According to Merriam-Webster, AR Is “an enhanced version of reality created by the use of technology to overlay digital Information on an image of something being viewed through a device (as a smartened camera); also: the technology used to create augmented reality. ” (Merriam-Webster, n. D. ) In order to “augment” our realities, these technologies are recording, storing, altering, and displaying Information In real time. The Information they use can be anything, but with products Like Google Glass, wearable technology can now modify what and how we see objects, people, or data, In real time.
The possibilities of this technology can transform, not only our perception of the items viewed through such objects, but our realities as a whole. Or someone and capture pictures or video, search for them on the internet, or use facial recognition to match their features to someone that you’ve previously viewed. These are actions that are possible, and practiced, today. The ethical issues that are brought to mind are abundant and daunting.
Don’t waste your time!
Order your assignment!
Some of the most prominent ethical issues that will arise are: How far can cross-device interaction go? When and where can devices capture this data? Is this data stored locally or shared? What level of security will be provided the AR devices? How will AR users be protected from breach? Not too long ago, a briefcase was the closest to a mobile phone you could come; big, bulky handheld devices that cost a fortune to operate. Now, it isn’t often that you find children in Middle School without a brand new smartened in their pocket.
Smartness have changed the way we live, and seeing someone snapping a “selfless” or playing a game on their device is Just as common as seeing a person riding a bike, if not more. No one thinks smartness are out of place, and not having one is now considered odd. It seems inevitable that there will soon be a new generation of technological ubiquity: wearable, like Google Glass or Samsung Gear S. However, these new devices bring with them a slew of unknown challenges and complications that will have to be overcome before they can become commonplace.
Device manufacturers not only have to worry about the functionality of their products, but how they can integrate them into other common networks and operating systems as well. With companies like tunes and Google Play monopolizing the computer application industry, Backbone and Twitter in charge of social media networks, and ISO and Android developing the most commonly used operating systems, businesses would be remiss not to incorporate these APS into their products.
Below is a table depicting how common it is to use multiple different social networking sites, in order to be exposed to the highest level of connectivity. Use Twitter Use Mainstream Use Pinsetters Use Linked Use Backbone % of Twitter users who… 53 39 % of Mainstream users who… 93 % of Pinsetters users who… 29 31 87 % of Linked users who… 24 28 83 of Backbone users who… 25 Figure 2. Pew Research Center’s Internet Project August Tracking Survey, 2013. (Duggan & Smith, 2013) Cross-network and cross-device connectivity and sharing is where the real ethical dilemmas begin to surface.
Devices today cannot stand alone, in a world focused so much on connectivity. But, when does that connectivity go too far? When do companies focus so much on connectivity and sharing that they all but ignore personal privacy? How much information should a device be able to share? How far should a social media network be able to penetrate into its users’ personal information before it becomes unethical? Privacy risks and security concerns are only amplified with the addition of these wearable technologies.
Devices used to monitor heart rates, stress levels, voice recognition, collocations, and activity patterns are storing, and possibly sharing, real-time biological and geographical information. With head-mounted devices like Google Glass, that information extends to even seeing what a user is seeing at that moment, and according to Nick Start, the concerns only get scarier when these new technologies begin employing facial recognition software and its applications. References Duggan, M. , & Smith, A. (2013, December 30).