0% found this document useful (0 votes)
52 views3 pages

Emerging

Kidus Wendesen submitted an individual assignment for their Emerging Technology course at Addis Ababa Science and Technology University. The assignment addressed questions about ethics in emerging technologies like big data and AI, general ethical principles, digital privacy and its categories, principles of digital privacy, security operations in emerging technologies, and challenges posed by technologies like AI, robotics, IoT, and big data.

Uploaded by

Inu Kag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views3 pages

Emerging

Kidus Wendesen submitted an individual assignment for their Emerging Technology course at Addis Ababa Science and Technology University. The assignment addressed questions about ethics in emerging technologies like big data and AI, general ethical principles, digital privacy and its categories, principles of digital privacy, security operations in emerging technologies, and challenges posed by technologies like AI, robotics, IoT, and big data.

Uploaded by

Inu Kag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Addis Ababa Science and Technology University (AASTU)

Individual Assignment for the course Emerging Technology

Course code: EmTe1008

Submission to Mr.Abera

Name: Kidus Wendesen

ID Number: ETS0782/15

Section:25

Submission date: 6/10/2023


1. Write the purpose of ethics in emerging technology (in terms of big data and
artificial intelligence)?

The purpose of ethics in emerging technology, specifically in big data and artificial
intelligence, is to ensure that these technologies are developed and used in a
responsible and morally sound manner. Therefore , the goal of ethics in emerging
technology is to guide and regulate the actions related to these technologies so that
potential risks and harms are minimized, and positive societal impact is maximized.

When it comes to big data, which refers to the large and complex amount of
information collected from various sources, ethics dictate how this data is collected,
stored, accessed, shared, and used. It involves principles such as data privacy,
consent, and security. Ethics in big data help prevent the misuse or abuse of personal
information, promote transparency about data practices, and protect individuals' rights
and autonomy.

In AI, ethics plays a crucial role in ensuring that AI systems are developed with
considerations for human values, fairness, and accountability. AI algorithms need to
be designed in a way that avoids bias, discrimination, or unintended adverse
consequences. Ethical guidelines help prevent the deployment of AI systems that may
harm individuals, perpetuate stereotypes, or invade privacy.

2. List the general ethical principles?

a) Contribute to society and to human well-being, acknowledging that all people are
b) stakeholders in computing.
c) Avoid harm.
d) Be honest and trustworthy.
e) Be fair and take action not to discriminate
f) Respect the work required to produce new ideas, inventions, creative works, and
g) computing artifacts.
h) Respect privacy.
i) Honor confidentiality

3.Define digital privacy and list the three sub-related categories?

Digital privacy refers to protecting personal or business information that is collected


from individuals or other sources.
It includes three categories: information privacy, communication privacy, and
individual privacy.
It is used to advocate for individual and consumer privacy rights online and is
opposed to the practices of businesses that collect and use this information.

4.Write the difference between information privacy, communication privacy, and


individual privacy.

Information privacy refers to the idea that individuals should have control over how
their personal information is collected and used.
Communication privacy is the concept that individuals have the right to expect their
digital communications to be secure and only accessible to the intended recipient.

Individual privacy means that individuals should be able to freely navigate the
internet without unwanted interruptions or exposure to unwanted information.

5. What are the principles of digital privacy?

Data Minimization: collect the minimal amount of information necessary from


individuals and businesses consistent with the Department’s mission and legal
requirements.
Transparency: Notice covering the purpose of the collection and use of identifiable
information will be provided in a clear manner. Information collected will not be used
for any other purpose unless authorized or mandated by law.
Accuracy: Information collected will be maintained in a sufficiently accurate, timely,
and complete manner to ensure that the interests of the individuals and businesses are
protected.
Security: Adequate physical and IT security measures will be implemented to ensure
that the collection, use, and maintenance of identifiable information are properly
safeguarded and the information is promptly destroyed in accordance with approved
records control schedules

6. list the security operations which are included in emerging technologies

a) Threat intelligence
b) Vulnerability management
c) Secure coding practices
d) Security auditing
e) Incident response
f) Security monitoring
g) Security awareness training
h) Data privacy and compliance

7. what are the challenges of emerging technologies in terms of (artificial intelligence,


robotics. IoT, big data)

AI can be limited by the quality of the data it uses and requires careful planning to
maximize its benefits and minimize risks. It can automate tasks, freeing up time for
humans. However, this automation might lead to job losses.
Big data plays a key role in many technologies, helping businesses gain insights but
also presenting challenges in presenting the data in a usable way.
The increasing number of connected devices generates a large amount of data, which
needs to be managed and secured effectively.

You might also like