Sunday, March 30, 2008

Webliography : Question 3 - Frankenstein

Frankenstein continues to occupy the popular imagination as a monstrous scientist. Analyse some of the ways in which Frankenstein continues to haunt discussions of recent technologies.

Recent technologies is usually being interpret as 'Frankenstein' which leads to the conflict in social, ethical and technological categories. For referencing and relate to the topic in which modern cyberspace do take place in creating humanity fear, I should first consider what should be mentioned in this hypothetical essay. To what extend do technologies live with us inseparably? What is the relationship in between human and technologies? And, the major concern for this essay is to understand the way that technologies bring dangerous to us. Thus, the lists of researching online article by covering in Yahoo and Google searching engine by using keywords like 'cybercrime', ' technologies fear', 'roborts control' and 'technologies problem', which help in answering those questions are listed as follows,

(1) Relationship in between human and technologies – fear of changing power structure

The dangerous technologies is undoubtedly as the theme of this essay, either Mary Shelley[1]'s Frankenstein or Daintry Duffy [2] - ' Technology Fear Factor' do arouse the agreement that – "Technologies has always been a double-edged sword" while artificial intelligent is possible and lower the risk for medical treatment and researching nature. This article rises up lots of discussion and reflection from audiences, almost all of them agree that technologies do bring benefits with side effect to the society as various reason such like the terrorists use technologies as their communication channel, human-made virus damage human harmony, privacy, etc. Besides, by using of this web conclusion, its mentioned the future can still be dominate by human when we use it correctly and always keep in mind that to ask and think about those serious problems.

(2) Addiction to technologies

Except the fear of changing power structure, others presented the over dependency on technologies is also a problem towards the studies of cyberculture like Charles Eisenstein [3] using term – addiction to interpret the relation in between human and machine nowadays. From his readings, I can remind technologies do not only mean to Internet, but also the daily life invention like air-condition and car. Furthermore, the using pieces is that he pointed out the dependency on technologies shares many features in common with drug addiction which I am partly agree with. Author claimed that the technological fix is attractive but it is problematic and it is only from the short-term perspective. He consider technological addiction slowly destroyed the natural and social environment which have the same ideas of many citizen are frighting for having better living environment. As long as this piece of readings is not comprehensive enough for defining the technologies and human relationship as he did not discover that technologies do help human finish difficult and dangerous task or other advantages that bring with scientific development and therefore others articles were being used to introduce that points I want to make in the essay.

(3) Controversial ideas: Human should be the controller

As long as most of the website do agree that technologies results as challenging the humanity, the interesting and reverse ideas like Jeanne Dietsch [4] wrote is useful in discussion of who is the controller. Even though somehow other studies do use lots of proving and example to sum up that artificial intelligence is not as obedient as the human planned, the author argued the fear were made by problematic sci-fi movies. The opinion she claimed up is actively being seen in ethic issues whether I am wondering too - Do robot have the ability to classify right and wrong when the human user used it in criminal activities? Who decides how to control the controlling human? Hence, this reading give some controversial ideas whose believe machine and human can live together happily in the future and for me to criticize her points in order to prove the struggle do exist and it is not unnecessary.

(4) Example: TankPitstop create unemployment or benefits?

TankPitstop [5] as a recent automated fuel robot draw my attention to its relation to the unemployment though it is not a critical analysis article, but a product introduction. The information being told was that this robot allow motorists to refuel and pay without actually doing anything themselves, and it can also bring safety and environmental benefits to its user. However, it rises up the concern of over power and unemployment when human rely on the technologies too much. This promotion pamphlets may then being as the example to explain how unemployment occurred by developing and depending on the new and effective technologies.

(5) Cybercrime – children sexual abuse

The article – cyberspace as a locale of violence by ECPAT [6] (End Child Prostitution, Child pornography And Trafficking of children for sexual purposes association) hand out the problem in which Lupton [7] suggested in 'Risky computing' resulting 'cybercrime'. This article is mainly focused on how multi-functional and wide Internet generate pornography and harm children 'individually' and 'collectively'. Moreover, for the concern of whether Internet as a virtual world, this article also support the ideas that the harm caused through cyberspace is real in either physical or psychological way and that it one of the way that people consider growing technologies do not only contain advantages when information is more easy to access and edit. For instance, this article also points out one group of people - the parents were being threaten by the sexual harassment come from the world without censorship and boundary.

(6) Statistics – Hong Kong Cases

Recent Hong Kong 'cybercrime' statistics [8] issued on 2003 may throw the studies on Hong Kong cases and define what is technology crime. We can see the increasing criminal and total loss through the hacking activities and therefore demonstrate the fact that cyberspace and technologies become more dangerous when time passes and more technical stuffs being invented. Referring to the sexual criminal in cyberspace I mentioned previously, economic law-breaking is under Hong Kong police watching, too. The E-Banking Theft, spam email and virus created by humanity may turn to be the example in which human develop technologies and finally lost the power in controlling and being affect by the technologies. Again, this report may pointed to the frightening computer which caused fear and the sense of over-controlling humanity in public mind.

Conclusion

To briefly conclude how those sources help in my essay, I would first pick Daintry Duffy article to refering Mary Shelly's Frankenstein to explain and give the ideas of the relationship between human and artificial intelligence and the fear of changing power structure. Then, Charles Eisenstein's piece of readings will make use by presenting other way that technical development create fear in social context. Controversial ideas like Jeanne points out other side opinion and I would use both of her and TankPitstop as the example to prove technologies benefits human life with conflict. Later on, cybercrime will be mention and statistic will be proven the fear that public concern is necessary and logical.

Sources:

[1] Written Sources: Mary Shelley. 'Frankenstein' Oxford: Oxford University Press. 1980.

[2] Daintry Duffy. 'Technology Fear Factor'.
http://www.kurzweilai.net/meme/frame.html?main=/articles/art0510.html
[accessed on 30 March 2008]

[3] Charles Eisenstein. ' The Ascent of Humanity: Chapter I: The Triumph of Technology – The Addiction to Control'
http://www.ascentofhumanity.com/chapter1-3.php
[accessed on 30 March 2008]

[4] Jeanne Dietsch. ' Will Robots take over the World?'.
http://www.activrobots.com/HISTORY/
[accessed on 30 March 2008]

[5] Inton Development. 'TankPitstop – The TankPitstop'.
http://www.tankpitstop.nl/index.php?pid=2&lang=en
[accessed on 30 March 2008]

[6] ECPAT. 'Cyberspace as a locale of violence: ECPAT international concept paper'.
http://www.ecpat.net/eng/Ecpat_inter/projects/ECPAT%20Cyberspace%20Concept%20Paper%20for%20Violence%20Study.pdf
[accessed on 30 March 2008]

[7] Written Sources: Lupton Deborah. 'The Embodied Computer/ User' The CyberCultures Reader Eds. David Bell & Barbara M. Kennedy. London / New York: Routledge 2000: 477- 488

[8] Hong Kong Technology Crime Division. 'Sean Lin Senior Inspector – Commercial Crime Bureau : Cyber Crime 2003 and Issues Relating to e-Business'.
http://www.hkcert.org/ppt/event099/hkpolice.pdf
[accessed on 30 March 2008]

No comments: