The paper 'Human-Machine Interaction' is a great example of a Business Assignment. The Human-Machine System (HMS) comprises of the human users, the interface between humans and the machines (Johansen 2007). Apparently, the efficiency, quality, and safety of any process necessitate the existence of all the three aspects of the HMS. There are distinct roles played by human users, the human-machine interface, and the machine in the process (Karray et al. 2008). Consequently, it is proper to state that there has always been and there should be a clear distinction between the roles of humans and machines.
It is also evident that the interactions and communications between human users and machines require the existence of interfaces. The main classes of human users include operators, managers, engineers, and maintenance personnel. On the other hand, a machine refers to a real-time dynamic system encompassing its decision support applications and software and its automation that relates to the different domain applications (Cannan & Hu 2011). Based on the above classifications of the roles played by all the components of the HMS, it is worth noting that the introduction of machines does not eliminate the roles played by humans in the system.
Therefore, there should be a line between the roles of the machine and those of humans amidst the increasing automation. Apparently, recent decades have witnessed increasing automation exhibited by the machines. Contrary to the fears held by many people that machine automation eliminates the line between the roles played by both humans and machines, it is evident that the main objective of automation is to enhance the efficiency, safety, and performance in critical areas that had performed poorly in the aspects.
Some of the areas that have benefited from machine automation include power generation plants, vehicle and transportation systems, and industrial production plants. Apparently, machine automation has played a pivotal role in reducing road and air accidents based on human error. Moreover, machines handle complex processes in hazardous environments in industrial processes. Rather than exposing humans to such extreme working conditions in factories, the latest industrial revolution has seen the introduction of automated machines to increase safety and enhance the efficiency of the operations. In the ‘ Alone Together” talk by Professor Sherry Turkle, it is evident that she heightens the position that technology holds in the current world; with particular reference to people.
She refers to the technology as being the architect of the intimacies of all people in the world. Consequently, people use technology as a communication platform that guarantees their intimacy regardless of their differences in geographical locations. In her talk, Sherry states that technology enables individuals to have a “ second life” where they can perform many activities on a virtual platform with their distant acquaintances (Turkle 2012).
The talk also reveals that technology has enabled people to have a better perception of themselves in the Second Life as compared to their first physical life. The idea of sociable robots has also struck individuals since they regard the robots to play a more significant social role than the role played by normal physical pets. According to Sherry’ s understanding, the merits associated with having sociable robots include their eternal existence and more loving and responsive nature. Moreover, the robots do not require any cleaning like normal pets.
Alejandro, J 2010, ‘Journalism in the age of social media’, Reuters Institute Fellowship Paper, University of Oxford.
Brian, S 2014, ‘The Unexamined Life in the Era of Big Data: Toward a UDAAP for Data’, Available at SSRN.
Briggs, M 2007, ‘Journalism 2.0: How to survive and thrive: A digital literacy guide for the information age’, J-Lab: University of Maryland, pp.30
Burnett, S & Feamster, N 2013, ‘Making sense of Internet censorship: A new frontier for Internet measurement’, ACM SIGCOMM Computer Communication Review, vol. 43, no. 3, pp. 84-89.
Cameron, D 2009, ‘Mobile journalism: A snapshot of current research and practice’, vol. 19, no. 4.
Cannan, J & Hu, H 2011, ‘Human-Machine Interaction (HMI): A Survey’.
Charny, B 2006, ‘Chinese Partner Censors Skype Text Messages’, PCmag.com.
Eyeroor, N & Kanjilal, U 2014, ‘Internet on Smartphones: Exploring the Potential and Challenges for News Media Professionals’.
Facebook principles 2007, ‘Facebook.com’, Available from: http://www.facebook.com/policy.php
Fowler-Watt, K & Allan, S 2013, ‘Journalism: New Challenges’, CJCR: Centre for Journalism & Communication Research, Bournemouth University.
Hajek, R, Stefanikova, S & Allan, S 2014, ‘Citizen Journalism is as old as journalism itself: An interview with Stuart Allan’, vol. 2, pp. 174-181.
Johannsen, G 2007, ‘Human machine interaction’, Encyclopedia of life support systems (EOLSS): control systems, robotics, and automation. EOLSS Publishers, Oxford.
Jones, H & Soltren, J H 2005, ‘Facebook: Threats to privacy’. Available from: http://www-swiss.ai.mit.edu/6805/student-papers/fall05-papers/facebook.pdf
Karray, F, Alemzadeh, M, Saleh, J A & Arab, M N 2008, ‘Human-computer interaction: Overview on state of the art’.
Kim, R 2008, ‘Apple stock dives on false report’, SFgate.
MacKinnon, R 2005, ‘Tunisian Online Protest Blocked’, Global Voices, Available from: http://globalvoicesonline.org/2005/10/04/tunisian-online-protest-blocked/.
Nguyen, A 2006, ‘Journalism in the wake of participatory publishing’.
Rosenberg, R S 2001, ‘Controlling access to the Internet: the role of filtering’, Ethics and Information Technology, vol. 3, no. 1, pp. 35-54.
Sambrook, R 2005, ‘Citizen Journalism and BBC’, Nieman Reports.
Singel, R 2007, ‘Facebook fixes search glitch, explains privacy strategy’, Threat Level Wired Blog Network. Available from: http://blog.wired.com/27bstroke6/2007/06/facebook-fixes-.html
Skoler, M 2009, ‘Why the news media became irrelevant--and how social media can help’, Nieman Reports, vol. 63, no. 3, pp. 38.
Turkle, S 2012, ‘Alone together: Why we expect more from technology and less from each other’, Basic books.
Villeneuve, N 2008, ‘Breaching Trust: An Analysis of Surveillance and Security Practices on China’s TOM-Skype Platform’, Information Warfare Monitor/ONI Asia. Available from: http://www.nartv.org/mirror/breachingtrust.pdf.
Wu, T 2006, ‘World Trade Law of Censorship and Internet Filtering’, The. Chi. J. Int'l L., vol. 7, pp. 263.
Zuckerman, E 2010, ‘5 Intermediary Censorship’.