SlideShare uma empresa Scribd logo
1 de 23
Ethics, Professionalism
&
Other Emerging Technologies
By: Prakhyath
Table of
Contents
Technology and Ethics
Digital Privacy
Accountability and Trust
Threats and Challenges
Block Chain Technology
Cloud and Quantum Computing
Autonomic Computing
Computer Vision
Cyber Security
3D Printing
Technology and Ethics
 Context of ethics in technology,
• Pace of technology innovation is benefitting human kind
• Severely empowering people while choking others for the same
 Technical Advances / Evolution
• Raise concern like computer security or viruses, Trojans, spam’s that invade the privacy
of people or the fact the technology is promoting consumerism
• Environmental Degradation
• Un-Employment
• Bioethics
Digital Privacy
Digital privacy, also known as internet privacy, is the
concept of passing information, data, messages, and
files over the internet without leaking to undesired
individuals  Communication privacy +
Information privacy + Individual privacy
Threats on Digital Privacy
Phishing Attacks
Cookies Proliferation
Cell Phone GPS Functionality
Unsecured Browsing
Practices to Enhance Digital Privacy
 Beware of Phishing Attacks
 Blocking Cookies
 Delete Unsecured Apps From Your Phone
 Unsecured Browsing
 Use Encrypted Apps for Messaging
 Don’t Save Financial Info on Shopping Sites
 Use a VPN
 Browse in Private Mode
Accountability and Trust
 Accountability
• Helps build meaningful relationships
• Establish a sense of ownership
• Feel responsible for actions, behaviour, and success
 Threats to Accountability
• Unclear Expectations
• Fear of Failure
• Lack of Engagement
Threats
- liable with Emerging Technologies
 Botnet Attacks
 Digital Privacy Breaches
 Environmental Degradations – materials
used for 3D Printing, Printing Inks etc.
 Security Threats
 Bio-Hacking
 BYOD – Bring Your Own Devices
Challenges with Evolving/Emerging Technologies
IoT
* Implementation, Installation and Configuration
* Security
Automation
* Maintenance and Monitoring
* Managing Network Traffic
AI / ML / Data Science
* Security
* Data Privacy
Block Chain
 Blockchain is a shared, immutable ledger that facilitates the process of
recording transactions and tracking assets in a business network.
• An asset can be tangible (a house, car, cash, land) or intangible (intellectual
property, patents, copyrights, branding)
 Benefits,
• Greater Trust and Security
• Enhanced Efficiency with Distributer Ledger System and Smart Contract
Block Chain Applications
• Improving Cryptocurrency security in financial services
• Transforming healthcare outcomes with blockchain
• Increasing trust in retailer-supplier relationships
• Fuelling innovation in oil and gas industry
• Tracing fresh seafood from the moment it’s caught
Cloud and Quantum Computing
 Quantum computing is a rapidly-emerging technology based on quantum
computing that harnesses the laws of quantum mechanics to solve
problems too complex for classical computers.
 Cloud is a model of computing where servers, networks, storage,
development tools, and even applications (apps) are enabled through the
internet.
Cloud Computing Characteristics
 Internet Access – Anytime-Anywhere Access
 Measured Service – Pay as you Go
 Shared Resource Pooling – Adopts Multi-Tenancy Model
 Rapid Elasticity – Resource Usage flexibly
 On-Demand Self Service – No manual set-up and Configuration
Autonomic Computing
 Autonomic Computing is a self-managing computing model mimics and
patterned over the human body's autonomic nervous system.
 Autonomic Computing facilitates building systems that run themselves,
capable of high-level functioning while keeping the system's complexity
invisible to the user.
 An Autonomic Computing system would control the functioning of
computer applications and systems without input from the user.
Autonomic Computing
Elements fostering autonomic computing systems,
 Comprehensive detailed knowledge about the comprising components
 Self Configurable
 Constant Self Monitoring
 Self Healable
 Detect Threats and Tackle
 Adapt to Changes
 Anticipate Demand
 Transparent to Users
Computer Vision
 Computer Vision is a field of artificial intelligence
(AI) that enables computers and systems to derive
meaningful information from digital images,
videos and other visual inputs — and take actions
or make recommendations based on that
information.
 Computer Vision enables systems to see, observe
and understand.
Computer Vision
Usecases
 Image Classification
 Object Detection
 Object Tracking
 Content based Image Retrieval
Cyber Security
A strong cybersecurity strategy has layers of
protection to defend against cyber crime,
including cyber attacks that attempt to
access, change, or destroy data; extort money
from users or the organization; or aim to
disrupt normal business operations.
Cyber Threats
 Malware
 Ransomware
 Phishing / Social Engineering
 Insider Threats
 Distributed Denial-of-Service (DDoS) Attacks
 Man-in-the-Middle Attacks
3D Printing
• 3D printing is any of various processes in
which material is joined or solidified under
computer control to create a three-
dimensional object, with material being added
together (such as liquid molecules or powder
grains being fused together).
• 3D printing is an additive process whereby
layers of material are built up to create a 3D
part.
3D Printing
Advantages:
 Cost-effective creation of geometries
 Affordable start-up costs
 Customizable
 Facilitates rapid prototyping
Disadvantages:
 Quality of products manufactured
 Increased cost for large production
 Shortcomings in accuracy
 Post-Processing
References
 https://www.ibm.com/topics/cybersecurity
 https://www.ibm.com/topics/computer-vision
 https://www.sciencedirect.com/topics/computer-science/autonomic-computing
 https://www.ibm.com/topics/quantum-computing
 https://link.springer.com/article/10.1007/s10833-019-09352-4
 https://www.ibm.com/topics/what-is-blockchain
 https://www.ibm.com/in-en/cloud/learn/cloud-computing
 https://www.accenture.com/in-en/insights/cloud-computing-index
Thank You

Mais conteúdo relacionado

Mais procurados

Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Emerging trends in information technology
Emerging trends in information technologyEmerging trends in information technology
Emerging trends in information technologyShiv Mehmi
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)Ali Habeeb
 
Information System Security
Information System Security Information System Security
Information System Security Syed Asif Sherazi
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 

Mais procurados (20)

Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Emerging trends in information technology
Emerging trends in information technologyEmerging trends in information technology
Emerging trends in information technology
 
Network security
Network securityNetwork security
Network security
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Data security
Data securityData security
Data security
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Information System Security
Information System Security Information System Security
Information System Security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
System security
System securitySystem security
System security
 
Data Science
Data ScienceData Science
Data Science
 
Cia security model
Cia security modelCia security model
Cia security model
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 

Semelhante a Ethics, Professionalism and Other Emerging Technologies

Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxS .Ali Raza
 
cyber securities in web development.pdf
cyber securities in web development.pdfcyber securities in web development.pdf
cyber securities in web development.pdfCuion Technologies
 
cloud security.pptx
cloud security.pptxcloud security.pptx
cloud security.pptxNickjohn33
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxMalu704065
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Brianna Johnson
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveAvinantaTarigan
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingKaren Oliver
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 

Semelhante a Ethics, Professionalism and Other Emerging Technologies (20)

Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
cyber securities in web development.pdf
cyber securities in web development.pdfcyber securities in web development.pdf
cyber securities in web development.pdf
 
cloud security.pptx
cloud security.pptxcloud security.pptx
cloud security.pptx
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directions
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
security IDS
security IDSsecurity IDS
security IDS
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User Perspective
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 

Mais de Prakhyath Rai

Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Prakhyath Rai
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial IntelligencePrakhyath Rai
 
Emerging Exponential Technologies - History & Introduction
Emerging Exponential Technologies - History & IntroductionEmerging Exponential Technologies - History & Introduction
Emerging Exponential Technologies - History & IntroductionPrakhyath Rai
 
Preparation of Project
Preparation of ProjectPreparation of Project
Preparation of ProjectPrakhyath Rai
 
Small Scale Industry
Small Scale IndustrySmall Scale Industry
Small Scale IndustryPrakhyath Rai
 
Directing and Controlling
Directing and ControllingDirecting and Controlling
Directing and ControllingPrakhyath Rai
 
Introduction to Management
Introduction to Management Introduction to Management
Introduction to Management Prakhyath Rai
 
Text Mining Framework
Text Mining FrameworkText Mining Framework
Text Mining FrameworkPrakhyath Rai
 

Mais de Prakhyath Rai (11)

Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Emerging Exponential Technologies - History & Introduction
Emerging Exponential Technologies - History & IntroductionEmerging Exponential Technologies - History & Introduction
Emerging Exponential Technologies - History & Introduction
 
Preparation of Project
Preparation of ProjectPreparation of Project
Preparation of Project
 
Small Scale Industry
Small Scale IndustrySmall Scale Industry
Small Scale Industry
 
Entrepreneurship
EntrepreneurshipEntrepreneurship
Entrepreneurship
 
Directing and Controlling
Directing and ControllingDirecting and Controlling
Directing and Controlling
 
Planning
PlanningPlanning
Planning
 
Introduction to Management
Introduction to Management Introduction to Management
Introduction to Management
 
Text MIning
Text MIningText MIning
Text MIning
 
Text Mining Framework
Text Mining FrameworkText Mining Framework
Text Mining Framework
 

Último

FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 

Último (20)

FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 

Ethics, Professionalism and Other Emerging Technologies

  • 1. Ethics, Professionalism & Other Emerging Technologies By: Prakhyath
  • 2. Table of Contents Technology and Ethics Digital Privacy Accountability and Trust Threats and Challenges Block Chain Technology Cloud and Quantum Computing Autonomic Computing Computer Vision Cyber Security 3D Printing
  • 3. Technology and Ethics  Context of ethics in technology, • Pace of technology innovation is benefitting human kind • Severely empowering people while choking others for the same  Technical Advances / Evolution • Raise concern like computer security or viruses, Trojans, spam’s that invade the privacy of people or the fact the technology is promoting consumerism • Environmental Degradation • Un-Employment • Bioethics
  • 4. Digital Privacy Digital privacy, also known as internet privacy, is the concept of passing information, data, messages, and files over the internet without leaking to undesired individuals  Communication privacy + Information privacy + Individual privacy
  • 5. Threats on Digital Privacy Phishing Attacks Cookies Proliferation Cell Phone GPS Functionality Unsecured Browsing
  • 6. Practices to Enhance Digital Privacy  Beware of Phishing Attacks  Blocking Cookies  Delete Unsecured Apps From Your Phone  Unsecured Browsing  Use Encrypted Apps for Messaging  Don’t Save Financial Info on Shopping Sites  Use a VPN  Browse in Private Mode
  • 7. Accountability and Trust  Accountability • Helps build meaningful relationships • Establish a sense of ownership • Feel responsible for actions, behaviour, and success  Threats to Accountability • Unclear Expectations • Fear of Failure • Lack of Engagement
  • 8. Threats - liable with Emerging Technologies  Botnet Attacks  Digital Privacy Breaches  Environmental Degradations – materials used for 3D Printing, Printing Inks etc.  Security Threats  Bio-Hacking  BYOD – Bring Your Own Devices
  • 9. Challenges with Evolving/Emerging Technologies IoT * Implementation, Installation and Configuration * Security Automation * Maintenance and Monitoring * Managing Network Traffic AI / ML / Data Science * Security * Data Privacy
  • 10. Block Chain  Blockchain is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network. • An asset can be tangible (a house, car, cash, land) or intangible (intellectual property, patents, copyrights, branding)  Benefits, • Greater Trust and Security • Enhanced Efficiency with Distributer Ledger System and Smart Contract
  • 11. Block Chain Applications • Improving Cryptocurrency security in financial services • Transforming healthcare outcomes with blockchain • Increasing trust in retailer-supplier relationships • Fuelling innovation in oil and gas industry • Tracing fresh seafood from the moment it’s caught
  • 12. Cloud and Quantum Computing  Quantum computing is a rapidly-emerging technology based on quantum computing that harnesses the laws of quantum mechanics to solve problems too complex for classical computers.  Cloud is a model of computing where servers, networks, storage, development tools, and even applications (apps) are enabled through the internet.
  • 13. Cloud Computing Characteristics  Internet Access – Anytime-Anywhere Access  Measured Service – Pay as you Go  Shared Resource Pooling – Adopts Multi-Tenancy Model  Rapid Elasticity – Resource Usage flexibly  On-Demand Self Service – No manual set-up and Configuration
  • 14. Autonomic Computing  Autonomic Computing is a self-managing computing model mimics and patterned over the human body's autonomic nervous system.  Autonomic Computing facilitates building systems that run themselves, capable of high-level functioning while keeping the system's complexity invisible to the user.  An Autonomic Computing system would control the functioning of computer applications and systems without input from the user.
  • 15. Autonomic Computing Elements fostering autonomic computing systems,  Comprehensive detailed knowledge about the comprising components  Self Configurable  Constant Self Monitoring  Self Healable  Detect Threats and Tackle  Adapt to Changes  Anticipate Demand  Transparent to Users
  • 16. Computer Vision  Computer Vision is a field of artificial intelligence (AI) that enables computers and systems to derive meaningful information from digital images, videos and other visual inputs — and take actions or make recommendations based on that information.  Computer Vision enables systems to see, observe and understand.
  • 17. Computer Vision Usecases  Image Classification  Object Detection  Object Tracking  Content based Image Retrieval
  • 18. Cyber Security A strong cybersecurity strategy has layers of protection to defend against cyber crime, including cyber attacks that attempt to access, change, or destroy data; extort money from users or the organization; or aim to disrupt normal business operations.
  • 19. Cyber Threats  Malware  Ransomware  Phishing / Social Engineering  Insider Threats  Distributed Denial-of-Service (DDoS) Attacks  Man-in-the-Middle Attacks
  • 20. 3D Printing • 3D printing is any of various processes in which material is joined or solidified under computer control to create a three- dimensional object, with material being added together (such as liquid molecules or powder grains being fused together). • 3D printing is an additive process whereby layers of material are built up to create a 3D part.
  • 21. 3D Printing Advantages:  Cost-effective creation of geometries  Affordable start-up costs  Customizable  Facilitates rapid prototyping Disadvantages:  Quality of products manufactured  Increased cost for large production  Shortcomings in accuracy  Post-Processing
  • 22. References  https://www.ibm.com/topics/cybersecurity  https://www.ibm.com/topics/computer-vision  https://www.sciencedirect.com/topics/computer-science/autonomic-computing  https://www.ibm.com/topics/quantum-computing  https://link.springer.com/article/10.1007/s10833-019-09352-4  https://www.ibm.com/topics/what-is-blockchain  https://www.ibm.com/in-en/cloud/learn/cloud-computing  https://www.accenture.com/in-en/insights/cloud-computing-index