Skip to main content

Rise of Information Technology: A Fall of Democracy

 

Information Technology has advanced leaps and bounds, to an extent that it has been a part and parcel of day-to-day life. Social media is one of the digital platforms which has seeped into everyone’s life with no exception. Facebook tops among the social media users where 2.85 billion users are active in a month around the globe. There is an upsurge in the breach of user’s personal data harvested through social media platforms in furtherance of political, financial or personal interest. Manipulation of voter’s choices by the political parties as well as external entities is a new trend in democratic countries. 


Democracy –A cladded autocracy! 

Today’s democratic leaders are envisioned to focus on ‘individual utility’ rather than working for the majority. Plato one of the early philosophers opined that those who are good at winning elections are the ones to dominate the democratic institutions and this seems to be true in today’s democracy. The Constitution of democratic countries commences with ‘We the people’ connoting that the nation stands as a collective voice of people, Democracy rests on consent, common will and the participation of the masses and not the pursuance of any discrete interest. Democracy and social media are the new age corollary components to reach people and research highlights that social media has been a tool to strengthen the democratic setup and institution. Arab spring or the so-called ’Facebook Revolution’ is one of the highly impactful incidents that led to constitutional democracy where Facebook was one of the mediums for the revolution. Currently, the intensity of change or impact either positive or negative that a platform on cyberspace can achieve is tremendous. 

The United States of America has always been proactive in defending democracy and as well to instil democracy worldwide. It has indulged in various military interventions and armed conflicts to defend democracy. Such a staunch believer of democracy failed to respect the free will of electoral voters to vote for their choice of candidate by manipulating the voters. 313 million people use the internet in the USA while 240 million of them use Facebook which is more than half of internet users.  Instances highlight that such a humongous platform that reach millions of people was used to mislead and manipulate the users. 


Cambridge Analytica and the massive data breach

Cambridge Analytica is one of the infamous political scandals through ICT which highlights the extent to which social media can be used to manipulate the psychology of humans. The 2016 US presidential election involved a massive data breach of individuals to persuade them to vote for Trump. Cambridge Analytica is responsible for using the data of millions of individuals to manipulate their voting preferences by collecting their personal information through their Facebook accounts.  Data of millions of Facebook users were collected through ‘this is your digital life’ a Facebook app created by Aleksandr Kogan a former lecturer at Cambridge University. The app portrayed to have indulged in academic research which extracted the personal data of the users including their political beliefs, data of their friends, personal likes and list of contacts. The company, according to Alexander Nix former CEO of Cambridge Analytica, had around 5000 data points on each individual along with the commercial details of the users. These data points were used to alter the ads and videos users see on their profile thereby manipulating the voting beliefs. 


Cyberattack – Perils of free internet 

Cambridge Analytica is one such scandal that came to light during the 2016 election to woo voters to vote for a particular national party. On the flip side, there exist other covert cyber operations undermining the citizens and manipulating them to disbelief governmental activities – disinformation war. Digital Astroturf – propaganda against governmental institutions, trojan horse outlets – false information, flooding the zone – with fake accounts, rumours to influence users of social media through trending list are a few such instances of disinformation war. The United States of America is not the only country that has faced online manipulation of voters but countries such as South Africa, Botswana, Malawi, Mozambique too have faced similar ones. A 2019 report on ‘The Social Media Manipulation’ revealed that around 45 democratic countries have used social media to manipulate the voters, there again Facebook remains as a top platform for such manipulation. 80% of total nation-states use bot accounts to further such causes.

The data breach is one of the most common cyberattacks where individuals, businesses and governmental authorities are vulnerable to such attacks. Data breach includes leaked webmail which is a platform for other cyberattacks such as phishing. It is better to realize to secure data now than to repent for the loss that occurred by it. Society today has come a long way in battling autocracy through war and intellectual deliberations. Newer innovation in science and technology, more so, the cyber domain should only lead to a peaceful living than to a hysterical environment.

By: Priyanka Vaidyanath

(Research Scholar, Christ University)



Liking our blogs? Don’t forget to “SUBSCRIBE” us!!

Stay updated with us, please visit: www.worldcybersecurities.com 



Comments

Popular posts from this blog

Dark Web: Safe or unsafe? Truth Revealed!

  The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind.  A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing. It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR. Advantages of Dark Web  Humans are allowed to hold privacy and express their views freely. Privacy is considered to be critical for honest persons through the different criminals and stalkers.  The growing tendency of employers to track

UNESCO Guidelines on Generative AI in Schools

The advent of artificial intelligence has assumed prominence amongst all industries and various facets of people's personal lives. The integration of AI in education has been inevitable, given the significance and role of information, knowledge production and administration in the sector. This is especially so as its capabilities entail replicating higher-order thinking. Besides assisting in the education process, it also brings the element of real-life relevance, allowing education to be imparted against the backdrop of the evolving world due to the same AI. It tends to have implications on the subject matter that needs to be imparted, which tends to be something that constantly needs to answer the question of "Why and how is this particular subject matter relevant for learning?".  This induces policy-makers and educational institutions to rethink what they need to impart as knowledge, the area of matter, and the manner of thinking to be emphasised. This is because educa

Need for Anti-Spam Laws in India: Comparative Analysis

  Introduction Spam is unsolicited, usually commercial messages (such as e-mails, text messages, or internet postings) sent to a large number of recipients or posted in a large number of places. The spamming activity is usually considered to cause a lot of nuisance and mental annoyance. Spamming is carried out with the help of an electronic mechanism to send unsolicited messages and advertisements. It can also be termed “An unsolicited e-mail” from which the sender attempts to gain an advantage. "India is the seventh biggest spammer in the world 7.8 billion spam e-mails sent in past 24 hours". It’s high time that India has to come up with its legislation to curb the activity.  The author will also argue the need for anti-spam legislation in India with a comparative analysis of various other jurisdictions. Why is it a concern? The term spam emerged due to the spread of unsolicited commercial messages in the internet space. The main challenge is that it has varied charact