Chapter 6
Ethics & Professionalism of emerging
technologies
10/28/2024 1
6.1. Technology and ethics
Activity 6.1
From your civic and ethical education course, what do you
understand about the word ethics?
The Internet boom has provided many benefits for society,
allowing the creation of new tools and new ways for people
to interact. As with many technological advances, however,
the Internet has not been without negative aspects.
For example, it has created new concerns about privacy,
and it has been hampered by spam and viruses. Moreover,
even as it serves as a medium for communication across
the globe, it threatens to cut off people who lack access to
it.
10/28/2024 2
General ethical principles
1. Contribute to society and to human well-being,
acknowledging that all people are stakeholders in
computing.
2. Avoid harm.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate
5. Respect the work required to produce new ideas,
inventions, creative works, and computing artifacts.
6. Respect privacy.
7. Honor confidentiality
10/28/2024 3
Professional responsibilities.
1. Strive to achieve high quality in both the processes &
products of professional work.
2. Know & respect existing rules pertaining to
professional work.
3. Accept & provide appropriate professional review.
4. Perform work only in areas of competence.
5. Access computing & communication resources only
when authorized or when compelled by the public
good.
6. Design & implement systems that are robustly &
usably secure.
10/28/2024 4
Digital privacy
Digital Privacy is the protection of personally identifiable
or business identifiable information that is collected from
respondents through information collection activities or
from other sources.
It is a collective definition that encompasses three sub-
related categories; information privacy, communication
privacy, and individual privacy
10/28/2024 5
information privacy
It is the notion that individuals should have the freedom, or
right, to determine how their digital information, mainly
that pertaining to personally identifiable information, is
collected and used.
Every country has various laws that dictate how
information may be collected and used by companies.
10/28/2024 6
Communication Privacy
Communication privacy is the notion that individuals should
have the freedom, or right, to communicate information
digitally with the expectation that their communications are
secure; meaning that messages and communications will
only be accessible to the sender's original intended recipient.
However, communications can be intercepted or delivered
to other recipients without the sender's knowledge, in a
multitude of ways. Communications can be intercepted
10/28/2024
directly through various hacking methods 7
…cont. Communication Privacy
It is necessarily requires consideration of technological
methods of protecting information/communication in
digital mediums, the effectiveness, and ineffectiveness of
such methods/systems, and the development/advancement
of new and current technologies.
10/28/2024 8
Individual Privacy
Individual privacy is the notion that individuals have a right to
exist freely on the internet, in that they can choose what types of
information they are exposed to, and more importantly that
unwanted information should not interrupt them.
Example: internet user receiving unwanted ads and emails/spam,
or a computer virus that forces the user to take actions they
otherwise wouldn't. In such cases the individual, during that
moment, doesn't exist digitally without interruption from
unwanted information; thus, their individual privacy has been
10/28/2024 infringed upon. 9
Treats and challenges
Emerging technologies are already impacting how we live
and work.
They're also changing how we approach, plan, and
integrate security operations.
Certainly, we are living in an era where innovation, agility,
and imagination are all essential in order to keep pace with
the exponential technological transformation taking place.
10/28/2024 10
Threats of Emerging Technologies
Some risks of emerging technology are:
➢ Driverless car: while a compelling option for future fleer cars,
companies could crash and burn from claims related to bodily injury
and property damage.
➢ Wearables: Google glass, Fitbit and other wearables can expose
companies to the invasion of privacy claims that may not be covered
by general liability or personal injury claims that weren’t foreseen.
➢ Drones: Turbulence is in the offing for manufacturers and
organizations that fail to protect themselves for property damage and
bodily injury, as well as errors and omissions.
➢ Internet of things: The proliferation of sensors and cross-
platform integration creates potential exposure from privacy
invasion, bodily injury and property damage that may connect an
organization
10/28/2024
to huge liabilities 11
10/28/2024 12