. No matter how something is, and depending on what it is, they still use it against you because they believe the person in the picture is who you will remain but that’s not the case. It’s completely wrong for employers to do that, to make judgments on someone without seeing who the person is standing in front of them and recognizing their qualities and experience. In today’s society social media plays a major role in helping an employee to determine whether an employee is suitable for a job or not which should not be the main factor employers rely on. No one is the same overtime and people change as the years go by, the way they look, dress, talk and act. We take pictures to look back on experiences as well as we share them to world by posting it on social networks like Facebook. At some point in one’s life they are unhappy with themselves but they still choose to share their experiences with the world. As they grow and become older and wiser; they better themselves and perhaps look for a new career and forget about their past and the things they did. Often in the corporate world, employers use a social media background check to see if the candidate is good for the company. They observe pictures and posts and attempt to see if they could find out who the person really is and sometimes they can find something not incriminating and believe it and look behind who the person really is “… checks Facebook, sees her history — and then glances over to his five other equally qualified applicants” (Gerwitz, Kern). Employers view applicant’s resumes and as well look into their social life and if they find anything up to their standards no matter when it was posted, the employer instantly looks to another applicant instead of considering the first applicants and who they are today and his or her experience in the field.
More so than often, girls are beginning to exploit themselves with the pictures and videos they share with the world or a guy they believe won’t hurt or mistreat them. The exploitation of themselves is beginning at a younger and younger age because girls have a mind set of “maybe if I send him a picture of boobs he will become more attracted to me”. These girls are looking for something, longing for attention but parents need to realize that we cannot always blame the child for every mistake they made especially when it comes to situations like this. Whether a parent has sons or daughters both should be taught that sending proactive pictures to one another and is not acceptable. Young girls going through puberty also need to understand that just because they send a picture to one person doesn’t always mean only that one person is going to see it.
All in all, the prominent emergence of the internet in the twenty-first century connects people in ways that weren’t ever possible in previous times. Social media has helped this tremendously because people all across the world now have the ability to “like” something on Facebook, “tweet” people on Twitter, and reblog others on Tumblr. This is leaving a permanent footprint: one that has never been seen before. Before, when history was told, it was a current event and then given time, people would soon start to forget. Now, with the creation of digital histories, one can just Google search a person and be presented with an agglomeration of an individual’s past activities. So much for forgetting. This also means that employers, journalists, and other online investigators should take this into consideration and have a heart before they think about who they want to hire and/or fire. Everyone has skeletons in their closet. People should not throw stones when they live in a glass house because how would they feel if they are placed in a similar situation where their life depends on a person’s critique of their digital history.…...

Similar Documents

Premium Essay

History and Development of the Digital Computer

...History and Development of the Digital Computer Prior to the advent of digital computing, human clerks who calculated in accordance with effective methods we referred to as “computers.” Human computing has evolved greatly since that time; giving the need for computing and the advancement of technology an entirely new growth opportunity. A digital computer is “a device that processes numerical information; more generally, any device that manipulates symbolic information according to specified computational processes” (Digital Computer). Each computer is programmed with a basic set of instructions that are the identifiers of what capability that system has to perform functions. Computers are devices used to carry out a myriad of logical operations, and most often consist of at least one processing element. A computer most often contains a memory bank for information storage. Though the idea of computing has been around for a long while, it wasn’t until the mid-1900’s that “computers” came alive. The dinosaurs of the mid-1900 were mammoth machines housed in large buildings and warehouses and consumed more energy for one operating system than hundreds of today’s mini machine’s do. Today’s computers are miniscule in size in comparison to that of their ancestors and have the capability of far more computing power. As technology has evolved, the computer has taken the shape of laptops, music players, gaming systems and automobiles; each of these tangible items relies on some sort...

Words: 1713 - Pages: 7

Free Essay

History of Digital Crimes and Digital Terrorism and Their Common Current Forms

...History of Digital Crimes and Digital Terrorism and Their Common Current Forms Stephanie Fisk Strayer Universality CIS 170 Professor CIANCIOTTA Dec. 12th, 2013 Introduction Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) defines cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as internet chat rooms, emails, notice boards, groups, and mobile phone. Such crimes may threaten a nation’s security and financial health. Problems surrounding these types of crimes have become high profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. The international legal system is......

Words: 2411 - Pages: 10

Premium Essay

Digital Photography

...Module 1: Digital Photography Critical Analysis Digital Photography 1. Introduction A sailor planting a wet one on a nurse, Man walking on the moon, a student standing up to a line of tanks, and the horrifying moment a plane crashed into a skyscraper. Figure 1 –"V-J Day, Times Square, 1945", a.k.a. "The Kiss" “Man on the Moon, Apollo 11, 1969” "Tiananmen Square, China, 1989" “9/11 Attacks, New York City, 2001” All of these iconic images from history would be nothing but memories without the invention of photography. The power of photography has allowed us to see distant places, events before our lifetime, people from foreign lands and tragedies including war; all through the view of a lens. In just under 200 years, photography has transformed the world we live in enabling us to see not only beyond the boundaries of time and location but also beyond the range of human vision through macro, infrared and high-speed photography. Figure 2 – High Speed Photography, Bullet shot through an apple   1   Module 1: Digital Photography Critical Analysis Photography has changed a lot since its inception, what once was a painstakingly slow process involving specialized equipment and chemicals has become a revolutionary digital medium accessible by virtually anyone. 2. A Brief History of Cameras While the founding ideas behind what would become photography date back as far as the ancient Romans, the real history of cameras starts in the 17th century.......

Words: 2916 - Pages: 12

Free Essay


...biggest way of communication to the public. So here are my ways to help improve the nine elements of digital citizenship. Digital access is for people that have devices that they work on for participation in society. So one way to help improve this new generations access, is to give them either a computer or tablet. But, there should be qualifications for low-income families that cant afford it but also limited one per household. This could be done the same way the Obama phones are work. The problem with buying and selling goods through an electronic source is that you never meet or know whom your actually talking business with. Therefore you should have some way to contact that person directly without going through others. Exchanging information with anyone through a device is only going to improve for our futures. One way I can see improvements is by seeing and monitoring those such as criminals, and warn those who they are talking to. Therefore they are alerted of their situations and then they can decide what their options are. One way to improve digital immigrants is by hosting live sessions that are free in local libraries on Digital Literacy. This will help bring some communities together to learn and understand the digital aspect of our world today. This will also give the people a resource that is dependable in answering technology questions. Digital etiquette should be in school classes to help people understand the proper way to use......

Words: 553 - Pages: 3

Premium Essay

Digital Divide

...The author of “digital natives, digital immigrants” Mark Prensky, is a writer, consultant and inventor in the areas of education and learning. We should listen to him because of all the above information and he has a masters degree from Yale, Middle bury and Harvard business school. In his story he argues that this generation isn’t capable of learning the traditional way, and we need a know technological way to learn. The author of “the internet” Steve Johnson has wrote and edited many books. He is a respected writer in the residence at the New York University department of journalism. He has published in the New York times, the Wall street Journal and many other periodicals. In his story he argues that the internet has come a log way from what it was intended to. He argues pro technology because according to him internet has helped us out a lot. The author Maryanne wolf who wrote learning to think in a new world is a professor in the Eliot-Pearson department of child development at tufts university. Her accolades are: distinguished teacher of the year award, and the teaching excellence award. In her story she argues that those growing up in the digital world don’t read and think about text like they should. In other words they don’t think critically any more. The author of “learning theory video games and popular culture ”James Gee is the presidential professor of literary studies at Arizona state university. In her story she argues pro technology. She says that......

Words: 1299 - Pages: 6

Free Essay

Digital Forensic

... * | | | Critical Analysis and case reconstruction | | * | | Legal discussion/ implications | | | * | 2.0 Executive Summary According to the scenario that been provided, an investigation were brought on Mr. James, the manager of the Financial Accounting Department of the MATM organisation. There were total 3 investigator that were in charge of this investigation. Inspector Thor Lih Yin will be involving in gathering all of the possible evidence preserve it and bring forward to the evidence analyst. Hon Hao Kong is the Senior Forensic analyst and meanwhile Yuvaraj is the forensic case Legal consultant. With the combination of the 3 parties, the suspect, Mr. James will be investigated by collecting his personal digital evidences to prove that he is illegally using the MATM company assets to commit crime for his personal benefits. 3.0 Case Detail and Assumptions Mr James were the person who involved in the crime that happened. He is a very rich guy and active man inside the company. He is holding the position of Manager Secretary of the accounting department and he is in charge of bank in monthly salaries to all the staffs inside the organisation. Meanwhile, he has a wife name Mary. She is working as a Secretary Manager inside the Bank West in Australia. Mary is a very kind and friendly woman who always obey to her husband. They were staying in a rented room as they were just moved to Australia and haven’t brought a house yet. FIFA World Cup......

Words: 11150 - Pages: 45

Premium Essay

Digital Divide

...Into the Great Divide The digital divide can be understood as inequalities in four successive types of access: motivation, physical access, digital skills and different usage. It is claimed that the divide has shifted from the first to the last-called types of access in the last ten years. For the purpose of this paper I will touch base on all types of access. Disadvantages Amongst Man Contemporary research of the digital divide and digital skills is marked by a descriptive nature. Inequalities are described using simple demographics of individuals who have more or less access to computers and the Internet and a different level of digital skills. The explanation of these differences has far less attention. One of the reasons for this state of affairs is the predominance of individualistic notions of inequality. Like most social scientific and economic investigations, digital divide research works on the basis of so-called methodological individualism (Wellman & Berkowitz, 1988). Differential access to information and computer technologies (ICTs) is related to individuals and their characteristics: level of income and education, employment, age, sex, and ethnicity, to mention the most important ones. This is the usual approach in survey research, which measures the properties of individual respondents. Making multivariate analyses of several individual properties and aggregating them to produce properties of collectivities, one hopes to find background explanations. This...

Words: 2142 - Pages: 9

Premium Essay

Digital Life

...YourFirstName YourLastName Instructor's Name Course Title 30 November 2013 Digital Life The Impact of Digital Life to Human Social and Cognitive Processes People in the current society are more connected to each other than any other time in human history, thanks to digital technology. But people are equally more distant from each other and lonely in their detached lives.  The result is a strain on personal and social relations as well as thinking.  To some people, digital media is their life and it directs every aspects of their living. While digital technology was intended to bring people closer, it has only served to push them further apart. And as it was intended to enhance knowledge, it has highly diminished the quality and nature of our thinking. In reality, it is constricting rather than expanding the horizon for human nature in social and cognitive processing.  Digital media has changed how people think about themselves, relationships, and the sense of being human. Virtual interactions may make people feel good and secure but it leaves them diminished in a human sense. According to Turkle (11), it has eroded the ability of people to live comfortably offline. People feel out of place during face-to face interactions and there is a great sense of loss when one loses their phones or computer. Relationships between parents, friends, siblings and the community have significantly changed.  People deal with members of their immediate family in the same way......

Words: 1492 - Pages: 6

Free Essay

Digital Immigrants

...Marc Prensky Digital Natives Digital Immigrants ©2001 Marc Prensky _____________________________________________________________________________ Digital Natives, Digital Immigrants By Marc Prensky From On the Horizon (NCB University Press, Vol. 9 No. 5, October 2001) © 2001 Marc Prensky It is amazing to me how in all the hoopla and debate these days about the decline of education in the US we ignore the most fundamental of its causes. Our students have changed radically. Today’s students are no longer the people our educational system was designed to teach. Today’s students have not just changed incrementally from those of the past, nor simply changed their slang, clothes, body adornments, or styles, as has happened between generations previously. A really big discontinuity has taken place. One might even call it a “singularity” – an event which changes things so fundamentally that there is absolutely no going back. This so-called “singularity” is the arrival and rapid dissemination of digital technology in the last decades of the 20th century. Today’s students – K through college – represent the first generations to grow up with this new technology. They have spent their entire lives surrounded by and using computers, videogames, digital music players, video cams, cell phones, and all the other toys and tools of the digital age. Today’s average college grads have spent less than 5,000 hours of their lives reading, but over 10,000 hours playing video games (not to......

Words: 6779 - Pages: 28

Premium Essay

Digital Inc

...DIGITAL POINT INC : FRAUD CASE STUDY Digital Point, Inc. (DPI) is an international chain of stores specializing in renting copies of movies and video games to retail customers. DPI also sells new and used copies of these products, and offers “memberships” entitling members to unlimited use of DVDs or video games for one year (one DVD or game at a time). With over 7,000 stores worldwide (approximately 5,000 in the U.S. and 2,000 in 23 other countries), DPI is among the top two or three companies in the industry. Founded twenty years ago, it has been an audit client of your CPA firm for the past three years. For several years, the traditional movie and video game rental industry has been saturated, and recently has been declining by an average of 4% per year as measured by industry gross margins and by 6% per year as measured by industry profits. Lately, companies in the movie rental industry have been facing stiff competition on a number of fronts. First, competing companies such as Netflix offer internet-based subscription services, taking business away from traditional stores like DPI and forcing them to discontinue charging late fees to customers, a significant source of revenues. Second, companies such as Wal-Mart, Circuit City and Best Buy have been selling new copies of both newly-released and classic DVDs at rock-bottom prices, sometimes even at a loss, also taking business away from traditional stores like DPI. Finally, many customers have turned to......

Words: 1061 - Pages: 5

Premium Essay

Digital Divide mobility, or other benefits that help improve overall life. This is not just a problem for those that aren’t as privileged, but for everyone whether they are connected or not. The input, opinions, and contributions from those who are not connected cannot be made to help better the world community until they are connected. It is crucial the digital divide that separates the fortunate and unfortunate is bridged for it is consistently widening. This research paper defines and examines simple problems with the digital divide, highlights the efforts that have been made to bridge the divide, and brings attention to the significance of bettering the gap between socioeconomic countries. According to Brooks, Donovan and Rumble (2005), the digital divide can be described in two ways, (1) the existing gap between countries that have sufficient access to electronic information and those that do not, and (2) the difference in Internet literacy between developed and undeveloped countries (p. 271). This gap causes a digital disparity and can grow or shrink depending upon the country’s growth. Unwin and de Bastion (2009) discuss how the digital divide can be constructed through main structural factors like connection, access, literacy, content and information, and networks and communications. In other words is the correct infrastructure that can enable the use of Information and Communication Technologies (ICTs) available and how accessible are these technologies when comparing those......

Words: 1832 - Pages: 8

Free Essay

The Digital Divide

...INTRODUCTION: Digital divide is a term used to describe the inequality between technology haves and have nots. Sometimes, this can refer to the gaps between first world and third world countries, other times it's used to refer to differences among various population groups within an industrialized country (such as the United States). The technology being measured has been a moving target. Early news articles talked about general computer penetration among households. Then, as the Internet became more predominant, Internet access by individuals became the measure. Now, with free Internet access available through most public libraries, experts discuss the quality of access and usage. Even the term "digital divide" is controversial. "Digital" focuses attention on technology over other factors. "Divide" implies a distinct split. My opening sentence referred to haves and have nots, but can everyone really be separated into one group or the other, or is the difference more graduated?. BODY: Do you think that the digital divide is a major problem inside the United States: Why or why not? YES Digital Divide in the U.S. The Digital Divide is the gap between those who have the skills, access and resources for technology and those who do not. This divide is based on factors such as race and class. In order to have access to the Internet one must have the resource to own a computer and pay for Internet connection. Though comparatively inexpensive in the United States, the cost...

Words: 1549 - Pages: 7

Free Essay

Digital Transformation

...Digital transformation [pic] Summer 2008: Dramatic developments in digital technologies and the diffusion of the Internet protocol as an open and efficient communication standard are wiping out the specialized symbiotic link between content and technology. That’s how Gianvito Lanzolla and Jamie Anderson see the digital world, and here they reveal three trends that companies need to prepare for. Comments In the past, media and technology industries operated through specialized value chains with clearly defined boundaries. Mobile phones were used to make simple voice calls, Walkmans were used to play cassette tapes, and computers existed mainly to crunch data. But new technologies have made it possible to convert different kinds of content – a radio programme, a book, a magazine, a song, a phone call – into digital data; in digital terms, there is little difference between them. At the same time, the Internet and other communication networks based on Internet protocol have made it possible to distribute this digitized content in costeffective and ubiquitous ways. The extent and nature of these changes and their consequent strategic implications remain substantially misunderstood. While some studies have been made, they have mainly had an industry-specific focus, with the consequent limitation of overlooking the systemic effect of ongoing transformations. In order to address this limitation, we researched current transformations in media, telecommunications and......

Words: 6419 - Pages: 26

Free Essay

Digital Marketing

...use this facility any time. As security issue pays major importance today, extra attention towards security is done in Shop online application. We incorporate digital signature technique to ensure much effective security for the customer. Digital signature will provide the secure data transactions and also during money transaction for purchase. 4 2.3 DIGITAL SIGNATURE A digital signature is a type of asymmetric cryptography used to simulate the security properties of a handwritten signature on paper. Digital signature schemes consist of at least three algorithms: a key generation algorithm, a signature algorithm, and a verification algorithm. A signature provides authentication of a "message". Messages may be anything, from electronic mail to a contract, or even a message sent in a more complicated cryptographic protocol. Digital signatures are often used to implement electronic signatures, a broader term that refers to any electronic data that carries the intent of a signature, but not all electronic signatures use digital signatures. In some countries, including the and in the electronic signatures have legal significance. However, laws concerning electronic signatures do not always make clear their applicability towards cryptographic digital signatures, leaving their legal importance somewhat unspecified. A digital signature scheme typically consists of three algorithms: y A key generation algorithm that selects a private key uniformly at random from a set of......

Words: 4558 - Pages: 19

Premium Essay

The Digital Age

...The Digital World The digital world of today can be understood as a product of late-Victorian construction of the machinery of information organization combined with Modernist visual forms. In his doctoral dissertation, The Engineering of Vision from Constructivism to Computers, Lev Manovich, professor of New Media at the University of San Diego, states it is the influence of Modernist visual forms, mainly Soviet era Constructivism, that shapes the look of the current digital world (e.g. the Internet). Professor Simon Cook of Duke University, in his recent paper, Late Victorian Visual Reasoning and a Modern History of Vision, argues that Manovich overlooks the importance of the Victorian period in influencing the aesthetics of our present digital design. Cook bases his argument on the concept of an orderly and well-catalogued Internet, as if the system had been developed in nineteenth century Britain. However, due to the chaotic, disorganized and ever-changing look of the digital world, the argument of a Victorian based system is flawed. The late nineteenth century does not have the impact Cook believes it does, whereas Manovich remains on track in his original argument. Still, Manovich’s ideas can only be regarded on a temporary basis, because the face of the digital world has changed drastically since its development, and will continue to in the near future. Before exploring the look of the current digital world, it is first important to look at its physical......

Words: 2335 - Pages: 10