Professional Documents
Culture Documents
tracing (2) 4
tracing (2) 4
tracing (2) 4
Introduction
In several countries, contact tracing apps have been introduced as a way to prevent the
spread of COVID-19. These apps work by identifying the people who have tested positive
from the COVID-19, prompting the people to share the information, locating the
individualswho have been in close contact with them and then notifying the people. In this
report the brief about the ethical issue related to uses of contact tracing apps is discussed.
Also, some of the case studies relevant to clauses of ACS Code of Professional conduct are
provided which are summarizes the values related to professional work by the members and
Monitoring of the people by the contact tracing apps compromises with the privacy of
the people because the personal data of the people can fall into the wrong hands and can used
for maleficent activities. These apps use GPS or Bluetooth to detect the proximity of an
individual with another. Bluetooth Low Energy (BLE) enables the mobile of a person to
broadcasts the information with unique ID. Different apps works in different ways but all of
However, this process sounds so feasible and doable but the case is not that simple as
it looks because being monitored by these apps for 24 hours raises the question of privacy of
people and potential abuse. These apps stores log of the ongoing locations and timestamps of
a person with the help of GPS in the devices, hence compromising with the privacy of
peopleby revealing their whereabouts and travels over a period of time. A balance should be
security can put the private data of the people at risk. Some of apps which uses GPS are
2
SafePaths , Hamgen and AarogyaSetu app (Trang, Trenz, Weiger, Tarafdar, & Cheung,
2020).
approaches used by these apps. In centralized approach, public health authorities are able to
analyse the information of the people by checking the log of their devices which is uploaded
to a central server. However, through this process the privacy of the people is invaded
because their location and the information of the other people with whom they have met is
stored in the servers. NHS COVID-19, TraceTogether and COVIDSafe are some of the apps
information of a person is uploaded on the servers and the log remains on the mobile device.
Users who have tested positive, their IDs are downloaded anonymously by the apps and the
same information is matched with the logs stored on their devices.PrivateTracer is one of the
Challenges Regarding the Privacy: There are four types of challenges that people
1. If the process which uses the Bluetooth Low Energy by the apps in
broadcasting the data packets in order to identify other devices is not set
properly, the device of a person can get hacked by interlinking various devices
2. Sensitive information like contacts logs and encryptions keys which are stored
called sandbox rather connecting them with shared locations. Still with the
sandbox approach, a hacker can hack the device if the hacker gets physical
the intercept of the trafficif the communication with the backend of the server
2020).
4. When the information, such as diagnoses of the user and contacts logs, is
proper authorization is not done, servers can receive fake health reports which
undermines the reliability of the system (Wen, Zhao, Lin, Xuan, & Shroff,
2020).
Tracing apps should be downloaded from the official stores only, as there are many
fake apps has been reported during the pandemic because these fake apps are made by the
mischievous people which can gain access to the devices of the people and apps related to
security solution should also be installed by the users to scan the applications and protect the
members. These codes are established as the Code of Professional Conduct and is the part of
the regulations of the society which are applicable to every member of ACS working in the
field of information and communications technology (Burmeister, 2017). The ACS code of
ethics agree with the argument that “Codes guide the members of a profession in ethical
choices” because these codes are relevant to standards of professional legislation and if the
codes are not abided then the failure can be used as grounds for a claim of professional
negligence.
4
An ACS member, Katherina has provided an extensive and voluntary aid to many
infirmities supports groups. These groups use ICT to benefit the clients and provide
in this ASC code includes a) Public Interest: To consider other professions and social
of Life: To recognize the role of ICT in people’s life particularly for disadvantaged. c)
knowledge and understanding of public towards ICT (Carter, Mayes, Eagle, & Dahl,
2017).
The ASC Disciplinary Committee decided to do the meeting on Camera and avoid
protect the reputation and status of the members. In this aspect the ASC conduct
the codes and to promote trustworthiness and professionalism in ICT (McAuliffe &
Nipperess, 2017).
the ASC have various codes of conduct in that aspect such as a) Public Interest:
Consider interest of those who are potentially affected by the work, raise the conflicts
regarding professional activity and legal public requirements and objectify the
To maintain the rules of Traffic Control System (TCS) and its selection for a
particular locality the ACS has following code of conducts. a) Honesty: To avoid
tarnish the image of the profession and stigmatised the good name of ASC. c) Public
official work manners, such as allowing the employees to continue work off site when
system to be more attentive regarding these issues or avoid the casualness for the
same. ASC has code of conducts which endeavour the reserve integrity, utility,
continuity and security of ICT under Public Interest Code of Conducts. In case of
Competence seek and respect the expertise of professional colleagues in their area of
expert and ask their advice and suggestions in case of any misunderstanding a task
Conclusion
To conclude the report, the contact tracing apps may have playing a significant role in
the technological sectors or aspects but the risks related to these apps cannot be avoided and
keeping in mind the security and privacy concerns strict rules should be taken into
consideration. The ASC Code guides the public effectively regarding their ethical choices
and to improve quality of life of individuals. These codes are building blocks of well
structured and professional workplace conduction of ICT. The role of different clauses and
values related to ethics is quite essential to maintain the ethical culture of ICT.
6
7
References
Ahmed, N., Michelin, R. A., Xue, W., Ruj, S., Malaney, R., Kanhere, S. S., et al. (2020). A
Survey of COVID-19 Contact Tracing Apps. IEEE Access , 134577-134601.
Bengio, Y., Ippolito, D., Janda, R., Jarvie, M., Prud'homme, B., Rousseau, J.-F., et al. (2021).
Inherent privacy limitations of decentralized contact tracing apps. Journal of the American
Medical Informatics Association , 193-195.
Carter, S. M., Mayes, C., Eagle, L., & Dahl, S. (2017). A Code of Ethics for Social
Marketing? Bridging Procedural Ethics and Ethics-in-Practice. Journal of Nonprofit & Public
Sector Marketing , 20-38.
Chan, E. Y., & Saqib, N. U. (2021). Privacy concerns can explain unwillingness to download
and use contact tracing apps when COVID-19 concerns are high. Computers in Human
Behavior , 106718.
Goldingay, S., & Boddy, J. (2016). Preparing Social Work Graduates for Digital Practice:
Ethical Pedagogies for Effective Learning. Australian Social Work , 209-220.
Maxwell, B. (2020). Codes of Professional Conduct and Ethics Education for Future
Teachers. Philosophical Inquiry in Education , 323-347.
McAuliffe, D., & Nipperess, S. (2017). e-Professionalism and the Ethical Use of Technology
in Social Work. Australian Social Work , 131-134.
Rowe, F. (2020). Contact tracing apps and values dilemmas: A privacy paradox in a neo-
liberal world. International Journal of Information Management , 102178.
Trang, S., Trenz, M., Weiger, W. H., Tarafdar, M., & Cheung, C. M. (2020). One app to trace
them all? Examining app specifications for mass acceptance of contact-tracing apps.
European Journal of Information Systems , 415-428.
Wen, H., Zhao, Q., Lin, Z., Xuan, D., & Shroff, N. (2020). A Study of the Privacy of
COVID-19 Contact Tracing Apps. Lecture Notes of the Institute for Computer Sciences,
8
Yasaka, T. M., Lehrich, B. M., & Sahyouni, R. (2020). Peer-to-Peer Contact Tracing:
Development of a Privacy-Preserving Smartphone App. JMIR mHealth and uHealth ,
e18936.