.

Tuesday, February 26, 2019

People Have Become Overly Dependent on Technology Essay

The world today is more dependent on technology than ever. Over 90% of Americans today own a computerized gizmo (Gahran, 2011). People receive email and text messages on cell phones, secernate fast food online, cars can park themselves, and even when we are driving, the trade lights are controlled by a centralized computer system (Greenman, 1998). merely what is all this access to technology doing to humans? What would we do if our high-tech gadgets failed us do to a wide-spread lack of power or cyber-related attack?The item is that volume of perform so dependent on technology that they arent prepared for service interruptions. With non-disaster related blackouts up 124% since the early 90s (Patterson, 2010) and disruptive weather patterns on the rise, state should begin to take go to break their dependence on technology, or at least collect better planning in place when the things do go dark. We should as well as be more aware of what information is available about us onl ine. The most damaging information is often information released willingly, with little cipher for who is viewing it.Read more Is Society too Dependent on Technology EssayPeople are too dependent on technology related services for communication, net affair, and social media. Technology has had a huge effect on the dash people communicate. Many people ca-ca traded the convenience of a wired phone in their homes in favor of only cellular phone service. In fact, a debate in June 2010 showed that more than one in four homes only has cellular service, up from 13. 6 percent in 2007 (Blumberg, 2011). Its not on the nose urban areas that have seen in increase in cellular service, every state in the US experienced an increase (Blumberg, 2011).Electing to only charter to cellular service is dangerous because cellular phones fill frequent charging to function. Additionally, the cellular towers must(prenominal) have power to provide adequate coverage of the signal. Finally, in the eve nt of an emergency, cellular signals can become overloaded. Last August when the eastern Coast experienced an earthquake, cellular service was disrupted in the DC area for as much as 20 minutes callable to the overwhelmed relay stations (Goldman, 2011). Wired phone service doesnt require power to operate.Choosing to retain wired phone service is one way we can reduce our reliance on technology. You cant spell a paper about technology without mentioning the impact of the internet. For many of us, internet related technologies have forever changed how we work and play. The internet can drive vast amounts of information, entertainment, and conveniences to our fingertips. However, it can also bring unwanted guests in the form of cybercriminals and spammers. A computer virus disguised as or targeting one of these amenities could have serious effects on our face-to-face finances and privacy.Internet commerce has changed the landscape of the business world. virago. com and Google have been become two of the most powerful companies in the world, ranking 56 and 73 on the 2012 list of the Fortune 500, but how? Amazon uses the internet to yoke sellers to consumers, taking a small percentage of the transaction in the suffice (Kay). When this process is repeated millions of times a day, profits roll in. Google on the other hand generates most of its revenue through advertising (Google). The Amazons and Googles become dangerous when crooks get involved.With Amazon on that point are many pasquinade reports concerning both the buyers and sellers. Since Amazon is just the partnership that brings the parties together, they will investigate but are not liable for fraud. whatever of Googles ads have been unknowingly infected with malware and computer viruses (Mills, 2010). The perpetrators of the Amazon fraud and Google viruses have one goal your individualized information. Information gained from internet commerce transaction can be used to steal your identity. We nee d to contend that these retailers work harder to eradicate these crooks from penetrating their networks.Social media has become the next double thing in the internet media revolution. People can give friends and family up to the minute updates on their activities and events. Ever look at a usual teenagers Face intelligence page? It often reads like a book of their thoughts, ideas, and sensitive information. Allowing this type of access to our most private information could have personal ramifications for years. The internets memory is unlimited. What may be funny, interesting, or newsworthy today may not be interesting in the future.In fact, what we say and post online has become the items that make up our online whole step (Clark, 2009). This online footprint is being used by potential employers as a background check type tactic to gain access to peoples private information. Users of social media sites are basically giving their personal information away. A recent study found t hat 13% of Facebook users and 92% of Twitter users connect with anyone who initiates a connection request (Bradley, 2009). We need to be smarter about what we post and who we allow access to.All users of social media must learn to educate themselves about the privacy policies of these social media outlets before they coupling and post information. As mentioned, people are too dependent on technology related services for communication, internet commerce, and social media. These technologies in crabby have lowered our defenses to cyber criminals and make us less prepared if a true disaster strikes. We need to learn to use these technologies in the right(a) context and take the appropriate precautions to ensure that our lives are not adversely affected if technology fails us.

No comments:

Post a Comment