How Will The US Congress Decide To Regulate Facebook?

The last couple of weeks must have been hectic for Facebook CEO Mark Zuckerberg. We could talk about the 6+ hours blackout that we all experienced on Facebook and its related social media platform. However, there’s a more critical issue at hand for Facebook, and it involves the US Congress. 

This is the whistle-blowing by Frances Haugen, a former employee at Facebook, who showed the US lawmakers some internal documents to prove how Facebook negatively affects children. The platform is well aware of it. She also urged that the US Senate make regulatory changes to demand more accountability from Mark Zuckerberg and address the misinformation that Facebook’s algorithm promotes. 

In reality, discussions about regulatory changes for social media platforms, including Facebook, are not new. The new education that the senators got from Frances’ whistle-blowing indictment of Facebook and the unified commitment of the members of the US Congress to take any action is the new deal. 

For Facebook users, it is common knowledge that you are responsible for the pages you follow, groups you join, and the people you are friends with. However, you don’t determine which posts you see on your feed and those you don’t see. That’s entirely up to Facebook and, from Frances Haugen's testimony, that’s where the problem lies. 

There’s a software making that decision for every user following a secret formula by Facebook, which includes over 10,000 factors. This software is called “the algorithm.” Facebook’s news feed algorithm is extremely powerful, given that the platform has close to 3 billion users, and it determines what each person sees on the platform. This means that it has a high influence over people’s lives, more than any media mogul or government. 

The Facebook algorithm is that powerful guy who handpicks what comes on your feed. It may decide to show you a post about your friend’s wedding but may not show you a post from your high school days discussing science facts. 

The goal of the algorithm is to get your attention. So, you best believe that if your old schoolmate was making posts and memes demonizing other people that you don’t like, or they are posting some interesting conspiracy theories, then you are going to see that post come up on your news feed. Not when they are out for dinner or discussing boring science facts. And this is a significant point that critics of the platform agree to. Now it is backed by Frances’ testimony. 

Like with other social platforms like youtube, TikTok, Twitter, and Instagram, the Facebook algorithm is highly attention-seeking and personalized for individuals. This is something that Frances Haugen pointed to as the core of the threat social media is posing to society today. 

According to Haugen, a significant consequence of the way Facebook picks out content is that the algorithm is optimized to show content with a high level of reaction and engagement from people. However, its research into the post indicates that it contains polarizing, divisive, or hateful content. So why is it showing such content to more people, considering that people can be more easily inspired to anger than other emotions?

There was a significant backlash against Big Tech before Haugen’s testimony, and her disclosure has increased the urgency about the debate on social media, Facebook mainly, and how to regulate it.

With advocates and lawmakers seeking solutions to the present problem, a new approach has been proposed, which will lead to a massive policy change on Facebook. This new approach is to regulate Facebook’s algorithm itself or do something that makes the company more responsible and accountable for the algorithm’s effect. Whether this can be achieved or not is yet to be seen. Two of the biggest obstacles to this are: the first amendment and the possibility of playing foul on it, and the second one is that it may ruin many people’s love for social media. 

Conclusion 

There’s still a long way to go for the US congress to determine what to do on Facebook regulation, but it will be interesting to see how it unfolds. 

Eliza Sadler is a professional journalist with extensive experience, four years. She also works as a freelancer and writes a lot of articles. She always focused on doing quality work to achieve her goals and objectives. Eliza is fascinated by the ability to create original works that meet high standards. Feel free to connect with her by email.

Washington Post:      New York Times:      

Eliza Sadler is a professional journalist with extensive experience who writes for Best Essays

You Might Also Read: 

Facebook Failed - Can Meta Help It Recover?:

 

« How Does IAM Help In GDPR Compliance?
Wind Turbine Maker Shuts Down Computer Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Libraesva

Libraesva

Libraesva specialize in Email Security. From Email Security, Phishing Awareness and Email Archiver. We can assist you with any email issues you may have.

Advanced Resource Managers (ARM)

Advanced Resource Managers (ARM)

ARM provide specialist recruitment services for technology and engineering including cyber security.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

HudsonCyber

HudsonCyber

HudsonCyber, part of HudsonAnalytix, provides leading cyber risk management services for the global maritime transportation industry.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

Sysorex Government Services

Sysorex Government Services

Sysorex Government Services helps customers meet their strategic missions by providing secure, optimized IT solutions that allow them to perform more efficiently and effectively.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

Three Wire Systems

Three Wire Systems

Three Wire is a leader in innovative and efficient technology solutions for government agencies and large enterprise corporations.

eMudhra

eMudhra

eMudhra is a leader in Identity and Transaction Management Solutions.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.