SlideShare a Scribd company logo
1 of 286
PAGE
1Technophobia = Poisoned Fruit by Henry MillerFear-
Mongering About Recombinant DNA-Modified Crops Hurts
Farmers and Consumers
Most people are familiar with the unappetizing browning of
apples shortly after they’re cut or bitten into. The good news is
that molecular biologists have devised a clever way to prevent
it. The bad news is that organizations that represent apple
growers are implacably opposed to the improved fruit.
And therein lies a cautionary tale.
The biology of apples is complicated but fascinating. Almost all
commercial apple varieties are grafted onto hardy root stocks
that have dwarfing genes to keep the trees on apple plantations
short and easier to harvest. Therefore, the DNA of the roots is
different from the DNA of the fruit tree. Apples’ blossoms are
self-incompatible with respect to fertilization so they must be
cross-pollinated by insects (primarily bees) in order to develop
fruit. Special pollinating trees are found in most orchards as a
source of pollen for the fruit tree blossoms. These pollinating
trees (often crab apples) have still different DNA. Once the
pollen fertilizes the apple blossom the fruit can develop.
The pollen DNA mixes with the flower ovum DNA and the
resulting hybrid seed embryo grows and produces a hormone
that directs other parts of the flower (which contains only
flower DNA) to develop into the fruit. Thus, the DNA in the
fruit itself is different from the DNA in the seeds. This
difference in DNA between the fruit and the seeds is why
different varieties of apples can be grown in close proximity
and yet maintain their differences. Because the DNA in the fruit
is only from the flower, not the pollen, Granny Smith apples
growing next to Golden Delicious growing next to Red
Delicious all produce apples with their own unique DNA.
Arctic Apple
A Canadian company has petitioned both the U.S. and Canadian
federal regulatory authorities to permit the sale of a new variety
called Arctic® Apple that contains a commercially significant
trait. It is highly resistant to the unappetizing browning that
occurs when an apple is cut or bruised. The biology that made
this possible is elegant and intriguing.
Enzymatic browning is caused by the apple’s chemical reaction
to cell injury, such as when the fruit is bitten or sliced, which
ruptures the cells and triggers a chemical reaction between an
enzyme called polyphenol oxidase (PPO) and chemicals in the
apple that cause the apple flesh to turn brown. A family of four
genes controls the majority of PPO production, so scientists
turned off those genes—and lo and behold, Arctic Apples don’t
manifest enzymatic browning.
Ordinarily, this development of another new apple variety
would be a nonevent—except, perhaps, for apple growers and
retailers who would, one would expect, relish a new product
with additional appeal to consumers—but the seeds of
discontent have sprouted: Because the shutoff of the four genes
was done with recombinant DNA technology, there have been
objections and consternation.
Simply because this highly precise and predictable methodology
was used, some apple growers are worried that this new variety
could constitute a threat to other apple crops. The U.S. Apple
Association (USApple), the industry’s trade group, says that it
“supports advancements from technology and genetics and
genomics research,” and that “benefits can include attributes
such as quality…”—which would certainly include nonbrowning
apples—but, paradoxically, USApple has also come out firmly
against the introduction of the Arctic Apple.
USApple has emphasized that its objections are “not based on
any concern about human health and safety,” but “consumers
like their apples and are not calling for these new
‘nonbrowning’ cultivars.” How lame. Are consumers clamoring
for apple cultivars that are more resistant to predation by
insects, viruses, or fungi?
There are several reasons why their concerns are unfounded.
First, as described, farmers and plant breeders have been
creating new varieties of apples for millennia. The new
molecular techniques for accomplishing this are far more
precise, predictable, and conservative.
Second, there is vast experience in both cultivation and in our
diets with recombinant DNA-modified varieties of various
crops. Farmers in three dozen countries have cumulatively
cultivated more than 1.25 billion hectares (about 3.75 billion
acres) of them, and North Americans alone have consumed more
than 3 trillion servings of food or ingredients from recombinant
DNA-modified plants. There has never been a single
documented case of disruption of an ecosystem or harm to a
person.
Extensive global scientific research has identified no unique
health risks associated with recombinant DNA-modified crops
or food, and the apple growers associations (except perhaps the
organic growers, who often seem to reside in a parallel
universe) have no concerns about the safety of this nonbrowning
apple.
Could the new apple “contaminate” other varieties? Research
has shown that the cross-pollination potential of apples is
limited to about 150 feet. Beyond that distance, cross
pollination of apples is virtually nil. The DNA in fruit comes
from the parental tree, not the pollen that fertilizes the apple
blossom. When someone eats a Golden Delicious apple, 100%
of the DNA (and protein, carbohydrates, and other compounds)
is from Golden Delicious trees.
The entire apple industry owes the diversity of varieties to
different gene expression patterns. A Golden Delicious apple
looks and tastes different from a Red Delicious because
different apple genes are expressed. Recent genomic sequencing
shows there are about 57,000 genes in the Golden Delicious
apple. One must look beyond the science to understand how the
apple growers’ associations can be against new varieties of
apples simply because four of the 57,000 apple genes have been
turned off.
The reason is short-sighted economics. A spokesperson for the
Northwest Horticultural Council ascribed the apple industry’s
opposition to the potential for “severe adverse marketing issues
to confront both organic and traditional apple growers” if the
Arctic Apple were to be introduced.
The organic fruit industry is especially antagonistic to the
Arctic Apple. They claim that the organic status of their fruit is
threatened by cross-pollination from any recombinant DNA-
modified apple and are calling for a ban on all such varieties.
However, no organic grower has ever lost organic certification
from exposure to trace amounts of recombinant DNA-modified
seed or pollen, just as pesticide wafting onto organic crops from
neighboring fields does not jeopardize organic status.
“Organic” status is conferred if the grower agrees to use only a
restricted set of techniques and practices but has nothing at all
to do with the quality, safety, or characteristics of the product
itself.
Fear-mongering about recombinant DNA-modified crops has
become the stock-in-trade of some antitechnology
environmental organizations and the organic food industry.
Therefore, apple growers and their trade groups fear the
possibility that their products will no longer be the “apple of
the consumer’s eye” because of negative propaganda from the
organic food and antibiotechnology organizations.
There are even more compelling reasons than pleasing their
customers for apple growers and their trade groups to embrace
the new technology: the experiences, both positive and
negative, of other farming sectors in the recent past.
Recombinant DNA Technology
Consider, for example, the cautionary tale of the Kona coffee
industry in Hawaii, which in 2008 pushed the Hawaii County
Council to ban the growing of recombinant DNA-modified
beans on the Big Island. The growers felt that the use of the
new technology would risk decades of building the reputation of
Kona coffee as a brand. Beans developed using recombinant
DNA technology may not qualify as “specialty coffee,” and
therefore, it was feared that they would command a lower
market price.
The industry may now be singing a different tune. Big Island
coffee growers are facing a dire threat to their crops that didn’t
exist four years ago: Infestations of the Coffee Berry Borer
beetle, which evolves resistance to pesticidal sprays, were first
discovered in Kona in 2010 and have now been confirmed in all
parts of west Hawaii and in some other areas as well. Faced
with the threat of devastation of their crops, the industry is now
desperate for any measures to combat the beetle. Recombinant
DNA technology has been widely and successfully used in corn,
cotton, papaya, and other crops to introduce resistance to pests.
Hawaiian coffee farmers and their organizations should have
heeded the positive example of the Rainbow variety of papaya,
Hawaii’s fifth largest crop. By inserting a single gene from a
virus into papayas, scientists have made them virus-resistant.
Although the biological mechanism is different, the effect is
similar to vaccination of people and animals using weakened or
killed viruses. The recombinant DNA-modified Rainbow papaya
has resurrected Hawaii’s $64 million-a-year industry, which was
moribund 15 years ago because of the predations of papaya
ringspot virus.
Wheat farming offers yet another example. By 2004, Monsanto,
the world’s leader in the production of seeds for genetically
engineered crops, had made substantial progress in the
development of genetically engineered wheat varieties for North
America. But suddenly in that year, the company scrapped its
wheat program in large part because of opposition from North
American grain merchants and growers.
European countries and Japan, which have traditionally
imported about 45% of U.S. wheat exports, have been resistant
to recombinant DNA-modified crops and food derived from
them.
However, American growers and millers have had a change of
heart. Wheat farming is a struggling industry in the United
States, in large part because it has not received the
technological boost from recombinant DNA technology that has
hugely benefited the corn and soybean sectors. U.S. wheat
acreage is down about one-third from its peak in the early
1980s, due to reduced profitability compared with alternative
crops. Therefore, in 2006, a coalition of U.S. wheat industry
organizations called for access to recombinant DNA-modified
wheat varieties with enhanced traits, and a survey released in
2009 by the U.S. national association of wheat growers found
that more than three-quarters of U.S. farmers wanted access to
genetically improved varieties with resistance to pests, disease,
drought, and frost.
Such varieties are important as plant scientists and farmers
continue to battle diseases such as leaf rust, the world’s most
common wheat disease, which can lead to yield loss of up to
20%. In Kansas, the heart of the U.S. wheat belt, for example,
leaf rust destroyed a shocking 14% of the wheat crop in 2007.
Apple growers should take note of the lessons learned by others
the hard way. There is little doubt consumers will like and even
pay a premium for the nonbrowning trait in apples. Instead of
fighting the introduction of this improved, consumer-friendly
product (as well as others that could follow), the apple growers’
associations should sow the seeds of greater sales and security
of their harvest by mounting a truthful, positive ad campaign to
trumpet the new advances in molecular biology applied to their
products. They should bear in mind that technophobia often
breeds poisoned fruit.
Work Cited
Miller, Henry. “Technophobia = Poisoned Fruit.”
Genengnews.com. Genetic Engineering & Biotechnology, 1 Oct.
2012. Web. 21 Apr. 2014.
PAGE
4Technology & the Future of Violence
by Gabriella Blum
How should our defense strategy evolve in a world of easily
accessible mini-drones, lethal nanobots, and DIY warfare?
You walk into your shower and find a spider. You are not an
arachnologist. You do, however, know that one of the following
options is possible:
The spider is real and harmless. The spider is real and
venomous.
Your next-door neighbor, who dislikes your noisy dog, has
turned her personal surveillance spider (purchased from
“Drones ‘R Us” for $49.95) loose and is monitoring it on her
iPhone from her seat at a sports bar downtown. The pictures of
you, undressed, are now being relayed on several screens during
the break of an NFL game, to the mirth of the entire
neighborhood.
Your business competitor has sent his drone assassin spider,
which he purchased from a bankrupt military contractor, to take
you out. Upon spotting you with its sensors, and before you
have any time to weigh your options, the spider shoots an
infinitesimal needle into a vein in your left leg and takes a
blood sample.
As you beat a retreat out of the shower, your blood sample is
being run on your competitor’s smartphone for a DNA match.
The match is made against a DNA sample of you that is already
on file at EVER.com (Everything about Everybody), an
international DNA database (with access available for $179.99).
Once the match is confirmed (a matter of seconds), the assassin
spider outruns you with incredible speed into your bedroom,
pausing only long enough to dart another needle, this time
containing a lethal dose of a synthetically produced,
undetectable poison, into your bloodstream. Your assassin, who
is on a summer vacation in Provence, then withdraws his spider
under the crack of your bedroom door and out of the house, and
presses its self-destruct button. No trace of the spider or the
poison it carried will ever be found by law enforcement
authorities.
Smaller, Cheaper Weapons & DIY Drones
This is the future. According to some uncertain estimates,
insect-sized drones will become operational by 2030. These
drones will be able to not only conduct surveillance, but to act
on it with lethal effect. Over time, it is likely that miniaturized
weapons platforms will evolve to be able to carry not merely the
quantum of lethal material needed to execute individuals, but
also weapons of mass destruction sufficient to kill thousands.
Political scientist James Fearon has even speculated that at
some more distant point in time, individuals will be able to
carry something akin to a nuclear device in their pockets.
Assessing the full potential of technology as it expands (and
shrinks) requires a scientific expertise beyond my ken. The
spider in the shower is merely an inkling of what probably lies
in store. But even a cursory glance at ongoing projects tells us
that the mind-bending speed at which robotics and nanobotics
are developing means that a whole range of weapons is growing
smaller, cheaper, and easier to produce, operate, and deploy
from great distances. If the mis-en-scene above seems unduly
alarmist or too futuristic, consider the following: Drones the
size of a cereal box are already widely available, can be
controlled by an untrained user with an iPhone, cost roughly
$300, and come equipped with cameras. Palm-sized drones are
commercially available as toys (such as the Hexbug), although
they are not quite insect-sized and their sensory input is limited
to primitive perception of light and sound.
True minidrones are still in the developmental stages, but the
technology is progressing quickly. The technological challenges
seem to be not in making the minidrones fly, but in making
them do so for long periods of time while also carrying some
payload (surveillance or lethal capacity). The flagship effort in
this area appears to be the Micro Autonomous Systems and
Technology (MAST) Collaborative Technological Alliance,
which is funded by the U.S. Army and led by BAE Systems and
U.C. Berkeley, among others. The Alliance’s most recent
creations are the Octoroach and the BOLT (Bipedal Ornithopter
for Locomotion Transitioning). The Octoroach is an extremely
small robot with a camera and radio transmitter that can cover
up to 100 meters on the ground, and the BOLT is a winged robot
designed to increase speed and range on the ground.
Scientists at Cornell University, meanwhile, recently developed
a hand-sized drone that uses flapping wings to hover in flight,
although its stability is still quite limited and battery weight
remains a problem. A highly significant element of the Cornell
effort, however, is that the wing components were made with a
3-D printer. This heralds a not-too-distant future in which a
person at home can simply download the design of a drone,
print many of the component parts, assemble them with a
camera, transmitter, battery, etc., and build themselves a fully
functioning, insect-sized surveillance drone.
Crawling minidrones have clearly passed the feasibility
threshold and merely await improvements in range and speed to
attain utility on the battlefield and viability in the private
sector. Swarms of minidrones are also being developed to
operate with a unified goal in diffuse command and control
structures. Robotics researchers
at the University of Pennsylvania recently released a video of
what they call “nano quadrotors”—flying mini-helicopter robots
that engage in complex movements and pattern formation.
A still more futuristic technology is that of nanobots or
nanodrones. The technology for manufacturing microscopic
robots has been around for a few years, but recent research has
advanced to the point of microscopic robots that can assemble
themselves and even perform basic tasks. The robotics industry,
both governmental and private, is also exerting great efforts to
enhance the autonomous capabilities of robots, that is, to be
able to program a robot to perform complex tasks with only a
few initial commands and no continuous control. Human testing
for a microrobot that can be injected into the eye to perform
certain surgical tasks is now on the horizon. Similar
developments have been made toward nanobots that will clear
blocked arteries and perform other procedures.
Now, situate the robotics technology alongside other
technological and scientific advancements—the Internet,
telecommunications, and biological engineering—all of which
empower individuals to do both good and terrible things to
others. From here, it is not hard to conceptualize a world rife
with miniature, possibly molecule-sized, means of inflicting
harm on others, from great distances and under clandestine
conditions.
When invisible remote weapons become ubiquitous, neither
national boundaries nor the lock on our front door will
guarantee us an effective line of defense. As the means to inflict
violence from afar become more widely available, both
individual threat and individual vulnerability increase to a
hitherto unknown degree. When the risk of being detected or
held accountable diminishes, inhibitions regarding violence
decrease. Whether political or criminal, violence of every kind
becomes easier to inflict and harder to prevent or account for.
Ultimately, modern technology makes individuals at once
vulnerable and threatening to all other individuals to
unprecedented degrees: we are all vulnerable—and all
menacing.
The Future of War
In this essay I take on some of the possible ramifications of
these technological advances for the potential incidence of
violence and its future effects on the existing legal and political
order. I first consider the special features of new weapons
technologies that, in my mind, are likely to make violence more
possible and more attractive; these are proliferation,
remoteness, and concealment. All in all, I argue that technology
has found a way to create “perfect weapons”—altogether
distant, invisible, and untraceable, essentially generating a more
leveled playing field among individuals, groups, and states.
I then reflect on the implications of this development for the
traditional legal and political categories—national and
international, private and public, citizen and alien, war and
crime—that still serve as the basis for much of existing
regulation of violence, and argue that these juxtapositions are
becoming increasingly vague and inapplicable as rationales for
regulation of new threats. Finally, I venture to imagine some
broader themes of the future defense against the threat of new
weapons, both on the international level (a move to global
policing) and on the domestic level (privatization of defense).
I argue that as threats increasingly ignore conventional
boundaries or nationalities and become more individualized, the
traditional division of labor between government and citizens
and between domestic and international becomes impractical.
National defense will require a different mix of unilateralism
and international cooperation. Personal defense will have to rely
more on diffuse, private, person-to-person mechanisms of
protection, as well as concede more power to the government.
The very concept of state sovereignty—what it means
domestically and what it means externally—would have to be
reimagined, given the new strategic environment.
Several preliminary observations are in order. The first is a
caveat: To a significant degree, my essay focuses on the
technological threat side of the equation. It does not envisage
the full line of possible complementary defenses. This
discrepancy inevitably produces a somewhat myopic picture of
the consequences of new technology. Most technological
innovations relating to weapons, biology, or the cyber world are
closely followed by apprehensions of Armageddon—so much so
that in some cases, there have been preemptive efforts to ban
the use of these technologies.
Take, for instance, the 1899 treaty to ban balloon air warfare,
which is still in force for its signatories (among them the United
States). Genetic and biological engineering, which can save and
improve lives on a mass scale, has also been met with criticism
about the impropriety of “Man playing God” and predictions of
the end of the human race as we know it. And yet the world still
stands, despite the existence of destructive capabilities that can
blow up Planet Earth hundreds of times over. In fact, some
credit the very existence of nuclear weapons and the
accompanying nuclear arms race for a reduction in overall
violence.
Still, history has proven that offensive capabilities, at least for
a space in time, usually outrun defensive capabilities. In the
robotic context especially, as costs go down, availability grows
and global threat grows with it. Even if defensive technologies
catch up with present threats and many of the concerns raised in
this essay could be set aside, it is always useful to continue to
think about defense as it should evolve vis-à-vis the micro-
world in comparison with more traditional modes of defense.
Moreover, it is unclear that the case of meeting threats with
equal threats—as in the case of nuclear weapons—would yield a
similar outcome of mutual deterrence when it comes to
personalized weapons of the kind I imagine here. For all these
reasons, I find it appropriate, for the purposes of this essay and
with the caveat described in mind, to focus on the threat/offense
side of the equation.
A second observation is a variation on the first, and has to do
with the different roles and functions of technology in general
and robots specifically. Like all machines, robots can be put to
good or bad use, and the “good” or “bad” often depends on
where one stands. On today’s battlefields, robots serve many
functions, ranging from sweeping for Improvised Explosive
Devices (IEDs), to medical evacuation, supply chain
management, surveillance, targeting, and more. In this essay, I
focus on technology’s “life-taking,” rather than “life-saving,”
functions, while keeping in mind that the same systems can be
put to use to save victims of atrocities just as easily as they can
be deployed for more pernicious purposes.
From among all types of robots available, I focus mostly on
robots that are miniaturized, potentially invisible, which make
detection and accountability a great deal more difficult. This is
what also situates the “spiders” within the broader technological
developments of the Internet, bioengineering, and the like,
which, together, constitute an environment in which the threat is
largely invisible. Again, although their full scientific and
operational potential is unknown as of yet, I assume that some
version of miniaturized drones—whether independently
operated or deployed off of larger structures that carry them to
their target—is a real possibility.
Socialization has always been essential for survival. The
Internet, media, telecommunications, travel, and commerce have
all made the world smaller and strengthened global
interconnectedness and socialization. In his recent eloquent and
wide-ranging book, Harvard psychologist Steven Pinker argues
that our present society is the least violent in recorded history,
in part, because technology, trade, and globalization have made
us more reasoned, and in turn, more averse to violence.
Notwithstanding Pinker’s powerful account, the very same
technology that brings people closer—computers,
telecommunications, robotics, biological engineering, and so
on—now also threatens to enable people to do infinitely greater
to each other.
Whether advanced technology really threatens single-handedly
to reverse our trajectory toward a less violent world is
impossible to predict, precisely because the threat that derives
from technological advances is only one manifestation of a sea-
change in social and cultural relations which technology as a
whole brings about.
Put differently, threats derive from the combination of
capabilities and motivations to engage in harmful activities.
Technology influences both capabilities and motivations, but
not in a single trajectory; the technology to inflict harm is
countered by the technology to prevent or correct against it, and
motivations to inflict harm are constantly shaped and reshaped
by the local and global environments. Any assessment of the
future level of threat brought about by new weapons
technologies must thus engage with predictions about the
growth of capabilities to inflict violence on the one hand, and
the growth of or decline in motivations to inflict violent harm,
on the other.
As I earlier noted, I am focusing here on the capabilities to
inflict harm and their effects on the possible motivations to
harm, but only in the narrow context in which some underlying
motivation to injure others exists. Of course, if political,
ideological, or personal motivations for harm are significantly
reduced, for instance, because interconnectivity and
interdependence diminish violent hatred, demonization of
others, or the attractiveness of violence as the means of
promoting ideological goals, we have less to worry about.
With all their uncertainties, however, it seems to me that the
lethal capabilities of miniaturized technologies will spread well
before what has been assumed to be pacifying social forces,
whether the Internet or reason, will have operated to turn much
more of our world into a peaceful place. Even if they do not,
considering those features of new weapons technologies that
enhance the capability—and perhaps, therefore, the
motivation—for violence warrant special attention.
Violence, of course, does not require fancy weapons. Even in
our present age, it took mostly machetes for Hutus to kill
800,000 Tutsis and moderate Hutus in the course of only 100
days. Individuals everywhere are already vulnerable to the
proliferation of weapons. According to some estimates, there
are 90 guns for every 100 people in the United States, and more
than 800 million firearms worldwide. Between 10,000 and
20,000 people are killed annually in gun-related homicides in
the United States. These homicides account for two-thirds of all
murder cases. When people want to kill other people, they can.
And yet, three features of new weapons technology—
proliferation, remoteness, and concealment—make violence
more likely. All three are already present to some degree in
existing weapons, but new technology integrates and intensifies
them in a way that significantly enhances their potential threat.
In what follows I discuss these three features in greater detail.
Work Cited
Blum, Gabriela. “ Technology & the Future of Violence.”
Hoover.org. Leland Stanford Junior University,
17 Aug. 2012. Web. 21 Apr. 2014.
What are the Consequences of Being
Disconnected in a Broadband-
Connected World?
John B. Horrigan
© 2011 by the American Academy of Arts & Sciences
JOHNB. HORRIGAN is Vice Pres-
ident of Policy and Research at
TechNet, where he leads research
on technology, innovation, and
telecommunications policy. Previ-
ously, he was part of an fcc team
that developed the National Broad-
band Plan (nbp), designing and
conducting the fcc’s ½rst national
survey on broadband adoption
and usage. The survey ½ndings
were highlighted in the nbp’s ½rst
working paper, Broadband Adoption
and Use in America. He also served
as Associate Director of Research
for the Pew Internet & American
Life Project.
Ten years ago, the debate over the digital divide
was mainly a binary one about access: some people
had a computer (and therefore dial-up access to the
Internet), and some did not. This disparity was
widely thought to be unfair because not all mem-
bers of society could take advantage of the brave
new world of the Internet–that is, the easy con-
nectivity to other people and a wealth of informa-
tion. Those without access were cut off from the
bene½ts of communicating with others (for the
most part via email and sometimes on more orga-
nized many-to-many groups, such as Listservs).
Stakeholders should embrace a different framing
of the digital divide, one that acknowledges the
need for a broader range of policy measures to
address imbalance in the adoption of broadband
Internet. While the digital divide debate should not
abandon equity arguments, it should also consider
17
Abstract: The evolution of the Internet in the past decade–from
a slow, stationary, and primarily com-
munications-based technology to a mobile, fast technology that
supports a range of communication,
participatory, and transactional applications–has made access
more valuable, and disconnection more
consequential, for individuals. This evolution means that
stakeholders should embrace a different fram-
ing of the digital divide, focusing on the costs of digital
exclusion. These costs can fall on an individual,
if the Internet is the only way to carry out some tasks, and on
society, if expensive and less-ef½cient lega-
cy systems must be maintained to serve a shrinking minority
without access. Whereas the digital divide
debate concerns technology scarcity for certain population
segments, addressing the costs ofdigital exclu-
sion is about developing people’s capacity to manage today’s
abundance of digital resources. This essay
offers suggestions on a framework to develop tools that will
enable individuals to take advantage of the
affordances of broadband.
the costs to individuals and to society of
having a sizable portion of the popula-
tion offline. The high and rising cost of
digital exclusion makes a lack of Internet
access more disadvantageous today than
a decade ago. Furthermore, lower levels
of engagement with online resources
among those who are online are more
consequential than a few years ago.
Policy measures to address the inequi-
ties of the digital divide have rightly fo-
cused on providing access to necessary
hardware and giving users the computer
skills to negotiate the basics of an online
session. Some initiatives refurbished old
computers and either gave them to peo-
ple who could not otherwise afford them
or sold them at a cut rate. Grant pro-
grams–funded by the federal govern-
ment, states, or localities–were under-
taken to support hardware and training
for low-income people. Nonpro½t orga-
nizations also seized the opportunity to
bring access to less well-off Americans;
some managed to scale their initiatives
regionally or nationally.
Given the importance of broadband in
carrying out everyday tasks, such mea-
sures are still crucial, but alone are not
suf½cient to fully support online adop-
tion and use. In addition, policy-makers
and other stakeholders must give people
the resources to cultivate a wider set of
digital skills, such as media literacy, the
ability to access civic information, and
pro½ciency in managing personal priva-
cy. Users must also understand that they
have an obligation to educate themselves
on the skills needed to participate in an
increasingly broadband-mediated world.
The Internet’s expanding role as a con-
duit to performing important daily func-
tions has increased the need for tools to
help users negotiate an ever more com-
plex online environment.
This essay begins with a data-driven
discussion of how online access has
changed in the past decade. It reviews
trends in Internet and broadband adop-
tion, as well as mobile adoption, while
also examining the varying levels of
engagement with digital tools across the
user population. Second, the essay re-
views the literature on technology adop-
tion and user behavior, focusing on the
role of skills in user engagement with on-
line resources as well as factors that en-
courage or inhibit skill development.
Finally, after arguing that user support sys-
tems are necessary in today’s online world,
the essay offers suggestions to stakeholders
on how to create such systems.
As surveys from the Pew Research Cen-
ter’s Internet & American Life Project
have documented, online access and use
in the United States have evolved over the
past decade. Notwithstanding a recent
slowdown in the growth of broadband
adoption, far more Americans today con-
nect to the Internet using an “always on”
high-speed connection than was the case
just a few years ago (see Figure 1).
Data gathered at the end of 2009 and in
the ½rst quarter of 2010 show that some
two-thirds of Americans have broadband
access at home. The Federal Communi-
cations Commission (fcc) survey con-
ducted in connection with the National
Broadband Plan (nbp) found in Novem-
ber 2009 that 65 percent of Americans
had broadband; a Pew survey conducted
in April 2010 found that 66 percent of
Americans had broadband at home. Data
gathered by the National Telecommuni-
cations & Information Administration
(ntia) in 2009 and 2010 census surveys
show similar trends. In 2009, the ntia
reported that 63.5 percent of households
had high-speed Internet access, a ½gure
that had grown to 68 percent by October
2010.1 More Americans are Internet users
than home broadband users, as some
Internet users have access at a place other
18
Being
Discon-
nected in a
Broadband-
Connected
World
Dædalus, the Journal of the American Academy of Arts &
Sciences
than home (such as work or a library),
and some still use dial-up Internet con-
nections. Overall, according to the ntia ,
72 percent of Americans were Internet
users in October 2010.
Many U.S. policy-makers have become
particularly focused on how broadband
adoption in the United States compares
with other countries. According to a June
2010 survey by the Organisation for Eco-
nomic Co-operation and Development
(oecd), the United States places four-
teenth in the world for ½xed broadband
subscriptions per one hundred inhabi-
tants, trailing the Netherlands, Den-
mark, Switzerland, and Korea (the top
four countries), but also France, Ger-
many, the United Kingdom, and Canada.
This middling rank, roughly the position
the United States has maintained for the
past several years, contrasts with the U.S.
standing a decade ago. In 2001, the oecd
placed the United States at fourth in the
world (using the metric of the number of
lines per one hundred people).2
Some observers have criticized the way
the oecd develops its ranking and the
wisdom of policy-makers who pay so
much attention to this metric.3 Nonethe-
less, these ratings help policy-makers
frame broadband policy as both urgent
and relevant to America’s economic com-
petitiveness. Although competitiveness is
not the focus of this essay, it plays a sig-
ni½cant part in U.S. broadband policy.
The growth in broadband adoption has
been accompanied by any number of
innovations that have made online life
more useful, fun, satisfying, and conse-
quential for users. People sent email mes-
sages from a desktop computer a decade
19
John B.
Horrigan
140 (4) Fall 2011
Figure 1
Trends in Home Broadband and Dial-Up Adoption, June 2000 to
December 2009
Source: Based on the author’s calculations using data available
from the Pew Internet & American Life Project,
http://www.pewinternet.org/Data-Tools/Download-Data.aspx.
ago, and although many of us still do,
many also send text messages from a
smartphone, tweet on the go, and rou-
tinely share information on Facebook.
People purchase items online, rate what
they buy, gather news and analysis, seek
out health and medical information, edu-
cate themselves, and engage in many oth-
er activities. Figure 2 presents snapshots
of what people do online and how use has
changed in the past decade.
A greater share of Americans perform a
wider range of online activities than a
decade ago. About twice as many people
get political news and information online
today than in 2000, and more than twice
as many adult Americans have bought
something online and banked online.
Activities that were unheard of in 1999,
such as blogging or social networking,
are mainstays in the daily routines of
large numbers of Americans. People also
access the Internet in more varied ways
than a decade ago.
Access is no longer stationary and teth-
ered. With the advent of laptops, net-
books, tablets, and smartphones–in con-
junction with the development of wire-
less networks–access is also portable and
ubiquitous. In 2000, slightly more than
half (53 percent) of Americans had cell
phones, a number that had grown to 86
percent at the beginning of 2010. The
capabilities of these devices have in-
creased dramatically: two-thirds of cell
phone users send text messages, and 40
percent use their phones to access the
Internet.4 Today, more than half (52 per-
cent) of Americans have laptop comput-
ers; many use them to access the Inter-
net through wireless connections.5 Finally,
tablets and e-book readers are beginning
to gain a foothold among early adopters.
Some 5 percent of adults report having an
e-book reader (such as a Kindle or Sony
Digital Reader) and 5 percent report hav-
ing a tablet computer (such as an iPad).6
However, individuals still have qualms
about online life. A 2008 Pew survey
showed that online users had substantial
reservations when asked about how com-
panies might use personal information
gathered from people using cloud com-
puting applications. The survey found
that 68 percent of those who use online
applications and storage services would be
very concerned about companies using
information gathered in the course of
such activities to serve targeted ads.7 The
fcc survey conducted for the nbp (men-
tioned above) found that many Ameri-
cans–especially those without home
broadband access–reported concerns
about the security of personal informa-
tion online. Some 45 percent of all Amer-
icans said they strongly agreed with the
proposition that it is too easy for their
personal information to be stolen online
–a ½gure that stood at 57 percent among
those without broadband at home. The
survey also found a link between fears
about the security of personal informa-
tion and lower levels of use of online re-
sources.8
Notwithstanding user worries about
some aspects of online life, the Internet
has evolved, in ten years’ time, from a
slow access technology used by a minori-
ty of the population to a technology that,
for most of the nation’s households, is
fast and mobile. It is no longer merely a
new way to communicate. A broadband-
driven Internet is more consequential
than the dial-up Internet–and in some
ways is more complex to use–but it also
affords collaboration, creativity, and par-
ticipation in ways unimaginable a gener-
ation ago.9
These data on access and use help illu-
minate the cost of digital exclusion, which
is reinforced in academic literature. Com-
puter scientist Rahul Tongia and commu-
nications scholar Ernest Wilson have ar-
20
Being
Discon-
nected in a
Broadband-
Connected
World
Dædalus, the Journal of the American Academy of Arts &
Sciences
21
John B.
Horrigan
140 (4) Fall 2011
Figure 2
Percentage of American Adults, including Internet Users and
Non-Users, who have Engaged in
Various Online Activities, 2000 to 200910
Use the Internet
Send or read email
Use a search engine
Research a product or service
Check the weather
Buy a product
Get news
Buy or make a travel reservation
Visit a government website
Watch a video
Look for news or information about
politics or upcoming campaigns
Do any banking online
Look for information about a job
Use online classi½ed ads
Send instant messages
Download music
Use a social networking site
Play online games
Read someone else’s blog
Rate a product, service, or person
Participate in an online auction
Make a donation to a charity
Download a podcast
Download or share ½les using peer-
to-peer ½le-sharing networks
Create or work on your own blog
Use Twitter or another status-
update service
gued that the costs of not being online
rise faster than the growth of the net-
work. Tongia and Wilson’s formulation
accomplishes in a model the reframing
that I am arguing stakeholders must fold
into their narratives. As more people use
broadband-connected networks, the cost
to those not on the network rises at more
than exponential rates when even a few
people are excluded.11
According to the nbp, the cost of digi-
tal exclusion is characterized by a decline
in offline alternatives as online ones take
precedence.12 Job searching is a good ex-
ample. When home broadband penetra-
tion was at half its current level, people
typically had plenty of ways to search for
jobs. Online ads were certainly one way,
but ads in the print edition of newspapers
were a viable alternative; job networking
could be conducted online as well as in
person; and job searchers could submit
applications online or by traditional
means. Today, print newspaper ads are
less useful sources than in the past,
and–importantly–it is often impossible
to apply for a job unless one applies
online. Some 80 percent of Fortune 500
companies accepted only online applica-
tions for jobs in 2010.13 Evidence also
suggests that home broadband access can
lessen the incidence of “job discourage-
ment” in the labor market, as Internet
access may spur some people to stick
with a job search rather than exit the
labor market.14
The basic act of getting the daily news
is another example. A decade ago, online
news websites were certainly popular,
but the daily newspaper was still a robust
source of news. More recently, changes
in the economics of the news business
have resulted in the downsizing of news-
rooms. In 2009, the daily newspaper had
27 percent fewer newsroom employees
than in the beginning of the decade; in
fact, 25 percent of the loss in newsroom
employment has occurred since 2006.15
News is still very much available offline
but has, in important ways, migrated to
the Internet; traditional media outlets
provide additional content online, and
the advent of pure play websites (wheth-
er independent blogs or news aggrega-
tion websites, such as the Huf½ngton
Post or the Drudge Report) has supplied
new ways to obtain information and
opinion. A recent Pew Research Center
report found that in a typical day, 36 per-
cent of Americans use both digital and tra-
ditional sources of news, and 39 percent
use only traditional sources. Although
Pew considers online sources as a supple-
ment to Americans’ news diets, the easy
availability of online news, whether on a
computer or a handheld device, has re-
sulted in Americans spending more time
getting news in 2010 than at any point in
the past decade.16
Interacting with government is also
different than a decade ago. With more
government services provided online,
more people are taking advantage of
them. It is often cheaper and easier for all
parties to carry out government-citizen
transactions online rather than via tradi-
tional outlets. For means-tested bene½ts
programs (such as food stamps, school
lunches, or Temporary Assistance for
Needy Families), a family might have to
½ll out between six and eight applica-
tions, often at the cost of hours away
from work. Agencies can save on pro-
curement costs using cloud computing,
with procurement savings of up to 50 per-
cent.17 Renewing a license online is easi-
er than going to a government agency. If
fewer citizens go in-person to an agency
for a particular type of transaction, it may
also be cheaper for government–and ulti-
mately taxpayers–to support fewer physi-
cal locations for certain types of services.
A ½nal example–online health and
medical information–shows the cost of
22
Being
Discon-
nected in a
Broadband-
Connected
World
Dædalus, the Journal of the American Academy of Arts &
Sciences
digital exclusion with respect to partici-
pation in important decisions. Offline
sources for health care information have
not gone away in the past decade, but
there has been an explosion in online
forums by which patients share with one
another information about their condi-
tions. This type of networking, along
with other online sources of medical and
health information, helps patients be-
come more actively engaged in health
care choices. The upshot of this dynamic
is that more people look online for health
and medical information today than a
decade ago. In 2000, 25 percent of Amer-
icans had used the Internet for such
information, a ½gure that rose to 61 per-
cent by 2009.18 A lack of access to infor-
mation means that people lose out on an
opportunity to be more empowered and
participatory in health care decisions.
There is also evidence that broadband
can improve the ef½ciency with which
health care providers deliver care to
patients.19
In the above examples, the cost of digi-
tal exclusion is twofold:
1) For individuals, those without access
to broadband either miss out on infor-
mation (such as job opportunities) or
must use more costly means to accom-
plish certain tasks.
2) For society, institutions have to support
the costs of legacy (and often more ex-
pensive) means of delivering services
in order to meet the needs of a shrink-
ing minority of people who do not have
access to broadband, or who have ac-
cess but lack the skills to use it.
Although there have been attempts to
quantify the costs of digital exclusion,
those estimates (derived in the United
States and the United Kingdom) are best
understood as a springboard for further
research.20 Yet digital exclusion and its
costs are important conceptual handles
for the ongoing debate about equity in
the digital age. Mark Cooper, director of
research for the Consumer Federation of
America, notes that because broadband
networks and functionalities continue to
advance, and therefore “raise the level of
skill necessary to use the network,” the
disconnected may become “even worse
off” than they are today.21 The link be-
tween the evolution of the broadband
environment and skills acquisition sug-
gests that stakeholders interested in ac-
cess gaps must take skills into account
when developing programs.
As consequential as having broadband
access is (or seems to be) these days, it is
important to resist the temptation to
think about broadband as something
everyone has to have. A necessity is not a
requirement. Broadband is often–with
reason–viewed as a necessity equivalent
to electricity; this comparison, in turn, is
frequently used to justify interventions
to promote broadband. The discourse,
however, often conflates access and use.
Do we want everyone to have access to
the infrastructure that provides service?
Although the answer is clearly “yes,” we
must acknowledge that as a practical mat-
ter we mean “nearly everyone,” as there
are some places where the cost of deploy-
ing infrastructure would be exorbitant.
Do we want everyone to use broad-
band? However well crafted policies to
increase access may be, attaining 100 per-
cent home-broadband adoption is not a
realistic goal. Even the telephone–widely
accepted as indispensable in modern life–
does not reach everyone; the fcc reports
that in 2010, 96 percent of Americans had
telephones, a ½gure that accounts for a
small minority without this apparently
indispensable tool.22 Research that exam-
ines this issue shows challenges in having
everyone adopt broadband. The fcc’s
November 2009 survey shows that 10 per-
23
John B.
Horrigan
140 (4) Fall 2011
cent of the adult population is “digitally
distant,” meaning they have neither the
½nancial means nor skills and attitudes
about computers that might draw them
to online use. Another 7 percent are “dig-
itally uncomfortable”; despite the fact that
many have computers, most people in
this group question the relevance of on-
line access.
Although projections of future adop-
tion prospects of non-users are inherent-
ly uncertain, the data suggest that some
17 percent of Americans–about half of
current non-adopters–face signi½cant
hurdles to adoption. Thus, in the medi-
um term, a U.S. adoption rate above 85
percent is unlikely.23
Even with the real and potential bene-
½ts of broadband use, not everyone will
embrace it; among those who do, not
everyone will prefer to use broadband in
the ways favored by planners and vision-
aries. It is imperative, therefore, to keep
in mind user preferences and abilities in
thinking about how to take advantage of
broadband’s economic and social bene-
½ts. Encouraging broadband use should
be about “demand pull” (devising ways to
lure people to use) as opposed to “tech-
nology push” (making broadband use
effectively required).
Despite anticipated challenges to attain-
ing ubiquitous deployment and universal
adoption of broadband, Congress charged
the fcc to develop the nbp and to devise
strategies for increasing broadband adop-
tion. Partly driven by this objective, re-
searchers have sought to understand not
only who is not online, but why those
without high-speed access at home choose
not to have service.24 A plurality of the 35
percent of U.S. adults who do not have
broadband at home cites cost as the main
reason they do not have broadband at
home. Close to two-thirds of non-
adopters point to factors other than the
monthly fee or cost of hardware as the rea-
son they are not home-broadband users.
According to the fcc, the barriers to
home-broadband use include:
• Cost: 36 percent of non-adopters named
cost as the main barrier, with 15 percent
citing the monthly price for service and
10 percent citing the cost of a computer.
• Digital literacy: 22 percent cited factors
that indicate digital literacy problems,
such as unfamiliarity with a computer
or worries about bad things that could
happen to them online.
• Lack of relevance: 19 percent said they did
not need additional speed (that is, to
upgrade from dial-up) or that online
content was not relevant to them.
• Lack of available infrastructure: 5 percent
said they could not get broadband
where they live.
• Other reasons: 18 percent said they could
use the Internet all they wanted at work
(3 percent), identi½ed a combination of
reasons (4 percent), or cited reasons
that did not fall into a discrete category
(11 percent).
Though cost looms large as a barrier to
adoption, it is not an isolated factor; non-
adopters’ expressed concern over their
level of digital skills clearly is signi½cant.
When given the chance to identify more
than one reason for not having broad-
band at home, half of non-adopters pick
more than one. Speci½cally:
• 66 percent cite cost (that is, monthly ac-
cess fee or cost of computer);
• 52 percent cite relevance (that is, the In-
ternet is a waste of time or they do not
think there is relevant content online
for them); and
• 47 percent cite digital literacy (that is,
they worry about bad things that can
24
Being
Discon-
nected in a
Broadband-
Connected
World
Dædalus, the Journal of the American Academy of Arts &
Sciences
happen online or they are not comfort-
able with computers).25 More speci½-
cally, 46 percent of non-Internet users
cite lack of comfort with computers as a
reason why they are not online, and a
similar number (45 percent) say they do
not use the Internet because they worry
about “all the bad things that can hap-
pen online.”
It is worth noting that the fcc’s ½ndings
about barriers to broadband differ from
those found by the ntia. When asked to
identify the main reason they do not have
broadband, respondents in the ntia sur-
vey cited the following reasons:
• 38 percent: don’t need it–not interested;
• 26 percent: too expensive;
• 18 percent: no computer or inadequate
computer;
• 6 percent: other reasons;
• 4 percent: can use it somewhere else;
• 4 percent : not available in area; and
• 3 percent: lack of con½dence or skills.26
These discrepancies have to do with
how each survey framed its questions.
The fcc survey had a different set of cat-
egories and undertook a two-step process
in which respondents were asked ½rst to
list barriers they face and then to identify
the main one. The ntia survey asked a
single question. However the question is
framed, barriers to broadband adoption
clearly have a cost component, but the
overlapping concepts of digital skills or
literacy and perceived lack of relevance
are signi½cant parts of the picture.
Also at issue are barriers that inhibit
use of broadband among those who have
service. Communications scholar Eszter
Hargittai has found variation in levels of
online skills that, among young adults,
predict the kinds of activities they engage
in online. Other research that has devel-
oped typologies of Internet users ½nds,
among other things, that a variety of fac-
tors–skills, attitudes about information
technology, demography–shape how
intensively people use information and
communications technologies (icts).27
This variation in online usage patterns is
to be expected; not everyone needs to be
(or wants to be) a ½ber-to-the-home/
iPad-toting tech gear head. Pew’s 2009
report classifying the technology usage
patterns in the general population found
that 61 percent of adult Americans–
many with broadband and cell phones–
are not heavy tech users. Some are happy
that way, while many have tepid usage
patterns due to lack of digital skills.28
Finally, adapting a method Hargittai de-
veloped to measure user skills, the 2009
fcc survey for the nbp found that 29 per-
cent of broadband users had low levels of
computer and Internet skills.29 If users’
skill levels or worries about Internet use
cause them to turn away from the worth-
while affordances of online life, then de-
veloping tools to address these issues may
be socially bene½cial.
Although cost is most often cited as the
main reason for non-adoption, other fac-
tors matter: namely, limited digital skills
and the perception among non-adopters
that access is irrelevant to them. A com-
bination of these reasons often con-
tributes to the decision not to adopt. The
following two sections explore the barri-
ers of digital skill and literacy and users’
perception that the Internet is not rele-
vant to them. Alleviating cost pressures is
obviously important but will not be dis-
cussed here; addressing this issue would
mean delving into the complex area of re-
forming the Universal Service Fund and
the Lifeline/Link-up programs, which
currently provide cost relief for tele-
phone service. The nbp recommends that
these programs be updated to reflect the
25
John B.
Horrigan
140 (4) Fall 2011
reality of broadband, and proposals have
been advanced on how to proceed.30
It is hardly novel to suggest that online
engagement is underpinned by the requi-
site literacy and skills to use icts. Digital
skills refer to the basic competencies of
knowing how to operate a computer or
initiate an online session. These capabili-
ties do not necessarily require a high level
of expertise, but they do demand suf-
½cient knowledge to communicate to
others the nature of tech problems when
users cannot resolve technical dif½culties
themselves. Digital literacy is a multidi-
mensional concept describing higher-
order faculties that, according to media
literacy scholar Renee Hobbs, “encom-
pass the full range of cognitive, emotion-
al and social competencies that include
the use of texts, tools and technologies;
the skills of critical thinking and analy-
sis; the practice of message composition
and creativity; the ability to engage in
reflection and ethical thinking; as well as
active participation through teamwork
and collaboration.” This level of pro½-
ciency extends beyond knowing how to
use technology to knowing how to use it
to carry out important tasks in everyday
life, whether that is reading the news,
obtaining information about a medical
condition, or making a purchase. Many
strategies to promote digital literacy try
to make the value proposition to broad-
band adoption more attractive by open-
ing people up to the “pleasures and
power” of using the Internet to become
better informed, while recognizing that
“people cannot be forced to engage with
the public life of the community.”31
The process of conveying to people the
usefulness of broadband typically has a
social dimension. Classic studies on tech-
nology diffusion explicitly highlight how
the social system helps spur technolo-
gy adoption.32 People learn about a new
product from the people around them;
their social networks, in other words,
play a key role in helping people discover
the utility and usability of an innovation.
In an empirical study of computer adop-
tion using 1997 data, economists Austan
Goolsbee and Peter Klenow found that
the presence of learning externalities
influenced the decision to have a com-
puter at home. People were more likely to
have a computer if they lived in areas
where others had computers and if a
large share of family and friends had one.
Moreover, email users, as distinct from
users of speci½c types of software, were
the most likely to have computers; this
fact suggests the manner in which com-
municative features of the technology
motivated adoption.33 Eszter Hargittai
has found that online skills are not even-
ly distributed among young adults–a
cohort often thought to be uniformly
tech savvy–and that socioeconomic
background is a predictor of digital skill
levels for this group.34 Finally, in a nation-
ally representative sample in the United
States, I found that measures of online
skills are correlated with the number of
online activities that people engage in.35
Non-adopters’ perceptions about broad-
band’s lack of relevance are also an impor-
tant factor in their decision not to pro-
cure home high-speed service. The notion
of broadband’s relevance is embedded in
a user’s context. A non-broadband-using
senior citizen may have traditional media
habits and not ½nd online news worth-
while. It is possible that being made aware
of distinctive characteristics of online
news content might make broadband
access more appealing. Similarly, a His-
panic individual with limited English-
language skills may not have broadband–
but may choose to get it if she is intro-
duced to Spanish-language online content
that is compelling. Finally, others might
26
Being
Discon-
nected in a
Broadband-
Connected
World
Dædalus, the Journal of the American Academy of Arts &
Sciences
buy broadband if they discovered various
economic upsides: namely, the money-
saving potential of online comparison
shopping or the convenience of carrying
out transactions online.
Whereas promoting digital literacy is
very much a social process, conveying
broadband’s relevance to people has a
greater emphasis on imparting informa-
tion. The distinction means that promot-
ing broadband’s relevance requires a tra-
ditional marketing-campaign approach.
Simply learning about the existence of
Spanish-language content or the money-
saving possibilities of online shopping
might be the catalyst that draws people to
use. Effective means of conveying the
value of broadband to those who ques-
tion its relevance are likely to emphasize
“targeted partnerships that understand
both the needs of and the distribution
channels relied on” by these non-adopt-
ers.36 Because people’s perception about
relevance depends on context, these part-
nerships are likely to be successful if they
work from the ground up, that is, if they
are local in nature and are embedded in
non-adopters’ communities.
Strategies for linking the promotion of
digital skills and relevance to policy ini-
tiatives are not well developed. Programs
to bolster broadband adoption–some
publicly funded, others spearheaded by
nonpro½t organizations, and many part-
nering with the private sector–have
existed for more than a decade. Although
many have been subject to review, a rig-
orous assessment of methodologies used
would shed light on the difference the
programs have made, compared to what
might have occurred in their absence. In
an exhaustive examination of adoption-
promotion efforts, economists Janice
Hauge and James Prieger conclude that
apparently successful programs take a
comprehensive approach to training.37
Such initiatives provide discounts on
access and equipment, but also training
on how to use the Internet, with a focus
on demonstrating the relevance of spe-
ci½c online activities and guidance on
how to carry out certain online tasks.
An assessment of existing training and
promotion efforts based on rigorous
social-scienti½c study would be useful in
designing policy initiatives. Even in its
absence, the above discussion highlights
the set of digital skills and literacies indi-
viduals need to take part in a broadband-
connected world:
• Computer skills. This category includes
the ability to use a computer–whether
it is a desktop, laptop, or handheld de-
vice–as well as the capacity to upgrade
one’s skills. The hardware for modern
connectivity is continually evolving,
and users must be capable of learning
and understanding access technologies.
• Media literacy. Media literacy refers to
the ability to ½nd trustworthy informa-
tion online about issues that matter to
the user personally or to his community.
According to the Knight Commission
report Informing Communities, media lit-
eracy enhances the information capac-
ity of individuals, enabling them to sort
through the wide range of choices for
news and information in today’s media
environment.38
• Civic engagement. The ability to ½nd reli-
able information about elections and
government online is arguably an out-
come or goal of media literacy, but it is
worthy of special attention nonethe-
less. Data show that a large share of
Americans not only use the Internet for
news about politics, but also use online
tools to carry out transactions with
government agencies. Such tools can
be particularly bene½cial for low-
income Americans, who may be more
27
John B.
Horrigan
140 (4) Fall 2011
time pressed in dealing with necessary
government transactions than other
people.
• Managing personal information online.
Users need to understand the policies
on personal privacy that govern web-
sites and the ever-shifting rules in this
realm. Given that concerns about the
privacy and security of personal infor-
mation–for both broadband users and
non-users–inhibit the adoption and
use of broadband, more information
on how websites use the information
people share online may help alleviate
user concerns.
In each of these examples, what it means
to be “media literate” or what it takes to
effectively manage one’s personal infor-
mation will evolve over time.
If these skills are necessary for partici-
pation in a digital society, how should the
gaps in skills provision be addressed?
What initiatives should various stake-
holders–government, the media, non-
pro½t organizations, and individuals–
undertake? It is impossible to draw bright
lines on these questions. Legislation will
not outline what it means to be computer
literate, but government–as well as other
actors, such as libraries–may have a part
in supporting training initiatives. Govern-
ment is also likely to take a lead role in
thinking about people’s privacy rights in
the digital age. Private news media com-
panies may promote online media literacy,
although public media and foundations
could undoubtedly play a strong part here
as well. Civic engagement cuts across all
four categories. Given that good citizen-
ship is a worthwhile social norm, the in-
dividual has an obligation to engage with
his community, whether by voting, volun-
teering, or giving to charity. The media–
public or private–may also provide infor-
mation that promotes civic engagement,
and government can play a role in design-
ing applications that permit users to con-
nect with government effectively. Person-
al information online is another area
where all stakeholders may contribute.
It is worth emphasizing that individuals
have an important obligation in each of
these areas. The character of the Inter-
net–interactive, collaborative, participa-
tory–gives individuals opportunities for
autonomy in the online commons, which
in turn suggests a responsibility to culti-
vate the commons. That means main-
taining one’s own skills, but also, argu-
ably, supporting efforts to help others
develop their skills.
Work remains to be done to turn ideas
about digital literacy and promoting rele-
vance into policy and practice. As a start-
ing point, the nbp recommends the
development of an online portal that
would allow users to look for informa-
tion on how to upgrade their online skills
and even follow lessons there on skills
development.39 Nonpro½ts already play
a role in this space, as entities such as
Common Sense Media, One Economy,
and Computers for Youth either promote
online skills or provide information
about the nature of online content. Such
initiatives typically have limited geo-
graphic scope, meaning that, as valuable
as they may be, they do not scale nation-
ally. Furthermore, there is no clearing-
house for best practices for access and
training programs–a gap the nbp rec-
ommends be ½lled. With the resources
for broadband provided in the 2009 eco-
nomic stimulus bill, as well as the atten-
tion that the nbp has drawn to issues per-
taining to broadband adoption and de-
ployment, the time may be ripe for stake-
holders in the policy community to con-
sider, in a systematic way, how to meet
the training needs of broadband users.
That said, coordinating the different
stakeholders–companies, new entities
28
Being
Discon-
nected in a
Broadband-
Connected
World
Dædalus, the Journal of the American Academy of Arts &
Sciences
devoted to expanding broadband access
in communities, long-standing commu-
nity-based organizations that have rela-
tionships with underserved populations–
remains a signi½cant challenge.
A central theme of this essay is how to
make a technology that is currently not
part of some people’s lives both available
and attractive to them. But the context
for this discussion is digital abundance.
When something is abundant–as means
of online access and quantity of appli-
cations are–those without it become
more at risk of falling outside the social,
cultural, and economic mainstream. The
accelerating pace of innovation in broad-
band will only exacerbate this risk. The
issues discussed in this essay–develop-
ing ict skills and promoting relevance
–are not going away. As the “Internet of
things” ushers in an era of home-energy
management, and with advances in the
electronic delivery of health care servic-
es, the bene½ts of connectivity will grow
over time. Today’s digital abundance will
seem like light fare in a few years, and
those left behind will forgo a range of
bene½ts.
As the pace of change quickens, pro-
moting access and managing abundance
will become different sides of the same
coin. To engage with the Internet at even
a moderate level, an individual transi-
tioning from non-user to user may quickly
½nd himself with a host of new hardware
with which to cope: a computer, displays
in the house for smart meters, and per-
haps a mobile app on a smartphone that
helps manage a medical condition. Un-
derstanding how to use these technolo-
gies, why they are relevant, what the
tools are to protect personal information,
and how to avoid being overwhelmed
will challenge newcomers to broadband.
Moreover, these questions will confront
many who already use Internet devices
and services. For these reasons, provid-
ing resources for the development of skills
to negotiate cyberspace–for new and cur-
rent users alike–is a challenge for all par-
ticipants in the broadband ecosystem.
29
John B.
Horrigan
140 (4) Fall 2011
endnotes
1 National Telecommunications & Information Administration,
Digital Nation: Expanding Inter-
net Usage, ntia Research Preview (Washington, D.C.: U.S.
Department of Commerce, Feb-
ruary 2011),
http://www.ntia.doc.gov/reports/2011/NTIA_Internet_Use_Repo
rt_February_
2011.pdf.
2 Daniel K. Correa, “Assessing Broadband in America: oecd
and itif Broadband Rankings”
(Washington, D.C.: The Information Technology & Innovation
Foundation, April 2007),
http://www.itif.org/½les/BroadbandRankings.pdf.
3 For the former point, see Scott Wallsten, Understanding
International Broadband Comparisons
(Washington, D.C.: Technology Policy Institute, May 2008),
http://www.techpolicyinstitute
.org/½les/wallsten_international_broadband_comparisons.pdf.
On the latter point, see John
B. Horrigan, “Why It Will Be Hard to Close the Broadband
Divide,” Pew Internet & Ameri-
can Life Project (Washington, D.C.: Pew Research Center,
August 2007), http://pewresearch
.org/pubs/556/why-it-will-be-hard-to-close-the-broadband-
divide.
4 Aaron Smith, “Mobile Access 2010,” Pew Internet &
American Life Project (Washington,
D.C.: Pew Research Center, July 2010),
http://www.pewinternet.org/Reports/2010/Mobile
-Access-2010.aspx.
5 Aaron Smith, “Americans and Their Gadgets,” Pew Internet &
American Life Project (Wash-
ington, D.C.: Pew Research Center, October 2010),
http://www.pewinternet.org/Reports/
2010/Gadgets/Overview.aspx.
30
Being
Discon-
nected in a
Broadband-
Connected
World
Dædalus, the Journal of the American Academy of Arts &
Sciences
6 Kathryn Zickuhr, “Generations and Their Gadgets,” Pew
Internet & American Life Project
(Washington, D.C.: Pew Research Center, February 2011),
http://www.pewinternet.org/
Reports/2011/Generations-and-gadgets.aspx.
7 John B. Horrigan, “Use of Cloud Computing Applications and
Services,” Pew Internet &
American Life Project (Washington, D.C.: Pew Research
Center, September 2008), http://
www.pewinternet.org/Reports/2008/Use-of-Cloud-Computing-
Applications-and-Services
.aspx.
8 John B. Horrigan, “Broadband Adoption and Use in America,”
Omnibus Broadband Initia-
tive (obi) Working Paper Series No. 1, Federal Communications
Commission, February
2010, http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-
296442A1.pdf.
9 See, for example, Henry Jenkins, Confronting the Challenges
of Participatory Culture: Media Edu-
cation for the 21st Century, MacArthur Foundation White Paper
(Chicago: John D. and Cath-
erine T. MacArthur Foundation, 2006).
10 Pew Internet & American Life Project surveys, 2000–2009.
These data represent the aver-
age total participation in each activity over each two-year
period. Therefore, they may not
exactly reflect the combined yearly tracking numbers. In
addition, the wording of some sur-
vey questions may have changed slightly over time.
11 Rahul Tongia and Ernest Wilson, “Turning Metcalfe on His
Head: The Multiple Costs of
Network Exclusion,” paper presented at the 35th
Telecommunications Policy Research Con-
ference, Vienna, Virginia, September 2007,
http://web.si.umich.edu/tprc/papers/2007/772/
TPRC-07-Exclusion-Tongia&Wilson.pdf.
12 See Brian David, “The Cost of Digital Exclusion,” The
Of½cial Blog of the National Broad-
band Plan, March 9, 2010,
http://blog.broadband.gov/?entryId=236662.
13 Digital Impact Group and Econsult Corporation, “The
Economic Impact of Digital Exclusion,”
March 2010,
http://www.digitalimpactgroup.org/costofexclusion.pdf.
14 George S. Ford, “Internet Use and Job Search: More
Evidence,” Phoenix Center Perspective
No. 10-02 (Washington, D.C.: Phoenix Center for Advanced
Legal & Economic Public Policy
Studies, January 2010), http://www.phoenix-
center.org/perspectives/Perspective10-01½nal.pdf.
15 “State of the News Media 2010,” a report of the Pew Project
on Excellence in Journalism,
http://www.stateofthemedia.org/2010/newspapers-summary-
essay.
16 Pew Research Center for the People & the Press, “Americans
Spending More Time Following
the News” (Washington, D.C.: Pew Research Center, September
2010), http://pewresearch
.org/pubs/1725/where-people-get-news-print-online-readership-
cable-news-viewers.
17 Federal Communications Commission, Connecting America:
The National Broadband Plan
(Washington, D.C.: Federal Communications Commission,
2010), 286, 290, http://www
.broadband.gov/download-plan.
18 Susannah Fox, “The Social Life of Health Information,” Pew
Internet & American Life Proj-
ect (Washington, D.C.: Pew Research Center, June 2009),
http://pewinternet.org/Reports/
2009/8-The-Social-Life-of-Health-Information.aspx.
19 Federal Communications Commission, Connecting America,
202, box 10-3.
20 The $55 billion cost of digital exclusion in the United States,
derived by Econsult and the
Digital Impact Group, often focuses on gross costs, not net
costs. That is, the estimates con-
centrate on savings to using digital means for, say, health care
information, without fully
accounting for costs that may arise.
21 Mark Cooper, “The Challenge of Digital Exclusion in
America: A Review of the Social Sci-
ence Literature and Its Implications for the National Broadband
Plan” (Washington, D.C.:
Consumer Federation of America, January 2010), 2,
http://fjallfoss.fcc.gov/ecfs/document/
view?id=7020384062.
31
John B.
Horrigan
140 (4) Fall 2011
22 Federal Communications Commission, “Telephone
Subscribership in the United States: Data
Through March 2010” (Washington, D.C.: Federal
Communications Commission, August
2010), http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-
301241A1.pdf.
23 Horrigan, “Broadband Adoption and Use in America,” 32.
24 See ibid. for data reported in the following two paragraphs.
25 Ibid., 31.
26 National Telecommunications & Information Administration,
“Exploring the Digital Na-
tion: Home Broadband Internet Adoption in the United States”
(Washington, D.C.: ntia,
November 2010), 17.
27 Charlene Li and Josh Bernoff, Groundswell: Winning in a
World Transformed by Social Technologies
(Boston: Harvard Business Press, 2008). See also John B.
Horrigan, “The Mobile Difference,”
Pew Internet & American Life Project (Washington, D.C.: Pew
Research Center, March 2009),
http://pewinternet.org/Reports/2009/5-The-Mobile-Difference--
Typology.aspx.
28 Horrigan, “The Mobile Difference.”
29 Eszter Hargittai, “An Update on Survey Measures of Web-
Oriented Digital Literacy,” Social
Science Computer Review 27 (1) (February 2009): 130–137. See
also Horrigan, “Broadband
Adoption and Use in America,” 18.
30 Blair Levin, Universal Broadband: Targeting Investments to
Deliver Broadband Services to All
Americans (Washington, D.C.: Aspen Institute, 2010).
31 Renee Hobbs, Digital and Media Literacy: A Plan of Action
(Washington, D.C.: Aspen Institute,
2010), xi.
32 Everett Rogers, Diffusion of Innovation, 4th ed. (New York:
The Free Press, 1995).
33 Austan Goolsbee and Peter J. Klenow, “Evidence on
Learning and Network Externalities in the
Diffusion of Home Computers,” Journal of Law and Economics
45 (October 2002): 317–343.
34 Eszter Hargittai, “Digital Na(t)ives? Variation in Internet
Skills and Uses among Members
of the ‘Net Generation,’” Sociological Inquiry 80 (1) (2010):
92–113.
35 Horrigan, “Broadband Adoption and Use in America.”
36 Levin, Universal Broadband, 24.
37 Janice A. Hauge and James E. Prieger, “Demand-Side
Programs to Stimulate Adoption of
Broadband: What Works?” Review of Network Economics 9 (3)
(2010): article 4.
38 Knight Commission, Informing Communities: Sustaining
Democracy in the Digital Age, April
2010, http://www.knightcomm.org/read-the-report-and-
comment.
39 Federal Communications Commission, Connecting America,
177.
<<
/ASCII85EncodePages false
/AllowTransparency false
/AutoPositionEPSFiles true
/AutoRotatePages /None
/Binding /Left
/CalGrayProfile (Gray Gamma 2.2)
/CalRGBProfile (sRGB IEC61966-2.1)
/CalCMYKProfile (U.S. Web Coated 050SWOP051 v2)
/sRGBProfile (sRGB IEC61966-2.1)
/CannotEmbedFontPolicy /Error
/CompatibilityLevel 1.3
/CompressObjects /Off
/CompressPages true
/ConvertImagesToIndexed true
/PassThroughJPEGImages true
/CreateJobTicket true
/DefaultRenderingIntent /Default
/DetectBlends true
/DetectCurves 0.1000
/ColorConversionStrategy /LeaveColorUnchanged
/DoThumbnails false
/EmbedAllFonts true
/EmbedOpenType false
/ParseICCProfilesInComments true
/EmbedJobOptions true
/DSCReportingLevel 0
/EmitDSCWarnings false
/EndPage -1
/ImageMemory 1048576
/LockDistillerParams true
/MaxSubsetPct 100
/Optimize false
/OPM 1
/ParseDSCComments true
/ParseDSCCommentsForDocInfo true
/PreserveCopyPage false
/PreserveDICMYKValues true
/PreserveEPSInfo true
/PreserveFlatness true
/PreserveHalftoneInfo false
/PreserveOPIComments false
/PreserveOverprintSettings true
/StartPage 1
/SubsetFonts true
/TransferFunctionInfo /Apply
/UCRandBGInfo /Remove
/UsePrologue false
/ColorSettingsFile (Color Management Off)
/AlwaysEmbed [ true
]
/NeverEmbed [ true
]
/AntiAliasColorImages false
/CropColorImages true
/ColorImageMinResolution 300
/ColorImageMinResolutionPolicy /OK
/DownsampleColorImages false
/ColorImageDownsampleType /Bicubic
/ColorImageResolution 300
/ColorImageDepth -1
/ColorImageMinDownsampleDepth 1
/ColorImageDownsampleThreshold 1.50000
/EncodeColorImages true
/ColorImageFilter /DCTEncode
/AutoFilterColorImages true
/ColorImageAutoFilterStrategy /JPEG
/ColorACSImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/ColorImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/JPEG2000ColorACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/JPEG2000ColorImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/AntiAliasGrayImages false
/CropGrayImages true
/GrayImageMinResolution 300
/GrayImageMinResolutionPolicy /OK
/DownsampleGrayImages false
/GrayImageDownsampleType /Bicubic
/GrayImageResolution 300
/GrayImageDepth -1
/GrayImageMinDownsampleDepth 2
/GrayImageDownsampleThreshold 1.50000
/EncodeGrayImages true
/GrayImageFilter /DCTEncode
/AutoFilterGrayImages true
/GrayImageAutoFilterStrategy /JPEG
/GrayACSImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/GrayImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/JPEG2000GrayACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/JPEG2000GrayImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/AntiAliasMonoImages false
/CropMonoImages true
/MonoImageMinResolution 1200
/MonoImageMinResolutionPolicy /OK
/DownsampleMonoImages false
/MonoImageDownsampleType /Bicubic
/MonoImageResolution 1200
/MonoImageDepth -1
/MonoImageDownsampleThreshold 1.50000
/EncodeMonoImages true
/MonoImageFilter /CCITTFaxEncode
/MonoImageDict <<
/K -1
>>
/AllowPSXObjects false
/CheckCompliance [
/None
]
/PDFX1aCheck true
/PDFX3Check false
/PDFXCompliantPDFOnly true
/PDFXNoTrimBoxError false
/PDFXTrimBoxToMediaBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXSetBleedBoxToMediaBox true
/PDFXBleedBoxToTrimBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXOutputIntentProfile (U.S. Web Coated 050SWOP051
v2)
/PDFXOutputConditionIdentifier (CGATS TR 001)
/PDFXOutputCondition ()
/PDFXRegistryName (http://www.color.org)
/PDFXTrapped /False
/CreateJDFFile false
/Description <<
/CHS
<FEFF4f7f75288fd94e9b8bbe5b9a521b5efa76840020004100640
06f0062006500200050004400460020658768637b265408002000
5000440046002f0058002d00310061003a0032003000300031002
089c4830330028fd9662f4e004e2a4e1395e84e3a56fe5f6251855b
b94ea46362800c52365b9a7684002000490053004f0020680751c
6300251734e8e521b5efa7b2654080020005000440046002f00580
02d00310061002089c48303768400200050004400460020658768
6376848be67ec64fe1606fff0c8bf753c29605300a0041006300720
06f00620061007400207528623763075357300b300260a853ef4ee
54f7f75280020004100630072006f0062006100740020548c00200
0410064006f006200650020005200650061006400650072002000
34002e003000204ee553ca66f49ad87248672c676562535f00521b
5efa768400200050004400460020658768633002>
/CHT
<FEFF4f7f752890194e9b8a2d7f6e5efa7acb76840020004100640
06f006200650020005000440046002065874ef67b265408002000
5000440046002f0058002d00310061003a0032003000300031002
0898f7bc430025f8c8005662f70ba57165f6251675bb94ea463db8
00c5c08958052365b9a76846a196e96300295dc65bc5efa7acb7b2
654080020005000440046002f0058002d003100610020898f7bc4
76840020005000440046002065874ef676848a737d308cc78a0aff
0c8acb53c395b1201c004100630072006f00620061007400204f7f
7528800563075357201d300260a853ef4ee54f7f75280020004100
630072006f0062006100740020548c002000410064006f0062006
5002000520065006100640065007200200034002e003000204ee5
53ca66f49ad87248672c4f86958b555f5df25efa7acb76840020005
000440046002065874ef63002>
/DAN
<FEFF004200720075006700200069006e0064007300740069006
c006c0069006e006700650072006e0065002000740069006c0020
006100740020006f0070007200650074007400650020004100640
06f006200650020005000440046002d0064006f006b0075006d00
65006e007400650072002c00200064006500720020006600f8007
20073007400200073006b0061006c002000730065007300200069
00670065006e006e0065006d00200065006c006c0065007200200
073006b0061006c0020006f0076006500720068006f006c006400
650020005000440046002f0058002d00310061003a00320030003
00031002c00200065006e002000490053004f002d007300740061
006e0064006100720064002000740069006c00200075006400760
065006b0073006c0069006e006700200061006600200067007200
61006600690073006b00200069006e00640068006f006c0064002
e00200059006400650072006c006900670065007200650020006f
0070006c00790073006e0069006e0067006500720020006f006d0
020006f007000720065007400740065006c007300650020006100
660020005000440046002f0058002d00310061002d006b006f006
d00700061007400690062006c00650020005000440046002d0064
006f006b0075006d0065006e007400650072002000660069006e0
06400650072002000640075002000690020006200720075006700
650072006800e5006e00640062006f00670065006e00200074006
9006c0020004100630072006f006200610074002e002000440065
0020006f007000720065007400740065006400650020005000440
046002d0064006f006b0075006d0065006e007400650072002000
6b0061006e002000e50062006e006500730020006900200041006
30072006f00620061007400200065006c006c0065007200200041
00630072006f00620061007400200052006500610064006500720
0200034002e00300020006f00670020006e007900650072006500
2e>
/DEU
<FEFF00560065007200770065006e00640065006e00200053006
90065002000640069006500730065002000450069006e00730074
0065006c006c0075006e00670065006e0020007a0075006d00200
0450072007300740065006c006c0065006e00200076006f006e00
20005000440046002f0058002d00310061003a003200300030003
1002d006b006f006d00700061007400690062006c0065006e0020
00410064006f006200650020005000440046002d0044006f006b0
075006d0065006e00740065006e002e0020005000440046002f00
58002d003100610020006900730074002000650069006e0065002
000490053004f002d004e006f0072006d0020006600fc007200200
0640065006e002000410075007300740061007500730063006800
200076006f006e002000670072006100660069007300630068006
5006e00200049006e00680061006c00740065006e002e00200057
00650069007400650072006500200049006e0066006f0072006d0
06100740069006f006e0065006e0020007a0075006d0020004500
72007300740065006c006c0065006e00200076006f006e0020005
000440046002f0058002d00310061002d006b006f006d00700061
007400690062006c0065006e0020005000440046002d0044006f0
06b0075006d0065006e00740065006e002000660069006e006400
65006e002000530069006500200069006d0020004100630072006
f006200610074002d00480061006e00640062007500630068002e
002000450072007300740065006c006c007400650020005000440
046002d0044006f006b0075006d0065006e007400650020006b00
f6006e006e0065006e0020006d006900740020004100630072006
f00620061007400200075006e0064002000410064006f00620065
002000520065006100640065007200200034002e00300020006f0
064006500720020006800f600680065007200200067006500f600
660066006e00650074002000770065007200640065006e002e>
/ESP
<FEFF005500740069006c0069006300650020006500730074006
100200063006f006e0066006900670075007200610063006900f3
006e0020007000610072006100200063007200650061007200200
064006f00630075006d0065006e0074006f007300200050004400
46002000640065002000410064006f00620065002000710075006
500200073006500200064006500620065006e00200063006f006d
00700072006f0062006100720020006f002000710075006500200
064006500620065006e002000630075006d0070006c0069007200
20006c00610020006e006f0072006d0061002000490053004f002
0005000440046002f0058002d00310061003a0032003000300031
0020007000610072006100200069006e007400650072006300610
06d00620069006f00200064006500200063006f006e0074006500
6e00690064006f00200067007200e1006600690063006f002e002
000500061007200610020006f006200740065006e006500720020
006d00e1007300200069006e0066006f0072006d0061006300690
0f3006e00200073006f0062007200650020006c00610020006300
72006500610063006900f3006e00200064006500200064006f006
30075006d0065006e0074006f0073002000500044004600200063
006f006d00700061007400690062006c0065007300200063006f0
06e0020006c00610020006e006f0072006d006100200050004400
46002f0058002d00310061002c00200063006f006e00730075006
c007400650020006c006100200047007500ed0061002000640065
006c0020007500730075006100720069006f00200064006500200
04100630072006f006200610074002e0020005300650020007000
75006500640065006e00200061006200720069007200200064006
f00630075006d0065006e0074006f007300200050004400460020
00630072006500610064006f007300200063006f006e002000410
0630072006f006200610074002c002000410064006f0062006500
2000520065006100640065007200200034002e003000200079002
000760065007200730069006f006e0065007300200070006f0073
0074006500720069006f007200650073002e>
/FRA
<FEFF005500740069006c006900730065007a002000630065007
30020006f007000740069006f006e00730020006100660069006e
00200064006500200063007200e90065007200200064006500730
0200064006f00630075006d0065006e0074007300200041006400
6f006200650020005000440046002000710075006900200064006
f006900760065006e0074002000ea0074007200650020007600e9
007200690066006900e900730020006f0075002000ea007400720
06500200063006f006e0066006f0072006d00650073002000e000
20006c00610020006e006f0072006d00650020005000440046002
f0058002d00310061003a0032003000300031002c00200075006e
00650020006e006f0072006d0065002000490053004f002000640
02700e9006300680061006e006700650020006400650020006300
6f006e00740065006e00750020006700720061007000680069007
100750065002e00200050006f0075007200200070006c00750073
0020006400650020006400e9007400610069006c0073002000730
07500720020006c006100200063007200e9006100740069006f00
6e00200064006500200064006f00630075006d0065006e0074007
3002000500044004600200063006f006e0066006f0072006d0065
0073002000e00020006c00610020006e006f0072006d006500200
05000440046002f0058002d00310061002c00200076006f006900
720020006c0065002000470075006900640065002000640065002
0006c0027007500740069006c0069007300610074006500750072
002000640027004100630072006f006200610074002e0020004c0
065007300200064006f00630075006d0065006e00740073002000
500044004600200063007200e900e900730020007000650075007
60065006e0074002000ea0074007200650020006f007500760065
007200740073002000640061006e00730020004100630072006f0
06200610074002c002000610069006e0073006900200071007500
2700410064006f006200650020005200650061006400650072002
00034002e0030002000650074002000760065007200730069006f
006e007300200075006c007400e90072006900650075007200650
073002e>
/ITA (Utilizzare queste impostazioni per creare documenti
Adobe PDF che devono essere conformi o verificati in base a
PDF/X-1a:2001, uno standard ISO per lo scambio di contenuto
grafico. Per ulteriori informazioni sulla creazione di documenti
PDF compatibili con PDF/X-1a, consultare la Guida dell'utente
di Acrobat. I documenti PDF creati possono essere aperti con
Acrobat e Adobe Reader 4.0 e versioni successive.)
/JPN
<FEFF30b030e930d530a330c330af30b330f330c630f330c4306e5
90963db306b5bfe3059308b002000490053004f00206a196e9689
8f683c306e0020005000440046002f0058002d00310061003a003
20030003000310020306b6e9662e03057305f002000410064006f
0062006500200050004400460020658766f830924f5c621030593
08b305f3081306b4f7f75283057307e30593002005000440046002
f0058002d0031006100206e9662e0306e00200050004400460020
658766f84f5c6210306b306430443066306f300100410063007200
6f006200610074002030e630fc30b630ac30a430c9309253c27167
30573066304f30603055304430023053306e8a2d5b9a30674f5c62
103055308c305f0020005000440046002030d530a130a430eb306f
3001004100630072006f0062006100740020304a3088307300200
0410064006f006200650020005200650061006400650072002000
34002e003000204ee5964d3067958b304f30533068304c3067304
d307e30593002>
/KOR
<FEFFc7740020c124c815c7440020c0acc6a9d558c5ec0020c791
c131d558b294002000410064006f0062006500200050004400460
020bb38c11cb2940020d655c778c7740020d544c694d558ba7000
20adf8b798d53d0020cee8d150d2b8b97c0020ad50d658d558b29
40020bc29bc95c5d00020b300d55c002000490053004f0020d45c
c900c7780020005000440046002f0058002d00310061003a00320
03000300031c7580020addcaca9c5d00020b9dec544c57c0020d56
9b2c8b2e4002e0020005000440046002f0058002d003100610020
d638d65800200050004400460020bb38c11c0020c791c131c5d00
020b300d55c0020c790c138d55c0020c815bcf4b2940020004100
630072006f0062006100740020c0acc6a90020c124ba85c11cb97c
0020cc38c870d558c2edc2dcc624002e0020c774b807ac8c0020c7
91c131b41c00200050004400460020bb38c11cb29400200041006
30072006f0062006100740020bc0f002000410064006f006200650
02000520065006100640065007200200034002e00300020c774c0
c1c5d0c11c0020c5f40020c2180020c788c2b5b2c8b2e4002e>
/NLD (Gebruik deze instellingen om Adobe PDF-documenten
te maken die moeten worden gecontroleerd of moeten voldoen
aan PDF/X-1a:2001, een ISO-standaard voor het uitwisselen van
grafische gegevens. Raadpleeg de gebruikershandleiding van
Acrobat voor meer informatie over het maken van PDF-
documenten die compatibel zijn met PDF/X-1a. De gemaakte
PDF-documenten kunnen worden geopend met Acrobat en
Adobe Reader 4.0 en hoger.)
/NOR
<FEFF004200720075006b0020006400690073007300650020006
9006e006e007300740069006c006c0069006e00670065006e0065
002000740069006c002000e50020006f007000700072006500740
0740065002000410064006f006200650020005000440046002d00
64006f006b0075006d0065006e00740065007200200073006f006
d00200073006b0061006c0020006b006f006e00740072006f006c
006c0065007200650073002c00200065006c006c0065007200200
073006f006d0020006d00e50020007600e6007200650020006b00
6f006d00700061007400690062006c00650020006d00650064002
0005000440046002f0058002d00310061003a0032003000300031
002c00200065006e002000490053004f002d007300740061006e0
06400610072006400200066006f00720020007500740076006500
6b0073006c0069006e00670020006100760020006700720061006
600690073006b00200069006e006e0068006f006c0064002e0020
0048007600690073002000640075002000760069006c002000680
0610020006d0065007200200069006e0066006f0072006d006100
73006a006f006e0020006f006d002000680076006f007200640061
006e0020006400750020006f00700070007200650074007400650
0720020005000440046002f0058002d00310061002d006b006f00
6d00700061007400690062006c00650020005000440046002d006
4006f006b0075006d0065006e007400650072002c002000730065
0020006200720075006b00650072006800e5006e00640062006f0
06b0065006e00200066006f00720020004100630072006f006200
610074002e0020005000440046002d0064006f006b0075006d006
5006e00740065006e00650020006b0061006e002000e50070006e
00650073002000690020004100630072006f00620061007400200
065006c006c00650072002000410064006f006200650020005200
65006100640065007200200034002e003000200065006c006c006
50072002000730065006e006500720065002e>
/PTB
<FEFF005500740069006c0069007a00650020006500730073006
1007300200063006f006e00660069006700750072006100e700f5
0065007300200064006500200066006f0072006d0061002000610
0200063007200690061007200200064006f00630075006d006500
6e0074006f0073002000410064006f00620065002000500044004
600200063006100700061007a0065007300200064006500200073
006500720065006d0020007600650072006900660069006300610
064006f00730020006f0075002000710075006500200064006500
760065006d00200065007300740061007200200065006d0020006
3006f006e0066006f0072006d0069006400610064006500200063
006f006d0020006f0020005000440046002f0058002d003100610
03a0032003000300031002c00200075006d002000700061006400
7200e3006f002000640061002000490053004f002000700061007
200610020006f00200069006e007400650072006300e2006d0062
0069006f00200064006500200063006f006e0074006500fa006400
6f00200067007200e1006600690063006f002e002000500061007
200610020006f00620074006500720020006d0061006900730020
0069006e0066006f0072006d006100e700f500650073002000730
06f00620072006500200063006f006d006f002000630072006900
61007200200064006f00630075006d0065006e0074006f0073002
000500044004600200063006f006d00700061007400ed00760065
0069007300200063006f006d0020006f0020005000440046002f0
058002d00310061002c00200063006f006e00730075006c007400
650020006f0020004700750069006100200064006f00200075007
3007500e100720069006f00200064006f0020004100630072006f0
06200610074002e0020004f007300200064006f00630075006d00
65006e0074006f007300200050004400460020006300720069006
10064006f007300200070006f00640065006d0020007300650072
002000610062006500720074006f007300200063006f006d00200
06f0020004100630072006f006200610074002000650020006f00
2000410064006f006200650020005200650061006400650072002
00034002e0030002000650020007600650072007300f500650073
00200070006f00730074006500720069006f007200650073002e>
/SUO
<FEFF004b00e40079007400e40020006e00e40069007400e4002
000610073006500740075006b007300690061002c0020006b0075
006e0020006c0075006f0074002000410064006f0062006500200
050004400460020002d0064006f006b0075006d0065006e007400
740065006a0061002c0020006a006f0074006b006100200074006
10072006b0069007300740065007400610061006e002000740061
00690020006a006f006900640065006e0020007400e4007900740
07900790020006e006f0075006400610074007400610061002000
5000440046002f0058002d00310061003a0032003000300031003
a007400e400200065006c0069002000490053004f002d00730074
0061006e006400610072006400690061002000670072006100610
066006900730065006e002000730069007300e4006c006c00f600
6e00200073006900690072007400e4006d00690073007400e4002
000760061007200740065006e002e0020004c0069007300e40074
006900650074006f006a00610020005000440046002f0058002d0
0310061002d00790068007400650065006e0073006f0070006900
7600690065006e0020005000440046002d0064006f006b0075006
d0065006e0074007400690065006e0020006c0075006f006d0069
007300650073007400610020006f006e0020004100630072006f0
062006100740069006e0020006b00e400790074007400f6006f00
70007000610061007300730061002e00200020004c0075006f006
4007500740020005000440046002d0064006f006b0075006d0065
006e00740069007400200076006f0069006400610061006e00200
06100760061007400610020004100630072006f00620061007400
69006c006c00610020006a0061002000410064006f00620065002
000520065006100640065007200200034002e0030003a006c006c
00610020006a006100200075007500640065006d006d0069006c0
06c0061002e>
/SVE
<FEFF0041006e007600e4006e00640020006400650020006800e
4007200200069006e0073007400e4006c006c006e0069006e0067
00610072006e00610020006f006d0020006400750020007600690
06c006c00200073006b006100700061002000410064006f006200
650020005000440046002d0064006f006b0075006d0065006e007
400200073006f006d00200073006b00610020006b006f006e0074
0072006f006c006c006500720061007300200065006c006c00650
07200200073006f006d0020006d00e50073007400650020006d00
6f0074007300760061007200610020005000440046002f0058002
d00310061003a0032003000300031002c00200065006e00200049
0053004f002d007300740061006e0064006100720064002000660
0f600720020007500740062007900740065002000610076002000
6700720061006600690073006b007400200069006e006e0065006
800e5006c006c002e00200020004d0065007200200069006e0066
006f0072006d006100740069006f006e0020006f006d0020006800
7500720020006d0061006e00200073006b0061007000610072002
0005000440046002f0058002d00310061002d006b006f006d0070
0061007400690062006c00610020005000440046002d0064006f0
06b0075006d0065006e0074002000660069006e006e0073002000
6900200061006e007600e4006e00640061007200680061006e006
40062006f006b0065006e002000740069006c006c002000410063
0072006f006200610074002e002000200053006b0061007000610
06400650020005000440046002d0064006f006b0075006d006500
6e00740020006b0061006e002000f600700070006e00610073002
000690020004100630072006f0062006100740020006f00630068
002000410064006f0062006500200052006500610064006500720
0200034002e00300020006f00630068002000730065006e006100
720065002e>
/ENU (Cadmus MediaWorks settings for Acrobat Distiller 8.)
>>
/Namespace [
(Adobe)
(Common)
(1.0)
]
/OtherNamespaces [
<<
/AsReaderSpreads false
/CropImagesToFrames true
/ErrorControl /WarnAndContinue
/FlattenerIgnoreSpreadOverrides false
/IncludeGuidesGrids false
/IncludeNonPrinting false
/IncludeSlug false
/Namespace [
(Adobe)
(InDesign)
(4.0)
]
/OmitPlacedBitmaps false
/OmitPlacedEPS false
/OmitPlacedPDF false
/SimulateOverprint /Legacy
>>
<<
/AddBleedMarks false
/AddColorBars false
/AddCropMarks false
/AddPageInfo false
/AddRegMarks false
/ConvertColors /ConvertToCMYK
/DestinationProfileName ()
/DestinationProfileSelector /DocumentCMYK
/Downsample16BitImages true
/FlattenerPreset <<
/PresetSelector /HighResolution
>>
/FormElements false
/GenerateStructure false
/IncludeBookmarks false
/IncludeHyperlinks false
/IncludeInteractive false
/IncludeLayers false
/IncludeProfiles false
/MultimediaHandling /UseObjectSettings
/Namespace [
(Adobe)
(CreativeSuite)
(2.0)
]
/PDFXOutputIntentProfileSelector /DocumentCMYK
/PreserveEditing true
/UntaggedCMYKHandling /LeaveUntagged
/UntaggedRGBHandling /UseDocumentProfile
/UseDocumentBleed false
>>
]
>> setdistillerparams
<<
/HWResolution [2400 2400]
/PageSize [612.000 792.000]
>> setpagedevice
© 2011 by the American Academy of Arts & Sciences
Safety in Cyberspace
Vinton G. Cerf
VINTONG. CERF, a Fellow of the
American Academy since 1995, is
Vice President and Chief Internet
Evangelist for Google Inc. Previ-
ously, he served at mci, the Cor-
poration for National Research Ini-
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx
PAGE  1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx

More Related Content

Similar to PAGE 1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx

New Strategies in Communicating Biotechnology Topics to Concerned Consumers
New Strategies in Communicating Biotechnology Topics to Concerned ConsumersNew Strategies in Communicating Biotechnology Topics to Concerned Consumers
New Strategies in Communicating Biotechnology Topics to Concerned ConsumersUniversity of Florida
 
G.M.O. project
G.M.O. projectG.M.O. project
G.M.O. projectjovelle
 
pros and cons of GMOs
pros and cons of GMOspros and cons of GMOs
pros and cons of GMOsNimraArshad25
 
Low-Spray and Organic Plum Production
Low-Spray and Organic Plum ProductionLow-Spray and Organic Plum Production
Low-Spray and Organic Plum ProductionElisaMendelsohn
 
Low-Spray and Organic Plum Production
Low-Spray and Organic Plum ProductionLow-Spray and Organic Plum Production
Low-Spray and Organic Plum ProductionElisaMendelsohn
 
Biology investigatory project.pdf
Biology investigatory project.pdfBiology investigatory project.pdf
Biology investigatory project.pdfAlanManojraj
 
Isolation and Identification of Bacteria from Peeled and Ready to Eat Pineapp...
Isolation and Identification of Bacteria from Peeled and Ready to Eat Pineapp...Isolation and Identification of Bacteria from Peeled and Ready to Eat Pineapp...
Isolation and Identification of Bacteria from Peeled and Ready to Eat Pineapp...YogeshIJTSRD
 
Gmo papaya summer 14
Gmo papaya summer 14Gmo papaya summer 14
Gmo papaya summer 14AmyDeSa
 
Marketing Mistrust in the Safest Food Supply in Human History
Marketing Mistrust in the Safest Food Supply in Human History Marketing Mistrust in the Safest Food Supply in Human History
Marketing Mistrust in the Safest Food Supply in Human History University of Florida
 
Application of modern biotechnology
Application of modern biotechnologyApplication of modern biotechnology
Application of modern biotechnologyjoiceeeeeey
 
Application of modern biotechnology
Application of modern biotechnologyApplication of modern biotechnology
Application of modern biotechnologyjoiceeeeeey
 
TRANSGENIC FRUIT CROPS.pptx
TRANSGENIC FRUIT CROPS.pptxTRANSGENIC FRUIT CROPS.pptx
TRANSGENIC FRUIT CROPS.pptxReemaNaik9
 
Genetically Modified Organisms and Biotechnology
Genetically Modified Organisms and BiotechnologyGenetically Modified Organisms and Biotechnology
Genetically Modified Organisms and BiotechnologyMorrisCenteno2
 
Fresh Produce Safet1hour2007
Fresh Produce Safet1hour2007Fresh Produce Safet1hour2007
Fresh Produce Safet1hour2007Andy Kleinschmidt
 

Similar to PAGE 1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx (20)

SKAM-17 2004 BALOK: ALAR ISSUE ON APPLES
SKAM-17 2004 BALOK: ALAR ISSUE ON APPLESSKAM-17 2004 BALOK: ALAR ISSUE ON APPLES
SKAM-17 2004 BALOK: ALAR ISSUE ON APPLES
 
New Strategies in Communicating Biotechnology Topics to Concerned Consumers
New Strategies in Communicating Biotechnology Topics to Concerned ConsumersNew Strategies in Communicating Biotechnology Topics to Concerned Consumers
New Strategies in Communicating Biotechnology Topics to Concerned Consumers
 
2015 citra limagrain
2015 citra limagrain2015 citra limagrain
2015 citra limagrain
 
THAKUR.pptx
THAKUR.pptxTHAKUR.pptx
THAKUR.pptx
 
G.M.O. project
G.M.O. projectG.M.O. project
G.M.O. project
 
pros and cons of GMOs
pros and cons of GMOspros and cons of GMOs
pros and cons of GMOs
 
Low-Spray and Organic Plum Production
Low-Spray and Organic Plum ProductionLow-Spray and Organic Plum Production
Low-Spray and Organic Plum Production
 
Low-Spray and Organic Plum Production
Low-Spray and Organic Plum ProductionLow-Spray and Organic Plum Production
Low-Spray and Organic Plum Production
 
Biology investigatory project.pdf
Biology investigatory project.pdfBiology investigatory project.pdf
Biology investigatory project.pdf
 
Isolation and Identification of Bacteria from Peeled and Ready to Eat Pineapp...
Isolation and Identification of Bacteria from Peeled and Ready to Eat Pineapp...Isolation and Identification of Bacteria from Peeled and Ready to Eat Pineapp...
Isolation and Identification of Bacteria from Peeled and Ready to Eat Pineapp...
 
Gmo papaya summer 14
Gmo papaya summer 14Gmo papaya summer 14
Gmo papaya summer 14
 
Marketing Mistrust in the Safest Food Supply in Human History
Marketing Mistrust in the Safest Food Supply in Human History Marketing Mistrust in the Safest Food Supply in Human History
Marketing Mistrust in the Safest Food Supply in Human History
 
Application of modern biotechnology
Application of modern biotechnologyApplication of modern biotechnology
Application of modern biotechnology
 
Application of modern biotechnology
Application of modern biotechnologyApplication of modern biotechnology
Application of modern biotechnology
 
Fruit breeding 656
Fruit breeding 656Fruit breeding 656
Fruit breeding 656
 
TRANSGENIC FRUIT CROPS.pptx
TRANSGENIC FRUIT CROPS.pptxTRANSGENIC FRUIT CROPS.pptx
TRANSGENIC FRUIT CROPS.pptx
 
2015 isu night event
2015 isu night event2015 isu night event
2015 isu night event
 
Genetically Modified Organisms and Biotechnology
Genetically Modified Organisms and BiotechnologyGenetically Modified Organisms and Biotechnology
Genetically Modified Organisms and Biotechnology
 
UA Green Fund Proposal: Production of Edible Gourmet Mushrooms
UA Green Fund Proposal: Production of Edible Gourmet MushroomsUA Green Fund Proposal: Production of Edible Gourmet Mushrooms
UA Green Fund Proposal: Production of Edible Gourmet Mushrooms
 
Fresh Produce Safet1hour2007
Fresh Produce Safet1hour2007Fresh Produce Safet1hour2007
Fresh Produce Safet1hour2007
 

More from alfred4lewis58146

For this assignment, students will need to observe the activities th.docx
For this assignment, students will need to observe the activities th.docxFor this assignment, students will need to observe the activities th.docx
For this assignment, students will need to observe the activities th.docxalfred4lewis58146
 
For this assignment, select a human service organization from .docx
For this assignment, select a human service organization from .docxFor this assignment, select a human service organization from .docx
For this assignment, select a human service organization from .docxalfred4lewis58146
 
For this Assignment, read the case study for Claudia and find tw.docx
For this Assignment, read the case study for Claudia and find tw.docxFor this Assignment, read the case study for Claudia and find tw.docx
For this Assignment, read the case study for Claudia and find tw.docxalfred4lewis58146
 
For this assignment, download the A6 code pack. This zip fil.docx
For this assignment, download the A6 code pack. This zip fil.docxFor this assignment, download the A6 code pack. This zip fil.docx
For this assignment, download the A6 code pack. This zip fil.docxalfred4lewis58146
 
For this assignment, create infographic using the Canva website..docx
For this assignment, create infographic using the Canva website..docxFor this assignment, create infographic using the Canva website..docx
For this assignment, create infographic using the Canva website..docxalfred4lewis58146
 
For this assignment, compare  California during the Great Depression.docx
For this assignment, compare  California during the Great Depression.docxFor this assignment, compare  California during the Great Depression.docx
For this assignment, compare  California during the Great Depression.docxalfred4lewis58146
 
For this assignment, create a 10- to 12-slide presentation in Mi.docx
For this assignment, create a 10- to 12-slide presentation in Mi.docxFor this assignment, create a 10- to 12-slide presentation in Mi.docx
For this assignment, create a 10- to 12-slide presentation in Mi.docxalfred4lewis58146
 
For this assignment, begin by reading chapters 12-15 in Dr. Bells t.docx
For this assignment, begin by reading chapters 12-15 in Dr. Bells t.docxFor this assignment, begin by reading chapters 12-15 in Dr. Bells t.docx
For this assignment, begin by reading chapters 12-15 in Dr. Bells t.docxalfred4lewis58146
 
For this assignment, assume you are the new Secretary of Homelan.docx
For this assignment, assume you are the new Secretary of Homelan.docxFor this assignment, assume you are the new Secretary of Homelan.docx
For this assignment, assume you are the new Secretary of Homelan.docxalfred4lewis58146
 
For this assignment, address the following promptsIntroductor.docx
For this assignment, address the following promptsIntroductor.docxFor this assignment, address the following promptsIntroductor.docx
For this assignment, address the following promptsIntroductor.docxalfred4lewis58146
 
For this assignment, analyze the play by focusing on one of the .docx
For this assignment, analyze the play by focusing on one of the .docxFor this assignment, analyze the play by focusing on one of the .docx
For this assignment, analyze the play by focusing on one of the .docxalfred4lewis58146
 
For this assignment I would like you to answer these questions.docx
For this assignment I would like you to answer these questions.docxFor this assignment I would like you to answer these questions.docx
For this assignment I would like you to answer these questions.docxalfred4lewis58146
 
For the Weekly Reports I need 2 reports. For the First two weeks the.docx
For the Weekly Reports I need 2 reports. For the First two weeks the.docxFor the Weekly Reports I need 2 reports. For the First two weeks the.docx
For the Weekly Reports I need 2 reports. For the First two weeks the.docxalfred4lewis58146
 
For the shortanswer questions,you will need to respo.docx
For the shortanswer questions,you will need to respo.docxFor the shortanswer questions,you will need to respo.docx
For the shortanswer questions,you will need to respo.docxalfred4lewis58146
 
For the sake of argument (this essay in particular), lets prete.docx
For the sake of argument (this essay in particular), lets prete.docxFor the sake of argument (this essay in particular), lets prete.docx
For the sake of argument (this essay in particular), lets prete.docxalfred4lewis58146
 
For the proposal, each student must describe an interface they a.docx
For the proposal, each student must describe an interface they a.docxFor the proposal, each student must describe an interface they a.docx
For the proposal, each student must describe an interface they a.docxalfred4lewis58146
 
For the project, you will be expected to apply the key concepts of p.docx
For the project, you will be expected to apply the key concepts of p.docxFor the project, you will be expected to apply the key concepts of p.docx
For the project, you will be expected to apply the key concepts of p.docxalfred4lewis58146
 
For the past several weeks you have addressed several different area.docx
For the past several weeks you have addressed several different area.docxFor the past several weeks you have addressed several different area.docx
For the past several weeks you have addressed several different area.docxalfred4lewis58146
 
For the Mash it Up assignment, we experimented with different ways t.docx
For the Mash it Up assignment, we experimented with different ways t.docxFor the Mash it Up assignment, we experimented with different ways t.docx
For the Mash it Up assignment, we experimented with different ways t.docxalfred4lewis58146
 
For the first time in modern history, the world is experiencing a he.docx
For the first time in modern history, the world is experiencing a he.docxFor the first time in modern history, the world is experiencing a he.docx
For the first time in modern history, the world is experiencing a he.docxalfred4lewis58146
 

More from alfred4lewis58146 (20)

For this assignment, students will need to observe the activities th.docx
For this assignment, students will need to observe the activities th.docxFor this assignment, students will need to observe the activities th.docx
For this assignment, students will need to observe the activities th.docx
 
For this assignment, select a human service organization from .docx
For this assignment, select a human service organization from .docxFor this assignment, select a human service organization from .docx
For this assignment, select a human service organization from .docx
 
For this Assignment, read the case study for Claudia and find tw.docx
For this Assignment, read the case study for Claudia and find tw.docxFor this Assignment, read the case study for Claudia and find tw.docx
For this Assignment, read the case study for Claudia and find tw.docx
 
For this assignment, download the A6 code pack. This zip fil.docx
For this assignment, download the A6 code pack. This zip fil.docxFor this assignment, download the A6 code pack. This zip fil.docx
For this assignment, download the A6 code pack. This zip fil.docx
 
For this assignment, create infographic using the Canva website..docx
For this assignment, create infographic using the Canva website..docxFor this assignment, create infographic using the Canva website..docx
For this assignment, create infographic using the Canva website..docx
 
For this assignment, compare  California during the Great Depression.docx
For this assignment, compare  California during the Great Depression.docxFor this assignment, compare  California during the Great Depression.docx
For this assignment, compare  California during the Great Depression.docx
 
For this assignment, create a 10- to 12-slide presentation in Mi.docx
For this assignment, create a 10- to 12-slide presentation in Mi.docxFor this assignment, create a 10- to 12-slide presentation in Mi.docx
For this assignment, create a 10- to 12-slide presentation in Mi.docx
 
For this assignment, begin by reading chapters 12-15 in Dr. Bells t.docx
For this assignment, begin by reading chapters 12-15 in Dr. Bells t.docxFor this assignment, begin by reading chapters 12-15 in Dr. Bells t.docx
For this assignment, begin by reading chapters 12-15 in Dr. Bells t.docx
 
For this assignment, assume you are the new Secretary of Homelan.docx
For this assignment, assume you are the new Secretary of Homelan.docxFor this assignment, assume you are the new Secretary of Homelan.docx
For this assignment, assume you are the new Secretary of Homelan.docx
 
For this assignment, address the following promptsIntroductor.docx
For this assignment, address the following promptsIntroductor.docxFor this assignment, address the following promptsIntroductor.docx
For this assignment, address the following promptsIntroductor.docx
 
For this assignment, analyze the play by focusing on one of the .docx
For this assignment, analyze the play by focusing on one of the .docxFor this assignment, analyze the play by focusing on one of the .docx
For this assignment, analyze the play by focusing on one of the .docx
 
For this assignment I would like you to answer these questions.docx
For this assignment I would like you to answer these questions.docxFor this assignment I would like you to answer these questions.docx
For this assignment I would like you to answer these questions.docx
 
For the Weekly Reports I need 2 reports. For the First two weeks the.docx
For the Weekly Reports I need 2 reports. For the First two weeks the.docxFor the Weekly Reports I need 2 reports. For the First two weeks the.docx
For the Weekly Reports I need 2 reports. For the First two weeks the.docx
 
For the shortanswer questions,you will need to respo.docx
For the shortanswer questions,you will need to respo.docxFor the shortanswer questions,you will need to respo.docx
For the shortanswer questions,you will need to respo.docx
 
For the sake of argument (this essay in particular), lets prete.docx
For the sake of argument (this essay in particular), lets prete.docxFor the sake of argument (this essay in particular), lets prete.docx
For the sake of argument (this essay in particular), lets prete.docx
 
For the proposal, each student must describe an interface they a.docx
For the proposal, each student must describe an interface they a.docxFor the proposal, each student must describe an interface they a.docx
For the proposal, each student must describe an interface they a.docx
 
For the project, you will be expected to apply the key concepts of p.docx
For the project, you will be expected to apply the key concepts of p.docxFor the project, you will be expected to apply the key concepts of p.docx
For the project, you will be expected to apply the key concepts of p.docx
 
For the past several weeks you have addressed several different area.docx
For the past several weeks you have addressed several different area.docxFor the past several weeks you have addressed several different area.docx
For the past several weeks you have addressed several different area.docx
 
For the Mash it Up assignment, we experimented with different ways t.docx
For the Mash it Up assignment, we experimented with different ways t.docxFor the Mash it Up assignment, we experimented with different ways t.docx
For the Mash it Up assignment, we experimented with different ways t.docx
 
For the first time in modern history, the world is experiencing a he.docx
For the first time in modern history, the world is experiencing a he.docxFor the first time in modern history, the world is experiencing a he.docx
For the first time in modern history, the world is experiencing a he.docx
 

Recently uploaded

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 

Recently uploaded (20)

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 

PAGE 1Technophobia = Poisoned Fruit by Henry MillerFear-Monge.docx

  • 1. PAGE 1Technophobia = Poisoned Fruit by Henry MillerFear- Mongering About Recombinant DNA-Modified Crops Hurts Farmers and Consumers Most people are familiar with the unappetizing browning of apples shortly after they’re cut or bitten into. The good news is that molecular biologists have devised a clever way to prevent it. The bad news is that organizations that represent apple growers are implacably opposed to the improved fruit. And therein lies a cautionary tale. The biology of apples is complicated but fascinating. Almost all commercial apple varieties are grafted onto hardy root stocks that have dwarfing genes to keep the trees on apple plantations short and easier to harvest. Therefore, the DNA of the roots is different from the DNA of the fruit tree. Apples’ blossoms are self-incompatible with respect to fertilization so they must be cross-pollinated by insects (primarily bees) in order to develop fruit. Special pollinating trees are found in most orchards as a source of pollen for the fruit tree blossoms. These pollinating trees (often crab apples) have still different DNA. Once the pollen fertilizes the apple blossom the fruit can develop. The pollen DNA mixes with the flower ovum DNA and the resulting hybrid seed embryo grows and produces a hormone that directs other parts of the flower (which contains only flower DNA) to develop into the fruit. Thus, the DNA in the fruit itself is different from the DNA in the seeds. This difference in DNA between the fruit and the seeds is why different varieties of apples can be grown in close proximity and yet maintain their differences. Because the DNA in the fruit
  • 2. is only from the flower, not the pollen, Granny Smith apples growing next to Golden Delicious growing next to Red Delicious all produce apples with their own unique DNA. Arctic Apple A Canadian company has petitioned both the U.S. and Canadian federal regulatory authorities to permit the sale of a new variety called Arctic® Apple that contains a commercially significant trait. It is highly resistant to the unappetizing browning that occurs when an apple is cut or bruised. The biology that made this possible is elegant and intriguing. Enzymatic browning is caused by the apple’s chemical reaction to cell injury, such as when the fruit is bitten or sliced, which ruptures the cells and triggers a chemical reaction between an enzyme called polyphenol oxidase (PPO) and chemicals in the apple that cause the apple flesh to turn brown. A family of four genes controls the majority of PPO production, so scientists turned off those genes—and lo and behold, Arctic Apples don’t manifest enzymatic browning. Ordinarily, this development of another new apple variety would be a nonevent—except, perhaps, for apple growers and retailers who would, one would expect, relish a new product with additional appeal to consumers—but the seeds of discontent have sprouted: Because the shutoff of the four genes was done with recombinant DNA technology, there have been objections and consternation. Simply because this highly precise and predictable methodology was used, some apple growers are worried that this new variety could constitute a threat to other apple crops. The U.S. Apple Association (USApple), the industry’s trade group, says that it “supports advancements from technology and genetics and
  • 3. genomics research,” and that “benefits can include attributes such as quality…”—which would certainly include nonbrowning apples—but, paradoxically, USApple has also come out firmly against the introduction of the Arctic Apple. USApple has emphasized that its objections are “not based on any concern about human health and safety,” but “consumers like their apples and are not calling for these new ‘nonbrowning’ cultivars.” How lame. Are consumers clamoring for apple cultivars that are more resistant to predation by insects, viruses, or fungi? There are several reasons why their concerns are unfounded. First, as described, farmers and plant breeders have been creating new varieties of apples for millennia. The new molecular techniques for accomplishing this are far more precise, predictable, and conservative. Second, there is vast experience in both cultivation and in our diets with recombinant DNA-modified varieties of various crops. Farmers in three dozen countries have cumulatively cultivated more than 1.25 billion hectares (about 3.75 billion acres) of them, and North Americans alone have consumed more than 3 trillion servings of food or ingredients from recombinant DNA-modified plants. There has never been a single documented case of disruption of an ecosystem or harm to a person. Extensive global scientific research has identified no unique health risks associated with recombinant DNA-modified crops or food, and the apple growers associations (except perhaps the organic growers, who often seem to reside in a parallel universe) have no concerns about the safety of this nonbrowning apple.
  • 4. Could the new apple “contaminate” other varieties? Research has shown that the cross-pollination potential of apples is limited to about 150 feet. Beyond that distance, cross pollination of apples is virtually nil. The DNA in fruit comes from the parental tree, not the pollen that fertilizes the apple blossom. When someone eats a Golden Delicious apple, 100% of the DNA (and protein, carbohydrates, and other compounds) is from Golden Delicious trees. The entire apple industry owes the diversity of varieties to different gene expression patterns. A Golden Delicious apple looks and tastes different from a Red Delicious because different apple genes are expressed. Recent genomic sequencing shows there are about 57,000 genes in the Golden Delicious apple. One must look beyond the science to understand how the apple growers’ associations can be against new varieties of apples simply because four of the 57,000 apple genes have been turned off. The reason is short-sighted economics. A spokesperson for the Northwest Horticultural Council ascribed the apple industry’s opposition to the potential for “severe adverse marketing issues to confront both organic and traditional apple growers” if the Arctic Apple were to be introduced. The organic fruit industry is especially antagonistic to the Arctic Apple. They claim that the organic status of their fruit is threatened by cross-pollination from any recombinant DNA- modified apple and are calling for a ban on all such varieties. However, no organic grower has ever lost organic certification from exposure to trace amounts of recombinant DNA-modified seed or pollen, just as pesticide wafting onto organic crops from neighboring fields does not jeopardize organic status. “Organic” status is conferred if the grower agrees to use only a restricted set of techniques and practices but has nothing at all
  • 5. to do with the quality, safety, or characteristics of the product itself. Fear-mongering about recombinant DNA-modified crops has become the stock-in-trade of some antitechnology environmental organizations and the organic food industry. Therefore, apple growers and their trade groups fear the possibility that their products will no longer be the “apple of the consumer’s eye” because of negative propaganda from the organic food and antibiotechnology organizations. There are even more compelling reasons than pleasing their customers for apple growers and their trade groups to embrace the new technology: the experiences, both positive and negative, of other farming sectors in the recent past. Recombinant DNA Technology Consider, for example, the cautionary tale of the Kona coffee industry in Hawaii, which in 2008 pushed the Hawaii County Council to ban the growing of recombinant DNA-modified beans on the Big Island. The growers felt that the use of the new technology would risk decades of building the reputation of Kona coffee as a brand. Beans developed using recombinant DNA technology may not qualify as “specialty coffee,” and therefore, it was feared that they would command a lower market price. The industry may now be singing a different tune. Big Island coffee growers are facing a dire threat to their crops that didn’t exist four years ago: Infestations of the Coffee Berry Borer beetle, which evolves resistance to pesticidal sprays, were first discovered in Kona in 2010 and have now been confirmed in all parts of west Hawaii and in some other areas as well. Faced with the threat of devastation of their crops, the industry is now
  • 6. desperate for any measures to combat the beetle. Recombinant DNA technology has been widely and successfully used in corn, cotton, papaya, and other crops to introduce resistance to pests. Hawaiian coffee farmers and their organizations should have heeded the positive example of the Rainbow variety of papaya, Hawaii’s fifth largest crop. By inserting a single gene from a virus into papayas, scientists have made them virus-resistant. Although the biological mechanism is different, the effect is similar to vaccination of people and animals using weakened or killed viruses. The recombinant DNA-modified Rainbow papaya has resurrected Hawaii’s $64 million-a-year industry, which was moribund 15 years ago because of the predations of papaya ringspot virus. Wheat farming offers yet another example. By 2004, Monsanto, the world’s leader in the production of seeds for genetically engineered crops, had made substantial progress in the development of genetically engineered wheat varieties for North America. But suddenly in that year, the company scrapped its wheat program in large part because of opposition from North American grain merchants and growers. European countries and Japan, which have traditionally imported about 45% of U.S. wheat exports, have been resistant to recombinant DNA-modified crops and food derived from them. However, American growers and millers have had a change of heart. Wheat farming is a struggling industry in the United States, in large part because it has not received the technological boost from recombinant DNA technology that has hugely benefited the corn and soybean sectors. U.S. wheat acreage is down about one-third from its peak in the early 1980s, due to reduced profitability compared with alternative crops. Therefore, in 2006, a coalition of U.S. wheat industry
  • 7. organizations called for access to recombinant DNA-modified wheat varieties with enhanced traits, and a survey released in 2009 by the U.S. national association of wheat growers found that more than three-quarters of U.S. farmers wanted access to genetically improved varieties with resistance to pests, disease, drought, and frost. Such varieties are important as plant scientists and farmers continue to battle diseases such as leaf rust, the world’s most common wheat disease, which can lead to yield loss of up to 20%. In Kansas, the heart of the U.S. wheat belt, for example, leaf rust destroyed a shocking 14% of the wheat crop in 2007. Apple growers should take note of the lessons learned by others the hard way. There is little doubt consumers will like and even pay a premium for the nonbrowning trait in apples. Instead of fighting the introduction of this improved, consumer-friendly product (as well as others that could follow), the apple growers’ associations should sow the seeds of greater sales and security of their harvest by mounting a truthful, positive ad campaign to trumpet the new advances in molecular biology applied to their products. They should bear in mind that technophobia often breeds poisoned fruit. Work Cited Miller, Henry. “Technophobia = Poisoned Fruit.” Genengnews.com. Genetic Engineering & Biotechnology, 1 Oct. 2012. Web. 21 Apr. 2014. PAGE 4Technology & the Future of Violence by Gabriella Blum
  • 8. How should our defense strategy evolve in a world of easily accessible mini-drones, lethal nanobots, and DIY warfare? You walk into your shower and find a spider. You are not an arachnologist. You do, however, know that one of the following options is possible: The spider is real and harmless. The spider is real and venomous. Your next-door neighbor, who dislikes your noisy dog, has turned her personal surveillance spider (purchased from “Drones ‘R Us” for $49.95) loose and is monitoring it on her iPhone from her seat at a sports bar downtown. The pictures of you, undressed, are now being relayed on several screens during the break of an NFL game, to the mirth of the entire neighborhood. Your business competitor has sent his drone assassin spider, which he purchased from a bankrupt military contractor, to take you out. Upon spotting you with its sensors, and before you have any time to weigh your options, the spider shoots an infinitesimal needle into a vein in your left leg and takes a blood sample. As you beat a retreat out of the shower, your blood sample is being run on your competitor’s smartphone for a DNA match. The match is made against a DNA sample of you that is already on file at EVER.com (Everything about Everybody), an international DNA database (with access available for $179.99). Once the match is confirmed (a matter of seconds), the assassin spider outruns you with incredible speed into your bedroom, pausing only long enough to dart another needle, this time containing a lethal dose of a synthetically produced, undetectable poison, into your bloodstream. Your assassin, who
  • 9. is on a summer vacation in Provence, then withdraws his spider under the crack of your bedroom door and out of the house, and presses its self-destruct button. No trace of the spider or the poison it carried will ever be found by law enforcement authorities. Smaller, Cheaper Weapons & DIY Drones This is the future. According to some uncertain estimates, insect-sized drones will become operational by 2030. These drones will be able to not only conduct surveillance, but to act on it with lethal effect. Over time, it is likely that miniaturized weapons platforms will evolve to be able to carry not merely the quantum of lethal material needed to execute individuals, but also weapons of mass destruction sufficient to kill thousands. Political scientist James Fearon has even speculated that at some more distant point in time, individuals will be able to carry something akin to a nuclear device in their pockets. Assessing the full potential of technology as it expands (and shrinks) requires a scientific expertise beyond my ken. The spider in the shower is merely an inkling of what probably lies in store. But even a cursory glance at ongoing projects tells us that the mind-bending speed at which robotics and nanobotics are developing means that a whole range of weapons is growing smaller, cheaper, and easier to produce, operate, and deploy from great distances. If the mis-en-scene above seems unduly alarmist or too futuristic, consider the following: Drones the size of a cereal box are already widely available, can be controlled by an untrained user with an iPhone, cost roughly $300, and come equipped with cameras. Palm-sized drones are commercially available as toys (such as the Hexbug), although they are not quite insect-sized and their sensory input is limited to primitive perception of light and sound. True minidrones are still in the developmental stages, but the technology is progressing quickly. The technological challenges
  • 10. seem to be not in making the minidrones fly, but in making them do so for long periods of time while also carrying some payload (surveillance or lethal capacity). The flagship effort in this area appears to be the Micro Autonomous Systems and Technology (MAST) Collaborative Technological Alliance, which is funded by the U.S. Army and led by BAE Systems and U.C. Berkeley, among others. The Alliance’s most recent creations are the Octoroach and the BOLT (Bipedal Ornithopter for Locomotion Transitioning). The Octoroach is an extremely small robot with a camera and radio transmitter that can cover up to 100 meters on the ground, and the BOLT is a winged robot designed to increase speed and range on the ground. Scientists at Cornell University, meanwhile, recently developed a hand-sized drone that uses flapping wings to hover in flight, although its stability is still quite limited and battery weight remains a problem. A highly significant element of the Cornell effort, however, is that the wing components were made with a 3-D printer. This heralds a not-too-distant future in which a person at home can simply download the design of a drone, print many of the component parts, assemble them with a camera, transmitter, battery, etc., and build themselves a fully functioning, insect-sized surveillance drone. Crawling minidrones have clearly passed the feasibility threshold and merely await improvements in range and speed to attain utility on the battlefield and viability in the private sector. Swarms of minidrones are also being developed to operate with a unified goal in diffuse command and control structures. Robotics researchers at the University of Pennsylvania recently released a video of what they call “nano quadrotors”—flying mini-helicopter robots that engage in complex movements and pattern formation. A still more futuristic technology is that of nanobots or nanodrones. The technology for manufacturing microscopic
  • 11. robots has been around for a few years, but recent research has advanced to the point of microscopic robots that can assemble themselves and even perform basic tasks. The robotics industry, both governmental and private, is also exerting great efforts to enhance the autonomous capabilities of robots, that is, to be able to program a robot to perform complex tasks with only a few initial commands and no continuous control. Human testing for a microrobot that can be injected into the eye to perform certain surgical tasks is now on the horizon. Similar developments have been made toward nanobots that will clear blocked arteries and perform other procedures. Now, situate the robotics technology alongside other technological and scientific advancements—the Internet, telecommunications, and biological engineering—all of which empower individuals to do both good and terrible things to others. From here, it is not hard to conceptualize a world rife with miniature, possibly molecule-sized, means of inflicting harm on others, from great distances and under clandestine conditions. When invisible remote weapons become ubiquitous, neither national boundaries nor the lock on our front door will guarantee us an effective line of defense. As the means to inflict violence from afar become more widely available, both individual threat and individual vulnerability increase to a hitherto unknown degree. When the risk of being detected or held accountable diminishes, inhibitions regarding violence decrease. Whether political or criminal, violence of every kind becomes easier to inflict and harder to prevent or account for. Ultimately, modern technology makes individuals at once vulnerable and threatening to all other individuals to unprecedented degrees: we are all vulnerable—and all menacing. The Future of War
  • 12. In this essay I take on some of the possible ramifications of these technological advances for the potential incidence of violence and its future effects on the existing legal and political order. I first consider the special features of new weapons technologies that, in my mind, are likely to make violence more possible and more attractive; these are proliferation, remoteness, and concealment. All in all, I argue that technology has found a way to create “perfect weapons”—altogether distant, invisible, and untraceable, essentially generating a more leveled playing field among individuals, groups, and states. I then reflect on the implications of this development for the traditional legal and political categories—national and international, private and public, citizen and alien, war and crime—that still serve as the basis for much of existing regulation of violence, and argue that these juxtapositions are becoming increasingly vague and inapplicable as rationales for regulation of new threats. Finally, I venture to imagine some broader themes of the future defense against the threat of new weapons, both on the international level (a move to global policing) and on the domestic level (privatization of defense). I argue that as threats increasingly ignore conventional boundaries or nationalities and become more individualized, the traditional division of labor between government and citizens and between domestic and international becomes impractical. National defense will require a different mix of unilateralism and international cooperation. Personal defense will have to rely more on diffuse, private, person-to-person mechanisms of protection, as well as concede more power to the government. The very concept of state sovereignty—what it means domestically and what it means externally—would have to be reimagined, given the new strategic environment. Several preliminary observations are in order. The first is a caveat: To a significant degree, my essay focuses on the
  • 13. technological threat side of the equation. It does not envisage the full line of possible complementary defenses. This discrepancy inevitably produces a somewhat myopic picture of the consequences of new technology. Most technological innovations relating to weapons, biology, or the cyber world are closely followed by apprehensions of Armageddon—so much so that in some cases, there have been preemptive efforts to ban the use of these technologies. Take, for instance, the 1899 treaty to ban balloon air warfare, which is still in force for its signatories (among them the United States). Genetic and biological engineering, which can save and improve lives on a mass scale, has also been met with criticism about the impropriety of “Man playing God” and predictions of the end of the human race as we know it. And yet the world still stands, despite the existence of destructive capabilities that can blow up Planet Earth hundreds of times over. In fact, some credit the very existence of nuclear weapons and the accompanying nuclear arms race for a reduction in overall violence. Still, history has proven that offensive capabilities, at least for a space in time, usually outrun defensive capabilities. In the robotic context especially, as costs go down, availability grows and global threat grows with it. Even if defensive technologies catch up with present threats and many of the concerns raised in this essay could be set aside, it is always useful to continue to think about defense as it should evolve vis-à-vis the micro- world in comparison with more traditional modes of defense. Moreover, it is unclear that the case of meeting threats with equal threats—as in the case of nuclear weapons—would yield a similar outcome of mutual deterrence when it comes to personalized weapons of the kind I imagine here. For all these reasons, I find it appropriate, for the purposes of this essay and with the caveat described in mind, to focus on the threat/offense side of the equation.
  • 14. A second observation is a variation on the first, and has to do with the different roles and functions of technology in general and robots specifically. Like all machines, robots can be put to good or bad use, and the “good” or “bad” often depends on where one stands. On today’s battlefields, robots serve many functions, ranging from sweeping for Improvised Explosive Devices (IEDs), to medical evacuation, supply chain management, surveillance, targeting, and more. In this essay, I focus on technology’s “life-taking,” rather than “life-saving,” functions, while keeping in mind that the same systems can be put to use to save victims of atrocities just as easily as they can be deployed for more pernicious purposes. From among all types of robots available, I focus mostly on robots that are miniaturized, potentially invisible, which make detection and accountability a great deal more difficult. This is what also situates the “spiders” within the broader technological developments of the Internet, bioengineering, and the like, which, together, constitute an environment in which the threat is largely invisible. Again, although their full scientific and operational potential is unknown as of yet, I assume that some version of miniaturized drones—whether independently operated or deployed off of larger structures that carry them to their target—is a real possibility. Socialization has always been essential for survival. The Internet, media, telecommunications, travel, and commerce have all made the world smaller and strengthened global interconnectedness and socialization. In his recent eloquent and wide-ranging book, Harvard psychologist Steven Pinker argues that our present society is the least violent in recorded history, in part, because technology, trade, and globalization have made us more reasoned, and in turn, more averse to violence. Notwithstanding Pinker’s powerful account, the very same technology that brings people closer—computers,
  • 15. telecommunications, robotics, biological engineering, and so on—now also threatens to enable people to do infinitely greater to each other. Whether advanced technology really threatens single-handedly to reverse our trajectory toward a less violent world is impossible to predict, precisely because the threat that derives from technological advances is only one manifestation of a sea- change in social and cultural relations which technology as a whole brings about. Put differently, threats derive from the combination of capabilities and motivations to engage in harmful activities. Technology influences both capabilities and motivations, but not in a single trajectory; the technology to inflict harm is countered by the technology to prevent or correct against it, and motivations to inflict harm are constantly shaped and reshaped by the local and global environments. Any assessment of the future level of threat brought about by new weapons technologies must thus engage with predictions about the growth of capabilities to inflict violence on the one hand, and the growth of or decline in motivations to inflict violent harm, on the other. As I earlier noted, I am focusing here on the capabilities to inflict harm and their effects on the possible motivations to harm, but only in the narrow context in which some underlying motivation to injure others exists. Of course, if political, ideological, or personal motivations for harm are significantly reduced, for instance, because interconnectivity and interdependence diminish violent hatred, demonization of others, or the attractiveness of violence as the means of promoting ideological goals, we have less to worry about. With all their uncertainties, however, it seems to me that the lethal capabilities of miniaturized technologies will spread well
  • 16. before what has been assumed to be pacifying social forces, whether the Internet or reason, will have operated to turn much more of our world into a peaceful place. Even if they do not, considering those features of new weapons technologies that enhance the capability—and perhaps, therefore, the motivation—for violence warrant special attention. Violence, of course, does not require fancy weapons. Even in our present age, it took mostly machetes for Hutus to kill 800,000 Tutsis and moderate Hutus in the course of only 100 days. Individuals everywhere are already vulnerable to the proliferation of weapons. According to some estimates, there are 90 guns for every 100 people in the United States, and more than 800 million firearms worldwide. Between 10,000 and 20,000 people are killed annually in gun-related homicides in the United States. These homicides account for two-thirds of all murder cases. When people want to kill other people, they can. And yet, three features of new weapons technology— proliferation, remoteness, and concealment—make violence more likely. All three are already present to some degree in existing weapons, but new technology integrates and intensifies them in a way that significantly enhances their potential threat. In what follows I discuss these three features in greater detail. Work Cited Blum, Gabriela. “ Technology & the Future of Violence.” Hoover.org. Leland Stanford Junior University, 17 Aug. 2012. Web. 21 Apr. 2014. What are the Consequences of Being Disconnected in a Broadband- Connected World?
  • 17. John B. Horrigan © 2011 by the American Academy of Arts & Sciences JOHNB. HORRIGAN is Vice Pres- ident of Policy and Research at TechNet, where he leads research on technology, innovation, and telecommunications policy. Previ- ously, he was part of an fcc team that developed the National Broad- band Plan (nbp), designing and conducting the fcc’s ½rst national survey on broadband adoption and usage. The survey ½ndings were highlighted in the nbp’s ½rst working paper, Broadband Adoption and Use in America. He also served as Associate Director of Research for the Pew Internet & American Life Project. Ten years ago, the debate over the digital divide was mainly a binary one about access: some people had a computer (and therefore dial-up access to the Internet), and some did not. This disparity was widely thought to be unfair because not all mem- bers of society could take advantage of the brave new world of the Internet–that is, the easy con- nectivity to other people and a wealth of informa- tion. Those without access were cut off from the bene½ts of communicating with others (for the most part via email and sometimes on more orga- nized many-to-many groups, such as Listservs).
  • 18. Stakeholders should embrace a different framing of the digital divide, one that acknowledges the need for a broader range of policy measures to address imbalance in the adoption of broadband Internet. While the digital divide debate should not abandon equity arguments, it should also consider 17 Abstract: The evolution of the Internet in the past decade–from a slow, stationary, and primarily com- munications-based technology to a mobile, fast technology that supports a range of communication, participatory, and transactional applications–has made access more valuable, and disconnection more consequential, for individuals. This evolution means that stakeholders should embrace a different fram- ing of the digital divide, focusing on the costs of digital exclusion. These costs can fall on an individual, if the Internet is the only way to carry out some tasks, and on society, if expensive and less-ef½cient lega- cy systems must be maintained to serve a shrinking minority without access. Whereas the digital divide debate concerns technology scarcity for certain population segments, addressing the costs ofdigital exclu- sion is about developing people’s capacity to manage today’s abundance of digital resources. This essay offers suggestions on a framework to develop tools that will enable individuals to take advantage of the affordances of broadband. the costs to individuals and to society of having a sizable portion of the popula- tion offline. The high and rising cost of
  • 19. digital exclusion makes a lack of Internet access more disadvantageous today than a decade ago. Furthermore, lower levels of engagement with online resources among those who are online are more consequential than a few years ago. Policy measures to address the inequi- ties of the digital divide have rightly fo- cused on providing access to necessary hardware and giving users the computer skills to negotiate the basics of an online session. Some initiatives refurbished old computers and either gave them to peo- ple who could not otherwise afford them or sold them at a cut rate. Grant pro- grams–funded by the federal govern- ment, states, or localities–were under- taken to support hardware and training for low-income people. Nonpro½t orga- nizations also seized the opportunity to bring access to less well-off Americans; some managed to scale their initiatives regionally or nationally. Given the importance of broadband in carrying out everyday tasks, such mea- sures are still crucial, but alone are not suf½cient to fully support online adop- tion and use. In addition, policy-makers and other stakeholders must give people the resources to cultivate a wider set of digital skills, such as media literacy, the ability to access civic information, and pro½ciency in managing personal priva- cy. Users must also understand that they
  • 20. have an obligation to educate themselves on the skills needed to participate in an increasingly broadband-mediated world. The Internet’s expanding role as a con- duit to performing important daily func- tions has increased the need for tools to help users negotiate an ever more com- plex online environment. This essay begins with a data-driven discussion of how online access has changed in the past decade. It reviews trends in Internet and broadband adop- tion, as well as mobile adoption, while also examining the varying levels of engagement with digital tools across the user population. Second, the essay re- views the literature on technology adop- tion and user behavior, focusing on the role of skills in user engagement with on- line resources as well as factors that en- courage or inhibit skill development. Finally, after arguing that user support sys- tems are necessary in today’s online world, the essay offers suggestions to stakeholders on how to create such systems. As surveys from the Pew Research Cen- ter’s Internet & American Life Project have documented, online access and use in the United States have evolved over the past decade. Notwithstanding a recent slowdown in the growth of broadband adoption, far more Americans today con- nect to the Internet using an “always on”
  • 21. high-speed connection than was the case just a few years ago (see Figure 1). Data gathered at the end of 2009 and in the ½rst quarter of 2010 show that some two-thirds of Americans have broadband access at home. The Federal Communi- cations Commission (fcc) survey con- ducted in connection with the National Broadband Plan (nbp) found in Novem- ber 2009 that 65 percent of Americans had broadband; a Pew survey conducted in April 2010 found that 66 percent of Americans had broadband at home. Data gathered by the National Telecommuni- cations & Information Administration (ntia) in 2009 and 2010 census surveys show similar trends. In 2009, the ntia reported that 63.5 percent of households had high-speed Internet access, a ½gure that had grown to 68 percent by October 2010.1 More Americans are Internet users than home broadband users, as some Internet users have access at a place other 18 Being Discon- nected in a Broadband- Connected World
  • 22. Dædalus, the Journal of the American Academy of Arts & Sciences than home (such as work or a library), and some still use dial-up Internet con- nections. Overall, according to the ntia , 72 percent of Americans were Internet users in October 2010. Many U.S. policy-makers have become particularly focused on how broadband adoption in the United States compares with other countries. According to a June 2010 survey by the Organisation for Eco- nomic Co-operation and Development (oecd), the United States places four- teenth in the world for ½xed broadband subscriptions per one hundred inhabi- tants, trailing the Netherlands, Den- mark, Switzerland, and Korea (the top four countries), but also France, Ger- many, the United Kingdom, and Canada. This middling rank, roughly the position the United States has maintained for the past several years, contrasts with the U.S. standing a decade ago. In 2001, the oecd placed the United States at fourth in the world (using the metric of the number of lines per one hundred people).2 Some observers have criticized the way the oecd develops its ranking and the wisdom of policy-makers who pay so
  • 23. much attention to this metric.3 Nonethe- less, these ratings help policy-makers frame broadband policy as both urgent and relevant to America’s economic com- petitiveness. Although competitiveness is not the focus of this essay, it plays a sig- ni½cant part in U.S. broadband policy. The growth in broadband adoption has been accompanied by any number of innovations that have made online life more useful, fun, satisfying, and conse- quential for users. People sent email mes- sages from a desktop computer a decade 19 John B. Horrigan 140 (4) Fall 2011 Figure 1 Trends in Home Broadband and Dial-Up Adoption, June 2000 to December 2009 Source: Based on the author’s calculations using data available from the Pew Internet & American Life Project, http://www.pewinternet.org/Data-Tools/Download-Data.aspx. ago, and although many of us still do, many also send text messages from a smartphone, tweet on the go, and rou- tinely share information on Facebook.
  • 24. People purchase items online, rate what they buy, gather news and analysis, seek out health and medical information, edu- cate themselves, and engage in many oth- er activities. Figure 2 presents snapshots of what people do online and how use has changed in the past decade. A greater share of Americans perform a wider range of online activities than a decade ago. About twice as many people get political news and information online today than in 2000, and more than twice as many adult Americans have bought something online and banked online. Activities that were unheard of in 1999, such as blogging or social networking, are mainstays in the daily routines of large numbers of Americans. People also access the Internet in more varied ways than a decade ago. Access is no longer stationary and teth- ered. With the advent of laptops, net- books, tablets, and smartphones–in con- junction with the development of wire- less networks–access is also portable and ubiquitous. In 2000, slightly more than half (53 percent) of Americans had cell phones, a number that had grown to 86 percent at the beginning of 2010. The capabilities of these devices have in- creased dramatically: two-thirds of cell phone users send text messages, and 40 percent use their phones to access the Internet.4 Today, more than half (52 per-
  • 25. cent) of Americans have laptop comput- ers; many use them to access the Inter- net through wireless connections.5 Finally, tablets and e-book readers are beginning to gain a foothold among early adopters. Some 5 percent of adults report having an e-book reader (such as a Kindle or Sony Digital Reader) and 5 percent report hav- ing a tablet computer (such as an iPad).6 However, individuals still have qualms about online life. A 2008 Pew survey showed that online users had substantial reservations when asked about how com- panies might use personal information gathered from people using cloud com- puting applications. The survey found that 68 percent of those who use online applications and storage services would be very concerned about companies using information gathered in the course of such activities to serve targeted ads.7 The fcc survey conducted for the nbp (men- tioned above) found that many Ameri- cans–especially those without home broadband access–reported concerns about the security of personal informa- tion online. Some 45 percent of all Amer- icans said they strongly agreed with the proposition that it is too easy for their personal information to be stolen online –a ½gure that stood at 57 percent among those without broadband at home. The survey also found a link between fears about the security of personal informa- tion and lower levels of use of online re-
  • 26. sources.8 Notwithstanding user worries about some aspects of online life, the Internet has evolved, in ten years’ time, from a slow access technology used by a minori- ty of the population to a technology that, for most of the nation’s households, is fast and mobile. It is no longer merely a new way to communicate. A broadband- driven Internet is more consequential than the dial-up Internet–and in some ways is more complex to use–but it also affords collaboration, creativity, and par- ticipation in ways unimaginable a gener- ation ago.9 These data on access and use help illu- minate the cost of digital exclusion, which is reinforced in academic literature. Com- puter scientist Rahul Tongia and commu- nications scholar Ernest Wilson have ar- 20 Being Discon- nected in a Broadband- Connected World Dædalus, the Journal of the American Academy of Arts & Sciences
  • 27. 21 John B. Horrigan 140 (4) Fall 2011 Figure 2 Percentage of American Adults, including Internet Users and Non-Users, who have Engaged in Various Online Activities, 2000 to 200910 Use the Internet Send or read email Use a search engine Research a product or service Check the weather Buy a product Get news Buy or make a travel reservation Visit a government website Watch a video Look for news or information about
  • 28. politics or upcoming campaigns Do any banking online Look for information about a job Use online classi½ed ads Send instant messages Download music Use a social networking site Play online games Read someone else’s blog Rate a product, service, or person Participate in an online auction Make a donation to a charity Download a podcast Download or share ½les using peer- to-peer ½le-sharing networks Create or work on your own blog Use Twitter or another status- update service
  • 29. gued that the costs of not being online rise faster than the growth of the net- work. Tongia and Wilson’s formulation accomplishes in a model the reframing that I am arguing stakeholders must fold into their narratives. As more people use broadband-connected networks, the cost to those not on the network rises at more than exponential rates when even a few people are excluded.11 According to the nbp, the cost of digi- tal exclusion is characterized by a decline in offline alternatives as online ones take precedence.12 Job searching is a good ex- ample. When home broadband penetra- tion was at half its current level, people typically had plenty of ways to search for jobs. Online ads were certainly one way, but ads in the print edition of newspapers were a viable alternative; job networking could be conducted online as well as in person; and job searchers could submit applications online or by traditional means. Today, print newspaper ads are less useful sources than in the past, and–importantly–it is often impossible to apply for a job unless one applies online. Some 80 percent of Fortune 500 companies accepted only online applica- tions for jobs in 2010.13 Evidence also suggests that home broadband access can lessen the incidence of “job discourage- ment” in the labor market, as Internet access may spur some people to stick with a job search rather than exit the
  • 30. labor market.14 The basic act of getting the daily news is another example. A decade ago, online news websites were certainly popular, but the daily newspaper was still a robust source of news. More recently, changes in the economics of the news business have resulted in the downsizing of news- rooms. In 2009, the daily newspaper had 27 percent fewer newsroom employees than in the beginning of the decade; in fact, 25 percent of the loss in newsroom employment has occurred since 2006.15 News is still very much available offline but has, in important ways, migrated to the Internet; traditional media outlets provide additional content online, and the advent of pure play websites (wheth- er independent blogs or news aggrega- tion websites, such as the Huf½ngton Post or the Drudge Report) has supplied new ways to obtain information and opinion. A recent Pew Research Center report found that in a typical day, 36 per- cent of Americans use both digital and tra- ditional sources of news, and 39 percent use only traditional sources. Although Pew considers online sources as a supple- ment to Americans’ news diets, the easy availability of online news, whether on a computer or a handheld device, has re- sulted in Americans spending more time getting news in 2010 than at any point in the past decade.16
  • 31. Interacting with government is also different than a decade ago. With more government services provided online, more people are taking advantage of them. It is often cheaper and easier for all parties to carry out government-citizen transactions online rather than via tradi- tional outlets. For means-tested bene½ts programs (such as food stamps, school lunches, or Temporary Assistance for Needy Families), a family might have to ½ll out between six and eight applica- tions, often at the cost of hours away from work. Agencies can save on pro- curement costs using cloud computing, with procurement savings of up to 50 per- cent.17 Renewing a license online is easi- er than going to a government agency. If fewer citizens go in-person to an agency for a particular type of transaction, it may also be cheaper for government–and ulti- mately taxpayers–to support fewer physi- cal locations for certain types of services. A ½nal example–online health and medical information–shows the cost of 22 Being Discon- nected in a Broadband-
  • 32. Connected World Dædalus, the Journal of the American Academy of Arts & Sciences digital exclusion with respect to partici- pation in important decisions. Offline sources for health care information have not gone away in the past decade, but there has been an explosion in online forums by which patients share with one another information about their condi- tions. This type of networking, along with other online sources of medical and health information, helps patients be- come more actively engaged in health care choices. The upshot of this dynamic is that more people look online for health and medical information today than a decade ago. In 2000, 25 percent of Amer- icans had used the Internet for such information, a ½gure that rose to 61 per- cent by 2009.18 A lack of access to infor- mation means that people lose out on an opportunity to be more empowered and participatory in health care decisions. There is also evidence that broadband can improve the ef½ciency with which health care providers deliver care to patients.19 In the above examples, the cost of digi- tal exclusion is twofold:
  • 33. 1) For individuals, those without access to broadband either miss out on infor- mation (such as job opportunities) or must use more costly means to accom- plish certain tasks. 2) For society, institutions have to support the costs of legacy (and often more ex- pensive) means of delivering services in order to meet the needs of a shrink- ing minority of people who do not have access to broadband, or who have ac- cess but lack the skills to use it. Although there have been attempts to quantify the costs of digital exclusion, those estimates (derived in the United States and the United Kingdom) are best understood as a springboard for further research.20 Yet digital exclusion and its costs are important conceptual handles for the ongoing debate about equity in the digital age. Mark Cooper, director of research for the Consumer Federation of America, notes that because broadband networks and functionalities continue to advance, and therefore “raise the level of skill necessary to use the network,” the disconnected may become “even worse off” than they are today.21 The link be- tween the evolution of the broadband environment and skills acquisition sug- gests that stakeholders interested in ac- cess gaps must take skills into account
  • 34. when developing programs. As consequential as having broadband access is (or seems to be) these days, it is important to resist the temptation to think about broadband as something everyone has to have. A necessity is not a requirement. Broadband is often–with reason–viewed as a necessity equivalent to electricity; this comparison, in turn, is frequently used to justify interventions to promote broadband. The discourse, however, often conflates access and use. Do we want everyone to have access to the infrastructure that provides service? Although the answer is clearly “yes,” we must acknowledge that as a practical mat- ter we mean “nearly everyone,” as there are some places where the cost of deploy- ing infrastructure would be exorbitant. Do we want everyone to use broad- band? However well crafted policies to increase access may be, attaining 100 per- cent home-broadband adoption is not a realistic goal. Even the telephone–widely accepted as indispensable in modern life– does not reach everyone; the fcc reports that in 2010, 96 percent of Americans had telephones, a ½gure that accounts for a small minority without this apparently indispensable tool.22 Research that exam- ines this issue shows challenges in having everyone adopt broadband. The fcc’s November 2009 survey shows that 10 per-
  • 35. 23 John B. Horrigan 140 (4) Fall 2011 cent of the adult population is “digitally distant,” meaning they have neither the ½nancial means nor skills and attitudes about computers that might draw them to online use. Another 7 percent are “dig- itally uncomfortable”; despite the fact that many have computers, most people in this group question the relevance of on- line access. Although projections of future adop- tion prospects of non-users are inherent- ly uncertain, the data suggest that some 17 percent of Americans–about half of current non-adopters–face signi½cant hurdles to adoption. Thus, in the medi- um term, a U.S. adoption rate above 85 percent is unlikely.23 Even with the real and potential bene- ½ts of broadband use, not everyone will embrace it; among those who do, not everyone will prefer to use broadband in the ways favored by planners and vision- aries. It is imperative, therefore, to keep in mind user preferences and abilities in thinking about how to take advantage of
  • 36. broadband’s economic and social bene- ½ts. Encouraging broadband use should be about “demand pull” (devising ways to lure people to use) as opposed to “tech- nology push” (making broadband use effectively required). Despite anticipated challenges to attain- ing ubiquitous deployment and universal adoption of broadband, Congress charged the fcc to develop the nbp and to devise strategies for increasing broadband adop- tion. Partly driven by this objective, re- searchers have sought to understand not only who is not online, but why those without high-speed access at home choose not to have service.24 A plurality of the 35 percent of U.S. adults who do not have broadband at home cites cost as the main reason they do not have broadband at home. Close to two-thirds of non- adopters point to factors other than the monthly fee or cost of hardware as the rea- son they are not home-broadband users. According to the fcc, the barriers to home-broadband use include: • Cost: 36 percent of non-adopters named cost as the main barrier, with 15 percent citing the monthly price for service and 10 percent citing the cost of a computer. • Digital literacy: 22 percent cited factors that indicate digital literacy problems,
  • 37. such as unfamiliarity with a computer or worries about bad things that could happen to them online. • Lack of relevance: 19 percent said they did not need additional speed (that is, to upgrade from dial-up) or that online content was not relevant to them. • Lack of available infrastructure: 5 percent said they could not get broadband where they live. • Other reasons: 18 percent said they could use the Internet all they wanted at work (3 percent), identi½ed a combination of reasons (4 percent), or cited reasons that did not fall into a discrete category (11 percent). Though cost looms large as a barrier to adoption, it is not an isolated factor; non- adopters’ expressed concern over their level of digital skills clearly is signi½cant. When given the chance to identify more than one reason for not having broad- band at home, half of non-adopters pick more than one. Speci½cally: • 66 percent cite cost (that is, monthly ac- cess fee or cost of computer); • 52 percent cite relevance (that is, the In- ternet is a waste of time or they do not think there is relevant content online for them); and
  • 38. • 47 percent cite digital literacy (that is, they worry about bad things that can 24 Being Discon- nected in a Broadband- Connected World Dædalus, the Journal of the American Academy of Arts & Sciences happen online or they are not comfort- able with computers).25 More speci½- cally, 46 percent of non-Internet users cite lack of comfort with computers as a reason why they are not online, and a similar number (45 percent) say they do not use the Internet because they worry about “all the bad things that can hap- pen online.” It is worth noting that the fcc’s ½ndings about barriers to broadband differ from those found by the ntia. When asked to identify the main reason they do not have broadband, respondents in the ntia sur- vey cited the following reasons:
  • 39. • 38 percent: don’t need it–not interested; • 26 percent: too expensive; • 18 percent: no computer or inadequate computer; • 6 percent: other reasons; • 4 percent: can use it somewhere else; • 4 percent : not available in area; and • 3 percent: lack of con½dence or skills.26 These discrepancies have to do with how each survey framed its questions. The fcc survey had a different set of cat- egories and undertook a two-step process in which respondents were asked ½rst to list barriers they face and then to identify the main one. The ntia survey asked a single question. However the question is framed, barriers to broadband adoption clearly have a cost component, but the overlapping concepts of digital skills or literacy and perceived lack of relevance are signi½cant parts of the picture. Also at issue are barriers that inhibit use of broadband among those who have service. Communications scholar Eszter Hargittai has found variation in levels of online skills that, among young adults, predict the kinds of activities they engage
  • 40. in online. Other research that has devel- oped typologies of Internet users ½nds, among other things, that a variety of fac- tors–skills, attitudes about information technology, demography–shape how intensively people use information and communications technologies (icts).27 This variation in online usage patterns is to be expected; not everyone needs to be (or wants to be) a ½ber-to-the-home/ iPad-toting tech gear head. Pew’s 2009 report classifying the technology usage patterns in the general population found that 61 percent of adult Americans– many with broadband and cell phones– are not heavy tech users. Some are happy that way, while many have tepid usage patterns due to lack of digital skills.28 Finally, adapting a method Hargittai de- veloped to measure user skills, the 2009 fcc survey for the nbp found that 29 per- cent of broadband users had low levels of computer and Internet skills.29 If users’ skill levels or worries about Internet use cause them to turn away from the worth- while affordances of online life, then de- veloping tools to address these issues may be socially bene½cial. Although cost is most often cited as the main reason for non-adoption, other fac- tors matter: namely, limited digital skills and the perception among non-adopters that access is irrelevant to them. A com- bination of these reasons often con-
  • 41. tributes to the decision not to adopt. The following two sections explore the barri- ers of digital skill and literacy and users’ perception that the Internet is not rele- vant to them. Alleviating cost pressures is obviously important but will not be dis- cussed here; addressing this issue would mean delving into the complex area of re- forming the Universal Service Fund and the Lifeline/Link-up programs, which currently provide cost relief for tele- phone service. The nbp recommends that these programs be updated to reflect the 25 John B. Horrigan 140 (4) Fall 2011 reality of broadband, and proposals have been advanced on how to proceed.30 It is hardly novel to suggest that online engagement is underpinned by the requi- site literacy and skills to use icts. Digital skills refer to the basic competencies of knowing how to operate a computer or initiate an online session. These capabili- ties do not necessarily require a high level of expertise, but they do demand suf- ½cient knowledge to communicate to others the nature of tech problems when
  • 42. users cannot resolve technical dif½culties themselves. Digital literacy is a multidi- mensional concept describing higher- order faculties that, according to media literacy scholar Renee Hobbs, “encom- pass the full range of cognitive, emotion- al and social competencies that include the use of texts, tools and technologies; the skills of critical thinking and analy- sis; the practice of message composition and creativity; the ability to engage in reflection and ethical thinking; as well as active participation through teamwork and collaboration.” This level of pro½- ciency extends beyond knowing how to use technology to knowing how to use it to carry out important tasks in everyday life, whether that is reading the news, obtaining information about a medical condition, or making a purchase. Many strategies to promote digital literacy try to make the value proposition to broad- band adoption more attractive by open- ing people up to the “pleasures and power” of using the Internet to become better informed, while recognizing that “people cannot be forced to engage with the public life of the community.”31 The process of conveying to people the usefulness of broadband typically has a social dimension. Classic studies on tech- nology diffusion explicitly highlight how the social system helps spur technolo- gy adoption.32 People learn about a new
  • 43. product from the people around them; their social networks, in other words, play a key role in helping people discover the utility and usability of an innovation. In an empirical study of computer adop- tion using 1997 data, economists Austan Goolsbee and Peter Klenow found that the presence of learning externalities influenced the decision to have a com- puter at home. People were more likely to have a computer if they lived in areas where others had computers and if a large share of family and friends had one. Moreover, email users, as distinct from users of speci½c types of software, were the most likely to have computers; this fact suggests the manner in which com- municative features of the technology motivated adoption.33 Eszter Hargittai has found that online skills are not even- ly distributed among young adults–a cohort often thought to be uniformly tech savvy–and that socioeconomic background is a predictor of digital skill levels for this group.34 Finally, in a nation- ally representative sample in the United States, I found that measures of online skills are correlated with the number of online activities that people engage in.35 Non-adopters’ perceptions about broad- band’s lack of relevance are also an impor- tant factor in their decision not to pro- cure home high-speed service. The notion of broadband’s relevance is embedded in a user’s context. A non-broadband-using
  • 44. senior citizen may have traditional media habits and not ½nd online news worth- while. It is possible that being made aware of distinctive characteristics of online news content might make broadband access more appealing. Similarly, a His- panic individual with limited English- language skills may not have broadband– but may choose to get it if she is intro- duced to Spanish-language online content that is compelling. Finally, others might 26 Being Discon- nected in a Broadband- Connected World Dædalus, the Journal of the American Academy of Arts & Sciences buy broadband if they discovered various economic upsides: namely, the money- saving potential of online comparison shopping or the convenience of carrying out transactions online. Whereas promoting digital literacy is very much a social process, conveying
  • 45. broadband’s relevance to people has a greater emphasis on imparting informa- tion. The distinction means that promot- ing broadband’s relevance requires a tra- ditional marketing-campaign approach. Simply learning about the existence of Spanish-language content or the money- saving possibilities of online shopping might be the catalyst that draws people to use. Effective means of conveying the value of broadband to those who ques- tion its relevance are likely to emphasize “targeted partnerships that understand both the needs of and the distribution channels relied on” by these non-adopt- ers.36 Because people’s perception about relevance depends on context, these part- nerships are likely to be successful if they work from the ground up, that is, if they are local in nature and are embedded in non-adopters’ communities. Strategies for linking the promotion of digital skills and relevance to policy ini- tiatives are not well developed. Programs to bolster broadband adoption–some publicly funded, others spearheaded by nonpro½t organizations, and many part- nering with the private sector–have existed for more than a decade. Although many have been subject to review, a rig- orous assessment of methodologies used would shed light on the difference the programs have made, compared to what might have occurred in their absence. In an exhaustive examination of adoption-
  • 46. promotion efforts, economists Janice Hauge and James Prieger conclude that apparently successful programs take a comprehensive approach to training.37 Such initiatives provide discounts on access and equipment, but also training on how to use the Internet, with a focus on demonstrating the relevance of spe- ci½c online activities and guidance on how to carry out certain online tasks. An assessment of existing training and promotion efforts based on rigorous social-scienti½c study would be useful in designing policy initiatives. Even in its absence, the above discussion highlights the set of digital skills and literacies indi- viduals need to take part in a broadband- connected world: • Computer skills. This category includes the ability to use a computer–whether it is a desktop, laptop, or handheld de- vice–as well as the capacity to upgrade one’s skills. The hardware for modern connectivity is continually evolving, and users must be capable of learning and understanding access technologies. • Media literacy. Media literacy refers to the ability to ½nd trustworthy informa- tion online about issues that matter to the user personally or to his community. According to the Knight Commission report Informing Communities, media lit-
  • 47. eracy enhances the information capac- ity of individuals, enabling them to sort through the wide range of choices for news and information in today’s media environment.38 • Civic engagement. The ability to ½nd reli- able information about elections and government online is arguably an out- come or goal of media literacy, but it is worthy of special attention nonethe- less. Data show that a large share of Americans not only use the Internet for news about politics, but also use online tools to carry out transactions with government agencies. Such tools can be particularly bene½cial for low- income Americans, who may be more 27 John B. Horrigan 140 (4) Fall 2011 time pressed in dealing with necessary government transactions than other people. • Managing personal information online. Users need to understand the policies on personal privacy that govern web- sites and the ever-shifting rules in this
  • 48. realm. Given that concerns about the privacy and security of personal infor- mation–for both broadband users and non-users–inhibit the adoption and use of broadband, more information on how websites use the information people share online may help alleviate user concerns. In each of these examples, what it means to be “media literate” or what it takes to effectively manage one’s personal infor- mation will evolve over time. If these skills are necessary for partici- pation in a digital society, how should the gaps in skills provision be addressed? What initiatives should various stake- holders–government, the media, non- pro½t organizations, and individuals– undertake? It is impossible to draw bright lines on these questions. Legislation will not outline what it means to be computer literate, but government–as well as other actors, such as libraries–may have a part in supporting training initiatives. Govern- ment is also likely to take a lead role in thinking about people’s privacy rights in the digital age. Private news media com- panies may promote online media literacy, although public media and foundations could undoubtedly play a strong part here as well. Civic engagement cuts across all four categories. Given that good citizen- ship is a worthwhile social norm, the in- dividual has an obligation to engage with
  • 49. his community, whether by voting, volun- teering, or giving to charity. The media– public or private–may also provide infor- mation that promotes civic engagement, and government can play a role in design- ing applications that permit users to con- nect with government effectively. Person- al information online is another area where all stakeholders may contribute. It is worth emphasizing that individuals have an important obligation in each of these areas. The character of the Inter- net–interactive, collaborative, participa- tory–gives individuals opportunities for autonomy in the online commons, which in turn suggests a responsibility to culti- vate the commons. That means main- taining one’s own skills, but also, argu- ably, supporting efforts to help others develop their skills. Work remains to be done to turn ideas about digital literacy and promoting rele- vance into policy and practice. As a start- ing point, the nbp recommends the development of an online portal that would allow users to look for informa- tion on how to upgrade their online skills and even follow lessons there on skills development.39 Nonpro½ts already play a role in this space, as entities such as Common Sense Media, One Economy, and Computers for Youth either promote online skills or provide information
  • 50. about the nature of online content. Such initiatives typically have limited geo- graphic scope, meaning that, as valuable as they may be, they do not scale nation- ally. Furthermore, there is no clearing- house for best practices for access and training programs–a gap the nbp rec- ommends be ½lled. With the resources for broadband provided in the 2009 eco- nomic stimulus bill, as well as the atten- tion that the nbp has drawn to issues per- taining to broadband adoption and de- ployment, the time may be ripe for stake- holders in the policy community to con- sider, in a systematic way, how to meet the training needs of broadband users. That said, coordinating the different stakeholders–companies, new entities 28 Being Discon- nected in a Broadband- Connected World Dædalus, the Journal of the American Academy of Arts & Sciences devoted to expanding broadband access
  • 51. in communities, long-standing commu- nity-based organizations that have rela- tionships with underserved populations– remains a signi½cant challenge. A central theme of this essay is how to make a technology that is currently not part of some people’s lives both available and attractive to them. But the context for this discussion is digital abundance. When something is abundant–as means of online access and quantity of appli- cations are–those without it become more at risk of falling outside the social, cultural, and economic mainstream. The accelerating pace of innovation in broad- band will only exacerbate this risk. The issues discussed in this essay–develop- ing ict skills and promoting relevance –are not going away. As the “Internet of things” ushers in an era of home-energy management, and with advances in the electronic delivery of health care servic- es, the bene½ts of connectivity will grow over time. Today’s digital abundance will seem like light fare in a few years, and those left behind will forgo a range of bene½ts. As the pace of change quickens, pro- moting access and managing abundance will become different sides of the same coin. To engage with the Internet at even a moderate level, an individual transi- tioning from non-user to user may quickly
  • 52. ½nd himself with a host of new hardware with which to cope: a computer, displays in the house for smart meters, and per- haps a mobile app on a smartphone that helps manage a medical condition. Un- derstanding how to use these technolo- gies, why they are relevant, what the tools are to protect personal information, and how to avoid being overwhelmed will challenge newcomers to broadband. Moreover, these questions will confront many who already use Internet devices and services. For these reasons, provid- ing resources for the development of skills to negotiate cyberspace–for new and cur- rent users alike–is a challenge for all par- ticipants in the broadband ecosystem. 29 John B. Horrigan 140 (4) Fall 2011 endnotes 1 National Telecommunications & Information Administration, Digital Nation: Expanding Inter- net Usage, ntia Research Preview (Washington, D.C.: U.S. Department of Commerce, Feb- ruary 2011), http://www.ntia.doc.gov/reports/2011/NTIA_Internet_Use_Repo rt_February_ 2011.pdf.
  • 53. 2 Daniel K. Correa, “Assessing Broadband in America: oecd and itif Broadband Rankings” (Washington, D.C.: The Information Technology & Innovation Foundation, April 2007), http://www.itif.org/½les/BroadbandRankings.pdf. 3 For the former point, see Scott Wallsten, Understanding International Broadband Comparisons (Washington, D.C.: Technology Policy Institute, May 2008), http://www.techpolicyinstitute .org/½les/wallsten_international_broadband_comparisons.pdf. On the latter point, see John B. Horrigan, “Why It Will Be Hard to Close the Broadband Divide,” Pew Internet & Ameri- can Life Project (Washington, D.C.: Pew Research Center, August 2007), http://pewresearch .org/pubs/556/why-it-will-be-hard-to-close-the-broadband- divide. 4 Aaron Smith, “Mobile Access 2010,” Pew Internet & American Life Project (Washington, D.C.: Pew Research Center, July 2010), http://www.pewinternet.org/Reports/2010/Mobile -Access-2010.aspx. 5 Aaron Smith, “Americans and Their Gadgets,” Pew Internet & American Life Project (Wash- ington, D.C.: Pew Research Center, October 2010), http://www.pewinternet.org/Reports/ 2010/Gadgets/Overview.aspx. 30 Being
  • 54. Discon- nected in a Broadband- Connected World Dædalus, the Journal of the American Academy of Arts & Sciences 6 Kathryn Zickuhr, “Generations and Their Gadgets,” Pew Internet & American Life Project (Washington, D.C.: Pew Research Center, February 2011), http://www.pewinternet.org/ Reports/2011/Generations-and-gadgets.aspx. 7 John B. Horrigan, “Use of Cloud Computing Applications and Services,” Pew Internet & American Life Project (Washington, D.C.: Pew Research Center, September 2008), http:// www.pewinternet.org/Reports/2008/Use-of-Cloud-Computing- Applications-and-Services .aspx. 8 John B. Horrigan, “Broadband Adoption and Use in America,” Omnibus Broadband Initia- tive (obi) Working Paper Series No. 1, Federal Communications Commission, February 2010, http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC- 296442A1.pdf. 9 See, for example, Henry Jenkins, Confronting the Challenges of Participatory Culture: Media Edu- cation for the 21st Century, MacArthur Foundation White Paper (Chicago: John D. and Cath-
  • 55. erine T. MacArthur Foundation, 2006). 10 Pew Internet & American Life Project surveys, 2000–2009. These data represent the aver- age total participation in each activity over each two-year period. Therefore, they may not exactly reflect the combined yearly tracking numbers. In addition, the wording of some sur- vey questions may have changed slightly over time. 11 Rahul Tongia and Ernest Wilson, “Turning Metcalfe on His Head: The Multiple Costs of Network Exclusion,” paper presented at the 35th Telecommunications Policy Research Con- ference, Vienna, Virginia, September 2007, http://web.si.umich.edu/tprc/papers/2007/772/ TPRC-07-Exclusion-Tongia&Wilson.pdf. 12 See Brian David, “The Cost of Digital Exclusion,” The Of½cial Blog of the National Broad- band Plan, March 9, 2010, http://blog.broadband.gov/?entryId=236662. 13 Digital Impact Group and Econsult Corporation, “The Economic Impact of Digital Exclusion,” March 2010, http://www.digitalimpactgroup.org/costofexclusion.pdf. 14 George S. Ford, “Internet Use and Job Search: More Evidence,” Phoenix Center Perspective No. 10-02 (Washington, D.C.: Phoenix Center for Advanced Legal & Economic Public Policy Studies, January 2010), http://www.phoenix- center.org/perspectives/Perspective10-01½nal.pdf. 15 “State of the News Media 2010,” a report of the Pew Project
  • 56. on Excellence in Journalism, http://www.stateofthemedia.org/2010/newspapers-summary- essay. 16 Pew Research Center for the People & the Press, “Americans Spending More Time Following the News” (Washington, D.C.: Pew Research Center, September 2010), http://pewresearch .org/pubs/1725/where-people-get-news-print-online-readership- cable-news-viewers. 17 Federal Communications Commission, Connecting America: The National Broadband Plan (Washington, D.C.: Federal Communications Commission, 2010), 286, 290, http://www .broadband.gov/download-plan. 18 Susannah Fox, “The Social Life of Health Information,” Pew Internet & American Life Proj- ect (Washington, D.C.: Pew Research Center, June 2009), http://pewinternet.org/Reports/ 2009/8-The-Social-Life-of-Health-Information.aspx. 19 Federal Communications Commission, Connecting America, 202, box 10-3. 20 The $55 billion cost of digital exclusion in the United States, derived by Econsult and the Digital Impact Group, often focuses on gross costs, not net costs. That is, the estimates con- centrate on savings to using digital means for, say, health care information, without fully accounting for costs that may arise. 21 Mark Cooper, “The Challenge of Digital Exclusion in America: A Review of the Social Sci-
  • 57. ence Literature and Its Implications for the National Broadband Plan” (Washington, D.C.: Consumer Federation of America, January 2010), 2, http://fjallfoss.fcc.gov/ecfs/document/ view?id=7020384062. 31 John B. Horrigan 140 (4) Fall 2011 22 Federal Communications Commission, “Telephone Subscribership in the United States: Data Through March 2010” (Washington, D.C.: Federal Communications Commission, August 2010), http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC- 301241A1.pdf. 23 Horrigan, “Broadband Adoption and Use in America,” 32. 24 See ibid. for data reported in the following two paragraphs. 25 Ibid., 31. 26 National Telecommunications & Information Administration, “Exploring the Digital Na- tion: Home Broadband Internet Adoption in the United States” (Washington, D.C.: ntia, November 2010), 17. 27 Charlene Li and Josh Bernoff, Groundswell: Winning in a World Transformed by Social Technologies (Boston: Harvard Business Press, 2008). See also John B. Horrigan, “The Mobile Difference,”
  • 58. Pew Internet & American Life Project (Washington, D.C.: Pew Research Center, March 2009), http://pewinternet.org/Reports/2009/5-The-Mobile-Difference-- Typology.aspx. 28 Horrigan, “The Mobile Difference.” 29 Eszter Hargittai, “An Update on Survey Measures of Web- Oriented Digital Literacy,” Social Science Computer Review 27 (1) (February 2009): 130–137. See also Horrigan, “Broadband Adoption and Use in America,” 18. 30 Blair Levin, Universal Broadband: Targeting Investments to Deliver Broadband Services to All Americans (Washington, D.C.: Aspen Institute, 2010). 31 Renee Hobbs, Digital and Media Literacy: A Plan of Action (Washington, D.C.: Aspen Institute, 2010), xi. 32 Everett Rogers, Diffusion of Innovation, 4th ed. (New York: The Free Press, 1995). 33 Austan Goolsbee and Peter J. Klenow, “Evidence on Learning and Network Externalities in the Diffusion of Home Computers,” Journal of Law and Economics 45 (October 2002): 317–343. 34 Eszter Hargittai, “Digital Na(t)ives? Variation in Internet Skills and Uses among Members of the ‘Net Generation,’” Sociological Inquiry 80 (1) (2010): 92–113. 35 Horrigan, “Broadband Adoption and Use in America.” 36 Levin, Universal Broadband, 24. 37 Janice A. Hauge and James E. Prieger, “Demand-Side
  • 59. Programs to Stimulate Adoption of Broadband: What Works?” Review of Network Economics 9 (3) (2010): article 4. 38 Knight Commission, Informing Communities: Sustaining Democracy in the Digital Age, April 2010, http://www.knightcomm.org/read-the-report-and- comment. 39 Federal Communications Commission, Connecting America, 177. << /ASCII85EncodePages false /AllowTransparency false /AutoPositionEPSFiles true /AutoRotatePages /None /Binding /Left /CalGrayProfile (Gray Gamma 2.2) /CalRGBProfile (sRGB IEC61966-2.1) /CalCMYKProfile (U.S. Web Coated 050SWOP051 v2) /sRGBProfile (sRGB IEC61966-2.1) /CannotEmbedFontPolicy /Error /CompatibilityLevel 1.3 /CompressObjects /Off /CompressPages true /ConvertImagesToIndexed true /PassThroughJPEGImages true /CreateJobTicket true /DefaultRenderingIntent /Default /DetectBlends true /DetectCurves 0.1000 /ColorConversionStrategy /LeaveColorUnchanged /DoThumbnails false /EmbedAllFonts true /EmbedOpenType false
  • 60. /ParseICCProfilesInComments true /EmbedJobOptions true /DSCReportingLevel 0 /EmitDSCWarnings false /EndPage -1 /ImageMemory 1048576 /LockDistillerParams true /MaxSubsetPct 100 /Optimize false /OPM 1 /ParseDSCComments true /ParseDSCCommentsForDocInfo true /PreserveCopyPage false /PreserveDICMYKValues true /PreserveEPSInfo true /PreserveFlatness true /PreserveHalftoneInfo false /PreserveOPIComments false /PreserveOverprintSettings true /StartPage 1 /SubsetFonts true /TransferFunctionInfo /Apply /UCRandBGInfo /Remove /UsePrologue false /ColorSettingsFile (Color Management Off) /AlwaysEmbed [ true ] /NeverEmbed [ true ] /AntiAliasColorImages false /CropColorImages true /ColorImageMinResolution 300 /ColorImageMinResolutionPolicy /OK /DownsampleColorImages false /ColorImageDownsampleType /Bicubic /ColorImageResolution 300
  • 61. /ColorImageDepth -1 /ColorImageMinDownsampleDepth 1 /ColorImageDownsampleThreshold 1.50000 /EncodeColorImages true /ColorImageFilter /DCTEncode /AutoFilterColorImages true /ColorImageAutoFilterStrategy /JPEG /ColorACSImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /ColorImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /JPEG2000ColorACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /JPEG2000ColorImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /AntiAliasGrayImages false /CropGrayImages true /GrayImageMinResolution 300 /GrayImageMinResolutionPolicy /OK /DownsampleGrayImages false /GrayImageDownsampleType /Bicubic /GrayImageResolution 300 /GrayImageDepth -1 /GrayImageMinDownsampleDepth 2 /GrayImageDownsampleThreshold 1.50000 /EncodeGrayImages true
  • 62. /GrayImageFilter /DCTEncode /AutoFilterGrayImages true /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /GrayImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /JPEG2000GrayACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /JPEG2000GrayImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /AntiAliasMonoImages false /CropMonoImages true /MonoImageMinResolution 1200 /MonoImageMinResolutionPolicy /OK /DownsampleMonoImages false /MonoImageDownsampleType /Bicubic /MonoImageResolution 1200 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.50000 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict << /K -1 >> /AllowPSXObjects false
  • 63. /CheckCompliance [ /None ] /PDFX1aCheck true /PDFX3Check false /PDFXCompliantPDFOnly true /PDFXNoTrimBoxError false /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox true /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile (U.S. Web Coated 050SWOP051 v2) /PDFXOutputConditionIdentifier (CGATS TR 001) /PDFXOutputCondition () /PDFXRegistryName (http://www.color.org) /PDFXTrapped /False /CreateJDFFile false /Description << /CHS <FEFF4f7f75288fd94e9b8bbe5b9a521b5efa76840020004100640 06f0062006500200050004400460020658768637b265408002000 5000440046002f0058002d00310061003a0032003000300031002 089c4830330028fd9662f4e004e2a4e1395e84e3a56fe5f6251855b b94ea46362800c52365b9a7684002000490053004f0020680751c 6300251734e8e521b5efa7b2654080020005000440046002f00580
  • 64. 02d00310061002089c48303768400200050004400460020658768 6376848be67ec64fe1606fff0c8bf753c29605300a0041006300720 06f00620061007400207528623763075357300b300260a853ef4ee 54f7f75280020004100630072006f0062006100740020548c00200 0410064006f006200650020005200650061006400650072002000 34002e003000204ee553ca66f49ad87248672c676562535f00521b 5efa768400200050004400460020658768633002> /CHT <FEFF4f7f752890194e9b8a2d7f6e5efa7acb76840020004100640 06f006200650020005000440046002065874ef67b265408002000 5000440046002f0058002d00310061003a0032003000300031002 0898f7bc430025f8c8005662f70ba57165f6251675bb94ea463db8 00c5c08958052365b9a76846a196e96300295dc65bc5efa7acb7b2 654080020005000440046002f0058002d003100610020898f7bc4 76840020005000440046002065874ef676848a737d308cc78a0aff 0c8acb53c395b1201c004100630072006f00620061007400204f7f 7528800563075357201d300260a853ef4ee54f7f75280020004100 630072006f0062006100740020548c002000410064006f0062006 5002000520065006100640065007200200034002e003000204ee5 53ca66f49ad87248672c4f86958b555f5df25efa7acb76840020005 000440046002065874ef63002> /DAN <FEFF004200720075006700200069006e0064007300740069006 c006c0069006e006700650072006e0065002000740069006c0020 006100740020006f0070007200650074007400650020004100640 06f006200650020005000440046002d0064006f006b0075006d00 65006e007400650072002c00200064006500720020006600f8007 20073007400200073006b0061006c002000730065007300200069 00670065006e006e0065006d00200065006c006c0065007200200 073006b0061006c0020006f0076006500720068006f006c006400 650020005000440046002f0058002d00310061003a00320030003 00031002c00200065006e002000490053004f002d007300740061 006e0064006100720064002000740069006c00200075006400760 065006b0073006c0069006e006700200061006600200067007200 61006600690073006b00200069006e00640068006f006c0064002 e00200059006400650072006c006900670065007200650020006f
  • 65. 0070006c00790073006e0069006e0067006500720020006f006d0 020006f007000720065007400740065006c007300650020006100 660020005000440046002f0058002d00310061002d006b006f006 d00700061007400690062006c00650020005000440046002d0064 006f006b0075006d0065006e007400650072002000660069006e0 06400650072002000640075002000690020006200720075006700 650072006800e5006e00640062006f00670065006e00200074006 9006c0020004100630072006f006200610074002e002000440065 0020006f007000720065007400740065006400650020005000440 046002d0064006f006b0075006d0065006e007400650072002000 6b0061006e002000e50062006e006500730020006900200041006 30072006f00620061007400200065006c006c0065007200200041 00630072006f00620061007400200052006500610064006500720 0200034002e00300020006f00670020006e007900650072006500 2e> /DEU <FEFF00560065007200770065006e00640065006e00200053006 90065002000640069006500730065002000450069006e00730074 0065006c006c0075006e00670065006e0020007a0075006d00200 0450072007300740065006c006c0065006e00200076006f006e00 20005000440046002f0058002d00310061003a003200300030003 1002d006b006f006d00700061007400690062006c0065006e0020 00410064006f006200650020005000440046002d0044006f006b0 075006d0065006e00740065006e002e0020005000440046002f00 58002d003100610020006900730074002000650069006e0065002 000490053004f002d004e006f0072006d0020006600fc007200200 0640065006e002000410075007300740061007500730063006800 200076006f006e002000670072006100660069007300630068006 5006e00200049006e00680061006c00740065006e002e00200057 00650069007400650072006500200049006e0066006f0072006d0 06100740069006f006e0065006e0020007a0075006d0020004500 72007300740065006c006c0065006e00200076006f006e0020005 000440046002f0058002d00310061002d006b006f006d00700061 007400690062006c0065006e0020005000440046002d0044006f0 06b0075006d0065006e00740065006e002000660069006e006400 65006e002000530069006500200069006d0020004100630072006
  • 66. f006200610074002d00480061006e00640062007500630068002e 002000450072007300740065006c006c007400650020005000440 046002d0044006f006b0075006d0065006e007400650020006b00 f6006e006e0065006e0020006d006900740020004100630072006 f00620061007400200075006e0064002000410064006f00620065 002000520065006100640065007200200034002e00300020006f0 064006500720020006800f600680065007200200067006500f600 660066006e00650074002000770065007200640065006e002e> /ESP <FEFF005500740069006c0069006300650020006500730074006 100200063006f006e0066006900670075007200610063006900f3 006e0020007000610072006100200063007200650061007200200 064006f00630075006d0065006e0074006f007300200050004400 46002000640065002000410064006f00620065002000710075006 500200073006500200064006500620065006e00200063006f006d 00700072006f0062006100720020006f002000710075006500200 064006500620065006e002000630075006d0070006c0069007200 20006c00610020006e006f0072006d0061002000490053004f002 0005000440046002f0058002d00310061003a0032003000300031 0020007000610072006100200069006e007400650072006300610 06d00620069006f00200064006500200063006f006e0074006500 6e00690064006f00200067007200e1006600690063006f002e002 000500061007200610020006f006200740065006e006500720020 006d00e1007300200069006e0066006f0072006d0061006300690 0f3006e00200073006f0062007200650020006c00610020006300 72006500610063006900f3006e00200064006500200064006f006 30075006d0065006e0074006f0073002000500044004600200063 006f006d00700061007400690062006c0065007300200063006f0 06e0020006c00610020006e006f0072006d006100200050004400 46002f0058002d00310061002c00200063006f006e00730075006 c007400650020006c006100200047007500ed0061002000640065 006c0020007500730075006100720069006f00200064006500200 04100630072006f006200610074002e0020005300650020007000 75006500640065006e00200061006200720069007200200064006 f00630075006d0065006e0074006f007300200050004400460020 00630072006500610064006f007300200063006f006e002000410
  • 67. 0630072006f006200610074002c002000410064006f0062006500 2000520065006100640065007200200034002e003000200079002 000760065007200730069006f006e0065007300200070006f0073 0074006500720069006f007200650073002e> /FRA <FEFF005500740069006c006900730065007a002000630065007 30020006f007000740069006f006e00730020006100660069006e 00200064006500200063007200e90065007200200064006500730 0200064006f00630075006d0065006e0074007300200041006400 6f006200650020005000440046002000710075006900200064006 f006900760065006e0074002000ea0074007200650020007600e9 007200690066006900e900730020006f0075002000ea007400720 06500200063006f006e0066006f0072006d00650073002000e000 20006c00610020006e006f0072006d00650020005000440046002 f0058002d00310061003a0032003000300031002c00200075006e 00650020006e006f0072006d0065002000490053004f002000640 02700e9006300680061006e006700650020006400650020006300 6f006e00740065006e00750020006700720061007000680069007 100750065002e00200050006f0075007200200070006c00750073 0020006400650020006400e9007400610069006c0073002000730 07500720020006c006100200063007200e9006100740069006f00 6e00200064006500200064006f00630075006d0065006e0074007 3002000500044004600200063006f006e0066006f0072006d0065 0073002000e00020006c00610020006e006f0072006d006500200 05000440046002f0058002d00310061002c00200076006f006900 720020006c0065002000470075006900640065002000640065002 0006c0027007500740069006c0069007300610074006500750072 002000640027004100630072006f006200610074002e0020004c0 065007300200064006f00630075006d0065006e00740073002000 500044004600200063007200e900e900730020007000650075007 60065006e0074002000ea0074007200650020006f007500760065 007200740073002000640061006e00730020004100630072006f0 06200610074002c002000610069006e0073006900200071007500 2700410064006f006200650020005200650061006400650072002 00034002e0030002000650074002000760065007200730069006f 006e007300200075006c007400e90072006900650075007200650
  • 68. 073002e> /ITA (Utilizzare queste impostazioni per creare documenti Adobe PDF che devono essere conformi o verificati in base a PDF/X-1a:2001, uno standard ISO per lo scambio di contenuto grafico. Per ulteriori informazioni sulla creazione di documenti PDF compatibili con PDF/X-1a, consultare la Guida dell'utente di Acrobat. I documenti PDF creati possono essere aperti con Acrobat e Adobe Reader 4.0 e versioni successive.) /JPN <FEFF30b030e930d530a330c330af30b330f330c630f330c4306e5 90963db306b5bfe3059308b002000490053004f00206a196e9689 8f683c306e0020005000440046002f0058002d00310061003a003 20030003000310020306b6e9662e03057305f002000410064006f 0062006500200050004400460020658766f830924f5c621030593 08b305f3081306b4f7f75283057307e30593002005000440046002 f0058002d0031006100206e9662e0306e00200050004400460020 658766f84f5c6210306b306430443066306f300100410063007200 6f006200610074002030e630fc30b630ac30a430c9309253c27167 30573066304f30603055304430023053306e8a2d5b9a30674f5c62 103055308c305f0020005000440046002030d530a130a430eb306f 3001004100630072006f0062006100740020304a3088307300200 0410064006f006200650020005200650061006400650072002000 34002e003000204ee5964d3067958b304f30533068304c3067304 d307e30593002> /KOR <FEFFc7740020c124c815c7440020c0acc6a9d558c5ec0020c791 c131d558b294002000410064006f0062006500200050004400460 020bb38c11cb2940020d655c778c7740020d544c694d558ba7000 20adf8b798d53d0020cee8d150d2b8b97c0020ad50d658d558b29 40020bc29bc95c5d00020b300d55c002000490053004f0020d45c c900c7780020005000440046002f0058002d00310061003a00320 03000300031c7580020addcaca9c5d00020b9dec544c57c0020d56 9b2c8b2e4002e0020005000440046002f0058002d003100610020 d638d65800200050004400460020bb38c11c0020c791c131c5d00 020b300d55c0020c790c138d55c0020c815bcf4b2940020004100 630072006f0062006100740020c0acc6a90020c124ba85c11cb97c
  • 69. 0020cc38c870d558c2edc2dcc624002e0020c774b807ac8c0020c7 91c131b41c00200050004400460020bb38c11cb29400200041006 30072006f0062006100740020bc0f002000410064006f006200650 02000520065006100640065007200200034002e00300020c774c0 c1c5d0c11c0020c5f40020c2180020c788c2b5b2c8b2e4002e> /NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken die moeten worden gecontroleerd of moeten voldoen aan PDF/X-1a:2001, een ISO-standaard voor het uitwisselen van grafische gegevens. Raadpleeg de gebruikershandleiding van Acrobat voor meer informatie over het maken van PDF- documenten die compatibel zijn met PDF/X-1a. De gemaakte PDF-documenten kunnen worden geopend met Acrobat en Adobe Reader 4.0 en hoger.) /NOR <FEFF004200720075006b0020006400690073007300650020006 9006e006e007300740069006c006c0069006e00670065006e0065 002000740069006c002000e50020006f007000700072006500740 0740065002000410064006f006200650020005000440046002d00 64006f006b0075006d0065006e00740065007200200073006f006 d00200073006b0061006c0020006b006f006e00740072006f006c 006c0065007200650073002c00200065006c006c0065007200200 073006f006d0020006d00e50020007600e6007200650020006b00 6f006d00700061007400690062006c00650020006d00650064002 0005000440046002f0058002d00310061003a0032003000300031 002c00200065006e002000490053004f002d007300740061006e0 06400610072006400200066006f00720020007500740076006500 6b0073006c0069006e00670020006100760020006700720061006 600690073006b00200069006e006e0068006f006c0064002e0020 0048007600690073002000640075002000760069006c002000680 0610020006d0065007200200069006e0066006f0072006d006100 73006a006f006e0020006f006d002000680076006f007200640061 006e0020006400750020006f00700070007200650074007400650 0720020005000440046002f0058002d00310061002d006b006f00 6d00700061007400690062006c00650020005000440046002d006 4006f006b0075006d0065006e007400650072002c002000730065 0020006200720075006b00650072006800e5006e00640062006f0
  • 70. 06b0065006e00200066006f00720020004100630072006f006200 610074002e0020005000440046002d0064006f006b0075006d006 5006e00740065006e00650020006b0061006e002000e50070006e 00650073002000690020004100630072006f00620061007400200 065006c006c00650072002000410064006f006200650020005200 65006100640065007200200034002e003000200065006c006c006 50072002000730065006e006500720065002e> /PTB <FEFF005500740069006c0069007a00650020006500730073006 1007300200063006f006e00660069006700750072006100e700f5 0065007300200064006500200066006f0072006d0061002000610 0200063007200690061007200200064006f00630075006d006500 6e0074006f0073002000410064006f00620065002000500044004 600200063006100700061007a0065007300200064006500200073 006500720065006d0020007600650072006900660069006300610 064006f00730020006f0075002000710075006500200064006500 760065006d00200065007300740061007200200065006d0020006 3006f006e0066006f0072006d0069006400610064006500200063 006f006d0020006f0020005000440046002f0058002d003100610 03a0032003000300031002c00200075006d002000700061006400 7200e3006f002000640061002000490053004f002000700061007 200610020006f00200069006e007400650072006300e2006d0062 0069006f00200064006500200063006f006e0074006500fa006400 6f00200067007200e1006600690063006f002e002000500061007 200610020006f00620074006500720020006d0061006900730020 0069006e0066006f0072006d006100e700f500650073002000730 06f00620072006500200063006f006d006f002000630072006900 61007200200064006f00630075006d0065006e0074006f0073002 000500044004600200063006f006d00700061007400ed00760065 0069007300200063006f006d0020006f0020005000440046002f0 058002d00310061002c00200063006f006e00730075006c007400 650020006f0020004700750069006100200064006f00200075007 3007500e100720069006f00200064006f0020004100630072006f0 06200610074002e0020004f007300200064006f00630075006d00 65006e0074006f007300200050004400460020006300720069006 10064006f007300200070006f00640065006d0020007300650072
  • 71. 002000610062006500720074006f007300200063006f006d00200 06f0020004100630072006f006200610074002000650020006f00 2000410064006f006200650020005200650061006400650072002 00034002e0030002000650020007600650072007300f500650073 00200070006f00730074006500720069006f007200650073002e> /SUO <FEFF004b00e40079007400e40020006e00e40069007400e4002 000610073006500740075006b007300690061002c0020006b0075 006e0020006c0075006f0074002000410064006f0062006500200 050004400460020002d0064006f006b0075006d0065006e007400 740065006a0061002c0020006a006f0074006b006100200074006 10072006b0069007300740065007400610061006e002000740061 00690020006a006f006900640065006e0020007400e4007900740 07900790020006e006f0075006400610074007400610061002000 5000440046002f0058002d00310061003a0032003000300031003 a007400e400200065006c0069002000490053004f002d00730074 0061006e006400610072006400690061002000670072006100610 066006900730065006e002000730069007300e4006c006c00f600 6e00200073006900690072007400e4006d00690073007400e4002 000760061007200740065006e002e0020004c0069007300e40074 006900650074006f006a00610020005000440046002f0058002d0 0310061002d00790068007400650065006e0073006f0070006900 7600690065006e0020005000440046002d0064006f006b0075006 d0065006e0074007400690065006e0020006c0075006f006d0069 007300650073007400610020006f006e0020004100630072006f0 062006100740069006e0020006b00e400790074007400f6006f00 70007000610061007300730061002e00200020004c0075006f006 4007500740020005000440046002d0064006f006b0075006d0065 006e00740069007400200076006f0069006400610061006e00200 06100760061007400610020004100630072006f00620061007400 69006c006c00610020006a0061002000410064006f00620065002 000520065006100640065007200200034002e0030003a006c006c 00610020006a006100200075007500640065006d006d0069006c0 06c0061002e> /SVE <FEFF0041006e007600e4006e00640020006400650020006800e
  • 72. 4007200200069006e0073007400e4006c006c006e0069006e0067 00610072006e00610020006f006d0020006400750020007600690 06c006c00200073006b006100700061002000410064006f006200 650020005000440046002d0064006f006b0075006d0065006e007 400200073006f006d00200073006b00610020006b006f006e0074 0072006f006c006c006500720061007300200065006c006c00650 07200200073006f006d0020006d00e50073007400650020006d00 6f0074007300760061007200610020005000440046002f0058002 d00310061003a0032003000300031002c00200065006e00200049 0053004f002d007300740061006e0064006100720064002000660 0f600720020007500740062007900740065002000610076002000 6700720061006600690073006b007400200069006e006e0065006 800e5006c006c002e00200020004d0065007200200069006e0066 006f0072006d006100740069006f006e0020006f006d0020006800 7500720020006d0061006e00200073006b0061007000610072002 0005000440046002f0058002d00310061002d006b006f006d0070 0061007400690062006c00610020005000440046002d0064006f0 06b0075006d0065006e0074002000660069006e006e0073002000 6900200061006e007600e4006e00640061007200680061006e006 40062006f006b0065006e002000740069006c006c002000410063 0072006f006200610074002e002000200053006b0061007000610 06400650020005000440046002d0064006f006b0075006d006500 6e00740020006b0061006e002000f600700070006e00610073002 000690020004100630072006f0062006100740020006f00630068 002000410064006f0062006500200052006500610064006500720 0200034002e00300020006f00630068002000730065006e006100 720065002e> /ENU (Cadmus MediaWorks settings for Acrobat Distiller 8.) >> /Namespace [ (Adobe) (Common) (1.0) ] /OtherNamespaces [ <<
  • 73. /AsReaderSpreads false /CropImagesToFrames true /ErrorControl /WarnAndContinue /FlattenerIgnoreSpreadOverrides false /IncludeGuidesGrids false /IncludeNonPrinting false /IncludeSlug false /Namespace [ (Adobe) (InDesign) (4.0) ] /OmitPlacedBitmaps false /OmitPlacedEPS false /OmitPlacedPDF false /SimulateOverprint /Legacy >> << /AddBleedMarks false /AddColorBars false /AddCropMarks false /AddPageInfo false /AddRegMarks false /ConvertColors /ConvertToCMYK /DestinationProfileName () /DestinationProfileSelector /DocumentCMYK /Downsample16BitImages true /FlattenerPreset << /PresetSelector /HighResolution >> /FormElements false /GenerateStructure false /IncludeBookmarks false /IncludeHyperlinks false /IncludeInteractive false /IncludeLayers false
  • 74. /IncludeProfiles false /MultimediaHandling /UseObjectSettings /Namespace [ (Adobe) (CreativeSuite) (2.0) ] /PDFXOutputIntentProfileSelector /DocumentCMYK /PreserveEditing true /UntaggedCMYKHandling /LeaveUntagged /UntaggedRGBHandling /UseDocumentProfile /UseDocumentBleed false >> ] >> setdistillerparams << /HWResolution [2400 2400] /PageSize [612.000 792.000] >> setpagedevice © 2011 by the American Academy of Arts & Sciences Safety in Cyberspace Vinton G. Cerf VINTONG. CERF, a Fellow of the American Academy since 1995, is Vice President and Chief Internet Evangelist for Google Inc. Previ- ously, he served at mci, the Cor- poration for National Research Ini-