{"id":1052,"date":"2011-07-13T09:41:45","date_gmt":"2011-07-13T09:41:45","guid":{"rendered":"http:\/\/www.asc-cybernetics.org\/2011\/?page_id=1052"},"modified":"2011-07-13T09:41:45","modified_gmt":"2011-07-13T09:41:45","slug":"philip-barons-paper-proposal","status":"publish","type":"page","link":"https:\/\/www.asc-cybernetics.org\/2011\/?page_id=1052","title":{"rendered":"Philip Baron&#8217;s Paper Proposal"},"content":{"rendered":"<p><center><\/p>\n<h3>A conversation with my friend technology: A challenge to the status quo<\/h3>\n<p><\/center><\/p>\n<p><i>A simple way to determine what is important to people is to investigate where they are spending their time. If a person spends a lot of time with their child, cares for him, plays with him, loves him, it is clear that they have an authentic connection. Is the same true regarding technology? Do we spend a considerable time relating to our technological devices, playing with them, thinking about them and desiring them? How do we respond when we cannot use our favourite electronic gadget? Our relationship with technology mirrors several characteristics of our human relationships. A reflection on one\u2019s life may provide a shock as to how much technology has become a full member in our human family. One area of interest is in information and communications technology (ICT). Our communication methods have changed and are changing as advances in technology allow us new ways of expressing ourselves, while also reducing traditional communication methods. We have been warned of the dangers of complete reliance on technology by Heidegger some time ago.<br \/>\nHeidegger stated (1977):<br \/>\nEverywhere we remain unfree and chained to technology, whether we passionately affirm or deny it. But we are delivered over to it in the worst possible way when we regard it as something neutral; for this conception of it, to which today we particularly like to do homage, makes us utterly blind to the essence of technology. P.4<br \/>\nIt is true that some thought of him as a Luddite, however philosophers often have insight into future happenings; thus, it is worthwhile hearing Heidegger\u2019s call for awareness. The reason is summarised by Merold Westphal (2004:24) where he says: \u201ctechnology threatens to become the only thinking, to become the sole criterion by which we operate\u201d. He further states that the great thinkers of the past were philosophers and theologians, while the great minds of today are engineers and entrepreneurs. In terms of ICT this raises a few important questions. Are our technology based communication methods decided upon by engineers and programmers? Are our ICT devices a form of interruption? Can technology be taught listening skills, or social skills? Can our ICT become a full member of our conversations?<br \/>\n<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A conversation with my friend technology: A challenge to the status quo A simple way to determine what is important to people is to investigate where they are spending their time. If a person spends a lot of time with &hellip; <a href=\"https:\/\/www.asc-cybernetics.org\/2011\/?page_id=1052\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":21,"menu_order":0,"comment_status":"open","ping_status":"open","template":"participants_only.php","meta":{"footnotes":""},"class_list":["post-1052","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/pages\/1052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1052"}],"version-history":[{"count":1,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/pages\/1052\/revisions"}],"predecessor-version":[{"id":1053,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/pages\/1052\/revisions\/1053"}],"up":[{"embeddable":true,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/pages\/21"}],"wp:attachment":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}