TECHNOLOGY TRENDS 5
Since1950s, information technology has been growing at a high rate. Manyindividuals and businesses are increasingly integrating complextechnologies in their businesses. Information technology field hasspecifically undergone drastic development ranging from socialnetworking websites, emails, instant messaging, text messaging, andtelephone communication. The improved technology has createdsignificant effect on career development, business systems,professional and personal privacy, and business and personal ethics.
Bloomet al. (2009) asserts that technology trends in informationtechnology has a significant effect in empowering employees of givenorganization. The study used empirical evidence to show thatbusinesses that embrace the latest technology enhance personal growthof employees. The ‘information’ and ‘communication’ toolssupported by the newest technology allow one person to accomplishresponsibilities that traditionally required more than five people.As long as the employee has knowledge for operating givenapplications, he or she can start earning high income within a shorttime (Solove et al., 2006). The staff members are also forced tostrive for excellence because technology constantly changes. Peoplewith vast knowledge on technology rise through the ranks at a fasterrate than their colleagues who are not updated on technology trends.On the same note, technology trends contribute to career growthbecause employees acquire bigger control of organizations as theirknowledge on managing information and communication tools in anorganization increases (Bloom et al., 2009).
Ifthe present technology trend prevails, knowledge management systemswill be popular business structures In the future. Severalorganizations are embracing the online businesses that are oftenhosted by virtual professionals. The hosts of websites performvarious functions such as uploading new information in an employee’sprofile. The potential increase in online businesses will alsoenhance the development of information management system. Effectiveinformation systems facilitate professional knowledge categorizationand distribution. The centralized business systems will also bepopular in the future (Bresnahan et al., 2002). New informationtechnology trends such as virtualization allows a single operator tomanage several servers from a single machine. Several companies areconsolidating information management in one central server. Theserver manager acquires information from the department and thendistributes it to relevant destinations through the internet. Lastly,transaction-processing systems will be common as online transactionsare becoming widespread. Modern businesses, including banks, areusing electronic inventory control system, payroll system, andbilling systems. The electronic systems enhance accuracy,convenience, and speed of processing cash transactions (Bloom et al.,2009).
Advancedinformation technology enhances has significantly reduced bothpersonal and professional privacy in business. For example, the useof credit and debit cards requires collecting personal information ofthe customers. Although the companies collecting the information areobliged to maintain the privacy of the information, scam traderscollect banking details of online buyers fraudulently. The tradersthen use the information to steal money from unsuspecting clients(Bloom et al., 2009). In addition, hackers can use viruses, spyware,and malware to attack computers connected to the internet. Theattackers can access crucial personal and professional informationsuch as proprietary business skills and banking details (Bresnahan etal., 2002). As cybercrimes keep increasing, modern gadgets usingtrendy information and technology such as cell phones, computers,online payments, and social media websites risks exposing private andpersonal information to unintended persons. Recently, the UnitedStates government came under serious criticism for allegedly tappingand listening to civilians’ phone calls without their consent,thereby compromising the citizens’ professional and personalprivacy. Although clients can communicate with ISP providers torestrict the information they reveal to clients, as well as usingPlatform for Internet Content Selection compliant browsers thatrestrict the amount of information released to the third parties,malicious persons still use malicious techniques to acquire privateand personal information illegally (Solove et al., 2006).
Contemporaryinformation technology such as the web, internet, smartphones, cloudcomputing, and personal computers collects large quantities ofclients’ information. According to Larry Lessig, a reputed legaltheorist, modern technology develops at a very high rate such that itdoes not allow a gradual and contemplated law and political processto create efficient regulations for managing the use of theinnovations. For example, the copyrights of a sharing technology or aspyware can be abused before inhibitive laws are created to protectinternet users’ private information from being shared onlinewithout their consent (Solove et al., 2006). By the time policymakersdiscover that a certain application is violating personal andbusiness ethics, the regulation laws developed will most likely belate as the application will be outdated. Similarly, the inventorswill be striving to develop new technologies that the enactedregulation will not control efficiently. For instance, the phonetracking and spying software used to collect personal information ofpeople often breach personal ethics. Spouses, law enforcers and otherinvestigators often abuse information and communication technologiesusing spying technologies (Sullis, 2012).
Bloom,N., Garicano, L., Sadun, R., Reenen, J.V. (2009), The distincteffects of Information Technology and Communication Technology onfirm organization. TheNational Bureau of Economic Research,(DOI): 10.3386/w14975
Solove,D. J., Rotenberg, M., & Schwartz, P. M. (2006). Privacy,information, and technology.New York: Aspen Publishers.
Bresnahan,T.F., Brynjolfsson, E., & Hitt, L.M., (2002), InformationTechnology, Workplace Organization, and the Demand for Skilled Labor:Firm-Level Evidence. TheQuarterly Journal of Economics.117(1): 339-376. doi: 10.1162/003355302753399526
Sullis,J. (2012). InformationTechnology and Moral Values.Stanford Encyclopedia of Philosophy.