Elon University

The Constitution in Cyberspace

If we should ever abandon the Constitution’s protections for the distinctively and universally human, it won’t be because robotics or genetic engineering or computer science have led us to deeper truths but, rather, because they have seduced us into more profound confusions. Science and technology open options, create possibilities, suggest incompatibilities, generate threats. They do not alter what is “right” or what is “wrong.” The fact that those notions are elusive and subject to endless debate need not make them totally contingent upon contemporary technology.

Whatever Happened to the Information Revolution in the Workplace?

The argument that developments in consumer electronics, computers and telecommunications will dramatically alter the nature of economic and social activity in the home is not supported by the available evidence … A succession of revolutionary “homes of the future” incorporating various “home automation” systems have been built in the U.S. and Europe in recent decades, but by and large they have left consumers cold.

Social Relations and Personal Identity in a Computerized Society

Through an array of newly emerging technologies the world of relationships becomes increasingly saturated. We engage in greater numbers of relationships, in a greater variety of forms, and with greater intensities than ever before. With the multiplication of relationships also comes a transformation in the social capacities of the individual – both in knowing how and knowing that. The relatively coherent and unified sense of self inherent in a traditional culture gives way to manifold and competing potentials. A multiphrenic condition emerges in which one swims in ever-shifting, concatenating, and contentious current of being. One bears the burden of an increasing array of thoughts, of self-doubts and irrationalities. The possibility for committed romanticism or strong and single-minded modernism recedes, and the way is opened for the postmodern being.

Social Relations and Personal Identity in a Computerized Society

One detects amid the hurly-burly of contemporary life a new constellation of feelings or sensibilities, a new pattern of self-consciousness. This syndrome may be termed multiphrenia, generally referring to the splitting of the individual into a multiplicity if self-investments. This condition is partly an outcome of self-population, but partly a result of the populated self’s efforts to exploit the potentials of the technologies of the relationship … As one’s potentials are expanded by the technologies, so one increasingly employs the technologies for self-expression; yet, as the technologies are further utilized, so do they add to the repertoire of potentials … Someday there may indeed be nothing to distinguish multiphrenia from simply “normal living.”

Social Relations and Personal Identity in a Computerized Society

Shoshana Zuboff suggests that the introduction of “smart machines” into businesses is blurring the distinctions between managers and workers. Managers are no longer the “thinkers” while the workers are consigned to the “doing.” Rather, out of necessity the workers now become managers of information, and as a result, they considerably augment their power.

Social Relations and Personal Identity in a Computerized Society

The number and variety of relationships in which we are engaged, potential frequency of contact, expressed intensity of relationship, and endurance through time all are steadily increasing. As this increase becomes extreme we reach a state of social saturation … Formerly, increases in time and distance between persons typically meant loss. [Today] one may sustain an intimacy over thousands of miles … In effect, as we move through life, the cast of relevant characters is ever expanding. For some this means an ever-increasing sense of stress … At the same time that the past is preserved, continuously poised to insert itself into the present, there is an acceleration of the future. The pace of relationships is hurried, and processes of unfolding that once required months or years may be accomplished in days or weeks … As the future opens, the number of friendships expands as never before.

Will There Be a Job for Me in the New Information Age?

Politicians and economists have steadfastly refused to entertain a discussion of how we prepare for a new economic era characterized by the diminishing need for mass human labor. Until we have that conversation, the fear, anger, and frustration of millions of Americans are going to grow in intensity and become manifest through increasingly hostile and extreme social and political venues. We are long overdue for public debate over the future of work and how to share the productivity gains of the Information Age.

Will There Be a Job for Me in the New Information Age?

Many of the disaffected white men who make up ultraright-wing organizations are high school or community college graduates with limited skills who are forced to compete for a diminishing number of agricultural, manufacturing, and service jobs … The new militants view the government and law enforcement agencies as the enemy. They see a grand conspiracy to deny them their basic freedoms and constitutional rights. And they are arming themselves for a revolution.

Are Hacker Break-ins Ethical?

No matter what laws are passed, and no matter how good security measures might become, they will not be enough for us to have completely secure systems. We also need to develop and act according to some shared ethical values. The members of society need to be educated so that they understand the importance of respecting the privacy and ownership of data. If locks and laws were all that kept people from robbing houses, there would be many more burglars than there are now; the shared mores about the sanctity of personal property are an important influence in the prevention of burglary. It is our duty as informed professionals to help extend those mores into the realm of computers.

Are Hacker Break-ins Ethical?

Too often, we view computers simply as machines and algorithms, and we do not perceive the serious ethical questions inherent in their use … Computers are used to design, analyze, support, and control applications that protect and guide the lives and finances of people. Our use (and misuse) of computing systems may have effects beyond our wildest imagining. Thus, we must reconsider our attitudes about acts demonstrating a lack of respect for the rights and privacy of other people’s computers and data. We must also consider what our attitudes will be toward future security problems. In particular, we should consider the effects of widely publishing the source code for worms, viruses, and other threats to security.