Chapter 6 (1)
Chapter 6 (1)
04/19/2025 2
General ethical principles
1. Respect privacy.
2. Avoid harm.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate
5. Respect the work required to produce new ideas, inventions,
creative work…
6. Honor confidentiality
04/19/2025 3
Professional responsibilities
1. Strive to achieve high quality in both the processes and products of
professional work.
2. Maintain high standards of professional competence, conduct, and
ethical practice.
3. Know and respect existing rules pertaining to professional work.
4. Accept and provide appropriate professional review.
5.Give comprehensive and thorough evaluations of computer systems and
their impacts, including analysis of possible risks.
6. Perform work only in areas of competence.
7. Foster public awareness and understanding of computing, related
technologies, and their consequences.
04/19/2025 4
Cont...
8.Access computing and communication resources only when authorized
or when compelled by the public good.
9. Design and implement systems that are robustly and usably secure.
04/19/2025 5
Professional leadership principles
1. Ensure that the public good is the central concern during all professional computing
work.
2. Articulate, encourage acceptance of and evaluate fulfillment of social responsibilities
by members of the organization or group.
3. Manage personnel and resources to enhance the quality of working life.
4. Articulate, apply, and support policies and processes that reflect the principles of the
Code.
5. Create opportunities for members of the organization or group to grow as
professionals.
6. Use care when modifying or retiring systems. Interface changes, the removal of
features, and even software updates have an impact on the productivity of users and the
quality of their work.
7. Recognize and take special care of systems that become integrated into the
infrastructure of society.
04/19/2025 6
Digital privacy
Digital Privacy is the protection of personally identifiable or business
identifiable information that is collected from respondents through
information collection activities or from other sources.
It is a collective definition that encompasses three sub-related
categories; information privacy, communication privacy, and individual
privacy.
It is often used in contexts that promote advocacy on behalf of
individual and consumer privacy rights in digital domains, and
04/19/2025 7
Information Privacy
Information privacy is the notion that individuals should have the
freedom, or right, to determine how their digital information is collected
and used.
Every country has various laws that dictate how information may be
collected and used by companies.
Some of those laws are written to give agency to the preferences of
individuals/consumers in how their data is used.
In other places, like in the United States, privacy law is argued by
some to be less developed in this regard,
For example, some legislation allows companies to self-regulate their
collection and dissemination practices of consumer information.
04/19/2025 8
Communication Privacy
Communication privacy is the notion that individuals should have the
freedom, or right, to communicate information digitally with the
expectation that their communications are secure;
meaning that messages and communications will only be accessible
to the sender's original intended recipient.
Communications can be intercepted directly through various hacking
methods; this is expanded upon further below.
Communications can also be delivered to recipients unbeknownst to the
sender due to false assumptions made regarding the platform or medium
which was used to send information.
04/19/2025 9
Individual Privacy
Individual privacy is the notion that individuals have a right to exist
freely on the internet,
in that they can choose what types of information they are exposed
to, and more importantly that unwanted information should not
interrupt them.
An example is an internet user receiving unwanted ads and
emails/spam, or a computer virus that forces the user to take actions
they otherwise wouldn't.
In such cases the individual, during that moment, doesn't exist digitally
without interruption from unwanted information; thus, their individual
privacy has been infringed upon.
04/19/2025 10
Some digital privacy principles
Data Minimization: collect the minimal amount of information necessary from
individuals and businesses consistent with the Department’s mission and legal
requirements.
Transparency: Information collected will not be used for any other purpose
unless authorized or mandated by law.
Accuracy: Information collected will be maintained in a sufficiently accurate,
timely, and complete manner to ensure that the interests of the individuals and
businesses are protected.
Security: Adequate physical and IT security measures will be implemented to
ensure that the collection, use, and maintenance of identifiable information are
properly safeguarded and the information is promptly destroyed in accordance
with approved records control schedules.
04/19/2025 11
Accountability and trust
Emerging technologies can provide improved accuracy, better
quality and cost efficiencies for businesses in every sector.
They can enhance trust in the organization’s operations and
processes, which is crucial for sustainable success.
But this can produce a paradox: the very solutions that can be
used to better manage risk, increase transparency and build
confidence are often themselves the source of new risks, which
may go unnoticed.
04/19/2025 12
Challenges in using Artificial Intelligence
04/19/2025 13
Challenges in using Robotics in manufacturing
With automation and robotics moving from production lines out into
other areas of work and business, the potential for humans losing jobs is
great here too.
04/19/2025 14
Challenges in using the Internet of Things
04/19/2025 15
Challenges in Big Data
Almost all the technologies mentioned above have some relation to Big
Data.
The huge amount of data being generated on a daily basis has the
potential to provide businesses with better insight into their customers
as well as their own business operations.
Although data can be incredibly useful for spotting trends and analyzing
impacts, surfacing all this data to humans in a way that they can
understand can be challenging. AI will play a role here.
04/19/2025 16
Treats
New and emerging technologies pose significant opportunities for
businesses if they utilize them well and understand their true value early
on.
They also pose risks and questions not only to business but to society as
a whole.
Planning for
how to deal with these emerging technologies
where value can be derived and
assessing potential risks before they become a fully-fledged reality
is essential for businesses that want to thrive in the world of AI, Big
Data and IoT.
04/19/2025 17
Some risks of emerging technology are:
Driverless car:
while a compelling option for future fleer cars, companies could crash and burn from
claims related to bodily injury and property damage.
Wearables:
Google glass, Fitbit and other wearables can expose companies to the invasion of
privacy claims that may not be covered by general liability or personal injury claims
that weren’t foreseen.
Drones:
Turbulence is in the offing for manufacturers and organizations that fail to protect
themselves for property damage and bodily injury, as well as errors and omissions.
Internet of things:
The proliferation of sensors and cross-platform integration creates potential exposure
from privacy invasion, bodily injury and property damage that may connect an
organization to huge liabilities.
04/19/2025 18