Autism and Technology

People with autism spectrum disorder (ASD) tend to enjoy themselves and be engaged when interacting with computers, as these interactions occur in a safe and trustworthy environment. In this paper, we present a systematic literature review on the state of the research on the use of technology to teach people with ASD. We reviewed 94 studies that show how the use of technology in educational contexts helps people with ASD develop several skills, how these approaches consider aspects of user experience, usability and accessibility, and how game elements are used to enrich learning environments. This systematic literature review shows that the development and evaluation of systems and applications for users with ASD is very promising. The use of technological advancements such as virtual agents, artificial intelligence, virtual reality, and augmented reality undoubtedly provides a comfortable environment that promotes constant learning for people with ASD.

Currently, autism spectrum disorder (ASD) affects a significant number of people who have difficulties with communication and socialization, which results in complexities for their learning. Studies have examined the use of technology and computer-based interventions to teach people with ASD language and social skills

In a study carried out by the National Institute of Health (NIH) of the USA  published in June 2018, it was estimated that 2.41% of children in the United States of America have an autism spectrum disorder. This shows an increase of 0.94% compared to 2010.

Games that use technology are widely used to teach people conceptual knowledge and skills. There are different implementations of such games, such as serious games, gamification, and e-learning.

Serious games are games whose main objective is not fun or entertainment but the learning or practice of skills. In 1970, Clark Abt  defined this concept as follows in his book called “Serious Games”—“games that have an explicit and carefully thought-out educational purpose and are not intended to be played primarily for amusement. This does not mean that serious games are not, or should not be, entertaining”.


Cybersecurity is going to blow up

The grim events of early 2020 have prompted organizations to shift priorities across the board, and security processes are no exception. Cybersecurity is While the current working environment has presented numerous short-term challenges, it has also caused security leaders to take a fresh look at what really matters to their businesses. The cybersecurity trends that emerge could ultimately make organizations more resilient in the long term.

With digital infrastructure more critical than ever to the operations of many businesses, executives are more attentive than ever on securing them. A recent study found that 70 percent of enterprise chief information officers (CIOs) anticipate investing more in cybersecurity in the immediate future. This has implications across people, processes and technology.

Why Cybersecurity Professionals are in High Demand

Given that skilled cybersecurity professionals continue to be in desperately short supply while businesses plan to ramp up investments even more, we can expect that demand for skills will remain high.

Adobe reported that 40 percent of CIOs expect to increase headcount in their cybersecurity organizations compared to their original plans. More people will be required to staff help desks and to attend to security processes such as supporting devices outside the office. Attention will also turn to shoring up web servers, securing remote access ports and troubleshooting endpoint devices.

With travel limited for many security professionals,there are many jobs that need to be filled.

Cloud providers have seen a surge of new business as organizations have sought to quickly employ software-as-a-service (SaaS) applications to cope with rising e-commerce demands and the need to support employee collaboration and communication. More people will be required to ensure that those services are available and properly configured, and that access is controlled and monitored.

The shift of large numbers of people to remote work environments will likely drive a corresponding need for processes that support and secure endpoints, which IDC has estimated are the origination point of 70 percent of successful breaches. In particular, home-based workers will need to be educated on the risks of attacks like ransomware, which has surged in recent months. The risk of successful ransomware attacks has grown because of the higher likelihood of users clicking on phishing emails related to the current crisis and financial relief programs.