Emerging Technologies Chapter 6

Chapter 6: ETHICS AND PROFESSIONALISM OF EMERGING TECHNOLOGIES

6.1. Technology and ethics

·       As with many technological advances, however, the Internet has not been without negative aspects

ü it has created new concerns about privacy

ü It has been hampered by spam and viruses

ü it threatens to cut off people who lack access to it

·       Technology can serve to promote or restrict human rights

·       Information Society should foster the use of emerging technologies in such a way as to maximize the benefits that they provide while minimizing the harms

·       Ethics is particularly important for the accountancy profession, with a code for professional ethics based on five basic principles

Ø Integrity

Ø Objectivity

Ø competence and due care

Ø confidentiality

Ø professional behavior

·       emergence of new technologies raises some new challenges for the profession to address

6.2. New ethical questions 

·      increasing use of big data, algorithmic decision-making, and artificial intelligence strengths can potentially have a darker side too

·      outputs can be based on biased data, which could lead to discriminatory outcomes

·      there is a significant risk that those systems simply recreate the past and subsequently build in errors or systemic biases

·       Closely linked to discrimination is personalization, and the impact of tailoring decisions very specifically to individuals, based on preferences, activities and other features

ü this can be beneficial for many, others can lose out, and outcomes can again seem unfair or unethical

·       Whatever the power of the machine, humans will still need to be involved, so that people 

o  can be held accountable, or 

o  explain the reasons behind a decision

·       A central problem of the ethics of technology is that it tends to arrive too late

ü Ethics can then become a tool to clean up a mess that might have been avoidable

ü Indeed, there are ethical theories and approaches that explicitly aim at an early integration of ethics into the technology life cycle

§  One central problem of this type of approach is that the future is unknown

§  Ethics has traditionally not been well equipped to deal with issues of uncertainty and, in particular, future uncertainty

6.2.1. General ethical principles

1.  Contribute to society and to human well-being

ü acknowledging that all people are stakeholders in computing

2.  Avoid harm

3.  Be honest and trustworthy

4.  Be fair and take action not to discriminate

5.  Respect the work required to produce new ideas, inventions, creative works, and computing artifacts

6.  Respect privacy

7.  Honor confidentiality

6.2.2. Professional responsibilities

1.  Strive to achieve high quality in both the processes and products of professional work

2.  Maintain high standards of professional competence, conduct, and ethical practice

3.  Know and respect existing rules pertaining to professional work

4.  Accept and provide appropriate professional review

5.  Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks

6.  Perform work only in areas of competence

7.  Foster public awareness and understanding of computing, related technologies, and their consequences

8.  Access computing and communication resources only when authorized or when compelled by the public good

9.  Design and implement systems that are robustly and usably secure

6.2.3. Professional leadership principles

1.  Ensure that the public good is the central concern during all professional computing work

2.  Articulate, encourage acceptance of and evaluate fulfillment of social responsibilities by members of the organization or group

3.  Manage personnel and resources to enhance the quality of working life

4.  Articulate, apply, and support policies and processes that reflect the principles of the Code

5.  Create opportunities for members of the organization or group to grow as professionals

6.  Use care when modifying or retiring systems

ü Interface changes, the removal of features, and even software updates have an impact on the productivity of users and the quality of their work

7.  Recognize and take special care of systems that become integrated into the infrastructure of society

6.3. Digital privacy

·       is protection of personally identifiable or business identifiable information

ü information is collected from respondents through information collection activities or from other sources

·       encompasses three sub-related categories

Ø information privacy

Ø communication privacy

Ø individual privacy

·       It is often used in contexts that promote advocacy on behalf of individual and consumer privacy rights in digital spheres

ü typically used in opposition to the business practices of many e-marketers/companies to collect and use such information and data

6.3.1. Information Privacy

·       is the notion that individuals should have the freedom, or right, to determine how their digital information mainly that pertaining to personally identifiable information, is collected and used

·       Every country has various laws that dictate how information may be collected and used by companies

ü Some of those laws are written to give agency to the preferences of individuals/consumers in how their data is used

6.3.2. Communication Privacy

·       is the notion that individuals should have the freedom, or right, to communicate information digitally with the expectation that their communications are secure

ü messages and communications will only be accessible to the sender’s original intended recipient

·       communications can be intercepted or delivered to other recipients without the sender’s knowledge, in a multitude of ways

o  intercepted directly through various hacking methods

o  Communications can also be delivered to recipients unbeknownst to the sender due to false assumptions made regarding the platform or medium which was used to send information

§  companies frequently have been known to lack transparency in how they use information, this can be both intentional and unintentional

6.3.3. Individual Privacy

·       Is the notion that individuals have a right to exist freely on the internet

ü they can choose what types of information they are exposed to

ü unwanted information should not interrupt them

§  An example of a digital breach of individual privacy would be an internet user receiving unwanted ads and emails/spam, or a computer virus that forces the user to take actions they otherwise wouldn’t

6.3.4. Some digital privacy principles

Ø Data Minimization

ü collect the minimal amount of information necessary from individuals and businesses consistent with the Department’s mission and legal requirements

Ø Transparency

ü Information collected will not be used for any other purpose unless authorized or mandated by law

Ø Accuracy

ü Information collected will be maintained in a sufficiently accurate, timely, and complete manner to ensure that the interests of the individuals and businesses are protected

Ø Security

ü physical and IT security measures will be implemented to ensure that the collection, use, and maintenance of identifiable information are properly safeguarded and the information is promptly destroyed in accordance with approved records control schedules.

6.4. Accountability and trust

·       Often legal and regulatory frameworks haven’t kept pace with digital transformation, and organizations are seeking guidance

·       This challenge is exacerbated by the speed at which technological change is occurring and the breadth of its adoption – which is introducing new risks that demand new responses

·       the very solutions that can be used to better manage risk, increase transparency and build confidence are often themselves the source of new risks, which may go unnoticed

·       There’s a danger that the use of technology will degrade people’s willingness to judge and intervene because they feel that they are less personally connected to consumers and consumer outcomes – the logic of the machine has taken over from individual responsibility

·       The obligation of an individual or organization to account for its activities, accept responsibility for them, and to disclose the results in a transparent manner

6.5. Treats and challenges

6.5.1. Ethical and regulatory challenges

·       With Technology moving at a fast pace it is always been a challenge for Security

·       With Growing needs Cyber & Data Security is getting prominence that requires security practitioners to focus on the business need for securing data, understanding security and risk from a business perspective

·       Emerging technologies are also changing how we approach, plan, and integrate security operations

·       Emerging technologies are making an impact include:

o  Counter-terrorism and law enforcement informatics

o  Real-time horizon scanning and data mining

o  Automated cybersecurity and information assurance

o  Enhanced Surveillance

o  Simulation and augmented reality technologies

o  Safety and security equipment

o  Advanced forensics

o  Situational awareness capabilities via GPS

o  Biometrics: assured identity security screening solutions by bio-signature

o  Robotic Policing

6.5.1.1. Challenges in using Artificial Intelligence

·       AI is only as good as the data it is exposed to

ü How a business teaches and develops its AI will be the major factor in its usefulness

ü Humans could be the weak link here, as people are unlikely to want to input masses of data into a system

·       AI has potential to replace human workers

ü replace experts in higher-level jobs

ü Alternatively, AI also has the potential to take the burden of laborious and time-consuming tasks from these people, freeing up their time and brainpower for other things

6.5.1.2. Challenges in using Robotics in manufacturing

·       As automation technologies become more advanced, there will be a greater capability for automation to take over more and more complex jobs

·       As robots learn to teach each other and themselves, there is the potential for much greater productivity but this also raises ethical and cybersecurity concerns

6.5.1.3. Challenges in using the Internet of Things

·       As result of more connected devices the amount of data being generated is increasing

Ø Companies will have to plan carefully how this will affect the customer-facing application and how to best utilize the masses of data being produced

·       There are also severe security implications of mass connectivity that need to be addressed

6.5.1.4. Challenges in Big Data

·       Although data can be incredibly useful for spotting trends and analyzing impacts, surfacing all this data to humans in a way that they can understand can be challenging

6.5.2. Treats

·       New and emerging technologies also pose risks

·       Some risks of emerging technology are:

Ø Driverless car

ü claims related to bodily injury and property damage

Ø Wearables

ü wearables can expose companies to the invasion of privacy claims that may not be covered by general liability or personal injury claims that weren’t foreseen

Ø Drones

ü Turbulence is in the offing for manufacturers and organizations that fail to protect themselves for property damage and bodily injury, as well as errors and omissions

Ø Internet of things

ü proliferation of sensors and cross-platform integration creates potential exposure from privacy invasionbodily injury and property damage that may connect an organization to huge liabilities

 

 

 

 

 

 

 

 

 

Leave a Comment

Your email address will not be published. Required fields are marked *