0% found this document useful (0 votes)
16 views

Emerging Individual Assignment

The document discusses ethics and professionalism related to emerging technologies. It covers topics like technology and ethics, digital privacy, accountability and trust, and threats and challenges of emerging technologies. It provides objectives, definitions of key concepts, and principles related to ethics of emerging technologies.

Uploaded by

Sani Mohammed
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Emerging Individual Assignment

The document discusses ethics and professionalism related to emerging technologies. It covers topics like technology and ethics, digital privacy, accountability and trust, and threats and challenges of emerging technologies. It provides objectives, definitions of key concepts, and principles related to ethics of emerging technologies.

Uploaded by

Sani Mohammed
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Unity University

Department of Architecture and Urban


Planning (Regular)
Title: Ethics and Professionalism of Emerging
Technologies
Section: AR1R1N2/14

Submitted By:
Name: Sani Mohammed
Id Number: UU89349R

Submitted to:
Name: Ins. Yohannes. K

Paper due date:


November 4, 2022
Addis Ababa, Ethiopia
Emerging Technology Individual Assignment November 5, 2006

Table of Contents
Introduction ................................................................................................................................................... 3
Chapter six .................................................................................................................................................... 4
Ethics And Professionalism of Emerging Technologies ............................................................................... 4
Technology and ethics .............................................................................................................................. 4
New ethical questions ........................................................................................................................... 4
General ethical principles...................................................................................................................... 4
Professional responsibilities .................................................................................................................. 5
Professional leadership principles ......................................................................................................... 5
Digital Privacy .......................................................................................................................................... 5
Information privacy .............................................................................................................................. 6
Communication privacy ........................................................................................................................ 6
Individual Privacy ................................................................................................................................. 6
Some digital privacy principles............................................................................................................. 7
Accountability and Trust........................................................................................................................... 7
Treats and Challenges ............................................................................................................................... 7
Ethical and regulatory challenges ......................................................................................................... 7
Treats..................................................................................................................................................... 9
Summery ..................................................................................................................................................... 10
References .................................................................................................................................................. 11

Prepared By Sani Mohammed Page 2


Emerging Technology Individual Assignment November 5, 2006

Introduction
Other emerging technologies, the seventh chapter of the emerging technology teaching module
(pp. 108–138), was written by Yonasa Tesfaye and assembled/edited by Tesfahunegn Minwuylet
(MSC). The other emerging technology are discussed in this book chapter along with the general
concepts; histories and applications of the emerging technology; nanotechnology, biotechnology,
blockchain technology, cloud and quantum computing, autonomic computing, computer vision,
embeded systems, cybersecurity, and also discussed about additive manufacturing (3d printing).

Prepared By Sani Mohammed Page 3


Emerging Technology Individual Assignment November 5, 2006

Chapter six

Ethics And Professionalism of Emerging Technologies


Objectives
❖ Identify how ethics and technology are related.
❖ Recognize general, professional, and ethical issues in leadership.
❖ Describe the importance of digital privacy and its components.
❖ Understand the significance of transparency and confidence in developing technology.
❖ Determine the risks and difficulties we will encounter while creating and implementing
emerging technologies.
Technology and ethics
Technology has the potential to either advance or impede human rights. The information society
should encourage the use of new technologies in a way that maximizes their positive effects
while limiting their negative ones. With a code of professional ethics founded on five
fundamental principles, the accounting profession places a premium on ethics. These are
honesty, objectivity, competence, and due diligence Confidentiality and professional conduct.

New obstacles for the profession are raised by the development of new technology, nevertheless.

New ethical questions


Big data, algorithmic decision-making, and artificial intelligence are all being used more
frequently and effectively, which can lead to conclusions and judgments that are more consistent,
supported by evidence, and correct. These advantages could, however, also have a negative side,
raising concerns about the morality of using these relatively recent technologies.

Concerns are being raised about how machines and people interact.

➢ How much can we rely on the data and models?


➢ What function does human judgment serve?
➢ How can we be sure we comprehend the process of making decisions?
➢ No matter how powerful the machine, humans will still be required in order to hold
people accountable or to provide an explanation for a decision.
General ethical principles
1. Contribute to society and the welfare of individuals, understanding that everyone has a
stake in computers.
2. Prevent injury.
3. Be trustworthy and sincere.
4. Act impartially and non-discriminatorily.
5. honor the labor that goes into creating original thoughts, inventions, works of art, and
computing artifacts.
6. Honor your privacy.

Prepared By Sani Mohammed Page 4


Emerging Technology Individual Assignment November 5, 2006

7. Respect confidentiality
Professional responsibilities
1. Strive for excellence in all professional work-related procedures and outputs.
2. Uphold the highest levels of professionalism, ethics, and behavior.
3. recognize and abide by the laws that govern professional work.
4. accept and offer the necessary professional review.
5. provide in-depth analyses of potential dangers along with extensive reviews of
computer systems and their effects.
6. Only work in your areas of expertise.
7. promote public knowledge of computing, related technologies, and the effects of
each.
8. Use computing and communication resources only when permitted or required for the
general welfare.
9. Create and put into use security systems that are resilient and easy to use.
Professional leadership principles
1. Make sure that the public interest guides every work done by professionals in
computing.
2. Explain, promote, and assess how well group or organization members are fulfilling
their social obligations.
3. manage staff and resources to improve the standard of living at work.
4. express, implement, and support policies and procedures that adhere to the code's
guiding principles.
5. provide members of the club or organization with opportunities to advance their
careers.
6. when changing or retiring systems, exercise caution. Interface modifications, the
deletion of
7. Both the productivity of users and the caliber of their work are impacted by features
and even software updates.
8. Recognize systems that are incorporated into society's infrastructure and give them
extra attention.
Digital Privacy
➢ The protection of personally identifiable information or business identifying information
obtained from respondents through information collection operations or from other
sources is known as "digital privacy."
➢ Information privacy, communication privacy, and individual privacy are three sub-related
categories that make up the collective definition.
➢ It is frequently used in settings that support activism on behalf of consumer and
individual privacy rights in digital worlds and is frequently used in opposition to the
commercial practices of many e-marketers, enterprises, and companies to gather and use
such information and data.

Prepared By Sani Mohammed Page 5


Emerging Technology Individual Assignment November 5, 2006

Information privacy
➢ Information privacy refers to the idea that people should be able to choose how their
digital information, particularly that which relates to personally identifiable information,
is gathered and used.
➢ Every nation has different rules that specify how information may be gathered and
utilized by businesses. Some of those laws were drafted to give persons' and customers'
preferences for the use of their data agency.
➢ Some claim that privacy laws in other countries, such as the United States, are less
established in this area. For instance, certain laws, or a lack thereof, permit businesses to
self-regulate their procedures for gathering and disseminating consumer information.
Communication privacy
• Communication privacy is the idea that people should be allowed to exchange
information digitally with the expectation that their communications won't be read by
anyone else.
• Communications are secure, which means that only the intended recipient of the message
will be able to access it.
• However, there are several ways that communications can be intercepted or sent to other
receivers without the sender's awareness.
• Communications can be directly intercepted using a variety of hacking techniques; this is
covered in more detail below.
• Due to erroneous assumptions made about the platform or medium that was used to
communicate the information, communications might also be delivered to recipients
without the knowledge of the sender.
• For instance, failing to read a company's privacy statement before using their platform
could lead a user to believe their communication is secure when it is actually not.
• Additionally, businesses typically lack openness in how they use information; this can be
done on purpose or accidentally.
• Discussion of communication privacy must take into account technological means of
securing data or communication across digital mediums,
• The advancement of new and existing technologies, as well as the efficacy and inefficacy
of such methods and systems.
Individual Privacy

➢ Individual privacy refers to the idea that people have the freedom to use the internet
without being bothered by unwanted information and the ability to choose what
information they are exposed to.
➢ An internet user receiving unwelcome adverts and emails/spam, or a computer virus
that compels the user to conduct acts they otherwise wouldn't, are examples of digital
invasions of personal privacy.

Prepared By Sani Mohammed Page 6


Emerging Technology Individual Assignment November 5, 2006

➢ In these situations, the person's digital existence is interrupted by undesired


information; as a result, their personal privacy has been violated.
Some digital privacy principles
✓ Data minimization refers to gathering only the information required from people and
organizations in accordance with the mission of the department and applicable laws.
✓ Transparency: a clear explanation of the reason for the collection and use of personally
identifiable information will be given. Unless specifically permitted or required by law,
the information collected won't be used for any other reason.
✓ Accuracy: the information gathered will be kept in a timely, full, and accurate manner
to guarantee that the interests of the people and enterprises are protected. Security
measures shall be put in place to guarantee that the collection, use, and maintenance of
personally identifiable information is appropriately safeguarded and that the
information is quickly destroyed in compliance with approved records control
schedules.
Accountability and Trust
✓ Emerging technology can benefit companies in any industry by improving accuracy,
quality, and cost-efficiency.
✓ They can increase the organization's stakeholders' confidence in its operational and
financial procedures, which is essential for long-term success. However, this can lead to
a paradox: frequently, the very solutions that can be utilized to improve risk
management, boost transparency, and foster confidence are also the sources of new
hazards that might go unreported.
✓ A person or organization has a responsibility to account for their actions, take
responsibility for them, and be transparent about the repercussions of those actions. It
also entails being in charge of cash or other assets that have been entrusted to you.
Treats and Challenges
Ethical and regulatory challenges
➢ As security experts, we must stay abreast of the rapidly advancing technologies, like ai,
IOT, big data, machine learning, etc.
➢ Growing demands the importance of cyber and data security is increasing, thus security
professionals must concentrate on the need for data security from a business viewpoint.
They must also comprehend security and risk by regularly connecting with the business
community to understand their needs and goals.
➢ The way we live and work is already being impacted by emerging technologies.
➢ They are also altering the way we organize, plan, and conduct security operations.
➢ The same equation applies to both physical and cyber security, spurring a wide range of
new potential uses for cutting-edge technologies.
Emerging technologies are making an impact include:

Prepared By Sani Mohammed Page 7


Emerging Technology Individual Assignment November 5, 2006

1. Use of artificial intelligence and predictive analytics in law enforcement and


counterterrorism.
2. Real-time danger detection and information exchange through horizon scanning and
data mining; automated information assurance; and cyber security.
3. Expanded monitoring (chemical and bio-detection sensors, cameras, drones, facial
recognition, license plate readers)
4. Technologies that use simulation and augmented reality for modeling and training
equipment for safety and security (such as bomb- and bullet-proof models) made of
lighter, more durable materials.
5. Improved computational capabilities enable advanced forensics (including future
quantum computing).
6. GPS-based situational awareness capabilities for emergency and catastrophe situations
it is possible to use every part of your physiology as a biosignature thanks to
biometrics, which provide guaranteed identity security screening solutions. Measure
various heart and pulse rates with a sensor for an ecg, blood oximetry, and skin
temperature.
7. Robotic law enforcement (already in use in Dubai!)

Challenges in using artificial intelligence


➢ Ai is only as good as the data it is exposed to; thus, this is where some difficulties could
arise.
➢ In contrast, ai also has the potential to relieve these people of the burden of difficult and
time-consuming tasks, freeing up their time and brainpower for other tasks. For
instance, doctors using diagnostic ai to help them diagnose patients will analyze the
data presented by the ai and make the final decision.
➢ In order to fully exploit the benefits and reduce risks, managing the difficulties provided
by ai will require careful preparation.
Challenges in using robotics in manufacturing
➢ The possibility of losing one's job to automation and robotics as they spread beyond
production lines into other spheres of work and commerce is high.
➢ Automation will have a greater capacity to take over increasingly difficult jobs as
automation technologies improve.
➢ Although there is the potential for significantly higher productivity as robots learn to
teach themselves and one another, this also poses ethical and cyber security problems.
Fundamental of information
System challenges in using the internet of things
➢ The amount of data created is growing as more and more connected devices (such smart
watches and fitness trackers) join the internet of things (IOT).

Prepared By Sani Mohammed Page 8


Emerging Technology Individual Assignment November 5, 2006

➢ Companies must carefully consider how this will impact the customer-facing
application and how to make the greatest use of the massive amounts of data being
produced.
➢ Additionally, there are serious security consequences of widespread connectivity that
must be addressed.
Challenges in big data
➢ Nearly all of the aforementioned technologies are somewhat related to big data.
➢ The enormous amount of data being produced every day has the potential to give
businesses improved insight into both their own business operations and their
customers.
➢ Although data can be very helpful for identifying trends and assessing implications, it
can be difficult to present all of this data to humans in a way that they can understand.
Ai will be involved in this.
Treats
• New and developing technologies present important potential for businesses if they make
good use of them and recognize their full value early on, but they also carry risks and
raise concerns for society as a whole.
• Businesses that wish to succeed in the era of ai, big data, and IOT must plan for how to
cope with these coming technologies and where value may be obtained while analyzing
possible hazards before they become fully realized realities.
Some risks of emerging technology are:
➢ Driverless car: while an appealing alternative for future vehicles, businesses may face
financial ruin due to allegations of property damage and bodily harm.
➢ Wearables: google glass, Fitbit, and other wearables might expose businesses to
personal injury claims that weren't anticipated or invasion of privacy claims that may
not be protected by general liability.
➢ Drones: manufacturers and businesses that don't take precautions to guard against errors
and omissions, property damage, and bodily injury are setting themselves up for
trouble.
➢ Internet of things: the spread of sensors and cross-platform interaction raises a risk of
privacy violation, physical harm, and property damage that might expose a company to
significant liability.

Prepared By Sani Mohammed Page 9


Emerging Technology Individual Assignment November 5, 2006

Summery

Professionalism has made a lot of technological progress recently. Nevertheless, there is a cost
associated with that. There are security-related and other cyber-related issues that may have an
impact on a person's ethics and morals, as well as those of a community and, eventually, a
nation. It is up to us to decide whether it will be a bridge or a knife to our success and riches.
Emerging enabling technologies, which are anticipated to spur waves of innovation across
several societal sectors and give rise to a wide range of ethical problems, are the main focus of
the ethics of emerging technologies. There has been a significant shift in recent decades toward
the ethics of developing technologies, despite the better epistemic position of the ethics of
established technologies and the wider range of issues that they can address. This is so because,
in terms of ethics, new technologies offer one major advantage over established ones: the
capacity for early involvement in the creative process. There has been a significant shift in recent
decades toward the ethics of developing technologies, despite the superior epistemic position of
the ethics of established technologies and the wider variety of issues that it can address. This is
so because, in terms of ethics, new technologies offer one major advantage over established
ones: the capacity for early involvement in the creative process. It is highly difficult to make
substantial modifications to a technology's general design and social embedding once billions
have been spent to build it in a specific way, and as a result, it gets entrenched in society.
Emerging technology ethics hold up the possibility of early involvement when technology is still
pliable and there is still a wide range of options for its growth and societal integration. The cost
of this change in emphasis is that the ethicist now has a more constrained set of empirical
evidence to work with and is subject to a great deal of uncertainty regarding potential
developments and effects.

As a conclusion, we can claim that being informed and becoming more knowledgeable may help
us lower our risk and accomplish our goals.

Prepared By Sani Mohammed Page 10


Emerging Technology Individual Assignment November 5, 2006

References
Tesfahunegn Minwuyelet (MSC), Makonnen Wagaw (Ph.D.) and Yonnasa Tesfaye (MSc) . (November
2019). Introduction to Emerging Technologies Course Module .

Watters, A. (2021, July 01). 5 Ethical Issues in Technology to Watch for in 2021. Retrieved from CompTIA:
https://connect.comptia.org/blog/ethical-issues-in-technology

Prepared By Sani Mohammed Page 11

You might also like