Team Project Guidelines
Objective
This capstone course concludes with a research Team Project that starts during the first week and continues throughout the duration of the class. It culminates with the submission of a formal team report and an oral presentation by each team during Week 7, and Peer Reviews in Week 8.
Each team will identify and explore an emerging technology. This will be a technology that may already exist, but is drawing attention because of new applications, anticipated impacts or potential controversies. Examples could include:
My portion of this paper is Cultural Considerations: we have chosen (Robtic surgery as our topic)
Cultural Considerations: This is a really important section. Consider the elements that comprise the culture and subcultures. Compare the United States use of the technology with that of other nations around the world. What is about Americans that brings about innovation, or has America declined in terms of technical innovation, scientific research and development? Look at advertising for the technology, the use of celebrities or stars or heroes, the applications (e.g. sports and nanotechnology) and the values represented by the culture. What has priority and why? An example: IBM was spelled out in xenon atoms. Why were these letters chosen instead of something else?
What new words have been added to our vocabulary from this technology? “Horseless carriage” was used long before the term “automobile.” “Wireless” preceded Wi-Fi, and webcasting preceded podcasting. “Broadcast” was a term adapted from agriculture long before it was used for radio and television
The team will explore the technical, social, cultural, moral and ethical issues presented by the technology.
Guidelines
Teams
All teams will be assigned at the start of the first week. The first deliverable is due on the Sunday of Week 1, so students must get organized and into the project immediately. Each team will select a Team Leader, who will be
References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press In my section of the report, I will be researching security issues associated with collaborative online tools