[go: up one dir, main page]

0% found this document useful (0 votes)
10 views10 pages

IT and Environment Module 3

The document discusses the evolution of Information Technology (IT) and its impact on society, highlighting the digital divide and the importance of cyber ethics. It addresses various issues related to IT, including security threats, software piracy, and the health implications of prolonged computer use. Additionally, it emphasizes the need for responsible internet behavior and proper ergonomics to prevent injuries associated with technology use.

Uploaded by

anulakshmivs5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views10 pages

IT and Environment Module 3

The document discusses the evolution of Information Technology (IT) and its impact on society, highlighting the digital divide and the importance of cyber ethics. It addresses various issues related to IT, including security threats, software piracy, and the health implications of prolonged computer use. Additionally, it emphasizes the need for responsible internet behavior and proper ergonomics to prevent injuries associated with technology use.

Uploaded by

anulakshmivs5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Module III distinguished from economic issues; however,

IT and Society some issues (such as immigration) have both


As we are aware of Information Technology social and economic aspects. There are also
had its modern existence from late sixties of issues that don't fall into either category, such
the last century when the Arpanet was as warfare.
introduced, funded by the department of
defence of USA. After that the IT industry has Digital Divide
come a long way to its current shape where it A digital divide is any uneven distribution in
is playing a very dominant role in our every the access to, use of, or impact of Information
sphere of life. It has made revolutionary and Communication Technologies (ICT)
changes in information gathering and between any number of distinct groups. These
dissemination as well as in global groups may be defined based on social,
communication. geographical, or geopolitical criteria, or
otherwise.
It is creating a virtually paperless work
environment. Also we can now send a message The term digital divide describes a gap in
very easily to anywhere in the world in terms of access to and usage of information
seconds. From education point of view we can and communication technology. It was
have a virtual class where the instructor could traditionally considered to be a question of
sit in any part of the world and his students having or not having access, but with a global
scattered in all different parts of the world mobile phone penetration of over 95%, it is
through video conference with presentation of becoming a relative inequality between those
study materials as well as question and answer who have more and less bandwidth and more
sessions. or fewer skills.

A doctor now sitting in any part of the world The description of conceptualizations of
could perform a surgery where the patient is Digital Divide is as "who, with which
lying in another part of the world. These simple characteristics, connects how to what":
examples show where we stand today  Who is the subject that connects:
compared to what it was half a century back. individuals, organizations, enterprises,
But as we know nothing in this world is purely schools, hospitals, countries, et Cetra.
good as everything has a dark side.  Which characteristics or attributes are
distinguished to describe the divide:
Issues And Concerns income, education, age, geographic
A social issue is a problem that influences location, motivation, reason not to use,
many individuals within a society. A social issue et Cetra.
has many categories in depth as well as light.  How sophisticated is the usage: mere
It's a common problem we see happening in access, retrieval, interactivity, intensive
our society. A social issue can be considered as and extensive in usage, innovative
a problem that influences many people and contributions, et Cetra.
many peoples strive to solve the issue.  To what does the subject connect:
fixed or mobile, Internet or telephone,
It is often the consequence of factors digital TV, broadband, et Cetra.
extending beyond an individual's control, and
is the source of a conflicting opinion on the IT & Development
grounds of what is perceived as morally Computers and information technology are
correct or incorrect personal life or the basic components of the modern economy
Interpersonal social life. Social issues are and everyday life. Software engineers,
developers and programmers are no longer distribute a complex geographical attack
exclusive to the technology companies. called “water holing”. The attackers identify
Developers are at work in practically all areas and infect a cluster of websites they believe
of the economy. Professionals who can work members of the targeted organization will
with programming skill and technical ability visit.
are out there. Mobile Malware – Security experts have seen
risk in mobile device security since the early
The Free Software Movement stages of their connectivity to the Internet. The
The free software movement (FSM) or minimal mobile foul play among the long list
free/open-source software movement of recent attacks has users far less concerned
(FOSSM) or free/libre open-source software than they should be. Considering our culture’s
movement (FLOSSM) is a social movement unbreakable reliance on cell phones and how
with the goal of obtaining and guaranteeing little cybercriminals have targeted them, it
certain freedoms for software users, namely creates a catastrophic threat.
the freedom to run the software, to study and
change the software, and to redistribute Third-party Entry – Cybercriminals prefer the
copies with or without changes. Although path of least resistance. Target is the poster
drawing on traditions and philosophies among child of a major network attack through third-
members of the 1970s hacker culture and party entry points. The global retailer’s HVAC
academia, Richard Stallman formally founded vendor was the unfortunate contractor whose
the movement in 1983 by launching the GNU credentials were stolen and used to steal
Project. Stallman later established the Free financial data sets for 70 million customers.
Software Foundation in 1985 to support the
movement. Neglecting Proper Configuration – Big data
tools come with the ability to be customized
IT Industry: New Opportunities And New to fit an organization’s needs. Companies
Threats continue to neglect the importance of
Modern technology and society’s constant properly configuring security settings. The
connection to the Internet allows more New York Times recently fell victim to a data
creativity in business than ever before – breach as a result of enabling only one of the
including the black market. Cybercriminals are several critical functionalities needed to fully
carefully discovering new ways to tap the most protect the organization’s information4.
sensitive networks in the world. Protecting
business data is a growing challenge but Outdated Security Software – Updating
awareness is the first step. Here are the top 10 security software is a basic technology
threats to information security today: management practice and a mandatory step
to protecting big data. Software is developed
Technology with Weak Security – New to defend against known threats. That means
technology is being released every day. More any new malicious code that hits an outdated
times than not, new gadgets have some form version of security software will go
of Internet access but no plan for security. This undetected.
presents a very serious risk – each unsecured
connection means vulnerability. The rapid Social Engineering – Cybercriminals know
development of technology is a testament to intrusion techniques have a shelf life. They
innovators, however security lags severely. have turned to reliable non-technical methods
like social engineering, which rely on social
Social Media Attacks – Cybercriminals are interaction and psychological manipulation to
leveraging social media as a medium to
gain access to confidential data. This form of how this affects individuals and society. For
intrusion is unpredictable and effective. years, various governments have enacted
regulations while organizations have
Lack of Encryption – Protecting sensitive explained policies about cyber ethics.
business data in transit and at rest is a measure
few industries have yet to embrace, despite its With the increase of young children using the
effectiveness. The health care industry handles internet, it is now very essential than ever to
extremely sensitive data and understands the tell children about how to properly operate the
gravity of losing it – which is why HIPAA internet and its dangers. It is especially hard to
compliance requires every computer to be talk to teens because they do not want to be
encrypted. lectured about what is right and wrong. They
seem to think they have it all sorts out. That is
Corporate Data on Personal Devices – why is it is important to instill appropriate
Whether an organization distributes corporate cyber etiquette at an early age but if you
phones or not, confidential data is still being haven’t there is still time to tell to your child.
accessed on personal devices. Mobile
management tools exist to limit functionality Responsible Behaviors on the Internet
but securing the loopholes has not made it to Cyber ethics concerns to the code of
the priority list for many organizations. responsible behavior on the Internet. Just as
we are taught to act responsibly in everyday
Inadequate Security Technology – Investing life. The responsible behavior on the internet
in software that monitors the security of a in many ways aligns with all the right behavior
network has become a growing trend in the in everyday life, but the results can be
enterprise space after 2014’s painful rip of data significantly different.
breaches. The software is designed to send
alerts when intrusion attempts occur, however Some people try to hide behind a false sense
the alerts are only valuable if someone is of obscurity on the internet, believing that it
available to address them. Companies are does not matter if they behave badly online
relying too heavily on technology to fully because no one knows who they are or how to
protect against attack when it is meant to be a search them. That is not all the time true;
managed tool. browsers, computers and internet service
providers may keep logs of their activities
Software Piracy which can be used to spot illegal or
Software piracy is the illegal copying, inappropriate behavior.
distribution, or use of software. It is such a
profitable "business" that it has caught the The Government has taken a positive role in
attention of organized crime groups in a making resources for parents and children to
number of countries. According to the learn about cyber ethics. This is a growing
Business Software Alliance (BSA), about 36% of problem and without parents and teachers
all software in current use is stolen. Software using the resources available nothing can be
piracy causes significant lost revenue for done to prepare future generations of internet
publishers, which in turn results in higher users from being safe online.
prices for the consumer.
Following some issues are increasing daily
Cyber Ethics due to children using the internet improperly
Cyber ethics is the study of ethics pertaining and we have to take care of it.
to computers, covering user behavior and
what computers are programmed to do, and
Copyrighting or Downloading  Tell a trusted adult, and keep telling
Copyright or downloading is a major issue them until they take action.
because children don’t know copyright  Avoid to open, read or respond to
policies. They only try to search what they messages from cyber bullies.
need from the web and download it for their  Always keep messages from bullies.
purpose. Their thinking is like “if everybody is They may be needed to take corrective
doing it therefore it’s ok”, but an action
understandable and an age appropriate lesson  Use software to block bullies if they
on Cyber Ethics could help children to learn encounter them through chat or IM.
the risks involved in Internet downloading.
Use of technology by students is globally
Crime and Punishment accepted as it facilitates the searching and
Children do not believe that they will get into retrieval of information needed for their
any real problem from neglecting the use of academics and consequently the successful
cyber ethics. It has become easy to track the completion of their education programs. They
origin of wrong activity over the internet to an need to be aware and knowledgeable about
individual user. There is not much anonymity the ethics surrounding the use of ICT is
as a child may trust. The United States therefore, important. Students must be aware
Department of Justice has a recent list and possess the knowledge about cyber
of Federal Computer Crime Cases teens this is ethics. Therefore, cyber ethics education must
a best way to show children the costly be provided to students by the school and
consequences of their internet actions. colleges.

Internet Hacking Health Issues


Hacking done by stealing classified Health issues like:
information, stealing passwords to get into a 1) Improper intake of water.
site and also recasting a website without 2) Continuous sitting which leads to
permission. Since the world is run on backache
computers it is important that hackers are 3) slipdisk, stomach problems, joint pain.
stopped. They could create viruses that could 4) Eyesight problems
shut down important websites or computer 5) Wrist pain are faced by those who work
systems. So we have to make our children in IT sector
aware by telling its importance.
Guidelines For Proper Usage Of Computers,
Cyberbullying Internet And Mobile Phones
Cyberbullying is increasing and people are The computer is a vital tool in many different
becoming aware of its effects on jobs and activities, for adults and children. But
children. Cyberbullying is bullying that takes long periods of using a computer can increase
place carrying electronic technology. your chance of developing an injury.
Electronic technology carried by devices and Inappropriate computer use can cause muscle
equipment such as cell phones, computers, and joint pain, overuse injuries of the shoulder,
and tablets as well as communication tools arm, wrist or hand, and eyestrain.
including social media sites, text messages,
website and chat. Children can experience particular physical
and psychological problems if they play
When a child encounters cyber bullying that computer games too much. You can reduce or
they should: avoid these risks with the correct furniture,
better posture and good habits, such as taking
rest breaks and restricting time spent playing Computer-related overuse injuries of the
computer games. hand or arm
Muscles and tendons can become painful with
Posture-related injuries from computer use repetitive movements and awkward postures.
Back and neck pain, headaches, and shoulder This is known as ‘overuse injury’ and typically
and arm pain are common computer-related occurs in the elbow, wrist or hand of computer
injuries. Such muscle and joint problems can users. Symptoms of these overuse injuries
be caused or made worse by poor workstation include pain, swelling, stiffness of the joints,
(desk) design, bad posture and sitting for long weakness and numbness.
periods of time.
Preventing computer-related overuse
Although sitting requires less muscular effort injuries
than standing, it still causes physical fatigue Tips to avoid overuse injuries of the hand or
(tiredness) and you need to hold parts of your arm include:
body steady for long periods of time. This  Have your mouse at the same height as
reduces circulation of blood to your muscles, your correctly positioned keyboard.
bones, tendons and ligaments, sometimes  Position the mouse as close as possible
leading to stiffness and pain. If a workstation is to the side of the keyboard.
not set up properly, these steady positions can  Use your whole arm, not just your wrist,
put even greater stress on your muscles and when using the mouse.
joints.  Type lightly and gently.
 Mix your tasks to avoid long,
Preventing computer-related muscle and uninterrupted stretches of using the
joint injuries computer.
Tips to avoid muscle and joint problems  Remove your hands from the keyboard
include: when not actively typing, to let your arms
 Sit at an adjustable desk specially relax.
designed for use with computers.
 Have the computer monitor (screen) Eyestrain from computer use
either at eye level or slightly lower. Focusing your eyes at the same distance point
 Have your keyboard at a height that lets for long periods of time causes fatigue. The
your elbows rest comfortably at your human eye structurally prefers to look at
sides. Your forearms should be roughly objects more than six metres away, so any
parallel with the floor and level with the work performed close up puts extra demands
keyboard. on your eye muscles.
 Adjust your chair so that your feet rest
flat on the floor, or use a footstool. The illuminated computer screen can also
 Use an ergonomic chair, specially cause eye fatigue. Although there is no
designed to help your spine hold its evidence that eye fatigue damages your
natural curve while sitting. eyesight, computer users may get symptoms
 Use an ergonomic keyboard so that your such as blurred vision, temporary inability to
hands and wrists are in a more natural focus on faraway objects and headaches.
position.
 Take frequent short breaks and go for a Preventing eyestrain from computer use
walk, or do stretching exercises at your Tips to avoid eyestrain include:
desk. Stand often.  Make sure your main source of light
(such as a window) is not shining into
your face or directly onto the computer  Carry your laptop in a backpack or in
screen. wheel-along luggage.
 Tilt the screen slightly to avoid
reflections or glare. Children and computer-related injuries
 Make sure the screen is not too close to Researchers believe that electronic games may
your face. be among the causes of childhood obesity
 Put the screen either at eye level or (being very overweight). And like adults,
slightly lower. children might also get overuse injuries of the
 Reduce the contrast and brightness of hand, and muscle and joint problems such as
your screen by adjusting the controls. back and neck pain or headaches.
 Frequently look away from the screen
and focus on faraway objects. Some research has shown that playing violent
 Have regular eye examinations to check computer games and a large amount of game
that any blurring, headaches and other time may cause aggressive behaviour in some
associated problems are not caused by children and may negatively affect a child’s
any underlying disorders. school work. Although computer and video
games are fun and offer benefits such as
Injuries from laptop computers improved spatial awareness, parents should
The growing use of laptop computers has keep in mind that moderation is important in
caused more pains, strains and injuries among avoiding health problems.
computer users.
Health risks from computer games
Laptop computers were designed to be used Playing computer games for too long or
for short periods of time when a person without correct furniture and posture can lead
couldn’t access a desktop computer. But these to health problems such as:
days many people use a laptop all the time.  Overuse injuries of the hand
 Obesity
The problem is that the monitor and keyboard  Muscle and joint problems
of a laptop are very close together. To position  Eyestrain
the monitor at the right height for your back  Behavioural problems including
and neck causes you to lift your arms and aggressive behaviour
shoulders too high. But to position the  Photosensitive epileptic seizures (caused
keyboard at the best height for your arms and by flashing or rapidly changing lights –
shoulders, you must hunch your shoulders and this is rare).
neck to see the monitor.
Parents can reduce the risk of children
developing computer-related health
Carrying your laptop around can also strain problems. You can encourage your child to:
your muscles and joints.  Sit at least one metre away from the
screen
Preventing injury from laptop computers  Take frequent breaks
Tips to reduce laptop dangers include:  Pursue other activities. Encourage your
 Use a correctly set-up desktop computer child to enjoy different hobbies and
instead of a laptop as often as you can. interests, particularly sports and physical
 Use peripheral equipment, such as a activities.
docking station, separate keyboard, You can also:
mouse and laptop stand.  Set sensible time limits on your child’s
 Take frequent breaks. game playing. Some guidelines
recommend no more than two hours of society in new ways. It changes our
screen time each day interactions, our sense of the world and each
 Set up the computer, desk, chair and other.”
keyboard to suit your child’s height. For
example, adjust the chair so that your But if primitive hand tools changed us from
child’s feet rest flat on the floor gatherers to hunters, and the invention of the
 Buy an ergonomic chair printing press propagated literacy while
 Buy a smaller mouse, which suits the size downgrading the importance of the oral
of your child’s hand tradition, what individual and cultural
 Teach your child to use the keyboard and transformations do new computer
mouse properly and safely, such as technologies portend?
pushing the buttons and other controls
gently. Using unnecessary force Researchers and technologists alike say they’re
increases the risk of overuse injury. already seeing technology-wrought changes
in how we operate as individuals and as a
Benefits of computer games society. To be clear, they’re not finding
Playing video and computer games is a lot of evidence of evolutionary transformations —
fun, and can offer children other important those show up over thousands of years, not
benefits too. Depending on the game, playing merely decades. But there have been shifts in
can improve: individual and societal capabilities, habits and
 Spatial awareness values. And just how these all will play out
 Iconic skills (reading images or remains to be seen.
diagrams)
 Visual attention skills (such as keeping “We’re in a big social experiment. Where it
track of various objects at the same time) ends up, I don’t know,” says Dan Siewiorek, a
 Attention span in children who have professor of computer science and electrical
attention problems. and computer engineering and director of the
Human-Computer Interaction Institute at
Impact of IT on language & culture Carnegie Mellon University.
Imagine a world where your phone is smart
enough to order and pay for your morning Like other researchers, Siewiorek has identified
coffee. No more giving orders, handing over a number of areas in which individuals and
your payment or waiting in lines. No more societies have changed in response to
face-to-face chit-chat or human interaction. technology during the past two decades. One
of the most obvious, he says, is the shift in how
For many, this might seem like a blessing. Who we view privacy. Having grown up in the
likes to wait in line? But on a grand scale, might McCarthy era, Siewiorek remembers how
this kind of automated world dramatically guarded people were with their phone
change — perhaps even eliminate — how we conversations, fearful that they would be
communicate and connect with one another? overheard or, worse, recorded.
Could it change something about us as
individuals, or as a whole society? “Now you can sit in any airport and hear all the
grisly details about a divorce or something like
Yes. It’s absolutely changing society and the that. I don’t know if the convenience overrides
way people are,” says Melissa Cefkin, an privacy or people don’t care about the other
ethnographer at IBM. “But there’s nothing new people around them, but certainly what we let
in that. We’ve always had the introduction of hang out there has changed,” he says.
new technologies that transform and move
Any doubts? Just look at the deeply personal have more specific, tailored interests than
details that people post on YouTube, would likely be found in a physical
MySpace and Facebook. neighborhood or town, whether it’s a rare
disease, a passion for running or an interest in
At the same time, people have used this a celebrity.
willingness to share via technology to forge
new definitions of community. “There are New Language, New Values
certainly different versions of community Our ability to reach across time and space and
emerging, and that’s facilitated by innovative build connections via technology with anyone,
uses of technology,” says Jennifer Earl, anywhere and at any time is changing more
associate professor of sociology and director than our sense of community; it’s changing
of the Center for Information Technology and how we communicate, too.
Society at the University of California, Santa
Barbara. “There is a new language being produced,
although it’s not replacing our existing
A hundred years ago, neighbors would come language,” says anthropologist Patricia Sachs
together for a barn raising, willing to put in Chess, founder and president of Social
hard labor because they might need similar Solutions Inc., a consulting firm in Tempe, Ariz.
help someday. Today, Earl says, technology —
whether it’s Twitter or e-mails or a viral video Chess and others point to the use of slang and
appeal — can spur people across the world to jargon (both pre-existing and newly
the same type of communal action, even if developed for today’s instant communication
they have no personal connection to the tools), phonics, abbreviations and colloquial
individuals helped or the tasks involved. syntax as the evolving standards for electronic
discourse.
“Today, with technology, we can enable
people to act collectively across boundaries. And this new vernacular is spilling over into
And one of the things that is different today traditional writing and oral exchanges. “The
isn’t that we can just act collectively very first thing that comes to mind is the term
quickly, but we act across heterogeneous bandwidth,” Chess says. “It is a technology
groups,” Earl says. term and has become incorporated in the
language in ways such as, ‘Do you have
She points to the collective actions taken to enough bandwidth to take on that project?’
help the victims of Hurricane Katrina as an There’s also ‘I’ll IM you’ and ‘Just text me.’ ”
example. Citizens throughout the U.S. posted
their spare items, from clothes to extra rooms, While we aren’t seeing those yet in formal
that displaced Louisiana residents could then writing, she says, they are common in casual
use in their time of need. writing such as emails and in everyday
conversation.
And it doesn’t take an emergency for new and
different types of communities to emerge. This emerging language could presage even
“Technology changes the whole idea of who deeper changes in what we value, which skills
we belong with,” says anthropologist Ken we possess and, ultimately, what we’re capable
Anderson, a senior researcher at Intel Corp. of. For example, Gregory S. Smith, vice
president and CIO at World Wildlife Fund, a
In the past, community members had some Washington-based nonprofit, says he has seen
sense of a shared history and shared goals and the quality of writing among younger
objectives. Today, an online community can generations of workers decline in the past
decade or so, corresponding with the rise in we jump from texting to videoconferences to
instant messaging, texting and Twitter. a phone call to listening to our MP3 players,
seem to affect how we organize our thoughts.
“The advent of tools that allow for these short Christopher R. Barber, senior vice president
types of content are flooding the Internet with and CIO at Western Corporate Federal Credit
writing that doesn’t matter, and they’re Union in San Dimas, Calif., says he has noticed
lowering the grammatical and writing skills of that some of his workers, notably the younger
our up-and-coming professionals,” says Smith, ones, are skilled at multitasking using various
who also teaches at Johns Hopkins University. technologies. “And the results show that the
work is getting done, and it’s getting done
Digital narcissism well,” he says.
Others voice deeper concerns about this
evolving digital community. IBM’s Cefkin confirms that we have become
Go back to that example of the smartphone better able to multitask as we’ve gotten used
ordering and paying for your morning coffee. to these technologies. “But the question is, can
Yes, it might eliminate waiting in long lines, but you then fully participate in something?
ultimately it could also affect our capacity to Scientific studies have come out on both
interact meaningfully with one another. sides,” she says.
Winslow Burleson, an assistant professor of
Evan Selinger, an assistant professor in the human-computer interaction at Arizona State
philosophy department at the Rochester University, says studies have found that the
Institute of Technology, explains (ironically amount of attention many of us can devote to
enough) via e-mail: “The problems posed by a single specific task is about three minutes –
automation are not new, and that scenario 15 at the most.
would not present any distinctive problems,
were it an isolated convenience. However, the Burleson doesn’t put the blame on technology
scenario does pose a deep moral challenge alone, noting that there are multiple factors in
because it can be understood as part of a modern life that could be contributing to this.
growing trend in digital narcissism.” But, he says, technology is indeed a factor. It
has enabled so much multitasking that many
Digital narcissism, Selinger explains, “is a term people simply lack experience in focusing on
that some use to describe the self-indulgent one task for an extended period of time. “So
practices that typify all-too-much user some people are concerned about the ability
behavior on blogs and social networking sites. to do thinking at a deep level,” Burleson says.
People often use these mediums as tools to Siewiorek says he has seen the effect of this
tune out much of the external world, while lack of deep thinking in how people gather
reinforcing and further rationalizing information. The Internet and the ease with
overblown esteem for their own mundane which people share information via
opinions, tastes and lifestyle choices.” technology allows them to gather data —
whether accurate or not — and use it without
Others point out that technology isn’t just necessarily understanding its context.
changing our connections and how we
communicate with one another. It’s also “I don’t see the deep thinking. I see superficial
affecting our cognitive skills and abilities — connecting of dots rather than logical
even what it means to be intelligent. thinking,” Siewiorek says. “I see people who
are not going to the source anymore. They just
Researchers say the constant stimulation and forward things. There’s no in-depth research
ongoing demands created by technology, as going on. It seems that people have lost
history. [They don’t ask] ‘Where did these managed to remain human, even if some of
things come from? Who said it first?’ ” our skills and values have evolved.

Brain changes For example, Cefkin says she used to pride


There does seem to be something going on herself on how many phone numbers she
inside the brain these days, says Intel’s could remember. “Now I can’t even remember
Anderson. Researchers are finding differences my own,” she says. “We can all point to things
in the brains of those who grew up wired, with we used to do that we can no longer do
tests showing that the neurons in the brains of because of technology, but we don’t talk
younger people fire differently than in those of about the things we now have. I remember
older generations. where computer files are today. That’s not a
different realm of memory or experience” than
“I don’t know what that means; I don’t think memorizing telephone numbers.
anybody knows,” Anderson says.
But some question whether we even need the Besides, Cefkin adds, society often finds ways
same thinking skills as we had in the past. After to fix the glitches that technologies introduce.
all, why should we memorize facts and figures Too many phone numbers to memorize? Cell
when search engines, databases and phones with memory, or a smart card
increasingly powerful handheld computing containing your important data, can replace a
devices make them instantly available? brain full of memorized numbers — and do
Years ago, intelligence was measured in part much more to boot, she adds.
by memory capacity, says Brad Allenby, a
professor of civil, environmental and In the end, Cefkin and others point out, it’s still
sustainable engineering at Arizona State humans who are in control of the technology
University who studies emerging technologies and will determine whether the
and transhumanism. “Now Google makes “advancements” technology enables will make
memory a network function,” he says. “Does a positive or negative impact on our world.
that make memory an obsolete brain function? “Technology is another artifact in human
No, but it changes it. But how it will be existence that shifts us, but it does not replace
changed isn’t clear. We won’t know what will thinking, it does not replace figuring out. It
happen until it happens.” does not do that job for people; it can only
Maybe so, but Allenby is already predicting enhance it,” says Social Solutions’ Chess.
how we’ll measure intelligence in a world “Because human beings can do what
flooded with electronic technology. technology will never be able to do — and
“Once we get seriously into [augmented that’s form judgments.”
cognition] and virtual reality, the one who has
the advantage isn’t the one who is brilliant but
the one who can sit in front of the computer
screen and respond best,” he says. “The one
who will be best is the one best integrated with
the technology.”

For society, the computer is just the latest in a


string of new technologies requiring
adaptation, anthropologists say. In the past,
we’ve embraced other technologies, including
farming tools and the printing press, and we’ve

You might also like