0% found this document useful (0 votes)
48 views19 pages

Chapter 6 ETHICS AND PROFESSIONALISM OF EMERGING TECHNOLOGIES

Chapter_6_ETHICS_AND_PROFESSIONALISM_OF_EMERGING_TECHNOLOGIES_

Uploaded by

ashenafiamare873
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views19 pages

Chapter 6 ETHICS AND PROFESSIONALISM OF EMERGING TECHNOLOGIES

Chapter_6_ETHICS_AND_PROFESSIONALISM_OF_EMERGING_TECHNOLOGIES_

Uploaded by

ashenafiamare873
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Chapter 6

ETHICS AND PROFESSIONALISM OF EMERGING


TECHNOLOGIES

1
Topics to be covered

• Technology and ethics


• New ethical questions
• Digital privacy
• Accountability and trust
• Treats and challenges

2
Technology and ethics

 The Internet boom has provided many benefits for society,


allowing the creation of new tools and new ways for people
to interact. As with many technological advances, however,
the Internet has not been without negative aspects. For
example,
 it has created new concerns about privacy
 it has been hampered by spam and viruses.
 it serves as a medium for communication across the
globe, it threatens to cut off people who lack access to
it.

10/8/2024 3
Technology and ethics …Cont

 Ethics is particularly important for the accountancy


profession, with a code for professional ethics based on five
basic principles.
 integrity
 objectivity
 competence and due care
 confidentiality, and
 professional behavior.
 However, the emergence of new technologies raises some
new challenges for the profession to address.

10/8/2024 4
General ethical principles
Ethical Rules
• Contribute to society and to human well-being,
acknowledging that all people are stakeholders in
computing.
• Avoid harm.
• Be honest and trustworthy.
• Be fair and act not to discriminate
• Respect the work required to produce new ideas, inventions
, creative works, and computing artifacts.
• Respect privacy.
• Honor confidentiality


10/8/2024 5
General ethical principles …Cont
Professional responsibilities.
• Strive to achieve high quality in both the processes and
products of professional work.
• Maintain high standards of professional competence,
conduct, and ethical practice.
• Know and respect existing rules pertaining to professional
work.
• Accept and provide appropriate professional review.


10/8/2024 6
General ethical principles …Cont
• Give comprehensive and thorough evaluations of computer
systems and their impacts, including analysis of possible
risks.
• Perform work only in areas of competence.
• Foster public awareness and understanding of computing,
related technologies, and their consequences.
• Access computing and communication resources only when
authorized or when compelled by the public good.
• Design and implement systems that are robustly and usably
secure.


10/8/2024 7
General ethical principles …Cont
Professional leadership principles.
• Ensure that the public good is the central concern during all
professional computing work.
• Articulate, encourage acceptance of and evaluate
fulfillment of social responsibilities by members of the
organization or group.
• Manage personnel and resources to enhance the quality of
working life.
• Articulate, apply, and support policies and processes that
reflect the principles of the Code.


10/8/2024 8
General ethical principles …Cont
• Create opportunities for members of the organization or
group to grow as professionals.
• Use care when modifying or retiring systems. Interface
changes, the removal of features, and even software
updates have an impact on the productivity of users and the
quality of
their work.
• Recognize and take special care of systems that become
integrated into the infrastructure of society.


10/8/2024 9
Digital privacy
• Digital Privacy is the protection of personally identifiable or
business identifiable information that is collected from
respondents through information collection activities or
from other sources
It Contains:
• Information privacy,
• communication privacy, and
• Individual privacy


10/8/2024 10
Digital privacy …Cont
Some digital privacy principles
• Data Minimization: collect the minimal amount of
information necessary from individuals and businesses
consistent with the Department’s mission and legal
requirements.
• Transparency: Information collected will not be used for any
other purpose unless authorized or mandated by law.
• Accuracy: Information collected will be maintained in a
sufficiently accurate, timely, and complete manner to
ensure that the interests of the individuals and businesses
are protected.
• Security: Adequate physical and IT security measures will be
implemented to ensure that the collection, use, and
maintenance of identifiable information are properly safe
guarded.
10/8/2024 11
Accountability and Trust
 Emerging technologies can provide improved accuracy,
better quality and cost eff iciencies for businesses in every
sector.
 They can enhance trust in the organization’s operations and
financial processes, which is crucial for sustainable success.
 But this can produce a paradox: the very solutions that can
be used to better manage risk, increase transparency and
build conf idence are often themselves the source of new
risks, which may go unnoticed.
 There’s a danger that the use of technology will degrade
people’s willingness to judge and intervene because they
feel that they are less personally connected to consumers
and consumer outcomes – the logic of the machine has
taken over from individual responsibility.
10/8/2024 12
Treats and challenges
 With Technology moving at a fast pace it is always been a
challenge for Security.
 As security professionals, we need to keep pace with ever-
changing technology and be aware of the AI, IoT, Big Data,
Machine Learning, etc.
 Emerging technologies are making an impact include:
Counter-terrorism and law enforcement informatics via
predictive analytics and artificial intelligence.
Real-time horizon scanning and data mining for threats
and information sharing
Automated cybersecurity and information assurance

10/8/2024 13
Treats and challenges …Cont
Ethical and regulatory challenges
Enhanced Surveillance (chemical and bio-detection
sensors, cameras, drones, facial recognition, license plate
readers)
Simulation and augmented reality technologies for
training and modeling
Safety and security equipment (including bullet and bomb
proof) made with lighter and stronger materials
Advanced forensics enabled by enhanced computing
capabilities (including future quantum computing)
Situational awareness capabilities via GPS for disaster
response and crisis response scenarios
Biometrics: assured identity security screening solutions
by bio-signature: (every aspect of your physiology can be
used as a bio-signature. Robotic Policing (already happening
10/8/2024 14
Treats and challenges …Cont

Challenges in using Artificial Intelligence


 With automation and robotics moving from production lines
out into other areas of work and business, the potential for
humans losing jobs is great here too.
 As automation technologies become more advanced, there
will be a greater capability for automation to take over more
and more complex jobs.
 As robots learn to teach each other and themselves, there is
the potential for much greater productivity, but this also
raises ethical and cybersecurity concerns.

10/8/2024 15
Treats and challenges …Cont

 As more and more connected devices (such as


smartwatches and fitness trackers) join the Internet of
Things (IoT) the amount of data being generated is
increasing.
 Companies will have to plan carefully how this will affect
the customer-facing application and how to best utilize the
masses of data being produced.
 There are also severe security implications of mass
connectivity that need to be addressed.

10/8/2024 16
Treats and challenges …Cont

Challenges in Big Data


 Almost all the technologies mentioned above have some
relation to Big Data.
 The huge amount of data being generated daily has the
potential to provide businesses with better insight into their
customers as well as their own business operations.
 Although data can be incredibly useful for spotting trends
and analyzing impacts, surfacing all this data to humans in a
way that they can understand can be challenging. AI will
play a role here.

10/8/2024 17
Treats and challenges …Cont
 Some treats(risks) of emerging technology are:
Driverless car: while a compelling option for future fleer
cars, companies could crash and burn from claims related to
bodily injury and property damage.
Wearables: Google glass, Fitbit and other wearables can
expose companies to the invasion of privacy claims that may
not be covered by liability or personal injury claims weren’t
foreseen.
Drones:: Turbulence is in the offing for manufacturers and
organizations that fail to protect themselves for property
damage and bodily injury, as well as errors and omissions.
Internet of things: The proliferation of sensors and cross-
platform integration creates potential exposure from
privacy invasion, bodily injury and property damage that may
connect an organization to huge liabilities.
10/8/2024 18
Any Question?

19

You might also like