Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-22dnz Total loading time: 0 Render date: 2024-04-28T14:05:53.528Z Has data issue: false hasContentIssue false

4 - Changes in Technology

from Part II - What Has Changed?

Published online by Cambridge University Press:  02 April 2020

Brian J. Hoffman
Affiliation:
University of Georgia
Mindy K. Shoss
Affiliation:
University of Central Florida
Lauren A. Wegman
Affiliation:
University of Georgia
Get access

Summary

This chapter accomplishes three primary goals. First, we review the history of technologies that have been influential in the world of work, from the abacus to innovations of the present day. We then identify eight characteristics that describe modern technologies: power, portability, usability, networking, encryption, ubiquity, immersion, and predictiveness. Finally, we present a SWOT analysis that identifies the implications of these characteristics for the future of work. In doing so, we demonstrate that although technological change is a constant, so too is humans’ ability to adapt to change.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

AccuVein. (2012). AccuVein AV400 user manual: A health professional’s guide for use and operation of the AccuVein AV400. AccuVein. Retrieved June 15, 2018, from www.accuvein.comGoogle Scholar
Alexander, A. L., Brunyé, T., Sidman, J., & Weil, S. A. (2005). From gaming to training: A review of studies on fidelity, immersion, presence, and buy-in and their effects on transfer in pc-based simulations and games. DARWARS Training Impact Group, 5, 114.Google Scholar
Allen, I. E., & Seaman, J. (2016). Online Report Card: Tracking Online Education in the United States. Babson Survey Research Group.Google Scholar
American Management Association (2007). Electronic monitoring and surveillance survey. AMA/ePolicy Institute Research. Retrieved from www.amanet.org/training/articles/the-latest-on-workplace-monitoring-and-surveillance.aspxGoogle Scholar
Ashton, K. (2009). That ‘internet of things’ thing. RFID Journal, 22(7), 97114.Google Scholar
Astor, M. (2017). Microchip implants for employees? One company says yes. New York Times. July 25. www.nytimes.com/2017/07/25/technology/microchips-wisconsin-company- employees.html?mcubz=3Google Scholar
Autor, D. (2015). Why are there still so many jobs? The history and future of workplace automation. Journal of Economic Perspectives, 29(3), 330.CrossRefGoogle Scholar
Behrend, T. S., Gloss, A. E., & Thompson, L. F. (2013). Global development through the psychology of workplace technology. In Coovert, M. D. & Thompson, L. F. (Eds.), The psychology of workplace technology (pp. 261283). New York, NY: Taylor & Francis.Google Scholar
Behrend, T. S., & Thompson, L. F. (2013). Combining I-O psychology and technology for an environmentally sustainable world. In Huffman, A. H. & Klein, S. R. (Eds.), Green organizations: Driving change with I-O psychology (pp. 300322). New York, NY: Routledge.Google Scholar
Beinstein, A., & Sumers, T. (2016, June 29). How Uber engineering increases safe driving with telematics. Retrieved from https://eng.uber.com/telematics/Google Scholar
Bercik, B., & Bond, J. (1996). Inside JavaScript. Indianapolis, IN: New Riders Publishing.Google Scholar
Bhave, D. P. (2014). The invisible eye? Electronic performance monitoring and employee job performance. Personnel Psychology, 67(3), 605635.Google Scholar
Blascovich, J., Loomis, J., Beall, A. C., Swinth, K. R., Hoyt, C. L., & Bailenson, J. N. (2002). Immersive virtual environment technology as a methodological tool for social psychology. Psychological Inquiry, 13(2), 103124.CrossRefGoogle Scholar
Bloom, N., Liang, J., Roberts, J., & Ying, Z. J. (2015). Does working from home work? Evidence from a Chinese experiment. Quarterly Journal of Economics, 130(1), 165218.Google Scholar
Bollermann, B., Osborn, L., & Hughan, R. (2017). U.S. Patent Application No. 15/618,064.Google Scholar
Bostrom, N., & Yudkowsky, E. (2014). The ethics of artificial intelligence. In Frankish, K. & Ramsey, W. (Eds.), The Cambridge handbook of artificial intelligence (pp. 316334). Cambridge, UK: Cambridge University Press.Google Scholar
Boudreau, M. C., Loch, K. D., Robey, D., & Straud, D. (1998). Going global: Using information technology to advance the competitiveness of the virtual transnational organization. The Academy of Management Executive, 12(4), 120128.Google Scholar
Boulos, M. N. K., & Berry, G. (2012). Real-time locating systems (RTLS) in healthcare: A condensed primer. International Journal of Health Geographics, 11(1), 2532.Google Scholar
Bousfield, T., Dieker, L., Hughes, C. E., & Hynes, M. (Eds.) (2016). Proceedings from TeachLivE 2016: 4th International TLE TeachLivE Conference: Virtual Human Performance. Orlando, FL: University of Central Florida.Google Scholar
Browne, R. (2018, April 6). Elon Musk warns A.I. could create an ‘immortal dictator from which we can never escape.’ CNBC. Retrieved from www.cnbc.com/2018/04/06/elon- musk-warns-ai-could-create-immortal-dictator-in-documentary.htmlGoogle Scholar
Bunch, B., & Hellemans, A. (1993). The timetables of technology: A chronology of the most important people and events in the history of technology. New York, NY: Simon & Schuster.Google Scholar
Burke, D. (1995). All circuits are busy now: The 1990 AT&T long distance network collapse. California Polytechnic State University. Retrieved June 15, 2018, from http://users.csc.calpoly.edu/~jdalbey/SWE/Papers/att_collapseGoogle Scholar
Burrows, S., Gurevych, I., & Stein, B. (2015). The eras and trends of automatic short answer grading. International Journal of Artificial Intelligence in Education, 25(1), 60117.Google Scholar
Ceruzzi, P. (1998). In Cohen, I. & Aspray, W. (Eds.), A history of modern computing. Cambridge, MA: The MIT Press.Google Scholar
Comer, D. E., & Droms, R. E. (2003). Computer networks and internets. Upper Saddle River, NJ: Prentice Hall, Inc.Google Scholar
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13, 319340.Google Scholar
Deitel, P., & Deitel, H. (2007). Java: How to program (7th ed.). Upper Saddle River, NJ: Pearson Prentice Hall.Google Scholar
Deterding, S., Khaled, R., Nacke, L. E., & Dixon, D. (2011). Gamification: Toward a definition. CHI 2011 Gamification Workshop Proceedings, Vancouver, 1215.Google Scholar
Devol, G. C. (1966). U.S. Patent No. 3,283,918. Washington, DC: US Patent and Trademark Office.Google Scholar
Ducey, A. J., & Coovert, M. D. (2016). Predicting tablet computer use: An extended Technology Acceptance Model for physicians. Health Policy and Technology, 5(3), 268284.Google Scholar
Eastin, M.S., Glynn, C. J., & Griffiths, R. P. (2007). Psychology of communication technology use in the workplace. Cyberpsychology and Behavior, 10, 436443Google Scholar
ENIAC (Electronic Numerical Integrator and Computer) (2003). McGraw-Hill Dictionary of Scientific & Technical Terms, 6E. http://encyclopedia2.thefreedictionary.com/ENIACGoogle Scholar
Frey, C. B., & Osborne, M. A. (2017). The future of employment: how susceptible are jobs to computerisation? Technological Forecasting and Social Change, 114, 254280.Google Scholar
Ginzberg, E. (1982). The mechanization of work. Scientific American, 247(3), 6675.CrossRefGoogle Scholar
Goodman, D., & Morrison, M. (2007). JavaScript bible (6th ed.). Indianapolis, IN: Wiley Publishing.Google Scholar
Greenhalgh, T., Vijayaraghavan, S., Wherton, J., Shaw, S., Byrne, E., Campbell-Richards, D., Bhattacharya, S., Hanson, P., Ramoutar, S., Gutteridge, C., Hodkinson, I., Collard, A., & Morris, J. (2016). Virtual online consultations: advantages and limitations (VOCAL) study. BMJ Open, 6(1).CrossRefGoogle ScholarPubMed
Haley, D.T., Thomas, P., Roeck, A.D., & Petre, M. (2007). Measuring improvement in latent semantic analysis-based marking systems: Using a computer to mark questions about HTML. In Mann, S. & Simon, (Eds.), Proceedings of the 9th Australasian Conference on Computing Education, Volume 66 of ACE (pp. 3542). Ballarat: Australian Computer Society.Google Scholar
Henshell, J. (2013, January 14). Cyberloafing, BYOD, and the ethics of using technology devices at work. Retrieved from www.digitalethics.org/essays/cyberloafing-byod- and-ethics-using-technology-devices-workGoogle Scholar
IBM. (2013). Data-driven healthcare organizations use big data analytics for big gains [White paper]. Somers, NY: IBM Corporation.Google Scholar
“IBM Watson Health.” (n.d.). Retrieved from www.ibm.com/watson/health/oncology- and-genomics/Google Scholar
“iCliniq.” (n.d.). Retrieved from www.icliniq.com/p/aboutusGoogle Scholar
Information technology timeline. (2003). IETE Journal of Education, 44(1), 2122.Google Scholar
ISO (International Standards Organization) (1998). Ergonomic requirements for office work with visual display terminal. Part II: Guidance on usability (ISO 9241-11:1998).Google Scholar
Jia, H., Jia, R., & Karau, S. (2013). Cyberloafing and personality: The impact of the Big Five traits and workplace situational factors. Journal of Leadership and Organizational Studies, 20(3), 358365.Google Scholar
Jones, C. (1997). The year 2000 software problem: Quantifying the costs and assessing the consequences. New York, NY: ACM Press/Addison-Wesley Publishing Co.Google Scholar
Karim, M. N., Kaminsky, S. E., & Behrend, T. S. (2014). Cheating, reactions, and performance in remotely proctored testing: An exploratory experimental study. Journal of Business and Psychology, 29(4), 555572.Google Scholar
Karim, M. N., Willford, J. C., & Behrend, T. S. (2015). Big data, little individual: Considering the human side of big data. Industrial and Organizational Psychology, 8(4), 527533.Google Scholar
Kelly, K. (2017). The myth of a superhuman AI. Wired. Retrieved from www.wired.com/2017/04/the-myth-of-a-superhuman-ai/Google Scholar
Khakurel, J., Pöysä, S., & Porras, J. (2016, November). The use of wearable devices in the workplace: A systematic literature review. In International Conference on Smart Objects and Technologies for Social Good (pp. 284294). Cham: Springer.Google Scholar
Kish, L. B. (2002). End of Moore’s law: thermal (noise) death of integration in micro and nano electronics. Physics Letters A, 305(3–4), 144149.Google Scholar
Knezek, G., Fisser, P., Gibson, D., Christensen, R., & Tyler-Wood, T. (2012). SimSchool: Research outcomes from simulated classrooms. In Proceedings of the Society for Information Technology & Teacher Education International Conference 2012. Chesapeake, VA: American Association for the Advancement of Computing in Education.Google Scholar
Konishi, M., Wariishi, T., Tanibayashi, H., Kanchiku, H., & Fujimoto, H. (2015). U.S. Patent Application No. D781430Google Scholar
Kurzweil, R. (2014). Don’t fear artificial intelligence. TIME. Retrieved from http://time.com/3641921/dont-fear-artificial-intelligence/Google Scholar
Lakhani, K. R., & von Hippel, E. (2003). How open source software works: “Free” user-to-user assistance. Research Policy, 32(6), 923943.Google Scholar
Landers, R. N., Bauer, K. N., & Callan, R. C. (2017). Gamification of task performance with leaderboards: A goal setting experiment. Computers in Human Behavior, 71, 508515.Google Scholar
Landers, R. N., & Callan, R. C. (2011). Casual social games as serious games: The psychology of gamification in undergraduate education and employee training. In Ma, M. & Oikonomou, A. (Eds.), Serious games and edutainment applications (pp. 399423). London: Springer.Google Scholar
Lim, V. K., & Chen, D. J. (2012). Cyberloafing at the workplace: gain or drain on work? Behaviour and Information Technology, 31(4), 343353.Google Scholar
Lipko, H. (2016, November 10). Meet Jill Watson: Georgia Tech’s first AI teaching assistant. Retrieved from https://pe.gatech.edu/blog/meet-jill-watson-georgia-techs-first-ai- teaching-assistantGoogle Scholar
Maddox, B. B., & White, S. W. (2015). Comorbid social anxiety disorder in adults with autism spectrum disorder. Journal of Autism and Developmental Disorders, 45(12), 39493960.Google Scholar
Madrigal, A. C. (2018, May 24). Uber’s self-driving car didn’t malfunction, it was just bad. The Atlantic. Retrieved from www.theatlantic.com/technology/archive/2018/05/ubers- self-driving-car-didnt-malfunction-it-was-just-bad/561185/Google Scholar
Marzano, R. J. (2009). Teaching with interactive whiteboards. Educational Leadership, 67(3), 8082.Google Scholar
McNeil, I. (1990). An encyclopedia of the history of technology. New York, NY: Routledge.Google Scholar
Means, B., Gallagher, L., & Padilla, C. (2008). Teachers’ use of student data systems to improve instruction: 2005 to 2007. Washington, DC: US Department of Education.Google Scholar
Medland, R. (2010, November). Curbing paper wastage using flavoured feedback. In Proceedings of the 22nd Conference of the Computer–Human Interaction Special Interest Group of Australia on Computer–Human Interaction (pp. 224227). New York, NY: ACM Press.Google Scholar
“Medtronic.” (n.d.) Retrieved from www.medtronic.com/us-en/index.htmlGoogle Scholar
“Microbe Invader.” (n.d.). Retrieved from www.microbeinvader.com/Google Scholar
Mittler, J. (2007). Assistive technology and IDEA. In Warger, C. (Ed.), Technology integration: Providing access to the curriculum for students with disabilities. Arlington, VA: Technology and Media Division (TAM).Google Scholar
Mohler, M., & Mihalcea, R. (2009, March). Text-to-text semantic similarity for automatic short answer grading. In Proceedings of the 12th Conference of the European Chapter of the Association for Computational Linguistics (pp. 567575). Association for Computational Linguistics, Athens, Greece.Google Scholar
“Moodle.” (n.d.) Retrieved from https://moodle.org/Google Scholar
Moravec, H. (1988). Mind children: The future of robot and human intelligence. Cambridge, MA: Harvard University Press.Google Scholar
Moreau, R. (1984). In Cohen, I. & Aspray, W. (Eds.), The computer comes of age (Howlett, J. Trans.). (English ed.). Cambridge, MA: The MIT Press.Google Scholar
Morris, B., Croker, S., Zimmerman, C., Gill, D., & Romig, C. (2013). Gaming science: The “gamification” of scientific thinking. Frontiers in Psychology, 4(607), 116.Google Scholar
Mross, C. P. (1971). U.S. Patent No. 3,554,052. Washington, DC: US Patent and Trademark Office.Google Scholar
Nagele-Piazza, L. (2017, November 2017). Employers may be liable for worker identity theft. Retrieved from www.shrm.org/resourcesandtools/legal-and-compliance/state-and- local-updates/pages/employers-may-be-liable-for-worker-identity-theft.aspxGoogle Scholar
National Business Group on Health. (2015). Large employers’ health plan design survey: Reducing costs while looking to the future [Press Conference]. Washington, DC: National Business Group on Health.Google Scholar
Newman, W. M., & Taylor, A. S. (1999, September). Towards a methodology employing critical parameters to deliver performance improvements in interactive systems. INTERACT, 99, 605612.Google Scholar
Ningombam, D., Singh, A., & Chanu, K. T. (2018). Multipurpose GPS guided autonomous mobile robot. In Saeed, K., Chaki, N.., Pati, B., Bakshi, S. & Mohapatra, D. (Eds.), Progress in advanced computing and intelligent engineering. Advances in Intelligent Systems and Computing, 564 (pp. 361372). Singapore: Springer.Google Scholar
“On days they worked, 22 percent of employed did some or all of their work at home in 2016.” The Economics Daily. Retrieved from www.bls.gov/opub/ted/2017/on- days-they-worked-22-percent-of-employed-did-some-or-all-of-their-work-at-home-in- 2016.htmGoogle Scholar
O’Reilly, T. (2017). Using AI to create new jobs. O’Reilly. Retrieved from www.oreilly.com/ideas/using-ai-to-create-new-jobsGoogle Scholar
Peek, S. (2016, March 27). Knocker uppers: Waking up the workers in industrial Britain. BBC. Retrieved from www.bbc.com/news/uk-england-35840393Google Scholar
Perlroth, N. (2017, October 3). All 3 billion Yahoo accounts were affected by 2013 attack. New York Times. Retrieved from www.nytimes.com/2017/10/03/technology/yahoo-hack-3-billion-users.htmlGoogle Scholar
Potosky, D. (2008). A conceptual framework for the role of the administration medium in the personnel assessment process. The Academy of Management Review, 33(3), 629648.Google Scholar
Prometric. (2009). Biometric-enabled check-in. Retrieved June 15, 2018, from www.prometric.com/en-us/clients/documents/20090928Biometrics4pager.pdfGoogle Scholar
Psiaki, M. L., Humphreys, T. E., & Stauffer, B. (2016). Attackers can spoof navigation signals without our knowledge. Here’s how to fight back GPS lies. IEEE Spectrum, 53(8), 2653.Google Scholar
PwC. (2017, October 26). Global State of Information Security Survey 2018 [Newsbrief]. Vietnam: PwC.Google Scholar
Ralston, A., Reilly, E., & Hemmendinger, D. (2000). Encyclopedia of computer science. (4th ed.). New York, NY: Nature Publishing Group.Google Scholar
Ribitzky, R. (2007). Active monitoring of employees rises to 78%. ABC News. Retrieved from http://abcnews.go.com/Business/story?id=88319&page=1Google Scholar
“Rugged Cards Store Critical Mission Data Flash Replaces Other Storage Technologies in Military Applications.” (2001, October 16). Retrieved from www.targasystems.com/press/pr2910.htmGoogle Scholar
Russell, S. J., & Norvig, P. (2016). Artificial intelligence: A modern approach. Malaysia: Pearson Education Limited.Google Scholar
“Salesforce research shows success with wearables motivates 86 percent of adopters to increase spending on enterprise wearables initiatives.” (2015, April 22). Retrieved from https://investor.salesforce.com/about-us/investor/investor-news/investor-news- details/2015/Google Scholar
Sauter, D. (2011). Android smartphone relevance to military weather applications (No. ARL- TR-5793). White Sands Missile Range, NM: Army Research Lab.Google Scholar
Schmidt, S. (2017, April 26). Blockbuster has survived in the most curious of places – Alaska. Washington Post. Retrieved from www.washingtonpost.com/news/morning- mix/wp/2017/04/26/Google Scholar
Selinger, M., Sepulveda, A., & Buchan, J. (2013). Education and the Internet of everything. San Jose, CA: Cisco Systems, Inc.Google Scholar
“Sermo: Talk Real Medicine.” (n.d.) Retrieved from www.sermo.com/Google Scholar
Seymour, N. E., Gallagher, A. G., Roman, S. A., O’Brien, M. K., Bansal, V. K., Andersen, D. K., & Satava, R. M. (2002). Virtual reality training improves operating room performance: results of a randomized, double-blinded study. Annals of Surgery, 236(4), 458463.Google Scholar
Simon, H. (1965). The shape of automation for men and management. New York, NY: Harper and Row.Google Scholar
Simonite, T. (2016, May 13). Moore’s Law is dead. Now what? Technology Review. Retrieved from www.technologyreview.com/s/601441/moores-law-is-dead-now-what/Google Scholar
“SIOP Announces Top 10 Workplace Trends for 2018.” (2018, January 25). Retrieved from www.siop.org/article_view.aspx?article=1766Google Scholar
Smith, M. J., Ginger, E. J., Wright, K., Wright, M. A., Taylor, J. L., Humm, L. B., … & Fleming, M. F. (2014). Virtual reality job interview training in adults with autism spectrum disorder. Journal of Autism and Developmental Disorders, 44(10), 24502463.Google Scholar
Song, C., Gehlbach, P. L., & Kang, J. U. (2012). Active tremor cancellation by a “smart” handheld vitreoretinal microsurgical tool using swept source optical coherence tomography. Optics Express, 20(21), 2341423421.Google Scholar
“Sources of Greenhouse Gas Emissions.” (2016). Retrieved from www.epa.gov/ghgemissions/sources-greenhouse-gas-emissionsGoogle Scholar
Stein, N. (2017). The future of population health management: Artificial intelligence as a cost-effective behavior change and chronic disease prevention and management solution. MOJ Public Health, 6(5), 00188.CrossRefGoogle Scholar
Steuer, J. (1992). Defining virtual reality: Dimensions determining telepresence. Journal of Communication, 42(4), 7393.Google Scholar
“Tactical Communications.” (n.d.) Retrieved from www.harris.com/what-we-do/tactical- communicationsGoogle Scholar
Taylor, J. L., & Seltzer, M. M. (2011). Employment and post-secondary educational activities for young adults with autism spectrum disorders during the transition to adulthood. Journal of Autism and Developmental Disorders, 41(5), 566574.Google Scholar
Tyre, P. (2016, March 21). How sophisticated test scams from China making their way into the US. The Atlantic. Retrieved from www.theatlantic.com/education/archive/2016/03/how-sophisticated-test-scams- from-china-are-making-their-way-into-the-us/474474/Google Scholar
“Using the Internet of Things to Boost School Safety.” (2017, October 27). Retrieved from www.ipctech.com/using-the-internet-of-things-to-boost-school-safetyGoogle Scholar
Vodicka, E., Mejilla, R., Leveille, S. G., Ralston, J. D., Darer, J. D., Delbanco, T., Walker, J., & Elmore, J. G. (2013). Online access to doctors’ notes: patient concerns about privacy. Journal of Medical Internet Research, 15(9), e208.Google Scholar
Vonnegut, K. (1952). Player piano. New York, NY: Delacorte Press.Google Scholar
Waldrop, M. M. (2016, February 9). The chips are down for Moore’s Law. Nature. Retrieved from www.nature.com/news/the-chips-are-down-for-moore-s-law-1.19338Google Scholar
Wang, Y., Kung, L., & Byrd, T. A. (2018). Big data analytics: Understanding its capabilities and potential benefits for healthcare organizations. Technological Forecasting and Social Change, 126, 313.Google Scholar
“Waymo.” (n.d.). Retrieved from www.google.com/selfdrivingcar/Google Scholar
“Wrist-Aid.” (n.d.). Retrieved from www.wrist-aid.com/Google Scholar
Yagoda, R. E., & Hill, S. G. (2011). Using mobile devices for robotic controllers: Examples and some initial concepts for experimentation (No. ARL-TN-436). Aberdeen Proving Ground, MD: Army Research Lab.Google Scholar
Yang, Y., Liu, X., & Deng, R. H. (2017). Lightweight break-glass access control system for healthcare internet-of-things. IEEE Transactions on Industrial Informatics, 14(8), 36103617.Google Scholar
Yeginsu, C. (2018, February 1). If workers slack off, the wristband will know (And Amazon has a patent for it.). New York Times. Retrieved from www.nytimes.com/2018/02/01/technology/amazon-wristband-tracking- privacy.htmlGoogle Scholar
Zakon, R. H. (2018). Hobbes’ Internet Timeline 25 – the definitive ARPAnet & Internet history. Retrieved June 15, 2018, from www.zakon.org/robert/internet/timeline/Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×