Society Dilemma of Computer Technology Management in Today’s World

© 2022 by IJCTT Journal
Volume-70 Issue-1
Year of Publication : 2022
Authors : Iwasan D. Kejawa, Ed. D
DOI :  10.14445/22312803/IJCTT-V70I1P105

How to Cite?

Iwasan D. Kejawa, Ed. D, "Society Dilemma of Computer Technology Management in Today’s World," International Journal of Computer Trends and Technology, vol. 70, no. 1, pp. 25-27, 2022. Crossref,

Is it true that some of the inhabitants of the world’s today are still hesitant in using computers? Research has shown that today many people are still against the use of computers. Computer technology management can be said to be obliterated by security problems. Research shows that some people in society feel reluctant or afraid to use computers because of errors and exposure of their privacy and their sophistication, which sometimes are caused by computer hackers and malfunction of the computers. The dilemma of not utilizing computer technology at all or, to its utmost, by certain people in the universe has absolutely posed a problem to the innovation of computers. This problem results in finding each time ways to simplify computers development and production and what they are meant to be used for. Every year new computers are being developed which makes the previous ones obsolete. They are developed to entice those who have not been utilizing them and to encourage those already using them by simplifying the features of the computers and improving their software and services. The doubt instilled in the mind of those not utilizing computer technology and those not using them to its utmost result in a flood of computers. Research shows that the computer technology market and its use are at their peak because developers and manufacturers think that the more improvements are made, the more there would be new users or customers. Therefore, they are developing and producing more computers. And this may create a flood.

Computers, Technology, Engineering, Education, Aviation, Management, Business, Politics, University, Schools, College, Medicine, Estate, Sports, Science, Ecomimics, Administration, Research, Security, Hacking.


[1] Apache Hadoop Overview, [Online]. Available:
[2] Bhattacherjee, Anol, Understanding Information Systems Continuance: An Exploration-Confirmation Model. MIS Quarterly. 25(3) (2001) 350-370. .
[3] Dwi Wulandari Sari, Kurnia Gusti Ayu. The Implementation of Soft System Methodology (SSM) in Designing KJP-Shop Application. International Journal of Computer Trends and Technology, 69(3) 14-20.
[4] Gaff, R. S. Computer Education Project revisited: Institutionalizing the vision. Educational Considerations, 2 (2002) 15-23.
[5] Gains M., and Leonard, J. Educating the mind. Journal of Technology Education, 2 (2001) 45-50.
[6] Hariteja Bodepudi. Data Transfer Between RDBMS and HDFS By Using the Spark Framework in Sqoop for Better Performance. International Journal of Computer Trends and Technology, 69(3) 10-13.
[7] Howes, R. J. Computer methodology. Journal of Information Science Education, 11(2000) 17-19.
[8] Isaac S., and Michael, W. B. Handbook in research and evaluation. San Diego, CA : Jossey-Bass(2009).
[9] Jonathan, W. B. Computability and Unsolvability. San Diego, CA : Jossey-Bass(1998).
[10] Kejawa, D. I. Achieving Success in Tumultuous Education. Pittsburgh, PA: Red Lead Press (Dorrance Publishing)(2013).
[11] Kejawa, D. I. Raw and Pure Education. Frederick, MD: America Star Books, LLLP(2013).
[12] Kejawa, D. I. Computer In Society: the World of Science and Technology. Independent Publishing: Amazon Inc(2019).
[13] Knowles, M. Principle of Learners Education. San Francisco, CA: Jossey-Bass/Pfeifer(1980).
[14] Kejawa, Iwasan, Computer in Society: The World of Science and Technology,(2019) Independent publishing: .
[15] Lea, Mary and Sylvia, Jones, Digital Literacies in Higher Education: Exploring Textual and Langdon, G., Whiteside, S., and McKenna, M. 2002. Intervention resource guide. San Francisco, CA: Jossey-Bass/Pfeiffer.(2011).
[16] Mehlinger, Havard. Technology Takeover Attenuated. Education Digest 61(1996) 25-29
[17] Moses, A. G. The technologies for ages. Journal of Education Technology, 9(2012)45-47
[18] Nicodemus, R. Technology intelligence on the rampage. Computer World Magazine, 7 (2004) 23-24.
[19] Odvard, Dyril, Technology in Education. Getting the Upper Hand. Technology & Learning 15 (1995) 38-46.
[20] Peek, Kyle and Denise, Dorricot, Why Use Technology. Educational Leadership 51(7) (1994) 11-15.
[21] Priyanka Sharma, Rajni Ranjan Singh Makwana. Phishing Website Detection Using Ensemble Technique. International Journal of Computer Trends and Technology, 69(3) 26-29
[22] SqoopUserGuide v1.4.1, [Online]. Available:,process%20is%20performed%20in%20parallel..
[23] Sqoop Import Command, [Online]. Available:
[24] Sqoop Export Command, [Online]. Available:
[25] P. S. V. Naresh Kumar, Modern Big Data Processing With Hadoop, Packt Publishing, (2018).
[26] Rose, R. Toward a critical multicultural pedagogy for learners’ Computer Education Qarterly, 48(2002)171 -184.
[27] Salem, A. M. Potential usage of technology in education. Journal of Computing In Higher Education, 5(9) (2000).
[28] Sher, A. B. Development and evaluation of computer Technology education. Journal of Science And Technology, 9 (2007) 21-22.
[29] Rafah Amer Jaafar , Wurood A. Jbara , Shaymaa Adnan Abdulrahman. A Review on Concept of Object Detection Techniques International Journal of Computer Trends and Technology, 67(8) 87-89.
[30] Rakshit Khajuria , Himani khajuria.Leaf Disease Detection Using Artificial Neural NetworkInternational Journal of Computer Trends and Technology, 67(8) 43-50.
[31] Winston, L. Artificial Intelligence, New York, NY: Harper-Collins Press(2009)