Browse Definitions :

78 Questions to Ask About Any Technology

“78 Questions to Ask about Any Technology” is a list designed to inform users as to the advisability of developing or continuing to support a given technology, based on the person's answers to the questions. The list was first written about in Stephanie Mills’ book “Turning Away from Technology.” Mills adapted her list from 76 questions created by the philosopher and sociologist Jacques Ellul.

Mills' 78 questions list was created in acknowledgement that technologies are often developed without adequate thought as to the effect they will have on people and their environments. The purpose of asking 78 questions is to try and ensure that  thoughtful and ethical technology developments will lead to more positive effects.

The questions on Mills' list are organized into nine areas of concern:

Practical: For example, how much does it cost; how may it be dealt with at the end of its useful life?

Aesthetic: For example, is it ugly; how will it affect the user’s quality of life?

Ecological: For example, how might the technology impact the health of users and their natural environments?

Ethical: For example, what other technologies might it lead to; can we be responsible for its effects?

Social: For example, does it serve community; how does it or will it affect the social relationships of users?

Vocational: For example, what are its effects on human creativity; does it aid or replace humans?

Political: For example, does it require military defense; does it foster groupthink?

Moral: For example, what will the effects be on the least advantaged members of society?

Metaphysical: For example, what might it be said to represent in terms of the human inner self; does it express love or anger?

Watch Jacques Ellul’s commentary on the 78 Questions list, in his video series, The Betrayal by Technology:

This was last updated in September 2019

Continue Reading About 78 Questions to Ask About Any Technology

  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than...

  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.