0% found this document useful (0 votes)
49 views24 pages

Bereket H - M

This document contains information about an emerging technology group assignment prepared by Bereket H/Michael. It lists 9 group members and their student IDs. It then outlines 5 questions that the group will address related to technology and ethics, new ethical questions raised by emerging technologies, digital privacy principles, accountability and trust, and threats and challenges posed by new technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views24 pages

Bereket H - M

This document contains information about an emerging technology group assignment prepared by Bereket H/Michael. It lists 9 group members and their student IDs. It then outlines 5 questions that the group will address related to technology and ethics, new ethical questions raised by emerging technologies, digital privacy principles, accountability and trust, and threats and challenges posed by new technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Emerging technology

Group
Assignment

Prepared by Bereket H/Michael


NSR/0445/14
Group members. Id.no
1. Bereket H/Michael. NSR/0445/14
2. Befikadu Mulatu. NSR/0416/14

3. Bizunesh Derebaw. NSR/0629/14


4. Birhanu Geleta. NSR/0544/14
5. Dawit Tagesu. NSR/0706/14
6. Bekele Lemesa. NSR/0423/14
7. Biruk Taye. NSR/0575/14
8. Cherinet Haile. NSR/0651/14
9. Bartukan Miheret. NSR/0563/14
Questions
1.Technology and Ethics
2. New Ethical question
2.1. General Ethical principles
2.2. Professional responsibly
2.3. professional leadership principle
3. Digital privacy
3.1. Information privacy
3.2. Communication privacy
3.3. Individual privacy
3.4. Some digital privacy principles
4. Accountability and trust
5. Treats and challenges
5.1. Ethical and regulatory challenges
5.1.1. Challenges in using AI
5.1.2. Challenges in using robotics in manufacturing
5.1.3. Challenges in using IoT
5.1.4. Challenges in big data
5.2. Treat
TECHNOLOGY AND ETHICS
 Technology can serve to promote or restrict human rights. The Information Society should foster

the use of emerging technologies in such a way as to maximize the benefits that they provide while

minimizing the harms.

 Ethics is particularly important for the accountancy profession, with a code for professional ethics

based on five basic principles –

 Integrity

 Objectivity

 Competence and due care

 Confidentiality

 Professional behavior

 However, the emergence of new technologies raises some new challenges for the profession to

address
NEW ETHICAL QUESTION
 The increasing use of big data, algorithmic decision-making, and artificial intelligence

can enable more consistent, evidence-based and accurate judgments or decisions, often

more quickly and efficiently. However, these strengths can potentially have a darker side

too, throwing up questions around the ethical use of these fairly new technologies.

 questions are being asked regarding the interaction between computers and humans.

 How much reliance can we place on data and models?

 What is the role of human judgment ?

 How do we ensure that we understand the decision-making process?

 Whatever the power of the machine, humans will still need to be involved, so that

people can be held accountable, or explain the reasons behind a decision.


General Ethical principles

1. Contribute to society and to human well-being acknowledging that all people are

stakeholders in computing.

2. Avoid harm.

3. Be honest and trustworthy.

4. Be fair and take action not to discriminate

5. Respect the work required to produce new ideas, inventions, creative works, and

computing artifacts

6. Respect privacy.

7. Honor confidentiality
Professional responsibly
1. Strive to achieve high quality in both the processes and products of professionalwork.

2. Maintain high standards of professional competence, conduct, and ethical practice.

3. Know and respect existing rules pertaining to professional work.

4. Accept and provide appropriate professional review.

5. Give comprehensive and thorough evaluations of computer systems and their impacts,

including analysis of possible risks.

6. Perform work only in areas of competence.

7. Foster public awareness and understanding of computing, related technologies, and their

consequences.

8. Access computing and communication resources only when authorized or when compelled

by the public good.

9. Design and implement systems that are robustly and usably secure.
Professional leadership principle

1. Ensure that the public good is the central concern during all professional computing

work.

2. Articulate, encourage acceptance of and evaluate fulfillment of social responsibilities by

members of the organization or group.

3. Manage personnel and resources to enhance the quality of working life.

4. Articulate, apply, and support policies and processes that reflect the principles of the

Code.

5. Create opportunities for members of the organization or group to grow as professionals.

6. Use care when modifying or retiring systems. Interface changes, the removal of features,

and even software updates have an impact on the productivity of users and thequality of

their work.

7. Recognize and take special care of systems that become integrated into the
DIGITAL PRIVACY

 Digital Privacy is the protection of personally identifiable or business

identifiable information that is collected from respondents through

information collection activities or from other sources.

 It is a collective definition that encompasses three sub-related categories;

information privacy, communication privacy, and individual privacy.

 It is often used in contexts that promote advocacy on behalf of individual and

consumer privacy rights in digital spheres, and is typically used in opposition

to the business practices of many e-marketers/businesses/companies to

collect and use such information and data.


Information privacy

 Information privacy is the notion that individuals should have the freedom, or

right, to determine how their digital information, mainly that pertaining to

personally identifiable information, is collected and used.

 Every country has various laws that dictate how information may be collected

and used by companies. Some of those laws are written to give agency to the

preferences of individuals/consumers in how their data is used.

 In other places, like in the United States, privacy law is argued by some to be

less developed in this regard,

 For example, some legislation, or lack of, allows companies to self-regulate

their collection and dissemination practices of consumer information.


Communication privacy
 Communication privacy is the notion that individuals should have the freedom,
or right, to communicate information digitally with the expectation that their
communications are secure; meaning that messages and communications will
only be accessible to the sender's original intended recipient.

 However, communications can be intercepted or delivered to other recipients


without the sender's knowledge, in a multitude of ways.

 Communications can be intercepted directly through various hacking methods;


this is expanded upon further below.

 Communications can also be delivered to recipients unbeknownst to the sender


due to false assumptions made regarding the platform or medium which was
used to send information.
Cont...
 An example of this is a failure to read a company's privacy policy regarding

communications on their platform could lead one to assume their

communication is protected when it is in fact not.

 Additionally, companies frequently have been known to lack transparency

in how they use information, this can be both intentional and unintentional.

 Discussion of communication privacy necessarily requires consideration of

technological methods of protecting information/communication in digital

mediums, the effectiveness, and ineffectiveness of such methods/systems,

and the development/advancement of new and current technologies.


Individual privacy

 Individual privacy is the notion that individuals have a right to exist freely on
the internet, in that they can choose what types of information they are
exposed to, and more importantly that unwanted information should not
interrupt them.

 An example of a digital breach of individual privacy would be an internet user


receiving unwanted ads and emails/spam, or a computer virus that forces the
user to take actions they otherwise wouldn't.

 In such cases the individual, during that moment, doesn't exist digitally without
interruption from unwanted information; thus, their individual privacy has
been infringed upon.
Some digital privacy principles
 Data Minimization: collect the minimal amount of information necessary from individuals

and businesses consistent with the Department’s mission and legal requirements.

 Transparency: Notice covering the purpose of the collection and use of identifiable

information will be provided in a clear manner. Information collected will not be used for

any other purpose unless authorized or mandated by law.

 Accuracy: Information collected will be maintained in a sufficiently accurate, timely, and

complete manner to ensure that the interests of the individuals and businesses are

protected.

 Security: Adequate physical and IT security measures will be implemented to ensure that

the collection, use, and maintenance of identifiable information are properly safeguarded

and the information is promptly destroyed in accordance with approved records control

schedules.
ACCOUNTABILITY AND TRUST
 Emerging technologies can provide improved accuracy, better quality and cost

efficiencies for businesses in every sector.

 They can enhance trust in the organization’s operations and financial processes,

which is crucial for sustainable success. But this can produce a paradox: the very

solutions that can be used to better manage risk, increase transparency and

build confidence are often themselves the source of new risks, which may go

unnoticed.

 The obligation of an individual or organization to account for its activities, accept

responsibility for them, and to disclose the results in a transparent manner. It

also includes the responsibility for money or other entrusted property


TREATS AND CHALLENGES
Ethical and regulatory challenges

 As security professionals, we need to keep pace with ever-changing technology and be aware of the AI,

IoT, Big Data, Machine Learning, etc.

 Growing needs Cyber & Data Security is getting prominence that requires security practitioners to

focus on the business need for securing data, understanding security and risk from a business

perspective by extensively interacting with the business community in understanding their

requirements or what they want.

 Emerging technologies are already impacting how we live and work.

 They're also changing how we approach, plan, and integrate security operations.

 vFor security, both physical and cyber, the equation is the same catalyzing many new potential

applications for emerging technologies


Cont...
Emerging technologies are making an impact include:

1. Counter-terrorism and law enforcement informatics via predictive analytics and


artificial intelligence.

2. Real-time horizon scanning and data mining for threats and information sharing

3. Automated cyber security and information assurance

4. Enhanced Surveillance (chemical and bio-detection sensors, cameras, drones,


facialrecognition, license plate readers)

5. Simulation and augmented reality technologies for training and modeling

6. Safety and security equipment (including bullet and bomb proof) made with
lighter and stronger materials

7. Advanced forensics enabled by enhanced computing capabilities (including


future quantum computing)
Cont...

8. Situational awareness capabilities via GPS for disaster response and crisis
responsescenarios

9. Biometrics: assured identity security screening solutions by bio-signature: (every


aspect of your physiology can be used as a bio-signature. Measure unique
heart/pulserates, electrocardiogram sensor, blood oximetry, skin temperature)

10. Robotic Policing (already happening in Dubai!)


Challenges in using AI
 AI is only as good as the data it is exposed to, which is where certain challenges
may present themselves.themselves.
Challenges in using robotics in manufacturing
 With automation and robotics moving from production lines out into other
areas of work and business, the potential for humans losing jobs is great here
too.

 As automation technologies become more advanced, there will be a greater


capability for automation to take over more and more complex jobs.

 As robots learn to teach each other and themselves, there is the potential for
much greater productivity but this also raises ethical and cyber security
concerns
Challenges in using IoT

 As more and more connected devices (such as smart watches and fitness
trackers) join the Internet of Things (IoT) the amount of data being generated is
increasing.

 Companies will have to plan carefully how this will affect the customer-facing
application and how to best utilize the masses of data being produced.

 There are also severe security implications of mass connectivity that need to be
addressed.
Challenges in Big Data

 Almost all the technologies mentioned above have some relation to Big Data.

 The huge amount of data being generated on a daily basis has the potential to
provide businesses with better insight into their customers as well as their own
business operations.

 Although data can be incredibly useful for spotting trends and analyzing
impacts, surfacing all this data to humans in
Treats
 New and emerging technologies pose significant opportunities for businesses if
they utilize them well and understand their true value early on.

 They also pose risks and questions not only to business but to society as a
whole.

 Planning for how to deal with these emerging technologies and where value
can be derived while assessing potential risks before they become a fully-
fledged reality is essential for businesses that want to thrive in the world of AI,
Big Data and IoT.
THANK YOU

You might also like