- ✓Rigorous technology research involves consulting primary sources such as academic papers, technical specifications and industry reports rather than relying exclusively on journalistic summaries or vendor marketing materials.
- ✓Understanding the current maturity level of an emerging technology requires distinguishing between what the technology is capable of in a research laboratory, what has been successfully deployed commercially and what is genuinely available at scale.
- ✓User impact research should consider the full range of people who will be affected by a technology, including those who will use it directly, those who will be indirectly affected and those who may be disadvantaged or excluded by it.
- ✓The adoption curve for emerging technologies is rarely smooth or predictable: understanding the factors that accelerate or impede adoption (technical maturity, regulatory environment, economic incentives, social acceptance) provides a more nuanced view than simple extrapolation from current trends.
- ✓Synthesising research findings into a coherent, evidence-based analysis that acknowledges uncertainty and competing perspectives is a skill that distinguishes credible technology analysts from those who simply repeat the most optimistic claims they encounter.
Listen to the full episode inside the course. Enrol to access all 80 episodes, plus assignments, tutor support and Student Finance funding.
Start learning →Alex: Hello and welcome back to The Study Podcast. Today we're looking at how to research an emerging technology rigorously and assess its impact on users. Sam, this is a skill that will serve learners throughout their careers.
Sam: It will. The ability to go from 'I've heard about this technology' to 'I understand it well enough to make a credible assessment of its potential and its limitations' is genuinely valuable, and it requires a systematic research process rather than just reading the first few search results.
Alex: What makes technology research rigorous? Where do you go for reliable information?
Sam: Starting with primary sources is the most important discipline. Primary sources include: the original research papers from academic journals and conferences where the technology was developed or evaluated; technical specifications and documentation from the developers or standards bodies; and data from actual deployments, whether in case studies, reports from pilot programmes or peer-reviewed evaluations. Secondary sources, including journalism, analyst reports and vendor marketing, can be useful for context and current awareness, but should be treated as starting points for further investigation rather than as reliable evidence in themselves.
Alex: How do you evaluate the credibility of a source?
Sam: Consider who produced it and what their incentives are. A vendor whitepaper arguing that their technology will transform your industry has obvious incentive to present an optimistic picture. A peer-reviewed academic paper has been through a process of expert scrutiny, though that doesn't make it infallible. A report from an independent research organisation like Gartner or Forrester has commercial incentives of its own but generally maintains its reputation by being reasonably accurate. Government and standards body publications tend to be reliable but can be slow to reflect rapidly developing technology.
Alex: Assessing user impact is a specific skill in this unit. How do you approach that?
Sam: User impact assessment requires thinking about who uses or is affected by a technology, across the full range of people involved, not just the primary intended users. For any technology, you should consider: who benefits directly, who bears the costs or risks, who might be excluded and why, how does the technology affect existing power relationships, and what happens to people who don't or can't adopt it? This kind of thinking tends to surface implications that purely technical analysis misses.
Alex: Can you give an example of that kind of analysis?
Sam: Take automated facial recognition. The primary use case might be security or convenience. But user impact analysis would also consider: how accurate is the system for different demographic groups? What happens to people who are misidentified? Who controls the data and for how long? Does the system create chilling effects on people's willingness to use public spaces? Are there groups for whom the system creates disproportionate risks, such as people with protected characteristics or undocumented individuals? These questions are all part of a thorough user impact assessment.
Alex: Really important analysis skills for responsible digital practice. Thanks, Sam.