SlideShare a Scribd company logo
TECHNOLOGY AND
TROOP MORALE
Created by: Ruben Vargas
IFS101 – Spring 2013
WALK A MILE IN THEIR SHOES
Before cell-phones and internet…




                                   troops often felt isolated and lonely
COMMUNICATION OBSTACLES
Access to Phones was difficult   Not everyone had them   Calling could be expensive
SNAIL MAIL
Often times, mail took weeks to receive. One of the most
anticipated times of a service-member’s day is mail-call.


Even though technology has advanced to where email, instant-
messages and the internet make communication instantaneous;
troops still sometimes feel a handwritten letter is better than what
technology has to offer.


It’s just more personal!
MILITARY SOCIAL
CULTURE FILLS THE
VOID WHEN
TECHNOLOGY IS
ABSENT
Military families helped buffer loneliness
when expensive phone calls were not
affordable, and mail delivery was slow


Military families create dynamic social
cultures for building morale and
bonding
HOW HAS TECHNOLOGY
                        IMPACTED TROOP MORALE?
Troops are always       Video Chat allows        Internet and Social
able to check-in        face-to-face time        Media replace mail
Cell-Phone Capability   Webcam Chat Capability   Email Capability
TECHNOLOGY IMPROVES
                                        MORALE, BUT CAN HAVE
                                CONSEQUENCES AT THE SAME TIME




Troop Safety                         Viruses Might Be
Jeopardized                          Downloaded                       Matters of Privacy
Troops may inadvertently give away   Computer viruses might infect    Personal posts may be monitored;
location to enemies due to GPS       government computers and cause   privacy is not to be expected; activity
signaling on their cell-phone        failures or security threats     and personal posts could result in
                                                                      legal repercussions
Works Cited

Coins. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/cKPU3c>.

Computer Code. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/koJpfs>.

Gavel. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/DM9y0o>.

Girl Holding U.S. Flag. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/bKc4d7>.

Handwritten Letter. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/CuPY64>.
Home with U.S. Flag. Digital image. Morgue FIle. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/dqC6Xs>.

IPhone. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/32xRXv>.

Laptop. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/hYrJN1>.

Map. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/SO82NA>.


Ode to Kurt. Desmond Peck, n.d. Www.madeloud.com. Web. 13 Apr. 2013.

    <http://www.madeloud.com/artists/desmond-peck/music/tracks/ode-kurt>.
Payphone. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/lEmRT2>.

Rotary Phone. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/9tfL3q>.

Soldier Sitting with Rifle B/W. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/ldWF6N>.

Soldier Wearing Helmet B/W. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/ZaHeys>.
Webcam. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/pVVcAG>.

Welcome Home Sign. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/rCiu3n>.

More Related Content

What's hot

Challenge communication - Loui, Kieran, Donavan, Conor
Challenge communication - Loui, Kieran, Donavan, ConorChallenge communication - Loui, Kieran, Donavan, Conor
Challenge communication - Loui, Kieran, Donavan, Conor
sgibbons1hp
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
Challenge:Future
 
Challenge Communication - Molly and Leah
Challenge Communication - Molly and LeahChallenge Communication - Molly and Leah
Challenge Communication - Molly and Leah
sgibbons1hp
 
BSmith Presentation Samples 0713
BSmith Presentation Samples 0713BSmith Presentation Samples 0713
BSmith Presentation Samples 0713
Brian Smith
 

What's hot (20)

Programma o sarai programmato
Programma o sarai programmatoProgramma o sarai programmato
Programma o sarai programmato
 
BYOD eBook Part 1 DREW
BYOD eBook Part 1 DREWBYOD eBook Part 1 DREW
BYOD eBook Part 1 DREW
 
SMBCE: all about mobile
SMBCE: all about mobileSMBCE: all about mobile
SMBCE: all about mobile
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Augmented reality- Why super powers lead to minor injuries and major memory l...
Augmented reality- Why super powers lead to minor injuries and major memory l...Augmented reality- Why super powers lead to minor injuries and major memory l...
Augmented reality- Why super powers lead to minor injuries and major memory l...
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)
 
Challenge communication - Loui, Kieran, Donavan, Conor
Challenge communication - Loui, Kieran, Donavan, ConorChallenge communication - Loui, Kieran, Donavan, Conor
Challenge communication - Loui, Kieran, Donavan, Conor
 
Crime & technology
Crime & technologyCrime & technology
Crime & technology
 
Fosi parent-tips
Fosi parent-tipsFosi parent-tips
Fosi parent-tips
 
Virtual Reading
Virtual ReadingVirtual Reading
Virtual Reading
 
Smartphone safety
Smartphone safetySmartphone safety
Smartphone safety
 
Mobile Applications
Mobile ApplicationsMobile Applications
Mobile Applications
 
URJ Social Media Boot Camp: Mobile Strategies
URJ Social Media Boot Camp: Mobile StrategiesURJ Social Media Boot Camp: Mobile Strategies
URJ Social Media Boot Camp: Mobile Strategies
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
 
Challenge Communication - Molly and Leah
Challenge Communication - Molly and LeahChallenge Communication - Molly and Leah
Challenge Communication - Molly and Leah
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
BSmith Presentation Samples 0713
BSmith Presentation Samples 0713BSmith Presentation Samples 0713
BSmith Presentation Samples 0713
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 

Viewers also liked (8)

Best of Web 2.0
Best  of Web 2.0 Best  of Web 2.0
Best of Web 2.0
 
Michelle's Portfolio
Michelle's PortfolioMichelle's Portfolio
Michelle's Portfolio
 
gia may phat dien cummins 60kva
gia may phat dien cummins 60kvagia may phat dien cummins 60kva
gia may phat dien cummins 60kva
 
CU Online Webinar - Integrating media into your course
CU Online Webinar  - Integrating media into your courseCU Online Webinar  - Integrating media into your course
CU Online Webinar - Integrating media into your course
 
Web 2.0 tools
Web 2.0 toolsWeb 2.0 tools
Web 2.0 tools
 
Sean orlins (1)
Sean orlins (1)Sean orlins (1)
Sean orlins (1)
 
Indoor Allergies
Indoor AllergiesIndoor Allergies
Indoor Allergies
 
Asthma Triggers
Asthma TriggersAsthma Triggers
Asthma Triggers
 

Similar to Technology and troop morale slide

cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
Akhil Kumar
 
51803561 disadvantages-of-information-technology
51803561 disadvantages-of-information-technology51803561 disadvantages-of-information-technology
51803561 disadvantages-of-information-technology
Muntaquir Hasnain
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
alxdvs
 
Nss repko
Nss repkoNss repko
Nss repko
rrepko
 

Similar to Technology and troop morale slide (20)

17 Disadvantages of Digital Technology.pptx
17 Disadvantages of Digital Technology.pptx17 Disadvantages of Digital Technology.pptx
17 Disadvantages of Digital Technology.pptx
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
K.Jacobs COMM 303 Final Project
K.Jacobs COMM 303 Final ProjectK.Jacobs COMM 303 Final Project
K.Jacobs COMM 303 Final Project
 
Technology and Human Communication, Social Interaction
Technology and Human Communication, Social InteractionTechnology and Human Communication, Social Interaction
Technology and Human Communication, Social Interaction
 
Digital vs analogue
Digital vs analogueDigital vs analogue
Digital vs analogue
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
51803561 disadvantages-of-information-technology
51803561 disadvantages-of-information-technology51803561 disadvantages-of-information-technology
51803561 disadvantages-of-information-technology
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Artist l1mobilecomputing
Artist l1mobilecomputingArtist l1mobilecomputing
Artist l1mobilecomputing
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
 
Cscs (4)
Cscs (4)Cscs (4)
Cscs (4)
 
Cscs (4)
Cscs (4)Cscs (4)
Cscs (4)
 
Mrisks
MrisksMrisks
Mrisks
 
Business Travel Executive, Rough Edges
Business Travel Executive, Rough EdgesBusiness Travel Executive, Rough Edges
Business Travel Executive, Rough Edges
 
Cellphones david juan
Cellphones david juanCellphones david juan
Cellphones david juan
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Nss repko
Nss repkoNss repko
Nss repko
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 

Technology and troop morale slide

  • 1. TECHNOLOGY AND TROOP MORALE Created by: Ruben Vargas IFS101 – Spring 2013
  • 2. WALK A MILE IN THEIR SHOES Before cell-phones and internet… troops often felt isolated and lonely
  • 3. COMMUNICATION OBSTACLES Access to Phones was difficult Not everyone had them Calling could be expensive
  • 4. SNAIL MAIL Often times, mail took weeks to receive. One of the most anticipated times of a service-member’s day is mail-call. Even though technology has advanced to where email, instant- messages and the internet make communication instantaneous; troops still sometimes feel a handwritten letter is better than what technology has to offer. It’s just more personal!
  • 5. MILITARY SOCIAL CULTURE FILLS THE VOID WHEN TECHNOLOGY IS ABSENT Military families helped buffer loneliness when expensive phone calls were not affordable, and mail delivery was slow Military families create dynamic social cultures for building morale and bonding
  • 6. HOW HAS TECHNOLOGY IMPACTED TROOP MORALE? Troops are always Video Chat allows Internet and Social able to check-in face-to-face time Media replace mail Cell-Phone Capability Webcam Chat Capability Email Capability
  • 7. TECHNOLOGY IMPROVES MORALE, BUT CAN HAVE CONSEQUENCES AT THE SAME TIME Troop Safety Viruses Might Be Jeopardized Downloaded Matters of Privacy Troops may inadvertently give away Computer viruses might infect Personal posts may be monitored; location to enemies due to GPS government computers and cause privacy is not to be expected; activity signaling on their cell-phone failures or security threats and personal posts could result in legal repercussions
  • 8. Works Cited Coins. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/cKPU3c>. Computer Code. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/koJpfs>. Gavel. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/DM9y0o>. Girl Holding U.S. Flag. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/bKc4d7>. Handwritten Letter. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/CuPY64>.
  • 9. Home with U.S. Flag. Digital image. Morgue FIle. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/dqC6Xs>. IPhone. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/32xRXv>. Laptop. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/hYrJN1>. Map. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/SO82NA>. Ode to Kurt. Desmond Peck, n.d. Www.madeloud.com. Web. 13 Apr. 2013. <http://www.madeloud.com/artists/desmond-peck/music/tracks/ode-kurt>.
  • 10. Payphone. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/lEmRT2>. Rotary Phone. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/9tfL3q>. Soldier Sitting with Rifle B/W. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/ldWF6N>. Soldier Wearing Helmet B/W. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/ZaHeys>.
  • 11. Webcam. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/pVVcAG>. Welcome Home Sign. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/rCiu3n>.