preview

Filter Bubble Research Paper

Good Essays

When using the internet, people generally get a very personalized experience. Most social media sources and search engines track users’ product usage, and utilize algorithms to give users personalized content. This personalized content, content that the user would wishes to come into contact with, causes the user to use the product more, giving technology companies more money. However, when people only come in contact with content they’d necessarily like,they are not made aware of others’ views and end up being encased in their own filter bubble. The filter bubble causes a harmful effect that stop people from being able to take part in community dialogue.
First, people become trapped in a “filter bubble” because they only come into contact …show more content…

If the filter bubble was a common knowledge issue, I believe that it would be viewed in a similar way of the issues of climate change and obesity. Issues such as climate change and obesity often cause people frustration that the government isn’t doing more to control the choices of industry, and that industry isn’t considering the greater good of communities. However, it would be different than issues such as climate change and obesity in the way that there is less that individuals are able to do to mitigate effects; obesity is within almost complete control of the public if they decided they wanted to control it enough, and there are ways for the public to significantly mitigate climate change, too. Software companies, in contrast, are in almost complete control of the filter bubble, and general citizens aren’t able to mitigate it unless given the correct tools by them. Software companies should renovate their websites based on modernized use of the internet. They should be aware that the internet is used differently now than it used to be, and that more people use it as a means of bridging communication gaps with people that they don’t know. They should find ways to keep people educated about social issues in a well-distributed

Get Access