SlideShare una empresa de Scribd logo
1 de 19
ETHICS AND PROFESSIONALISM
OF EMERGING TECHNOLOGIES
GROUP 4
TOPICS:
INTEGRITY
OBJECTIVITY
COMPETENCE AND DUE
CARE
CONFIDENTIALITY
PROFESSIONAL BEHAVIOUR
ETHICS AND PROFESSIONALISM
Ethics refers to the moral principles and values
that guide the development and use of new and
innovative technologies.
Professionalism refers to the set of skills,
knowledge, and ethical standards.
EXAMPLE
• Artificial Intelligence (AI): AI
systems must be developed and used
in an ethical manner, with
considerations for fairness,
transparency, and accountability.
• Autonomous Vehicles: The
development of autonomous vehicles
raises ethical questions related to
safety, liability, and privacy.
INTEGRITY
Integrity refers to the quality of being honest,
trustworthy, and ethical in the development and
use of new and innovative technologies.
EXAMPLE
• Authentication refers to the process of
verifying the identity of users or devices
accessing digital resources, such as
websites, applications, or data.
• Trustworthiness: Protect user privacy
and security: Protect user data and
privacy by using Encryption, secure
storage, and access controls. Don't use or
share data without user consent.
INTEGRITY PROS AND CONS
PROS:
• Building trust: Demonstrating integrity in emerging
technology can help build trust among stakeholders,
including clients, investors, and regulators. This can lead
to increased adoption and investment in emerging
technologies.
CONS:
• Higher costs: Maintaining integrity in emerging technology
can be expensive, as it often requires additional resources
for testing, monitoring, and compliance.
OBJECTIVITY
Objectivity refers to the ability to remain
unbiased and impartial when evaluating and
developing new technologies.
EXAMPLE
• A cybersecurity professional testing and
evaluating security measures and tools
impartially, without any biases or
preconceived notions.
• A data analyst presenting data in a clear
and unbiased way, rather than cherry-
picking data to support a preconceived
idea or agenda.
OBJECTIVITY PROS AND CONS
PROS:
• Promotes fairness and equality
• Encourages ethical decision-making
• Reduces the likelihood of biased decisions
CONS:
• May be challenging to maintain objectivity in situations
where personal interests or biases are present
• Can lead to indecisiveness or inaction in some situations
COMPETENCE AND DUE CARE
Competence refers to the ability to apply
knowledge and skills effectively to solve
problems and achieve objectives in the context
of emerging technologies.
Due care refers to the obligation to take
reasonable steps to ensure that emerging
technologies are developed and used in a
responsible, ethical, and safe manner.
EXAMPLE
• A software engineer staying up-to-date
with the latest programming languages
and frameworks to ensure they have
the necessary skills to develop high-
quality software.
• A cybersecurity professional keeping up
with the latest security threats and
vulnerabilities to ensure they can
identify and mitigate risks to the
systems they manage.
COMPETENCE AND DUE CARE PROS
AND CONS
Pros:
• Ensures high-quality service to clients or stakeholders
• Promotes safety, security, and effectiveness in the development
and implementation of emerging technologies
Cons:
• Maintaining competence and due care can be time-consuming and
require ongoing training and education
• May be challenging to keep up with the latest developments and
trends in emerging technologies
CONFIDENTIALITY
Confidentiality refers to the protection of
sensitive or private information from
unauthorized access or disclosure.
EXAMPLE
• Protecting Sensitive Information:
Example, a soft drink company might
keep its recipe confidential so that no one
can copy it or use it to form new ideas.
• Health data privacy: With the increasing
use of wearable devices, health-related
data is being collected and transmitted
more than ever before. Maintaining
confidentiality is crucial to ensure that
sensitive health information is not
accessed by unauthorized parties.
CONFIDENTIALITY PROS AND
CONS
Pros:
• Protects User Information: By utilizing confidentiality in emerging
technology, users’ data and information can be kept secure.
• Improves Security: By keeping user data safe and protected, businesses
can ensure that only authorized users can access their systems and data.
Cons:
• Can Be Expensive: Implementing confidentiality in emerging
technology can be costly, as it requires investments in infrastructure,
processes, and resources.
PROFESSIONAL BEHAVIOUR
Professional behavior refers to the expected
standards of conduct for professionals working
with new and innovative technologies. It includes
a range of behaviors and attitudes that
contribute to responsible and ethical
development and use of emerging technologies.
EXAMPLE
• Effective communication with colleagues
and clients and staying up-to-date on the
latest technology advancements.
• Using appropriate problem-solving skills to
troubleshoot issues. Demonstrating a clear
understanding of the application of the
emerging technology.
PROFESSIONAL BEHAVIOUR
PROS AND CONS
Pros:
• Increased accuracy - Automated technologies can reduce errors and
ensure that tasks are completed correctly.
• Improved customer service - Professional behavior can create a more
positive customer experience, leading to increased customer satisfaction
and loyalty.
Cons:
• Privacy risks - With automated systems collecting and processing data,
there is an increased risk of privacy violations and data breaches.

Más contenido relacionado

La actualidad más candente

Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations121487
 
Business Innovation
Business InnovationBusiness Innovation
Business Innovationtutor2u
 
How Big is Big Data? Big Data Overview | Edureka
How Big is Big Data? Big Data Overview | EdurekaHow Big is Big Data? Big Data Overview | Edureka
How Big is Big Data? Big Data Overview | EdurekaEdureka!
 
GENERATIVE AI, THE FUTURE OF PRODUCTIVITY
GENERATIVE AI, THE FUTURE OF PRODUCTIVITYGENERATIVE AI, THE FUTURE OF PRODUCTIVITY
GENERATIVE AI, THE FUTURE OF PRODUCTIVITYAndre Muscat
 
Ict power point
Ict power pointIct power point
Ict power point106hoarau
 
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?Bernard Marr
 
Big Data & Analytics (Conceptual and Practical Introduction)
Big Data & Analytics (Conceptual and Practical Introduction)Big Data & Analytics (Conceptual and Practical Introduction)
Big Data & Analytics (Conceptual and Practical Introduction)Yaman Hajja, Ph.D.
 
Artificial Intelligence High Technology PowerPoint Presentation Slides Comple...
Artificial Intelligence High Technology PowerPoint Presentation Slides Comple...Artificial Intelligence High Technology PowerPoint Presentation Slides Comple...
Artificial Intelligence High Technology PowerPoint Presentation Slides Comple...SlideTeam
 
How Does Generative AI Actually Work? (a quick semi-technical introduction to...
How Does Generative AI Actually Work? (a quick semi-technical introduction to...How Does Generative AI Actually Work? (a quick semi-technical introduction to...
How Does Generative AI Actually Work? (a quick semi-technical introduction to...ssuser4edc93
 
Introduction to Big Data Analytics and Data Science
Introduction to Big Data Analytics and Data ScienceIntroduction to Big Data Analytics and Data Science
Introduction to Big Data Analytics and Data ScienceData Science Thailand
 
Understanding big data and data analytics big data
Understanding big data and data analytics big dataUnderstanding big data and data analytics big data
Understanding big data and data analytics big dataSeta Wicaksana
 
ARK_Big_Ideas_2023_1675517202.pdf
ARK_Big_Ideas_2023_1675517202.pdfARK_Big_Ideas_2023_1675517202.pdf
ARK_Big_Ideas_2023_1675517202.pdfProDigy14
 
Enhancing academic productivity using Gen AI
Enhancing academic productivity using Gen AIEnhancing academic productivity using Gen AI
Enhancing academic productivity using Gen AINurfadhlina Mohd Sharef
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Presentation on Business Intelligence (BI)
Presentation on Business Intelligence (BI)Presentation on Business Intelligence (BI)
Presentation on Business Intelligence (BI)AkashBorse2
 

La actualidad más candente (20)

Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations
 
Big Data ppt
Big Data pptBig Data ppt
Big Data ppt
 
Business Innovation
Business InnovationBusiness Innovation
Business Innovation
 
Big data
Big dataBig data
Big data
 
Big Data: Issues and Challenges
Big Data: Issues and ChallengesBig Data: Issues and Challenges
Big Data: Issues and Challenges
 
How Big is Big Data? Big Data Overview | Edureka
How Big is Big Data? Big Data Overview | EdurekaHow Big is Big Data? Big Data Overview | Edureka
How Big is Big Data? Big Data Overview | Edureka
 
GENERATIVE AI, THE FUTURE OF PRODUCTIVITY
GENERATIVE AI, THE FUTURE OF PRODUCTIVITYGENERATIVE AI, THE FUTURE OF PRODUCTIVITY
GENERATIVE AI, THE FUTURE OF PRODUCTIVITY
 
Ict power point
Ict power pointIct power point
Ict power point
 
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
 
weapon development.pptx
weapon development.pptxweapon development.pptx
weapon development.pptx
 
Big Data & Analytics (Conceptual and Practical Introduction)
Big Data & Analytics (Conceptual and Practical Introduction)Big Data & Analytics (Conceptual and Practical Introduction)
Big Data & Analytics (Conceptual and Practical Introduction)
 
Artificial Intelligence High Technology PowerPoint Presentation Slides Comple...
Artificial Intelligence High Technology PowerPoint Presentation Slides Comple...Artificial Intelligence High Technology PowerPoint Presentation Slides Comple...
Artificial Intelligence High Technology PowerPoint Presentation Slides Comple...
 
How Does Generative AI Actually Work? (a quick semi-technical introduction to...
How Does Generative AI Actually Work? (a quick semi-technical introduction to...How Does Generative AI Actually Work? (a quick semi-technical introduction to...
How Does Generative AI Actually Work? (a quick semi-technical introduction to...
 
Introduction to Big Data Analytics and Data Science
Introduction to Big Data Analytics and Data ScienceIntroduction to Big Data Analytics and Data Science
Introduction to Big Data Analytics and Data Science
 
Understanding big data and data analytics big data
Understanding big data and data analytics big dataUnderstanding big data and data analytics big data
Understanding big data and data analytics big data
 
ARK_Big_Ideas_2023_1675517202.pdf
ARK_Big_Ideas_2023_1675517202.pdfARK_Big_Ideas_2023_1675517202.pdf
ARK_Big_Ideas_2023_1675517202.pdf
 
Enhancing academic productivity using Gen AI
Enhancing academic productivity using Gen AIEnhancing academic productivity using Gen AI
Enhancing academic productivity using Gen AI
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Presentation on Business Intelligence (BI)
Presentation on Business Intelligence (BI)Presentation on Business Intelligence (BI)
Presentation on Business Intelligence (BI)
 
Software Liability.pptx
Software Liability.pptxSoftware Liability.pptx
Software Liability.pptx
 

Similar a ETHICS AND PROFESSIONALISM OF EMERGING TECHNOLOGIES.pptx

Engineering council uk guidance on security for engineers & technicians
Engineering council uk guidance on security for engineers & techniciansEngineering council uk guidance on security for engineers & technicians
Engineering council uk guidance on security for engineers & techniciansBhim Upadhyaya
 
SY0-701 Dumps | SY0-701 Preparation Kit
SY0-701 Dumps | SY0-701 Preparation KitSY0-701 Dumps | SY0-701 Preparation Kit
SY0-701 Dumps | SY0-701 Preparation Kitbronxfugly43
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Ensuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote DevelopersEnsuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote DevelopersAcquaint Softtech Private Limited
 
What is Information Assurance Model in Cyber Security.pptx
What is Information Assurance Model in Cyber Security.pptxWhat is Information Assurance Model in Cyber Security.pptx
What is Information Assurance Model in Cyber Security.pptxinfosec train
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfssuserf98dd4
 
The Netizen Approach to Security and Innovation
The Netizen Approach to Security and InnovationThe Netizen Approach to Security and Innovation
The Netizen Approach to Security and InnovationNetizen Corporation
 
Interviewee Kit v1.6.pdf
Interviewee Kit v1.6.pdfInterviewee Kit v1.6.pdf
Interviewee Kit v1.6.pdfSaranRaj737939
 
Human Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxHuman Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxShreeveni
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
Exploring Ethical Hacking for a Safer Digital World
Exploring Ethical Hacking for a Safer Digital WorldExploring Ethical Hacking for a Safer Digital World
Exploring Ethical Hacking for a Safer Digital Worldrashmicetpa20
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering EthicsKapil Rajpurohit
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 

Similar a ETHICS AND PROFESSIONALISM OF EMERGING TECHNOLOGIES.pptx (20)

Engineering council uk guidance on security for engineers & technicians
Engineering council uk guidance on security for engineers & techniciansEngineering council uk guidance on security for engineers & technicians
Engineering council uk guidance on security for engineers & technicians
 
SY0-701 Dumps | SY0-701 Preparation Kit
SY0-701 Dumps | SY0-701 Preparation KitSY0-701 Dumps | SY0-701 Preparation Kit
SY0-701 Dumps | SY0-701 Preparation Kit
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Ensuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote DevelopersEnsuring Security and Confidentiality with Remote Developers
Ensuring Security and Confidentiality with Remote Developers
 
What is Information Assurance Model in Cyber Security.pptx
What is Information Assurance Model in Cyber Security.pptxWhat is Information Assurance Model in Cyber Security.pptx
What is Information Assurance Model in Cyber Security.pptx
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Privacy Engineering in the Wild
Privacy Engineering in the WildPrivacy Engineering in the Wild
Privacy Engineering in the Wild
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
 
The Netizen Approach to Security and Innovation
The Netizen Approach to Security and InnovationThe Netizen Approach to Security and Innovation
The Netizen Approach to Security and Innovation
 
Interviewee Kit v1.6.pdf
Interviewee Kit v1.6.pdfInterviewee Kit v1.6.pdf
Interviewee Kit v1.6.pdf
 
Human Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxHuman Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptx
 
Final ppt g08
Final ppt g08Final ppt g08
Final ppt g08
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Exploring Ethical Hacking for a Safer Digital World
Exploring Ethical Hacking for a Safer Digital WorldExploring Ethical Hacking for a Safer Digital World
Exploring Ethical Hacking for a Safer Digital World
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering Ethics
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 

Último

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

ETHICS AND PROFESSIONALISM OF EMERGING TECHNOLOGIES.pptx

  • 1. ETHICS AND PROFESSIONALISM OF EMERGING TECHNOLOGIES GROUP 4
  • 3. ETHICS AND PROFESSIONALISM Ethics refers to the moral principles and values that guide the development and use of new and innovative technologies. Professionalism refers to the set of skills, knowledge, and ethical standards.
  • 4. EXAMPLE • Artificial Intelligence (AI): AI systems must be developed and used in an ethical manner, with considerations for fairness, transparency, and accountability. • Autonomous Vehicles: The development of autonomous vehicles raises ethical questions related to safety, liability, and privacy.
  • 5. INTEGRITY Integrity refers to the quality of being honest, trustworthy, and ethical in the development and use of new and innovative technologies.
  • 6. EXAMPLE • Authentication refers to the process of verifying the identity of users or devices accessing digital resources, such as websites, applications, or data. • Trustworthiness: Protect user privacy and security: Protect user data and privacy by using Encryption, secure storage, and access controls. Don't use or share data without user consent.
  • 7. INTEGRITY PROS AND CONS PROS: • Building trust: Demonstrating integrity in emerging technology can help build trust among stakeholders, including clients, investors, and regulators. This can lead to increased adoption and investment in emerging technologies. CONS: • Higher costs: Maintaining integrity in emerging technology can be expensive, as it often requires additional resources for testing, monitoring, and compliance.
  • 8. OBJECTIVITY Objectivity refers to the ability to remain unbiased and impartial when evaluating and developing new technologies.
  • 9. EXAMPLE • A cybersecurity professional testing and evaluating security measures and tools impartially, without any biases or preconceived notions. • A data analyst presenting data in a clear and unbiased way, rather than cherry- picking data to support a preconceived idea or agenda.
  • 10. OBJECTIVITY PROS AND CONS PROS: • Promotes fairness and equality • Encourages ethical decision-making • Reduces the likelihood of biased decisions CONS: • May be challenging to maintain objectivity in situations where personal interests or biases are present • Can lead to indecisiveness or inaction in some situations
  • 11. COMPETENCE AND DUE CARE Competence refers to the ability to apply knowledge and skills effectively to solve problems and achieve objectives in the context of emerging technologies. Due care refers to the obligation to take reasonable steps to ensure that emerging technologies are developed and used in a responsible, ethical, and safe manner.
  • 12. EXAMPLE • A software engineer staying up-to-date with the latest programming languages and frameworks to ensure they have the necessary skills to develop high- quality software. • A cybersecurity professional keeping up with the latest security threats and vulnerabilities to ensure they can identify and mitigate risks to the systems they manage.
  • 13. COMPETENCE AND DUE CARE PROS AND CONS Pros: • Ensures high-quality service to clients or stakeholders • Promotes safety, security, and effectiveness in the development and implementation of emerging technologies Cons: • Maintaining competence and due care can be time-consuming and require ongoing training and education • May be challenging to keep up with the latest developments and trends in emerging technologies
  • 14. CONFIDENTIALITY Confidentiality refers to the protection of sensitive or private information from unauthorized access or disclosure.
  • 15. EXAMPLE • Protecting Sensitive Information: Example, a soft drink company might keep its recipe confidential so that no one can copy it or use it to form new ideas. • Health data privacy: With the increasing use of wearable devices, health-related data is being collected and transmitted more than ever before. Maintaining confidentiality is crucial to ensure that sensitive health information is not accessed by unauthorized parties.
  • 16. CONFIDENTIALITY PROS AND CONS Pros: • Protects User Information: By utilizing confidentiality in emerging technology, users’ data and information can be kept secure. • Improves Security: By keeping user data safe and protected, businesses can ensure that only authorized users can access their systems and data. Cons: • Can Be Expensive: Implementing confidentiality in emerging technology can be costly, as it requires investments in infrastructure, processes, and resources.
  • 17. PROFESSIONAL BEHAVIOUR Professional behavior refers to the expected standards of conduct for professionals working with new and innovative technologies. It includes a range of behaviors and attitudes that contribute to responsible and ethical development and use of emerging technologies.
  • 18. EXAMPLE • Effective communication with colleagues and clients and staying up-to-date on the latest technology advancements. • Using appropriate problem-solving skills to troubleshoot issues. Demonstrating a clear understanding of the application of the emerging technology.
  • 19. PROFESSIONAL BEHAVIOUR PROS AND CONS Pros: • Increased accuracy - Automated technologies can reduce errors and ensure that tasks are completed correctly. • Improved customer service - Professional behavior can create a more positive customer experience, leading to increased customer satisfaction and loyalty. Cons: • Privacy risks - With automated systems collecting and processing data, there is an increased risk of privacy violations and data breaches.