How Will The US Congress Decide To Regulate Facebook?

The last couple of weeks must have been hectic for Facebook CEO Mark Zuckerberg. We could talk about the 6+ hours blackout that we all experienced on Facebook and its related social media platform. However, there’s a more critical issue at hand for Facebook, and it involves the US Congress. 

This is the whistle-blowing by Frances Haugen, a former employee at Facebook, who showed the US lawmakers some internal documents to prove how Facebook negatively affects children. The platform is well aware of it. She also urged that the US Senate make regulatory changes to demand more accountability from Mark Zuckerberg and address the misinformation that Facebook’s algorithm promotes. 

In reality, discussions about regulatory changes for social media platforms, including Facebook, are not new. The new education that the senators got from Frances’ whistle-blowing indictment of Facebook and the unified commitment of the members of the US Congress to take any action is the new deal. 

For Facebook users, it is common knowledge that you are responsible for the pages you follow, groups you join, and the people you are friends with. However, you don’t determine which posts you see on your feed and those you don’t see. That’s entirely up to Facebook and, from Frances Haugen's testimony, that’s where the problem lies. 

There’s a software making that decision for every user following a secret formula by Facebook, which includes over 10,000 factors. This software is called “the algorithm.” Facebook’s news feed algorithm is extremely powerful, given that the platform has close to 3 billion users, and it determines what each person sees on the platform. This means that it has a high influence over people’s lives, more than any media mogul or government. 

The Facebook algorithm is that powerful guy who handpicks what comes on your feed. It may decide to show you a post about your friend’s wedding but may not show you a post from your high school days discussing science facts. 

The goal of the algorithm is to get your attention. So, you best believe that if your old schoolmate was making posts and memes demonizing other people that you don’t like, or they are posting some interesting conspiracy theories, then you are going to see that post come up on your news feed. Not when they are out for dinner or discussing boring science facts. And this is a significant point that critics of the platform agree to. Now it is backed by Frances’ testimony. 

Like with other social platforms like youtube, TikTok, Twitter, and Instagram, the Facebook algorithm is highly attention-seeking and personalized for individuals. This is something that Frances Haugen pointed to as the core of the threat social media is posing to society today. 

According to Haugen, a significant consequence of the way Facebook picks out content is that the algorithm is optimized to show content with a high level of reaction and engagement from people. However, its research into the post indicates that it contains polarizing, divisive, or hateful content. So why is it showing such content to more people, considering that people can be more easily inspired to anger than other emotions?

There was a significant backlash against Big Tech before Haugen’s testimony, and her disclosure has increased the urgency about the debate on social media, Facebook mainly, and how to regulate it.

With advocates and lawmakers seeking solutions to the present problem, a new approach has been proposed, which will lead to a massive policy change on Facebook. This new approach is to regulate Facebook’s algorithm itself or do something that makes the company more responsible and accountable for the algorithm’s effect. Whether this can be achieved or not is yet to be seen. Two of the biggest obstacles to this are: the first amendment and the possibility of playing foul on it, and the second one is that it may ruin many people’s love for social media. 

Conclusion 

There’s still a long way to go for the US congress to determine what to do on Facebook regulation, but it will be interesting to see how it unfolds. 

Eliza Sadler is a professional journalist with extensive experience, four years. She also works as a freelancer and writes a lot of articles. She always focused on doing quality work to achieve her goals and objectives. Eliza is fascinated by the ability to create original works that meet high standards. Feel free to connect with her by email.

Washington Post:      New York Times:      

Eliza Sadler is a professional journalist with extensive experience who writes for Best Essays

You Might Also Read: 

Facebook Failed - Can Meta Help It Recover?:

 

« How Does IAM Help In GDPR Compliance?
Wind Turbine Maker Shuts Down Computer Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

NITA Uganda (NITA-U)

NITA Uganda (NITA-U)

NITA-U has put in place the Information security framework to provide Uganda with the necessary process, policies, standards and guideline to help in Information Assurance.

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

Aristi Technologies

Aristi Technologies

Aristi provides cybersecurity risk and compliance services to help manage your unique cyber risks, safeguarding your systems and data and complying with government and industry standards.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.

Upstack

Upstack

UPSTACK - One partner, end-to-end expertise, helping develop the solutions you need – when you need them.

Paperclip

Paperclip

Paperclip provides paperless solutions while enabling compliance and security for the exchange of critical content.

Transatlantic Cyber Security Business Network

Transatlantic Cyber Security Business Network

The Transatlantic Cyber Security Business Network is a coalition of UK and US cyber security companies which facilitates collaboration to help address critical cyber security challenges.

Brunswick Group

Brunswick Group

Brunswick is a critical issues firm. We advise the world’s leading companies on how to navigate the critical issues they face and engage with their critical stakeholders.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.

Linx Security

Linx Security

The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle.

Redapt

Redapt

Redapt is an end-to-end technology solutions provider that brings clarity to a dynamic technical environment.