Social Media and Radicalization — Prelims Questions
Which of the following provisions of the Information Technology Act, 2000, empowers the Central Government to block public access to information through any computer resource in the interest of national security?
Consider the following statements regarding the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021: 1. They mandate social media intermediaries to remove unlawful content within 36 hours of notification. 2. They require significant social media intermediaries to enable the identification of the first originator of a message. 3. They apply only to social media platforms and not to digital news media. Which of the statements given above is/are correct?
Which of the following psychological mechanisms is most directly exploited by social media algorithms to accelerate radicalization by creating 'filter bubbles'?
Which of the following is NOT a primary challenge posed by end-to-end encryption in combating social media radicalization?
The 'Radicalization Funnel Model' developed by Vyyuha, linking psychological vulnerabilities with technological design, primarily aims to illustrate: