ABSTRACT : In recent years,
technology and technologic devices have become part of our daily lives. People,
reaches to the information in easy, quickly, cheap way by using technology and technologic
devices also dependent people who want to quick access to information and want
to be in continuous contact with each other. Even people have more than one
smart phone, tablet, laptop, smart TV at their home... Especially widespread
use of the Internet, people changed their traditional communication style and
they began to communicate each other via social network. In this study,
development history of technological devices, advantages and disadvanteges of
tablets, smart TVs, smart meters, smart phones, social networks, e-commerce
sites and computer games are surveyed. Impact of technology on human life and
some risks are identified and evaluated as cyber espionage, identity theft,
violation of privacy.
Keywords: social network, smart
meters, smart meters, e-commerce sites, computer games, cyber espionage,
identity theft, violation of privacy.
ÖZET: Son yıllarda, teknolojinin
gelişmesiyle birlikte teknoloji ve teknolojik aygıtlar günlük yaşamımızın bir
parçası haline geldi. İnsanlar, teknolojileri ve teknolojik aygıtları
kullanarak bilgiye kolay, ucuz, hızlı bir şekilde ulaşır. Ayrıca insanların
bilgiye hızlı ulaşma isteği ve birbirleriyle sürekli iletişimde olma isteği
bağımlılık haline gelmiştir. Hatta
insanların evlerinde, birden fazla akıllı telefon, tablet, dizüstü bilgisayar,
akıllı televizyon vardır... Özellikle internetin yayılması sebebiyle bireyler,
geleneksel iletişim biçimlerini değiştirdiler ve sosyal ağlar üzerinden
iletişim kurmaya başladılar. Bu
çalışmada, teknolojik aygıtların gelişim tarihçesi, tabletler, akıllı
televizyonlar, akıllı sayaçlar, akıllı telefonlar, sosyal ağlar, E-ticaret
siteleri ve bilgisayar oyunlarının avantajları ve dezavantajları incelendi.
Teknolojinin insan hayatına etkisi ve siber casusluk, kimlik hırsızlığı,
gizliligin ihlali gibi bazı riskler değerlendirildi.
Anahtar Kelimeler: sosyal ağlar,
akıllı sayaçlar, E-ticaret siteleri, bilgisayar oyunları, siber casusluk,
kimlik hırsızlığı, gizliligin ihlali
1 . INTRODUCTION
In
recent years, technology and technologic devices have become important part of human’s
daily lives. Technology and technologic devices financial and morally impact to
human life because each year, tousands new technologic devices produces,
develops and creates dozens new
technology. Even, proliferated dependent people. In thecnology age, people are
using the technology for be in communication each other. While Sharing and
watching movies, photos, broadcasts and sending messages, people use technology
so technology destroyed family relationships and face to face communication.
Also children of 2000 are dependents to computer games and mobile phone games,
they forget to traditional games on the street or green areas, even, green
areas were destroyed with the development of technology, people become
unhealthy chemicals such as hormones due to food products. On the other hand,
technologic devices use on industrial manufacturing, for going to far away and
dangerous place such as Mars, uses by the armed forces to defuse bombs, perform
surveillance, jamming, autonomous vacuum cleaners, uses in education, uses for
non-healthy jobs such as jeans sandblasting, arc welding, spot welding,
materials handling, painting, mechanical
cutting, grinding, deburring, polishing, gluing, adhesive sealing, spraying
materials, inspaction, waterjet cutting, soldering and patient treatment
techniques have changed for the better with the development of technology etc.
In
summary, technology both friends and enemies. It depend on your purpose of use.
So, the aim of this study is inform people about technology with the advantages
and disadvantages. Also this study contain some example about the development
of technology threats on human life.
2 .
HISTORY
OF TECHNOLOGY
Roman engineer Vitruvius perfects the modern, vertical water
wheel in 150 - 50 BCE. Windmills are invented in the Middle East
in 600 CE. Chinese develop eyeglasses by fixing
lenses to frames that fit onto people's faces in 1000 CE. A Dutch spectacle
maker named Zacharias Janssen makes the first compound microscope in 1590.
William Gilbert publishes his great book De Magnete describing how Earth
behaves like a giant magnet. It's the beginning of the scientific study of
magnetism in 1600. Galileo Galilei builds a practical telescope and makes new
astronomical discoveries in 1609. English farmer Jethro Tull begins the
mechanization of agriculture by inventing the horse-drawn seed drill in 1701.
Gottfried Leibniz pioneers the binary number system now used in virtually all
computers in 1703. Italian Alessandro Volta makes the first battery (known as a
Voltaic pile) in 1800. Joseph-Marie Jacquard invents the automated
cloth-weaving loom. The punched cards it uses to store patterns help to inspire
programmable computers in 1801. Italian Giovanni Caselli develops a mechanical fax machine called the
pantelegraph in 1850s. Nikola Tesla patents the alternating current (AC)
electric induction motor and, in opposition to Thomas Edison, becomes a staunch
advocate of AC power in 1888. German physicist Wilhelm Röntgen discovers X rays
and American Ogden Bolton, Jr. invents the electric bicycle in1895. Guglielmo
Marconi sends radio-wave signals across the Atlantic Ocean from England to
Canada and The first electric vacuum cleaner is developed in 1901. Albert
Einstein explains the photoelectric effect and Samuel J. Bens invents the
chainsaw in 1905. Alva Fisher invents the electric clothes washer in
1907. Stung by Apple's success, IBM releases its own affordable personal
computer (PC) in 1981. Linus Torvalds
creates the first version of Linux, a collaboratively written computer
operating system in 1991. Israeli computer scientists Alon Cohen and Lior
Haramaty invent VoIP for sending telephone calls over the Internet in 1994. Broadcast.com becomes one of the world's first
online radio stations in 1995. Electronics
companies agree to make Wi-Fi a worldwide standard for wireless Internet in
1997. Apple revolutionizes music listening by unveiling its iPod MP3 music player
in 2001. Mark Zuckerberg invents Facebook social media in 2004. Apple
introduces a touchscreen cellphone called the iPhone in 2007. Apple releases
its touchscreen tablet computer, the iPad and 3D TV starts to become more
widely available in 2010. Supercomputers (the world's fastest computers) are
now a mere 30 times less powerful than human brains in 2015. (Woodford, 2015).
3 .
SOCIAL
TRANSFORMATION
Developments in
information and communication technologies eliminates the concept of time and
space. That developments, has led to transformation of society in the form of
communication. Consequently, people's lifestyles, socialization processes and
interaction with the environment also deeply affects. With new forms of
communication; occurred concepts such as virtual life, virtual behavior,
virtual culture. Virtual communication of social networks passed in front of
face to face communication. Also it caused humans to move away from each other
and from the environment. Inviduals enters the process of alienation and
isolation who through social networks that perform individual operations.
Social networks and technological devices such as tablets, smart phones etc. enriches
the social life but if it passes in front of the social life in the real world,
every things transforms to virtual such as virtual social environment and
virtual communication. The development of technology build a virtual word not
real.
4 .
ADVANTAGES
OF TECHNOLOGY
4.1.
Technology Increase the Production
Industrial
automated robots are product of the technology. Industrial automated robots
uses for lifting objects and repating task in many times and faster than
employees. Industrial automated robots are have capacity to improve product
quality. increase the production speeds, because automated robots can work in
constant speed without breaks, sleep, vacations, they have potential to
production more than human workers. We
can produce 180 thousand cars in two-shift system. New Corolla will be produced
every 1.5 minutes in our factory(Ozer, 2012). Toyota's power of manufacturing is
Industrial automated robots.
Figure
1: Toyota’s Sakarya factory
4.2.
Technology Increased Business Opportunities and Create New Jobs
New businesses
have emerged with the development of technology. Spare parts and repair
services became important with the popularization of computers and
technological devices. Android programming there was not before 15 years but
now it is very popular in the word. Many organizations uses many computer
software and programming services. Some new jobs are social media specialist,
cyber security, e-commerce specialist, business analysis, database
administrator, computer systems analyst, software developer, web developer, IT
manager, information security analyst, computer support specialist, computer
systems administrator, CNC operator etc.
4.3.
Technology Allows People to Live More Comfortably
Technological
developments facilitate very difficult to do things. A long time to finish many
job done in a short time and everyday tasks can be automated such as washing
the dishes, washing the clothes, cleaning the floor, cleaning the windows, cleaning the swimming pool, mow lawn, remote and
voice controlling to the technological devices etc. Dozens people complate a
work without machine in long time but one person can complate same work with
machine in sorter time than dozens people. So, people redirect to different
tasks for increase production. Technology uses to defuse bombs, perform surveillance,
jamming by the armed forces.
Figure 2: Traditional agriculture and modern
agriculture
Also it uses for
non-healthy jobs such as jeans sandblasting, arc welding, spot welding,
materials handling, painting, mechanical
cutting, grinding, deburring, polishing, gluing, adhesive sealing, spraying
materials, inspaction, waterjet cutting, soldering.
4.4.
Technology Reduces the Amount of Labor
People use
technology that reduces the amount of labor required. So, this both good and
bad for the people because it is decrease the job vanancy but improve the
quality of life of workers. People do not do tiring work, machines do them. Also,
it is absolutely good for the business because reducing amount of labor,
reduces company costs for per product. Labor costs are often the single largest
line item for businesses. So, a successful human capital management (HCM)
strategy must balance adequate resourcing with cost controls. New technologies
are enabling this balance by improving scheduling so that businesses may be
more productive than ever before. Here are some essential technologies
businesses should consider in order to help reduce labor costs and improve the
bottom line (Anonymous, 2015)
4.5.Technology
Allows People to Discover Places
Technologic
devices uses for going to far away and dangerous place such as Mars and uses
for reach to unreachable small places that the people can not not to go in such
as the cells of living things, viscera etc. So, patient treatment techniques
are applys more successful than old patient treatment techniques.
5.
DISADVANTAGES
OF TECHNOLOGY
5.1.
Technology Generates Environmental Problems
Many, but not all
of the technological development reveals serious danger for the environment.
Each
year, the exhaust gases from the vehicle causes a thinning of the ozone layer so
it puts at risk the life of the world. Toxic gases coming out of the factory flue
pollutes our atmosphere. Waste waters, mixing lakes and seas that risks life of
animals. Also, Agricultural pesticides. Kills many animal by poisoning and similar
problems.
5.2.
Technology Generates Unemployment Problems
Technological
developments, leads to unemployment in populous country if technology cover the
gap of labor. Many people are had to look for new business areas to ensure
their livelihood because of machines made many jobs which peoples made many jobs
before machines.
5.3.
Technology
Inadequacy of Resources
Rapid production
provided by technological developments means that parallel to faster
consumption. All resources rapidly decreases and becomes inadequate Because of
mass production and consumption frenzy. Cutting trees make available paper in
the wooded area is a example to inadequacy of resources. Also electricity is
very important resource in human life because of technological developments,
people have more than one electronic device so those are increases the
electricity consumption.
5.4.
Technology Generates Social Problems
Technological
development is the cause of social problems in many times. in the technology
age, people are using the technology for be in communication each other so with
new forms of communication; occurred concepts such as virtual life, virtual
behavior, virtual culture. virtual communication of social networks passed in
front of face to face communication. While Sharing and watching movies, photos,
broadcasts and sending messages, people use technology so technology destroyed
family relationships and face to face communication. Also children of 2000 are
dependents to computer games and mobile phone games.
5.5.
Cyber Bullying
Cyber
bullying possible to do individual and organized by several people such as Distributed
Denial of Service(DDOS) attack, seizing users
passwords, hacking websites, sending spam e-mail, send e-mail that contain
infectious and psychological pressure. Cyber bullying increases with the
technological development. It leads many
people to suicide or psychologically negative influence. Attempted lynching
campaigns are carried out on the social network. People exposes in difficult
situation such as spreading incorrect informations, travestying, discrediting
and gossiping etc.
5.6.
Identity Theft and Violation of Privacy
Individual pravicy
and individual autonomy big threat because of cyber attacks, hackers and IT
thieves. Personal datas are never delete also datas store in data center that
is calling as Cloud Computing. Shared information is recorded in the data
center. All the transactions of the people on internet, social network by using
personal account, people do not know where those transactions are stores on computer.
All shared informations stores a computer anyone do not know where the place of
stored computer. Malicious people can reach your shared informations by
pressing a single button. Bad things that the rule of law is not enough for
this type crimes because there is no standard forms of crime. Also, the victim
does not know who is the attacker.
Encryption is
essential to cope for this kind of crime. Stay away from easy passwords as date
of birth, school number, name and surmane. such passwords can be reach by
hacker. Password is the need to be complicated and it must contain letters,
numbers and special characters. The reaching of such password is more
difficult.
6 .
TYPES
OF INPUT TECHNIQUES
Firstly,
people start to using mouse and keyboard for create documents, doing
calculations, making slides and drawing somethings on computer. Passed
Stylus-based control on a screeen with tablets. Pen can use as a keyboard and
as a mouse. Speech recognition is support different style of control. In order
to those developments, multi-touch and speech gesturing controlling developed.
Eye movements controlling developed together with camera. Also in the this age
developed brain computer interaction so people uses power of thought for
control devices. All this developments for a comfortable life and more easily
controlling. But people's private lives are in danger with speech recognation. Some
technological devices connected to manufacturers company by internet for update
software. This devices have some properties such as gesture recognition
software, video calling, downloading and uploading some contents as video,
document. These features great but this device can understand people gesture,
can recognize people voice and face, can record video, can detect location of
people also this system connected to word by using internet and this devices in
private life of people such as living room and bad room.
Earlier
this year, the Internet was buzzing with headlines declaring that smart
televisions, particularly Samsung’s Smart TV, were designed to spy on
everything people say while at home. “Your Samsung TV is eavesdropping on your
private conversations” declared CNN Money in February. In fact, Samsung Smart
TV comes equipped with a speech recognition technology, which is not so
different from similar technologies used by Apple (Siri), Microsoft (Cortana)
or Google, and sometimes your requests are captured and sent over the Internet,
which might make you a bit nervous. Samsung’s own Smart TV privacy policy
language doesn’t help matters, and perhaps fueled the conspiracy theory about
their televisions. The company told users that spoken words, including personal
and sensitive information could “be among the data captured and transmitted to
a third party through your use of Voice Recognition.” (Sweeny,2015).
South
Korean technology giant Samsung, warned their customers that when turned on voice control feature of smart TV,
customers must not talk about personal issues. Also Samsung said “Be careful, you can listen by
your TV, your speech is transferred to a third party" (Anonymous, 2015)
Apple's
vice president and official in charge of the service Eddy Cue: one day the FBI
may want us to open your phone's camera, microphone. Those are things we can't
do now. But if they can force us to do that, I think that's very bad. That
should not happen in this country. (Anonymous, 2016)
7 .
CONCLUSIONS AND RECOMMENDATIONS
In
the information age, Development of the
technology has made significant advances. The information age owes its name to
the technological developments. Technologic development has been achieved
today's technology by making a big splash between 2000 and 2016 but governments
and laws have not kept pace with this developments because of virtual crimes
are not easily control and there is no enough control mechanisms. Qualified
personnel should be trained for the effectively control the virtual crimes.
Also users should educate about possible virtual crime and technology
dependency. Should increase quantity of conscious users. Technology
friend with conscious users but technology enemie with unconscious older people
and children.
REFERENCES
·
(2015). How Technology Can Reduce Labor
Costs. http://www.paychex.com/articles/hcm/how-technology-can-reduce-labor-costs
(Access Date: 03 June 2016)
·
(2015). Samsung: Dikkatli
olun, televizyonunuz sizi dinleyebilir. http://www.bbc.com/turkce/haberler/2015/02/150209_televizyon_gizlilik.shtml (Access
Date: 03 June 2016)
·
(2016). Apple: FBI telefon
kameraları ve mikrofonlarını kontrol edebilir. http://www.bbc.com/turkce/haberler/2016/03/160311_apple_fbi_cue (Access
Date: 03 June 2016)
·
Ozer, O. (2012). 1.5 dakikada bir
otomobil!. http://www.haberturk.com/ekonomi/otomobil/haber/799433-15-dakikada-bir-otomobil
(Access Date: 02 June 2016)
·
Sweeny, G.(2015). Are Your Smart Devices
Spying on You? http://www.alternet.org/are-your-smart-devices-spying-you
(Access Date: 03 June 2016)
·
Woodford, C. (2015). Technology timeline. http://www.explainthatstuff.com/timeline.html
(Access Date: 02 June 2016)
No comments:
Post a Comment