ETCh 6
ETCh 6
AA,Ethiopia.
Introduction
In the previous chapters, emerging technologies like data science/big data,
artificial intelligence, internet of things and augmented reality were
discussed. After having a discussion on all of the above emerging
technologies, it is time to study their connection with our ethical values as
well as social values. In this chapter, the connection of emerging
technologies with professional ethics, privacy, accountability, trust was
discussed.
Finally, the threats and challenges of emerging technologies will be
explained.
After accomplishing this chapter, students will be able to:
Explain what digital privacy is, its components and why it is important.
emerging technologies.
Technology and ethics
society, allowing the creation of new tools and new ways for people to
For example, it has created new concerns about privacy, and it has been
medium for communication across the globe, it threatens to cut off people
maximize the benefits that they provide while minimizing the harms. In
that technology capable of abuse is not in fact abused and that the benefits of
For example, outputs can be based on biased data, which could lead to
discriminatory outcomes. Indeed, where systems learn from real-world data,
there is a significant risk that those systems simply recreate the past and
subsequently build in errors or systemic biases. Closely linked to discrimination
is personalization, and the impact of tailoring decisions very specifically to
individuals, based on preferences, activities and other features. While this can be
beneficial for many, others can lose out, and outcomes can again seem unfair or
unethical.
Cont…
Additionally, questions are being asked regarding the interaction between
computers and humans. How much reliance can we place on data and
models, and what is the role of human judgment, as well as how do we
ensure that we understand the decision-making process? Whatever the
power of the machine, humans will still need to be involved, so that
people can be held accountable, or explain the reasons behind a decision.
Cont…
• A central problem of the ethics of technology is that it tends to arrive too late. In
many cases, ethical issues are only recognized when the technology is already on
the market and problems arise during its widespread use. Ethics can then become
a tool to clean up a mess that might have been avoidable. It is probably not
contentious to say it would be desirable to have ethical input at the earlier stages
of technology design and development. Indeed, there are ethical theories and
approaches that explicitly aim at an early integration of ethics into the
technology life cycle.
Cont…
One central problem of this type of approach is that the future is unknown. By
definition, we do not know with certainty what will happen in the future and
ethics that relies on future development needs to be able to answer the
question of how it decides which technological developments to pursue.
Ethics has traditionally not been well equipped to deal with issues of
uncertainty and, in particular, future uncertainty.
General ethical principles
1. Contribute to society and to human well-being, acknowledging that all
people are stakeholders in computing. 2. Avoid harm.
o Be honest and trustworthy.
o Be fair and take action not to discriminate
o Respect the work required to produce new ideas, inventions, creative
works, and computing artifacts.
o Respect privacy.
o Honor confidentiality
Professional responsibilities.
Strive to achieve high quality in both the processes and products of
professional work.
Maintain high standards of professional competence, conduct, and ethical
practice.
Know and respect existing rules pertaining to professional work.
Accept and provide appropriate professional review.
Perform work only in areas of competence.
Cont…
Give comprehensive and thorough evaluations of computer systems and
their impacts, including analysis of possible risks.
Foster public awareness and understanding of computing, related
technologies, and their consequences.
Access computing and communication resources only when authorized or
when compelled by the public good.
Design and implement systems that are robustly and usably secure.
Professional leadership principles.
Ensure that the public good is the central concern during all professional
computing work.
Articulate, encourage acceptance of and evaluate fulfillment of social
responsibilities by members of the organization or group.
Manage personnel and resources to enhance the quality of working life.
Articulate, apply, and support policies and processes that reflect the
principles of the Code.
Cont…
Create opportunities for members of the organization or group to grow as
professionals.
Use care when modifying or retiring systems. Interface changes, the
removal of features, and even software updates have an impact on the
productivity of users and the quality of their work.
Recognize and take special care of systems that become integrated into the
infrastructure of society.
Digital privacy
Digital Privacy is the protection of personally identifiable or business
identifiable information that is collected from respondents through
information collection activities or from other sources.
It is a collective definition that encompasses three sub-related categories;
information privacy, communication privacy, and individual privacy It is
often used in contexts that promote advocacy on behalf of individual and
consumer privacy rights in digital spheres, and is typically used in opposition
to the business practices of many e-marketers/businesses/companies to
collect and use such information and data.
Information Privacy
In the context of digital privacy, information privacy is the notion that individuals
should have the freedom, or right, to determine how their digital information, mainly
that pertaining to personally identifiable information, is collected and used. Every
country has various laws that dictate how information may be collected and used by
companies.
Some of those laws are written to give agency to the preferences of
individuals/consumers in how their data is used. In other places, like in the United
States, privacy law is argued by some to be less developed in this regard, For
example, some legislation, or lack of, allows companies to self-regulate their
collection and dissemination practices of consumer information.
Communication Privacy
• In the context of digital privacy, communication privacy is the notion that
individuals should have the freedom, or right, to communicate information
digitally with the expectation that their communications are secure; meaning
that messages and communications will only be accessible to the sender's
original intended recipient. However, communications can be intercepted or
delivered to other recipients without the sender's knowledge, in a multitude
of ways. Communications can be intercepted directly through various
hacking methods; this is expanded upon further below.
Cont…