0% found this document useful (0 votes)
22 views

Emerging Note (C4-6) #2 @NoteHeroBot

Uploaded by

kbk3moh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Emerging Note (C4-6) #2 @NoteHeroBot

Uploaded by

kbk3moh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 115

CLICK HERE 🎠 GET PREMIUM

Chapter 4: Internet
of Things(IoTs)
Everything
that
has
the
ability
to
communicate

Global Network of Smart physical Things


Chapter 4: (IoT) OBJECTIVES
At the end of this chapter students should
understand:
1. Understand the architecture of Internet of Things and connected world.

2. Explore on use of various hardware, communication and sensing


technologies to build IoT applications.
3. Illustrate the real time IoT applications to make smart world.
4. Understand challenges and future trends in IoT.
2
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
Course Outcomes
After completing this chapter you should be able to
➢ Understand the idea of IoT
➢ List advantages and challenges of IoT
➢ Explain How IoT works
➢ List the application of IoT Across different Application Domains
➢ List IoT Tools and Application Development Platforms
➢ Explore the use of various hardware and sensing technologies to build IoT
applications.
➢ Illustrate the real time IoT applications to make smart world.
➢ Understand the available cloud services and communication API's for developing
smart cities.
Learning Outcomes
1. Understand and intuition of the whole process line of extracting knowledge from data
about the Internet of Things.
2. Solid knowledge in a broad range of methods based on design and implementation of
IoT in network performance, analysis and problem solving with design of networks.
3. Use IoT design to carry out basic statistical modelling and analysis.
4. Motivate and explain trade-offs in IoT tool technique design and analysis of
applications with IoT.
5. Create effective results of IoT future approaches.
Chapter-4 The following Topics will be covered

1. Overview of IoT
2. How does it work?
3. IoT Tools and Platforms
4. Applications of IoT
1. Overview of IoT
Internet of Things (IoT) is a network of devices which can sense, accumulate and transfer data over the internet
without any human intervention.

IoT= Services + Data + Networks + Sensors

A “thing” in the internet of things can be

natural or man-made object

assigned a Unique IP address

able to transfer data over a network

The Internet of Things describes the coordination of


multiple machines, devices and appliances connected to
the Internet through multiple networks.
Overview of IoT Contd..
IoT is a system of interrelated computing devices, mechanical and digital machines, objects,
animals or people that are provided with unique identifiers and the ability to transfer data over a
network without requiring human-to-human or human-to-computer interaction. IoT is a
network of devices that can sense, accumulate and transfer data over the internet without any
human intervention.
The most important features of IoT include artificial intelligence, connectivity, sensors, active
engagement, and small device use.
AI − IoT essentially makes virtually anything “smart”, meaning it enhances every aspect of life
with the power of data collection, artificial intelligence algorithms, and networks.
Connectivity − is a critical component of the Internet of Things. IoT devices rely on networks to
communicate with gateways, applications, servers, routers, and other IoT devices. This communication—
transmitting and receiving data—enables IoT devices to perform the functions they were designed for. IoT
creates these small networks between its system devices.
Overview of IoT Contd..
Sensors: Broadly speaking, sensors are devices that detect and respond to changes in an
environment. Inputs can come from a variety of sources such as light, temperature, motion and
pressure. Sensors output valuable information and if they are connected to a network, they can
share data with other connected devices and management systems.
Sensors are crucial to the operation of many of today’s businesses. They can warn you of
potential problems before they become big problems, allowing businesses to perform predictive
maintenance and avoid costly downtime.
Top 10 Sensor Examples:
Humidity Sensors.,Pressure Sensors,Proximity Sensors.,
Level Sensors.,
Accelerometers,Gyroscope,Gas Sensors etc.,
Overview of IoT Contd..
Active Engagement − Much of today’s interaction with connected technology happens through
passive engagement. IoT introduces a new paradigm for active content, product, or service
engagement.
Small Devices − Devices, as predicted, have become smaller, cheaper, and more powerful over
time. IoT exploits purpose-built small devices to deliver its precision, scalability, and versatility.
But what is IoT Exactly? Definitions?
Definition from International Bodies

Internet Architecture Board (IAB): The networking of smart objects, meaning a


huge number of devices intelligently communicating in the presence of internet protocol
that cannot be directly operated by human beings but exist as components in buildings,
vehicles or the environment

Internet Engineering Task Force (IETF): The networking of smart objects in which
smart objects have some constraints such as limited bandwidth, power, and processing
accessibility for achieving interoperability among smart objects
IoT Definition from International Bodies
contd…
IEEE Communications: A framework of all things that have a representation in the presence
of the internet in such a way that new applications and services enable the interaction in the
physical and virtual world in the form of Machine-to-Machine (M2M) communication in the
cloud

According to the Gartner report, by 2020 connected devices across all technologies will reach 20.6 billion.

Executive Summary
Projections for the impact of IoT on the Internet and economy are impressive, with some anticipating as many as 100
billion connected IoT devices and a global economic impact of more than $11 trillion by 2025.
History of IoT
The Internet, itself a significant component of the IoT, started out as part of DARPA (Defense
Advanced Research Projects Agency) in 1962 and evolved into ARPANET in 1969. In the 1980s,
commercial service providers began supporting public use of ARPANET, allowing it to evolve
into our modern Internet. Global Positioning Satellites (GPS) became a reality in early 1993.

The term “The Internet of Things” (IoT) was coined by Kevin Ashton in a presentation to
Proctor & Gamble in 1999.

He is a co-founder of MIT’s Auto-ID Lab.

He pioneered (Radio Frequency Identification) RFID (used in bar code detector) for the
supply-chain management domain.
History of IoT
The first internet appliance, for example, was a Coke vending
machine at Carnegie Mellon University in the early 1980s.

The Internet of Things, as a concept, wasn’t officially


named until 1999. One of the first examples of an Internet
of Things is from the early 1980s and was a Coca Cola
machine, Using the web, programmers has determined
whether there is cold drink or not ?

An additional and important component in developing a functional IoT took place


in June of 2012, when the major Internet service providers and web companies
agreed to increase address space on the global Internet by enabling IPV6 for their
services and products.
History of IoT
IoT has evolved from the convergence of

wireless technologies,

microelectromechanical systems (MEMS),

microservices and

the Internet.

The convergence has helped tear down the

silos between operational technology (OT)

and information technology (IT)

IoT evolved from machine-to-machine (M2M) communication


History of IoT
In 2009, Google started testing driverless cars(self-driving vehicles.)
By the year 2013, the Internet of Things had evolved into a system using multiple
technologies, ranging from the Internet to wireless communication and from Micro-
electromechanical systems (MEMS) to embedded systems.
The IoT Goes Mobile – 2015.

Human neighborhoods are now becoming part of the interconnected community called the
Internet of Things.
Characteristics of IoT
Challenges of IoT
Security − IoT creates an ecosystem of constantly connected devices communicating over networks.
The system offers little control despite any security measures. This leaves users exposed to various
kinds of attackers.
Privacy − The sophistication of IoT provides substantial personal data in extreme detail without the
user’s active participation.
Complexity − Some find IoT systems complicated in terms of design, deployment, and maintenance
given their use of multiple technologies and a large set of new enabling technologies.
Flexibility − Many are concerned about the flexibility of an IoT system to integrate easily with
another. They worry about finding themselves with several conflicting or locking systems.
Compliance − IoT, like any other technology in the realm of business, must comply with regulations.
Its complexity makes the issue of compliance seem incredibly challenging when many consider
standard software compliance a battle.
Pros and Cons of IoT
Advantages

Improved(active) Customer Engagement,

Technology Optimization,better quality of life

Reduced Waste,saves money,monitor,efficient and saves time

Enhanced Data Collection(sensors do that)

Communication(M2M-Machine-to Machine),automation control,information

Automation of daily tasks leads to better onitoring of devices


Pros and Cons of IoT
Disadvantages

Increased Security Concern( more devices and more info created and shared)

Big Data Management issue( handling huge numbers)

The higher chance of system corruption (if there is a bug in any part of the system)

Device Interoperability( multiple, different device vendors with no accepted standard)

Privacy,safety(Hackers may gain access to the system and steal personal


information.),compatibility,complexity,Technology takes control of life.

Deploying IoT devices is very costly and time-consuming.


IoT ARCHITECTURE
IoT ARCHITECTURE
Architecture
IoT Layered

22
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
How does IoT Works?
Stage 1 (Sensors/Actuators) : A thing in the context of “Internet of Things”, should be
equipped with sensors and actuators thus giving the ability to emit, accept and process
signals

Stage 2 (Data Acquisition Systems): The data from the sensors starts in analogue form
which needs to be aggregated and converted into digital streams for further processing.

This stage performs these data aggregation and conversion functions


How does IoT Works?
Stage 3 (Edge Analytics): Once IoT data has been digitized and aggregated, it may
require further processing before it enters the data center, this is where Edge Analytics
comes in

Stage 4 (Cloud Analytics):

Data that needs more in-depth processing gets forwarded to physical data centers or cloud-
based systems.
IoT – Type of Systems
▪ IoT includes many different systems, including

o Internet-connected cars

o wearable devices including health and fitness monitoring devices, watches, and even human
implanted devices;

o smart meters and smart objects;

o home automation systems and lighting controls;

o smartphones that are increasingly being used to measure the world around them; and

o wireless sensor networks that measure weather, flood defenses, tides and more

25
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
IoT Enablers
The IoT four key technological enablers are: -

RFID technology used for tagging the things

Sensor technology used for sensing the things

Smart technology used for thinking the things

Nanotechnology used for shrinking the things

Communication technologies: Wireless sensor networks, sensor networks ,


2G/3G/4G,GSM,GPRS,RFID, WI-FI, GPS, etc.
Main Components of IoT
There are four main components of an IoT system

The Thing itself (that is, the device)

The local network (this can include a gateway, which translates proprietary
communication protocols to Internet Protocol).

The Internet ( the Global Network)

Back-end services (enterprise data systems, or PCs and mobile devices).


The Internet of Things from an embedded systems point of
view

28
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
IoT Communication Mechanisms
Communication between devices and the Internet or to a gateway includes many different models

Direct Ethernet or Wi-Fi connectivity using TCP or UDP

Bluetooth Low Energy(BLE)

Near Field Communication (NFC)

Zigbee or other mesh radio networks

SRF and point-to-point radio links

UART or serial lines


Devices and Networks
Two major modes of connectivity
IoT network requirements

➢ The ability to connect large numbers of heterogeneous IoT elements

➢ High reliability

➢ Real-time awareness with low latency

➢ Ability to secure all traffic flows

➢ Programmability for application customization

➢ Traffic monitoring and management at the device level

➢ Low-cost connectivity for a large number of devices/sensors


Why is IoT important?
Touches every industry, including healthcare, finance, retail, and manufacturing

Helps people live and work smarter

Smart homes, smart, cities, smart kitchen…

Smart cities help citizens reduce waste and energy consumption


Why is IoT important?

Provides businesses with a real-time look into how their companies’ systems really
work

Delivering insights into everything from the performance of machines to supply


chain and logistics operations

Connected sensors are even used in farming to help monitor crop and cattle
yields and predict growth patterns
IoT Across Application Domains
There are numerous real-world applications of the internet of things

Consumer IoT and Enterprise IoT

Manufacturing and Industrial IoT


IoT Application Domains and Scenarios
IoT Applications - Smart Homes
IoT Applications - Smart City
IoT Applications - Smart Farming
Transportation Applications
Environmental Application: CitiSense
IoT Applications - Health Care
IoT Across Application Domains

43
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
Smart Home Applications
IoT Tools and Application Development Platforms

▪ The overall IoT system includes


o Hardware (devices and sensors)
o Connectivity through a router, gateway, wi-fi, satellite,
Ethernet, etc.
o Software
o User interface
45
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
IoT Tools and Application Development Platforms

▪ Cloud hosting has become a wide-spread and generally


appreciated method of developing and running various
technology solutions,
▪ IoT, directly depending on Internet, definitely benefits
from all the advantages of cloud computing
▪ Special cloud-based IoT platforms support the Internet-
based functions of the application – running,
maintenance, analytics, data storage, and security
measures.
46
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
IoT Tools and Application Development Platforms

Below are some Cloud IoT platforms


o Google Cloud IoT

o Microsoft Azure IoT Suite

o SAP

o Salesforce IoT

o Oracle Internet of Things

o Cisco IoT Cloud Connect

o Bosch IoT Suite

o IBM Watson Internet of Things

o ThingWorx IoT Platform

o Huawei Cloud Core

47
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
IoT Development Platforms

Top-class IoT development tools that can be employed by both developers and for all those
who wish to pursue IoT include
• Tessel 2
• Eclipse IoT
• Arduino
• PlatformIO
• Kimono Create
• IBM Watson
• Raspbian (Raspberry Pi)
• OpenSCADA
• Node-RED
• Device Hive
IoT hardware platforms - So many IoT Chips

49
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
An Exiting Future!
Thanks! Questions Plz…End of Chapter-4 IoT
Chapter Four Review Questions
▪ 1. What are the main parts of the IoT system?
▪ 2. What are the security concerns related to IoT?
▪ 3. Explain IoT Protocol stack?
▪ 4. What is meant by a smart city regarding the IoT?
▪ 5. Give examples of the impact of IoT on our lives?
▪ 6. What influence will the IoT have on monetary growth?
▪ 7. Why will be the IoT successful in the coming years?
▪ 8. What impact will the IoT have on the health care sector?
▪ 9. What are the main social and cultural impacts of IoT?
▪ 10. What the main challenges of an IoT?
▪ 11. What role does the network play in the IoT of everything?
▪ 12. How wireless communication might affect the development and implementations
of IoT?
Chapter 5
IET
Augmented Reality (AR)
Chapter-5 AR Learning Outcomes
After completing this lesson you should be able to

• Explain Augmented Reality


• Explain the features of Augmented Reality
• Explain the difference between AR, VR, and MR
• Explain the architecture of Augmented Reality Systems
• Describe the application areas of Augmented Reality
Chapter 5(AR) Topics to be covered

1. Introduction to VR , AR, and MR


2. Compare and contrast AR, VR and MR
3. Architecture of AR systems
4. Application of AR systems
Chapter 5
Brief introduction of
• Virtual reality (VR)
• Augmented Reality (AR)
• Mixed reality (MR)
Introduction to VR

VR is fully immersive, which tricks your senses into thinking you’re in a different
environment or world apart from the real world. Using a head-mounted display (HMD)
or headset, you’ll experience a computer-generated world of imagery and sounds in
which you can manipulate objects and move around using haptic controllers while
tethered to a console or PC. It is also called a computer-simulated reality.
It refers to computer technologies using reality headsets to generate realistic sounds,
images and other sensations that replicate a real environment or create an imaginary
world. Advanced VR environment will engage all five senses (taste, sight, smell, touch,
sound), but it is important to say that this is not always possible.
VR Introduction Contd….

• Using VR devices such as HTC Vive, Oculus Rift or Google Cardboard, users
can be transported into a number of real-world and imagined environments.
The most advanced VR experiences even provide freedom of movement – users can
move in a digital environment and hear sounds. Moreover, special
hand controllers can be used to enhance VR experiences.
• Most VR headsets are connected to a computer (Oculus Rift) or a gaming console
(PlayStation VR) but there are standalone devices (Google Cardboard is among
the most popular) as well. Most standalone VR headsets work in combination with
smartphones – you insert a smartphone, wear a headset, and immerse in the
virtual reality.
Augmented Reality
(AR) Introduction
In augmented reality, users see and interact with the real world while digital content is added to
it.
If you own a modern smartphone, you can easily download an AR app and try this technology.
There’s a different way to experience augmented reality, though – with special AR headsets,
such as Google Glass, where digital content is displayed on a tiny screen in front of a user’s
eye.

AR adds digital elements to a live view often by using the camera on a smartphone. Examples
of augmented reality experiences include Snapchat lenses and the game Pokemon Go.
Augmented Reality (AR) is a live, direct or indirect view of a physical, real-world
environment whose elements are augmented (or supplemented) by computer-generated
sensory input such as sound, video, graphics or GPS data
Introduction To
Mixed Reality
(MR)
Mixed Reality (MR), sometimes referred to as hybrid reality, is the merging of real and virtual
worlds to produce new environments and visualizations where physical and digital objects co-exist and
interact in real-time. It means placing new imagery within a real space in such a way that the new
imagery is able to interact, to an extent, with what is real in the physical world we know.

For example, with MR, you can play a virtual video game, grab your real-world water bottle, and smack
an imaginary character from the game with the bottle. Imagination and reality have never been so
intermingled.
The key characteristic of MR is that the synthetic content and the real-world content are able to react to
each other in real-time.
MR Introduction Contd…
In mixed reality, you interact with and manipulate both physical and virtual items and
environments, using next-generation sensing and imaging technologies. MR allows you
to see and immerse yourself in the world around you even as you interact with a virtual
environment using your own hands—all without ever removing your headset.
Comparison…

• Virtual Reality (VR) encompasses immersive experiences and content via a VR


headset or HMD (head-mounted display).
• The content is 100% digital and computer-generated.
• The current reality is replaced with a new 3D digital environment in which the user
is isolated from the real world.
Differences between AR & VR
Comparison…

Some VR headsets manufacturers include technology giants such as:-


• Facebook (through their acquisition of Oculus),
• Google (with a series of Daydream headsets), HTC (VIVE),
• Samsung (Gear VR), and
• Windows (who have named their range of devices Windows Mixed Reality, even though a
number is VR-only enabled.)
Comparison…

There are three types of VR devices available these are:-


• Tethered,
• Stand-alone, and
• Smartphone VR
DIFFERENCES BETWEEN VR, AR, AND
MR

• Virtual Reality: VR is content which is 100% digital and can be enjoyed in a fully
immersive environment.
• Augmented Reality: AR overlays digital content on top of the real-world.
• Mixed Reality: MR is a digital overlay that allows interactive virtual elements to
integrate and interact with the real-world environment.
DIFFERENCES…

• AR is a variation of the more known concept of Virtual Reality Technology (VR), which is often defined as
“the use of real-time digital computers and other special hardware and software to generate a simulation of an
alternate world or environment, which is believable as real or true by the users”.
• VR technology creates an environment in which the user feels and seems to be moving inside a computer-created
virtual world in the same way people move inside the natural environment; while immersed in the virtual world,
the user cannot perceive the real one which still surrounds him.
• On the contrary, AR allows the user to see the real world, augmenting it with superimposed virtual objects.
• In other words, while VR replaces reality, AR supplements it, creating an environment in which real and virtual
objects harmonically coexist.
• AR exploits users’ perceptual-motor skills in the real world, creating a special type of human-machine interaction
Relation between AR and Telepresence

• In telepresence, the fundamental purpose is to extend the operator’s sensory-motor


facilities and problem-solving abilities to a remote environment.
• Virtual reality aims to achieve the illusion of presence within a computer simulation
whereas telepresence aims to achieve the illusion of presence at a remote location.
• AR can be considered a technology between VR and Telepresence.
• In VR the environment is completely synthetic
• In Telepresence it is completely real,
• In AR the user sees the real world augmented with virtual objects.
The architecture of AR systems
• Scene Generator
• Tracking System
• Display
AR Architecture
Augmented Reality Systems (ARS)
standard architecture
AR Architecture …

• AR System clients provide the user interface.


• The Mid Tier makes the user interface available in browsers.
• The AR System server implements the workflow functions, access control, and
flow of data into and out of the database.
• The database server acts as a data storage and retrieval engine.
Functionally the AR System consists of
three environments

• Presentation
• Business Processing
• Data Storage
AR System clients

AR System clients can be broadly divided into


• user client and
• developer clients
Four major classes of AR
distinguished by their display type

• Optical SeeThrough,
• Virtual Retinal Systems,
• Video See-Through,
• Monitor Based AR and
• Projector Based AR
Optical See-Through HMD
Video See-Through HMD
Application of AR systems

• Education,
• Medical,
• Assistance, Retail
• Entertainment
• AR on TV
• AR in eSports
• AR in games
• AR in music
• AR in the theater
• Ultrasounds
• Diabetes management
• Nursing care
• Surgery
• Describing symptoms
AR-Applications(Medical Training)
AR-Applications (Interior Design and Modeling)
AR-Applications (Classrooms for Education)
AR-Applications (Entertainment)
Thank You! End of Chapter 5 (AR)-
Questions
1. What are the three blocks/components of the AR system architecture?
2. Describe the functions of the Infrastructure Tracking Unit, the Processing Unit,
and the Visual Unit?
3. What is the difference between Video-see through and Optical-see through
visualization technologies?
4. Differentiate between AR/VR/MR ➢ Describe the applications of AR in
education?
➢ What are the reasons to apply AR in education?
➢ List some of the applications of AR in medicine?
➢ Describe the benefits of AR to patients and healthcare workers.
➢ How AR can be used in Entertainment?
Review Questions of Chapter-5 AR
• What is augmented, virtual and mixed reality and its application?
• What are good examples of augmented, virtual and mixed reality?
• What is the difference between augmented, virtual and mixed reality?
• How is augmented, virtual and mixed reality achieved?
• What is the benefit of augmented, virtual and mixed reality?
• How Can AR, VR, and MR improve engineering instructions?
• Can VR be a substitute for Real Life Experience?
• What is the impact of VR on Educational Learning rather than games?
• What is the most technical challenge for MR?
Chapter-6
Chapter Six
Objectives

After accomplishing this chapter, Students will be able to:


➢ Distinguish the link between ethics and technology.
➢Understand general, professional and leadership ethical questions.
➢ Explain what digital privacy is, its components and why it is important.
➢ know the importance of accountability and trust in emerging technologies.
➢ Identify the threats and challenges we face in developing and utilizing emerging
technologies.
Chapter-6
Introduction

In the previous chapters, emerging technologies like datascience, big data,


artificial intelligence, internet of things and augmented reality were discussed.
After having a discussion on all of the above emerging technologies, it is time to
study their connection with our ethical values as well as social values. In this
chapter, the connection of emerging technologies with professional ethics, privacy,
accountability, trust was discussed. Finally, the threats and challenges of emerging
technologies will be explained.
Technology and ethics
➢ The Internet boom has provided many benefits for society, allowing the creation of new tools and
new ways for people to interact.
➢ As with many technological advances, however, the Internet has not been without negative aspects.
For example, it has created new concerns about privacy, and it has been hampered by spam and
viruses.
➢ Moreover, even as it serves as a medium for communication across the globe, it threatens to cut off
people who lack access to it.
➢ Technology can serve to promote or restrict human rights. The Information Society should foster
the use of emerging technologies in such a way as to maximize the benefits that they provide while
minimizing the harms.
➢ In many cases, this promotion may be less a matter of technological control than of oversight:
establishing the proper legal or regulatory system to ensure that technology capable of abuse is not
in fact abused and that the benefits of technology are shared among all.
New ethical questions?

1. What do you think the need for ethics in data science? Is it really important to
include ethical rules when dealing with big data? If your answer is yes, why?
The increasing use of big data, algorithmic decision-making, and artificial
intelligence can enable more consistent, evidence-based and accurate judgments
or decisions, often more quickly and efficiently. However, these strengths can
potentially have a darker side too, throwing up questions
around the ethical use of these fairly new technologies.
2. As we discussed in chapter three, AI is all about making a machine learn and decide as humans do. Do you think
that it is necessary to rely on machines and give all the opportunity to decide? Why?

Additionally, questions are being asked regarding the interaction between computers and humans.
How much reliance can we place on data and models, and what is the role of human judgment, as well
as how do we ensure that we understand the decision-making process? Whatever the power of the
machine, humans will still need to be involved, so that people can be held accountable, or explain the
reasons behind a decision.
New ethical questions cont…
3. Do you think that integrating ethical rules with emerging technologies is
important? If your answer is yes, why? What are the challenges of integrating
ethical rules with the new technologies?

A central problem of the ethics of technology is that it tends to arrive too late. In many cases, ethical
issues are only recognized when the technology is already on the market and problems arise during its
widespread use. Ethics can then become a tool to clean up a mess that might have been avoidable. It is
probably not contentious to say it would be desirable to have ethical input at the earlier stages of
technology design and development. Indeed, there are ethical theories and approaches that explicitly
aim at an early integration of ethics into the technology life cycle. One central problem of this type of
approach is that the future is unknown. Ethics has traditionally not been well equipped to deal with
issues of uncertainty and, in particular, future uncertainty.
From your civic and ethical education course, what do you understand about the word ethics?

Ethics is particularly important for the accountancy profession, with a code


for professional ethics based on five basic principles

●Integrity : To be straightforward and honest in all professional and business relationships.


●Objectivity: To not allow bias, conflict of interest or unwarranted influence of others to override
professional or business judgements.
●Competence and due care: To maintain professional knowledge and skill at the level required to
ensure that a client or employer receives competent professional services based on current developments
in practice, legislation and techniques and act diligently and in accordance with applicable technical and
professional standards.
●Confidentiality: To respect the confidentiality of information acquired as a result of professional and
business relationships and, therefore, not disclose any such information to third parties without proper
and specific authority.
●Professional behavior: To comply with relevant laws and regulations and avoid any action that
discredits the profession.
General ethical principles
1.Contribute to society and to human well-being,
acknowledging that all people are stakeholders in computing.
2. Avoid harm.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate
5. Respect the work required to produce new ideas, inventions, creative
works, and computing artifacts.
6. Respect privacy.
7. Honor confidentiality .
What is Professional Ethics?

“Professional Ethics” speaks to our ethical responsibility in the workplace or in


our profession to internal (e.g. co-workers and supervisors) and external
stakeholders (e.g. customers and suppliers). It provides ethical guidelines on
how we should conduct ourselves and treat others in the work environment.
Professional responsibilities
1. Strive to achieve high quality in both the processes and products
of professional work.
2. Maintain high standards of professional competence, conduct, and
ethical practice.
3. Know and respect existing rules pertaining to professional work.
4. Accept and provide appropriate professional review.
5. Give comprehensive and thorough evaluations of computer systems
and their impacts, including analysis of possible risks.
Professional responsibilities
6. Perform work only in areas of competence.
7. Foster public awareness and understanding of computing, related
technologies, and their consequences.
8. Access computing and communication resources only when authorized
or when compelled by the public good.
9. Design and implement systems that are robustly and usably secure.
Professional leadership principles

1. Ensure that the public good is the central concern during all
professional computing work.
2. Articulate, encourage acceptance of and evaluate fulfillment of social
responsibilities by members of the organization or group.
3. Manage personnel and resources to enhance the quality of working
life.
4. Articulate, apply, and support policies and processes that reflect the
principles of the Code.
Professional leadership principles

5. Create opportunities for members of the organization or group to


grow as professionals.
6. Use care when modifying or retiring systems. Interface changes, the
removal of features, and even software updates have an impact on
the productivity of users and the quality of their work.
7. Recognize and take special care of systems that become integrated
into the infrastructure of society.
Digital Privacy
Digital privacy

Digital Privacy is the protection of personally


identifiable or business identifiable information
that is collected from respondents through information collection activities or from other
sources.
Three sub-related categories

○Information privacy

○Communication privacy

○Individual privacy
Contd..
● Information privacy : The notion that individuals should have the
freedom, or right, to determine how their digital information, mainly that
pertaining to personally identifiable information, is collected and used.
● Communication privacy :The notion that individuals should have the
freedom, or right, to communicate information digitally with the
expectation that their communications are secure.
● Individual privacy: The notion that individuals have a right to
● exist freely on the internet, in that they can choose what types of
information they are exposed to, and more importantly that
● unwanted information should not interrupt them.
Some digital privacy principles
● Data Minimization: collect the minimal amount of
information from individuals and businesses consistent with legal
requirements.
● Transparency: Collection and use of identifiable information will be provided
in a clear manner and mandated by law.
● Accuracy: Information collected will be maintained in a sufficiently accurate,
timely, and complete manner.
● Security: Adequate physical and IT security measures will be implemented to
ensure that the collection, use, and maintenance of identifiable information.
Accountability and Trust
• The challenge is exacerbated by the speed at which technological change is
occurring and the breadth of its adoption – which is introducing new risks that
demand new responses.

• Emerging technologies can provide improved accuracy, better quality and


cost efficiencies for businesses in every sector. They can enhance trust in the
organization’s operations and financial processes, which is crucial for
sustainable success.
Threats and Challenges
Ethical and regulatory challenges:

1. Counter-terrorism and law enforcement informatics via predictive


analytics and artificial intelligence.
2. Real-time horizon scanning and data mining for threats and information
sharing.
3. Automated Cyber security and information assurance.
4. Enhanced Surveillance (chemical and bio-detection sensors, cameras,
drones, facial recognition, license plate readers).
5. Simulation and augmented reality technologies for training and modeling.
Contd….
6. Safety and security equipment (including bullet and bomb proof) made
with lighter and stronger materials
7. Advanced forensics enabled by enhanced computing capabilities
(including future quantum computing)
8. Situational awareness capabilities via GPS for disaster response and crisis
response scenarios
9. Biometrics: assured identity security screening solutions by bio-signature:
(every aspect of your physiology can be used as a bio-signature. Measure
unique heart/pulse rates, electrocardiogram sensor, blood oximetry, skin
temperature)
10. Robotic Policing (already happening in Dubai!)
Challenges in using Artificial Intelligence

● AI is only as good as the data it is exposed to,


● which is where certain challenges may present themselves.
● AI is its potential to replace human workers. As machines become more
“intelligent” they could begin to replace experts in higher-level jobs.
● AI also has the potential to take the burden of laborious and time-
consuming tasks from these people, freeing up their time and brainpower
for other things.
Challenges in using Robotics in manufacturing
● With automation and robotics moving from
production lines out into other areas of work and business,
the potential for humans losing jobs is great here too.
● As automation technologies become more advanced, there will be a greater
capability for automation to take over more and more complex jobs.
● As robots learn to teach each other and themselves, there is the potential for
much greater productivity but this also raises ethical and cybersecurity
concerns.
Challenges in using the Internet of Things
● As more and more connected devices
(such as smart watches and fitness trackers) join the Internet of Things
(IoT) the amount of data being generated is increasing.
● Companies will have to plan carefully how this will affect the customer-
facing application and how to best utilize the masses of data being
produced.
● There are also severe security implications of mass connectivity that need
to be addressed.
Challenges in Big Data

● Almost all the technologies mentioned,


have some relation to Big Data. The huge amount of data being
generated on a daily basis has the potential to provide businesses with
better insight into their customers as well as their own business
operations.
● Although data can be incredibly useful for spotting trends and analyzing
impacts, surfacing all this data to humans in a way that they can
understand can be challenging. AI will play a role here.
Some risks of emerging technology:
● Driverless car: while a compelling option for future fleer cars,
companies could crash and burn from claims related to bodily injury and
property damage.

● Wearables: Google glass, Fitbit and other wearables can expose


companies to the invasion of privacy claims that may not be covered by
general liability or personal injury claims that weren’t foreseen.
Some risks of emerging technology:

● Drones: Turbulence is in the offing for


manufacturers and organizations that
fail to protect themselves for property damage and bodily injury, as well
as errors and omissions.

● Internet of things: The proliferation of sensors and cross-platform


integration creates potential exposure from privacy invasion, bodily injury
and property damage that may connect an organization to huge liabilities.
Chapter Six Review Questions
1. What is the importance of ethics in emerging technologies?
2. List down some general ethical rules?
3. List down some professional responsibility related to ethical rules
4. What is digital privacy? What is its importance?
5. Briefly explain digital privacy principles
6. Why we need accountability in using emerging technologies?
7. Is the trust necessary to use an emerging technology platform? Why?
8. Briefly explain the challenges in using: a. AI? b. Robots? c. IoT?
9. Briefly explain the risks we face in augmented reality, IoT and AI?
10. Do you think that dealing with big data demands high ethical
regulations, accountability, and responsibility of the person as well as
the company? Why?
End of Chapter-6

Thank You! Any Questions?

You might also like