Advances in Social Behavior Research

Advances in Social Behavior Research

Vol. 2, 03 March 2023

Open Access | Article

Social Media Technologies: An Important Factor of the Loss of Critical Thinking Ability

Zi Lin * 1
1 Durham university the Palatine center Stockton road, Durham, the UK,DH1 3LE

* Author to whom correspondence should be addressed.

Advances in Social Behavior Research, Vol. 2, 361-367 Advances in Social Behavior Research,
Published 03 March 2023. © 2023 The Author(s). Published by EWA Publishing
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Citation Zi Lin. Social Media Technologies: An Important Factor of the Loss of Critical Thinking Ability. LNEP (2023) Vol. 2: 361-367. DOI: 10.54254/2753-7048/2/2022491.


Nowadays, information leakage and disinformation have become a hot research topic. Behind this, the influence of online technologies such as algorithms and data push can not be ignored. This article argues that technologies used on social media platforms help to create an invisible and dangerous system, in which digital surveillance and digital manipulation take place, and gradually numb individuals and deprive them of their critical ability. Many related theorists, including Foucault and Frankfurt School scholars, have studied how people are controlled and disciplined in spaces of public interactions, thus lose their critical ability. This paper uses theories provided by Foucault and Frankfurt School scholars to study the technologies uses on social media platforms that needs further examination.


Foucault, Frankfurt school, social media technologies, loss of critical ability, advertisements., propaganda, big data


1. World Bank Open Data.,(2016). Retrieved March 28, 2021, from

2. Woolley, S. and Howard, P., (2018). Computational propaganda. 1st ed. Oxford: Oxford university press.

3. Molok, N., Ahmad, A. and Chang, S., (2018). A case analysis of securing organisations against information leakage through online social networking. International Journal of Information Management, 43, pp.351-356.

4. Lomas, N. ,(2019). Voter manipulation on social media now a global problem, report finds. Retrieved March 23, 2021, from

5. [Foucault, M., (1995). Discipline and punish. 2nd ed. New York: vintage books.

6. Foucault, M. and Gordon, C., (1980). Power/knowledge. New York: Pantheon Books.

7. Sunstein, C., (2008). Infotopia. Oxford: Oxford University Press.

8. Unver, A. ,(2018). Politics of Digital Surveillance, National Security and Privacy ,Retrieved March 23, 2021, from

9. Ensafi, R., (2015). Analyzing the Great Firewall of China Over Space and Time. Proceedings on Privacy Enhancing Technologies, 2015(1), pp.61-76.

10. Marcuse, H. (2002). One-dimensional man. London: Routledge.

11. Gounari, P., (2022). "One Dimensional Social Media: The Discourse of Authoritarianism and the Authoritarianism of Discourse" by Panayota Gounari. [online] Available at: <> [Accessed 23 May 2022].

12. Guilbeault, D., (2022). Digital marketing in the disinformation age. [online] Jstor. Available at: <> [Accessed 23 May 2022].

13. Ajana, B., (2017). Digital health and the biopolitics of the Quantified Self. DIGITAL HEALTH, 3, p.205520761668950.

14. Dave, A., Chremos, I. and Malikopoulos, A.,( 2022). Social Media and Misleading Information in a Democracy: A Mechanism Design Approach. IEEE Transactions on Automatic Control, 67(5), pp.2633-2639.

15. Adorno, T. and Bernstein,J. ,(2006). The Culture Industry: selected essays on mass culture. London: Routledge.

16. Swingewood, A., (1977). The myth of mass culture. [London]: [The Macmillan Press].

17. Zhurzhenko, T., (2021). Fighting Empire, Weaponising Culture: The Conflict with Russia and the Restrictions on Russian Mass Culture in Post-Maidan Ukraine. Europe-Asia Studies, 73(8), pp.1441-1466.

18. Zannettou, S., (2020). Characterizing the use of images in state-sponsored information warfare operations by russian trolls on twitter. [online] AAAI Conference. Available at: <> [Accessed 23 May 2022].

19. Jamieson., K., (2020). Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don't, Can't, and Do Know. Oxford: Oxford university press.

20. Baudrillard, J. ,(2017) ,The consumer society: myths and structures. London: Sage.

21. Baudrillard, J., &amp; Benedict, J. ,(2020). The system of objects. London: Verso.

22. Holt, D. B., &amp; Cameron, D. (,2012). Cultural strategy: using innovative ideologies to build breakthrough brands. Oxford: Oxford University Press.

23. O’Connell, M., (2021). Browsing the virtual boutique with Baudrillard: The new realities of online, device-based, luxury fashion design and consumption. Journal of Design, Business &amp; Society, 7(1), pp.11-27.

24. Chang, Y., Yu, H. and Lu, H.,(201)5. Persuasive messages, popularity cohesion, and message diffusion in social media marketing. Journal of Business Research, 68(4), pp.777-782.

25. Cadwalladr, C.,(2022). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. [online] the Guardian. Available at: <> [Accessed 23 May 2022].

Data Availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Authors who publish this journal agree to the following terms:

1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.

2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.

3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open Access Instruction).

Copyright © 2023 EWA Publishing. Unless Otherwise Stated