What besides humans may be made vulnerable

Assignment Help Management Information Sys
Reference no: EM131684726 , Length: 3

Article : Society, Ethics And technology By Wiston,M,& Edelbach,R.

This week's Critical Thinking assignment is based in Jasanoff's "Technologies of Humility: Citizen Participation in Governing Science," one of our readings for this week.

Begin your paper by briefly differentiating between Jasanoff's "technologies of hubris" and "technologies of humility."

Then choose a technological development that has some effect on your personal life or your community (e.g. GMOs, transportation, the Internet, resource mining, communication, artificial intelligence, pharmaceutical medicines, etc.).

In your paper, follow Jasanoff's four focal points to create an assessment of what decision makers should take into consideration when determining the path for the development of this technology.

Use the following as a guideline for your assessment and support your work with specific examples from the text or other research.

Framing: Consider the problem this technology was meant to address. Is it framed properly or are essential elements left out of consideration?

How could the problem be reframed to include as many relevant elements as possible?

Vulnerability: What factors contribute to the vulnerability of certain populations due to this technology? What besides humans may be made vulnerable by this technology?

Distribution: What structures-social, institutional or physical-would you suggest putting in place for examining the distributive consequences of this technology?

Learning: Describe any lessons that you think are to be learned from the current use of this technology. Are there barriers to this learning being conveyed to decision makers?

Your paper should be well written and meet the following requirements:

Be 2-3 pages in length.

Reference no: EM131684726

Questions Cloud

Discuss acorn production and gypsy moth population : Design a controlled experiment that tests the relationship between acorn production and gypsy moth population
What is happening right now in environmental science life : choose a topic about what is happening right now in Environmental Science Life. Can a tutor give me topic ideas of what should I talk about in class
Is canada more or less biologically diverse than russia : are not considered to be one of the 17 most biological diverse countries on the plant. Is Canada more or less biologically diverse than Russia
Describe two specific ways in which u.s. fisheries : Describe two specific ways in which U.S. fisheries exhibit lost opportunities
What besides humans may be made vulnerable : Consider the problem this technology was meant to address. Is it framed properly or are essential elements left out of consideration?
Discuss discover these strange and new fossils : Let's assume you are the first to discover these strange and new fossils, What kind of organism could they be a part of
Identify the major historical scientific discovery : Identify the major historical scientific discovery that is the foundation for the natural science news story you have examined throughout the course
Developing the psychoanalytic theoretical approach : For your initial post, you will examine the contributions of a theorist who was instrumental in developing the psychoanalytic theoretical approach
Describe the framework the ipcc : Describe the framework the IPCC used to assign probabilities to these events, and the probabilities assigned to the two events you have chosen

Reviews

Write a Review

Management Information Sys Questions & Answers

  List all file names that you can identify in the trace file

Determine what was being done via the HTTP protocol. Was the user sending an email, browsing a website, uploading a file, etc.? Write a brief summary explaining what the user was doing using the HTTP protocol. List all file names that you can ident..

  How could it negatively impact the security of the users

As for the other three areas that will be covered in the paper. What are those trade agreements, why was it voted for, and how could it negatively impact the security of the users in the participated countries in the agreement

  Create a pert diagram that identifies the critical path

Insert the screenshots of the Gantt and PERT charts you created based on the provided criteria. Elaborate on the status of the VoIP deployment project based on the updated information. Note: The graphical representations do not count toward the o..

  Defien location and type of product or service being offered

What elements of style and technique from our textbook Sell did you observe in the salesperson's presentation? Was the salesperson successful? Did you or will you purchase the product or service either at the time of the event or in the future? Exp..

  What do you meant by database security

What is meant by Database Security and What are the essential considerations in Database Security and How are they specifically relevant to ABC's planned computing environment?

  Describe what windows-integrated authentication is

Describe what Windows-integrated authentication is and how it could potentially be used to provide secure access control to the portal.

  International business journal articles

Business and Industry has business, finance, strategy, planning, marketing, and international business journal articles from 1994 to the present.

  How password vaults promote good password management

How password vaults promote good password management and A brief survey of password vaults in the marketplace.

  What types of data and signals are being used in the project

What applications/services are being brought to users by the system? What other applications/services could be deployed using the system.

  Explore how these might work in practice

Discuss the changes to the ways of working for Phab - i.e. discuss what processes will change, and explore how these might work in practice.

  Evaluate the options for solving the problem

Define the problem in the scenario that you have chosen. Analyze the problem in the scenario. Generate options for solving the problem in the scenario.

  Important information about computer applicationswhat is

important information about computer applicationswhat is the difference between custom animation and transition

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd