The integration of real and digital worlds brought about by AR, as well as rebuilding our true vision, also promises to reshape the world in which we live. AR technology applications are appearing in almost every industry from the military to the medical real-time real-time information sharing. However, like any other technology, AR also brings fewer risks and risks to users. Overcoming these risks of AR should be given priority to organizations that plan to incorporate technology into their processes, either for employees or their customers.
Dangers Of AR-
1. Over-detailed information-
The advent of the internet followed by the launch of social media has led to a clear growth in production and information sharing. The proliferation of mobile technology has made it easier for people to access a wide range of information from a variety of sources, which will only be easier with the wearable AR technology such as smart AR mirrors. This overload of information can cause stress, decision-making and can lead to performance, defeating the AR’s goal of enabling rapid action using real-time data. Controlling the amount of data that can be obtained through various AR programs should be a major problem to be solved for organizations that want to use this technology.
2. Visual impairment-
While AR glasses are an important part of technology, they also tend to jeopardize human safety. AR glasses and lenses made of unsatisfactory construction and production processes can cause impairment in the wearer's vision and can lead to adverse effects depending on the application. Ensuring compliance with AR equipment at the highest standards of quality and safety will ensure the use of technology without putting users at risk of AR.
3. Disruption-
While AR is able to deliver important information to users either manually or manually, it can sometimes serve as a distraction. Newly installed technicians may find AR to be a distraction and a hindrance, rather than empowering it to be. Disorders caused by AR can be especially dangerous if they are used for activities such as driving or surgery. To prevent the risk of disruption caused by AR, organizations should properly train users to ensure a smooth transition from AR dysfunction to AR-enabled functionality.
4. Privacy-
AR devices work by first scanning the actual location, analyzing it, and then attaching additional viewing details above it, or 'adding' to the truth. Therefore, data collection is an important part of AR performance. AR devices collect data not only from device users but also from people viewed by devices. This may not be the best way to ensure personal privacy, which will definitely be affected when AR gains more public access. Establishing mechanisms to maintain human privacy despite widespread AR coverage will be a challenge for organizations.
The concept of today’s unpopular reality for taxpayers we see depends on the ability of the device to record and analyze the environment in real time. Because of this, there may be legal concerns about privacy. While the First Amendment to the United States Constitution allows for such recording in the name of public interest, the permanent recording of an AR service makes it difficult to do so without recording outside the public domain. Legal issues will be found in areas where a particular privacy right is expected or where copyrighted media is displayed.
As for personal privacy, there is easy access to information that a person should not easily have access to about another person. This is accomplished through face recognition technology. Assuming that AR automatically transmits personal information to a user, there could be anything seen on social media, in a criminal record, and in marriage.
The Code of Ethics on Human Augmentation, first introduced by Steve Mann in 2004 and revised by Ray Kurzweil and Marvin Minsky in 2013, was finally ratified at the Virtual Reality Toronto conference on June 25, 2017.
5. Security-
Like any other connected technology, AR is vulnerable to security threats and unauthorized access by hacker and malware attacks. This is an attack
0 Comments