Machines and Technological Unemployment

Author(s):  
Elias Moser

Recently, economic studies on labor market developments have indicated that there is a potential threat of technological mass unemployment. Both smart robotics and information technology may perform a broad range of tasks that today are fulfilled by human labor. This development could lead to vast inequalities. Proponents of an unconditional basic income have, therefore, employed this scenario to argue for their cause. In this chapter, the author argues that, although a basic income might be a valid answer to the challenge of technological unemployment, it fails to account for some ethical problems specific to future expectations of mass unemployment. The author introduces the proposal of an unconditional basic capital and shows how it can address these problems adequately and avoid objections against a basic income. However, the basic capital proposal cannot replace all redistributive social policies. It has to be interpreted as a supplement to either a basic income or more traditional redistributive policies.

Author(s):  
Aaron James

What Keynes called “technological unemployment” is not yet upon us. Many agree that, if or when it is upon us, society will be forced to pay a basic income. This chapter argues that we shouldn’t wait. The chance of mass unemployment is credible. The outcome would be terrible. And a “precautionary basic income” is relatively cheap. So, much like buying a fire extinguisher for one’s home, we should take precautionary action before the risk of technological mass unemployment becomes likely. This is consistent with a cost-benefit analysis, when the benefits of business-as-usual are appropriately discounted. Precautionary action may well cost us nothing in the longer run. But even if it will cost something in forgone growth, the rich world shouldn’t worry, for three reasons: (1) The more we gain in GDP, the less and less it does for our happiness; (2) work for GDP is expensive in time lost; and (3) further GDP gains have less value than comparable security benefits to the less well-off.


2020 ◽  
Vol 39 (6) ◽  
pp. 8091-8102
Author(s):  
Rasbihari Dayal ◽  
V. Vijayakumar ◽  
Rahul Chandra Kushwaha ◽  
Abhishek Kumar ◽  
V. D. Ambeth Kumar ◽  
...  

This research paper presents a cognitive model which manages to minimize the issues of the Information Technology Infrastructure by incorporation of service management practices. The importance of this research is that this model can be replicated in other companies for the distribution of products that wish to implement improvements in their management process technological services. This work introduces the use of Information Technology Infrastructure Library or ITIL as best practice, essential methodologies for IT Management, historical evolution, methodology, service life cycle, and ITIL certifications. Service automation is widely regarded as the usefulness and improves service guarantee. One of the most useful features of automation services is that the process will run the same way every time. Such precision in the execution of repetitive executions is virtually impossible when it comes to human labor. Therefore, the automation is the best way to improve the efficiency of the service provider and the next steps of the process.


Author(s):  
Darryl Macer

Computers are a vehicle for the information age, and are central to the dispersal of descriptive accounts of technology, and to interactive discussion between growing communities. Despite the commitment of all countries to free flow of information and access to knowledge sources based upon social justice there are still ethical problems of the digital divide. The attitudes of respondents towards science and computers in both Japan and Thailand is compared between 1993 and a decades later. There is more positive support towards science and technology in general in Thailand than in Japan, but both countries continue to be positive in attitude. There is a clear social mandate in both countries for their government policies promoting the development of information technology and science and technology in general. The perception of benefits and the worries about computers are discussed, as are some emerging issues.


2021 ◽  
Vol 24 (6) ◽  
pp. 96-103
Author(s):  
Yuri Kvashnin ◽  

The article explores the current debate on basic income in the UK. The growing interest in this concept, which implies the introduction of unconditional and equal for all regular cash payments, is caused by problems common to Western European countries, i.e. an increase in income inequality, the risk of technological unemployment, as well as the need to take urgent measures to support the population at times of pandemic. In the British context, however, ideological and political factors play a significant role, such as a rich intellectual tradition of developing universal approaches to social security and the desire of a number of parties, both national and regional, to use this increasingly popular concept for their own political purposes. It is concluded that in the medium term, the UK's transition to basic income is unlikely, but the very discussion on its introduction can serve as a catalyst for serious social transformations.


Author(s):  
I Gusti Ngurah Made Putra Eryawan ◽  
Gusti Made Arya Sasmita ◽  
Anak Agung Ketut Agung Cahyawan Wiranatha

Information security is a vital aspect that must be considered in use of information technology devices by active users. PT. X runs a business that applies information technology related to distribution aspects through company resource planning. Information technology formed assets IT infrastructure, information systems, operating procedures, and network infrastructure. This asset has a potential threat that causes disruption resulting losses. This problem arises to cope through the response to the risk strategy. NIST SP 800-30 method has a flexible risk perspective for the organization and federation standards of American security. Research is divided into risk measurement as a risk, risk mitigation as risk planning, and risk evaluation embodied risk reports. Results of the research show the value of risk through the calculation of the likelihood and impact matrix of the highest threat is at a low level is 14, medium at 12, and high of 4 are categorized good enough. Keywords: Risk Strategy, Information Security, NIST SP 800-30, Risk


Sign in / Sign up

Export Citation Format

Share Document