Ethics in Emerging Technologies Overview
Ethics in Emerging Technologies Overview
1. Berihun Bekele………………….…….0022/15
2. Buli Tekle……………………….…….0041/15
3. Etaferaw Beyene……………….……...0028/15
4. Getachew Bekele………………..……..0018/15
5. Haymanot Astatke…………………..0008/14
6. Meseret Kasahun…………….………...0046/15
7. Niguse Delbato…………………….…..0047/15
8. Yesuf Said………………….…………..0027/15
Contents
1. The Importance of Ethics in Emerging Technologies..............................................................1
2. General Ethical Rules...............................................................................................................2
3. Professional Responsibility related to Ethical Rules................................................................3
4. Digital Privacy and its importance..........................................................................................3
5. Principles Digital Privacy.........................................................................................................4
6. Accountability need in using Emerging Technologies.............................................................5
7. Trust necessary to use an Emerging Technology platform......................................................6
8. The Challenges of using AI, Robots, and IoT..........................................................................7
9. The risks we face in Augmented Reality, IoT and AI..............................................................8
10. Big data dealing with demands high ethical regulations, accountability, and responsibility of
the person as well as the company
..................................................................................................................................................
9
11. Nanotechnology and applications of Nanotechnology...........................................................10
12. Biotechnology and its importance in agriculture, medicine, and environment......................12
13. Block Chain Technology………………………………………………………………...…..14
14. Cloud and Quantum Computing.............................................................................................15
15. Autonomic Computing and some of its characteristics..........................................................17
16. Computer Version and some real world applications.............................................................18
17. Embed systems and its components.......................................................................................19
18. Cybersecurity, some Cybersecurity Threats and Advantages of Cybersecurity
20
19. Additive Manufacturing..........................................................................................................21
20. 3D Printing.............................................................................................................................21
i
Emerging TECHNOLOGy
Human Well-being and Safety: Emerging technologies often have a direct impact on people's
lives. Ethical considerations help ensure that these technologies are developed and deployed in
ways that prioritize the well-being and safety of individuals.
Privacy Concerns: Many emerging technologies involve the collection and analysis of vast
amounts of personal data. Ethical guidelines are crucial to protect individuals' privacy rights and
prevent unauthorized or unethical use of sensitive information.
Equity and Inclusivity: Ethical considerations help address issues of equity and inclusivity in
technology development and deployment. It is essential to prevent the creation of technologies
that perpetuate or exacerbate existing social inequalities.
Public Trust: A commitment to ethical practices fosters public trust in the development and
adoption of emerging technologies. Trust is crucial for widespread acceptance and successful
implementation of new technologies.
Legal and Regulatory Compliance: Ethical guidelines often align with legal and regulatory
requirements. Adhering to ethical principles helps organizations and individuals navigate the
legal landscape surrounding emerging technologies.
Page | 1
Emerging TECHNOLOGy
Transparency: Strive for openness and clarity in the design, operation, and impact of
technologies. Provide clear information about how systems function, what data is collected, and
how decisions are made.
Fairness: Ensure that emerging technologies do not discriminate or perpetuate existing biases.
Strive for equitable access, benefits, and opportunities for all individuals, regardless of
demographic factors.
Privacy: Respect individuals' right to privacy and implement robust measures to protect personal
data. Obtain informed consent for data collection and processing activities.
Security: Prioritize the security of systems and data to prevent unauthorized access, data
breaches, and potential harm. Regularly update and maintain security measures to address
evolving threats.
Accountability: Establish clear lines of responsibility for the development, deployment, and
maintenance of technologies. Hold individuals and organizations accountable for the ethical
implications of their technologies.
Human-Centric Design: Prioritize the well-being and safety of users in the design and
implementation of technologies. Consider the social and psychological impact of technologies on
individuals and communities.
Inclusivity: Design technologies that are accessible and inclusive, considering a diverse range of
users. Avoid creating technologies that reinforce or exacerbate social inequalities.
Cultural Sensitivity: Recognize and respect cultural differences when designing and
implementing technologies. Avoid imposing values or norms that may conflict with local
cultures and perspectives.
Page | 2
Emerging TECHNOLOGy
a. Strive to achieve high quality in both the processes and products of professional work.
e. Give comprehensive and thorough evaluations of computer systems and their impacts,
including analysis of possible risks.
g. Foster public awareness and understanding of computing, related technologies, and their
consequences.
h. Access computing and communication resources only when authorized or when compelled
by the public good.
i. Design and implement systems that are robustly and usably secure
Digital privacy refers to the protection of personal information and the right to control one's own
data in the context of digital technologies. It encompasses the various ways individuals can
control the collection, use, and sharing of their personal information in the online environment.
Page | 3
Emerging TECHNOLOGy
Personal Security: Protecting digital privacy is essential for personal security. Sensitive
information such as financial details, medical records, and contact information can be misused if
it falls into the wrong hands. Maintaining privacy safeguards individuals from identity theft,
fraud, and other forms of cybercrime.
Autonomy and Control: Digital privacy empowers individuals to have control over their
personal information. It allows people to make informed choices about what data they share,
with whom, and for what purposes. This autonomy is fundamental to respecting individuals'
rights and preferences.
Freedom of Expression: Privacy is closely linked to freedom of expression. People are more
likely to express their thoughts, opinions, and ideas freely when they feel their digital
communications are private and not subject to unwarranted scrutiny.
Data Minimization: Collect only the minimum amount of personal data necessary for a
specific purpose. Avoid unnecessary or excessive collection of information.
Page | 4
Emerging TECHNOLOGy
Transparency: Notice covering the purpose of the collection and use of identifiable
information will be provided in a clear manner. Information collected will not be used for
any other purpose unless authorized or mandated by law.
Security: Adequate physical and IT security measures will be implemented to ensure that
the collection, use, and maintenance of identifiable information are properly safeguarded
and the information is promptly destroyed in accordance with approved records control
schedules.
User Control: Empower individuals to control their own data. Offer mechanisms for
users to access, correct, or delete their personal information and manage privacy settings.
Data Portability: Allow individuals to easily transfer their personal data between
services or platforms. Avoid creating barriers that prevent users from exercising their
rights to data portability.
a. Ethical Considerations: Emerging technologies often introduce new ethical challenges and
dilemmas. Accountability ensures that individuals and organizations are held responsible for
making ethical decisions and avoiding actions that could lead to harm.
b. Consumer Trust: Accountability builds trust between technology developers, providers,
and consumers. Knowing that there are mechanisms in place to address issues, resolve
disputes, and rectify mistakes fosters confidence in the use of emerging technologies.
c. Human Rights Protection: Some emerging technologies have the potential to impact
human rights, such as privacy, freedom of expression, and the right to non-discrimination.
Accountability mechanisms help prevent abuses and protect individuals from rights
Page | 5
Emerging TECHNOLOGy
violations.
Page | 6
Emerging TECHNOLOGy
User Confidence: Trust instills confidence in users. When individuals trust a technology
platform, they are more likely to engage with it, explore its features, and incorporate it into their
daily lives.
User Acceptance: Trust plays a significant role in the acceptance of new technologies. Users are
more willing to adopt and integrate emerging technologies into their routines when they trust that
the technology is reliable, secure, and meets their needs.
Data Privacy: Emerging technologies often involve the collection and processing of personal
data. Users must trust that their information will be handled responsibly, with adequate privacy
protections in place, to feel comfortable using the platform.
Reliability: Users need to trust that the technology platform will function reliably. This includes
expectations that the platform will perform consistently, without unexpected glitches, crashes, or
downtime.
Page | 7
Emerging TECHNOLOGy
Page | 8
Emerging TECHNOLOGy
Security: Trust is closely linked to the security of a technology platform. Users must trust that
their data is secure from unauthorized access, breaches, or cyberattacks. A strong security
posture contributes to building and maintaining trust.
Transparency: Open and transparent communication about how the technology works, its
intentions, and any potential risks fosters trust. Users are more likely to trust a platform when
they have a clear understanding of its operations.
Bias and Fairness: AI systems can inherit and perpetuate biases present in training data,
leading to discriminatory outcomes.
Transparency: Understanding how AI algorithms make decisions can be challenging,
creating concerns about transparency and accountability.
Ethical Dilemmas: AI systems may face ethical dilemmas, and determining how they
should act in morally ambiguous situations poses challenges.
Security Risks: AI systems can be vulnerable to adversarial attacks, where malicious
actors manipulate input data to deceive the system.
Job Displacement: The automation of tasks by AI can lead to job displacement, raising
concerns about unemployment and societal implications.
Robots
Ethical Use: Ensuring robots are used ethically, especially in critical applications like
healthcare and defense, is a significant challenge.
Page | 9
Emerging TECHNOLOGy
Human-Robot Interaction: Designing robots that can interact seamlessly and safely
with humans poses challenges in terms of communication, safety, and trust.
Privacy Concerns: In scenarios where robots are equipped with cameras and sensors,
privacy concerns arise, requiring careful consideration and regulation.
Autonomy and Decision-Making: Determining the appropriate level of autonomy for
robots and defining rules for their decision-making processes are ongoing challenges.
Legal and Liability Issues: Clarifying legal responsibilities and liability in cases of
accidents or harm caused by robots is an evolving legal challenge.
Security and Privacy: The interconnected nature of IoT devices creates security
vulnerabilities, and the vast amount of data generated raises privacy concerns.
9. Briefly explain the risks we face in Augmented Reality, IoT and AI?
The risks associated with Augmented Reality (AR), Internet of Things (IoT), and Artificial
Intelligence (AI):
Privacy Concerns: AR devices often collect and process personal data, raising privacy
concerns. Users may be uncomfortable with the potential for surveillance or unauthorized
data capture.
Page | 10
Emerging TECHNOLOGy
Security Risks: AR devices, especially those connected to the internet, are susceptible to
security threats, including unauthorized access, data breaches, and malicious
manipulation of augmented content.
User Distraction: AR can divert users' attention from their surroundings, leading to
safety issues, particularly in contexts like driving or walking in busy areas.
Security Vulnerabilities: The vast number of interconnected IoT devices creates a larger
attack surface, making the ecosystem susceptible to cyberattacks, data breaches, and
unauthorized access.
Privacy Issues: IoT devices often collect sensitive data, and the improper handling of
this data can lead to privacy violations, identity theft, or unauthorized surveillance.
Lack of Standardization: Inconsistent standards for communication and security
protocols among IoT devices make it challenging to ensure interoperability and a uniform
level of security.
Bias and Fairness: AI systems may exhibit biases present in training data, potentially
leading to discriminatory outcomes, reinforcing existing inequalities, and undermining
fairness.
Explainability and Transparency: Many AI models, particularly complex ones like
deep neural networks, lack transparency, making it difficult to explain their decision-
making processes. This lack of transparency raises concerns about accountability and
trust.
Security Risks: AI systems are susceptible to adversarial attacks, where intentional
manipulation of input data can mislead the system and result in incorrect predictions or
decisions.
Unintended Consequences: The deployment of AI systems may have unintended
consequences, such as job displacement, economic inequality, or social disruption.
10. Do you think that dealing with Big data demands high
Page | 11
Emerging TECHNOLOGy
Yes, dealing with big data indeed demands high ethical regulations, accountability, and
responsibility, both on the part of individuals and the companies involved. Here's why:
Privacy Concerns: Big data often involves the collection, processing, and analysis of vast
amounts of personal information. High ethical standards are essential to protect individuals'
privacy rights and prevent unauthorized or inappropriate use of sensitive data.
Data Security: Big data repositories are attractive targets for cyberattacks due to the valuable
information they hold. Ethical regulations and responsible practices are crucial to safeguard data
against breaches and unauthorized access, ensuring the security and integrity of the information.
Bias and Fairness: Big data analytics can inadvertently perpetuate or amplify biases present in
the data. Ethical regulations help ensure fairness in data-driven decision-making processes,
reducing the risk of discriminatory outcomes.
Informed Consent: Individuals should have the right to know how their data is being used and
provide informed consent for its collection and processing. Ethical regulations mandate
transparent communication and consent mechanisms to empower individuals to make informed
decisions.
Societal Impact: Big data analytics can have far-reaching implications on society. Ethical
regulations guide companies to consider the broader societal impact of their data-related
activities, promoting responsible behavior that benefits the public interest.
Consumer Trust: Ethical practices and accountability contribute to building and maintaining
trust between companies and their users. Trust is crucial for user adoption and acceptance of
data-driven technologies and services.
Page | 12
Emerging TECHNOLOGy
Applications of Nanotechnology:
Medicine
Drug Delivery: Nanoparticles can be designed to carry drugs to specific cells or tissues,
enhancing targeted drug delivery and reducing side effects.
Electronics
Nano electronics: The fabrication of electronic components at the nanoscale allows for the
creation of smaller, faster, and more energy-efficient electronic devices.
Quantum Dots: Nanoscale semiconductor particles known as quantum dots find applications in
displays, solar cells, and sensors.
Materials Science
Page | 13
Emerging TECHNOLOGy
Energy
Solar Cells: Nanomaterials, such as quantum dots and nanowires, enhance the efficiency of solar
cells by improving light absorption and charge transport.
Environmental Remediation
Nanoparticle Filters: Nanoparticles can be used in water and air filtration systems to remove
pollutants and contaminants.
Textiles
Smart Fabrics: Nanomaterials are integrated into textiles to create smart fabrics with properties
like moisture management and temperature regulation.
Food Packaging: Nanotechnology is used in the development of food packaging materials with
enhanced barrier properties, extending shelf life and reducing food waste.
Cosmetics
Space Exploration
Page | 14
Emerging TECHNOLOGy
Lightweight Materials: Nanomaterials are utilized to create lightweight and strong materials for
space exploration, reducing the weight of spacecraft and improving fuel efficiency.
Importance of Biotechnology:
Agriculture
Medicine
Gene Therapy: Advances in biotechnology have paved the way for gene therapy, offering
potential treatments for genetic disorders by introducing, removing, or altering genetic material
in a patient's cells.
Environment
Page | 15
Emerging TECHNOLOGy
bioethanol and biodiesel, using renewable resources like plant biomass or microorganisms.
Industrial Applications
Food Production
Fermentation: Biotechnological processes like fermentation are used in the production of various
food and beverage products, including bread, yogurt, beer, and cheese.
Tree Biotechnology: Biotechnology is applied in the improvement of tree species for sustainable
forestry practices, including disease resistance and improved wood properties.
Waste Management
Biological Waste Treatment: Biotechnology is used in the biological treatment of various types
of waste, including wastewater treatment and the decomposition of organic waste in landfills.
Page | 16
Emerging TECHNOLOGy
How it works
Block chain works by creating a decentralized and secure digital ledger of transactions. Here's a
brief overview of how it operates:
Page | 17
Emerging TECHNOLOGy
Cloud computing is a means of networking remote servers that are hosted on the Internet. Rather
than storing and processing data on a local server, or a PC's hard drive.
On-Demand Self-Service: Users can provision computing resources as needed without requiring
human intervention.
Broad Network Access: Cloud services are accessible over the internet from various devices.
Resource Pooling: Computing resources are shared and dynamically allocated based on demand.
Measured Service: Usage is monitored, and users are billed based on their consumption of
resources.
Quantum Computing
Quantum computers truly do represent the next generation of computing. Unlike classic
computers, they derive their computing power by harnessing the power of quantum physics.
Page | 18
Emerging TECHNOLOGy
Superposition: Unlike classical bits, which can be in a state of either 0 or 1, qubits can exist in a
superposition of states. This means a qubit can represent both 0 and 1 simultaneously, enabling
parallel processing of information.
Entanglement: Qubits can be entangled, meaning the state of one qubit is directly related to the
state of another, regardless of the physical distance between them. Changes to one qubit will
instantaneously affect its entangled partner, enabling faster information transfer.
Quantum Gates: Quantum operations are performed using quantum gates, analogous to
classical logic gates. However, quantum gates manipulate qubits in ways that leverage the
principles of superposition and entanglement, enabling quantum computers to process
information in ways that classical computers cannot.
Page | 20
Emerging TECHNOLOGy
Computer vision is a field of artificial intelligence (AI) that enables machines to interpret and
understand visual information from the world. It involves the development of algorithms and
models that allow computers to process, analyze, and make decisions based on visual data, such
as images and videos.
Machine Inspection: rapid parts inspection for quality assurance using stereo
vision with specialized illumination to measure tolerance on aircraft wings or auto
body parts or looking for defects in steel casting using X-ray vision.
Optical character recognition (OCR): reading handwritten postal codes on
letters and automatic number plate recognition (ANPR);
Retail: object recognition for automated checkout lanes
Automotive safety: detecting unexpected obstacles such as pedestrians on the
street, under conditions where active vision techniques such as radar or lidar do not
work well
Medical Imaging: registering pre-operative and intra-operative imagery or
performing long term studies of people’s brain morphology as they age.
Surveillance: monitoring for intruders, analyzing highway traffic and monitoring
pools for drowning victims
Fingerprint recognition and biometrics: for automatic access authentication as
well as forensic applications.
Page | 21
Emerging TECHNOLOGy
Page | 22
Emerging TECHNOLOGy
Embedded systems can be found in a wide range of applications, from simple devices like
microwave ovens and washing machines to complex systems like automotive control units,
medical devices, and industrial automation systems. The design of embedded systems requires
careful consideration of the specific requirements and constraints of the application they serve.
Embedded systems can be found in a wide range of applications, from simple devices like
microwave ovens and washing machines to complex systems like automotive control units,
medical devices, and industrial automation systems. The design of embedded systems requires
careful consideration of the specific requirements and constraints of the application they serve.
Sensor - It measures the physical quantity and converts it to an electrical signal which
can be read by an observer or by any electronic instrument like an A2D converter. A
sensor stores the measured quantity to the memory.
A-D Converter - An analog-to-digital converter converts the analog signal sent by the
sensor into a digital signal.
Processor & ASICs - Processors process the data to measure the output and store it to
the memory.
D-A Converter - A digital-to-analog converter converts the digital data fed by the
processor to analog data.
Page | 23
Emerging TECHNOLOGy
Cybersecurity refers to the practice of protecting computer systems, networks, and data from
unauthorized access, attacks, damage, or theft. It involves implementing measures and
technologies to safeguard information technology resources and ensure the confidentiality,
integrity, and availability of data.
It is the protection of computer systems from the theft of or damage to their hardware, software,
or electronic data, as well as from the disruption or misdirection of the services they provide.
Cybersecurity threats
Advantages of Cybersecurity
Page | 24
Emerging TECHNOLOGy
Page | 25
Emerging TECHNOLOGy
Additive manufacturing (AM) describes types of advanced manufacturing that are used to create
three-dimensional structures out of plastics, metals, polymers and other materials that can be
sprayed through a nozzle or aggregated in a vat. These constructs are added layer by layer in real
time based on digital design. The simplicity and low cost of AM machines, combined with the
scope of their potential creations, could profoundly alter global and local economies and affect
international security.
Digital Design: The process begins with a digital 3D model created using computer-aided design
(CAD) software. This digital file serves as the blueprint for the physical object.
Layer-by-Layer Printing: 3D printing builds objects layer by layer, adding material incrementally
based on the digital model. Each layer corresponds to a cross-section of the final object.
Page | 26
Emerging TECHNOLOGy
Materials: A variety of materials can be used in 3D printing, including plastics, metals, ceramics,
resins, and composites. The choice of material depends on the application and desired properties of
the finished object.
Additive Process: Unlike traditional subtractive manufacturing methods, which involve cutting or
shaping material from a larger block, 3D printing is an additive process. Material is added only
where needed, reducing waste.
Printing Technologies: Various 3D printing technologies exist, each with its own set of principles
and processes. Common technologies include Fused Deposition Modeling (FDM), Stereo
lithography (SLA), Selective Laser Sintering (SLS), and more.
Rapid Prototyping: 3D printing is widely used in rapid prototyping, allowing designers and
engineers to quickly iterate and test designs before committing to mass production.
Complex Geometries: One of the major advantages of 3D printing is its ability to produce objects
with complex and intricate geometries. This is particularly valuable in industries such as aerospace,
healthcare, and automotive.
Customization: 3D printing enables mass customization, allowing for the production of unique
and personalized products without the need for expensive and time-consuming tooling changes.
Applications of 3D Printing
Custom Products: Production of custom and personalized items, including medical implants
and orthopedic devices.
Aerospace: Manufacturing lightweight and complex components for aircraft and spacecraft.
Education: Enhancing learning experiences by creating physical models for educational purposes.
Page | 27
Emerging TECHNOLOGy
THE END !
Page | 28
Emerging TECHNOLOGy
Page | 29