Evan Potts
4/22/2023
IT200T
Professor Duvall
Instructions
How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the intelligification (Verbeek, p.217) and networking of the material world?
In the reading Peter-Paul Verbeek shares his viewpoint on technology being implemented in the modern world and how it will our social structure will continue to adapt to these technological changes.
Verbeek elaborates on the public relationship with developing technologies such as “Google Glass” and how these advances in making technology more “intelligent” will ultimately change how we adapt in society; eventually, this technology will cause people to have less privacy in the social space, “This would result in a drastic reconfiguration of the boundaries between the public and the private” (pg. 220). In other words, as another technology continues to implement itself into the public space it also becomes easier for your private data to be accessed more efficiently creating more potential threats of cyber crime.
This brings the question of how these technological advancements should be regulated or limited. In order to regulate this technology, I believe it should be catered to work with our social values and have the frameworks carefully developed to protect the public and not be used against us. “This inevitably, requires experimentation that makes it possible to find the right balance between openness for change and preservation of what we find valuable” (Pg 226).
Though there are continuous developments in new technologies such as microchips one of these companies, Neuralink was founded by Elon Musk. The goal of Neuralink is to potentially study and treat neurological disorders which microchips that will be implemented into the brain. How will we be protected from technology being used in our own brains if it were to be used against us in a cyber-attack? The government at this point may step in and create certain laws to limit this technology from being used maliciously, to be specific privacy laws that state what features cannot be implemented into the brain as well as other laws that prevent certain cybernetic advancements to be put into your body in the first place.