SlideShare a Scribd company logo
1 of 3
Download to read offline
With the vast increase in technology, the number of ways that the use of cybertechnology impact
the personalities are also increasing. Many of the social scientists has proofs for this.
One incident, in the 1980s, that quickly caught their attention involved a male psychologist who
joined an online forum for disabled persons, where he identified himself as a woman who had
become crippled as a result of an automobile accident.
Mitch Parsell (2008) describes the Internet as a "powerful new force" for what he calls "the
manufacture of identity." He believes that this technological medium offers an unparalleled
ability to create ourselves in our own image. It gives users an unprecedented capacity to
determine their initial presentations to others.In short, it enables users to be masters of their
identity.
Now when we talk about Ethics and Technology: Controversies, Questions, and Strategies for
Ethical Computing:
Cybertechnology as a "Medium of Self-Expression" Sherry Turkle (2005) notes that by the
mid-1980s, computers had become an "evocative object"—i.e., an object that "provoked self-
reflection." Turkle suggested that a computer could be viewed as a model for analyzing and
constructing one's identity. She also noted that the computer has become a medium through
which people could discover their personal identity; for example, computers provide a context in
which individuals can try out different cognitive styles and different methods of problem solving
to ultimately discover which style or method they prefer. Because people develop their own
unique style of computing, Turkle argues that the computational environment becomes an
extension of themselves, in much the same way that their manner of dress is an extension of their
personality. So, in her view, a computer can function as a "medium for self-expression" as well
as for "self-discovery.
Impact of cybertechnology on Sense of Self
We have examined some effects that one's interactions in virtual or computer-mediated
environments, including MOOs and MUDs, can have for one's personal identity.
2 main factors are:
our relation to nature,
our relation to (and sense of place in) the universe.
Williams notes that in the aftermath of these milestones, we have a much humbler view of our
place in the universe than our ancestors did.
How, exactly, has cybertechnology also has influenced the way that we see ourselves in relation
to both the factors—i.e., how has this relatively recent technology already begun to define us as
human beings?
To support Bolter's thesis that we have come to see ourselves more and more in computer-like
ways, we have only to reflect for a moment on some of the expressions that we now use to
describe ourselves. For example, Bolter points out that when psychologists speak of "input and
output states of the brain," or of the brain's hardware and software, they exemplify Turing's
men. And when cognitive psychologists study the "mind's algorithm for searching long-term
memory," or when linguists treat human language as if it were a programming code, they, too,
are "Turing's men." Psychologists and cognitive scientists who suggest that the human mind is
like a computer in that it "encodes, stores, retrieves, and processes information" are also, in
Bolter's view, Turing's men.
Not only do we think of ourselves in computer-like terms but we also describe many objects and
events in our environment in the language of computer technology:
we consider the manager chairing a business meeting who requests that a specific topic on the
agenda be discussed "off-line" instead. Finally, what should make of the cartoonist whose
illustration of an expectant mother includes a caption in which she complains about having to
wait 9 months to "download her baby"? You can probably think of some other ways that we
also invoke computer-like metaphors to describe our world.
Solution
With the vast increase in technology, the number of ways that the use of cybertechnology impact
the personalities are also increasing. Many of the social scientists has proofs for this.
One incident, in the 1980s, that quickly caught their attention involved a male psychologist who
joined an online forum for disabled persons, where he identified himself as a woman who had
become crippled as a result of an automobile accident.
Mitch Parsell (2008) describes the Internet as a "powerful new force" for what he calls "the
manufacture of identity." He believes that this technological medium offers an unparalleled
ability to create ourselves in our own image. It gives users an unprecedented capacity to
determine their initial presentations to others.In short, it enables users to be masters of their
identity.
Now when we talk about Ethics and Technology: Controversies, Questions, and Strategies for
Ethical Computing:
Cybertechnology as a "Medium of Self-Expression" Sherry Turkle (2005) notes that by the
mid-1980s, computers had become an "evocative object"—i.e., an object that "provoked self-
reflection." Turkle suggested that a computer could be viewed as a model for analyzing and
constructing one's identity. She also noted that the computer has become a medium through
which people could discover their personal identity; for example, computers provide a context in
which individuals can try out different cognitive styles and different methods of problem solving
to ultimately discover which style or method they prefer. Because people develop their own
unique style of computing, Turkle argues that the computational environment becomes an
extension of themselves, in much the same way that their manner of dress is an extension of their
personality. So, in her view, a computer can function as a "medium for self-expression" as well
as for "self-discovery.
Impact of cybertechnology on Sense of Self
We have examined some effects that one's interactions in virtual or computer-mediated
environments, including MOOs and MUDs, can have for one's personal identity.
2 main factors are:
our relation to nature,
our relation to (and sense of place in) the universe.
Williams notes that in the aftermath of these milestones, we have a much humbler view of our
place in the universe than our ancestors did.
How, exactly, has cybertechnology also has influenced the way that we see ourselves in relation
to both the factors—i.e., how has this relatively recent technology already begun to define us as
human beings?
To support Bolter's thesis that we have come to see ourselves more and more in computer-like
ways, we have only to reflect for a moment on some of the expressions that we now use to
describe ourselves. For example, Bolter points out that when psychologists speak of "input and
output states of the brain," or of the brain's hardware and software, they exemplify Turing's
men. And when cognitive psychologists study the "mind's algorithm for searching long-term
memory," or when linguists treat human language as if it were a programming code, they, too,
are "Turing's men." Psychologists and cognitive scientists who suggest that the human mind is
like a computer in that it "encodes, stores, retrieves, and processes information" are also, in
Bolter's view, Turing's men.
Not only do we think of ourselves in computer-like terms but we also describe many objects and
events in our environment in the language of computer technology:
we consider the manager chairing a business meeting who requests that a specific topic on the
agenda be discussed "off-line" instead. Finally, what should make of the cartoonist whose
illustration of an expectant mother includes a caption in which she complains about having to
wait 9 months to "download her baby"? You can probably think of some other ways that we
also invoke computer-like metaphors to describe our world.

More Related Content

Similar to With the vast increase in technology, the number of ways that the us.pdf

Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxpatricke8
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxmccormicknadine86
 
Computer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyComputer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyLinaCovington707
 
Human-machine Inter-agencies
Human-machine Inter-agenciesHuman-machine Inter-agencies
Human-machine Inter-agenciesmo-seph
 
The Use Of Labelling Of Different Products And Services...
The Use Of Labelling Of Different Products And Services...The Use Of Labelling Of Different Products And Services...
The Use Of Labelling Of Different Products And Services...Roxy Roberts
 
The Future of Communication Artificial Intelligence and Social Networks.pdf
The Future of Communication  Artificial Intelligence and Social Networks.pdfThe Future of Communication  Artificial Intelligence and Social Networks.pdf
The Future of Communication Artificial Intelligence and Social Networks.pdfTina652927
 
Publishing the private notes
Publishing the private   notesPublishing the private   notes
Publishing the private notesDavid Patman
 
bhusal2Prepared byDeepak BhusalCWID50259419To P
bhusal2Prepared byDeepak BhusalCWID50259419To Pbhusal2Prepared byDeepak BhusalCWID50259419To P
bhusal2Prepared byDeepak BhusalCWID50259419To PChantellPantoja184
 
Bhusal2 prepared bydeepak bhusalcwid50259419to p
Bhusal2 prepared bydeepak bhusalcwid50259419to pBhusal2 prepared bydeepak bhusalcwid50259419to p
Bhusal2 prepared bydeepak bhusalcwid50259419to phoney725342
 
Konica Minolta - Artificial Intelligence White Paper
Konica Minolta - Artificial Intelligence White PaperKonica Minolta - Artificial Intelligence White Paper
Konica Minolta - Artificial Intelligence White PaperEyal Benedek
 
24 April 2016, Volume 53, Number 4We Feel a Change Comin’ .docx
24 April 2016, Volume 53, Number 4We Feel a Change Comin’ .docx24 April 2016, Volume 53, Number 4We Feel a Change Comin’ .docx
24 April 2016, Volume 53, Number 4We Feel a Change Comin’ .docxtamicawaysmith
 
Computer Research Papers
Computer Research PapersComputer Research Papers
Computer Research PapersMonica Rivera
 
Discussion Question 1 The Emergency Medical Treatment and Active .docx
Discussion Question 1 The Emergency Medical Treatment and Active .docxDiscussion Question 1 The Emergency Medical Treatment and Active .docx
Discussion Question 1 The Emergency Medical Treatment and Active .docxduketjoy27252
 
Discussion Question 1 The Emergency Medical Treatment and Active .docx
Discussion Question 1 The Emergency Medical Treatment and Active .docxDiscussion Question 1 The Emergency Medical Treatment and Active .docx
Discussion Question 1 The Emergency Medical Treatment and Active .docxedgar6wallace88877
 
Networking; past present and future; and the importance of personality
Networking; past present and future; and the importance of personalityNetworking; past present and future; and the importance of personality
Networking; past present and future; and the importance of personalityEd Mitchell
 

Similar to With the vast increase in technology, the number of ways that the us.pdf (16)

Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
 
Computer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyComputer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information Technology
 
Human-machine Inter-agencies
Human-machine Inter-agenciesHuman-machine Inter-agencies
Human-machine Inter-agencies
 
The Use Of Labelling Of Different Products And Services...
The Use Of Labelling Of Different Products And Services...The Use Of Labelling Of Different Products And Services...
The Use Of Labelling Of Different Products And Services...
 
The Future of Communication Artificial Intelligence and Social Networks.pdf
The Future of Communication  Artificial Intelligence and Social Networks.pdfThe Future of Communication  Artificial Intelligence and Social Networks.pdf
The Future of Communication Artificial Intelligence and Social Networks.pdf
 
Societal and ethical issues of digitization
Societal and ethical issues of digitizationSocietal and ethical issues of digitization
Societal and ethical issues of digitization
 
Publishing the private notes
Publishing the private   notesPublishing the private   notes
Publishing the private notes
 
bhusal2Prepared byDeepak BhusalCWID50259419To P
bhusal2Prepared byDeepak BhusalCWID50259419To Pbhusal2Prepared byDeepak BhusalCWID50259419To P
bhusal2Prepared byDeepak BhusalCWID50259419To P
 
Bhusal2 prepared bydeepak bhusalcwid50259419to p
Bhusal2 prepared bydeepak bhusalcwid50259419to pBhusal2 prepared bydeepak bhusalcwid50259419to p
Bhusal2 prepared bydeepak bhusalcwid50259419to p
 
Konica Minolta - Artificial Intelligence White Paper
Konica Minolta - Artificial Intelligence White PaperKonica Minolta - Artificial Intelligence White Paper
Konica Minolta - Artificial Intelligence White Paper
 
24 April 2016, Volume 53, Number 4We Feel a Change Comin’ .docx
24 April 2016, Volume 53, Number 4We Feel a Change Comin’ .docx24 April 2016, Volume 53, Number 4We Feel a Change Comin’ .docx
24 April 2016, Volume 53, Number 4We Feel a Change Comin’ .docx
 
Computer Research Papers
Computer Research PapersComputer Research Papers
Computer Research Papers
 
Discussion Question 1 The Emergency Medical Treatment and Active .docx
Discussion Question 1 The Emergency Medical Treatment and Active .docxDiscussion Question 1 The Emergency Medical Treatment and Active .docx
Discussion Question 1 The Emergency Medical Treatment and Active .docx
 
Discussion Question 1 The Emergency Medical Treatment and Active .docx
Discussion Question 1 The Emergency Medical Treatment and Active .docxDiscussion Question 1 The Emergency Medical Treatment and Active .docx
Discussion Question 1 The Emergency Medical Treatment and Active .docx
 
Networking; past present and future; and the importance of personality
Networking; past present and future; and the importance of personalityNetworking; past present and future; and the importance of personality
Networking; past present and future; and the importance of personality
 

More from aravlitraders2012

Exception to indicate that Singly LinkedList is empty. .pdf
  Exception to indicate that Singly LinkedList is empty. .pdf  Exception to indicate that Singly LinkedList is empty. .pdf
Exception to indicate that Singly LinkedList is empty. .pdfaravlitraders2012
 
Electronegativity - Electronegativity is an atom.pdf
                     Electronegativity - Electronegativity is an atom.pdf                     Electronegativity - Electronegativity is an atom.pdf
Electronegativity - Electronegativity is an atom.pdfaravlitraders2012
 
Sequence.h#ifndef MAIN #define MAIN #include cstdlibclass .pdf
Sequence.h#ifndef MAIN #define MAIN #include cstdlibclass .pdfSequence.h#ifndef MAIN #define MAIN #include cstdlibclass .pdf
Sequence.h#ifndef MAIN #define MAIN #include cstdlibclass .pdfaravlitraders2012
 
In the 1st Question, As the polymorphisms occur in the non-coding se.pdf
  In the 1st Question, As the polymorphisms occur in the non-coding se.pdf  In the 1st Question, As the polymorphisms occur in the non-coding se.pdf
In the 1st Question, As the polymorphisms occur in the non-coding se.pdfaravlitraders2012
 
I noticed that temperature is not mentioned. A) .pdf
                     I noticed that temperature is not mentioned.  A) .pdf                     I noticed that temperature is not mentioned.  A) .pdf
I noticed that temperature is not mentioned. A) .pdfaravlitraders2012
 
1. Briefly describe the structured design approach and the object-or.pdf
1. Briefly describe the structured design approach and the object-or.pdf1. Briefly describe the structured design approach and the object-or.pdf
1. Briefly describe the structured design approach and the object-or.pdfaravlitraders2012
 
1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdfaravlitraders2012
 
argon is inert gas , doesnot chemically reacts wi.pdf
                     argon is inert gas , doesnot chemically reacts wi.pdf                     argon is inert gas , doesnot chemically reacts wi.pdf
argon is inert gas , doesnot chemically reacts wi.pdfaravlitraders2012
 
#include sstream #include linkylist.h #include iostream.pdf
#include sstream #include linkylist.h #include iostream.pdf#include sstream #include linkylist.h #include iostream.pdf
#include sstream #include linkylist.h #include iostream.pdfaravlitraders2012
 
Function header If a program contain a function definition, that .pdf
Function header If a program contain a function definition, that .pdfFunction header If a program contain a function definition, that .pdf
Function header If a program contain a function definition, that .pdfaravlitraders2012
 
GameOfLife.cs using System; using System.Collections.Generic;.pdf
GameOfLife.cs using System; using System.Collections.Generic;.pdfGameOfLife.cs using System; using System.Collections.Generic;.pdf
GameOfLife.cs using System; using System.Collections.Generic;.pdfaravlitraders2012
 
Let n = size of the hash table hashTable = array of size n, w.pdf
Let n = size of the hash table  hashTable = array of size n, w.pdfLet n = size of the hash table  hashTable = array of size n, w.pdf
Let n = size of the hash table hashTable = array of size n, w.pdfaravlitraders2012
 
What is the need of the t Distribution According to the central.pdf
What is the need of the t Distribution According to the central.pdfWhat is the need of the t Distribution According to the central.pdf
What is the need of the t Distribution According to the central.pdfaravlitraders2012
 
We can see in course of evolution of plant there was a transition fr.pdf
We can see in course of evolution of plant there was a transition fr.pdfWe can see in course of evolution of plant there was a transition fr.pdf
We can see in course of evolution of plant there was a transition fr.pdfaravlitraders2012
 
Wave CharacterMany of the things that light does are only expla.pdf
 Wave CharacterMany of the things that light does are only expla.pdf Wave CharacterMany of the things that light does are only expla.pdf
Wave CharacterMany of the things that light does are only expla.pdfaravlitraders2012
 
The solvent doesnt interfere with the purification processOil Bath.pdf
The solvent doesnt interfere with the purification processOil Bath.pdfThe solvent doesnt interfere with the purification processOil Bath.pdf
The solvent doesnt interfere with the purification processOil Bath.pdfaravlitraders2012
 
An object of class StatCalc can be used to compute several simp.pdf
 An object of class StatCalc can be used to compute several simp.pdf An object of class StatCalc can be used to compute several simp.pdf
An object of class StatCalc can be used to compute several simp.pdfaravlitraders2012
 
The answers can be found below as discussedPart 1)The human gen.pdf
The answers can be found below as discussedPart 1)The human gen.pdfThe answers can be found below as discussedPart 1)The human gen.pdf
The answers can be found below as discussedPart 1)The human gen.pdfaravlitraders2012
 
Solution (3)The smallest respiratory bronchioles subdivide into t.pdf
Solution (3)The smallest respiratory bronchioles subdivide into t.pdfSolution (3)The smallest respiratory bronchioles subdivide into t.pdf
Solution (3)The smallest respiratory bronchioles subdivide into t.pdfaravlitraders2012
 
An asset manager of a hedge fund or a mutual funds is the one who di.pdf
An asset manager of a hedge fund or a mutual funds is the one who di.pdfAn asset manager of a hedge fund or a mutual funds is the one who di.pdf
An asset manager of a hedge fund or a mutual funds is the one who di.pdfaravlitraders2012
 

More from aravlitraders2012 (20)

Exception to indicate that Singly LinkedList is empty. .pdf
  Exception to indicate that Singly LinkedList is empty. .pdf  Exception to indicate that Singly LinkedList is empty. .pdf
Exception to indicate that Singly LinkedList is empty. .pdf
 
Electronegativity - Electronegativity is an atom.pdf
                     Electronegativity - Electronegativity is an atom.pdf                     Electronegativity - Electronegativity is an atom.pdf
Electronegativity - Electronegativity is an atom.pdf
 
Sequence.h#ifndef MAIN #define MAIN #include cstdlibclass .pdf
Sequence.h#ifndef MAIN #define MAIN #include cstdlibclass .pdfSequence.h#ifndef MAIN #define MAIN #include cstdlibclass .pdf
Sequence.h#ifndef MAIN #define MAIN #include cstdlibclass .pdf
 
In the 1st Question, As the polymorphisms occur in the non-coding se.pdf
  In the 1st Question, As the polymorphisms occur in the non-coding se.pdf  In the 1st Question, As the polymorphisms occur in the non-coding se.pdf
In the 1st Question, As the polymorphisms occur in the non-coding se.pdf
 
I noticed that temperature is not mentioned. A) .pdf
                     I noticed that temperature is not mentioned.  A) .pdf                     I noticed that temperature is not mentioned.  A) .pdf
I noticed that temperature is not mentioned. A) .pdf
 
1. Briefly describe the structured design approach and the object-or.pdf
1. Briefly describe the structured design approach and the object-or.pdf1. Briefly describe the structured design approach and the object-or.pdf
1. Briefly describe the structured design approach and the object-or.pdf
 
1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf
 
argon is inert gas , doesnot chemically reacts wi.pdf
                     argon is inert gas , doesnot chemically reacts wi.pdf                     argon is inert gas , doesnot chemically reacts wi.pdf
argon is inert gas , doesnot chemically reacts wi.pdf
 
#include sstream #include linkylist.h #include iostream.pdf
#include sstream #include linkylist.h #include iostream.pdf#include sstream #include linkylist.h #include iostream.pdf
#include sstream #include linkylist.h #include iostream.pdf
 
Function header If a program contain a function definition, that .pdf
Function header If a program contain a function definition, that .pdfFunction header If a program contain a function definition, that .pdf
Function header If a program contain a function definition, that .pdf
 
GameOfLife.cs using System; using System.Collections.Generic;.pdf
GameOfLife.cs using System; using System.Collections.Generic;.pdfGameOfLife.cs using System; using System.Collections.Generic;.pdf
GameOfLife.cs using System; using System.Collections.Generic;.pdf
 
Let n = size of the hash table hashTable = array of size n, w.pdf
Let n = size of the hash table  hashTable = array of size n, w.pdfLet n = size of the hash table  hashTable = array of size n, w.pdf
Let n = size of the hash table hashTable = array of size n, w.pdf
 
What is the need of the t Distribution According to the central.pdf
What is the need of the t Distribution According to the central.pdfWhat is the need of the t Distribution According to the central.pdf
What is the need of the t Distribution According to the central.pdf
 
We can see in course of evolution of plant there was a transition fr.pdf
We can see in course of evolution of plant there was a transition fr.pdfWe can see in course of evolution of plant there was a transition fr.pdf
We can see in course of evolution of plant there was a transition fr.pdf
 
Wave CharacterMany of the things that light does are only expla.pdf
 Wave CharacterMany of the things that light does are only expla.pdf Wave CharacterMany of the things that light does are only expla.pdf
Wave CharacterMany of the things that light does are only expla.pdf
 
The solvent doesnt interfere with the purification processOil Bath.pdf
The solvent doesnt interfere with the purification processOil Bath.pdfThe solvent doesnt interfere with the purification processOil Bath.pdf
The solvent doesnt interfere with the purification processOil Bath.pdf
 
An object of class StatCalc can be used to compute several simp.pdf
 An object of class StatCalc can be used to compute several simp.pdf An object of class StatCalc can be used to compute several simp.pdf
An object of class StatCalc can be used to compute several simp.pdf
 
The answers can be found below as discussedPart 1)The human gen.pdf
The answers can be found below as discussedPart 1)The human gen.pdfThe answers can be found below as discussedPart 1)The human gen.pdf
The answers can be found below as discussedPart 1)The human gen.pdf
 
Solution (3)The smallest respiratory bronchioles subdivide into t.pdf
Solution (3)The smallest respiratory bronchioles subdivide into t.pdfSolution (3)The smallest respiratory bronchioles subdivide into t.pdf
Solution (3)The smallest respiratory bronchioles subdivide into t.pdf
 
An asset manager of a hedge fund or a mutual funds is the one who di.pdf
An asset manager of a hedge fund or a mutual funds is the one who di.pdfAn asset manager of a hedge fund or a mutual funds is the one who di.pdf
An asset manager of a hedge fund or a mutual funds is the one who di.pdf
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

With the vast increase in technology, the number of ways that the us.pdf

  • 1. With the vast increase in technology, the number of ways that the use of cybertechnology impact the personalities are also increasing. Many of the social scientists has proofs for this. One incident, in the 1980s, that quickly caught their attention involved a male psychologist who joined an online forum for disabled persons, where he identified himself as a woman who had become crippled as a result of an automobile accident. Mitch Parsell (2008) describes the Internet as a "powerful new force" for what he calls "the manufacture of identity." He believes that this technological medium offers an unparalleled ability to create ourselves in our own image. It gives users an unprecedented capacity to determine their initial presentations to others.In short, it enables users to be masters of their identity. Now when we talk about Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing: Cybertechnology as a "Medium of Self-Expression" Sherry Turkle (2005) notes that by the mid-1980s, computers had become an "evocative object"—i.e., an object that "provoked self- reflection." Turkle suggested that a computer could be viewed as a model for analyzing and constructing one's identity. She also noted that the computer has become a medium through which people could discover their personal identity; for example, computers provide a context in which individuals can try out different cognitive styles and different methods of problem solving to ultimately discover which style or method they prefer. Because people develop their own unique style of computing, Turkle argues that the computational environment becomes an extension of themselves, in much the same way that their manner of dress is an extension of their personality. So, in her view, a computer can function as a "medium for self-expression" as well as for "self-discovery. Impact of cybertechnology on Sense of Self We have examined some effects that one's interactions in virtual or computer-mediated environments, including MOOs and MUDs, can have for one's personal identity. 2 main factors are: our relation to nature, our relation to (and sense of place in) the universe. Williams notes that in the aftermath of these milestones, we have a much humbler view of our place in the universe than our ancestors did. How, exactly, has cybertechnology also has influenced the way that we see ourselves in relation to both the factors—i.e., how has this relatively recent technology already begun to define us as human beings? To support Bolter's thesis that we have come to see ourselves more and more in computer-like
  • 2. ways, we have only to reflect for a moment on some of the expressions that we now use to describe ourselves. For example, Bolter points out that when psychologists speak of "input and output states of the brain," or of the brain's hardware and software, they exemplify Turing's men. And when cognitive psychologists study the "mind's algorithm for searching long-term memory," or when linguists treat human language as if it were a programming code, they, too, are "Turing's men." Psychologists and cognitive scientists who suggest that the human mind is like a computer in that it "encodes, stores, retrieves, and processes information" are also, in Bolter's view, Turing's men. Not only do we think of ourselves in computer-like terms but we also describe many objects and events in our environment in the language of computer technology: we consider the manager chairing a business meeting who requests that a specific topic on the agenda be discussed "off-line" instead. Finally, what should make of the cartoonist whose illustration of an expectant mother includes a caption in which she complains about having to wait 9 months to "download her baby"? You can probably think of some other ways that we also invoke computer-like metaphors to describe our world. Solution With the vast increase in technology, the number of ways that the use of cybertechnology impact the personalities are also increasing. Many of the social scientists has proofs for this. One incident, in the 1980s, that quickly caught their attention involved a male psychologist who joined an online forum for disabled persons, where he identified himself as a woman who had become crippled as a result of an automobile accident. Mitch Parsell (2008) describes the Internet as a "powerful new force" for what he calls "the manufacture of identity." He believes that this technological medium offers an unparalleled ability to create ourselves in our own image. It gives users an unprecedented capacity to determine their initial presentations to others.In short, it enables users to be masters of their identity. Now when we talk about Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing: Cybertechnology as a "Medium of Self-Expression" Sherry Turkle (2005) notes that by the mid-1980s, computers had become an "evocative object"—i.e., an object that "provoked self- reflection." Turkle suggested that a computer could be viewed as a model for analyzing and constructing one's identity. She also noted that the computer has become a medium through which people could discover their personal identity; for example, computers provide a context in which individuals can try out different cognitive styles and different methods of problem solving
  • 3. to ultimately discover which style or method they prefer. Because people develop their own unique style of computing, Turkle argues that the computational environment becomes an extension of themselves, in much the same way that their manner of dress is an extension of their personality. So, in her view, a computer can function as a "medium for self-expression" as well as for "self-discovery. Impact of cybertechnology on Sense of Self We have examined some effects that one's interactions in virtual or computer-mediated environments, including MOOs and MUDs, can have for one's personal identity. 2 main factors are: our relation to nature, our relation to (and sense of place in) the universe. Williams notes that in the aftermath of these milestones, we have a much humbler view of our place in the universe than our ancestors did. How, exactly, has cybertechnology also has influenced the way that we see ourselves in relation to both the factors—i.e., how has this relatively recent technology already begun to define us as human beings? To support Bolter's thesis that we have come to see ourselves more and more in computer-like ways, we have only to reflect for a moment on some of the expressions that we now use to describe ourselves. For example, Bolter points out that when psychologists speak of "input and output states of the brain," or of the brain's hardware and software, they exemplify Turing's men. And when cognitive psychologists study the "mind's algorithm for searching long-term memory," or when linguists treat human language as if it were a programming code, they, too, are "Turing's men." Psychologists and cognitive scientists who suggest that the human mind is like a computer in that it "encodes, stores, retrieves, and processes information" are also, in Bolter's view, Turing's men. Not only do we think of ourselves in computer-like terms but we also describe many objects and events in our environment in the language of computer technology: we consider the manager chairing a business meeting who requests that a specific topic on the agenda be discussed "off-line" instead. Finally, what should make of the cartoonist whose illustration of an expectant mother includes a caption in which she complains about having to wait 9 months to "download her baby"? You can probably think of some other ways that we also invoke computer-like metaphors to describe our world.