With the rapid development of information and communication technology (ICT) and sensor technology, ubiquitous computing (or pervasive computing) has become widely used with much convenience to human life. For ins...With the rapid development of information and communication technology (ICT) and sensor technology, ubiquitous computing (or pervasive computing) has become widely used with much convenience to human life. For instance, people can use their electronic devices at hand (e.g., Google glasses or Apple watch) to access information they need. However, this '~ubiquitous" service poses challenges to human autonomy. Based on the analysis of the features of pervasive computing, this paper points out the ambiguity between the subject and object of ubiquitous computing and shows technological interventions can affect human autonomy at three levels: technology addiction, the degradation of human capacities, and the reversal of the end and the means caused by the fuzziness of ma^-machine interface. In other words, ubiquitous computing gives people unprecedented convenience, and it also deprives of their freedom. According to Kant's Theory of Freedom, this article reflects on the relationship between the autonomy of technology and that of humankind.展开更多
Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in...Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in which to their being classified intelligence products, users could choose between the latter themselves relevant information. The EU (European Union) that activities are carried out from at least in year 1996, terrorist attacks in year 200l is only accelerating. Proposals to increase surveillance and international cooperation in this field have been drawn up before September 11 2011. On the Web you can fmd a list of networks (Cryptome, 2011), which could be connected, or are under the control of the security service--NSA (National Security Agency). United States of America in year 1994 enacted a law for telephone communication--Digital Telephony Act, which would require manufacturers of telecommunications equipment, leaving some security holes for control. In addition, we monitor the Internet and large corporations. The example of the United States of America in this action reveals the organization for electronic freedoms against a telecom company that the NSA illegally gains access to data on information technology users and Internet telephony.展开更多
文摘With the rapid development of information and communication technology (ICT) and sensor technology, ubiquitous computing (or pervasive computing) has become widely used with much convenience to human life. For instance, people can use their electronic devices at hand (e.g., Google glasses or Apple watch) to access information they need. However, this '~ubiquitous" service poses challenges to human autonomy. Based on the analysis of the features of pervasive computing, this paper points out the ambiguity between the subject and object of ubiquitous computing and shows technological interventions can affect human autonomy at three levels: technology addiction, the degradation of human capacities, and the reversal of the end and the means caused by the fuzziness of ma^-machine interface. In other words, ubiquitous computing gives people unprecedented convenience, and it also deprives of their freedom. According to Kant's Theory of Freedom, this article reflects on the relationship between the autonomy of technology and that of humankind.
文摘Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in which to their being classified intelligence products, users could choose between the latter themselves relevant information. The EU (European Union) that activities are carried out from at least in year 1996, terrorist attacks in year 200l is only accelerating. Proposals to increase surveillance and international cooperation in this field have been drawn up before September 11 2011. On the Web you can fmd a list of networks (Cryptome, 2011), which could be connected, or are under the control of the security service--NSA (National Security Agency). United States of America in year 1994 enacted a law for telephone communication--Digital Telephony Act, which would require manufacturers of telecommunications equipment, leaving some security holes for control. In addition, we monitor the Internet and large corporations. The example of the United States of America in this action reveals the organization for electronic freedoms against a telecom company that the NSA illegally gains access to data on information technology users and Internet telephony.