Ethics deals with moral principles and ideas about what is right and wrong. It is an area of study that examines moral concepts. Some key aspects of ethics in technology include reliability, integrity, authenticity, how people interact with machines, and digital citizenship. Reliability ensures systems work properly, while integrity ensures correctness of data. Authenticity involves verifying user identity. Issues can arise regarding how technology impacts people and how people should behave online.
The world is adopting the new technology the need of ethics arises to sustain the proper growth and to minimize the risk of wrong uses. As technology is growing good if it is in proper hands but goes totally wrong in wrong hands.
Copyright Notice:
This presentation is prepared by Author for Perbanas Institute as a part of Author Lecture Series. It is to be used for educational and non-commercial purposes only and is not to be changed, altered, or used for any commercial endeavor without the express written permission from Author and/or Perbanas Institute. Appropriate legal action may be taken against any person, organization, or entity attempting to misrepresent, charge, or profit from the educational materials contained here.
Authors are allowed to use their own articles without seeking permission from any person, organization, or entity.
The world is adopting the new technology the need of ethics arises to sustain the proper growth and to minimize the risk of wrong uses. As technology is growing good if it is in proper hands but goes totally wrong in wrong hands.
Copyright Notice:
This presentation is prepared by Author for Perbanas Institute as a part of Author Lecture Series. It is to be used for educational and non-commercial purposes only and is not to be changed, altered, or used for any commercial endeavor without the express written permission from Author and/or Perbanas Institute. Appropriate legal action may be taken against any person, organization, or entity attempting to misrepresent, charge, or profit from the educational materials contained here.
Authors are allowed to use their own articles without seeking permission from any person, organization, or entity.
Avec la transformation digitale, les entreprises B2B font face à une modification profonde du comportement des acheteurs.
- plus de 60% des décisions d’achat ont déjà été prises avant qu’un acheteur parle à un commercial
- les moyens d’entrer en contact avec les clients potentiels offrent des possibilités multiples
- la capacité de suivi de leurs actions est élargie et rendue possible par la technologie
Dans ce contexte, le plan d’action commercial est un moyen unique pour formaliser les priorités et les modes d’action, et un outil d’alignement précieux des équipes. La mise en ordre de marche de toutes ses ressources dans une même direction est un formidable outil d’efficacité commerciale.
Cet ebook présente les questions essentielles à se poser pour réussir son plan d'action commercial en tirant parti du digital.
This presentation focuses on Islam and the effects it has on the family. In order to present an in-depth look into this area, the presentation will cover a general overview of the beliefs and practices of Islam to gain a grounded understanding of what is being presented. Then the presentation will provide insight as to how Islamic culture effects birth and child-rearing, courting and marriage, as well as, treatment of elders and death.
Design and Analysis of Fin-X Technology Nitish Sharma
This document is all about Analysis on Fin-X Technology. Dr. Thomas Povey, an scientist working in Oxford University implemented this idea in Cookwares.
Report on Business Plan Of Handyperson services (Solution King).Somil Shah
S.K.
Report on Business Plan
Of
Handyperson services (Solution King).
A handyperson can complete a wide variety of small but important tasks in and around the home, assisting older and vulnerable people with basic maintenance and repairs, improving the safety and security of the property, and helping them to continue living independently.
Scopo del servizio SioArchi è la realizzazione di un sistema informativo Web Based che soddisfi tutti i requisiti (legali e procedurali) che sono alla base delle esigenze operative dei Consulenti del Lavoro. Si innesta nella creazione di un portale servizi che, a seguito del processo elaborativo di realizzazione buste paga permetta di distribuire, archiviare e gestire i documenti risultato del processo.
Nel precipuo il modulo SioArchi permette di firmare e marcare temporalmente i files per la tenuta del Libro Unico del Lavoro, garantendo i requisiti di Legge. SIOGERE
Cep Solutions è in grado di fornire ai propri clienti
Consulenza Legge sulla privacy - Documento Programmatico sulla Sicurezza: DPS
Procedura paghe in service
Procedura paghe in terminal
Rilevazione presenze
Gestione risorse umane
SIOGERE
Navigating the Bureaucracy, Searching for Justice: The Promise & Failure of W...closegap
Seminar PowerPoint presented at GLRC seminar on April 2, 2014 at York University, Toronto, Canada. Shannon Gleeson presented this seminar during her time as a visiting scholar with the SSHRC Partnership Grant project "Closing the Employment Standards Enforcement Gap: Improving Protections for Workers in Precarious Jobs"
Making your messages stand out among the many offerings and potential distribution channels that exist can often mean a headache for marketing professionals.
Relevant storytelling is required, the kind that addresses your potential customers’ concerns, and communicates the benefits they can receive from your offering – emphasizing what makes you unique compared to your competitors.
Aligning all your teams (as well as all of your marketing and communication initiatives) around consistent central messages will create a true sounding board for your content.
Avec la transformation digitale, les entreprises B2B font face à une modification profonde du comportement des acheteurs.
- plus de 60% des décisions d’achat ont déjà été prises avant qu’un acheteur parle à un commercial
- les moyens d’entrer en contact avec les clients potentiels offrent des possibilités multiples
- la capacité de suivi de leurs actions est élargie et rendue possible par la technologie
Dans ce contexte, le plan d’action commercial est un moyen unique pour formaliser les priorités et les modes d’action, et un outil d’alignement précieux des équipes. La mise en ordre de marche de toutes ses ressources dans une même direction est un formidable outil d’efficacité commerciale.
Cet ebook présente les questions essentielles à se poser pour réussir son plan d'action commercial en tirant parti du digital.
This presentation focuses on Islam and the effects it has on the family. In order to present an in-depth look into this area, the presentation will cover a general overview of the beliefs and practices of Islam to gain a grounded understanding of what is being presented. Then the presentation will provide insight as to how Islamic culture effects birth and child-rearing, courting and marriage, as well as, treatment of elders and death.
Design and Analysis of Fin-X Technology Nitish Sharma
This document is all about Analysis on Fin-X Technology. Dr. Thomas Povey, an scientist working in Oxford University implemented this idea in Cookwares.
Report on Business Plan Of Handyperson services (Solution King).Somil Shah
S.K.
Report on Business Plan
Of
Handyperson services (Solution King).
A handyperson can complete a wide variety of small but important tasks in and around the home, assisting older and vulnerable people with basic maintenance and repairs, improving the safety and security of the property, and helping them to continue living independently.
Scopo del servizio SioArchi è la realizzazione di un sistema informativo Web Based che soddisfi tutti i requisiti (legali e procedurali) che sono alla base delle esigenze operative dei Consulenti del Lavoro. Si innesta nella creazione di un portale servizi che, a seguito del processo elaborativo di realizzazione buste paga permetta di distribuire, archiviare e gestire i documenti risultato del processo.
Nel precipuo il modulo SioArchi permette di firmare e marcare temporalmente i files per la tenuta del Libro Unico del Lavoro, garantendo i requisiti di Legge. SIOGERE
Cep Solutions è in grado di fornire ai propri clienti
Consulenza Legge sulla privacy - Documento Programmatico sulla Sicurezza: DPS
Procedura paghe in service
Procedura paghe in terminal
Rilevazione presenze
Gestione risorse umane
SIOGERE
Navigating the Bureaucracy, Searching for Justice: The Promise & Failure of W...closegap
Seminar PowerPoint presented at GLRC seminar on April 2, 2014 at York University, Toronto, Canada. Shannon Gleeson presented this seminar during her time as a visiting scholar with the SSHRC Partnership Grant project "Closing the Employment Standards Enforcement Gap: Improving Protections for Workers in Precarious Jobs"
Making your messages stand out among the many offerings and potential distribution channels that exist can often mean a headache for marketing professionals.
Relevant storytelling is required, the kind that addresses your potential customers’ concerns, and communicates the benefits they can receive from your offering – emphasizing what makes you unique compared to your competitors.
Aligning all your teams (as well as all of your marketing and communication initiatives) around consistent central messages will create a true sounding board for your content.
Democracy’s significance in the realm of AI development cannot be overstated. In an era marked by the rapid evolution of technology, AI stands as a transformative force with the potential to reshape societies, economies, and daily lives. As AI’s influence expands, it becomes increasingly essential to integrate democratic principles into its development.
Exploring AI Ethics_ Challenges, Solutions, and SignificanceBluebash
Artificial Intelligence, or AI, is not just a science fiction idea anymore. It's a strong and ever-present influence in our everyday lives. It helps us make decisions, molds our experiences, and impacts our future.
Artificial Intelligence (AI)
Human Rights
Rights to Privacy
Freedom of Expression and Information
Right to Non-Discrimination
Right to Equality and Non-Discrimination
Right to Due Process and Fair Trial
Right to Work and Labour Rights
Right to Health and Well-Being
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Ethics
1. The meaning of ‘Ethics’
Ethics is a theory or the branch of knowledge that deals with
moral principles. It is an area of study that deals with ideas
about what is right and what is wrong.
ITGS
By Nurul Hanim Hussein Shah
3. Nurul Hanim Binti Hussein Shah
Reliability and Integrity
ITGS
Reliability refers to how well a computer system
works: if it functions as intended, or fails and
crashes. Integrity refers to the correctness of
data. For example, airports require back up
systems if system fails as it would cause a
catastrophe. Hospitals require integrity data to be
inputted to a patients record as human error
could occur. Potential hacking which can alter
data to be something it is not.
4. Nurul Hanim Binti Hussein Shah
Social Impacts:
ITGS
An example of social impacts in ‘Reliability and Integrity’ is:
From the articles about medical mistakes, it tells us that we know
that the stakeholders for this issue is the doctors and staffs in the
hospital who is controlling the technology allowing to make medical
errors which affects the patients health in that particular hospitals.
Advantages:
http://freakngenius.com/v/c2gXV
Disadvantage:
http://freakngenius.com/v/n2hns
A way to solve this issue from appearing again, the stakeholders
must propose a way to develop a more reliable and efficient
technology for their product, which is their database to avoid
medical errors.
5. Nurul Hanim Binti Hussein Shah
ITGS
Ethical Issues:
An example of ethical issues in ‘Reliability and Integrity’ is:
From the articles about apple product jailbreaks, it tells us that we
know that the stakeholders for this issue is the evad3rs team in the
planetbeing profile. According to some of the laws that has applied
to this scenario is that jailbreaks are illegal and that it is considered
a crime in some countries such as Canada the Canadian Copyright
Act. A way to solve this issue from appearing again is that the
stakeholders, the apple company, should propose a way to develop
a more reliable IT system for their products, which is efficient for
the users from all over the world to use it. Unfortunately, there can
be consequences to these decisions which is having difficulties and
problems with their IT system so they have
to do it step by step to assure that their IT
system works properly.
6. Nurul Hanim Binti Hussein Shah
ITGS
Authenticity
Authenticity involves a user providing their
identity to gain access to a computer
system. For example, username and
Password, Biometric authentications and
finger prints.
7. Nurul Hanim Binti Hussein Shah
Social Impacts:
ITGS
An example of social impacts in ‘Authenticity’ is:
From the articles about security token and smart card
authentication, it tells us that we know that the stakeholders for
this issue is the users of the token/smart card which are the
employees of the company so they have the right identities to the
right people.
Advantages:
http://iyak.it/v/M2hp6
Disadvantage:
http://iyak.it/v/B2hp7
A way to solve this issue is that the records should be kept of
employees who received a token, and a verification
process should be implemented to ensure that each
specific token is being given to the proper employee.
8. Nurul Hanim Binti Hussein Shah
ITGS
Ethical Issues:
An example of ethical issues in ‘Authenticity’ is:
From the articles about, ethical issues of data reporting and the
quest for authenticity is that the people who are responsible are the
Society for Academic Emergency Medicine Code of Conduct and
American College of Emergency Physicians Code of Ethics because
of how they need to do an accurate scientific research on how to
improve the authentication of the people all over the world more
efficiently. According to the policies, Authenticity is important in our
life so our datas are kept safe and secure. Unfortunately, some
people these days can hack into your profile by stealing your
identity. A way to solve this, the government needs to provide a
high secure IT system, so that it is hard for people to get into
account. Therefore, the consequences of this solution is that it
might cause people’s life by causing them to be threatened for their
identities.
9. Nurul Hanim Binti Hussein Shah
ITGS
People and Machines
People and Machines concerns the way
that humans interact with IT. For example,
Many people trust computers intrinsically,
and this has consequences when they fail.
10. Nurul Hanim Binti Hussein Shah
Social Impacts:
ITGS
An example of social impacts in ‘People and Machines’ is:
From the documentary about Medical robot, the stakeholders for
this impact is the builders because of how they are involved in
building this technologies and making sure that they are being used
properly and correctly.
Advantages:
The advantage of this that the IT system works more efficiently and
prevents from human-errors to a appear.
Disadvantage:
The disadvantage is that it needs to work in a safer and suitable
environment so it doesn’t get distracted to other environments such
as a busy and crowded environment.
A way to solve this issue is that they just have to keep the IT
system in a well-secured and safe environment.
11. Nurul Hanim Binti Hussein Shah
ITGS
Ethical Issues:
An example of ethical issues in ‘People and Machines’ is:
From the articles about ergonomics is that it tells us that the people
who are responsible for this issue are the builders and the people
who might be affected by this issue are the users of the IT system.
There are laws to this issue which is that people needs to know how
the system works. Therefore to prevent the issue of the way of how
people connect with the machine is that they need to have full
knowledge on how they have to use the IT system correctly.
The consequence of this decision that some people might have a
hard time catching up to
things.
12. Nurul Hanim Binti Hussein Shah
ITGS
Digital Citizenship
Digital citizenship involves being a good
citizen in a digital world. For example,
using websites and social networking sites
correctly and safely according to the given
policies.
13. Nurul Hanim Binti Hussein Shah
Social Impacts:
ITGS
An example of social impacts in ‘Digital Citizenship’ is:
In the article about ‘Being a good digital citizen includes both rights
and responsibilities’ tells us that the stakeholders of this article are
the users of the social networking websites since they need to know
how to communicate with people correctly.
Advantages:
The advantage of this is that people who are using the website and
social networking can communicate easily and safely with other
users when they are following the rules.
Disadvantage:
The disadvantage is that some people might ignore these rules and
causing cyber bullying to occur and this may affect the victim of
cyber-bullying’s health.
A way to solve this problem is that government should take
advantage to prevent this issue from occurring in a daily basis.
14. Nurul Hanim Binti Hussein Shah
ITGS
Ethical Issues:
An example of ethical issues in ‘Digital Citizenship’ is:
From this article, it tells us that the people who are responsible in
this issue are the creator of social networking sites and the one who
is affected by it are the social networkers and users of this IT
system. The law for this issue is that it needs to be used correctly.
Unfortunately, Twitter have played a role in the organization of the
protests, it (along with Facebook) was widely used as a
communication tool by the opposition. Although the Islamic
republic’s government also tried to enforce a ban against foreign
media coverage of the uprising, dissident supporters and journalists
kicked its censorship decree in the proverbial nards. Digital citizens
everywhere took to the virtual streets, protecting the anonymity of
Iran’s in-country news sources while spreading real-time
information across every channel possible. To avoid this from
occurring, social networkers need to be aware of the way that
socialize in public.