Title
Running head: EMERGING TECHNLOGIES 1
EMERGING TECHNLOGIES 6
Phases of cyber technology
Students name:
Institution:
Date:
Phases of cyber technology
Cyber technology alludes to a vast assortment of computing and communication devices, such as from the stand-alone processers to the linked and networked computing and correspondence know-hows. These advancements incorporate, yet need not be restricted to, hand-held electronic gadgets, PCs (work areas and workstations), centralized server PCs, etc. Organized appliances can be associated legitimately to the Internet, or they can be associated with dissimilar gadgets through at least one exclusive PC system, for example, LANs (Groshong & Mishna, 2016).
Phase one started in the 1950s and ended in the early 1960s, and the computing was characterized by the use of huge mainframe processors that were stand-alone apparatuses and unconnected. One of the main developments in the first phase of cyber technology was the invention of the Internet, which began in the mid-1960s. The second phase of the cyber technology entailed major developments, including integrations in the processors and the communication devices pointing to the computing era’s start (“Cyber ethics as an interdisciplinary arena of applied ethics: Significant perceptions, perspectives, and methodological structures *” by Tavani, Herman T. – Journal of info ethics, fall 2006 | Online investigation library: Questia,” n.d.). The era was characterized by linkages of the mainframe processors, miniprocessors, and personal devices through the privately-owned networks that were emerging. Accordingly, data could promptly be traded between and among information bases available to arrange PCs. Moral issues related to this period of registering included concerns including individual protection, licensed innovation, and PC wrongdoing.
In the third phase of cyber technology, which occurred in 1965-1971there was miniaturization of processors embedded on the silicon chips, often referred to as semiconductors. This prompted a huge speed up and productivity of these machineries. These were the primary PCs where clients cooperated utilizing consoles and monitors, which interfaced with an operational framework, a noteworthy jump up from the punch passes and printouts. This endowed these apparatuses to run a few requests without a moment’s delay applying a focal program that worked to screen reminiscence. The fourth phase of the cyber technology entailed. Expanding the power and capacities of these little PCs implied they could be connected, making systems (Groshong & Mishna, 2016). Which at last prompted the turn of events, birth, and quick development of the Internet. Other noteworthy progresses during this age have been the Graphical UI (GUI), the mouse, coupled with the bewildering signs of progress in PC ability and hand-held gadgets. PC devices with artificial intelligence are still being industrialized, yet a portion of these progressions are beginning to upsurge and be exploited, such as voice acknowledgment. Artificial intelligence is a certainty made imaginable by employing equal preparation and superconductors. In the near imminent, PCs will be considerably transformed once more by quantum calculation, atomic and nano-innovation.
Ethical issues in emerging technologies
As there are rapid developments and innovation of new technologies, we should be aware of the truth that technology does not police itself. Emerging know-hows call for us to pay greater attention and voice our apprehensions constructively and claim accountability if individuals are injured (Demirci et al., 2021). Diverse ethical issues surround the emerging technologies, including neurostimulations, which have seen the devices hit the market; customers are hoping to upgrade their brains using electrical currents to zap the brains but have little regard for the long term side effects the practice can have. Most people are now suing the hands, eye coordination, and angles at which one holds devices, hand tremors, and other modern technologies to log into the different devices. Few take time to explore how information collected via such practices is stored or utilized (Swetz & Mansel, 2020). The impending 5G network and datafication of children will lead to overriding most people’s privacy rights in future generations. The emerging technologies there have emerged diverse ways of engineering crimes such as recruitment into terrorist groups over the Internet, increased spread of false information and fake news, child pornography, among other unethical practices (Baron, 2018).
Some of the steps that would be embraced in curbing the unethical practices emerging in the new technologies would include: identifying the issues and its impacts on the people and future generations. These steps would be characterized by a thorough exploration of the ethical issues and determine the most affected age groups coupled with the possible adverse effects the issues can have on the current and future generations, such as security, health, and morality. The second step would entail developing alternative causes of actions that will lead to the identified challenge’s ultimate solution (Reamer, 2018). The various solutions to the unethical practices may entail developing new policies, restricting the use of emerging technologies, and sensitizing societies on adverse effects of emerging technologies. The third step would entail implementing the best e alternative cause of action that would lead to maximizing the benefits and with minimal adverse implication to the society. The execution of the strategy can include instituting surveillance mechanisms on the use of emerging technologies to ensure they are used morally and with the best interest of the societies.
References
“Cyberethics as an interdisciplinary Field of applied ethics: Key concepts, perspectives, and methodological frameworks *” by Tavani, Herman T. – Journal of information ethics, fall 2006 | Online research library: Questia. (n.d.). Write better papers, faster! |Online Research Library: Questia.https://www.questia.com/library/journal/1P3-3688971651/cyberethics-as-an-interdisciplinary-field-of-applied
Baron,J. (2018, December 27).Tech ethics issues we should all be thinking about in 2019. Forbes.https://www.forbes.com/sites/jessicabaron/2018/12/27/tech-ethics-issues-we-should-all-be-thinking-about-in-2019/#6ce9e3974b21
Groshong,L.W., & Mishna,F. (2016). Introduction to special issue: Entering the digital world: Cybertechnology and clinical social work practice.Clinical Social Work Journal,43(2), 119-119.https://doi.org/10.1007/s10615-015-0529-2
Reamer,F.G. (2018). Evolving standards of care in the age of cybertechnology.Behavioral Sciences & the Law,36(2), 257-269.https://doi.org/10.1002/bsl.2336