0% found this document useful (0 votes)
16 views32 pages

Chapter Six

The document discusses ethics and professionalism regarding emerging technologies. It covers topics like technology and ethics, new ethical questions around big data and AI, general ethical principles, and challenges around digital privacy, accountability, and emerging technologies like surveillance and security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views32 pages

Chapter Six

The document discusses ethics and professionalism regarding emerging technologies. It covers topics like technology and ethics, new ethical questions around big data and AI, general ethical principles, and challenges around digital privacy, accountability, and emerging technologies like surveillance and security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

JIGJIGA Health Science College

Regular Program
Emerging Technology

Chapter Six
ETHICS AND PROFESSIONALISM OF EMERGING
TECHNOLOGIES
Abdikadar M.
1
Technology and ethics

Technology can serve to promote or restrict human rights. The


Information Society should foster the use of emerging technologies
in such a way as to maximize the benefits that they provide while
minimizing the harms. In many cases, this promotion may be less a
matter of technological control than of oversight: establishing the
proper legal or regulatory system to ensure that technology capable
of abuse is not in fact abused and that the benefits of technology
are shared among all.

2
Continue……………

Ethics is particularly important for the accountancy


profession, with a code for professional ethics based on
five basic principles – integrity, objectivity, competence
and due care, confidentiality, and professional behavior.
However, the emergence of new technologies raises
some new challenges for the profession to address.

3
New ethical questions

The increasing use of big data, algorithmic decision-


making, and artificial intelligence can enable more
consistent, evidence-based and accurate judgments or
decisions, often more quickly and efficiently. However,
these strengths can potentially have a darker side too,
throwing up questions around the ethical use of these
fairly new technologies.

4
Continue……………

questions are being asked regarding the interaction


between computers and humans. How much reliance can
we place on data and models, and what is the role of
human judgment, as well as how do we ensure that we
understand the decision-making process?

5
Continue……………
o A central problem of the ethics of technology is that it tends to arrive too
late. In many cases, ethical issues are only recognized when the
technology is already on the market and problems arise during its
widespread use.
o One central problem of this type of approach is that the future is
unknown. By definition, we do not know with certainty what will happen
in the future and ethics that relies on future development needs to be
able to answer the question of how it decides which technological
developments to pursue.
6
General ethical principles

 Contribute to society and to human well-being,


acknowledging that all people are stakeholders in computing.
 Avoid harm.
 Be honest and trustworthy.
 Be fair and take action not to discriminate .

7
Continue……………

 Respect the work required to produce new ideas,


inventions, creative works, and computing artifacts
 Respect privacy.
 Honor confidentiality

8
Professional responsibilities.
Strive to achieve high quality in both the processes and
products of professional work.
Maintain high standards of professional competence, conduct,
and ethical practice.
Know and respect existing rules pertaining to professional
work.
Accept and provide appropriate professional review.
Give comprehensive and thorough evaluations of computer
systems and their impacts, including analysis of possible risks.

9
Continue……………

Perform work only in areas of competence.


Foster public awareness and understanding of computing,
related technologies, and their consequences.
Access computing and communication resources only when
authorized or when compelled by the public good.
Design and implement systems that are robustly and usably
secure.

10
Professional leadership principles.

 Ensure that the public good is the central concern during all
professional computing work.
 Articulate, encourage acceptance of and evaluate fulfillment of
social responsibilities by members of the organization or group.
 Manage personnel and resources to enhance the quality of
working life.

11
Continue……………

Articulate, apply, and support policies and processes that reflect


the principles of the Code
 Create opportunities for members of the organization or
group to grow as professionals.
 Use care when modifying or retiring systems. Interface changes,
the removal of features, and even software updates have an
impact on the productivity of users and the quality of their work.
 Recognize and take special care of systems that become
integrated into the infrastructure of society.

12
Digital privacy

o Digital Privacy is the protection of personally identifiable


or business identifiable information that is collected from
respondents through information collection activities or
from other sources.
o It is a collective definition that encompasses three sub-
related categories; information privacy, communication
privacy, and individual privacy

13
Continue……………

o It is often used in contexts that promote advocacy on


behalf of individual and consumer privacy rights in digital
spheres, and is typically used in opposition to the business
practices of many e-marketers/businesses/companies to
collect and use such information and data.

14
Information Privacy

 information privacy is the notion that individuals should


have the freedom, or right, to determine how their digital
information, mainly that pertaining to personally
identifiable information, is collected and used. Every
country has various laws that dictate how information may
be collected and used by companies.

15
Communication Privacy

o communication privacy is the notion that individuals


should have the freedom, or right, to communicate
information digitally with the expectation that their
communications are secure; meaning that messages and
communications will only be accessible to the sender's
original intended recipient.

16
Continue……………

o communications can be intercepted or delivered to other


recipients without the sender's knowledge, in a multitude of
ways. Communications can be intercepted directly through
various hacking methods; this is expanded upon further below.
o Communications can also be delivered to recipients
unbeknownst to the sender due to false assumptions made
regarding the platform or medium which was used to send
information.
17
Individual Privacy

individual privacy is the notion that individuals have a right


to exist freely on the internet, in that they can choose
what types of information they are exposed to, and more
importantly that unwanted information should not interrupt
them

18
digital privacy principles

 Data Minimization: collect the minimal amount of information


necessary from individuals and businesses consistent with
the Department’s mission and legal requirements.
 Transparency: Notice covering the purpose of the collection
and use of identifiable information will be provided in a clear
manner. Information collected will not be used for any other
purpose unless authorized or mandated by law.
19
Continue……………

 Accuracy: Information collected will be maintained in a sufficiently


accurate, timely, and complete manner to ensure that the
interests of the individuals and businesses are protected.

 Security: Adequate physical and IT security measures will be


implemented to ensure that the collection, use, and maintenance
of identifiable information are properly safeguarded and the
information is promptly destroyed in accordance with approved
records control schedules.

20
Accountability and trust
 When emerging technology creates far-reaching and rapid change,
it can also bring new risks. Understanding and mitigating them will
help to build confidence.
 Emerging technologies can provide improved accuracy, better
quality and cost efficiencies for businesses in every sector. They
can enhance trust in the organization’s operations and financial
processes, which is crucial for sustainable success. But this can
produce a paradox:

21
Ethical and regulatory challenges

 Counter-terrorism and law enforcement informatics via


predictive analytics and artificial intelligence.
 Real-time horizon scanning and data mining for threats and
information sharing
 Automated cybersecurity and information assurance
 Enhanced Surveillance (chemical and bio-detection sensors,
cameras, drones, facial recognition, license plate readers)

22
Continue……………

 Simulation and augmented reality technologies for


training and modeling
 Safety and security equipment (including bullet and bomb
proof) made with lighter and stronger materials
 Advanced forensics enabled by enhanced computing
capabilities (including future quantum computing)

23
Continue……………

 Situational awareness capabilities via GPS for disaster


response and crisis response scenarios
 Biometrics: assured identity security screening solutions by
bio-signature: (every aspect of your physiology can be used as
a bio-signature. Measure unique heart/pulse rates,
electrocardiogram sensor, blood oximetry, skin temperature)
 Robotic Policing (already happening in Dubai!)
24
Challenges in using Artificial Intelligence

AI is only as good as the data it is exposed to, which is where


certain challenges may present themselves. How a business
teaches and develops its AI will be the major factor in its
usefulness. Humans could be the weak link here, as people are
unlikely to want to input masses of data into a system
Another dilemma that comes along with AI is its potential to
replace human workers. As machines become more “intelligent”
they could begin to replace experts in higher-level jobs. .

25
Challenges in using Robotics in manufacturing

With automation and robotics moving from production lines out


into other areas of work and business, the potential for humans
losing jobs is great here too. As automation technologies
become more advanced, there will be a greater capability for
automation to take over more and more complex jobs. As
robots learn to teach each other and themselves, there is the
potential for much greater productivity but this also raises
ethical and cyber security concerns.
26
Challenges in using the Internet of Things

As more and more connected devices (such as smart


watches and fitness trackers) join the Internet of Things
(IoT) the amount of data being generated is increasing.

27
Challenges in Big Data

Almost all the technologies mentioned above have some


relation to Big Data. The huge amount of data being
generated on a daily basis has the potential to provide
businesses with better insight into their customers as well
as their own business operations.

28
Treats
New and emerging technologies pose significant opportunities for
businesses if they utilize them well and understand their true value
early on.
Driverless car: while a compelling option for future fleer cars,
Wearables: Google glass, Fitbit and other wearables can expose
companies to the invasion of privacy claims that may not be
covered by general liability or personal injury claims that weren’t
foreseen.

29
Continue……………

Drones: Turbulence is in the offing for manufacturers and


organizations that fail to protect themselves for property damage
and bodily injury, as well as errors and omissions.
Internet of things: The proliferation of sensors and cross-platform
integration creates potential exposure from privacy invasion,
bodily injury and property damage that may connect an
organization to huge liabilities.

30
Thank
Thank You
You ...
...

31
Quiz 5%

1) Write the three sub-related categories of digital privacym


information privacy, communication privacy, and
individual privacy 2%
2) List digital privacy principles 2%
3) Individual Privacy 1%

32

You might also like