Instagram Data Policy: Content Customization Practices And The Use Of Addiction Loop Model Essay Example

In his book, Ten Arguments for Deleting Your Social Media Accounts Right Now, Jaron Lanier thoroughly discusses the detrimental effects of various social online platforms on human lives. Among them are the promotion of mass behaviors, increased incidence of misinformation and biasing, vanity encouragement, reduction of one’s ability for empathy, and so forth. However, the present paper will focus on the following Lanier’s argument: when using social media websites, “you are losing your free will” (5).

It happens due to personalization of content that starts with the collection of user information and proceeds to the filtering of information with the help of artificial intelligence algorithms. Secondly, social network developers create environments and various stimuli that make users repeatedly come back to their platforms and utilize them more frequently.

In my opinion, Lanier’s concerns regarding the loss of free will on social media are valid and, for this reason, I will aim to provide scholarly evidence and examples from personal experiences to support his stance. The paper will focus on Instagram, its content customization practices, and the use of addiction loop model in order to foster greater website activity.

Nowadays, Instagram is one of the most popular social networking apps that allows sharing photos and videos freely. As stated by Marr, it has a profile of 800 million active monthly users and, every day, people post about 70 million pictures there. It is clear that with such a large user base, Instagram produces and gets access to an enormous pool of data, which is currently and efficiently implemented by marketers and various businesses to research consumer behaviors and promote various products and services.

Nevertheless, while users willingly share photos and videos on their Instagram pages, they may be not entirely aware that the app collects a lot of other types of data about them as well. For instance, according to Instagram data policy, it has access to information about device attributes (namely, operating systems, browsers, and so forth), performed device operations, device identifiers, settings and signals (including GPS and other installed apps) (Instagram Inc.). Moreover, Instagram knows about users’ network and connections and cookie data (Instagram Inc.). It means that by using Instagram, a person provides it with information regarding a full spectrum of their online and offline activities.

An observable objective for attaining which the app utilizes the collected user data is content individualization. As I frequently noticed when browsing my Instagram feed and suggestions, posts presented there include either a new content generated by users whom I liked a relatively short time ago or similar photographs and videos. Additionally, I see posts associated with subjects and themes that I recently browsed elsewhere, for instance, on Google.

As Lanier states, corporations owning online networks implement various algorithms to present individuals with information and advertising messages that they are likely to respond to positively and that corresponds with their current interests (6). Thus, it is clear that the major purpose of content customization is to engage users in social media activity more and the underlying reason for that is an opportunity to generate greater profits by stimulating attention to certain products and services.

One of the major ethical concerns related to content individualization is the creation of so-called filter bubbles. Businesses promote the idea about the benefits of personalization, including the elimination of a need for users to see through irrelevant ads and promotion messages. However, algorithm-induced filter bubbles significantly decrease the variety of information to which a user may be exposed. According to Tamturk, even if brands, marketers, and social media corporations do not have a deliberate intention to strictly control one’s exposure to promotional content, the described phenomenon provokes a risk of narrowing people’s minds.

In other words, in filter bubbles, individuals are easily presented with almost all the information they may need at the moment. They naturally become readily attracted to the presented content and, as a result, the necessity for exploring something different and new diminishes.

Another significant ethical concern related to both content personalization and user engagement through social valuation is addiction development. Lanier discusses this problem in depth in his book and notes that the implementation of a social-validation feedback loop is a method for exploiting psychological vulnerabilities inherent in all humans (8). When a person receives a like or reads a positive comment under his or her photograph on Instagram, the brain starts producing dopamine.

After a few repetitions of such a stimulus-effect mechanism, that person is likely to start craving favorable emotions linked to social feedback on social media. As a consequence, the user commences posting more, which indicates the development of a new automatic behavior or a habit (Lainer 11). The carrot-and-stick approach is a common motivational method yet since the strategy utilized by the social media creators involves psychological and even chemical processes similar to those that can be observed in substance abusers, we may talk about social media addiction.

Like the majority of other users, I show some symptoms of the adverse condition described above. In total, I may spend about an hour or slightly more on Instagram each day and I go online at random time. I frequently check my page and feed in order to distract myself from some serious work and usually quit after five-fifteen minutes of surfing. Nevertheless, whenever I go online during spare time, I sometimes tend to scroll through content for a longer time (sometimes for about an hour).

Moreover, the frequency of visiting also always increases within a few days after posting something new as I expect to see comments and respond to them. I do communicate via Instagram yet the main interest for using it is the access to photos and other visual materials created by talented artists although a larger portion of the content I see there does not hit the mark.

In this way, I can say that the trigger of my habit of Instagram visiting is either boredom or a necessity for relaxation, entertainment, and satisfaction of esthetic needs. Additionally, the habit of posting is triggered mainly by the need for appreciation and socialization. At the same time, an expected reward of engaging in both of the routines – posting and just visiting – is a sense of psychological and emotional comfort, as well as a chance to have a short distraction. Therefore, it is valid to conclude in regards of the theme of the present paper that social media manipulates my behaviors, firstly, by providing an opportunity for psychological relief and, secondly, by creating a sense of interconnectedness with people whom I know and whom I am interested in.

While these manipulations may seem innocent at first sight, excessive indulgence in social media use may have detrimental effects on productivity and self-esteem. It is also evident that without a more critical evaluation of content one is presented with on Instagram, a person may face the risk of forming a limited, biased, and mainstreamed picture of the world and lose their individuality by complying with accepted norms of representing themselves and their experiences on social media. Thus, some behavioral changes and critical assessment of one’s motivations and activities on Instagram are essential.

In my case, the best possible behavioral modification is the substitution of social media surfing by other activities that could fulfill my needs for brief relaxation, esthetic pleasure, socialization, and psychological comfort. For instance, instead of searching through random pictures in the app, I could read books on art and learn about the subject through many other online and offline media. I could communicate with close friends and relatives more instead of posting a photo and waiting for appreciation of those whom I do not know very well. Lastly, in order to distract myself from work or studying, I could try some relaxation techniques, such as mediation, or even do some physical exercises that can help reduce excess stress and give energy for continuing any important endeavor.

Overall, social media have their own culture that imposes its values on users and significantly influences their behaviors. Unfortunately, such platforms as Instagram induce the creation of multiple bad habits and can have negative effects on personal development. While it is possible to reduce the risks associated with filter bubbles by revoking the use of personalization algorithms and limiting the companies’ access to users’ personal data, there is a small chance that people will use social media less in case the social-validation system would be canceled as well. People will still continue using Instagram for socialization and entertainment.

However, the enhancement in content quality would make some difference. Instead of encouraging the posting of selfies and unnecessary pictures of random things from daily life, users could be stimulated to share some educational, artistic, and other types of content with similar functions and purposes in order to increase the value of social media as such and make their use more meaningful.

Works Cited

Instagram Inc. “Data Policy.” Instagram, 2019. Web.

Lanier, Jaron. Ten Arguments for Deleting Your Social Media Accounts Right Now. Picador, 2018.

Marr, Bernard. “The Amazing Ways Instagram Uses Big Data and Artificial Intelligence.Forbes. 2018.

Tamturk, Venus. “What If Personalization Traps Us into a ‘Filter Bubble’?CMSC Media. 2018.

Business And Information Technology Strategies Alignment

Prompt Answers

How can Cheryl Smith help managers at WestJet better understand the role of information technology in corporate strategy?

As a newly appointed Chief Information Officer, one of Cheryl’s duties involves helping managers understand the role of information technology in corporate strategy. Namely, she should explain the interconnectedness between IT, customer satisfaction, revenues, response-times, and decision-making (Andriole, 2012). In the world of aggressive competition, the speed and efficiency of information transactions define the leaders of the industry. WestJet managed to get ahead of its competition by implementing IT before anyone else. To maintain a competitive advantage, it is necessary to reorganize the IT department, so that it could face new challenges and work on new projects.

How might WestJet’s experience influence the way your organization aligns its IT and business strategies?

Modern air companies are required to have dedicated IT departments run by a CIO. It has historically proven to be the most efficient manner of organizing labor in the IT industry. Although WestJet was one of the first companies to pioneer the extensive use of IT in airline industries, their organization remained unchanged since. The lack of change and the inability to adapt was the reason why WestJet’s IT department struggled when it was necessary to integrate its systems with other companies’ ticketing and billing services (Munro & Khan, 2013). The situation changed only with the arrival of Cheryl Smith and radical reformations that took place after. From this case study, I have learned that any organization needs to have a clear understanding of what its departments do, have a stable planning and budgeting structure, and strict adherence to corporate strategies and goals.

Based on an Internet or Walden Library search, describe the best tools and techniques organizations can use to align IT strategy with business strategy. What alternatives do organizations have to ensure their IT and business strategies are in alignment?

To align IT strategy with business strategy, a company must clearly understand the need for IT and its place in the corporate structure. Otherwise, WestJet’s story is likely to repeat itself, as managers and executives will understand the purposes of their own IT department, whereas the IT would work utilizing a reactionary approach in dealing with any potential issues. This strategy does not facilitate growth. To determine the company’s business strategy and the place of IT in it, it is possible to utilize SWOT and PESTEL analyses. These techniques highlight strengths and weaknesses of a company in the industry, thus enabling the use of IT to make up for them. Alternative techniques include Porter’s Five Forces and the ADL Matrix (Munro & Khan, 2013).

What risks does the organization take if it does not invest in the resources necessary for maintaining alignment between IT and business strategy?

Modern corporations are required to invest in their IT departments, as the potential consequences of falling behind are very severe. Some of the potential consequences of a faulty IT department are as follows (Sabegh & Motlagh, 2012):

  • The gradual loss of competitive advantage.
  • The slower pace of adoption of new technologies.
  • Loss of customers and market share due to technologically inadequate services.
  • Lack of productivity in the IT department can lead to a loss of time, money, and resources.

Therefore, it is necessary to invest in IT and ensure that the company’s technological department remains in-line with the established corporate goals.

Offer additional practices or tools organizations could use in aligning IT strategy and business strategy. Explain why those are important and effective. What specific steps does an organization need to take to make sure it continuously monitors how well these strategies align?

The Value Net Model is a more complex system when compared to easy-to-understand SWOT or PESTEL, but are effective at aligning IT and business strategies. In the scope of this strategy, it is necessary to conduct a high-level assessment to identify the weak points and challenges in the company’s current operations. Then, a model is developed to target these weaknesses, correcting them, and providing a strategic IT approach. This includes identifying the governing bodies within the organization, redefining organizational structure and processes to help support the new model, and conducting evaluations to determine whether the existing staff can fit the newly defined IT roles or not (Sabegh & Motlagh, 2012).

References

Andriole, S. J. (2012). Managing technology in a 2.0 world. IT Professional, 14(1), 50-57.

Munro, M., & Khan, S. (2013). WestJet Airlines: Information technology governance and corporate strategy. Web.

Sabegh, J., Ali, M., & Motlagh, S. M. (2012). The role and relevance of IT governance and IT capability in business – IT alignment in medium and large companies. Business & Management Review, 2(6), 16-23.

RFID And Barcodes Comparison

The use of barcodes has become an indispensable part of the business world. Barcodes were developed and first used in the 1970s, and since then they have been widely used worldwide (Roberti, 2017). As for the RFID technology, it has been in place for 15 years, and only 5% of organizations use them. Nevertheless, those who utilize these technologies are likely to use them effectively in the future (Swedberg, 2017). According to a recent study, companies choose RFID technology, as well as barcodes system, as these tools translate into a more efficient inventory management and overall supply chain management. Both technologies have a tag and a reader. They also have a similar function as they enable companies to track various items.

Nevertheless, these two systems have quite significant differences. One of the major difference is mobility. Barcodes have to be right in front of the reader to be properly read while RFID technology enables people to use the reader as far as several feet from the tag. Moreover, barcodes can be processed one after another. However, RFID readers can process several items simultaneously, which significantly increases their efficiency. Besides, the amount of data available also differs. RFID technologies are more efficient in this respect as the system can process different types of data. Any details that are valuable for the process can be included, for example, item’s name, location, shelf life, temperature, number of changes or repairs, and so on. This feature makes RFID technologies applicable in the sphere of safety and maintenance. The use of RFID can be beneficial when handling hazardous materials or high-value products as people can monitor the conditions as well as a particular location of their items. The latest RFID systems have readers that are compatible with certain smartphones.

Furthermore, the types of tags also differ in these two inventory tracking systems. Barcodes can be adjusted as tags or can be print directly on plastic or paper products or package. RFID codes are adjusted through chips, but the most recent devices can be chipless as they can reflect radio waves beamed by certain liquids (Swedberg, 2017). Importantly, RFID chips are reusable as it is possible to re-program them.

However, one of the most significant differences between the two systems making it less attractive to companies is their price. The use of barcodes is affordable as compared to RFID technologies. Nevertheless, the functions and capabilities offered by the two methods are also very different. Therefore, more and more organizations choose the RFID technology to make their supply chain management more effective (Swedberg, 2017). This is specifically true for organizations that have to handle large inventories.

In conclusion, it is possible to note that companies should choose between the use of barcodes or RFID focusing on the size of their inventory, the nature of processes managed, as well as resources available. Barcodes can be regarded as a common tool that can still be applicable in many settings. The affordability of this technology is one of the major factors contributing to its popularity. However, companies that have large inventories or high-value products should consider using RFID as this technology ensures the necessary control over items’ location and conditions. However, there are chances that RFID systems will gradually replace the barcode technology as people need to process larger amounts of data.

References

Roberti, M. (2017). When RFID becomes obsolete. RFID Journal. Web.

Swedberg, C. (2017). More than 60 percent of manufacturers to use RTLS, RFID or bar-code tracking by 2022, says Zebra Technologies. RFID Journal. Web.