We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11
Introduction to Emerging Technologies
Chapter Six ETHICS AND PROFESSIONALISM OF EMERGING TECHNOLOGIES
1 Prepared by Tesfa K. 7/25/2024
Chapter objective After completing this chapter, the students will be able to: Distinguish the link between ethics and technology. Understand general, professional and leadership ethical questions. Explain what digital privacy is, its components and why it is important. Identify the threats and challenges we face in developing and utilizing emerging technologies.
2 Prepared by Tesfa K. 7/25/2024
Technology and ethics The Internet has provided many benefits for society, allowing the creation of new tools and new ways for people to interact. However, the Internet has not been without negative aspects. For example:- it has been exposed for spam and viruses. it has created new concerns about privacy As Information Society we should promote the use of emerging technologies in the way to maximize the benefits that they provide while minimizing the harms. This promotion should be controlled by regulatory system to ensure that technology not abuse the people that generally takes us to Ethical values.
3 Prepared by Tesfa K. 7/25/2024
Technology and ethics… Ethics - moral principles that govern a person's behavior. Technology ethics is the application of ethical thinking (moral principles) to the use and practice technology.
4 Prepared by Tesfa K. 7/25/2024
General ethical principles or Ethical rules that must be applied in all technologies 1. Ensure that all people are stakeholders in computing or contribute to all society equally. 2. Avoid harm 3. Be honest and responsible 4. Be fair and take action not to discriminate 5. Respect the work required to produce new ideas, inventions and creative works 6. Respect privacy 7. Respect confidentiality 5 Prepared by Tesfa K. 7/25/2024 Digital Privacy Digital Privacy is the protection of personally identifiable or business identifiable information that is collected from respondents through information collection activities or from other sources. Digital Privacy has three sub-related categories; information privacy, communication privacy, and individual privacy Information privacy is the notion that individuals should have the freedom, or right, to determine how personally identifiable information is collected and used.
6 Prepared by Tesfa K. 7/25/2024
Communication Privacy Communication privacy is the notion that individuals should have the freedom, or right, to communicate information digitally with the expectation that their communications are secure; [meaning that messages and communications will only be accessible by the recipient] However, communications can be intercepted through various hacking methods or delivered to other recipients without the sender's knowledge. At this time communication privacy is violated
7 Prepared by Tesfa K. 7/25/2024
Individual Privacy Individual privacy is the notion that individuals have a right to exist freely on the internet, in that they can choose types of information they want to access and more importantly - unwanted information should not interrupt them Example of individual privacy violation An internet user receiving unwanted ads and emails/spam Computer virus that forces the user to take actions. When individuals doesn't exist digitally with interruption from unwanted information we can say that - their individual privacy has been violated.
8 Prepared by Tesfa K. 7/25/2024
Some digital privacy principles Data Minimization: collect the minimal amount of information necessary from individuals and businesses which is consistent with the Department’s mission and legal requirements. Transparency: Notice covering the purpose and use of information collection will be provided in a clear manner. Information collected will not be used for any other purpose unless authorized or mandated by law. Accuracy: Information collected will be maintained in accurate, timely, and complete manner to ensure that the interests of the individuals and businesses are protected. Security: Adequate physical and IT security measures will be implemented to ensure that the collected information is protected.
9 Prepared by Tesfa K. 7/25/2024
Risks (treats) in emerging technologies Emerging technologies create significant opportunities for businesses if they utilize them properly. They also create risks and questions if we not utilize them properly. Hence, planning to mitigate emerging technologies potential risks areas is essential for businesses. Some risks of emerging technology are:- Driverless car: to convince individuals for future self driving cars, companies could reduce physical injury and property damage of driverless cars. Wearables: Google glass, Fitbit and other wearables can expose companies to privacy claim Drones: manufacturers fail to protect physical injury and property damage of drones due to turbulence [sudden change in airflow]