Chapter-6 E&P
Chapter-6 E&P
1
Learning outcomes
After completing this lesson you should be able to
2
Technology and Ethics
● The Internet boom has provided many benefits for society, allowing the
creation of new tools and new ways for people to interact. As with many
technological advances, however, the Internet has not been without
negative aspects. For example,
○ it has created new concerns about privacy.
3
From your civic and ethical education course, what do you understand about the
word ethics?
Ethics is particularly important for the accountancy profession, with a code for
professional ethics based on five basic principles
● Integrity
● Objectivity – not allow bias
● Competence and due care
● Confidentiality
● Professional behavior
4
General ethical principles
6
Professional responsibilities
7
Professional leadership
principles
1. Ensure that the public good is the central concern during all professional
computing work.
2. Articulate, encourage acceptance of and evaluate fulfillment of social
responsibilities by members of the organization or group.
3. Manage personnel and resources to enhance the quality of working life.
4. Articulate, apply, and support policies and processes that reflect the
principles of the Code.
8
Professional leadership
principles
5. Create opportunities for members of the organization or group to grow as
professionals.
6. Use care when modifying or retiring systems, Interface changes, the
removal of features, and even software updates have an impact on the
productivity of users and the quality of their work.
7. Recognize and take special care of systems that become integrated into
the infrastructure of society.
9
Digital privacy
Digital Privacy is the protection of personally
identifiable or business identifiable information
that is collected from respondents through information collection activities or
from other sources.
Three sub-related categories
○Information privacy
○Communication privacy
○Individual privacy
10
Contd..
● Information privacy : The notion that individuals should have the freedom,
or right, to determine how their digital information, mainly that pertaining to
personally identifiable information, is collected and used.
● Communication privacy :The notion that individuals should have the
freedom, or right, to communicate information digitally with the expectation
that their communications are secure.
● Individual privacy: The notion that individuals have a right to
exist freely on the internet, in that they can choose what types of
information they are exposed to, and more importantly that
unwanted information should not interrupt them. 11
Some digital privacy
principles
● Data Minimization: collect the minimal amount of
information from individuals and businesses consistent with legal
requirements.
● Transparency: Collection and use of identifiable information will be
provided in a clear manner and mandated by law.
● Accuracy: Information collected will be maintained in a sufficiently accurate,
timely, and complete manner.
● Security: Adequate physical and IT security measures will be implemented to
ensure that the collection, use, and maintenance of identifiable information.
12
Accountability and Trust
● The challenge is worsened by the speed at which technological change is
occurring and the breadth of its adoption – which is introducing new risks
that demand new responses.
● Emerging technologies can provide improved accuracy, better quality and
cost efficiencies for businesses in every sector. They can enhance trust in
the organization’s operations and financial processes, which is crucial for
sustainable success.
● But this can produce a paradox: the very solutions that can be used to
better manage risk, increase transparency and build confidence are often
themselves the source of new risks, which may go unnoticed.
13
Threats and Challenges
Emerging technologies are making an impact include:
1. Counter-terrorism and law enforcement informatics via predictive
analytics and artificial intelligence.
2. Real-time horizon scanning and data mining for threats and information
sharing.
3. Automated Cyber security and information assurance.
4. Enhanced Surveillance (chemical and bio-detection sensors, cameras,
drones, facial recognition, license plate readers).
5. Simulation and augmented reality technologies for training and modeling.
14
Contd….
6. Safety and security equipment (including bullet and bomb proof) made
with lighter and stronger materials
7. Advanced forensics enabled by enhanced computing capabilities (including
future quantum computing)
8. Situational awareness capabilities via GPS for disaster response and crisis
response scenarios
9. Biometrics: assured identity security screening solutions by bio-signature:
(every aspect of your physiology can be used as a bio-signature. Measure
unique heart/pulse rates, electrocardiogram sensor, blood oximetry, skin
temperature)
15
10. Robotic Policing (already happening in Dubai!)
Challenges in using Artificial Intelligence
16
Challenges in using Robotics in
manufacturing
● With automation and robotics moving from
production lines out into other areas of work and business,
the potential for humans losing jobs is great here too.
● As automation technologies become more advanced, there will be a
greater capability for automation to take over more and more complex jobs.
● As robots learn to teach each other and themselves, there is the potential
for much greater productivity but this also raises ethical and cyber security
concerns.
17
Challenges in using the Internet of Things
● As more and more connected devices
(such as smart watches and fitness trackers) join the Internet of Things
(IoT) the amount of data being generated is increasing.
● Companies will have to plan carefully how this will affect the customer-
facing application and how to best utilize the masses of data being produced.
● There are also severe security implications of mass connectivity that need to
be addressed.
18
Challenges in Big Data
● Wearables: Google glass, Fitbit and other wearables can expose companies
to the invasion of privacy claims that may not be covered by general
liability or personal injury claims that weren’t foreseen.
20
Some risks of emerging
technology:
● Drones: Turbulence is in the offing for
manufacturers and organizations that
fail to protect themselves for property damage and bodily injury, as well as
errors and omissions.