SlideShare une entreprise Scribd logo
1  sur  11
TECHNOLOGY AND
TROOP MORALE
Created by: Ruben Vargas
IFS101 – Spring 2013
WALK A MILE IN THEIR SHOES
Before cell-phones and internet…




                                   troops often felt isolated and lonely
COMMUNICATION OBSTACLES
Access to Phones was difficult   Not everyone had them   Calling could be expensive
SNAIL MAIL
Often times, mail took weeks to receive. One of the most
anticipated times of a service-member’s day is mail-call.


Even though technology has advanced to where email, instant-
messages and the internet make communication instantaneous;
troops still sometimes feel a handwritten letter is better than what
technology has to offer.


It’s just more personal!
MILITARY SOCIAL
CULTURE FILLS THE
VOID WHEN
TECHNOLOGY IS
ABSENT
Military families helped buffer loneliness
when expensive phone calls were not
affordable, and mail delivery was slow


Military families create dynamic social
cultures for building morale and
bonding
HOW HAS TECHNOLOGY
                        IMPACTED TROOP MORALE?
Troops are always       Video Chat allows        Internet and Social
able to check-in        face-to-face time        Media replace mail
Cell-Phone Capability   Webcam Chat Capability   Email Capability
TECHNOLOGY IMPROVES
                                        MORALE, BUT CAN HAVE
                                CONSEQUENCES AT THE SAME TIME




Troop Safety                         Viruses Might Be
Jeopardized                          Downloaded                       Matters of Privacy
Troops may inadvertently give away   Computer viruses might infect    Personal posts may be monitored;
location to enemies due to GPS       government computers and cause   privacy is not to be expected; activity
signaling on their cell-phone        failures or security threats     and personal posts could result in
                                                                      legal repercussions
Works Cited

Coins. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/cKPU3c>.

Computer Code. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/koJpfs>.

Gavel. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/DM9y0o>.

Girl Holding U.S. Flag. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/bKc4d7>.

Handwritten Letter. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/CuPY64>.
Home with U.S. Flag. Digital image. Morgue FIle. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/dqC6Xs>.

IPhone. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/32xRXv>.

Laptop. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/hYrJN1>.

Map. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/SO82NA>.


Ode to Kurt. Desmond Peck, n.d. Www.madeloud.com. Web. 13 Apr. 2013.

    <http://www.madeloud.com/artists/desmond-peck/music/tracks/ode-kurt>.
Payphone. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/lEmRT2>.

Rotary Phone. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/9tfL3q>.

Soldier Sitting with Rifle B/W. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/ldWF6N>.

Soldier Wearing Helmet B/W. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/ZaHeys>.
Webcam. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/pVVcAG>.

Welcome Home Sign. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013.

    <http://mrg.bz/rCiu3n>.

Contenu connexe

Tendances

Programma o sarai programmato
Programma o sarai programmatoProgramma o sarai programmato
Programma o sarai programmatoStefano Penge
 
SMBCE: all about mobile
SMBCE: all about mobileSMBCE: all about mobile
SMBCE: all about mobileLisa Colton
 
Augmented reality- Why super powers lead to minor injuries and major memory l...
Augmented reality- Why super powers lead to minor injuries and major memory l...Augmented reality- Why super powers lead to minor injuries and major memory l...
Augmented reality- Why super powers lead to minor injuries and major memory l...onvert
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?franzjho
 
What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)MrYoung
 
Challenge communication - Loui, Kieran, Donavan, Conor
Challenge communication - Loui, Kieran, Donavan, ConorChallenge communication - Loui, Kieran, Donavan, Conor
Challenge communication - Loui, Kieran, Donavan, Conorsgibbons1hp
 
URJ Social Media Boot Camp: Mobile Strategies
URJ Social Media Boot Camp: Mobile StrategiesURJ Social Media Boot Camp: Mobile Strategies
URJ Social Media Boot Camp: Mobile StrategiesLisa Colton
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
 
Challenge Communication - Molly and Leah
Challenge Communication - Molly and LeahChallenge Communication - Molly and Leah
Challenge Communication - Molly and Leahsgibbons1hp
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
BSmith Presentation Samples 0713
BSmith Presentation Samples 0713BSmith Presentation Samples 0713
BSmith Presentation Samples 0713Brian Smith
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 

Tendances (20)

Programma o sarai programmato
Programma o sarai programmatoProgramma o sarai programmato
Programma o sarai programmato
 
BYOD eBook Part 1 DREW
BYOD eBook Part 1 DREWBYOD eBook Part 1 DREW
BYOD eBook Part 1 DREW
 
SMBCE: all about mobile
SMBCE: all about mobileSMBCE: all about mobile
SMBCE: all about mobile
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Augmented reality- Why super powers lead to minor injuries and major memory l...
Augmented reality- Why super powers lead to minor injuries and major memory l...Augmented reality- Why super powers lead to minor injuries and major memory l...
Augmented reality- Why super powers lead to minor injuries and major memory l...
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)
 
Challenge communication - Loui, Kieran, Donavan, Conor
Challenge communication - Loui, Kieran, Donavan, ConorChallenge communication - Loui, Kieran, Donavan, Conor
Challenge communication - Loui, Kieran, Donavan, Conor
 
Crime & technology
Crime & technologyCrime & technology
Crime & technology
 
Fosi parent-tips
Fosi parent-tipsFosi parent-tips
Fosi parent-tips
 
Virtual Reading
Virtual ReadingVirtual Reading
Virtual Reading
 
Smartphone safety
Smartphone safetySmartphone safety
Smartphone safety
 
Mobile Applications
Mobile ApplicationsMobile Applications
Mobile Applications
 
URJ Social Media Boot Camp: Mobile Strategies
URJ Social Media Boot Camp: Mobile StrategiesURJ Social Media Boot Camp: Mobile Strategies
URJ Social Media Boot Camp: Mobile Strategies
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
 
Challenge Communication - Molly and Leah
Challenge Communication - Molly and LeahChallenge Communication - Molly and Leah
Challenge Communication - Molly and Leah
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
BSmith Presentation Samples 0713
BSmith Presentation Samples 0713BSmith Presentation Samples 0713
BSmith Presentation Samples 0713
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 

En vedette (8)

Best of Web 2.0
Best  of Web 2.0 Best  of Web 2.0
Best of Web 2.0
 
Michelle's Portfolio
Michelle's PortfolioMichelle's Portfolio
Michelle's Portfolio
 
gia may phat dien cummins 60kva
gia may phat dien cummins 60kvagia may phat dien cummins 60kva
gia may phat dien cummins 60kva
 
CU Online Webinar - Integrating media into your course
CU Online Webinar  - Integrating media into your courseCU Online Webinar  - Integrating media into your course
CU Online Webinar - Integrating media into your course
 
Web 2.0 tools
Web 2.0 toolsWeb 2.0 tools
Web 2.0 tools
 
Sean orlins (1)
Sean orlins (1)Sean orlins (1)
Sean orlins (1)
 
Indoor Allergies
Indoor AllergiesIndoor Allergies
Indoor Allergies
 
Asthma Triggers
Asthma TriggersAsthma Triggers
Asthma Triggers
 

Similaire à Technology and troop morale slide

17 Disadvantages of Digital Technology.pptx
17 Disadvantages of Digital Technology.pptx17 Disadvantages of Digital Technology.pptx
17 Disadvantages of Digital Technology.pptxssuser8b11c0
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
K.Jacobs COMM 303 Final Project
K.Jacobs COMM 303 Final ProjectK.Jacobs COMM 303 Final Project
K.Jacobs COMM 303 Final ProjectProfessorK2010
 
Technology and Human Communication, Social Interaction
Technology and Human Communication, Social InteractionTechnology and Human Communication, Social Interaction
Technology and Human Communication, Social Interactionhsudduth
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
51803561 disadvantages-of-information-technology
51803561 disadvantages-of-information-technology51803561 disadvantages-of-information-technology
51803561 disadvantages-of-information-technologyMuntaquir Hasnain
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDavid Rogers
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Artist l1mobilecomputing
Artist l1mobilecomputingArtist l1mobilecomputing
Artist l1mobilecomputingMeg Riegel
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital Worldalxdvs
 
Business Travel Executive, Rough Edges
Business Travel Executive, Rough EdgesBusiness Travel Executive, Rough Edges
Business Travel Executive, Rough Edgespfarina
 
Cellphones david juan
Cellphones david juanCellphones david juan
Cellphones david juanDavid Juan
 
Nss repko
Nss repkoNss repko
Nss repkorrepko
 

Similaire à Technology and troop morale slide (20)

17 Disadvantages of Digital Technology.pptx
17 Disadvantages of Digital Technology.pptx17 Disadvantages of Digital Technology.pptx
17 Disadvantages of Digital Technology.pptx
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
K.Jacobs COMM 303 Final Project
K.Jacobs COMM 303 Final ProjectK.Jacobs COMM 303 Final Project
K.Jacobs COMM 303 Final Project
 
Technology and Human Communication, Social Interaction
Technology and Human Communication, Social InteractionTechnology and Human Communication, Social Interaction
Technology and Human Communication, Social Interaction
 
Digital vs analogue
Digital vs analogueDigital vs analogue
Digital vs analogue
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
51803561 disadvantages-of-information-technology
51803561 disadvantages-of-information-technology51803561 disadvantages-of-information-technology
51803561 disadvantages-of-information-technology
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Artist l1mobilecomputing
Artist l1mobilecomputingArtist l1mobilecomputing
Artist l1mobilecomputing
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
 
Cscs (4)
Cscs (4)Cscs (4)
Cscs (4)
 
Cscs (4)
Cscs (4)Cscs (4)
Cscs (4)
 
Mrisks
MrisksMrisks
Mrisks
 
Business Travel Executive, Rough Edges
Business Travel Executive, Rough EdgesBusiness Travel Executive, Rough Edges
Business Travel Executive, Rough Edges
 
Cellphones david juan
Cellphones david juanCellphones david juan
Cellphones david juan
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Nss repko
Nss repkoNss repko
Nss repko
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Technology and troop morale slide

  • 1. TECHNOLOGY AND TROOP MORALE Created by: Ruben Vargas IFS101 – Spring 2013
  • 2. WALK A MILE IN THEIR SHOES Before cell-phones and internet… troops often felt isolated and lonely
  • 3. COMMUNICATION OBSTACLES Access to Phones was difficult Not everyone had them Calling could be expensive
  • 4. SNAIL MAIL Often times, mail took weeks to receive. One of the most anticipated times of a service-member’s day is mail-call. Even though technology has advanced to where email, instant- messages and the internet make communication instantaneous; troops still sometimes feel a handwritten letter is better than what technology has to offer. It’s just more personal!
  • 5. MILITARY SOCIAL CULTURE FILLS THE VOID WHEN TECHNOLOGY IS ABSENT Military families helped buffer loneliness when expensive phone calls were not affordable, and mail delivery was slow Military families create dynamic social cultures for building morale and bonding
  • 6. HOW HAS TECHNOLOGY IMPACTED TROOP MORALE? Troops are always Video Chat allows Internet and Social able to check-in face-to-face time Media replace mail Cell-Phone Capability Webcam Chat Capability Email Capability
  • 7. TECHNOLOGY IMPROVES MORALE, BUT CAN HAVE CONSEQUENCES AT THE SAME TIME Troop Safety Viruses Might Be Jeopardized Downloaded Matters of Privacy Troops may inadvertently give away Computer viruses might infect Personal posts may be monitored; location to enemies due to GPS government computers and cause privacy is not to be expected; activity signaling on their cell-phone failures or security threats and personal posts could result in legal repercussions
  • 8. Works Cited Coins. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/cKPU3c>. Computer Code. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/koJpfs>. Gavel. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/DM9y0o>. Girl Holding U.S. Flag. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/bKc4d7>. Handwritten Letter. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/CuPY64>.
  • 9. Home with U.S. Flag. Digital image. Morgue FIle. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/dqC6Xs>. IPhone. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/32xRXv>. Laptop. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/hYrJN1>. Map. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/SO82NA>. Ode to Kurt. Desmond Peck, n.d. Www.madeloud.com. Web. 13 Apr. 2013. <http://www.madeloud.com/artists/desmond-peck/music/tracks/ode-kurt>.
  • 10. Payphone. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/lEmRT2>. Rotary Phone. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/9tfL3q>. Soldier Sitting with Rifle B/W. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/ldWF6N>. Soldier Wearing Helmet B/W. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/ZaHeys>.
  • 11. Webcam. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/pVVcAG>. Welcome Home Sign. Digital image. Morgue File. N.p., n.d. Web. 12 Apr. 2013. <http://mrg.bz/rCiu3n>.