Sunteți pe pagina 1din 12

School of Science, Information Technology and Engineering

Student ID: Student Name: _Gurlal


_____30127161____________________ Singh____________________

Course Code: Course Name: __PROFESSIONAL


_ITECH7203______________________ DEVELOPMENT____________________

Date Submitted: __03-05- Lecturer’s Name: _YUWEI JIA


2015_____________

Tutor’s Name_DINUSHI_______________

ASSIGNMENT TITLE:

Feedback / Assessment

LECTURER’S SIGNATURE: DATE

PLAGIARISM

Plagiarism is the presentation of the expressed thought or work of another person as


though it is one's own without properly acknowledging that person. You must not allow
other students to copy your work and must take care to safeguard against this happening.

Declaration
Except where appropriately acknowledged, this assignment is my own work, has been
expressed in my own words and has not previously been submitted for assessment. I
have also retained a copy of this assessment piece for my own records.

Signature: GURLAL SINGH Date: 02-05-2015

Contents
ACKNOWLEDGEMENT.....................................................................................................................2
Introduction...........................................................................................................................................2
Advantages............................................................................................................................................4
Disadvantages........................................................................................................................................5
Theories.................................................................................................................................................6
Utilitarianism.....................................................................................................................................6
Deontology........................................................................................................................................7
Contractarianism theory....................................................................................................................7
Character-Based................................................................................................................................8
The ACS Code of Ethics....................................................................................................................9
Conclusion...........................................................................................................................................10
Recommendations...............................................................................................................................10
References...........................................................................................................................................11
ACKNOWLEDGEMENT

I am highly indebted especially to my lecturer YUWEI JIA and tutor DINUSHI for their
guidance and support regarding for this assignment. I am really thankful to all of these for
their support regarding the completion for this task. Again I would like to thanks the teachers
and my friends for their guidance and for their efforts.

Introduction

Radio Frequency Identification (RFID) is a common phrase that is used to explain a method
that transmits the character of an item wirelessly, by radio waves. Radio Frequency
Identification is developing as a main technology enabler for assets and tracking goods all
over the world. A study which was conducted by Benchmark Research in 2004, near about
75% firms is now aware about the Radio Frequency Identification.  Radio Frequency
Identification (RFID) is a method of robotically identifies a exacting item or a individual by
maintenance and faintly retrieving data from minute transponders, referred to as Radio
Frequency Identification tag. This technique has been applied in a variety of form more than
forty years. The tags include a build in transmitter which enables transmit and reaction of
radio influence from a Radio Frequency Identification transceiver. It is estimated that the
RFID technology will maintain to get more function owing to advance commerce and
knowledge. (Chachra& McPherson, 2003) 

Radio Frequency Identification is the greatest rising technology system in today’s world.
Radio Frequency Identification is a mechanical recognition technique that can vaguely
recover data by using devices called RFID tags. This preface of Radio Frequency
Identificationinterested in the mobile communication ground has completed the world a
lesserlay to live in.The expertise which enables the wireless and electronic labellingdetection
of stuffvia radio frequency exchanges is Radio Frequency Identification. Radio Frequency
Identification is moreover a division of the broader part of mechanicalcataloguing and data
confine technology. The innovation in dissimilar application of Radio Frequency
Identification israising from existinglearningthoughts to real systems.Radio Frequency
Identification and mobile communications are the services that offerin order on
stuffpreparedbyaRadio Frequency Identification tag in excess of a telecommunication system.
Radio Frequency Identificationreader can at the same time scans and also identifies thousand
of tag items.Radio Frequency Identification is a knowledge that incorporate the utilize of
electromagnetic or electrostatic combination in the radio frequency (RF) segment of the
electromagnetic spectrum to exclusively recognize an item, creature, or human being. Radio
Frequency Identification is approaching keen on rising utilize in manufacturing as an option
to the bar code. The benefit of Radio Frequency Identification is that it does not need straight
get in touch with or line-of-sight scan. A Radio Frequency Identification scheme consists of
three apparatus: a tag (transponder) transceiver and an antenna. Fraedrich, J., Thorne, D.M.,
and Ferrell, O.C. 1994.

Advantages

 Controlling Access, Controlling Borders, and Interdicting Suspects

Inspection detection is proposed to attain a figure of diverse goals: services managers use
detection to control entrance to perceptive infrastructures that might be spoiled or used to
harm Americans. They apply it to manage entrance to services where perceptive data about
other communications might be reserved, or where safety preparation or operation are passed
out. The governments use detection administratively to trail the border crossing of
intercontinental travellers.

These classification processes are planned to defend a broad diversity of institution,


infrastructure, processes, and person from a broad diversity of pressure, each have a special
risk side view. (Chachra& McPherson, 2003) 

 RFID Can Reduce Delay at Entrances and Checkpoints


It might be takes time to verify a fixed detection document. The procedures normally include
handing the article to a verifier, who should analysis the in sequence on the chip or card and
approve the possessor to pass, evidence the bearer’s transitory, or, if suitable, arrest the
possessor. The verifier should also evaluate the identifiers on the chip with the holder to
make sure that the holder is the human being recognized by the chip

The make use of RFID might distribute by one of steps by eliminate the surrender of the card.
The next two steps will not exaggerated by Radio Frequency Identification. The verifiers
should evaluate authorize in order and contrast the identifier on the chip.

 RFID Can Reduce Forgery and Tampering with Identification Documents

Encryptions allow in sequence to be programmed in such a method that it is unseen from


informal vision and any challenge at variation or imitation can be consistently detect.
Communicating in sequence from a detection card or chip by allows encryption to be worn,
suppress likely attack on the veracity of the identification structure by imitation and
amendment. (Chachra& McPherson, 2003) 

Disadvantages
 The Difficulty with Notice to Subjects of RFID Identification

Radio Frequency Identification might be disempowering and inequitable to gather positive


types of data concerning citizens without their awareness. Burden so prevent public from
pleasing steps to cover in order they may wish not to split. Person classification using Radio
Frequency Identification has grave likely to divest public of observe that potentially greatly
precise, full information concerning them is being together. (Glencoe Press: Encino,
California, 1977),

 RFID privacy and security risks

Radio Frequency Identification technology pose exclusive isolation and safety concerns since
human could not intellect the RF radiation old to examine tags, and the tags themselves
naturally preserve no times past of past reading. As an effect, tags are licentious: they could
be convert by entity by their owner and devoid of their owner’ data. Tags and reader could be
secretly entrenched in the situation; short-range reader could be minute sufficient to robust
keen on a wireless devices. Velasquez, M. G. (2001).

 Personal privacy threats

Most delicate seclusion fear occurs from the detail that tags with exclusive IDs could be
simply related by a person’suniqueness:
 Action threat
 Association threat
 Location threat
Velasquez, M. G. (2001).

Theories

Utilitarianism
It is also known as consequence based theory. A method of ethics theories by which the right
or wrong of an act have to judge by its consequences. The objective of utilitarian ethics
theory is to support the maximum happiness for the maximum number. An ethical viewpoint
in which the gladness of the maximum quantity of group in the civilization is measured the
maximum good. According to this viewpoint, an act is ethically correct if its consequences
direct to gladness and incorrect if it ends in sadness. This theory is very popular among the
economists.Utilitarianism theory never focuses on whether an action was ethically correct or
incorrect, it just focuses on whether the action leads to gladness of the maximum number of
people or not. In this theory there are some problems such as measurement of happiness.
Conrad, C.1993

According to Utilitarianism theory Radio Frequency Identification chips in implanting in


human is appropriate if a majority of people is happy because according to Utilitarianism
theory an act is right if morally right if its consequence leads to happiness.“The loss of
privacy may be far weights the safety that an individual may get through technology.” (P.
Liao, A. Smith, and C. Wang, 2007). Though, inserting of RFID chip give benefits in regards
to health, safety and improvement of the people but the privacy concerns may always the
vitalsubjects with this technology.

Deontology

Deontology is also known as duty based theory. Deontology theory is totally based on duty,
responsibility and regulations. According to Deontology theory an action is right if we fellow
or perform according to the standards or rules. This theory is popular among the health care
workers. Deontology theory is move toward to Ethics that focus on the right or wrong of
actions themselves, as opposite to the right or wrong of the consequences of those acts or to
the nature and behaviour of the performer. Deontological ethical system is characterized via a
spotlight ahead commitment to dependent ethical rules or duty. To create the correct ethical
choice, we should recognize what our ethical duty is and what accurate system survive to
control those duties. When we pursuit our duties, we behave ethically. When we not succeed
to follow our duties, we behave not ethically. Usually in any deontological method, our duty,
rule, and dutyare determined by God.This theory only contracts with thelimited duty of a
person which he/she has to achieve in respects to thebilled duties irrespective of any other
fact. Conrad, C.1993

According to Deontology theory implanting of Radio Frequency Identification is right if they


follow all the rules and regulation which is set by the government or community. According
to Deontology theory if people perform their duty according to the rules and duties then
implanting of RFID chips in human is right because this theory is based on rules and duties
not on greatest happiness.Since, the taking of the establishment of RFID chips may be
considered if there is the requirement of being followed and for safety issues. For example, in
a university it might be the task to pathway the students details.

Contractarianism theory

Contractarianism theory is also identifying as rights based ethics or social contract theory.
Contracrarianism theory is based on contractual agreement between people. It justifies
ethical principles and political choices as they depend on a social agreement connecting
confident ideal situation. Contractualism is an expression which refers to an opinionated
situation. Contractualism believes that there are conceptual contract shaped by human but
none look to believe on. It state that if an human being break the agreement then the other
person concerned no longer want to respect the situation of the agreement.The social contract
may be define as laws and rights which is made up to form a maintainable society by
combining both rights and laws. In this theory the basics are based on the social agreements
which are made by the people in a society and also show its impact by bounding the people
and society together. It comprises both legal and moral agreements.It additionally has two
possibilities named as: Conrad, C.1993

 Legal contract
 Social contract

The implantation of RFID is appropriate in humans according to theory if both parties


are agreeing to do it. If one party is not agreed to implementation of RFID then it is
unappropriated. Because this theory is based on contracts and both parties have to fulfil the
requirements of the contract which is set by their mutual understanding.So, legally it is
suitable to have the right of establishment of chips in human bodies if government has made
some laws in regards to the safety and suitability of the citizens of that particular country
regardless of asking to the citizens about the right and wrong in the situation of ethics. On the
other hand, according to the social contract, the moralbehaviour becomes the important
principle. Since, it suggests that if one person is against the establishment of the RFID chips
then the other person cannot force the person.

Character-Based
Character based model is defines as the ethicalassets of a person and the quality by which
person acts and perform tasks for his/her own benefit as well as for the sake of whole society.
These moral values and virtue are learned by an individual over a period of time where
person decides to choose good moral standards and apply these moral values in real life to
perform good activities for the society as well. There are some duties that all individuals have
to do. The moral behaviour of a person is also depending upon thedivine and the cultural
characteristic which play animportant role to develop the moral personality of a person.
Conrad, C.1993

The basis of the character based theory of ethics; the inserting of RFID chips in human beings
must be good for the society. However, there are some confidentiality and theft worries
related to the establishment of the chips but if a person have the ethical values then person
may not spoiled in criminal actions such as hacking, and abusing, which may reason not only
the personal loss but also trace the society. So, a person should work for the advantage of
whole society.

The ACS Code of Ethics


The primacy of public interest: - In this Code of ethics, the community’s interest take priority
above private, personal and sectional interests, and any conflict must be determined in favour
of the private interest. In work, they have safeguarded the interest of instant stakeholder;
provide that this interest does not conflict with the obligation and devotion be obliged to the
community. The community attention is in use to take in matter of community health,
security and the surroundings. In harmony with this significance you will: ACS |Code of
Professional Conduct

a) Recognize those potentially impacted via occupation and plainly think their happiness;

b) Elevate with stakeholder any possible conflict among practiced action and official or other
conventional community supplies;

c) Recommend stakeholder as quickly as probable of a few conflict of curiosity or thorough


objection that have;

d) Acquire keen on reflection the detail that occupation traverse numerous other professions,
and have implication for additional common system and organisations;

e) Endeavour to defend the veracity, safety, stability and efficacy of ICT;

f) Value the intellectual property of others people

g) Endeavour to protect the privacy and isolation of the facts of others people. In primacy of
public interest they include to provide penchant to community welfare on their own benefit.

Honesty: - professional people will be truthful in their demonstration of skills, understanding,


services and goods.
On the other side, there must be the value of morality while packing the delicate information
of a person on the chip. The person should have the right to know how much personal
information the person is being used.

Competence: - Professional people will work proficiently and industriously for their
stakeholders.

Professional development: - professional people will have to improve their own proficient
progress, and of their staff.

Professionalism: - professional people will improve the reliability of the Australian Computer
Society and the reverence of its member.

The enhancement of quality of life: - professional people have to endeavour to improve the
class of life of those affect by their work. ACS |Code of Professional Conduct

Conclusion
The conversation of an ethical dilemma has been done in relative to an ethical examination of
ethical theories. Each theory has its own characteristic which may be different in another
theory. Additionally, every theory has its ownsignificance in regards to the ethics, principles
that every individual should follow for a sustainable life. Additionally, what is right in one
theory may be mentioned wrong into another. The ethical dilemma of applying the RFID
chips into the human being is suitable with the help of these theories. Though, the use of
RFID chips in human bodies may be satisfactory by some supporters.

Recommendations
The recommendations for the implementation of RFID chips into the humans in regards to
the ethical dilemma have been described with the help of modern approach theory. Modern
approach theory tells about the ethical act of a person which is considered into three honest
fundamentals that include the values that certain a person to achieve in a certain way. The
basics of the modern approach theory are

 The support for consequences


 Dependable functions of principles
 A caring character

The support for the costs is based on the fact that without seeing the end results of an act, the
pleasure cannot be expanded since there must be a system to check and balance the
implemented technology to maintain the likelihood of it.The rules must be in the favour of
public as there must be the chances of cracks and risk to the privacy of an individual.
Furthermore, a set of rule must be useful to which follow the standards and morals in respects
to the chip attaching. Every individual should have their right to continue the privacy to an
amount which can make it more relaxed for the individual to live their life without any
pressure.

References
Bentham, J. (1907). Principles of Morals and Legislation, Oxford: Clarendon.

Hull, R. T. (1979). The Varieties of Ethical Theories, Buffalo Psychiatric Center.

Kant, I. (1956). A Critique of Practical Reason, New York: Liberal Arts Press.

Snoeyenbos, M. & Humber, J. (2002). “Utilitarianism and Business Ethics,” in Robert


Frederick, ed. A Companion to Business Ethics, UK: Blackwell.

Solomon, R. (1993). “Business Ethics,” in Peter Singer, ed., A Companion to Ethics, Wiley:
Backwell. Takala, T. & Uusitalo, O. (1995). Retailers’ Professional and Professo-Ethical
Dilemmas: The Case of Finnish Retailing Business, Journal of Business Ethics, 14, pp. 893-
907.

Velasquez, M. G. (2001). Business Ethics Concepts&Cases, Business Ethics, Anderson


University DBA

Fraedrich, J., Thorne, D.M., and Ferrell, O.C. 1994. Assessing the Application of Cognitive
Moral Development Theory to Business Ethics. Journal of Business Ethics, 13: 829- 838.

Fritzsche, D.J., and Oz, E. 2007. Personal Values' Influence on the Ethical Dimensions of
Decision Making. Journal of Business Ethics, 75: 335-343.

Conrad, C.1993. The Ethical Nexus. Ablex, New Jersey.


Jacques P. Thiroux, Ethics: Theory and Practice (Glencoe Press: Encino, California, 1977),
pp. 43-55.

Arthur J. Dyck , On Human Care: an Introduction to Ethics (Abingdon Press: Nashville,


1977), pp. 55-77.

Teleology, Utilitarianism and Christian Ethics’, p. 625.

S-ar putea să vă placă și