0% found this document useful (0 votes)
19 views

Chapter 6

Chapter 6 of the document discusses the ethics and professionalism related to emerging technologies, emphasizing the importance of digital privacy, accountability, and trust. It outlines general ethical principles, professional responsibilities, and the challenges posed by new technologies such as AI and big data. The chapter also highlights the potential risks associated with emerging technologies, including privacy invasions and liability issues.

Uploaded by

Ali Hussen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Chapter 6

Chapter 6 of the document discusses the ethics and professionalism related to emerging technologies, emphasizing the importance of digital privacy, accountability, and trust. It outlines general ethical principles, professional responsibilities, and the challenges posed by new technologies such as AI and big data. The chapter also highlights the potential risks associated with emerging technologies, including privacy invasions and liability issues.

Uploaded by

Ali Hussen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Werabe University

Institute of Technology

Introduction to Emerging
Technologies

Chapter 6:
ETHICS AND PROFESSIONALISM
OF EMERGING TECHNOLOGIES

1
Objectives of the chapters:
• After the successfully completing this chapter, the
students be able to:
o Distinguish the link between ethics and
technology
o Understand general, professional and leadership
ethical questions
o Explain what digital privacy is, its components
and why it is important.
o Know the importance of accountability and trust
in emerging technologies.
o Identify the threats and challenges we face in
developing and utilizing emerging technologies.

2
Technology and Ethics
• Importance of Internet as a technology:
o Provide new tools and new ways for
people to interact.
• However brought a drawback Like:
o New concerns about privacy

o Spam and viruses

o Digital divide across the universe.

3
Cont’d…
• Technology can serve to promote or
restrict human rights.
• The Information Society should foster
the use of emerging technologies in
such a way as to maximize the
benefits that they provide while
minimizing the harms.

4
Cont’d…
• Ethics is particularly important for the
accountancy profession, with a code for
professional ethics based on five basic
principles
1. Integrity
2. Objectivity
3. Competence and due care
4. Confidentiality
5. Professional behavior
• However, the emergence of new technologies raises
some new challenges for the profession to address.

5
Ethical questions related
emerging technology
Ethics in Big data:
• The increasing use of

Big data

Algorithmic decision-making

Artificial intelligence can enable more


o consistent
o evidence-based
o accurate judgments or decisions

• Nevertheless the concern still remains how we could


possibly and ethically use the emerging new
technologies. 6
General ethical principles
1. Contribute to society and to human well-
being, acknowledging that all people are
stakeholders in computing
2. Avoid harm
3. Be honest and trustworthy
4. Be fair and take action not to
discriminate
5. Respect the work required to produce
new ideas, inventions, creative works,
and computing artifacts.
6. Respect privacy
7. Honor confidentiality 7
Professional responsibilities
1. Strive to achieve high quality in both the processes
and products of professional work.
2. Maintain high standards of professional competence,
3. Know and respect existing rules pertaining to
professional work.
4. Accept and provide appropriate professional review.
5. Give comprehensive and thorough evaluations of
computer systems and their impacts, including analysis
of possible risks.
6. Perform work only in areas of competence.
7. Foster public awareness and understanding of
computing, and their consequences.
8. Access computing and communication resources only
when authorized or when compelled by the public good.
9. Design and implement systems that are robustly and
usably secure
8
Professional leadership principles
1. Ensure that the public good is the central concern
during all professional work
2. Articulate, encourage acceptance and evaluate
fulfillment of social responsibilities
3. Manage personnel and resources to enhance the quality
of working life
4. Articulate, apply, and support policies and processes that
reflect the principles of the Code
5. Create opportunities for members of the organization to
grow as professionals
6. Use care when modifying or retiring systems. Interface
changes, the removal of features, and even software
updates have an impact on the productivity of users and
the quality of their work
7. Recognize and take special care of systems that become
integrated into the infrastructure of society
9
Digital privacy
• It is the protection of personally
identifiable or business
identifiable information that is
collected from respondents through
information collection activities or
from other sources.
• It encompasses three sub-related
categories;
1. Information privacy
2. Communication privacy
3. Individual privacy 10
Information Privacy
• It is the notion that individuals should
have the freedom, or right, to
determine how their digital
information, mainly that pertaining to
personally identifiable information, is
collected and used.
• Every country has various laws that
dictate how information may be
collected and used by companies.

11
Communication Privacy
• It is the notion that individuals should have
the freedom, or right, to communicate
information digitally with the expectation
that their communications are secure;
o meaning that messages and communications
will only be accessible to the sender's
original intended recipient.
• However, communications can be
intercepted or delivered to other recipients
without the sender's knowledge, in a
multitude of ways such as hacking.

12
Individual Privacy
• It is the notion that individuals have a
right to exist freely on the internet
o in that they can choose what types of
information they are exposed to, and
o more importantly that unwanted
information should not interrupt them.
• An example of a digital breach of
individual privacy would be an internet
user receiving unwanted ads and
emails/spam, or a computer virus that
forces the user to take actions they
otherwise wouldn't. 13
Digital privacy principles
1. Data Minimization:
o collect the minimal amount of information with
the Department’s mission and legal requirements.
2. Transparency:
o Information collected will not be used for any
other purpose unless authorized or mandated
by law.
3. Accuracy:
o Information collected will be maintained in a
sufficiently accurate, timely, and complete
manner.
4. Security:
o adequate physical and IT security measures
will be implemented to ensure properly
safeguarded the information 14
Accountability and trust
• When emerging technology creates far-
reaching and rapid change, it can also
bring new risks.
• Understanding and mitigating them will
help to build confidence.
• Emerging technologies can provide:
o improved accuracy
o better quality
o cost efficiencies for businesses in every
sector.

15
Ethical and regulatory challenges
• Emerging technologies are already impacting how
we live and work.
• They're also changing how we approach, plan, and
integrate security operations which include:
1. Counter-terrorism and law enforcement informatics
via predictive analytics and artificial intelligence.
2. Real-time horizon scanning and data mining for
threats and information sharing
3. Automated cybersecurity and information
assurance
4. Enhanced Surveillance (chemical and bio-detection
sensors, cameras, drones, facial recognition,
license plate readers)
5. Simulation and augmented reality technologies for
training and modeling 16
…Ethical and regulatory
challenges
6. Safety and security equipment (including
bullet and bomb proof) made with lighter and
stronger materials
7. Advanced forensics enabled by enhanced
computing capabilities (including future
quantum computing)
8. Situational awareness capabilities via GPS for
disaster response and crisis response
scenarios
9. Biometrics: assured identity security
screening solutions by bio-signature:
10.Robotic Policing (already happening in
Dubai!) 17
Challenges
•Challenges in using Artificial Intelligence
•Challenges in using Robotics in
manufacturing
•Challenges in using the Internet of Things
•Challenges in Big Data

18
Cont’d…
Some risks of emerging technology are:
• Driverless car: company could crash
and burn from errors resulted to
bodily injury and property damage.
• Wearables: Google glass, Fitbit and
other wearables can expose
companies to the invasion of privacy
claims that may not be covered by
general liability or personal injury
claims that weren’t foreseen.
19
Cont’d…
• Drones: Turbulence is in the offing for
manufacturers and organizations that
fail to protect themselves for property
damage and bodily injury, as well as
errors and omissions.
• Internet of things: The proliferation of
sensors and cross-platform integration
creates potential exposure from privacy
invasion, bodily injury and property
damage that may connect an
organization to huge liabilities.
20
END!!

21

You might also like