Professional Documents
Culture Documents
Chapter Six: Ethics and Professionalism of Emerging Technologies
Chapter Six: Ethics and Professionalism of Emerging Technologies
Of Emerging Technologies
Technology and ethics
2
The Internet boom has provided many benefits for society, allowing the
For example, it has created new concerns about privacy, and it has been
Ethics are a moral framework we can use to try to determine whether certain actions are right or wrong.
It’s hard to get a singular answer to an ethical dilemma, because ethics tend to be very personal.
Professionalism is the conduct, behavior and attitude of someone in a work or business environment.
Professionalism leads to workplace success, a strong professional reputation and a high level of work
ethic and excellence.
A code of ethics is a guide of principles designed to help professionals conduct business honestly and
with integrity. A code of ethics document may outline the mission and values of the business or
organization, the ethical principles based on the organization's core values, and the standards to which
the professional is held.
A code of ethics, also referred to as an "ethical code," may encompass areas such as business ethics, a
code of professional practice, and an employee code of conduct.
1. confidentiality,
2. integrity,
3. objectivity,
5. professional behavior
• However, the emergence of new technologies raises some new challenges for
the profession to address.
Overview of ST Instructor: Zelalem F. Aca. year 2013
Confidentiality
5
owner or custodian of the data gives explicit consent for it to be shared with
another party.
The disclosure of information to someone without the consent of the person who
owns it.
Privacy is a closely related concept that's most often associated with personal data.
minimum.
Leaders who are objective avoid using their own judgments and interpretations.
They rely on facts or data instead. Personal biases can come from many sources.
it is the state of being objective, just, unbiased and not influenced by emotions
• However, these strengths can potentially have a darker side too, throwing up
questions around the ethical use of these fairly new technologies.
• Indeed, where systems learn from real-world data, there is a significant risk
that those systems simply recreate the past and subsequently build in errors or
systemic biases.
Overview of ST Instructor: Zelalem F. Aca. year 2013
Technology and ethics
9
In many cases, ethical issues are only recognized when the technology is
already on the market and problems arise during its widespread use.
II.PROFESSIONAL RESPONSIBILITIES
1. Strive to achieve high quality in both the processes and products of professional
work.
2. Maintain high standards of professional competence, conduct, and ethical
practice.
3. Know and respect existing rules pertaining to professional work.
4. Accept and provide appropriate professional review.
5. Give comprehensive and thorough evaluations of computer systems and their
impacts, including analysis of possible risks.
6. Perform work only in areas of competence.
7. Foster public awareness and understanding of computing, related technologies,
and their consequences.
8. Access computing and communication resources only when authorized or when
compelled by the public good.
9. Design and implement systems that are robustly and usably secure.
Overview of ST Instructor: Zelalem F. Aca. year 2013
Technology and ethics
12
Digital privacy refers to the protection of an individual's information that is used or created while
using the Internet on a computer or personal device.
1. information privacy,
3. individual privacy
It is often used in contexts that promote advocacy on behalf of individual and consumer privacy
rights in digital spheres, and is typically used in opposition to the business practices of many e-
marketers/businesses/companies to collect and use such information and data.
Overview of ST Instructor: Zelalem F. Aca. year 2013
Information Privacy
14
Information privacy is the notion that individuals should have the freedom, or right, to
determine how their digital information, mainly that pertaining to personally identifiable
information, is collected and used.
It deals with the ability an organization or individual has to determine what data in a
computer system can be shared with third parties.
The ability to control what information one reveals about oneself over cable television, and
who can access that information.
The EU has various laws that dictate how information may be collected and used by
companies.
For example, some legislation, or lack of, allows companies to self-regulate their
collection and dissemination practices of consumer information.
Overview of ST Instructor: Zelalem F. Aca. year 2013
Communication Privacy
15
In digital privacy, communication privacy is the notion that individuals should have the
freedom, or right, to communicate information digitally with the expectation that their
communications are secure;
meaning that messages and communications will only be accessible to the sender's original
intended recipient.
Communications can also be delivered to recipients unbeknownst to the sender due to false
assumptions made regarding the platform or medium which was used to send information.
Individual privacy is the notion that individuals have a right to exist freely on the
internet, in that they can choose what types of information they are exposed to,
and more importantly that unwanted information should not interrupt them
In such cases the individual, during that moment, doesn't exist digitally without
interruption from unwanted information; thus their individual privacy has been
infringed upon.
Data Minimization: collect the minimal amount of data necessary from individuals
and businesses consistent with the Department’s mission requirements.
Transparency: Notice covering the purpose of the collection and use of identifiable
information will be provided in a clear manner.
End of Course!