SlideShare a Scribd company logo
Ethics, Professionalism
&
Other Emerging Technologies
By: Prakhyath
Table of
Contents
Technology and Ethics
Digital Privacy
Accountability and Trust
Threats and Challenges
Block Chain Technology
Cloud and Quantum Computing
Autonomic Computing
Computer Vision
Cyber Security
3D Printing
Technology and Ethics
 Context of ethics in technology,
• Pace of technology innovation is benefitting human kind
• Severely empowering people while choking others for the same
 Technical Advances / Evolution
• Raise concern like computer security or viruses, Trojans, spam’s that invade the privacy
of people or the fact the technology is promoting consumerism
• Environmental Degradation
• Un-Employment
• Bioethics
Digital Privacy
Digital privacy, also known as internet privacy, is the
concept of passing information, data, messages, and
files over the internet without leaking to undesired
individuals  Communication privacy +
Information privacy + Individual privacy
Threats on Digital Privacy
Phishing Attacks
Cookies Proliferation
Cell Phone GPS Functionality
Unsecured Browsing
Practices to Enhance Digital Privacy
 Beware of Phishing Attacks
 Blocking Cookies
 Delete Unsecured Apps From Your Phone
 Unsecured Browsing
 Use Encrypted Apps for Messaging
 Don’t Save Financial Info on Shopping Sites
 Use a VPN
 Browse in Private Mode
Accountability and Trust
 Accountability
• Helps build meaningful relationships
• Establish a sense of ownership
• Feel responsible for actions, behaviour, and success
 Threats to Accountability
• Unclear Expectations
• Fear of Failure
• Lack of Engagement
Threats
- liable with Emerging Technologies
 Botnet Attacks
 Digital Privacy Breaches
 Environmental Degradations – materials
used for 3D Printing, Printing Inks etc.
 Security Threats
 Bio-Hacking
 BYOD – Bring Your Own Devices
Challenges with Evolving/Emerging Technologies
IoT
* Implementation, Installation and Configuration
* Security
Automation
* Maintenance and Monitoring
* Managing Network Traffic
AI / ML / Data Science
* Security
* Data Privacy
Block Chain
 Blockchain is a shared, immutable ledger that facilitates the process of
recording transactions and tracking assets in a business network.
• An asset can be tangible (a house, car, cash, land) or intangible (intellectual
property, patents, copyrights, branding)
 Benefits,
• Greater Trust and Security
• Enhanced Efficiency with Distributer Ledger System and Smart Contract
Block Chain Applications
• Improving Cryptocurrency security in financial services
• Transforming healthcare outcomes with blockchain
• Increasing trust in retailer-supplier relationships
• Fuelling innovation in oil and gas industry
• Tracing fresh seafood from the moment it’s caught
Cloud and Quantum Computing
 Quantum computing is a rapidly-emerging technology based on quantum
computing that harnesses the laws of quantum mechanics to solve
problems too complex for classical computers.
 Cloud is a model of computing where servers, networks, storage,
development tools, and even applications (apps) are enabled through the
internet.
Cloud Computing Characteristics
 Internet Access – Anytime-Anywhere Access
 Measured Service – Pay as you Go
 Shared Resource Pooling – Adopts Multi-Tenancy Model
 Rapid Elasticity – Resource Usage flexibly
 On-Demand Self Service – No manual set-up and Configuration
Autonomic Computing
 Autonomic Computing is a self-managing computing model mimics and
patterned over the human body's autonomic nervous system.
 Autonomic Computing facilitates building systems that run themselves,
capable of high-level functioning while keeping the system's complexity
invisible to the user.
 An Autonomic Computing system would control the functioning of
computer applications and systems without input from the user.
Autonomic Computing
Elements fostering autonomic computing systems,
 Comprehensive detailed knowledge about the comprising components
 Self Configurable
 Constant Self Monitoring
 Self Healable
 Detect Threats and Tackle
 Adapt to Changes
 Anticipate Demand
 Transparent to Users
Computer Vision
 Computer Vision is a field of artificial intelligence
(AI) that enables computers and systems to derive
meaningful information from digital images,
videos and other visual inputs — and take actions
or make recommendations based on that
information.
 Computer Vision enables systems to see, observe
and understand.
Computer Vision
Usecases
 Image Classification
 Object Detection
 Object Tracking
 Content based Image Retrieval
Cyber Security
A strong cybersecurity strategy has layers of
protection to defend against cyber crime,
including cyber attacks that attempt to
access, change, or destroy data; extort money
from users or the organization; or aim to
disrupt normal business operations.
Cyber Threats
 Malware
 Ransomware
 Phishing / Social Engineering
 Insider Threats
 Distributed Denial-of-Service (DDoS) Attacks
 Man-in-the-Middle Attacks
3D Printing
• 3D printing is any of various processes in
which material is joined or solidified under
computer control to create a three-
dimensional object, with material being added
together (such as liquid molecules or powder
grains being fused together).
• 3D printing is an additive process whereby
layers of material are built up to create a 3D
part.
3D Printing
Advantages:
 Cost-effective creation of geometries
 Affordable start-up costs
 Customizable
 Facilitates rapid prototyping
Disadvantages:
 Quality of products manufactured
 Increased cost for large production
 Shortcomings in accuracy
 Post-Processing
References
 https://www.ibm.com/topics/cybersecurity
 https://www.ibm.com/topics/computer-vision
 https://www.sciencedirect.com/topics/computer-science/autonomic-computing
 https://www.ibm.com/topics/quantum-computing
 https://link.springer.com/article/10.1007/s10833-019-09352-4
 https://www.ibm.com/topics/what-is-blockchain
 https://www.ibm.com/in-en/cloud/learn/cloud-computing
 https://www.accenture.com/in-en/insights/cloud-computing-index
Thank You

More Related Content

What's hot

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mazhar Nazik
 
Information Technology for Managers - Basics
Information Technology for Managers - BasicsInformation Technology for Managers - Basics
Information Technology for Managers - Basics
Isha Joshi
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
almario1988
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
Atul Kumar Pandey
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and InternetJanecatalla
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
INFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESSINFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESS
METHODIST COLLEGE OF ENGG & TECH
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
FLYMAN TECHNOLOGY LIMITED
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Information technology
Information technologyInformation technology
Information technologyEnes Bolfidan
 
Advantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki VermaAdvantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki Verma
Wikki Verma
 
Basics of information technology
Basics of information technologyBasics of information technology
Basics of information technology
Aakash software cell Gujrat.
 
Information communication technology & cyber law presentation
Information communication technology & cyber law presentationInformation communication technology & cyber law presentation
Information communication technology & cyber law presentation
Being Aabis
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide WebSamudin Kassan
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
Being Aabis
 
Presentation on Information technology
Presentation on Information technologyPresentation on Information technology
Presentation on Information technology
Zarifasifkhan
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
imehreenx
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Information Technology for Managers - Basics
Information Technology for Managers - BasicsInformation Technology for Managers - Basics
Information Technology for Managers - Basics
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
INFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESSINFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESS
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Information technology
Information technologyInformation technology
Information technology
 
Advantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki VermaAdvantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki Verma
 
Basics of information technology
Basics of information technologyBasics of information technology
Basics of information technology
 
Information communication technology & cyber law presentation
Information communication technology & cyber law presentationInformation communication technology & cyber law presentation
Information communication technology & cyber law presentation
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide Web
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 
Presentation on Information technology
Presentation on Information technologyPresentation on Information technology
Presentation on Information technology
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 

Similar to Ethics, Professionalism and Other Emerging Technologies

Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
S .Ali Raza
 
cyber securities in web development.pdf
cyber securities in web development.pdfcyber securities in web development.pdf
cyber securities in web development.pdf
Cuion Technologies
 
cloud security.pptx
cloud security.pptxcloud security.pptx
cloud security.pptx
Nickjohn33
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
KARANSINGHD
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
Malu704065
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
TikdiPatel
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
AchSulav
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
AchSulav
 
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
Citrix
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
Jenna Murray
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User Perspective
AvinantaTarigan
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
Accenture Technology
 

Similar to Ethics, Professionalism and Other Emerging Technologies (20)

Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
cyber securities in web development.pdf
cyber securities in web development.pdfcyber securities in web development.pdf
cyber securities in web development.pdf
 
cloud security.pptx
cloud security.pptxcloud security.pptx
cloud security.pptx
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
 
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directions
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
security IDS
security IDSsecurity IDS
security IDS
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User Perspective
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 

More from Prakhyath Rai

Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Prakhyath Rai
 
Software Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements EngineeringSoftware Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements Engineering
Prakhyath Rai
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
Prakhyath Rai
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
Prakhyath Rai
 
Data Science
Data ScienceData Science
Data Science
Prakhyath Rai
 
Emerging Exponential Technologies - History & Introduction
Emerging Exponential Technologies - History & IntroductionEmerging Exponential Technologies - History & Introduction
Emerging Exponential Technologies - History & Introduction
Prakhyath Rai
 
Preparation of Project
Preparation of ProjectPreparation of Project
Preparation of Project
Prakhyath Rai
 
Small Scale Industry
Small Scale IndustrySmall Scale Industry
Small Scale Industry
Prakhyath Rai
 
Entrepreneurship
EntrepreneurshipEntrepreneurship
Entrepreneurship
Prakhyath Rai
 
Directing and Controlling
Directing and ControllingDirecting and Controlling
Directing and Controlling
Prakhyath Rai
 
Planning
PlanningPlanning
Planning
Prakhyath Rai
 
Introduction to Management
Introduction to Management Introduction to Management
Introduction to Management
Prakhyath Rai
 
Text MIning
Text MIningText MIning
Text MIning
Prakhyath Rai
 
Text Mining Framework
Text Mining FrameworkText Mining Framework
Text Mining Framework
Prakhyath Rai
 

More from Prakhyath Rai (14)

Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
 
Software Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements EngineeringSoftware Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements Engineering
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Data Science
Data ScienceData Science
Data Science
 
Emerging Exponential Technologies - History & Introduction
Emerging Exponential Technologies - History & IntroductionEmerging Exponential Technologies - History & Introduction
Emerging Exponential Technologies - History & Introduction
 
Preparation of Project
Preparation of ProjectPreparation of Project
Preparation of Project
 
Small Scale Industry
Small Scale IndustrySmall Scale Industry
Small Scale Industry
 
Entrepreneurship
EntrepreneurshipEntrepreneurship
Entrepreneurship
 
Directing and Controlling
Directing and ControllingDirecting and Controlling
Directing and Controlling
 
Planning
PlanningPlanning
Planning
 
Introduction to Management
Introduction to Management Introduction to Management
Introduction to Management
 
Text MIning
Text MIningText MIning
Text MIning
 
Text Mining Framework
Text Mining FrameworkText Mining Framework
Text Mining Framework
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 

Ethics, Professionalism and Other Emerging Technologies

  • 1. Ethics, Professionalism & Other Emerging Technologies By: Prakhyath
  • 2. Table of Contents Technology and Ethics Digital Privacy Accountability and Trust Threats and Challenges Block Chain Technology Cloud and Quantum Computing Autonomic Computing Computer Vision Cyber Security 3D Printing
  • 3. Technology and Ethics  Context of ethics in technology, • Pace of technology innovation is benefitting human kind • Severely empowering people while choking others for the same  Technical Advances / Evolution • Raise concern like computer security or viruses, Trojans, spam’s that invade the privacy of people or the fact the technology is promoting consumerism • Environmental Degradation • Un-Employment • Bioethics
  • 4. Digital Privacy Digital privacy, also known as internet privacy, is the concept of passing information, data, messages, and files over the internet without leaking to undesired individuals  Communication privacy + Information privacy + Individual privacy
  • 5. Threats on Digital Privacy Phishing Attacks Cookies Proliferation Cell Phone GPS Functionality Unsecured Browsing
  • 6. Practices to Enhance Digital Privacy  Beware of Phishing Attacks  Blocking Cookies  Delete Unsecured Apps From Your Phone  Unsecured Browsing  Use Encrypted Apps for Messaging  Don’t Save Financial Info on Shopping Sites  Use a VPN  Browse in Private Mode
  • 7. Accountability and Trust  Accountability • Helps build meaningful relationships • Establish a sense of ownership • Feel responsible for actions, behaviour, and success  Threats to Accountability • Unclear Expectations • Fear of Failure • Lack of Engagement
  • 8. Threats - liable with Emerging Technologies  Botnet Attacks  Digital Privacy Breaches  Environmental Degradations – materials used for 3D Printing, Printing Inks etc.  Security Threats  Bio-Hacking  BYOD – Bring Your Own Devices
  • 9. Challenges with Evolving/Emerging Technologies IoT * Implementation, Installation and Configuration * Security Automation * Maintenance and Monitoring * Managing Network Traffic AI / ML / Data Science * Security * Data Privacy
  • 10. Block Chain  Blockchain is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network. • An asset can be tangible (a house, car, cash, land) or intangible (intellectual property, patents, copyrights, branding)  Benefits, • Greater Trust and Security • Enhanced Efficiency with Distributer Ledger System and Smart Contract
  • 11. Block Chain Applications • Improving Cryptocurrency security in financial services • Transforming healthcare outcomes with blockchain • Increasing trust in retailer-supplier relationships • Fuelling innovation in oil and gas industry • Tracing fresh seafood from the moment it’s caught
  • 12. Cloud and Quantum Computing  Quantum computing is a rapidly-emerging technology based on quantum computing that harnesses the laws of quantum mechanics to solve problems too complex for classical computers.  Cloud is a model of computing where servers, networks, storage, development tools, and even applications (apps) are enabled through the internet.
  • 13. Cloud Computing Characteristics  Internet Access – Anytime-Anywhere Access  Measured Service – Pay as you Go  Shared Resource Pooling – Adopts Multi-Tenancy Model  Rapid Elasticity – Resource Usage flexibly  On-Demand Self Service – No manual set-up and Configuration
  • 14. Autonomic Computing  Autonomic Computing is a self-managing computing model mimics and patterned over the human body's autonomic nervous system.  Autonomic Computing facilitates building systems that run themselves, capable of high-level functioning while keeping the system's complexity invisible to the user.  An Autonomic Computing system would control the functioning of computer applications and systems without input from the user.
  • 15. Autonomic Computing Elements fostering autonomic computing systems,  Comprehensive detailed knowledge about the comprising components  Self Configurable  Constant Self Monitoring  Self Healable  Detect Threats and Tackle  Adapt to Changes  Anticipate Demand  Transparent to Users
  • 16. Computer Vision  Computer Vision is a field of artificial intelligence (AI) that enables computers and systems to derive meaningful information from digital images, videos and other visual inputs — and take actions or make recommendations based on that information.  Computer Vision enables systems to see, observe and understand.
  • 17. Computer Vision Usecases  Image Classification  Object Detection  Object Tracking  Content based Image Retrieval
  • 18. Cyber Security A strong cybersecurity strategy has layers of protection to defend against cyber crime, including cyber attacks that attempt to access, change, or destroy data; extort money from users or the organization; or aim to disrupt normal business operations.
  • 19. Cyber Threats  Malware  Ransomware  Phishing / Social Engineering  Insider Threats  Distributed Denial-of-Service (DDoS) Attacks  Man-in-the-Middle Attacks
  • 20. 3D Printing • 3D printing is any of various processes in which material is joined or solidified under computer control to create a three- dimensional object, with material being added together (such as liquid molecules or powder grains being fused together). • 3D printing is an additive process whereby layers of material are built up to create a 3D part.
  • 21. 3D Printing Advantages:  Cost-effective creation of geometries  Affordable start-up costs  Customizable  Facilitates rapid prototyping Disadvantages:  Quality of products manufactured  Increased cost for large production  Shortcomings in accuracy  Post-Processing
  • 22. References  https://www.ibm.com/topics/cybersecurity  https://www.ibm.com/topics/computer-vision  https://www.sciencedirect.com/topics/computer-science/autonomic-computing  https://www.ibm.com/topics/quantum-computing  https://link.springer.com/article/10.1007/s10833-019-09352-4  https://www.ibm.com/topics/what-is-blockchain  https://www.ibm.com/in-en/cloud/learn/cloud-computing  https://www.accenture.com/in-en/insights/cloud-computing-index