Ch6 - Ethics
Ch6 - Ethics
The Internet boom has provided many benefits for society, allowing the
creation of new tools and new ways for people to interact.
However, these strengths can potentially have a darker side too, throwing
up questions around the ethical use of these fairly new technologies.
For example, outputs can be based on biased data, which could lead to
discriminatory outcomes.
General ethical principles
Avoid harm.
Respect the work required to produce new ideas, inventions, creative works,
and computing artifacts.
Respect privacy.
Honor confidentiality
Professional responsibilities.
Strive to achieve high quality in both the processes and products of professional work.
Give comprehensive and thorough evaluations of computer systems and their impacts, including
analysis of possible risks.
Foster public awareness and understanding of computing, related technologies, and their consequences.
Access computing and communication resources only when authorized or when compelled by the
public good.
Design and implement systems that are robustly and useably secure.
Professional leadership principles.
Ensure that the public good is the central concern during all professional
computing work.
Articulate, apply, and support policies and processes that reflect the
principles of the Code.
Digital privacy
Information privacy is the notion that individuals should have the freedom, or
right, to determine how their digital information, mainly that pertaining to
personally identifiable information, is collected and used.
Communication Privacy
▪ Communication privacy is the notion that individuals should have the freedom,
or right, to communicate information digitally with the expectation that their
communications are secure; meaning that messages and communications will
only be accessible to the sender's original intended recipient.
Individual Privacy
Individual privacy is the notion that individuals have a right to exist freely
on the internet
Data Minimization: collect the minimal amount of information necessary from individuals
and businesses consistent with the Department’s mission and legal requirements.
Transparency: Notice covering the purpose of the collection and use of identifiable
information will be provided in a clear manner.
Security: Adequate physical and IT security measures will be implemented to ensure that the
collection, use, and maintenance of identifiable information are properly safeguarded.
Accountability and trust
➢ When emerging technology creates far-reaching and rapid change, it can also
bring new risks.
➢ Emerging technologies can provide improved accuracy, better quality and cost
efficiencies for businesses in every sector.
=>What are the challenges of using technologies like AI, IoT, and
big data?
▪ With Technology moving at a fast pace it is always been a challenge for Security.
2. Real-time horizon scanning and data mining for threats and information sharing
6. Safety and security equipment (including bullet and bomb proof) made with lighter and
stronger materials
8. Situational awareness capabilities via GPS for disaster response and crisis response
scenarios
How a business teaches and develops its AI will be the major factor in its
usefulness. Humans could be the weak link here, as people are unlikely to
want to input masses of data into a system.
Challenges in using Robotics in manufacturing
With automation and robotics moving from production lines out into other areas
of work and business, the potential for humans losing jobs is great here too.
As robots learn to teach each other and themselves, there is the potential for
much greater productivity but this also raises ethical and cyber security
concerns.
Challenges in using the Internet of Things
As more and more connected devices (such as smart watches and fitness
trackers) join the Internet of Things (IoT) the amount of data being generated
is increasing.
Challenges in Big Data
Almost all the technologies mentioned above have some relation to Big Data.
The huge amount of data being generated on a daily basis has the potential to
provide businesses with better insight into their customers as well as their own
business operations.
Treats
Driverless car: while a compelling option for future fleer cars, companies could
crash and burn from claims related to bodily injury and property damage.
Wear ables: Google glass, Fit bit and other wear ables can expose companies to
the invasion of privacy claims that may not be covered by general liability or
personal injury claims that weren’t foreseen.
Thank You!