Al-Ismail CSIT183 AdvanceReading&Def

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Shahed B.

Al-Ismail CSIT183
4th Year BS Computer Science August 31, 2023
Social Issues and Professional Practice

Research and Definition of Terms


Introduction to Social Issues and Professional Practice

• Computer Ethics
• Ethics and the Law
• Professional Code of Conduct
• Framework for Ethical Analysis
• Exploring social issues

Computer Ethics

Computer Ethics is a multidisciplinary field that deals with the ethical implications
of human interaction with technology, particularly AI and software systems. It aims to
guide responsible development and use of technology while considering privacy, security,
human values, and societal well-being. This mainly promotes human-machine
collaboration, ensuring software quality and cybersecurity, managing cyber risks,
protecting data privacy in AI services, exploring AI’s impact on thought and identity,
ensuring ethical health information management, designing user-friendly human-
computer interactions, and addressing strategic interactions between humans and AI. It
seeks to strike a balance between technological advancement and ethical considerations
for a responsible and beneficial technological future.

Ethics and the Law

In regards to AI, cybersecurity, and data protection, Ethics and the Law are
essential for responsible and ethical technological advancements. Balancing innovation
with ethical considerations and legal regulations is important. The integration of AI in fields
such as health management and smartphone interactions requires adherence to ethical
guidelines and legal frameworks. Strategic human-AI interactions also demand ethical
considerations. With this, ethics and the law serve as guiding principles to ensure
technology benefits society while upholding ethical values.

Professional Code of Conduct

The Professional Code of Conduct outlines ethical principles for professionals


working in various fields, including technology, AI, cybersecurity, entrepreneurship and
healthcare. It focuses on responsible practices such as ethical AI integration, software
quality assurance, data protection, and privacy. With this, professionals are expected to
keep in mind of ethical considerations to ensure secure systems, protect sensitive data,
and align business goals. The conduct also highlights the importance of maintaining
ethical standards in research, human-AI interaction, and AI development. It aims to create
a balance between technological advancement and societal well-being, promoting
transparency, fairness, and accountability in professional actions.

Framework for Ethical Analysis

The Framework for Ethical Analysis addresses ethical considerations in the


realms of human-machine interactions, AI, cybersecurity, software quality assurance,
entrepreneurship, and data protection. This framework aims to guide responsible
decision-making in the face of emerging technological and business challenges while
prioritizing ethical values.

Exploring social issues

• "The Human Machine Team; Achieving Synergy Between Humans and


Artificial Intelligence to Transform Our World" is a book that highlights the
growing collaboration, between humans and AI. It explores the potential of AI
technologies, the considerations when integrating AI and the importance of
establishing effective collaboration models between humans and machines.
• In "The Future of Software Quality Assurance", you'll find an exploration of the
challenges and opportunities in maintaining and improving software quality in our
evolving landscape. The discussions likely include adapting QA processes to
technologies ensuring data security and addressing biases in AI-driven
applications.
• "Rational Cybersecurity for Business" delves into aligning cybersecurity
practices with business objectives. This book offers strategies for businesses to
protect themselves from cyber risks manage data breaches effectively and
establish a cybersecurity framework that aligns with their business goals.
• "Solving Cyber Risk; Protecting Your Company and Society" examines how
cyber risks are interconnected and their impact on both companies and society, as
a whole. The topic could cover ways to reduce risks the importance of regulations
and how everyone involved has a responsibility to protect spaces.
• The book "Entrepreneurship Strategy; Starting, Managing, And Scaling New
Ventures" delves into the complexities of starting and expanding businesses. It
probably includes conversations, about innovative strategies, for entering the
market overcoming growth obstacles and how new technologies affect prospects.
• In "Data Protection in AI Services: A Survey", it explores the intersection of data
protection regulations and AI services. It covers topics such as data privacy laws,
consent management, and the ethical use of data in AI-driven services.
• "Human Digital Thought Clones: The Holy Grail of Artificial Intelligence for
Big Data" discusses the concept of digital replica creation of human thought
processes and the implication for data analysis, AI understanding, and knowledge
extraction from vast datasets.
• The overview of health information management education in Saudi Arabia
focuses on the challenges, opportunities, and advancements in managing health-
related data within that field.
• In the research provided about smartphone human-computer interaction, it
delves into the design and usability of smartphone interfaces, exploring ways to
improve the interaction between users and smart devices.
• In the study on strategic interactions between humans and AI, it presented
findings involving human-computer interactions which gave insight on decision-
making processes, collaboration dynamics, and the role of AI in augmenting
human capabilities.
REFERENCES/TEXTBOOK
Major References:

1. Brigadier General Y.S, (2021). The Human-Machine Team: How to Create


Synergy Between Human & Artificial Intelligence That Will Revolutionize Our
World. Kindle Edition.
2. Goericke, S. (Ed.). (2020). The Future of Software Quality assurance. Springer
Open Access https://doi.org/10.1007/978-3-030-29509-7Links to an external site.
3. Blum, D. (2020). Rational cybersecurity for business : the security leaders’ guide
to business alignment. Berkeley, CA : Apress. (Springer Open
Access) https://doi.org/10.1007/978-1-4842-5952-8Links to an external site.
4. Coburn, Andrew, Leverett, Eireann & Woo, Gordon (2019). Solving cyber risk,
protecting your company and society. Hoboken, New Jersey : John Wiley & Sons
Inc
5. Shepherd, D. A., Patzelt, H. (2021). Entrepreneurship Strategy: Starting,
Managing, And Scaling New Ventures. Palgrave Macmillan (Open Access)
Https://Doi.Org/10.1007/978-3-030-78935-0

E-Journals (open Access)

1. MEURISCH, C., & MÜHLHÄUSER, M. (2022). Data Protection in AI Services: A


Survey. ACM Computing Surveys, 54(2), 1–
38. https://doi.org/10.1145/3440754Links to an external site.
2. Truby, J., & Brown, R. (2021). Human digital thought clones: the Holy Grail of
artificial intelligence for big data. Information & Communications Technology Law,
30(2), 140–168. https://doi.org/10.1080/13600834.2020.1850174Links to an
external site.
3. Al-dossary, H., Alumran, A., Alrayes, S., Althumairi, A., Aljanoubai, H., Alhuseinim,
M., Alkhaldi, O., Al-Fayez, A., Alanzi, T. (2021). An overview of health
information management education in Saudi Arabia. Volume 23.
Elsevier. https://doi.org/10.1016/j.imu.2021.100530Links to an external site.
4. Y. Kou, H. Chen, & Y. Zhou (2021). Research on the core competitiveness of
smart phone human-computer interaction. Volume 93.
Elsevier. https://doi.org/10.1016/j.compeleceng.2021.107285Links to an external
site.
5. Christoph March (2021). Strategic interactions between humans and
artificial intelligence: Lessons from experiments with computer players. Volume
87. Elsevier. https://doi.org/10.1016/j.joep.2021.102426

You might also like