Ironically, I created this AI-produced digital painting in the style of Dali,
depicting the global meltdown of technology and the blue screen of death (BSOD).
Growing Up As Technology Developed
Growing up in the 1960s and 1970s I experienced a variety of technologies that laid the foundation for modern innovations. In the 1960s, we used rotary dial telephones for communication, typewriters for writing, and vinyl records played on turntables for listening to music. Television, often in black and white, became a central source of entertainment and news, with families gathering around to watch popular shows. I remember having my hand-held transistor radio under my pillow so I could listen to music at night. As we moved into the 1970s, the technology landscape began to evolve with the introduction of color television and the proliferation of personal audio devices like the cassette tape player, an eight-track tape deck, I was even able to buy a Texas Instruments LCD calculator.
We also saw the early stages of video gaming with consoles like the Atari 2600, and the advent of personal computing with rudimentary systems. In transportation, cars became more advanced with the introduction of features such as FM radio and eight-track players. My technological experiences were characterized by significant advancements that bridged the gap between analog and the dawn of the digital age. But in those days, if my “technology” didn’t work, there was usually a manual method for achieving the goal.
A World Full of Technology
Fast-forward fifty years and here we are surrounded by technology at almost every turn. In the rapidly evolving landscape of the 21st century, technology has become an integral part of our daily lives, revolutionizing industries, enhancing communication, and improving efficiency across various sectors. From smart devices that streamline our personal routines to advanced systems that drive innovation in healthcare, education, and business, the ubiquity of technology is undeniable. However, as our dependence on technological solutions grows, it is imperative to critically examine the potential dangers of a total reliance on technology. I'm not that worried about it for me, because I grew up knowing how to do things without technology. But I am concerned for my grandkids who have only grown up with technology. We need to think about what kind of situation we're leaving them and their peers in and what tools we can give then to navigate the future.
A Wakeup Call!
But the CrowdStrike outage was a huge wakeup call. A “routine” update caused worldwide “breakdown” of technology for airlines, hospitals, banks, 911, government organizations, the Social Security Administration, the Justice Department, railroads, the U.S. Emergency Alerts System, and many others.
Why Do We Care
As leaders, we need to pay close attention to this, and make a critical choice before we let technology have total control over people. Some of the problems that can be caused by over reliance on technology are scary! Heavy dependence on technology significantly increases the risk of privacy breaches and cyber-attacks due to several factors. When individuals and organizations store personal and sensitive information on digital platforms, they create potential targets for cyber criminals.
Increased Risk of Privacy Breaches and Cyber Attacks
Exposure to Cyber Threats: The more technology is integrated into everyday life, the greater the exposure to potential cyber threats. Cyber attackers use sophisticated methods to exploit vulnerabilities in software and hardware, making it easier to breach systems that are not adequately protected (Smith, 2019).
Phishing and Social Engineering: Cyber criminals often use phishing and social engineering techniques to trick individuals into revealing sensitive information. These tactics can be highly effective, especially when people are heavily reliant on technology and may not recognize the signs of such attacks (Hong, 2012).
Inadequate Security Measures: Many users and organizations do not implement robust security measures, such as strong passwords, two-factor authentication, and regular software updates. This lack of security makes digital platforms more susceptible to hacking attempts (Solove, 2011).
Vulnerability of Personal and Sensitive Information
Data Storage and Transmission: Personal and sensitive information stored on digital platforms can be intercepted during transmission or accessed through vulnerabilities in storage systems. This information includes financial details, health records, and personal identifiers, which are valuable to cyber criminals (Solove, 2004).
Identity Theft: When hackers gain access to personal information, they can use it to commit identity theft. This can lead to unauthorized transactions, opening of new accounts, and other fraudulent activities that can have severe financial and legal consequences for victims (Harrell, 2019).
Data Breaches: Large-scale data breaches, where vast amounts of personal information are stolen from companies or institutions, have become increasingly common. These breaches expose individuals to significant risks, as their data can be sold on the dark web and used for malicious purposes (Ponemon Institute, 2020).
In an interconnected world, the reliance on digital infrastructures makes individuals, organizations, and nations more susceptible to malicious activities, which can have far-reaching consequences for privacy, security, and economic stability. But the danger doesn’t just end there. Relying entirely on technology can pose several additional risks that impact individual, team and organizational behavior. Some that come to mind quickly are loss of independent critical thinking, problem solving, decreased privacy, social isolation, health issues, and even another form of division in this country, digital division. Let’s take a quick look at these.
Loss of Critical Thinking and Problem-Solving Skills: When individuals rely heavily on technology for answers, they may become less proficient in critical thinking and problem-solving. As we increasingly rely on algorithms and automated systems to make decisions, there is a risk of diminishing our capacity to analyze complex situations and think independently. Studies suggest that over-reliance on technology can diminish cognitive skills and the ability to think independently (Carr, 2010).
Decreased Privacy and Security: Heavy dependence on technology increases the risk of privacy breaches and cyber attacks. Personal and sensitive information stored on digital platforms can be vulnerable to hacking, leading to identity theft and other security issues (Solove, 2004).
Social Isolation: Excessive use of technology, particularly social media, can lead to social isolation. The pervasive use of social media, digital communication tools, and virtual environments has reshaped how we connect with others, often leading to issues such as social isolation, addiction, and decreased face-to-face interactions. These changes can have profound effects on our emotional well-being and societal cohesion. While technology can connect people virtually, it may also reduce face-to-face interactions and weaken real-world social skills (Turkle, 2011).
Health Issues: Prolonged use of technology can lead to various health problems such as eyestrain, poor posture, and sleep disturbances. The overuse of digital devices is linked to negative impacts on physical health, including musculoskeletal problems and disrupted sleep patterns (Rosen, 2012).
Digital Divide and Inequality: Dependence on technology can exacerbate social inequalities. Not everyone has equal access to technology, and those without it may be left behind in education, employment, and other opportunities (Van Dijk, 2006).
The Digital Alarm Has Sounded!
The digital alarm has sounded, as leaders we need to “look down the road” as far as we can see and consider the potential for systemic failures due to technological dependence. As critical systems in healthcare, transportation, finance, and other sectors become increasingly automated, the risk of cascading failures in the event of technological malfunctions or disruptions grows. This underscores the need for robust contingency planning and the development of resilient systems that can withstand unforeseen challenges and have some plans in place.
What Do We Do Now?
By proactively preparing for technology failures and considering the implementation of some of these strategies, organizations can minimize disruptions and maintain essential operations in the face of unexpected challenges. To ensure continued operations in the event of a technology failure, it's essential to have robust contingency plans and alternative methods in place. Planning for manual processes, paper records, tickets, receipts, and “paper money,” redundant systems, a communication plan, and several other contingency plans should be developed, or minimally considered now that we’ve seen a global blue screen of death!
Manual Processes: Maintain and regularly update manual procedures for critical tasks. Train staff to perform essential functions without relying on technology, such as processing transactions, record-keeping, and communication.
Paper Records: Keep physical copies of important documents, such as contact lists, financial records, and operational guidelines. Ensure these records are stored securely and are easily accessible in an emergency.
Redundant Systems: Implement redundant systems and backup solutions. This includes having offline backups of critical data and alternative power sources like generators to maintain operations during power outages.
Communication Plans: Develop a comprehensive communication plan that includes non-digital methods. Equip teams with two-way radios, landline phones, or other reliable communication tools to stay connected when digital networks are down.
Cross-Training Employees: Cross-train employees in multiple roles to ensure that key functions can be covered if specific personnel or automated systems are unavailable. This flexibility can help maintain productivity and service levels.
Emergency Kits: Prepare emergency kits containing essential supplies, such as paper forms, writing instruments, calculators, and other tools necessary to perform critical tasks manually.
Local Resources: Establish relationships with local suppliers and service providers to ensure access to necessary materials and support during technology outages. Local resources can be crucial when broader supply chains are disrupted.
Regular Drills: Conduct regular drills and simulations to test manual processes and contingency plans. These exercises help identify potential weaknesses and ensure that employees are familiar with emergency procedures.
Alternative Payment Methods: Ensure that alternative payment methods are available, such as cash, checks, or mobile payment solutions that do not rely on network connectivity.
Customer Communication: Develop a strategy to communicate with customers during a technology failure. This can include pre-written messages, social media updates, and signage to keep customers informed and manage expectations.
Developing comprehensive contingency plans is essential for preparing for a potential total technology meltdown. These plans should include maintaining manual processes, ensuring access to paper records, implementing redundant systems, and regularly training employees on emergency procedures (Brown, 2021; Davis, 2018).
We Need To Create a Culture of Resilience to Help Us Cope
Additionally, creating a culture of resilience is invaluable in preparing for the eventuality of complete technology failure, as it equips organizations and individuals with the adaptive capacity to respond effectively to disruptions. Resilience involves fostering flexibility, resourcefulness, and proactive planning, enabling a swift return to normal operations and minimizing the impact of unforeseen technological breakdowns (Brown, 2021). It also cultivates an environment where continuous learning and improvement are prioritized, ensuring that teams are well-prepared to handle crises and innovate solutions under pressure (Davis, 2018). By embedding resilience into the organizational culture, entities can safeguard against potential losses, maintain productivity, and sustain essential functions, thereby securing long-term stability and success (Smith, 2020).
Conclusion
We’ve been warned! Leaders need to pay attention and start planning. The dangers of over-reliance on technology are multifaceted, encompassing the erosion of critical thinking skills, increased vulnerability to cyber threats, adverse effects on mental health and social interactions, and the potential for systemic failures (Smith, 2020; Johnson & Miller, 2019). As technology becomes ever more integrated into the fabric of our daily lives, it is crucial to recognize these risks and take proactive measures to mitigate them. Acknowledging the limitations and potential failures of technology enables individuals and organizations to maintain a balanced approach that leverages the benefits of technological advancements while safeguarding against their inherent risks. By establishing robust strategies and fostering a culture of resilience, we can reduce the impact of technological disruptions and ensure continuity of operations. Ultimately, a thoughtful approach to integrating technology, coupled with well-prepared contingency plans, will help us navigate the complexities of the digital age and secure a sustainable future.
About the Author: Dr. Chris Fuzie is the owner of CMF Leadership Consulting and is currently the Business/HR Manager for a District Attorney’s office in California. Chris is a Leaderologist II and Vice President of the National Leaderology Association (NLA) who holds a Doctor of Education (Ed. D), M.A. and B.A. in Organizational Leadership, and has graduate certificates in Human Resources and Criminal Justice Education. Chris is a developer, trainer, consultant for leadership of public, private, profit, and non-profit organizations since 2010. Chris is a graduate of the FBI National Academy and a former National Instructor for the International Association of Chiefs of Police and California P.O.S.T. Courses. Chris is the author of "Liminal Space: Reshaping Leadership and Followership," "Because Why... Understanding Behavior in Exigencies." and of "S.C.O.R.E. Performance Counseling: Save the Relationship, Change the Behavior." Chris is honorably retired from the Modesto Police Department after 28 years of public service leading such teams as the Homicide Team, the Hostage Negotiations Team, the Street-Level Drug Team and the School Police Officer Team.
References
Brown, A. (2021). Emergency preparedness: Strategies for technology failure. Journal of Contingency Planning, 12(3), 45-58.
Carr, N. (2010). The Shallows: What the Internet is Doing to Our Brains. W.W. Norton & Company.
Davis, R. (2018). Building resilience: Preparing for the inevitable technology outage.
Disaster Management Review, 15(2), 33-47.
Harrell, E. (2019). Identity Theft. Bureau of Justice Statistics. Retrieved from https://www.bjs.gov/content/pub/pdf/it18.pdf
Hong, J. (2012). The state of phishing attacks. Communications of the ACM, 55(1), 74-81. doi:10.1145/2063176.2063197
Johnson, L., & Miller, T. (2019). Digital dependence: The risks of over-reliance on technology. Technology and Society Journal, 21(4), 78-92.
Ponemon Institute. (2020). Cost of a Data Breach Report 2020. IBM Security. Retrieved from https://www.ibm.com/security/digital-assets/cost-data-breach-report/
Rosen, L. D. (2012). iDisorder: Understanding Our Obsession with Technology and Overcoming Its Hold on Us. Palgrave Macmillan.
Smith, P. (2020). The impact of technology on critical thinking and problem-solving skills. Educational Technology Quarterly, 29(1), 23-35.
Smith, S. (2019). Understanding Cyber Attacks: A Comprehensive Guide. Cybersecurity Journal, 23(3), 45-62. doi:10.1016/j.cyberj.2019.05.001
Solove, D. J. (2004). The Digital Person: Technology and Privacy in the Information Age. New York University Press.
Solove, D. J. (2011). Nothing to Hide: The False Tradeoff Between Privacy and Security. Yale University Press.
Turkle, S. (2011). Alone Together: Why We Expect More from Technology and Less from Each Other. Basic Books.
Van Dijk, J. (2006). The Network Society: Social Aspects of New Media (2nd ed.). SAGE Publications.
Comments