Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Unity University

Department:- Computer science


course :-Emerging Technology

Group members
1, Rediet Worku……………………………………..UU92976R
2,Misikir Gebre………………………………………UU92927R
3,Selamawit Mekbib…………………………………UU93626R
4,Yohannes Tilahun…………………………………UU92907R
5,Kaleab Tesfaye…………………………………….UU92932R
6,yoseph deriba………………………………………UU92930R
7,Edna Mesfin…………………………………………UU92942R
8,Simon Yakob……………………………………..
9,Sofoniyas Shitaye………………………………….
Submitted to:-
Submission date:-

Chapter 6
ETHICS AND PROFESSIONALISM OF EMERGING TECHNOLOGIES
6.1 Technology and ethics
The Internet boom has brought numerous benefits to society, including new tools and
ways of interacting. However, it has also raised concerns about privacy, spam, and
viruses. As new solutions emerge in information and communication technologies
(ICTs), it is crucial to consider their implications and encourage positive choices. The
Information Society should promote the use of emerging technologies to maximize
benefits while minimizing harms, often through oversight and legal systems. Ethics is
especially important for the accounting profession, which has a code of professional
ethics based on integrity, objectivity, competence, confidentiality, and professional
behavior.
New ethical questions
Big data, algorithmic decision-making, and artificial intelligence are revolutionizing
decision-making, but their ethical use raises concerns about their potential for rapid and
efficient accuracy.
Various aspects, such as biased data, personalization, and the interactions between
machines and people, can have an impact on the ethics of technology. While
personalization can result in discriminatory effects, computer-human interaction requires
knowledge of how decisions are made. It is vital to obtain ethical input at the early
phases of design and development since ethical difficulties frequently surface late in the
technology's life cycle. But because the future is unpredictable, ethics must address
how to choose which technical advancements to pursue. Historically, ethics has
struggled to deal with ambiguity, especially when it comes to technology.
6.1.1 GENERAL ETHICAL PRINCIPLES
1. Contribute to society and to human well-being, acknowledging that all people are
stakeholders in computing.
2. Avoid harm.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate
5. Respect the work required to produce new ideas, inventions, creative works, and
computing artifacts.
6. Respect privacy.
7. Honor confidentiality

6.1.2 PROFESSIONAL RESPONSIBILITIES


1. Strive to achieve high quality in both the processes and products of professional
work.
2. Maintain high standards of professional competence, conduct, and ethical practice.
3. Know and respect existing rules pertaining to professional work.
4. Accept and provide appropriate professional review.
5. Give comprehensive and thorough evaluations of computer systems and their
impacts, including an analysis of possible risks.
6. Perform work only in areas of competence.
7. Foster public awareness and understanding of computing, related technologies, and
their consequences.
8. Access computing and communication resources only when authorized or when
compelled by the public good.
9. Design and implement systems that are robustly and usably secure.
6.1.3 PROFESSIONAL LEADERSHIP PRINCIPLES
1. Ensure that the public good is the central concern during all professional computing
work.
2. Articulate, encourage acceptance of, and evaluate the fulfillment of social
responsibilities by members of the organization or group.
3. Manage personnel and resources to enhance the quality of working life.
4. Articulate, apply, and support policies and processes that reflect the principles of the
Code.
5. Create opportunities for members of the organization or group to grow as
professionals.
6. Use care when modifying or retiring systems. Interface changes, the removal of
features, and even software updates have an impact on the productivity of users and
the quality of their work.
7. Recognize and take special care of systems that become integrated into the
infrastructure of society.
6.2 Digital privacy
Digital privacy protects personally or business-identifiable information collected from
respondents or sources. It includes information, communication, and individual privacy.
It is often used to advocate for individual and consumer privacy rights in digital spheres.
Information Privacy
Digital privacy refers to the right of individuals to control how their digital information,
particularly personally identifiable data, is collected and used. The EU has laws dictating
this, while the US has less developed privacy laws, allowing companies to self-regulate
their data collection practices.
Communication Privacy
Communication privacy in digital privacy refers to the right to securely communicate
information online, only accessible to the sender's intended recipient. However,
communications can be intercepted or delivered to recipients without the sender's
knowledge, often due to false assumptions or lack of transparency. This discussion
requires considering technological methods, effectiveness, and advancements in new
technologies to ensure communication privacy in digital mediums.
Individual Privacy
Individual privacy in digital privacy refers to the right of individuals to freely access and
choose information on the internet without unwanted interruption. A digital breach of
individual privacy occurs when users receive unwanted ads, emails, or viruses, thereby
infringing on their privacy.
Some digital privacy principles
Data Minimization:In accordance with its objective and legal obligations, the
Department seeks to collect the least amount of information possible from people and
companies.
Transparency:The purpose of collecting and using identifiable information will be
clearly communicated, and collected data will only be used if legally mandated.
Accuracy: The organization will implement robust physical and IT security measures to
ensure the proper safeguarding and timely destruction of identifiable information.
6.3 Accountability and trust
Emerging technology, despite its rapid change, can introduce new risks. Understanding
and mitigating these risks can boost confidence. Legal and regulatory frameworks often
struggle with digital transformation, leading organizations to seek guidance. The rapid
pace and adoption of technology exacerbate this challenge.
6.4 Treats and challenges
6.4.1 Ethical and regulatory challenges
Security professionals must stay updated with rapidly changing technology, including AI,
IoT, data mining, big data, and machine learning. They must understand business
language and support business leaders. Security professionals provide value to senior
management by prioritizing business security and understanding regulation,
compliance, and risks. Cyber and data security are becoming more prominent, requiring
practitioners to focus on securing data and understanding risks from a business
perspective.
What role can technologies such as AI, IoT, machine learning, and big data play in
enhancing the security of an organization?
Emerging technologies like artificial intelligence, robotics, quantum computing, and data
analytics are transforming the security industry. Innovation, agility, and imagination are
crucial to keeping pace with this rapid technological transformation, catalyzing new
potential applications in physical and cyber security. Emerging technologies are making
an impact, including
1. Counter-terrorism and law informatics via predictive analytics and artificial intelligence
2. Real-time horizon scanning and data mining for threats and information sharing
3. Automated cybersecurity and information assurance
4. Enhanced Surveillance (chemical and bio-detection sensors, cameras, drones, facial
recognition, license plate readers)
5. Simulation and augmented reality technologies for training and modeling
6. Safety and security equipment (including bullet and bomb proof) made with lighter
and stronger materials
7. Advanced forensics enabled by enhanced computing capabilities (including future
quantum computing)
8. Situational awareness capabilities via GPS for disaster response and crisis response
scenarios
9. Biometrics: assured identity security screening solutions by bio-signature: Every
aspect of your physiology can be used as a bio-signature. Measure unique heart/pulse
rates (electrocardiogram sensor, blood oximetry, skin temperature)
10. Robotic Policing (already happening in Dubai!)
1. Artificial Intelligence and Machine Learning
Advancements in AI have led to numerous applications, including machine learning.
However, AI's effectiveness depends on the data it is exposed to. Businesses must
teach and develop AI effectively, as humans may not want to input large amounts of
data.
AI has the potential to replace human workers in higher-level jobs or take on laborious
tasks, freeing up time and brainpower for other tasks. However, managing AI challenges
requires careful planning to maximize benefits and mitigate risks.
2. Automation and Robotics
Automation and robotics are expanding into various industries, potentially leading to job
losses for humans. As technologies advance, robots can take over complex jobs,
increasing productivity but raising ethical and cybersecurity concerns.
3. Cryptocurrency and Blockchain
Cryptocurrencies like Bitcoin and Ethereum, despite their potential destabilizing
potential, can be a valuable opportunity for established institutions due to blockchain
technology. This distributed ledger technology creates hacker-proof decentralized
databases, disrupting banking and mortgage systems. Its transparency and security
could rebuild public trust in institutions.
4. Internet of Things
The increasing number of connected devices in the IoT generates a significant amount
of data, necessitating careful planning for customer-facing applications and addressing
security implications.
5. Big Data
Big data technologies offer businesses valuable insights into customers and operations.
However, presenting this data to humans can be challenging. AI and applications like
Splunk can help surface machine-generated data in a human-readable manner.
Emerging technologies offer businesses significant opportunities and risks, but
they must be managed effectively to thrive in the AI, Big Data, and IoT worlds.
Planning and assessing potential risks are crucial for success.
The World Economic Forum's top 10 emerging technologies of 2015 address ethical
debates and introduce new challenges. These technologies, which may not be new or
revolutionary, are transitioning into a new phase and becoming more widely used in
consumer goods. They are expected to gain more ground in the coming years. Some of
them are:
1. Precise genetic engineering techniques: One technology could potentially resolve
controversial aspects of the GMO debate, such as the lack of precision and
predictability in genetic engineering and potential harmful mutations in the subsequent
procedures.
2. Autonomous systems, AI, and robotics are set to revolutionize speech and
conversational software with intuitive AI, transforming communication and commanding
methods for millions of people.
3.New-generation robotics will have greater autonomy and react without
pre-programming, complicating current debates. Neuromorphic chip technology, a
revolutionary development in AI, mimics the human brain's intricacies, potentially
learning or developing memories. This could make drones better at surveillance,
remembering, or recognizing new elements in the environment.
4. Emerging technologies, such as fuel cell vehicles and recyclable thermostat
polymers, will redefine biology, the material world, and manufacturing. These
advancements will impact geopolitics, power balances, and the vulnerability of
oil-dependent economies. Distributed manufacturing will redefine value chains and
infrastructure, while technologies like 3D printing, informatics, and robotics will enable a
dematerialized future with endless customization possibilities.
6.4.2 Treats
1. Ambient intelligence
Ambient intelligence is a pervasive form of emerging IT, integrating user interfaces into
the environment to respond to voice and behavior without direct user commands. It
requires detailed user profiling and is particularly interested in the medical field and
elderly care. However, concerns arise about automation and the risk of isolating
vulnerable individuals. Privacy concerns arise from access to data and its use.
Insurance companies are monitoring driver behavior and medical patterns, while Google
is buying home control systems to monitor conversations. Surveillance organizations
could potentially access ambient systems, posing a threat to privacy.
2. Augmented reality
Augmented reality uses digital displays to enhance our perception of the physical world,
with popular forms found in mobile apps like Google Sky and Google Goggles.
First-generation goggles like Google Glass are emerging, but concerns arise about
potential detraction, leading to confusion in US states.
The use of navigation software and smart glasses can enhance driver safety, but they
pose concerns about privacy and visibility. Many places ban them, leading to attacks
and the term "glasshole" due to the fear of being spied on. This has led to increased
safety concerns.Intrusive output, such as error messages or sudden discounts, can
interfere with user activities, with potentially lethal forms being sudden ads.
Augmented reality will enter enterprise computing just as much as the high street,
particularly in factory and warehouse operations and onsite engineering diagnostics.
The market is expected to see a surge in augmented reality apps as smart glasses
become more prevalent, making it a promising emerging technology for IT
professionals.
Some risks of emerging technology are:
Driverless cars:Companies may face potential accidents and burns due to claims
related to bodily injury and property damage in future fleer cars.
Wearables:Google Glass, Fitbit, and other wearables may expose companies to privacy
claims that may not be covered by general liability or personal injury claims.
Drones:Manufacturers and organizations that fail to protect themselves from property
damage, bodily injury, errors, and omissions are facing turbulence.
The Internet of Things:The increasing use of sensors and cross-platform integration
poses potential risks such as privacy invasion, bodily injury, and property damage,
potentially leading to significant liabilities for organizations.
3D printing:The use of trade secrets, patents, or other protected materials can lead to
intellectual property liability.
Telemedicine:The anticipated shortage of primary physicians may lead to a mix of
crossover claims from medical consultations, software, hardware, facilities, health
insurance, and personal data via ISP.
Deep learning ,machine learning
Deep learning is a type of machine learning that involves the use of neural networks
with multiple layers. These networks are designed to learn and improve over time by
analyzing vast amounts of data. Deep learning algorithms are used in a wide range of
applications, including image and speech recognition, natural language processing, and
autonomous vehicles. The key advantage of deep learning is its ability to automatically
learn and extract features from raw data, which can lead to more accurate predictions
and better performance in various tasks.
Machine learning refers to a set of algorithms and techniques that enable machines to
learn from data and make predictions or decisions without being explicitly programmed.
It involves training algorithms to recognize patterns in data and use that knowledge to
make predictions or decisions about new data. Machine learning is used in a wide range
of applications, from image recognition and natural language processing to fraud
detection and recommendation systems.
Examples of deep learning
1. Image recognition: Deep learning models can be trained to recognize and classify
images, such as identifying objects in photographs or detecting anomalies in medical
images.
2. Natural language processing: Deep learning algorithms can be used to analyze and
understand human language, such as sentiment analysis, language translation, and
speech recognition.
3. Autonomous vehicles: Deep learning is used to train self-driving cars to recognize
and respond to different driving scenarios, such as recognizing traffic signs and avoiding
obstacles.
5. Recommendation systems: Deep learning models can be used to recommend
products or services to users based on their past behavior and preferences.
6. Robotics: Deep learning is used to teach robots to recognize and manipulate objects,
navigate environments, and interact with humans.
What is the difference and similarity between deep learning and
machine learning
Deep learning is a subset of machine learning that involves training artificial neural
networks with multiple layers to learn and recognize patterns in data. Machine learning,
on the other hand, refers to a broader set of algorithms that enable machines to learn
from data and make predictions or decisions without being explicitly programmed.
The main similarity between deep learning and machine learning is that both involve
training algorithms to learn from data. However, deep learning requires more complex
and sophisticated algorithms that involve multiple layers of artificial neural networks,
while machine learning can use simpler algorithms such as decision trees or logistic
regression.
Another difference between the two is that deep learning typically requires more data
and computational resources than machine learning. Deep learning models often
require large amounts of labeled data to train effectively, and they need powerful
hardware such as GPUs to process the data efficiently.
In summary, deep learning is a subset of machine learning that involves training neural
networks with multiple layers to learn patterns in data. While both involve training
algorithms to learn from data, deep learning requires more complex algorithms and
computational resources than machine learning.
References
https://www.weforum.org/agenda/2015/03/top-10-emerging-technologies-of-2015-2/#ge
netic-engineerin
https://www.techtarget.com/searchenterpriseai/definition/deep-learning-deep-neural-net
work

You might also like