CHAPTER 14
IT Ethics, Privacy, and Sustainability

Introduction

Several of today’s toughest ethical and social challenges did not even exist at the start of this decade. The latest social, mobile, cloud, and information management technologies are powerful forces. While businesses, governments, and users greatly benefit from their use, they may have harmful effects—not all of which are obvious yet. For example, what is the effect of people spending their personal and professional lives in a state of continuous disruption or partial (distracted) attention?

Are you prepared to deal effectively with ethical challenges and corporate responsibilities that social, mobile, big data, and analytics technology create in business? Anecdotal research suggests that individuals often do not even recognize when ethical issues are present. If people cannot recognize them, then it is hard to imagine how they could act responsibly.

This chapter will make you aware of IT ethics, risks, legal responsibilities, and sustainability controversies. These issues are examined within the context of civil rights, employment laws, regulations, research findings, and case examples. Of course, even those guidelines cannot provide easy answers to social discrimination, the demise of privacy, distractions, piracy, and theft of intellectual property, and what the latest digital devices are doing to quality of life. There are no easy fixes, clear-cut judgments, answers, or solutions. As managers, you need to be able to recognize ethical issues and tip the balance toward better responsible conduct in the workplace.

14.1 IT Ethics

We are in an age where technology is capturing and processing the details of everything we do through our interconnected devices in real time. Organizations view this as the ultimate way to predict who, where, and when customers will buy their products and what their future products should look like to be attractive. In the case of employees, organizations can predict how they will behave in different situations. On the one hand, this can lead to responsible conduct that benefits both organizations and their customers or employees, and on the other hand, it can lead to irresponsible conduct on the part of organizations who are eager to garner as much information as they possibly can, regardless of its negative impact.

Ethical versus Unethical Behavior

Any discussion about ethical behavior related to data and digital devices raises more questions than answers. Does the availability of data justify their use? Should shoppers be able to keep their buying habits private? Can people keep their entertainment, online gaming, and other legal activities confidential? Do media have the right to publish or post highly private text messages of politicians and celebrities? Questions about data access, collection, mining, tracking, monitoring, privacy, and profiling are examples of IT capabilities that have ethical considerations.

IT services and products are integral to the working of essentially every organization. Unethical and risky behavior by IT personnel can have far-reaching and negative impacts on organizations, industries, and society. As you read in Chapter 5, security breaches occur not only because of cyberattacks by hackers or APTs, but also by unethical or negligent IT employees who can bring entire industries to a halt by delaying or shutting down operations. Consider the situation where a database of health-care electronic records (first introduced in Chapter 3) is compromised. If vital medical data disappear or are unavailable when and where needed, patient care can be adversely affected.

From a societal perspective, people are naturally hesitant about using an organization’s Internet-based and e-commerce services if they have concerns about the integrity of these systems. And, students graduating from college may be affected by IT hiring freezes imposed by companies who have encountered unethical employees in their IT departments.

And, in the development of software, some risky behaviors can be intentionally or inadvertently introduced by their developers.

Sometimes, the power of information and analytics is taken too far. This widely cited case of Target’s questionable practice of predicting people’s behavior using data analytics discussed in IT at Work 14.1 is just one example.

Mobile Apps and Risky Behavior

According to app security analytics firm Appthority’s App Reputation Report (2014), 93% of the top 200 free apps for iOS and Androids exhibited at least one risky behavior. However, so did 89% of the top 200 paid apps. Just about every app requires that you click “yes” on the user agreement, which gives your consent to use your data. Types of risky behaviors are shown in Table 14.1.

TABLE 14.1 Mobile App Risky Behaviors

Location Tracking
Accessing device’s address book or contact list
Identifying user or phone unique identifier (UDID)
Recording in-app purchases
Sharing data with ad networks and analytics companies

Mobile apps, such as Twitter, Foursquare, and Instagram, routinely gather information from personal address books and other places on your phone. Apple admits that any app that gathers a user’s information without its permission is a violation of the law. Fortunately, Apple and Androids can only monitor apps available through the Apple Store and Google Play. However, there are countless third-party apps that are unregulated. If a user has an app that allows a company to access data on his or her phone and that phone is linked to the company’s network, then privacy violations will happen.

Google’s Street View Wi-Spy Snooping Scandal

Google’s Street View cars drove along U.S. streets—and later in Europe, Canada, Mexico, and everywhere else—collecting a stream of images to feed into Google Maps. Google’s engineers realized that the cars could be used for wardriving—driving around sniffing out and mapping the physical location of the world’s Wi-Fi routers. Wardriving is also a hacking technique, an invasion of privacy, and an information security risk.

Creating a database of Wi-Fi hotspot locations would make Google Maps more useful on mobile devices. Mobiles without GPS chips could use the database to approximate their physical location, and GPS-enabled devices could use the system to speed up their location-monitoring systems. When Google was building its system, a few start-ups had already created their own Wi-Fi mapping databases. However, Google was not only recording the location of people’s Wi-Fi routers. When a Street View car encountered an open Wi-Fi network—a non-password-protected router—it recorded all the digital traffic traveling across that router. That is, when the car was within range of someone’s open router, Google captured personal data, including login names and passwords, the full text of e-mails, Internet histories, people’s medical conditions, online dating searches, streaming movies, and all other traffic.

According to the FCC (Federal Communications Commission) report, French investigators reviewed the data Google collected and found “an exchange of emails between a married woman and man, both seeking an extra-marital relationship” and “Web addresses that revealed the sexual preferences of consumers at specific residences.” The sniffing stopped only when regulators discovered the practice. Google denied any wrongdoing.

The FCC posted the following on its website: “Google’s behavior also raises important concerns. Whether intentional or not, collecting information sent over Wi-Fi networks clearly infringes on consumer privacy.”

The FCC determined that Google’s actions were not technically illegal because snooping on unencrypted wireless data is not prohibited by the Wiretap Act. Given that Google manages so much of our personal data, this privacy invasion is an example of irresponsible conduct.

The story did not end with the FCC’s decision. The FCC’s investigation into Google’s mapping project was itself investigated. The renewed attention followed release of a mostly unredacted version of the FCC’s findings in the case. The unredacted findings appear to contradict Google’s claim that it inadvertently intercepted “payload data,” or the content of individuals’ Internet communications, in the process of gathering information from Wi-Fi networks across the globe for the Street View project. The document shows that, during preparations for the Street View effort, a Google engineer shared e-mails with colleagues at the firm revealing that he designed software for the project that was capable of collecting payload data. The new revelations have prompted Consumer Watchdog, a Washington-based advocacy group, to call for a hearing by the Senate Judiciary Subcommittee on Privacy, Technology, and the Law.

Tech-Savvy Individuals and Scalpers Exploit Artificial Intelligence

Artificial intelligence (AI) was designed to make our lives better and more efficient, but that is not always the case. For example, buying event tickets online is more stressful and near impossible in some instances than ever before due to AI.

Tech-savvy individuals create macros, which are computing apps that allow users to input one instruction that coincides with a long list of instructions to be completed automatically by the program, to instantly and automatically buy as many tickets to popular events and shows as possible. Acting alone or in collaboration with “scalpers,” they resell the tickets at immensely inflated prices since the original tickets are sold out (Heritage, 2016).

One example of this type of unethical behavior was evident in tickets sales for Canadian hip-hop star Drake’s February 5, 2017 concert in Greenwich, United Kingdom. To the consternation of many Drake fans who had roused themselves from sleep to have a chance to buy a ticket, the concert sold out online almost immediately. With original ticket prices ranging from 55 to 132 euros, the scalpers sold tickets for up to 800 Euros. It is estimated that one macro developer profited more than 25 million euros using this method.

Texting  While  Driving

Texting while driving is comparable to driving under the influence (DUI), according to safety experts. Several studies indicate that the use of mobile devices is a leading cause of car crashes. At any given moment, more than 10 million U.S. drivers are talking on handheld cell phones, according to the National Highway Traffic Safety Administration (NHTSA). Why is this a problem? Mobiles are a known distraction, and the NHTSA has determined that driver inattention is a primary or contributing factor in as many as 16% of all police-reported traffic accidents, and teen drivers are distracted by a mobile device while driving 25% of the time (Scopatz and Zhou, 2016). This does not include the thousands of accidents not reported to the authorities.

In most or all states, distracted driving carries mandatory fines. For example, in California and New York State, drivers charged with this crime face fines and have their driving license suspended. If driving while distracted causes injury or death to others, violators face jail time.

3D Printing and Bioprinting—Additive Manufacturing Dilemmas

Another trendy technology that has sparked ethical and other debates is the 3D printer and 3D bioprinting. Actual and planned applications include heart valves and other human organs (Martin, 2014). In 2014, surgeons used a 3D-printed model of a baby’s skull in an intricate surgery to correct a serious birth defect. Bioprinting of aortic valves and 3D bioprinting technology have been used by researchers at Cornell University to fabricate living heart valves that possess the same anatomical architecture as the original valve.

In 2015, 3D-printed airway splints for babies with tracheobronchomalacia, which makes the tiny airways around the lungs prone to collapsing, were successfully tested in three children between the ages of 3 months and 16 months (Hendricks, 2016). 3D technology may seem like a win-win with no dark side or ethical challenges. Unfortunately, that is not true.

Despite benefits, the medical application of bioprinting to produce living tissue and organs is expected to spark major ethical debates about whether lives are being saved or redefined (McRae, 2016). 3D-bioprinted human organs may be subject to conflicting religious, political, moral, and financial interests. The 3D printing of nonliving medical devices, such as prosthetic limbs, is expected to be in high demand because of longer life spans and insufficient levels of health care in various countries. A major hurdle is determining who is legally responsible for ensuring the quality of the resulting organs and devices? Without medical malpractice insurance covering these new applications, they cannot proceed.

According to a study by sustainable design strategist and Berkeley mechanical engineering expert Jeremy Faludi, 3D printers can exert impacts on the environment worse than those of standard manufacturing (Martin, 2014). The carbon footprint depends on what is being made and the type of printer used to make it. 3D printers use a lot more energy than conventional milling machines. 3D printers can use 100 times more electricity to produce a part than would have been used to produce the same part by nonadditive manufacturing.

Gartner (2016) predicts very strong growth in the 3D printer market with Greater China, emerging Asia/Pacific, and mature Asia/Pacific regions experiencing a combination of high 3D printer shipments and high growth rates through 2020. The growth will be driven by private-sector and public-sector organizations who recognize the threat that 3D printing poses to industries that don’t get onboard and continue to rely on conventional manufacturing technologies. As the use of 3D printing accelerates, so will the debates about the ethical challenges it poses.

Competing Responsibilities

Most major retailers, from supermarket and drug store chains to major investment banks, rely on predictive analytics to understand consumer shopping habits and their personal habits to market more efficiently (IT at Work 14.1). In these cases, there are competing interests and trade-offs relating to privacy. There is also no clear-cut framework for deciding what is ethical and what is not. The personal privacy–public security debate is a prime example. Typically, privacy invasion is considered unethical. An ethically conscious corporate attitude sounds politically correct, but managers also have a responsibility to stakeholders. Monitoring may be (or seem to be) the responsible thing to do, and with intense competition, marketers naturally want to use every tool or technique to gain an edge or nullify a risk.

Globalization, the Internet, and connectivity have the power to undermine moral responsibility because it becomes relatively easy to ignore harm. Despite the challenges and lack of clear answers, ethics is important because relying on the law alone to safeguard civil rights and society is insufficient. The law has its limits in large part because it changes so slowly.

Concept Check 14.1

  1. Which of the following is NOT a mobile app risky behavior?
a. Location tracking
b. Accessing device’s address book
c. Recording mail order purchases
d. Sharing data with ad networks
Correct or Incorrect?

 

  1. People are naturally hesitant about using an organization’s Internet‐based and e‐commerce services if they have concerns about the _____________ of the system.
a. Reliability
b. Validity
c. Integrity
d. Speed
Correct or Incorrect?

 

  1. If a user has an app that allows a company to access data on his or her phone and that phone is linked to the company’s network, privacy ______________ will happen.
a. Violations
b. Behaviors
c. Captures
d. Exchanges
Correct or Incorrect?

 

  1. According to safety experts, texting while driving is comparable to ___________________________.
a. Driving under the influence
b. Stealing data
c. Running a red light
d. Speeding
Correct or Incorrect?

 

14.2 Privacy and Civil Rights

We do not live in a world without consequences and boundaries. Yet many people act as though they do, as the privacy paradox points out.

Privacy and the New Privacy Paradox

Privacy is the right to self-determine what information about you is made accessible, to whom, when, and for what use or purpose. Privacy means we have freedom of choice and control over our personal information, including what we do not want shared with or used by others. Unauthorized disclosure of personal information is normally considered a breach of privacy, although what is unauthorized and what is personal information are matters of dispute, particularly when it is online.

While privacy is still the social norm, a person’s privacy is based to a large extent on what choices that person has made. The amount of shared personal information is a decision that individuals make over their lifetime. This is a critical concept because online content can persist for an entire lifetime. Private content that uninhibited teenagers with bad judgment posted or sent cannot be made to disappear when they apply for jobs requiring security clearance or intense background checks—or run for public office.

Users of social sites often claim that they are concerned about their privacy. At the same time, they disclose their highly personal lives, even content that is incriminating or illegal, in their profiles or posts. The privacy paradox refers to this phenomenon where social users are concerned about privacy, but their behaviors contradict these concerns to an extreme degree.

Facebook membership has increased despite Facebook founder Mark Zuckerberg’s frequent changes to default privacy settings to allow everyone to see and search for names, gender, city, and other information. Zuckerberg’s position is that people “have really gotten comfortable not only sharing more information and different kinds, but more openly and with more people.” It is well known that Zuckerberg has a multibillion-dollar commercial interest in the elimination of online privacy, so trusting Facebook’s privacy policies exemplifies the privacy paradox.

In a 2016 national privacy and security survey, Pew Research found that 64% of Americans have personally experienced a major data breach (Figure 14.2) and approximately 50% do not trust the federal government or social media sites to protect their personal data even though they frequently neglect cybersecurity bet practices in their own personal lives (Olmstead and Smith, 2017). Unfortunately, 49% of the 1,040 adult Americans who took the study said that they feel their personal information is less secure than it was 5 years ago, and Americans aged 50+ were especially likely to feel that the privacy of their personal information was at risk. Fifty-eight percent in this older age group expressed this opinion compared with 41% of those in the 18–49 year age group.

Bar chart for Major data breaches reported by adult Americans in a research and security study.

FIGURE 14.2 Major data breaches reported by 1,040 adult Americans in 2016 Pew Research privacy and security study.

This may be accounted for by the fact that social sites have become so embedded in the social lives of younger users that they disclose information about themselves even though these sites do not provide adequate privacy controls. The consequences of the privacy paradox are far reaching.

Social Media Recruiting

The use of social media is pervasive in today’s workplace. Employers use social media for multiple reasons: to engage employees, to share knowledge among employees, and for recruitment and hiring of new employees. When the Society for Human Resource Management (SHRM) surveyed its members, they found that 84% of organizations are currently recruiting new talent via social media and another 9% are planning to use it in the near future (SHRM, 2016). They also reported that over one-third of the organizations represented have taken steps to leverage mobile recruiting to target smartphone users.

Social Tools for Recruiting and Background Checks

In order to cast a wide net for potential candidates, social media are used in social recruitment. However, improper use of information scraped from these sites may be discriminatory and illegal. The problem starts with members who post age, race, gender, and ethnicity information—or enable it to be learned from content on their sites. To the extent that employers conduct a social media background check on job candidates, these are three best practices. Figure 14.3 shows the job levels that are typically recruited through social media (SHRM, 2016).

Illustration of Job levels recruited through social media.

FIGURE 14.3 Job levels recruited through social media.

Recruiting through social media often involves searching information the job candidate did not want considered or that is illegal to use in the hiring process. To guard against this, it’s advisable for companies to carry out the following steps:

  1. Have either a third party or a designated person within the company who does not make hiring decisions do the background check.
  2. Use only publicly available information. Do not friend someone to get access to private information.
  3. Do not request username or passwords for social media accounts.

The National Conference of State Legislatures has passed summary legislation preventing employers from requesting passwords to personal Internet accounts to get or keep a job. To date, 25 states have enacted such laws. Other states have such laws pending, and there are several proposals before Congress to do the same on a federal level.

Social Recruiting and Social Stalking

Recruiters see LinkedIn as the world’s largest resume database. Depending on how job candidates control their privacy and how much they reveal through check-ins and posts, recruiters learn a great deal of information that should not be used in their decision to interview, recommend, or hire someone. A 2016 Jobvite survey reported that 92% of all participating recruiters used social media in their outreach and that 87% said that they found LinkedIn to be the most effective way to vet candidates during the hiring process. Facebook, Twitter, blogs, and other forms of social media are also used.

Recruiters are also social stalkers! Almost half of the recruiters in the Jobvite survey said that they regarded photos of alcohol consumption and marijuana use on social networks negatively. And, interestingly were also negatively influenced by bad spelling in social media posts! Facebook members who expose too much information about themselves through social posts are vulnerable to employers and recruiters who use social content in the hiring process. Although laws forbid the use of certain types of social media information, it’s hard to monitor its effect on hiring practices.

And job seekers fight back in response to these somewhat questionable recruiting practices. Jobvite reported that 23% of job seekers have modified their privacy settings on their Facebook pages and 10% on LinkedIn. In addition, 13% of job seekers have deleted some content on their Facebook pages and 10% said they’d changed content on their LinkedIn page (Jobvite, 2016).

Protected Classes and Information

According to the Equal Employment Opportunity Commission (EEOC, 2014), discriminatory practices are prohibited. Title VII of the Civil Rights Act of 1964, the Age Discrimination in Employment Act of 1967 (ADEA), the Americans with Disabilities Act of 1990 (ADA), and Genetic Information Nondiscrimination Act of 2008 (GINA) make it illegal to discriminate in any aspect of employment, including recruitment, hiring, and firing. GINA, the latest of these laws, was passed when results from the Human Genome Project started raising ethical dilemmas. Protected classes is a term used in these laws to describe characteristics that cannot be targeted for discrimination and harassment. Protected classes include age, disability, gender, religion, genetic information, race, national origin, and pregnancy.

If information about protected classes is used to weed out candidates, it can lead to corporate social media discrimination. Discrimination is not always black and white because it is prejudicial treatment that may be tough to prove. Although job applicants might not know whether or not their social media profiles had been screened, they have several ways of finding out. For instance, an applicant might be tipped off after receiving a suspicious friend request or by talking with current employees and hiring managers who disclose the information—either purposely or accidentally—during the interview.

Enterprises that have not implemented formal processes for the use of social media in recruiting and selection may put themselves at risk of legal complaints because of inconsistent practices.

Legal Note: Civil Rights

Civil rights are protected by federal law. If a person’s civil rights are interfered with by another, the person can seek legal action for the injury. Examples of civil rights are freedom of speech, press, and assembly; the right to vote; and the right to equality in public places. Discrimination occurs when the civil rights of an individual are denied or interfered with because of their membership in a particular group or class. Various jurisdictions have enacted statutes to prevent discrimination based on a person’s race, sex, religion, age, previous condition of servitude, physical limitation, national origin, and, in some instances, sexual orientation.

Competing Legal Concerns

Two competing legal concerns are discrimination and negligent hiring (discussed briefly earlier).

  • Discrimination Most employers have stringent employment policies that prevent their recruiters and hiring managers from learning potentially discriminatory information about candidates. Visiting a person’s social media sites, however, clearly creates the opportunity to view large amounts of information going against these nondiscriminatory practices.
  • Negligent hiring Employers must consider the potential risk of a negligent hiring or negligent retention lawsuit related to social networking profile information. It is possible that if a workplace violence incident occurred and the attacker’s public social networking profile contained information that could have predicted that behavior, the employer may be held liable for negligence in not using readily available information during the hiring decision.

Examples and a discussion of these issues follow.

Discrimination via Social Media Scenario

Imagine that an employer reviews a candidate’s activity on social media platforms and discovers the following information about him.

  1. The candidate checks in via Foursquare at Woodsman Gym once or twice a day usually around 7 a.m., noon, or 6 p.m.
  2. His Facebook album is filled with party photos, showing what might be considered excessive drinking.
  3. His resume suggests that he is in his early 30s, but his social profile about high school indicates that his real age is late 40s.
  4. His posts describe his religious beliefs and customs, family’s serious medical conditions, financial stress, and desire to spend as much time as possible snowboarding.
  5. He makes fun of and posts insulting cartoons of people who follow a dress code at work.

The Federal Trade Commission (FTC) has ruled that companies that research how you spend your personal time, hobbies, and so on, do not violate your privacy. Party photos might not show illegal behavior, but when posted on a social network, they could influence a potential employer’s evaluation of a job applicant as well as disclose information about race, gender, age, and other protected characteristics.

As many other job seekers, this candidate is posting, tweeting, and blogging information he would not want a recruiter or prospective employer to know about. If he is rejected because of his age, religion, or genetic condition, the company has committed social media discrimination and is very likely in violation of other laws.

Reducing the Risk of Negligent Hiring

In the past, employment law attorneys dealt with this risk by advising companies to avoid using social media in their hiring and recruitment process to avoid legal risk. However, that proposal is not realistic. By opting out of social media, recruiting firms lose a productive way to find candidates, which could cost them millions of dollars. Additionally, background checks must be conducted. Almost all employers do some form of background screening in order to avoid the risk of negligent hiring. Negligent hiring is a claim made by an injured party against an employer who knew or should have known about an employee’s background that indicates a dangerous or untrustworthy character. Employers have a legal obligation to make the best effort to protect their employees and customers when they hire. Steps companies can take to balance the competing risks of negligent hiring and social discrimination are as follows:

  1. Ask candidates to sign a disclosure statement Let candidates themselves disclose information found on social media. Explain to them the reason for the disclosure statement.
  2. Create a standard process and document it A consistent and well-documented process is needed to ensure and show compliance if there is an EEOC employment investigation.
  3. Avoid coercive practices Make sure that recruiters do not pressure applicants to disclose protected information via social media by requiring them to disclose passwords or relax privacy settings for purposes of review by the employer.
  4. Training This may sound like a no-brainer, but training and repeated reminders are important to emphasize that management intends to be in compliance with laws and regulations related to social recruiting.

Financial Organizations Must Comply with Social Media Guidelines

The Federal Financial Institutions Examination Council (FFIEC) released guidelines entitled Social Media: Consumer Compliance Risk Management Guidance to help financial institutions effectively manage the current risks caused by the use of social media. The activities of financial institutions are regulated by consumer protection and compliance laws. These institutions must take steps to protect their reputations and their clients—very similar to the steps that HR departments must take to comply with EEOC guidelines (EEOC, 2014). Key social media guidelines for financial institutions are listed in Table 14.2.

TABLE 14.2 Key Social Media Guidelines for Financial Institutions

Guidelines Issue Solution
Institute policies to comply with advertising, communications, and other consumer protection laws No policies in place; need a social media risk assessment tool. Implement social policies to prevent issues such as spam. For example, staff should know how to react when a customer posts confidential information such as a bank number on their social profiles.
Use monitoring tools Financial institutions have added social channels that can expose their brand to additional feedback. Use social monitoring tools to identify issues that may cause a negative reaction and respond quickly. The use of social monitoring tools also helps banks refute inaccurate statements, protecting their brand reputation.
Train employees Whether or not employees represent your brand on social media, their public social comments may be seen to reflect the financial institution. The best way to reduce risk is to train employees on how to use social networks professionally.

Companies expose themselves to harsh sanctions by federal agencies when they violate the privacy policies that their customers rely upon. Unlike social discrimination, these cases are rather easy to detect and prosecute. For example, the FTC charged SnapChat for, in effect, deceiving its customers with its bogus disappearing messages services. The FTC scrutinizes business practices to regulate “unfair and deceptive trade practices.” The FTC has been focused on curtailing deceptive practices, even if unintentional, by businesses engaged in online commerce. While businesses should always ensure that their online advertisements are truthfully conveyed, a business with a social media presence should take particular note of the FTC’s recent efforts concerning online privacy, security, and advertising. IT at Work 14.2 describes such a case.

Concept Check 14.2

  1. Artificial intelligence was designed to make our lives better and more efficient.
a. This is always true
b. This is sometimes true
c. This is not true
Correct or Incorrect?

 

  1. When major retailers rely on predictive analytics to understand consumer shopping habits to market their products more efficiently, there are ______________ interests relating to privacy.
a. Unrelated
b. Relevant
c. Competing
d. Complementary
Correct or Incorrect?

 

  1. ____________________ is the right to self‐determine what information about you is made accessible to whom, when and for what use or purpose.
a. Privacy
b. Ethics
c. Risk
d. Responsibility
Correct or Incorrect?

 

14.3 Technology Addictions and Focus Management

Technologies in the digital age blur work, social, and personal time. IT keeps people connected with no real off switch. Tools that are meant to improve the productivity and quality of life in general can also intrude on personal time.

The complexity of a connected life will increase as we move to the new era of nanosensors and devices, virtual spaces, and 3D social networks exchanging zillions of bytes of data. Managers and workers need to consider ethical and social issues, such as quality of life and working conditions. Individuals will experience both positive and negative impacts from being linked to a 24/7 workplace, working in virtual teams, and being connected to handhelds whose impact on health can be damaging. A 2016 study by nonprofit organization Common Sense Media found that always being connected is a borderline obsession for many people. According to the study, 50% of American teens may suffer from FOMO, or the fear of missing out, and disconnect anxiety—feelings of disorientation and nervousness when deprived of Internet or wireless access for a period of time (Wallace, 2016).

Many people live and work in a state of continuous partial attention as they move through their day—loosely connected to friends and family through various apps on mobile and wearable devices. Consider what devices you use to stay informed and how often you glance at them. You might not have noticed the gradual increase in the amount of data and information that you receive or check routinely until one day they seem to overwhelm your time. How many more things do you check today compared to a year ago? How long can you go without checking your devices without experiencing anxiety? When do you put down your mobiles and concentrate on one thing at a time? Your answers may indicate digital or connectivity overload and your tolerance for distractions.

The time between a new device or app going from must have to cannot function without is rather short. This situation is not limited to only digital natives. Studies show that adults are just as distracted as teenagers, which can also be confirmed with a casual glance at offices, airports, cafes, and other public gathering places.

Digital Distractions and Loss of Focus

People do not need to be reminded how their lives are being taken over by tweets, texts, e-mail, social media, and annoying electronic static. Business users are more likely to suffer from too much data, rather than from data scarcity. This condition, known as cognitive overload, interferes with our ability to focus and be productive.

How big is this problem and how much does it cost? Some researchers estimate that distraction costs hundreds of billions of dollars a year in lost productivity. Gloria Mark, a professor of informatics at the University of California, Irvine, says a worker distracted by a Web search that goes rogue or a new text or tweet can take about 25 minutes to return to the task at hand and get focused again (Dumaine, 2014). Digital distraction and lack of focus in the workplace are getting the attention of senior management. When Inc. called the CEOs of technology companies Instagram, Box, and Zumba, they confirmed that the lack of focus on the job is a big concern for them.

Focus Management

Senior management at Google, SAP, Instagram, Box, and Zumba are experimenting with new ways to diminish cognitive overload in order to help their employees stay focused. For example, at Google, employees take courses that help to sharpen their attention skills. The founders of Zumba and Box have developed their own methods to carve out focus time, such as putting aside large blocks of time to think undisturbed.

The Importance of Being Able to Focus

Nobel Prize-winning neuroscientist Eric Kandel wrote in his book In Search of Memory that only by intensely concentrating can a person link new ideas and facts “meaningfully and systematically with knowledge already well-established in memory” (Kandel, 2006). He explained the importance of mental discipline to successful performance. If your mind is free of distraction, your mind is better able to absorb data, interactions, and trends and synthesize the new information with what you already know. As a result, you are more likely to come up with innovative ideas. If you are multitasking or are trying to function with only partial attention, your ability to synthesize information may be compromised.

Researchers at the Communication Between Humans and Interactive Media Lab at Stanford University studied digital distraction and focus. Researchers gave the same three cognitive tests to two different groups of test subjects:

  1. Media (high) multitaskers Forty-nine subjects who spent a lot of time searching the Internet, gaming online, watching TV, and hanging out on social media sites.
  2. Low multitaskers Fifty-two subjects who spent less time online and multitasked significantly less often.

Ten years ago, many believed that the Internet sharpened cognitive skills. Gaming required fast thinking and good motor skills. In contrast to widely held assumptions, the subjects who were heavy online users scored poorly on the cognitive test. One explanation for their poor performance was that they had attention deficits—less control over their attention. Because of their inability to concentrate for long, they were not able to distinguish important information from trivia. Researchers continue to study whether chronic media multitaskers are born with an inability to concentrate or are damaging their cognitive control by willingly taking in so much at once. Science also shows that the best strategy to improve focus is to practice doing it.

Michael Merzenich, a neuroscientist, gave a biological explanation of the impacts of multitasking on focus ability. He explained that the more you focus, the more your brain releases a chemical called noradrenaline, which helps you concentrate on the task at hand.

The American Psychological Association disagrees saying that “Although switch costs may be relatively small, sometimes just a few tenths of a second per switch, they can add up to large amount when people switch repeatedly back and both between tasks. Thus, multi-tasking may see efficient on the surface, but may actually take more time in the end and involve more error” (Wrike, 2015). Even brief mental blocks created by shifting between tasks can cost as much as 40% of someone’s productive time—that’s 16 hours out of every work week!

In our hyperconnected world, people are always on—collaborating, communicating, and creating—and not always aware of how technology impacts them or the environment. Today’s connected lifestyles will further harm the environment unless corrective actions are taken such as those listed in Figure 14.4.

Illustration of Eco-friendly recommendations for applying ICT.

FIGURE 14.4 Eco-friendly recommendations for applying ICT.

Learning how to harness ICT to develop the next generation of critical, thoughtful thinkers who are respectful of the environment is the challenge we need to meet.

Concept Check 14.3

  1. The time between a new device or app going from ‘must have’ to ‘cannot function without’ is rather _______________.
a. Long
b. Abstract
c. Short
d. Indeterminate
Correct or Incorrect?

 

  1. When someone suffers from too much data, it is a condition referred to as:
a. Cognitive overload
b. Constant information
c. Cognitive distraction
d. Information overload
Correct or Incorrect?

 

  1. If you are multi‐tasking or trying to function with only partial attention, a person’s ability to synthesize information may be __________________
a. Enhanced
b. Distracted
c. Breached
d. Compromised
Correct or Incorrect?

 

  1. When people are constantly collaborating, communicating and creating online, they are referred to as being _____________________.
a. Cognitively overloaded
b. Data rich
c. Always on
d. Distracted
Correct or Incorrect?

 

14.4 ICT and Sustainable Development

Sustainability grows more urgent every year as carbon emissions contribute to climate changes that are threatening quality of life—and possibly life itself. For example, every day people watch hundreds of millions of hours on YouTube and generate billions of views. Statistics about LinkedIn, Twitter, and other social media services also show phenomenal growth. Almost all of these network activities are powered by the burning of fossil fuels.

Being profit-motivated without concern for damage to the environment is unacceptable. Society expects companies to generate a profit and to conduct themselves in an ethical, socially responsible, and environmentally sustainable manner. Four factors essential to preserving the environment are shown in Figure 14.5.

Illustration of The four “Rs” of environmental sustainability: Reduce, Reuse, Recycle, and Recover.

FIGURE 14.5  The four “Rs” of environmental sustainability.

Global Temperature Rising Too Much Too Fast

At the United Nations’ 2009 climate conference in Copenhagen, climatologists estimated that countries must keep the global mean temperature (GMT) from rising by more than 2°C (3.6°F) above the preindustrial GMT in order to avoid profound damage to life on the earth (Tech Note 14.1). Damage includes water and food scarcity, rising sea levels, and greater incidence and severity of disease. Only three years later, GMT had already increased by 0.7°C or 1.3°F. In 2012, IEA chief economist Faith Birol warned that this trend is perfectly in line with a temperature increase of 6°C by 2050, which would have devastating impacts on the planet. Since 2005, the Prince of Wales’ Corporate Leaders Group on Climate Change has lobbied for more aggressive climate legislation within the United Kingdom, the European Union, and internationally. It holds that carbon emission reductions between 50% and 85% are necessary by 2050 to prevent the global temperature from rising too much too fast because of the greenhouse effect.

IT and Global Warming

Global warming refers to the upward trend in GMT. It is one of the most complicated issues facing world leaders. Figure 14.6 shows the relationship of fossil fuel, soil, water, atmosphere, and other elements in the carbon cycle. Even though the global carbon cycle plays a central role in regulating CO2 in the atmosphere and thus the earth’s climate, scientists’ understanding of the interlinked biological processes that drive this cycle is limited. They know that whether an ecosystem will capture, store, or release carbon depends on climate changes and organisms in the earth’s biosphere. The biosphere refers to any place that life of any kind can exist on the earth and contains several ecosystems. An ecosystem is a self-sustaining functional unit of the biosphere; it exchanges material and energy between adjoining ecosystems. Global warming occurs because of the greenhouse effect, which is the holding of heat within the earth’s atmosphere. GHGs such as CO2, methane (CH4), and nitrous oxide (N2O) absorb infrared radiation (IR), as diagrammed in Figure 14.7.

Image described by caption and surrounding text.

FIGURE 14.6 Greenhouse gases absorb infrared radiation (IR) emitted from the earth and reradiate it back, thus contributing to the greenhouse effect.

Illustration of Carbon cycle.

FIGURE 14.7 Carbon cycle. The Orbiting Carbon Observatory-2 was launched in July 2014. The observatory is NASA’s first satellite mission dedicated to studying CO2, which is a critical component of the earth’s carbon cycle driving changes in the earth’s climate. CO2 is also the largest human-produced GHG.

Courtesy of genomicscience.energy.gov.

The IT industry sector is called the information and communications technology, or ICT, in emission reports. ICT has certainly supported economic growth in developed and developing countries and transformed societies, businesses, and people’s lives. But what impacts do our expanding IT and social media dependence have on global warming? How can business processes change or reduce GHGs? And what alternative energy sources can be used to power the increasing demands for connectivity? Listed next are several reports and initiatives to help answer these questions.

Global e-Sustainability Initiative and the SMART 2020 Report

The Climate Group’s SMART 2020 Report is the world’s first comprehensive global study of the IT sector’s growing significance for the world’s climate. On behalf of the Global e-Sustainability Initiative (GeSI), Climate Group found that ICT plays a key role in reducing global warming. Transforming the way people and businesses use IT could reduce annual human-generated global emissions by 15% by 2020 and deliver energy efficiency savings to global businesses of over 500 billion euros or $800 billion. And using social media, for example, to inform consumers of the grams (g) of carbon emissions associated with the products they buy could change buyer behavior and ultimately have a positive eco-effect. Similarly to food items that display calories and grams of fat to help consumers make healthier food choices, product labels display the CO2 emissions generated in the production of an item. By 2020, not only will people become more connected, but things will as well—an estimated 50 billion machine-to-machine connections in 2020. A benefit of machine-to-machine connections is that they can relay data about climate changes that make it possible to monitor our emissions.

Recommended Actions for the IT Sector

Analysis conducted by management consultants McKinsey & Company concludes the following:

  • The IT sector’s own footprint of 2% of global emissions could double by 2020 because of increased use of tablets, smartphones, apps, and services. To help, rather than worsen, the fight against climate change, the IT sector must manage its own growing impact and continue to reduce emissions from data centers, telecom networks, and the manufacture and use of its products.
  • IT has the unique ability to monitor and maximize energy efficiency both within and outside of its own industry sector to cut CO2 emissions by up to 5 times this amount. This represents a savings of 7.8 Gt of CO2 per year by 2020, which is greater than the 2010 annual emissions of either the United States or China.

The SMART 2020 Report gives a picture of the IT industry’s role in addressing global climate change and facilitating efficient and low-carbon development. The role of IT includes emission reduction and energy savings not only in the sector itself, but also by transforming how and where people work. The most obvious ways are by substituting digital formats—telework, videoconferencing, e-paper, and mobile and e-commerce—for physical formats. Researchers estimate that replacing physical products/services with their digital equivalents would provide 6% of the total benefits the IT sector can deliver. Greater benefits are achieved when IT is applied to other industries. Examples of those industries are smart building design and use, smart logistics, smart electricity grids, and smart industrial motor systems.

Global Warming: A Hot Debate

Does our society have the capacity to endure in such a way that the 9 billion people expected on the earth by 2050 will all be able to achieve a basic quality of life? The answer is uncertain—and hotly debated. As you read, many scientists and experts are extremely alarmed by global warming and climate change, but other experts outright deny that they are occurring.

This debate may be resolved to some degree by NASA. A NASA spacecraft was designed to make precise measurements of CO2 in the earth’s atmosphere. The Orbiting Carbon Observatory-2 (OCO-2) was launched in July 2014. The observatory is NASA’s first satellite mission dedicated to studying CO2, a critical component of the earth’s carbon cycle that is the most prevalent human-produced GHG driving changes in the earth’s climate (Figure 14.7).

OCO-2 is a new tool for understanding both the sources of CO2 emissions and the natural processes that remove CO2 from the atmosphere and how they are changing over time. The mission’s data will help scientists reduce uncertainties in forecasts of how much CO2 is in the atmosphere and improve the accuracy of global climate change predictions.

According to NASA, since the start of the Industrial Revolution more than 200 years ago, the burning of fossil fuels and other human activities have led to an unprecedented buildup in GHGs. Human activities have increased the level of CO2 by more than 25% in just the past half century.

It is possible that we are living far beyond the earth’s capacity to support human life. While sustainability is about the future of our society, for businesses, it is also about return on investment (ROI). Businesses need to respect environmental limits, but also need to show an ROI.

Sustainability Through Climate Change Mitigation

There are no easy or convenient solutions to carbon emissions from the fossil fuels burned to power today’s tech dependencies. But there are pathways to solutions, and every IT user, enterprise, and nation plays a role in climate change mitigation. Climate change mitigation is any action to limit the magnitude of long-term climate change. Examples of mitigation include switching to low-carbon renewable energy sources and reducing the amount of energy consumed by power stations by increasing their efficiency. There have been encouraging successes. For example, investments in research and development (R&D) to reduce the amount of carbon emitted by power stations for mobile networks are paying off. A breakthrough in the design of signal amplifiers for mobile technology will cut 200 megawatts (MW) from the load of power stations, which will reduce CO2 emissions by 0.5 million tonnes a year (Engineering and Physical Sciences Research Council, 2014).

Mobile, Cloud, and Social Carbon Footprint

No one sees CO2 being emitted from their Androids or iPhones. But wired and mobile networks enable limitless data creation and consumption—and these activities increase energy consumption. Quite simply, the surge in energy used to power data centers, cell towers, base stations, and recharge devices is damaging the environment and depleting natural resources. It is critical to develop energy systems that power our economy without increasing global temperatures beyond 2°C. To do their part to reduce damaging carbon emissions, some companies have implemented effective sustainability initiatives.

Sustainability Initiatives

Communications technology accounts for approximately 2% of global carbon emissions; it is predicted that this figure will double by 2020 as end-user demand for high-bandwidth services with enhanced quality of experience explodes worldwide. Innovative solutions hold the key to curbing these emissions and reducing environmental impact.

Network service providers as well as organizations face the challenges of energy efficiency, a smaller carbon footprint, and eco-sustainability. To deal with these challenges, wired and wireless service providers and companies need to upgrade their networks to next-generation, all-IP infrastructures that are optimized and scalable. The network must provide eco-sustainability in traffic transport and deliver services more intelligently, reliably, securely, efficiently, and at the lowest cost.

For example, Alcatel-Lucent’s High Leverage Network (HLN) can reduce total cost of ownership (TCO) by using fewer devices, creating an eco-sustainable choice for service providers. Fewer devices mean less power and cooling, which reduces the carbon footprint. HLN can also handle large amounts of traffic more efficiently because the networks are intelligent, sending packets at the highest speed and most efficiently.

Technology to Transform Business and Society

People hold the power to shape and apply technology to create positive change, improve lives, and transform business and society. According to Paul Daugherty, Accenture’s Chief Technology and Innovation Officer, “The pace of technology change is breathtaking, bringing about the biggest advancements since the dawn of the Information Age. As technology transforms the way we work and live, it raises important societal challenges and creates new opportunities. Ultimately, people are in control of creating the changes that will affect our lives, and we’re optimistic that responsive and responsible leaders will ensure the positive impact of new technologies.” (Accenture, 2017).

IoT in Developing Nations

An important technology that is helping developing nations harness the power of data to make crucial decisions about agriculture, health care, education, and infrastructure is the Internet of things (IoT).

Although data is sparse in some developing nations, big data can be gathered from surrounding nations to find correlations in the information. Joseph Alhadeff, Chair of the ICC Commission on the Digital Economy, says “For sustainable development, the reason why this technology has application in developing countries is that it can be used for any problem that requires data to help solve it. Internet of Things is really an enabling technology in terms of usability. Even basic deployments can be transformative for populations” (ICC, 2016).

People-First Approach to Technology

Each year, Accenture publishes its Technology Vision (Accenture, 2017), an analysis of key IT trends that are expected to disrupt business and society over the next 3 years. According to Vision 2017, taking a people-first approach by empowering people with more human technology will allow organizations to improve performance by redefining their relationship with customers and employees from provider to partner. This will require organizations to change the way they develop their business models and provide technology that support them to promote social responsibility.

A comparison of the disruptive technologies highlighted by Accenture’s Technology Visions 2015, 2016, and 2017, listed in Table 14.3, illustrates the trend toward a people-first approach to technology.

TABLE 14.3 Comparison of Accenture’s Top Five Disruptive Technologies 2015–2017

Vision 2015 Vision 2016 Vision 2017
Internet of Me Intelligent Automation Artificial Intelligence as the new User Interface
Outcome Economy Liquid Workforce Design for Humans
Platform Evolution Platform Economy Ecosystems as Macrocosms
Intelligent Enterprise Predictable Disruption Workforce Marketplace
Workforce Reimagined Digital Trust The Unchartered

An explanation of Vision 2017’s five IT trends that have the most potential to transform business and society over the next three years follows:

  1. TREND 1: AI is the new UI AI is coming of age, tackling problems both big and small by making interactions simple and smart. AI is becoming the new user interface (UI), underpinning the way we transact and interact with systems. Seventy-nine percent of survey respondents agree that AI will revolutionize the way they gain information from and interact with customers.
  2. TREND 2: Design for Humans Technology design decisions are being made by humans, for humans. Technology adapts to how we behave and learns from us to enhance our lives, making them richer and more fulfilling. Eighty percent of executives surveyed agree that organizations need to understand not only where people are today, but also where they want to be—and shape technology to act as their guide to realize desired outcomes.
  3. TREND 3: Ecosystems as Macrocosms Platform companies that provide a single point of access to multiple services have completely broken the rules for how companies operate and compete. Companies don’t just need a platform strategy, they need a rich and robust ecosystem approach to lead in this new era of intelligence. Already, more than one-quarter (27%) of executives surveyed reported that digital ecosystems are transforming the way their organizations deliver value.
  4. TREND 4: Workforce Marketplace The number of on-demand labor platforms and online work-management solutions is surging. As a result, leading companies are dissolving traditional hierarchies and replacing them with talent marketplaces, which in turn is driving the most profound economic transformation since the Industrial Revolution. Case in point: Eighty-five percent of executives surveyed said they plan to increase their organization’s use of independent freelance workers over the next year.
  5. TREND 5: The Uncharted To succeed in today’s ecosystem-driven digital economy, businesses must delve into uncharted territory. Instead of focusing solely on introducing new products and services, they should think much bigger—seizing opportunities to establish rules and standards for entirely new industries. In fact, 74% of the executives surveyed said that their organization is entering entirely new digital industries that are yet to be defined.

Next Wave of Disruption Will Be More Disruptive

High-performing business leaders now accept that their organizations’ future success is tied to their ability to keep pace with technology. Accenture reports that its clients tell them that technology is more important than ever to their business success. But today, the biggest IT innovations will not be in the technology tools themselves, but in how they are designed with people in mind. It is widely agreed that a people-first approach is the key to any organization’s digital success.

Concept Check 14.4

  1. Almost all network activities are powered by the burning of ____________________.
a. Fossil fuels
b. Coal
c. Electricity
d. Natural gas
Correct or Incorrect?

 

  1. Global warming occurs because of the _____________ effect.
a. Technology
b. Lightning
c. Greenhouse
d. Warming
Correct or Incorrect?

 

  1. The surge in energy used to power data centers, cell towers, base stations and recharge devices is ______________ the environment and _________________ natural resources.
a. Damaging, depleting
b. Warming, decreasing
c. Enhancing, increasing
d. Harming, lowering
Correct or Incorrect?

 

  1. All of the following are challenges that are driving organizations to upgrade their networks to next‐generation, all‐IP infrastructures that are optimized and scalable, EXCEPT:
a. Energy efficiency
b. Smaller carbon footprint
c. Eco‐sustainability
d. Total cost of ownership
Correct or Incorrect?

 

Key Terms

breach of privacy

carbon footprint

civil rights

climate change mitigation

cognitive overload

corporate social media discrimination

discrimination

Equal Employment Opportunity Commission

greenhouse gases (GHGs)

negligent hiring

open Wi-Fi network

people-first approach

privacy

privacy paradox

protected class

social recruitment

wardriving

Assuring Your Learning

References

  1. Accenture. “Technology Vision 2017: Amplify You: Technology for People” 2017. https://www.accenture.com/t20170321T032507_w_/us-en/_acnmedia/Accenture/next-gen-4/tech-vision-2017/pdf/Accenture-TV17-Full.pdf#view=FitH
  2. Amadeo, R. “Android Auto Review: A Beautiful, but Beta Alternative to Awful OEM Solutions.” Cars Technica, June 23, 2015. https://arstechnica.com/cars/2015/07/android-auto-review-a-beautiful-but-beta-alternative-to-awful-oem-solutions/
  3. Appthority. App Reputation Report. Summer 2014. appthority.com/resources/app-reputation-report
  4. Bader, C. “The Risks and Responsibilities of Tech Innovation.” MIT Sloan Management Review, June 10, 2014.
  5. Bilton, N. “Why Google Glass Broke.” The New York Times, February 4,  2015.
  6. Davis, W. N. “Google Glass is already causing legal experts to see problems.” ABA Journal Law News. April 1, 2014.
  7. Dumaine, B. “The Kings of Concentration.” Inc. Magazine, May 2014.
  8. EEOC. “Social Media Is Part of Today’s Workplace but Its Use May Raise Employment Discrimination Concerns.” Press release, EEOC.gov, March 12, 2014.
  9. Ellenberg, J. “What’s even creepier than Target guessing that you’re pregnant?”. Slate. 2014. http://www.slate.com/blogs/how_not_to_be_wrong/2014/06/09/big_data_what_s_even_creepier_than_target_guessing_that_you_re_pregnant.html
  10. Engineering and Physical Sciences Research Council. “New Design for Mobile Phone Masts Could Cut Carbon Emissions.” April 22, 2014.
  11. Fitzpatrick, A. and G. Kibel. “Technology, Digital Media and Privacy Alert.” Inside Counsel, June 17, 2014. insidecounsel.com/2014/06/17/technology-digital-media-and-privacy-alert
  12. Gartner. “Gartner Says Worldwide Shipments of 3D Printers to Grow 108 Percent in 2016.” Gartner Newsroom, October 13, 2016. http://www.gartner.com/newsroom/id/3476317
  13. Hendricks, D. “ED Printing is Already Changing Health Care.” Harvard Business Review, March 4, 2016.
  14. Heritage, Stuart. “How bots ruined everything: from Drake to diets.” The Guardian, October 30, 2016.
  15. ICC. “Expert opinion: How technology can catalyze sustainable development.” October 17, 2016.
  16. Jobvite. “Job Seeker National 2016 Study: Where Job Seekers Stand on the Economy, Job Security and the Future or Work”. Jobvite 2016.
  17. Kandel, E.R. In Search of Memory.New York, NY:W. W. Norton & Company, 2006.
  18. Katz, L. “Monitoring Employee Productivity: Proceed with Caution.” HR Magazine, July 1,  2015.
  19. McRae. R. “Bioprinting Human Organs: Saving Life or Redefining it? 2016. http://blogs.kentplace.org/bioethicsproject/2016/02/08/bioprinting-of-organs-what-does-this-mean-for-our-future-and-how-should-we-regulate-it/
  20. Martin, G. “So 3-D Printers May Be Nifty and Trendy, But Environmentally Friendly? Not Necessarily.” California Magazine of UC Berkeley, March 11, 2014.
  21. Olmstead, K. and Smith, A. “Americans and Cybersecurity.” PewResearch Center, 2017.
  22. Perry, T. “Woman wearing Google Glass found not guilty of distracted driving.” LA Times. January 16, 2014.
  23. Popely, R. “Which 2016 Cars Have Android Auto?”. Cars.com, October 1, 2016 https://www.cars.com/articles/which-2016-cars-have-android-auto-1420681175443/.
  24. Scopatz, R. A. and Zhou, Y. “Effect of electronic device use on pedestrian safety: A literature review.” National Highway Traffic Safety Administration, April 6, 2016.
  25. SHRM. “Using Social Media for Talent Acquisition – Recruitment and Screening” 2016. https://www.shrm.org/hr-today/trends-and-forecasting/research-and-surveys/Pages/Social-Media-Recruiting-Screening-2015.aspx
  26. Taylor, J. “Feds Interrogate Man Wearing Google Glass in Movie Theater.” BetaBeat.com, January 21, 2014.
  27. Wallace, Kelly. “Half of teens think they’re addicted to their smartphones.” CNN, July 29, 2016.
  28. Whitney, L. “Google Glass Wearer Challenges Distracted Driving Charge.” CNET.com, December 4, 2013.
  29. Wrike. “The High Cost of Multi-tasking: 40% or Productivity Lost by Task Switching.” September 2015.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset