Emerging Individual Assignment
Emerging Individual Assignment
Submitted By:
Name: Sani Mohammed
Id Number: UU89349R
Submitted to:
Name: Ins. Yohannes. K
Table of Contents
Introduction ................................................................................................................................................... 3
Chapter six .................................................................................................................................................... 4
Ethics And Professionalism of Emerging Technologies ............................................................................... 4
Technology and ethics .............................................................................................................................. 4
New ethical questions ........................................................................................................................... 4
General ethical principles...................................................................................................................... 4
Professional responsibilities .................................................................................................................. 5
Professional leadership principles ......................................................................................................... 5
Digital Privacy .......................................................................................................................................... 5
Information privacy .............................................................................................................................. 6
Communication privacy ........................................................................................................................ 6
Individual Privacy ................................................................................................................................. 6
Some digital privacy principles............................................................................................................. 7
Accountability and Trust........................................................................................................................... 7
Treats and Challenges ............................................................................................................................... 7
Ethical and regulatory challenges ......................................................................................................... 7
Treats..................................................................................................................................................... 9
Summery ..................................................................................................................................................... 10
References .................................................................................................................................................. 11
Introduction
Other emerging technologies, the seventh chapter of the emerging technology teaching module
(pp. 108–138), was written by Yonasa Tesfaye and assembled/edited by Tesfahunegn Minwuylet
(MSC). The other emerging technology are discussed in this book chapter along with the general
concepts; histories and applications of the emerging technology; nanotechnology, biotechnology,
blockchain technology, cloud and quantum computing, autonomic computing, computer vision,
embeded systems, cybersecurity, and also discussed about additive manufacturing (3d printing).
Chapter six
New obstacles for the profession are raised by the development of new technology, nevertheless.
Concerns are being raised about how machines and people interact.
7. Respect confidentiality
Professional responsibilities
1. Strive for excellence in all professional work-related procedures and outputs.
2. Uphold the highest levels of professionalism, ethics, and behavior.
3. recognize and abide by the laws that govern professional work.
4. accept and offer the necessary professional review.
5. provide in-depth analyses of potential dangers along with extensive reviews of
computer systems and their effects.
6. Only work in your areas of expertise.
7. promote public knowledge of computing, related technologies, and the effects of
each.
8. Use computing and communication resources only when permitted or required for the
general welfare.
9. Create and put into use security systems that are resilient and easy to use.
Professional leadership principles
1. Make sure that the public interest guides every work done by professionals in
computing.
2. Explain, promote, and assess how well group or organization members are fulfilling
their social obligations.
3. manage staff and resources to improve the standard of living at work.
4. express, implement, and support policies and procedures that adhere to the code's
guiding principles.
5. provide members of the club or organization with opportunities to advance their
careers.
6. when changing or retiring systems, exercise caution. Interface modifications, the
deletion of
7. Both the productivity of users and the caliber of their work are impacted by features
and even software updates.
8. Recognize systems that are incorporated into society's infrastructure and give them
extra attention.
Digital Privacy
➢ The protection of personally identifiable information or business identifying information
obtained from respondents through information collection operations or from other
sources is known as "digital privacy."
➢ Information privacy, communication privacy, and individual privacy are three sub-related
categories that make up the collective definition.
➢ It is frequently used in settings that support activism on behalf of consumer and
individual privacy rights in digital worlds and is frequently used in opposition to the
commercial practices of many e-marketers, enterprises, and companies to gather and use
such information and data.
Information privacy
➢ Information privacy refers to the idea that people should be able to choose how their
digital information, particularly that which relates to personally identifiable information,
is gathered and used.
➢ Every nation has different rules that specify how information may be gathered and
utilized by businesses. Some of those laws were drafted to give persons' and customers'
preferences for the use of their data agency.
➢ Some claim that privacy laws in other countries, such as the United States, are less
established in this area. For instance, certain laws, or a lack thereof, permit businesses to
self-regulate their procedures for gathering and disseminating consumer information.
Communication privacy
• Communication privacy is the idea that people should be allowed to exchange
information digitally with the expectation that their communications won't be read by
anyone else.
• Communications are secure, which means that only the intended recipient of the message
will be able to access it.
• However, there are several ways that communications can be intercepted or sent to other
receivers without the sender's awareness.
• Communications can be directly intercepted using a variety of hacking techniques; this is
covered in more detail below.
• Due to erroneous assumptions made about the platform or medium that was used to
communicate the information, communications might also be delivered to recipients
without the knowledge of the sender.
• For instance, failing to read a company's privacy statement before using their platform
could lead a user to believe their communication is secure when it is actually not.
• Additionally, businesses typically lack openness in how they use information; this can be
done on purpose or accidentally.
• Discussion of communication privacy must take into account technological means of
securing data or communication across digital mediums,
• The advancement of new and existing technologies, as well as the efficacy and inefficacy
of such methods and systems.
Individual Privacy
➢ Individual privacy refers to the idea that people have the freedom to use the internet
without being bothered by unwanted information and the ability to choose what
information they are exposed to.
➢ An internet user receiving unwelcome adverts and emails/spam, or a computer virus
that compels the user to conduct acts they otherwise wouldn't, are examples of digital
invasions of personal privacy.
➢ Companies must carefully consider how this will impact the customer-facing
application and how to make the greatest use of the massive amounts of data being
produced.
➢ Additionally, there are serious security consequences of widespread connectivity that
must be addressed.
Challenges in big data
➢ Nearly all of the aforementioned technologies are somewhat related to big data.
➢ The enormous amount of data being produced every day has the potential to give
businesses improved insight into both their own business operations and their
customers.
➢ Although data can be very helpful for identifying trends and assessing implications, it
can be difficult to present all of this data to humans in a way that they can understand.
Ai will be involved in this.
Treats
• New and developing technologies present important potential for businesses if they make
good use of them and recognize their full value early on, but they also carry risks and
raise concerns for society as a whole.
• Businesses that wish to succeed in the era of ai, big data, and IOT must plan for how to
cope with these coming technologies and where value may be obtained while analyzing
possible hazards before they become fully realized realities.
Some risks of emerging technology are:
➢ Driverless car: while an appealing alternative for future vehicles, businesses may face
financial ruin due to allegations of property damage and bodily harm.
➢ Wearables: google glass, Fitbit, and other wearables might expose businesses to
personal injury claims that weren't anticipated or invasion of privacy claims that may
not be protected by general liability.
➢ Drones: manufacturers and businesses that don't take precautions to guard against errors
and omissions, property damage, and bodily injury are setting themselves up for
trouble.
➢ Internet of things: the spread of sensors and cross-platform interaction raises a risk of
privacy violation, physical harm, and property damage that might expose a company to
significant liability.
Summery
Professionalism has made a lot of technological progress recently. Nevertheless, there is a cost
associated with that. There are security-related and other cyber-related issues that may have an
impact on a person's ethics and morals, as well as those of a community and, eventually, a
nation. It is up to us to decide whether it will be a bridge or a knife to our success and riches.
Emerging enabling technologies, which are anticipated to spur waves of innovation across
several societal sectors and give rise to a wide range of ethical problems, are the main focus of
the ethics of emerging technologies. There has been a significant shift in recent decades toward
the ethics of developing technologies, despite the better epistemic position of the ethics of
established technologies and the wider range of issues that they can address. This is so because,
in terms of ethics, new technologies offer one major advantage over established ones: the
capacity for early involvement in the creative process. There has been a significant shift in recent
decades toward the ethics of developing technologies, despite the superior epistemic position of
the ethics of established technologies and the wider variety of issues that it can address. This is
so because, in terms of ethics, new technologies offer one major advantage over established
ones: the capacity for early involvement in the creative process. It is highly difficult to make
substantial modifications to a technology's general design and social embedding once billions
have been spent to build it in a specific way, and as a result, it gets entrenched in society.
Emerging technology ethics hold up the possibility of early involvement when technology is still
pliable and there is still a wide range of options for its growth and societal integration. The cost
of this change in emphasis is that the ethicist now has a more constrained set of empirical
evidence to work with and is subject to a great deal of uncertainty regarding potential
developments and effects.
As a conclusion, we can claim that being informed and becoming more knowledgeable may help
us lower our risk and accomplish our goals.
References
Tesfahunegn Minwuyelet (MSC), Makonnen Wagaw (Ph.D.) and Yonnasa Tesfaye (MSc) . (November
2019). Introduction to Emerging Technologies Course Module .
Watters, A. (2021, July 01). 5 Ethical Issues in Technology to Watch for in 2021. Retrieved from CompTIA:
https://connect.comptia.org/blog/ethical-issues-in-technology