Ethical Issues In ICT

48,915 views

Published on

It's about the ehthical issues in ICT World through the digital world today

Published in: Technology, Business
4 Comments
5 Likes
Statistics
Notes
No Downloads
Views
Total views
48,915
On SlideShare
0
From Embeds
0
Number of Embeds
295
Actions
Shares
0
Downloads
641
Comments
4
Likes
5
Embeds 0
No embeds

No notes for slide

Ethical Issues In ICT

  1. 1. r r M. SETIAWAN KUSMULYONO Business Ethics S1 Business Prasetiya Mulya Business School
  2. 2. Business Ethics r Muhammad Setiawan Kusmulyono PRESENTATION 1
  3. 3. Business Ethics r S e s s i o n 9 E t h i c a l I s s u e s i n Information Technology 2
  4. 4. r A g e n d a Business Ethics Chronology Back to Definition Ethical Issues Netiquette Cyber-ethics Conclusion Discussion Session 3
  5. 5. Business Ethics r C h r o n o l o g y 4 Information Technology have closely related to : Computer & Communications Within this Information Age [ begin in 1990 ], Computer and Communications started to combine. The combination results: Convergence Allow device [electronic product] to perform in multiple functions. Example: Cellphone+Digicam, TV+Internet Access, etc Portability Trading off the power and move to convenience in return for smaller size and weight. Example: PC Tablet, Smartphone, etc Personalization Creation of information tailored to your preferences. Example: We will receive special ad that we often needed.
  6. 6. Business Ethics r D e f i n i t i o n 5 Ethics is defined as a set of moral values or principles that govern the conduct of an individual or a group. Using Information Technology 6 th Ed. p.25 O b j e c t i v e s To understand many kinds of ethical issues in Information Technology To understand the basic concepts of ethics in IT Developments
  7. 7. Business Ethics r P e r s p e c t i v e 6 Tom Forester and Perry Morrison in Computer Ethics , discuss about some considerations in ethical issues in Information Technology, such as: Speed and Scale Unpredictability Complexity Great amounts of information can be stored, retrieved, and transmitted at any speed and scale Com&Com are pervasive, touching nearly every aspects of our lives Computers are incredibly complex, even their creators are not always understood about the complexity.
  8. 8. Business Ethics r Ethical Issues 7 <ul><li>What is the safeguards when we want to reveal secret info? </li></ul><ul><li>What things can people keep to them selves and not being cracked? </li></ul><ul><li>Who is responsible for the authenticity, fidelity and accuracy of info? </li></ul><ul><li>Who will take the accountable [responsible for the error? </li></ul><ul><li>Who owns the info? </li></ul><ul><li>How should access to this scarce resource be allocated? </li></ul><ul><li>What info does a person have a right to obtain? </li></ul><ul><li>What will be the requirement and condition that info can be delivered? </li></ul>Richard O Mason Carr P. Collins Management Information Sciences Quarterly P Privacy A Accuracy P Property A Accessibility
  9. 9. Business Ethics r Ethical Issues 8 Plagiarism Privacy Data Security Less Predictable Less Reliable Unmanageable Out-of-control Cost Morphing Photo Manipulation Technology Manipulation
  10. 10. Business Ethics r Ethical Issues 9 Privacy Privacy is the right of people not to reveal information about themselves. Using Information Technology 6 th Ed. p.369 Privacy is had closely related to Data Security. This ethical issues occur when unauthorized access tried to attack our system. Data Security Example : Today, e-banking and e-commerce have becoming lifestyle. People tend to do transaction through internet. Privacy and Data Security become an issue. Prevention: PIN [Personal Identification Number] Change Password Regularly
  11. 11. Business Ethics r Ethical Issues 10 Less Predictable Less Reliable Computers and communications are pervasive, touching nearly every aspects of our lives. If we compare Com & Com with other pervasive technologies; electricity, television, etc, Com & Com seems lot of less predictable and reliable <ul><li>EXAMPLE : </li></ul><ul><li>We don’t know that virus attacks our system even though we try to create our defensive system. [less predictable] </li></ul><ul><li>Less Reliable happen when the internet traffic is full [down] </li></ul><ul><li>Flash disk borrowing </li></ul>
  12. 12. Business Ethics r Ethical Issues 11 Unmanageable Out-of-control Cost Good Example: Linux Operating System Bad Example: Sometimes, we don’t know the development of a program. Someone could modify the program until the initial creator don’t know what happen to the program
  13. 13. Business Ethics r Ethical Issues 12 Technology Manipulation SOUND Manipulation PHOTO Manipulation VIDEO & Television Manipulation Morphing
  14. 14. Business Ethics r Ethical Issues 13 Technology Manipulation SOUND Manipulation <ul><li>Example 1 : </li></ul><ul><li>Frank Sinatra’s 1994 album, titled: DUETS </li></ul><ul><li>In this album Sinatra sang as if in duet with some artists [Barbara Streisand and Bono U2]. </li></ul><ul><li>But, truly, Sinatra sang alone in his studio, and then the recording was sent to those artist and dubbed with their own voices. </li></ul><ul><li>So, Frank Sinatra and Streisand+Bono never sang together </li></ul>Example 2: L I P S I N G
  15. 15. Ethical Issues 14 Technology Manipulation PHOTO Manipulation Morphing
  16. 16. Business Ethics r Ethical Issues 15 Technology Manipulation MEDIA Manipulation Manipulation
  17. 17. Business Ethics r Ethical Issues 16 Technology Manipulation MEDIA Manipulation Manipulation
  18. 18. Business Ethics r Ethical Issues 17 Technology Manipulation MEDIA Manipulation
  19. 19. Business Ethics r Ethical Issues 18 P L A G I A R I S M Plagiarism Illegal Copy-Paste Activity Not inserted the original author, if we use their theory
  20. 20. Business Ethics r Netiquette 19 Netiquette <ul><li>Basic rules of Netiquette: </li></ul><ul><li>Don’t waste people’s time </li></ul><ul><li>Don’t say anything to a person online that you wouldn’t say to his/her face </li></ul><ul><li>Specific rules of Netiquette: </li></ul><ul><li>Consult FAQs </li></ul><ul><li>Avoid Flaming </li></ul><ul><li>Don’t SHOUT </li></ul><ul><li>Be Careful with Jokes </li></ul><ul><li>Avoid Sloppiness </li></ul><ul><li>Don’t send huge file attachments </li></ul><ul><li>When replying, quote only the relevant portion </li></ul><ul><li>Don’t “overforward” </li></ul>Network Etiquette Appropriate online behavior
  21. 21. Business Ethics r Cyber-ethics 20 Cyber-ethics = related with censorship of internet information Data The word “sex” is the most popular search word on the net. [Yahoo data] <ul><li>Possibilities to Solve </li></ul><ul><li>Blocking Software </li></ul><ul><li>Browsers with Ratings </li></ul><ul><li>The V-chip </li></ul>
  22. 22. r r C O N C L U S I O N Ethical issues in ICT is not only existed in sex, crime, or hack, but also happened in another area of life (entertainment, education, etc) <ul><li>It is difficult to face the bad ethical issues, but there are some ways to prevent the bad impact, such as: </li></ul><ul><li>Developing the awareness of users [esp. for children u-18] </li></ul><ul><li>Protecting the un-behavioral sites </li></ul><ul><li>etc </li></ul>21
  23. 23. r r BIBLIOGRAPHY 21 Using Infromation and Communication Technology. Williams Sawyer. McGraw-Hill. 2005 Management Information Sciences Quarterly Richard O. Mason and Carr P. Collins
  24. 24. r r thank you discussion session

×