Monday, April 11, 2011

The development and further research on Computers was associated with the perceived need of national security during the Cold War period. Discuss, with contemporary examples some of the risks and responsibilities involved with such justifications

Introduction
science of control and communications” articulated a new worldview of self-regulated systems sustained through the flow of information and corrective feedback loops.The Cold War was a period of military tension, mistrust and general paranoia in both the USA and the USSR. An arms race resulted in the stocking up of nuclear warheads and the threat of "mutually assured destruction" was guaranteed by both sides. As a result, the American Government funded Project Whirlwind in the MIT and created the SAGE perimeter defense system. According to Paul Edwards in his essay on 'Computers and Society', the value of the SAGE project was almost entirely imaginary and ideological. Though its military potential was minimal, it helped create a sense of active defense to assuage some of the helpless passivity of nuclear fear. Such justifications were also common during this period in collaborations between scientists at various educational institutions and the military. In a process of 'mutual orientation', engineers constructed visions of military uses of computers they wanted to build in order to justify grant applications

Responsibilities and Professional Ethics
If there is a risk associated with the usage of a particular technology, there is a corresponding responsiblity associated with its engineer or manufacturer.National security is a necessity and it was especially important during the Cold War period when espionage ran rampant. There was risk in using this technology as it violated the international rules which restricted any body to research hacking or intercepting cables. The NSA(National Security Agency of America) during the cold war time had probably the world’s largest reservoir of expertise in codes and communications security. In an effort to increase national security during the Cold War, had control of non-governmental research of advanced encryption techniques

Conclusion:
The process for computerized warfare developed in result of a perceived threat to security during the Cold War period. Several new technologies emerged such as digital computers, hydrogen bombs, and automated defense systems. With great power however, comes great responsibility and the creators of such technology have responsibilities to its users. A professional must have his or her own self enforced code of ethics which they will follow at all times. As a thumb rule, we may use some of the tests suggested in class - to not do anything that makes us uncomfortable or 'smells'

References:
[1] http://en.wikipedia.org/wiki/National security
[2] http://catless.ncl.ac.uk/risks
[3] Article by Paul Edwards titled 'Computers and Society
praveen
na09b019

No comments:

Post a Comment