Professional Documents
Culture Documents
CH 6
CH 6
By Tesfahun N.
Outline
Distinguish the link between ethics and technology.
Explain
3
Technology and ethics
6
New ethical questions
General ethical principles
1. Contribute to society and to human well-being, acknowledging that
all people are stakeholders in computing
2. Avoid harm
3. Be honest and trustworthy
4. Be fair and take action not to discriminate
5. Respect the work required to produce new ideas, inventions,
creative works, and computing artifacts
6. Respect privacy
7. Honor confidentiality
7
New ethical questions
Professional responsibilities
1. Strive to achieve high quality in both the processes and products
2. Maintain high standards of professional competence, conduct, and
ethical practice.
3. Know and respect existing rules
4. Accept and provide appropriate professional review
5. Give comprehensive and thorough evaluations of computer systems and
their impacts, including analysis of possible risks
6. Perform work only in areas of competence
7. Foster public awareness and understanding
8. Access computing and communication resources only when authorized
9. Design and implement systems that are robustly and usably secure
8
New ethical questions
Professional leadership principles
1. Ensure that the public good is the central concern
2. Articulate, encourage acceptance of and evaluate fulfillment of
social responsibilities
3. Manage man powers and resources
4. Articulate, apply, and support policies and processes
5. Create opportunities for members of the organization or group to
grow as professionals
6. Use care when modifying or retiring systems.
7. Recognize and take special care of systems that become
integrated into the infrastructure of society 9
Digital Privacy
14
Treats an Challenges(Read by your self)
Emerging technologies are making an impact include:
1. Counter-terrorism and law enforcement informatics via predictive analytics and artificial
intelligence.
2. Real-time horizon scanning and data mining for threats and information sharing
3. Automated cybersecurity and information assurance
4. Enhanced Surveillance (chemical and bio-detection sensors, cameras, drones, facial recognition,
license plate readers)
5. Simulation and augmented reality technologies for training and modeling
6. Safety and security equipment (including bullet and bomb proof) made with lighter and stronger
materials
7. Advanced forensics enabled by enhanced computing capabilities (including future quantum
computing)
8. Situational awareness capabilities via GPS for disaster response and crisis response scenarios
9. Biometrics: assured identity security screening solutions by bio-signature: (every aspect of your
physiology can be used as a bio-signature. Measure unique heart/pulse rates, electrocardiogram
sensor, blood oximetry, skin temperature)
10.Robotic Policing (already happening in Dubai!) 15
Treats an Challenges
16
Treats an Challenges
17
Treats an Challenges
18
Treats an Challenges
Treats
Some risks of emerging technology are:
Driverless car: while a compelling option for future fleer cars, companies
could crash and burn from claims related to bodily injury and property
damage.
Wearables: Google glass, Fitbit and other wearables can expose companies to
the invasion of privacy claims that may not be covered by general liability or
personal injury claims that weren’t foreseen
Drones: Turbulence is in the offing for manufacturers and organizations that
fail to protect themselves for property damage and bodily injury, as well as
errors and omissions.
Internet of things: The proliferation of sensors and cross-platform integration
creates potential exposure from privacy invasion, bodily injury and property19
damage that may connect an organization to huge liabilities.
Thank you
?
20