Uploaded by Haig baitarian

2022-23 Texts for FCS FEM Seminar Discussion

advertisement
TEXT 1
The Surveillance Society
Secrets are so 20th century now that we have the ability to collect and store billions of
pieces of data forever
By David Von Drehle Aug. 01, 2013
Privacy is mostly an illusion. A useful illusion, no question about it, one that allows us to live
without being paralyzed by self-consciousness. The illusion of privacy gives us room to be
fully human, sharing intimacies and risking mistakes. But all the while, the line between
private and public space is as porous as tissue paper. The adulterous couple sneaking off to
a hotel: Is someone following them? The teenagers skipping school to visit the mall: Will
they bump into a woman from Mom’s book club? The solitary motorist thrashing an air
guitar at a traffic light: Will the driver in the next lane look over? Like children of a certain
age who think closing their eyes will make them invisible, we assume that no one sees or
hears our private moments, and we’re right—until someone watches or listens.
This was true long before the National Security Agency began collecting our telephone and
Internet records from technology and communications companies, and long before the
House of Representatives on July 24 gave a fresh thumbs-up to further NSA collections by a
narrow 12-vote margin, 217-205. It was true long before a military judge found Private
Bradley Manning guilty of espionage for his role in the WikiLeaks case—but acquitted him
on the charge of aiding the enemy—on July 30. The illusive quality of privacy is a recurring
theme of literature going back to the Hebrew Bible. Consider beautiful Bathsheba, who
strips for a bath in the second Book of Samuel, an ancient text, only to come under the
lustful gaze of King David, pacing on his palace rooftop. Or Hamlet, whose private
conversation with his mother is overheard by Polonius, hiding behind the drapes. The great
filmmaker Alfred Hitchcock was fascinated by secrets that would not stay hidden and made
a masterpiece, Rear Window, from the premise that entire lives (and deaths) are on display
behind the uncovered windows of anonymous cities, just waiting for a watcher to decrypt
them.
But the revelation of the NSA’s vast data-collection programs by a crusading contract
worker, Edward Snowden, has made it clear that the rise of technology is shattering even
the illusion of privacy. Almost overnight, and with too little reflection, the U.S. and other
developed nations have stacked the deck in favor of the watchers. A surveillance society is
taking root. Video cameras peer constantly from lamp poles and storefronts. Satellites and
drones float hawkeyed through the skies. Smartphones relay a dizzying barrage of
information about their owners to sentinel towers dotting cities and punctuating pastureland. License-plate cameras and fast-pass lanes track the movements of cars, which are
themselves keeping a detailed record of their speed and location. Meanwhile, on the
information superhighway, every stop by every traveler is noted and stored by Internet
service providers like Google, Verizon and Comcast. Retailers scan, remember and analyze
each purchase by every consumer. Smart TVs know what we’re watching—soon they will
have eyes to watch us watching them—and smart meters know if we’ve turned out the
lights.
And the few remaining technical barriers to still more surveillance are falling before the
awesome force of 1s and 0s, the binary digital magic that is the fuel of revolutionary change.
Until recently, there were hard physical limits on the number of pictures that could be
developed, videotapes that could be stored, phone–company records that could be typed or
photocopied or packed into boxes—let alone analyzed. Now the very idea of limits is
melting away. In 1980 (not that long ago; Barack Obama was in college), IBM introduced its
Model 3380 disk drive, the first device capable of storing more than a gigabyte of data. It
was roughly the size and weight of a refrigerator and cost an inflation adjusted $100,000.
Today a flash drive costing one-thousandth as much can store 50 times the data and fit on a
key ring. The amount of data that can be stored is nearly infinite. In a prescient series of
blog posts several years ago, Princeton computer-science professor Edward Felten explained
that this tremendous growth in storage capacity would inevitably spur intelligence agencies
to collect all available data—everything—simply because it’s cheaper and easier than trying
to figure out what to take and what to ignore. “If storage is free but analysts’ time is costly,
then the cost-minimizing strategy is to record everything and sort it out later,” Felten noted.
That is precisely what has happened. And at the same time, ever more sophisticated
computer algorithms make it possible to sift through and analyze larger and larger slices of
that data, raising social and ethical dilemmas that cannot be ignored. The future is here.
Nearly everything that happens from now on has the potential not just to be seen by some
restless King David or overheard by an eavesdropping Polonius but also stored indefinitely.
Government agencies, and the private corporations working with them, collect and store
billions of records every day, and they’re hungry for more: not just phone records and Web
addresses but e-mails, texts, downloads, medical records, retail receipts, bank balances,
credit-card numbers and travel itineraries.
The world glimpsed a corner of this future in April, when two bombs went off at the finish
line of the Boston Marathon. The scene was chaos. The bombers had vanished. Yet within a
few hours, their faces were plainly visible on TV screens around the world. It turned out that
every nefarious move they made as they delivered their deadly packages to Boylston Street
had been scanned and stored by surveillance cameras. Their quick capture was a triumph
for law enforcement but left an unsettling realization in its wake: everyone else on those
teeming Boston sidewalks was also being watched and remembered.
Then, just weeks after Boston, the slight and pallid Snowden emerged from his NSA cubicle
to warn us that surveillance goes far beyond the tireless eyes of the cameras. Every phone
call placed, every Web page visited—billions and trillions of data points, like raindrops in a
monsoon—is captured daily and stored for possible analysis by the U.S. government.
Remember the time you pocket-dialed your sister? The time you Googled your college
flame? The day you did that thing you so deeply regret—that thing you thought was
private—involving a Web search or a phone call or a text or an e-mail? It’s all there. In fact,
the government, with the NSA as the lead agency, is this moment busy building the world’s
largest data storage facility in Utah. More than a million square feet, room enough to
preserve everything, for the time being.
The government calls the material it collects metadata, instead of plain old data. The
difference, it might seem, is the difference between a haystack and the needles hidden
inside. No one cares about the hay; they hardly touch it as they search intently for the
telltale glint. Perhaps a better analogy would be a catalog at the Library of Congress, which
stores some 35 million books and other print publications, most of which no one ever
opens. Why so many? Because it is easier to have publishers send one of everything than to
choose which publications to preserve. (And who knows what, in that vast reserve, might be
needed someday?) In any event, the government assures us that as long as we don’t consort
with menaces to national security, our phone calls and Web searches are of no more
interest to Uncle Sam than an outdated tome on Bolivian agronomy.
Across the political spectrum, from ACLU Democrats to Ron Paul libertarians, Americans are
skeptical of the metadata fig leaf. According to a poll on July 26 by the Pew Research Center,
only about 1 in 5 people surveyed believe the government actually keeps its nose out of
private phone calls and emails. The same small minority trusts government claims to use the
surveillance trove only for anti-terrorism purposes. Indeed, more Americans in the survey
think Uncle Sam is hacking their personal communications (roughly 1 in 4 respondents) than
have faith in the government’s explanations. The skeptics no doubt have noticed that
governments are made up of people and that people are prone to misuse information when
driven by greed or curiosity or a will to power. The current IRS scandal, in which the
agency’s rules may have been bent to political ends, could prove to be an apt example.
Somewhere in the vast NSA collections are data trails belonging to political foes, unpleasant
neighbors, feuding ex-spouses, bankable celebrities—and it takes no great imagination to
see the temptation for corrupt bureaus or individuals to take a look around.
What’s to stop them? In a recent speech at the Brookings Institution, Robert Litt, general
counsel to the Director of National Intelligence, sought to answer that question. He argued
that strong measures are in place to protect the privacy of Americans as their data
accumulates on government silicon. Surveillance programs are administered by the
Executive Branch, overseen by Congress and supervised by the Judicial Branch, through the
super secret FISA court. The fact that most of these checks and balances take place behind
closed doors does not make them toothless, Litt maintained.
Take the specific case of a suspected foreign terrorist known to have communicated by
phone with U.S. citizens. Litt detailed a litany of privacy safeguards that government sleuths
must honor as they investigate the records. “We allow only a limited number of specially
trained analysts to search these databases,” he explained, and “even those trained analysts
are allowed to search the database only when they have a reasonable and articulable
suspicion that a particular telephone number is associated with particular foreign terrorist
organizations.” Moreover, the FISA court must certify that the terrorist connection is based
on a valid suspicion, supported by information “documented in writing and approved by a
supervisor.” Even after all this, the analysts are “allowed to use this information only in a
limited way, to map a network of telephone numbers calling other telephone numbers,” Litt
continued. And finally, the analysts don’t know the names that match the phone numbers.
Since the Snowden disclosures, further protections have been suggested. Perhaps the
government should employ a team of skilled attorneys, with appropriate security
clearances, to argue against the sleuths before the FISA court—to ensure that the judges
hear strong arguments against snooping. Another suggestion is to declassify FISA court
proceedings, to the extent possible, so the public can better understand what’s going on.
Even without those additional steps, however, a majority of Americans support the current
arrangement, even if they don’t entirely trust the government’s explanations. According to a
recent Washington Post/ABC News poll, after digesting Snowden’s news, a solid majority
feel that it’s more important to fully investigate terrorist threats than to protect personal
privacy.
While the scope of surveillance today is much broader than in the past, Americans long ago
grew accustomed to limits on privacy. The Supreme Court has held that information
voluntarily given to third parties is no longer secret, nor can we expect privacy to cloak our
actions in public places or our communications via the public airwaves. The government can
intercept radio signals and is allowed to read what’s written on the outside of our mail. It’s
just a step—granted, a large step—from those principles to the ones that underpin today’s
massive data collections. The header of an e-mail is not so different from the face of an
envelope, nor is the signal from a tablet to a wireless router entirely unlike the signal from
one radio to another.
We have also learned to trade elements of our privacy for all sorts of supposed benefits.
Google tracks our searches so that it will know which advertisements to show us.
Smartphones record our locations to be more helpful in steering us to the nearest multiplex,
restaurant, gas station or church. Drugstores analyze our purchases to reward us with
coupons redeemable on a future visit. And so on. We want our gadgets to know us
intimately—want our thermostats to know when we’re cold, want our toasters to know how
we like our bagel, want our search engines to know what we’re looking for even when we
misspell it. So far, we have been willing to pay for that intimacy in lost privacy.
Which brings us to a strange crossroads. The more technology endangers our privacy, the
less we seem to prize it. We post family photos on social-media sites and ship our creditcard numbers to total strangers. We ask websites we’ve never visited—designed by people
we’ve never met—to give us advice on treating embarrassing maladies and hunting for
potential mates. But the government is different, as Litt acknowledged in his recent speech,
because “the government has the power to audit our tax returns, to prosecute and imprison
us, to grant or deny licenses to do business and many other things. And,” he continued,
“there is an entirely understandable concern that the government may abuse this power.”
In recent years, privacy advocates have persuaded the Supreme Court to require search
warrants before police can sneak GPS trackers onto suspects’ cars or scan houses from the
outside using infrared devices that sense the telltale heat signature of marijuana grow
lights. Such steps seem small, however, compared with the rapid rise of surveillance powers
and the grim history of governments corrupted by the temptation to watch their peoples
too closely. The admirable goals of public safety and national security have been exploited
time and again by intrusive regimes around the world seeking to spy on their critics and
smother dissent. Americans need only read the Bill of Rights to see that suspicion of
government intrusion is a national birthright. As tools for prying grow in number and
strength, this is no time to stop being suspicious.
Perhaps there’s consolation in the magic of the microchip. Technology makes all secrets
more difficult to keep—not just our personal secrets but the government’s as well. Again
and again over the past dozen years, the methods, mistakes and misdeeds of the world’s
most powerful government have been unmasked by lowly employees convinced that what
they are witnessing is wrong. From the photos at Abu Ghraib prison to the avalanche of
WikiLeaks documents to the Snowden disclosures, large caches of data have been loaded
onto thumb drives or burned onto wafer-thin discs—then spread around the globe in the
blink of an eye. Though the clarions may be prosecuted, the facts they reveal cannot be
recalled or repressed.
This, ultimately, may prove to be our strongest protection against the rise of the
surveillance state. The same tools that strengthen it strengthen those who protest against
it. Privacy is not the only illusion in the new age of data; government secrecy is too. Big
Brother might be watching, but he is also being watched.
Original Article Available at: The Surveillance Society | TIME.com
Text 2
The Dangers of Autonomous Vehicles: What’s Stopping Self-Driving Cars From Worldwide
Adoption
Dmytro Spilka January 5, 2021
Autonomous vehicles are one of the most talked-about technological breakthroughs of the
past decade. But as we approach the end of another year of testing issues and minimal
developments within the industry, is it fair to say that the self-driving car’s rollout is
stalling?
In October 2020, Tesla grabbed the world’s attention with the arrival of its ‘Full Self Driving’
software for car owners to allow drivers to park, stay in a lane at cruising speed
automatically, and stop at red lights. The unveiling was supposed to represent a significant
step towards fully self-driving technology.
However, according to Fortune, there are fears that the name ‘Full Self Driving’ may be
misleading to some drivers, who could mistakenly assume that their car needs no
supervision. Regulators have warned users to monitor the technology closely and “take
action to protect the public against unreasonable safety risks”.
According to the chart published in Medium in 2018, 2020 was the year in which fully
autonomous vehicles began to enter the market. However, by industry standards, even
Tesla’s Full Self Driving software can only be considered an advanced driver assistance
system (ADAS).
So what’s holding autonomous vehicles back? Let’s take a deeper look at some of the more
significant issues that self-driving cars need to hurdle before entering the market.
The Fallacy of Machines Thinking Like Humans
One of the biggest issues to overcome is that, despite huge advancements in IoT technology,
computers are a long way from possessing humans’ levels of intelligence.
Of course, when it comes to individual tasks like identifying objects in pictures or following
simple commands in a static environment, machines can far outperform humans. Still, many
of these skills aren’t applicable in a more general situation.
While the act of driving a car and understanding when red lights appear may be achieved by
simple machines, the sheer volume of variables that occur during driving means that
machines will be required to obtain huge levels of intelligence and adaptability.
In a 2017 essay, leading robotics and artificial intelligence researcher, Rodney Brooks, stated
that autonomous vehicles were not viable in the short-term due to the number of ‘edge
cases’ that present themselves while driving. This refers to how often unusual events occur
– such as the poor driving of others, obstacles on the road, and misleading road markings.
While humans are naturally capable of reacting to unusual events and making swift
adjustments, machines can struggle to understand how to adapt their actions to respond in
the right way to the road in front of them, for instance.
Obstacles to Sensors
Autonomous vehicles use multiple sensors to interact with the environment around them.
This helps to detect objects like pedestrians, other vehicles android signs. Cameras can also
help the car view objects and understand the distance between the vehicle and anything in
its path. Radars can also chart the speed and direction of other vehicles and objects.
These sensors provide feedback to the car’s control system to advise where to steer or stop.
Fully autonomous cars require a wide range of sensors that can detect objects with accuracy
while quickly determining their distance and speed in every possible condition to ensure
safety at all times.
However, factors like bad weather, dense traffic, weathered road signs, or damaged
markings can significantly impact sensors’ capabilities.
For truly autonomous vehicles to work, the sensors used need to be highly adaptive and
strong enough to understand signals in the worst conditions in a range of environments.
Given that accidents have occurred with Tesla models where cars have hit parked vehicles, it
shows that there’s still some way to go in developing reliable autonomous sensors.
Cybersecurity Fears
There may be widespread concerns about the safety of autonomous vehicles in technical
understanding and reacting to obstacles. Still, there’s also a significant danger that the
interconnected vehicles could become the victim of cyberattacks.
Transportation reporter Christian Wolmar reported that widespread hackings have
happened “in other areas of computing, such as the big-data hacks and security lapses, and
it will happen in relation to autonomous cars.”
Given the dangers associated with a vehicle that’s been compromised by a hacker, any
security issues within the firmware of cars will see widespread disruption occur as a result––
making it extremely difficult to see the rollout of autonomous vehicles before rigorous tests
are conducted.
Complexity of Insurance
There’s a whole host of financial issues attached to the rollout of autonomous vehicles. The
matter of insurance and where the responsibility lies should accidents occur, a big hurdle to
overcome.
Traditionally, drivers pay insurance for their cars to cover any accidents taking place. Still,
when a vehicle is entirely autonomous, there’s no reason for an owner to pay out when it’s
likely to be the fault of the vehicle itself.
The arrival of self-driving cars will spark a reformation of how owners pay for their cars. If
insurance falls on the manufacturer, it could see the costs of vehicles rising further. In a
world that’s become more accustomed to purchasing vehicles on HP or PCP finance, the
complexity of ownership could be wholly off-putting for prospective buyers.
That said, there’s little doubting that autonomous vehicles will have a role to play in the
future of motoring. Whether the technology and its complicated connotations develop to
the point where we could see private vehicles hitting the roads by the end of the decade, or
more likely that way see some form of light delivery vehicles rolled out, it’s a testament to
interconnectivity and the potential for innovation in the industry.
Original Article Available at: The Dangers of Autonomous Vehicles: What’s Stopping SelfDriving Cars From Worldwide Adoption (iotforall.com)
Text 3
Understanding Technology and Its Influence on Human Behavior
by Anastasia Belyh
Last updated on September 25, 2019
The proliferation of technology has made it an extremely influential part of human lives.
Right from the time, we start our day all the way till we hit the sack. We utilize technology in
every possible way to make our lives convenient.
With the digital social revolution that exploded in the early 2000s, technology has changed
—
•
the way we socialize
•
the way we work
•
the way we communicate
•
the way we gather information
This drastic change has brought us to an important question — Are we too reliant on
technology to the point where technology has spoilt us, and are we able to exist without it?
Read on for a full depth answer and decide for yourself.
IMPACT OF TECHNOLOGY ON THE HUMAN MIND
One of the biggest inventions of human history was understanding how electromagnetism
works. Nikola Tesla, the famous Serbian inventor, was an avid technological genius that
discovered a way to pass electricity without the use of wires in the year 1894.
This technology was way ahead of its time and unfortunately, the secret to wireless energy
died with the prominent inventor himself but that didn’t stop others from trying to recreate
his work.
Although there wasn’t any success in achieving wireless energy the way Tesla would have
wanted to.
Today, we have quite the technologies that have changed the way the world experiences
life. Here are a few of them.
•
Internet — Undoubtedly the biggest technology in this list. The internet has
improved the way people receive information and the way we communicate. The
internet is a daily part of our lives and it’s impossible to think that we existed
without this incredible piece of technology in the past.
•
Remote Controls — A device that you point to interact with other gadgets such as a
television, a music player, an automobile, etc. The technology brought great
convenience and allowed us to simply change a channel or lock/unlock our cars with
a tap of a button.
•
Digital Cameras — Digital cameras have played an important role in recording
personal memories and capturing profound moments in full HD color. With new age
smartphones and tablets, sharing images through a digital camera in seconds is now
a reality.
•
GPS — Imagine trying to find a location while looking at a paper map only to find out
that you’ve been reading the map wrong all this time. In comes the GPS technology,
making it easier to find our favorite shopping destinations and multiplexes in less
than a second and at a tap of a finger. The U.S military originally developed this
technology to be used in warfare.
•
Smartphones — Life would be incredibly boring if all our phones were only used for
a single purpose — to receive and make calls. If it wasn’t obvious already, the
“smart” phone allows us to access our work data, act as a digital GPS device to find
locations, surf the web, watch movies, listen to music, and much more in a tiny
device that we carry in our pockets.
In fact, the world is so reliant on technology that people don’t just adopt technology into
their business but shape their business around the current technology. Let’s take an
example —
Jake wants to open a physical store and set up several artworks that he has created over the
years to sell for a profit. If Jake were to calculate his expenses in opening a physical store, it
would go something like this
Rent
1,200 $
Electricity
200 $
Wages for 2-3 Employees
2,000 $
Other Monthly Expenses (Food, Repair,
etc.)
1,000 $
Total
4,400 $
Jake needs about $4400 dollars to run a physical store to sell his art. Now if Jake were to
adopt the current technology and open a digitalized store while putting up his paintings
online without having to open a physical store.
Here’s how much it would cost Jake.
Website Hosting Platform 1 year
150 $
Domain Name 1 year
15 $
Other Expenses (Food, Digital Advertising, Internet Plan)
400 $
Total
565 $
An obvious choice, Jake would obviously opt for the digital store over a physical one as far
as expenses are concerned.
It also allows him to gain an advantage in selling his artwork to a global audience compared
to restricting his customers to a small vicinity in an area. Jake would also get more views for
his artwork in a digital store without worrying about a crowd taking over his shop.
In this way, technology has recreated the way businesses and startups are launched. With
every passing year, new technology forces businesses to either adopt it or miss out on
valuable profits in the long run.
The next section will center around the negative aspect of technology and how it has
affected creativity.
Is Technology Evil?
While technology has undoubtedly changed our lives to that of a convenient one. There are
things that we’ve lost along the way while we search for newer technologies. Some of the
negative points of technology are as follows —
Lack of Physical Human Bonding
Before the turn of the digital social revolution, people would hang out in parks and gardens
and socialize in the good old-fashioned way by approaching each other and building
relationships along the way. Technology has forced us back into a digital cave and enables
us to forge these friendships in a virtual environment where there are no actual emotions
felt and no physical touch and the complete lack of a bonding process.
Children who grow up in a technological world are also forced into a digital world at an early
age. This restricts the cognitive abilities that a child develops and thus, as the child begins to
grow into an adult, their emotions and feelings are purely synthetic as compared to a kid
that was born before the 1990’s.
A study done by The Guardian in 2013 demonstrates how kids are addicted to smartphone
apps and the most downloaded app was “Angry Birds” by kids whose age group was
between 6 and 15 years.
In yet another research study conducted by the European Commission, kids were
introduced to smart devices at an extremely young age where they couldn’t tell if it was
harmful to them or not. Instances such as cyber-bullying, digital predators, and hijacking
privacy were some of the worst affecting scenarios that the kids of the digital age face
today.
Without a doubt, technology has a critical role to play in the negative side of how kids are
being raised in a digital environment and how making a friend or two in a virtual
environment has no emotional bonding behind it.
Plagiarism & False News
Prior to the digital age, copying another artist’s work was considered impossible or relatively
hard to accomplish due to the strong private nature of a non-digitalized world.
Today, if an article is on the web, it can easily be converted into 20-different pseudo-articles
in less than a minute thanks to various nefarious software.
Leaked movies are spread around the web before the actual premier that costs producers
and directors millions of dollars due to piracy. Even music isn’t spared, it’s not uncommon to
find a famous tune being turned into another song without the knowledge of the original
artist, thanks to the digital age.
While the internet is a breeding medium for all the latest news and updates around the
globe, there’s another emerging trend that has created havoc and chaos on the world wide
web — Fake News. If you’ve recently read of an untimely demise of a popular actor and
later, found out that he is alive and kicking, you’ve been a victim of fake news.
Fake news also spreads misinformation on various drugs helping with weight loss and cancer
and causes people to blindly buy into these medications without verifying. This
demonstrates how technology can be a wild card and how false news threatens the lives of
people by misleading them.
Internet Scams & Hackers
With the internet age, a new wave of imposters has been unleashed on the world. If you
aren’t careful you lose your life savings to a scam artist located in a remote corner of the
globe and all this with a simple click of a button.
How do they do it?
Surely, you visit your bank’s official site to log in to your net banking section to access
important financial information and updates. Imagine if a remarkably similar site such as
your bank’s website existed, and you were sent an official email asking for verification of
your account.
You’ll end up providing sensitive information and private data to these imposters and in less
than 10 seconds, your funds are transferred to the imposter’s account. These funds are
untraceable.
Websites that are fake but look like an original website are known as phishing sites. These
types of sites exist to collect user information and then steal from them.
While technology has brought you and your bank closer, it has also left you vulnerable to
internet threats such as phishing sites and hacking. That’s why we’ve created a to-do list to
ensure you don’t fall prey to the dark side of technology.
Checklist to Secure Yourself on The Internet
•
Always ensure your firewall is activated. Reject any program’s permission that seeks
to disable your firewall. This is your first line of defense.
•
Verify email addresses before opening your email, if you don’t know the sender,
chances are it’s a hacker trying to get to your information. Use the “Spam” option to
block future emails from this sender.
•
A prefix at the start of your URL should always have “HTTPS” and not “HTTP”.
The S stands for secure and it’s usually lit in a bright green color to notify the page is
safe.
•
Always upgrade your anti-virus to ensure your system is updated with the latest
security files. An anti-virus is like a bodyguard to your private data.
•
When using a wireless network, always provide an administrative password to deny
hackers and invasive neighbors from using your home network.
•
Never provide sensitive details such as login information and bank details to
anonymous phone calls or emails. No company worth its salt ever needs this
information through compromised sources.
•
Keep a strong password of at least 9-15 letters long. Ensure the password isn’t just
made up of numbers and alphabets and includes special characters and other
random sequences that aren’t easily guessed by password generators.
•
Finally, always update yourself with the latest information regarding internet
technologies. The internet is a great place to be when safe-browsing is practiced. It’s
also a nightmare when you let yourself be ignorant.
How Technology Governs Human Behavior
Today, a valid number of people would take out their smartphones to record a crime-inprogress rather than calling emergency services. Many of the actions we do are centered
around technology.
We take out our phones when delicious food shows up on our table, we are more interested
in taking a video of our favorite band at a concert and finally, our creativity is judged based
on the technology we have in our homes.
There is a term for this type of dependence — it’s called Techno Addiction.
There is a fine line where we use technology to supplement our lives and where we are
glued to technology for an unhealthy 16 hours a day. In fact, every one of us is familiar or
know someone that is a techno addict.
That high school friend who’s always texting during lunchtime rather than spending time
with you.
Maybe it’s the neighbor across the street who you haven’t seen for over a month and
almost tried calling the emergency services only to discover they’ve buried themselves in
front of their gaming screens.
So how do you truly find out if you’ve been a victim of technology? Let’s find out with an
evaluation.
1. Do you feel anxious when you leave home without your phone even when there are
no important calls to be expected?
2. Is it important for you to sleep with your phone beside you?
3. Do you feel unhappy when a recently uploaded photo of yours on a social media site
doesn’t get the intended likes and attention?
4. Are you distracted from your work to constantly check your phones for notifications
and other alerts?
5. Do you prefer using video conferencing to stay in touch with your family instead of
visiting them for the holidays?
6. Have your family and friends ever complained about how disconnected you are with
them because you’ve been spending time with your electronic devices?
7. Have you ever been sleep deprived waiting for a message from your friend or loved
one while using instant messengers?
8. During the weekend, do you spend most of the time glued to a digital device? —
Video games, online surfing, mobile phones, etc.
9. Do you spend more time recording at a live concert over enjoying the spectacle?
10. Do you share your pain with an online community rather than real life family and
friends?
If you’ve answered Yes to —
None of the questions. Fabulous! You are a role model to today’s generation and a real
adventurous person who can make do without technology for as long as he wants.
1-3 questions. You’ve got some level of addiction but with regular intervention, you should
be able to beat it.
4-6 questions. There’s a serious addiction here. You’ll need to immediately sort your life
out by seeking help from family and friends. Spend time outdoors without any digital
devices. Including your phone.
6-10 questions. Extremely dangerous. The only way out of this type of addiction is if you
seek professional help. No amount of motivation can get you to switch off. Immediately dial
the helpline number at Addiction.com and start your journey back to the real world today.
5 WAYS TECHNOLOGY HIJACKS PEOPLE’S BEHAVIOR
1. Introducing FOMO (Fear of Missing Out)
Your favorite shopping site just announced a shopping bonanza. Plenty of gifts, prizes, and
discounts are to be won. All for just visiting their site multiple times a day to check the
different flash sales that are on. If you don’t find enough time to log on, you’ll miss out on a
lot of exciting deals and prizes.
This is how a typical advertising campaign usually sets itself out and gets a ton of customers
to visit their page during different times of the day. In fact, your product wishlist is empty
since your last purchase but you still decide to make the best use of the shopping festival.
All because of one important factor — Fear of Missing Out.
The modern shoppers feel that they need to be connected to every brand and newsletter to
ensure they don’t miss out on a sweet deal. It’s great to save $25 from a juicer brand that
costs $100 and it’s on sale for a limited time at $75. Great investment, right?
Not exactly.
People don’t understand this, but technology manipulates us to buy products that we don’t
need or desire. You don’t really want to buy a pair of boots, but the online discount coupon
is super tempting. You end up buying it rather than missing out an irresistible offer. We
psychologically react to any tempting sale. That’s what FOMO does to us.
We end up spending more money on products and this can bring down our monthly budget
which means less savings for the year. Had we not seen the offer, we wouldn’t even know
the item exists and we wouldn’t be buying it and would rather invest our money in wealth
creation.
It’s always better to live in the moment than to live thinking of the future. Don’t buy
products for tomorrow buy it for the immediate present. If a winter coat helps keep you
warm, then go ahead and shop for a winter coat during the winter months. Buying a winter
coat during spring just because you save a whopping 30% on the total price is the not smart
shopping but a complete waste of money.
2. Pretends to Give People Control on Their Buying Options
When presented with the menu in a fine-dining restaurant, you have the freedom of choice
to choose the food that you want to eat. And that’s exactly what technology makes us feel,
that we are in control. We forget to realize that the choice is already made for us.
How?
By controlling the type of menu, the restaurant indirectly controls the type of food you can
order.
While it’s your choice to walk into any cuisine you may seem fit, but the ultimate decision is
with the hotel serving you. They decide what goes through their menu.
Let’s say you search for lawyer services on Google. The search engine will pop up links to
lawyers that have a high SEO rating with Google or are being advertised. So, are you getting
the best lawyers in the world based on expertise? Quite frankly, No! You’re only being
served the popular options from Google’s own search indexing menu.
Similarly, when visiting a shopping site, you’ll be shown a variety of choices and garments on
display. When we shop we think we have the freedom to choose the color of the dress, the
type of dress, the fitting of the dress.
Ultimately, the dress itself has been displayed on the shopping site because the website
wants to show you exactly what they want you to see.
In this way, we surrender our ability to make choices while we fool ourselves thinking we
have the freedom of choice with technology on our side.
3. Endless Entertainment Feed
Surely there can’t be anything wrong with video streaming sites such as Netflix and Hulu.
They’ve only made it easier for us to watch the movies that we want at a cost-effective
pricing. So why would we present something that’s completely positive in a negative light?
We did say the topic was about “hijacking people’s behavior” and how it causes you to
spend more time and money without a full stop to it.
Let’s say you buy a year worth of Netflix entertainment, you’ll be greeted to create a
selection of your favorite genres and to choose the movies and tv shows that you’ve already
watched and would like similar recommendations.
Well, every time you finish an episode or a movie, you’ll be greeted with a recommendation
screen to move on to the next movie or episode. The average user will sign out and proceed
with his daily life. But what if you’re a binge-watcher.
A binge-watcher is someone who spends several hours of continuously watching
entertainment in a single stretch of time. We might be closer to our favorite tv shows and
movies with a tap of a button thanks to technology but unfortunately, unlike our remote
controls, there isn’t a stop button to stop us from enjoying endless entertainment.
Binge-watching has the following cases of negative health effects related to it —
•
56% of users develop an antisocial behavior
•
Watchers usually tend to forget their real-life responsibilities and end up wasting
valuable time
•
Real life relationships are affected due to less time spent in family bonding
•
An addictive behavior begins to manifest which can take months or even years to
treat
•
Watching videos without resting can cause you to experience — fatigue, gain weight,
increase health issues such as stroke and heart attack, etc.
Binge-watching has been a recent phenomenon due to the ease of accessibility of home
entertainment. You can watch a movie while on a subway thanks to smartphones. You’ll
never leave home without entertainment and that’s caused a negative phenomenon called
binge-watching to spread.
4. Inconvenient Choices
Ever been provided a free 14-day trial to try a service or product. From your perspective, it’s
completely free. After all, what possible ulterior motive can be brewing behind providing
people with a trial.
While signing up for your trial, you’ll be asked for your information — personal and
business. After which you’ll be asked to hook your credit card information on the basis that
it won’t be charged until after the trial period has passed.
With this, you’ve just provided the following information for a 14-day free trial
•
Credit card accessibility
•
Personal Information
•
Product purchase history matched with other sites against your personal information
They’ve now got everything they need to know about you and the brand will begin to send
personalized ads your way. The telemarketers that call and waste 20 minutes of your daily
life? Blame it on the information that you’ve just given to an unknown company that’s been
giving you a free trial period.
Technology has cleverly manipulated you into providing all your information without you
realizing it. It’s only when you are spammed with ads when opening an app do you realize
that something’s truly wrong.
You realize every ad that you get from that point on is based around the products that you
just bought from another website. How did they get so much access to your information?
Well because you just happened to give it to them.
Your emails won’t be spared either as you’ll be spammed until your inbox is full of
advertising emails that you manually must block every individual sender. A very timeconsuming process.
5. Shortened Attention Span
Did you know technology has in adversely affected your attention span without you knowing
about it?
The number of book readers in America alone has declined to 43% in 2016 from 57% in
1982. With every technological revolution that we enter, our attention span is declining to
dangerous levels. In the future, we might not even hold a conversation with our family
members for more than a minute before getting up to leave.
The cause of this is the dangerous trend of technology and its offerings. According to
Microsoft Corp., the average attention span of a human has been reduced from 12 seconds
to 8 seconds. Which means a goldfish which has an attention span of 9 seconds has beaten a
full-grown human being.
The age of technology has let us access countless articles on the cyberspace that we prefer
scanning them instead of reading and understanding the articles. Microsoft Corp.
demonstrates that weaker attention span is linked to the evolving internet age along with
the availability of devices such as tablets and mobile phones.
To normalize your attention, it’s recommended to quit using electronic devices before
bedtime. Follow the below 3 habits and you’ll be on your way to paying attention to
everything in detail in no time.
Music
Areas of the brain that were exposed to music were shown to share the same space with
the attentive areas of the brain.
This makes sense when you listen to a soundtrack and you attentively try to track the
number of instruments that are being used in a song.
You try to break down the bass, rhythm, drums, vocals, and other sounds.
Take Notes
Write your notes down on pen and paper, don’t have the habit of typing your notes using
Google Keep or other software on your devices.
Writing down notes also allows you to fully explore the idea rather than typing it down on a
computer screen where your attention span is lowered thanks to our minds using the scanand-go approach.
Ask questions
We don’t mean Google all your questions but develop a conversation with someone and pay
attention to them by listening to their answers. This way, your brain begins to analyze
what’s being heard by the other person and you’ll have a better attention span when
listening to words that are being heard rather than scanning through articles for your
answers.
CLOSING WORDS
Beware! While technology is a great access point, it also allows others to access you. It’s a
two-way tunnel connecting you to the world and connecting the world to you.
Just as you can watch a movie that is available online, companies are able to view your
information without entering your homes. Privacy is a concern due to technology’s grasp of
everything that happens around the world. It’s always a good idea to think twice before you
provide information to unknown sources or face the danger of becoming a victim.
Original Article Available at: Understanding Technology and Its Influence on Human
Behavior | Cleverism
Text 4
Study finds growing government use of sensitive data to ‘nudge’ behaviour
Alex Hern UK technology editor
Wed 8 Sep 2021 06.00 BST
A new form of “influence government”, which uses sensitive personal data to craft
campaigns aimed at altering behaviour has been “supercharged” by the rise of big tech
firms, researchers have warned.
National and local governments have turned to targeted advertisements on search engines
and social media platforms to try to “nudge” the behaviour of the country at large, the
academics found.
The shift to this new brand of governance stems from a marriage between the introduction
of nudge theory in policymaking and an online advertising infrastructure that provides
unforeseen opportunities to run behavioural adjustment campaigns.
Some of the examples found by the Scottish Centre for Crime and Justice Research (SCCJR)
range from a Prevent-style scheme to deter young people from becoming online fraudsters
to tips on how to light a candle properly. While targeted advertising is common across
business, one researcher argues that the government using it to drive behavioural change
could create a perfect feedback loop.
“With the government, you’ve got access to all this data where you can see pretty much in
real time who you need to talk to demographically, and then on the other end you can
actually see, well, ‘did this make a difference?’,” said Ben Collier, of the University of
Edinburgh. “The government doing this supercharges the ability of it to actually work.”
The British government’s fondness for minor behavioural modification tactics began in the
David Cameron era. Since the foundation of the Behavioural Insight Team – or “nudge unit”
– at No 10, ministers eagerly looked for tweaks to help people pay car tax or encourage
people to buy loft insulation.
The examples of influence government uncovered by the SCCJR range from deeply serious
to almost endearingly silly. At one end of the spectrum is the National Crime Agency’s
“Cyber-Prevent” programme, which involves identifying young people at risk of becoming
involved in cybercrime.
Some arms of the programme, which is modelled on the anti-radicalisation Prevent scheme,
involve traditional “knock and talk” visits, where NCA officers make a home visit to try to
work with the young person’s parents to steer them to a different life path.
But that part of the programme also involves the NCA collecting a substantial amount of
data about the young people it visits, which can be used to craft profiles of the typical “atrisk” teen. Those profiles can then be used to run an “influence policing” campaign, using
targeted advertising aimed at UK teens with an interest in gaming who search for particular
cybercrime services on Google.
“Beginning as simple text-based adverts, the NCA developed them across a six-month
campaign in consultation with behavioural psychologists and using the data they were
collecting from their operational work,” the researchers write. The adverts were also linked
to major gaming conventions, and advertorials were bought on gaming websites.
At the other end of the spectrum, a fire safety campaign decided to go for the most obvious
possible targeting route, said Collier. “The Home Office were essentially boasting about their
use of people’s purchasing data via Amazon targeting categories. They’d basically scooped it
up so that if you bought candles or matches, that would be used to target you with audio
adverts over your Amazon Alexa with fire safety tips. So you buy the candles when you’re
out, you come home and your Amazon Alexa starts giving you fire safety advice.”
While it’s usually good for the government to achieve goals like reducing house fires or
preventing cybercrime, Collier and his colleagues warn that the rise of “influence
government” could cause harm. Not only does it encourage departments to play fast and
loose with personal data – using notes from an interview under caution to build a profile of
a typical cybercriminal, for instance – it can also focus negative attention on vulnerable and
disadvantaged groups in ways that could be counterproductive.
One set of anti-knife crime adverts, for instance, was targeted at fans of drill music on
YouTube. The researchers warn that being followed around the internet by mentions of
knife crime could make young people more likely to think that knife-carrying was common,
ultimately helping convince them to carry a weapon.
Frequently, such campaigns are outsourced to third-party marketing agencies, a practice the
researchers argue must stop. “They are frontline policy interventions and need to be seen as
such, and subjected to the same public debate, scrutiny and accountability as other such
policies,” they argue, because they ultimately have the “dual effect of opening up the
intimate spaces of citizen lives to state control on one hand and expanding the sources of
data used by the government to target policy on the other”.
The Cabinet Office has been contacted for comment.
This article was amended on 8 September 2021 to correct the name of the Scottish Centre
for Crime and Justice Research (SCCJR).
Original Article Available at: Study finds growing government use of sensitive data to ‘nudge’
behaviour | Data protection | The Guardian
Text 5
How Local Governments Are Using Technology to Serve Citizens Better
by
•
Steve Ressler
January 12, 2016
In our connected, customer-centric world, customers have come to expect that their needs
will be met quickly and frictionlessly — especially in cities, where Instacart delivers groceries
to your apartment, Amazon provides same-day delivery, and Uber and Lyft compete to have
a car to your door in minutes.
Local governments, however, have too often offered a different experience: forms that have
to be printed and mailed; payments taken only in cash or check; appointments that have to
be conducted in person and in offices open only from 9 AM to 5 PM (or 9 AM to noon on
Fridays). This experience increasingly clashes with what city residents have been trained to
expect from the likes of Zillow, Kayak, and Yelp. Thus we have a world in which citizens find
it easier to compare pubs than public schools, to compare hotels than hospitals. It’s a
missed opportunity for governments not only to improve the lives of the people they serve,
but also to demonstrate their value and increase civic engagement.
Some innovative local governments have realized this and are using technology and a
customer-focused mind-set to innovate and better serve citizens, whether for setting up a
business or renewing a driver’s license. In our experience, the governments who really get it
understand five key things, borrowed from the consumer digital/technology sector:
Scale matters. It sounds obvious, but it’s so important that it has to be said. In the consumer
internet sector, we understand that a large audience is everything: social networks become
more valuable when more people sign up for them, and websites have more influence
when more people read them. To have a substantial impact, government services need a
substantial audience. When new apps allow residents to buy fishing licenses, check transit
schedules, or pay their local taxes on time, the impact adds up. Too many governments
measure impact in terms of thousands of downloads or impressions, rather than tens of
thousands or even millions. The ones who are really innovating aim bigger.
Online and offline efforts have to mesh. Successful government organizations use both
offline and online touchpoints to build a digital audience. They offer subscription
opportunities at call centers, customer service touchpoints, and community events, or on
their social media accounts. They optimize their websites to offer visitors opportunities to
sign up for updates on specific content of interest. For example, to get more people signed
up for snow emergency alerts, the city of Minneapolis advertises its GovDelivery alert
subscription options on billboards, in mailings, and on its social media accounts. One
cohesive message is used to get residents to sign up for snow alerts so they’ll know the
latest parking restrictions.
The citizen’s government accounts should connect seamlessly. All too often, city
governments require citizens to create different accounts for tasks like paying parking
tickets, taxes, or trash pickup fees — even if all those services are on the same government
website. Or in larger metro areas, each individual city may force you to install its own
parking app; in some dense urban areas, you’d need three or four different apps to park
within a five-mile radius.
This is an area in which governments actually have an advantage over private companies.
Government agencies can partner with each other, sharing information and back-end
databases to give citizens a more convenient, seamless experience. For example, we’ve
created a network in our platform where after signing up for one government organization’s
information, the next screen offers users the option of signing up for other notifications
from similar services or close physical locations. We’ve found that, on average, citizens sign
up for one additional agency per registration.
Engagement depends on smart segmenting. To attain private-sector standards of
engagement and conversion, government organizations must also segment and target their
audiences — while also respecting citizen privacy. Communications specifically tailored to
audience interests are more relevant, which makes those communications more likely to
capture attention and engage citizens in programs and initiatives of value.
For example, to better coordinate sanitation services, the city of Louisville offers junk pickup reminders to residents through GovDelivery, segmented by location. More than 12,000
households have signed up to receive text message alerts one week before and one day
before junk is scheduled for curbside pickup. By proactively communicating on junk pick-up
dates for residents, Louisville has been able to increase efficiency in its call center, cutting
the number of calls to its 311 center regarding pick-up dates by 45% since 2013. In another
example, Florida Fish and Wildlife Conservation Commission sends a quarterly
reengagement campaign to promote new programs, services, or topics of interest to
existing subscribers. Further, the state of Michigan uses targeted campaigns and audience
data to grow the number of foster parent applications.
Influencers improve engagement. Getting the right message into the hands of the right
people creates a viral effect, and governments can and should tap into this phenomenon. A
2014 Pew Research study showed that fewer than 30% of adults completed common
government services digitally. The key component here is that many citizens may not know
about the digital offerings available to them. That’s where advocacy marketing, finding key
influencers to help drive your message across, can help.
But uncovering and leveraging these advocates can be a challenge. By identifying and
speaking differently to highly engaged audiences, those who are more likely to share
content with friends and family, organizations can capitalize on members of the public to
help further disseminate their information. For example, King County, Washington,
leverages insights into top sharers of digital content to determine cross-promotional
campaigns they may respond well to. A citizen highly engaged with emails from a school
district is likely to respond well to a targeted request to volunteer or support a school levy.
City governments around the world are on the path to offering a truly connected citizen
experience. With the right technology and a well thought-out communications strategy, it
won’t be long before citizens receive a streamlined, consistent experience from the public
sector.
Original Article Available at: How Local Governments Are Using Technology to Serve Citizens
Better (hbr.org)
Text 6
Smart Cities Start with Smart Buildings
SPONSOR CONTENT FROM DELL AND INTEL®
January 26, 2016
As more people move to urban areas, cities face ever more economic and
environmental challenges, including resource constraints, economic restructuring,
aging populations, and pressures on public finances. In their efforts to accommodate
growing urban populations and the accompanying challenges, governments can use
modern information and communication technologies to create “Smart Cities” and
smart buildings that improve the quality and interactivity of urban services while
reducing costs and ensuring sustainability.
Smart City applications have the ability to improve everything from traffic flow to
emergency response to the operations of the buildings in which we live and work.
The United States alone is home to more than 5 million large commercial buildings,
including warehouses, offices, and schools. Buildings are responsible for about twothirds of U.S. electrical energy consumption, and the U.S. Department of Energy
estimates that the country wastes 30 percent of our overall energy, representing
huge financial and environmental losses.
Today, cutting-edge Internet of Things (IoT) solutions enable the businesses,
schools, and other institutions on Dell’s “Top 25 Future-Ready Economies” list to
make better data-driven decisions for smarter buildings. By overlaying an IT network,
connecting all traditionally unconnected equipment, and applying automated
analytics and controls, building owners and managers can significantly reduce their
buildings’ energy waste and cut costs.
For instance, lighting control systems, thermostats, sensors, and alarms – all
connected to the IoT – can automatically adjust building settings according to realtime usage patterns, leading to energy savings, improved air quality, and an increase
in overall efficiency.
In addition to saving energy – and, as a result, costs – smart buildings improve the
indoor experience for occupants. On a sunny day, windows automatically darken
themselves, and when sensors detect an empty room, the heat automatically turns
off. Buildings that employ these types of energy-saving technology improve
occupants’ quality of life, workers’ productivity, and students’ chances for academic
success.
Smarter Buildings: The Foundation for Smart Cities
The rapid introduction of new IoT solutions allows building operators to make their
properties smarter without having to undergo costly retrofits or hire expensive
consultants. Lucid is one company leading the transition to smarter buildings and
smarter cities. It works with the Clinton Global Initiative and runs Connected Cities, a
program to help 100 U.S. cities integrate smart technologies into municipal buildings.
“Connected Cities exists to break down cost and complexity barriers, so cities know
how to invest in efficiency and sustainability,” says Vladi Shunturov, president and
co-founder of Lucid. “Cities can leverage other participants’ experience, so they don’t
have to architect their smart building initiatives and efficiency efforts from scratch.”
Shunturov suggests that cities focus on three key areas to improve efficiency:
1. Operations: Centralize performance data and use analytical insights to
reduce consumption by 17 percent, on average.
2. Behavior: Educate tenants in good habits and best practices, and create a
feedback mechanism.
3. Physical capital: Where necessary, replace inefficient systems, using data
intelligence to effectively target capital across large portfolios.
Current practices tend to focus on capital expenditure first – replacing old equipment
with new – but this approach is often premature. Many times the better solution is to
evaluate what already exists, improve its efficiency, and use the savings to invest in
capital improvements. According to Lucid, building managers can realize significant
energy savings purely from operational measures.
As a first step, cities interested in implementing smart building programs can
increase the frequency of utility data collection, which will reveal important usage
patterns. For instance, instead of tallying utility bills monthly, cities can use smart
meters to take readings every 15 minutes. This will help them identify usage patterns
and plan effective energy usage based on equipment requirements and building
occupancy. In schools, this kind of improved efficiency means that cost savings can
be allocated to where they’ll be put to the best use: education and curriculum. In
cities, improved efficiency translates into energy savings, simplified processes, and
the ability to identify capital expenditures that do the most good without breaking the
budget.
One U.S. organization uses Lucid’s technology to verify its building-level submetering information, thereby avoiding the higher billing rates linked to peak demand
charges, which can account for as much as 40 percent of energy bills in many utility
territories.
The Lawrence Berkeley National Laboratory (LBNL) uses Lucid’s technology to
centralize data across 26 buildings and five different building systems. In the first two
months of using Lucid’s technology, LBNL’s facilities team reduced the buildings’
natural gas usage by 50 percent, thanks to insights from 15-minute interval data that
empowered the team to configure the building’s automation system to run more
efficiently. Before using Lucid’s software, LBNL was not aware that its automation
system was misconfigured, so buildings were being heated and cooled at night, even
though they were vacant.
Of course, it is important not to manage energy efficiency in isolation, because this
can lead to uncomfortable, unproductive, or unhealthy environments. The beauty of
smart buildings is that they enable multiple systems to collaborate across multiple
contexts: resource efficiency, productivity, comfort, health, and education.
A Solid Foundation for Financing
For many communities, the greatest barrier to becoming a Smart City is cost. One
interesting enabler for many cities is new financing mechanisms, which previously
were the catalyst for the rapid deployment of solar and other renewable energy
generation products. Increasing numbers of deployments and greater efficiency
gains are bankable assets that offer cities opportunities for bonds and other financial
mechanisms, but identifying opportunities and providing fiscal accountability require
data.
For example, the city of Orlando, Florida, is investing about $20 million in Smart City
deployments. It is using data collected on energy cost savings to provide
accountability and demonstrate these investments’ performance over the long run.
Because building conditions are dynamic – occupancy, weather, and usage patterns
change continuously – savings validation mathematics tend to be difficult and time
consuming unless they are fully automated and data is centralized and readily
available.
As cities continue to grow and change, taking control of the spaces in which we live
and work – and making them more intelligent – is critical to conserving resources,
improving living and working conditions, and saving money. Fortunately, cities don’t
need to make huge investments to get started: They can become smart and efficient
one building at a time.
Original Article Available at: Smart Cities Start with Smart Buildings - SPONSOR CONTENT
FROM DELL AND INTEL® (hbr.org)
Related documents
Download