2/8/2024
Chapter contents
                       Chapter 6                                         Distinguish the link between ethics and technology
                                                                         Understand general, professional and leadership ethical questions
                      ETHICS AND PROFESSIONALISM   OF                    Explain what digital privacy is, its components and why it is
                          EMERGING TECHNOLOGIES                            important
                                                                         know the importance of accountability and trust in emerging
                                                                           technologies
                                                                         Identify the threats and challenges we face in developing and utilizing
                                                                           emerging technologies.
                 Technology and ethics                                   Technology and ethics
As with many technological advances, however, the Internet has
 not been without negative aspects.                                      in such a way as to maximize the benefits that they provide while
                                                                          minimizing the harms.
 For example, it has created new concerns about privacy, and it
 has been hampered by spam and viruses.                                   In many cases, this promotion may be less a matter of technological
                                                                          control than of oversight:
 Moreover, even as it serves as a medium for communication across the
 globe, it threatens to cut off people who lack access to it.            establishing the proper legal or regulatory system to ensure that
                                                                          technology capable of abuse is not in fact abused and that the benefits
Technology can serve to promote or restrict human rights. The
                                                                          of technology are shared among all.
 Information Society should foster the use of emerging
                                                                                                                                                          1
                                                                                                                                                                                                                                                             2/8/2024
Technology and ethics
                                                                            Technology and ethics
Ethics is particularly important for the accountancy profession, with a
                                                                               The increasing use of big data, algorithmic decision-making, and AI can enable more consistent, evidence-based and accurate judgments, often more quickly and efficiently.
  code for professional ethics based on five basic principles –                However, these strengths can potentially have a darker side too, throwing up questions around the ethical use of these fairly new technologies.
integrity, objectivity, competence and due care, confidentiality, and
  professional behavior.
However, the emergence of new technologies raises some new
  challenges for the profession to address.
                                                                            Professional leadership principles
Professional leadership principles
1. Ensure that the public good is the central concern during all            5. Create opportunities for members of the organization or group to grow
professional computing work.                                                as professionals.
2. Articulate, encourage acceptance of and evaluate fulfillment of social   6. Use care when modifying or retiring systems. Interface changes, the
responsibilities by members of the organization or group.                   removal of features, and even software updates have an impact on the
3. Manage personnel and resources to enhance the quality of working         productivity of users and the quality of their work.
life.                                                                       7. Recognize and take special care of systems that become integrated into
4. Articulate, apply, and support policies and processes that reflect the   the infrastructure of society
principles of the Code.
                                                                                                                                                                                                                                                                   2
                                                                                                                                                        2/8/2024
                                                                            Digital privacy
                        Digital privacy
Digital Privacy is the protection of personally identifiable or business    1. Information Privacy
 identifiable information that is collected from respondents through        information privacy is the notion that individuals should have the
 information collection activities or from other sources.                    freedom, or right, to determine how their digital information, mainly
It is a collective definition that encompasses three sub-related            that pertaining to personally identifiable information, is collected and
 categories; information privacy, communication privacy, and individual      used.
 privacy                                                                     Every country has various laws that dictate how information may be
 It is often used in contexts that promote advocacy on behalf of            collected and used by companies. Some of those laws are written to
 individual and consumer privacy rights in digital spheres, and is           give agency to the preferences of individuals/consumers in how their
 typically used in opposition to the business practices                      data is used
Digital privacy                                                             Digital privacy
 1. Information Privacy                                                     2. Communication Privacy
In other places, like in the United States, privacy law is argued by        communication privacy is the notion that individuals should have
 some to be less developed in this regard, For                               the freedom, or right, to communicate information digitally with the
 example, some legislation, or lack of, allows companies to self-regulate    expectation that their communications are secure; meaning that
 their collection and dissemination practices of consumer information.       messages and communications will only be accessible to the sender's
                                                                             original intended recipient.
                                                                             However, communications can be intercepted or delivered to other
                                                                             recipients without the sender's knowledge, in a multitude of ways.
                                                                                                                                                              3
                                                                                                                                                 2/8/2024
                Digital privacy                                                         Digital privacy
 2. Communication Privacy                                                3. Individual Privacy
Communications can be intercepted directly through various hacking      individual privacy is the notion that individuals have a right to
 methods; this is expanded upon further below.                            exist freely on the internet, in that they can choose what types of
Communications can also be delivered to recipients unbeknownst to        information they are exposed to, and more importantly that unwanted
 the sender due to false assumptions made regarding the platform or       information should not interrupt them
 medium which was used to send information.                               An example of a digital breach of individual privacy would be an
 An example of this is a failure to read a company's privacy policy      internet user receiving unwanted ads and emails/spam, or
 regarding communications on their platform could lead one to assume     a computer virus that forces the user to take actions they otherwise
 their communication is protected when it is in fact not                  wouldn't
                  Digital privacy                                                           Digital privacy
 3. Individual Privacy                                                   4. Some digital privacy principles
In such cases the individual, during that moment, doesn't exist         Data Minimization: collect the minimal amount of information
 digitally without interruption from unwanted information; thus, their    necessary from individuals and businesses consistent with the
 individual privacy has been infringed upon.                              Department’s mission and legal requirements.
                                                                         Transparency: Notice covering the purpose of the collection and use
                                                                          of identifiable information will be provided in a clear manner.
                                                                          Information collected will not be used for any other purpose unless
                                                                          authorized or mandated by law   .
                                                                                                                                                       4
                                                                                                                                                      2/8/2024
                      Digital privacy                                                       Accountability and trust
                                                                             When emerging technology creates far-reaching and rapid change, it
 4. Some digital privacy principles
                                                                              can also bring new risks.
Accuracy: Information collected will be maintained in a sufficiently
                                                                             Understanding and mitigating them will help to build confidence.
 accurate, timely, and complete manner to ensure that the interests of the
                                                                              Often legal and regulatory frameworks haven’t kept pace with digital
 individuals and businesses are protected.
                                                                              transformation, and organizations are seeking guidance.
Security: Adequate physical and IT security measures will be
 implemented to ensure that the collection, use, and maintenance of
 identifiable information are properly safeguarded and the information
 is promptly destroyed in accordance with approved records control
 schedules.
Treats and challenges
                                                                                                Treats and challenges
 1. Ethical and regulatory challenges
                                                                              1. Ethical and regulatory challenges
 With Technology moving at a fast pace it is always been a challenge
                                                                              With Growing needs Cyber & Data Security is getting prominence that
 for Security.
                                                                              requires security practitioners to focus on the business need for
 As security professionals, we need to keep pace with ever-changing          securing data, understanding security and risk from a business
 technology and be aware of the AI, IoT, Big Data, Machine Learning,.         perspective by extensively interacting with the business community in
It is no more Guards, guns & gates it is more than that & we                 understanding their requirements or what they want.
 need to play a major role for a security professional to support business
 or rather we should be able to understand the language of business and
 talk to the leaders in their language.
                                                                                                                                                            5
                                                                                                                                                 2/8/2024
         Treats and challenges                                                      Treats and challenges
 1. Ethical and regulatory challenges
                                                                        1. Ethical and regulatory challenges
 Emerging technologies are already impacting how we live and work.
 Those are:                                                            7. Advanced forensics enabled by enhanced computing capabilities
 1. Counter-terrorism and law enforcement informatics via predictive   (including future quantum computing)
 analytics and AI
 2. Real-time horizon scanning and data mining for threats and         8. Situational awareness capabilities via GPS for disaster response and
 information sharing                                                   crisis response scenarios
 3. Automated cybersecurity and information assurance                  9. Biometrics: assured identity security screening solutions by bio-
 4. Enhanced Surveillance (chemical and bio-detection sensors,
 cameras, drones, facial recognition, license plate readers)           signature: (every aspect of your physiology can be used as a bio-
 5. Simulation and augmented reality technologies for training and     signature.
 modeling
 6. Safety and security equipment (including bullet and bomb proof)
 made with lighter and stronger materials
               Treats and challenges
                                                                                    Treats and challenges
 1. Ethical and regulatory challenges                                  2. Treats
10. Robotic Policing (already happening in Dubai!)                     New and emerging technologies pose significant opportunities for
                                                                         businesses if they utilize them well and understand their true value
other challenges                                                         early on.
Challenges in using Artificial Intelligence                           They also pose risks and questions not only to business but to society
                                                                        as a whole.
Challenges in using Robotics in manufacturing
Challenges in using the Internet of Things
Challenges in Big Data
                                                                                                                                                       6
                                                                                                                                                    2/8/2024
          Treats and challenges                                                            Treats and challenges
 2. Treats                                                                  2. Treats
Some risks of emerging technology are:                                     Some risks of emerging technology are:
 ➢ Driverless car: while a compelling option for future fleer cars,         ➢ Drones: Turbulence is in the offing for manufacturers and
 companies could crash and burn from claims related to bodily injury        organizations that fail to protect themselves for property damage and
 and property damage.                                                       bodily injury, as well as errors and omissions.
 ➢ Wearables: Google glass, Fitbit and other wearables can expose           ➢ Internet of things: The proliferation of sensors and cross-platform
 companies to the invasion of privacy claims that may not be covered        integration creates potential exposure from privacy invasion, bodily
 by general liability or personal injury claims that weren’t foreseen   .
                                                                            injury and property damage that may connect an organization to huge
                                                                            liabilities.
Brain storming questions