SlideShare a Scribd company logo
r r M. SETIAWAN KUSMULYONO Business Ethics S1 Business Prasetiya Mulya Business School
Business Ethics r Muhammad Setiawan Kusmulyono PRESENTATION 1
Business Ethics r S e s s i o n  9 E t h i c a l  I s s u e s i n Information Technology 2
r A g e n d a Business Ethics Chronology Back to Definition Ethical Issues Netiquette Cyber-ethics Conclusion  Discussion Session  3
Business Ethics r C h r o n o l o g y 4 Information Technology have closely related to : Computer & Communications Within this Information Age [ begin in 1990 ], Computer and Communications started to combine.   The combination results: Convergence Allow device [electronic product] to perform in multiple functions. Example: Cellphone+Digicam, TV+Internet Access, etc Portability Trading off the power and move to convenience in return for smaller size and weight. Example: PC Tablet, Smartphone, etc Personalization Creation of information tailored to your preferences. Example: We will receive special ad that we often needed.
Business Ethics r D e f i n i t i o n 5 Ethics is defined as a set of moral values or principles that govern the conduct of an individual or a group. Using Information Technology 6 th  Ed. p.25 O b j e c t i v e s To understand many kinds of ethical issues in Information Technology To understand the basic concepts of ethics in IT Developments
Business Ethics r P e r s p e c t i v e 6 Tom Forester and Perry Morrison in  Computer Ethics , discuss about some considerations in ethical issues in Information Technology, such as: Speed and Scale Unpredictability Complexity Great amounts of information can be stored, retrieved, and transmitted at any speed and scale Com&Com are pervasive, touching nearly every aspects of our lives  Computers are incredibly complex, even their creators are not always understood about the complexity.
Business Ethics r Ethical Issues 7 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Richard O Mason Carr P. Collins Management Information Sciences Quarterly P Privacy A Accuracy P Property A Accessibility
Business Ethics r Ethical Issues 8 Plagiarism Privacy Data Security Less Predictable Less Reliable Unmanageable Out-of-control Cost Morphing  Photo Manipulation Technology Manipulation
Business Ethics r Ethical Issues 9 Privacy Privacy is the right of people not to reveal information about themselves. Using Information Technology 6 th  Ed. p.369 Privacy is had closely related to Data Security. This ethical issues occur when unauthorized access tried to attack our system. Data Security Example : Today, e-banking and e-commerce have becoming lifestyle. People tend to do transaction through internet. Privacy and Data Security become an issue.  Prevention: PIN [Personal Identification Number] Change Password Regularly
Business Ethics r Ethical Issues 10 Less Predictable Less Reliable Computers and communications are pervasive, touching nearly every aspects of our lives. If we compare Com & Com with other pervasive technologies; electricity, television, etc, Com & Com seems lot of less predictable and reliable ,[object Object],[object Object],[object Object],[object Object]
Business Ethics r Ethical Issues 11 Unmanageable Out-of-control Cost Good Example: Linux Operating System Bad Example: Sometimes, we don’t know the development of a program. Someone could modify the program until the initial creator don’t know what happen to the program
Business Ethics r Ethical Issues 12 Technology Manipulation SOUND Manipulation PHOTO Manipulation VIDEO & Television  Manipulation Morphing
Business Ethics r Ethical Issues 13 Technology Manipulation SOUND Manipulation ,[object Object],[object Object],[object Object],[object Object],[object Object],Example  2: L I P S I N G
Ethical Issues 14 Technology Manipulation PHOTO Manipulation Morphing
Business Ethics r Ethical Issues 15 Technology Manipulation MEDIA Manipulation Manipulation
Business Ethics r Ethical Issues 16 Technology Manipulation MEDIA Manipulation Manipulation
Business Ethics r Ethical Issues 17 Technology Manipulation MEDIA Manipulation
Business Ethics r Ethical Issues 18 P L A G I A R I S M Plagiarism  Illegal Copy-Paste Activity Not inserted the original author, if we use their theory
Business Ethics r Netiquette 19 Netiquette ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Network Etiquette Appropriate online behavior
Business Ethics r Cyber-ethics 20 Cyber-ethics   = related with censorship of internet information Data The word “sex” is the most popular search word on the net. [Yahoo data] ,[object Object],[object Object],[object Object],[object Object]
r r C O N C L U S I O N Ethical issues in ICT is not only existed in sex, crime, or hack, but also happened in another area of life (entertainment, education, etc) ,[object Object],[object Object],[object Object],[object Object],21
r r BIBLIOGRAPHY 21 Using Infromation and Communication Technology. Williams Sawyer. McGraw-Hill. 2005 Management Information Sciences Quarterly Richard O. Mason and Carr P. Collins
r r thank you discussion session

More Related Content

What's hot

computer ethics
computer ethicscomputer ethics
computer ethics
Honey jose
 
Digital Ethics
Digital EthicsDigital Ethics
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
stanbridge
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Ramki M
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
Al Forte
 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impacts
Being Aabis
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
sameera.moparty
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
Abhinav Tyagi
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
Rushana Bandara
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
Adyns
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
Mark John Lado, MIT
 
Application development and emerging technologies.pptx
Application development and emerging technologies.pptxApplication development and emerging technologies.pptx
Application development and emerging technologies.pptx
Michael Angelo Marasigan
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
Jose Luis Leon Gonzalez
 
Social Media Ethics Presentation
Social Media Ethics PresentationSocial Media Ethics Presentation
Social Media Ethics Presentation
PalmRyan
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
Abdullah Khosa
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICTKak Yong
 
Introduction to ict
Introduction to ictIntroduction to ict
Introduction to ict
Maricrs Alfarö
 
Digital Ethics
Digital EthicsDigital Ethics
Digital Ethics
aakash malhotra
 

What's hot (20)

computer ethics
computer ethicscomputer ethics
computer ethics
 
Digital Ethics
Digital EthicsDigital Ethics
Digital Ethics
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impacts
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
Application development and emerging technologies.pptx
Application development and emerging technologies.pptxApplication development and emerging technologies.pptx
Application development and emerging technologies.pptx
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Social Media Ethics Presentation
Social Media Ethics PresentationSocial Media Ethics Presentation
Social Media Ethics Presentation
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
 
Introduction to ict
Introduction to ictIntroduction to ict
Introduction to ict
 
Digital Ethics
Digital EthicsDigital Ethics
Digital Ethics
 

Viewers also liked

BTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical IssuesBTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical Issues
mrcox
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
Prof. Dr. Basavaraj Nanjwade
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
Komal Sahu
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
Aakash Singh
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issues
Maher Al Beshlawy
 
Intellectual Property Rights In India: Patents Trademarks And Copyrights
Intellectual Property Rights In India: Patents Trademarks And Copyrights Intellectual Property Rights In India: Patents Trademarks And Copyrights
Intellectual Property Rights In India: Patents Trademarks And Copyrights
JRA & Associates
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
Rachel Farnese
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Viewers also liked (8)

BTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical IssuesBTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical Issues
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issues
 
Intellectual Property Rights In India: Patents Trademarks And Copyrights
Intellectual Property Rights In India: Patents Trademarks And Copyrights Intellectual Property Rights In India: Patents Trademarks And Copyrights
Intellectual Property Rights In India: Patents Trademarks And Copyrights
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similar to Ethical Issues In ICT

TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
samkvarughese
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
Craig Devlin
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentation
ICCNS
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Electronic poster
Electronic posterElectronic poster
Electronic poster
Tebogo Ndaba
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
FahimMuntasir21
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
AvilaTherese1
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
SANSKAR20
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
Steve Mckee
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 
Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptx
eyesred813
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
HamadRabban
 
Reem's Investigation
Reem's InvestigationReem's Investigation
Reem's Investigationuk01f0015
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
honey690131
 
portfolio.docx
portfolio.docxportfolio.docx
portfolio.docx
DasolGaming
 

Similar to Ethical Issues In ICT (20)

TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
 
Ethics in IT
Ethics in ITEthics in IT
Ethics in IT
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentation
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Electronic poster
Electronic posterElectronic poster
Electronic poster
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptx
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
 
Reem's Investigation
Reem's InvestigationReem's Investigation
Reem's Investigation
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
portfolio.docx
portfolio.docxportfolio.docx
portfolio.docx
 

More from kelly kusmulyono

Arcelik Turkey
Arcelik TurkeyArcelik Turkey
Arcelik Turkey
kelly kusmulyono
 
Product Development (Indonesian Version)
Product Development (Indonesian Version)Product Development (Indonesian Version)
Product Development (Indonesian Version)kelly kusmulyono
 
Problem Analysis Framework
Problem Analysis FrameworkProblem Analysis Framework
Problem Analysis Frameworkkelly kusmulyono
 
Decision Analysis Introduction
Decision Analysis IntroductionDecision Analysis Introduction
Decision Analysis Introduction
kelly kusmulyono
 
Nike Internal-External Assessment
Nike Internal-External AssessmentNike Internal-External Assessment
Nike Internal-External Assessmentkelly kusmulyono
 
Celebrity Endorser
Celebrity EndorserCelebrity Endorser
Celebrity Endorser
kelly kusmulyono
 
Nike Environmental Analysis
Nike Environmental AnalysisNike Environmental Analysis
Nike Environmental Analysiskelly kusmulyono
 
Risk Exposure & Internal Control Structure
Risk Exposure & Internal Control StructureRisk Exposure & Internal Control Structure
Risk Exposure & Internal Control Structure
kelly kusmulyono
 
ICC
ICCICC

More from kelly kusmulyono (10)

Arcelik Turkey
Arcelik TurkeyArcelik Turkey
Arcelik Turkey
 
Product Development (Indonesian Version)
Product Development (Indonesian Version)Product Development (Indonesian Version)
Product Development (Indonesian Version)
 
Problem Analysis
Problem AnalysisProblem Analysis
Problem Analysis
 
Problem Analysis Framework
Problem Analysis FrameworkProblem Analysis Framework
Problem Analysis Framework
 
Decision Analysis Introduction
Decision Analysis IntroductionDecision Analysis Introduction
Decision Analysis Introduction
 
Nike Internal-External Assessment
Nike Internal-External AssessmentNike Internal-External Assessment
Nike Internal-External Assessment
 
Celebrity Endorser
Celebrity EndorserCelebrity Endorser
Celebrity Endorser
 
Nike Environmental Analysis
Nike Environmental AnalysisNike Environmental Analysis
Nike Environmental Analysis
 
Risk Exposure & Internal Control Structure
Risk Exposure & Internal Control StructureRisk Exposure & Internal Control Structure
Risk Exposure & Internal Control Structure
 
ICC
ICCICC
ICC
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Ethical Issues In ICT

  • 1. r r M. SETIAWAN KUSMULYONO Business Ethics S1 Business Prasetiya Mulya Business School
  • 2. Business Ethics r Muhammad Setiawan Kusmulyono PRESENTATION 1
  • 3. Business Ethics r S e s s i o n 9 E t h i c a l I s s u e s i n Information Technology 2
  • 4. r A g e n d a Business Ethics Chronology Back to Definition Ethical Issues Netiquette Cyber-ethics Conclusion Discussion Session 3
  • 5. Business Ethics r C h r o n o l o g y 4 Information Technology have closely related to : Computer & Communications Within this Information Age [ begin in 1990 ], Computer and Communications started to combine. The combination results: Convergence Allow device [electronic product] to perform in multiple functions. Example: Cellphone+Digicam, TV+Internet Access, etc Portability Trading off the power and move to convenience in return for smaller size and weight. Example: PC Tablet, Smartphone, etc Personalization Creation of information tailored to your preferences. Example: We will receive special ad that we often needed.
  • 6. Business Ethics r D e f i n i t i o n 5 Ethics is defined as a set of moral values or principles that govern the conduct of an individual or a group. Using Information Technology 6 th Ed. p.25 O b j e c t i v e s To understand many kinds of ethical issues in Information Technology To understand the basic concepts of ethics in IT Developments
  • 7. Business Ethics r P e r s p e c t i v e 6 Tom Forester and Perry Morrison in Computer Ethics , discuss about some considerations in ethical issues in Information Technology, such as: Speed and Scale Unpredictability Complexity Great amounts of information can be stored, retrieved, and transmitted at any speed and scale Com&Com are pervasive, touching nearly every aspects of our lives Computers are incredibly complex, even their creators are not always understood about the complexity.
  • 8.
  • 9. Business Ethics r Ethical Issues 8 Plagiarism Privacy Data Security Less Predictable Less Reliable Unmanageable Out-of-control Cost Morphing Photo Manipulation Technology Manipulation
  • 10. Business Ethics r Ethical Issues 9 Privacy Privacy is the right of people not to reveal information about themselves. Using Information Technology 6 th Ed. p.369 Privacy is had closely related to Data Security. This ethical issues occur when unauthorized access tried to attack our system. Data Security Example : Today, e-banking and e-commerce have becoming lifestyle. People tend to do transaction through internet. Privacy and Data Security become an issue. Prevention: PIN [Personal Identification Number] Change Password Regularly
  • 11.
  • 12. Business Ethics r Ethical Issues 11 Unmanageable Out-of-control Cost Good Example: Linux Operating System Bad Example: Sometimes, we don’t know the development of a program. Someone could modify the program until the initial creator don’t know what happen to the program
  • 13. Business Ethics r Ethical Issues 12 Technology Manipulation SOUND Manipulation PHOTO Manipulation VIDEO & Television Manipulation Morphing
  • 14.
  • 15. Ethical Issues 14 Technology Manipulation PHOTO Manipulation Morphing
  • 16. Business Ethics r Ethical Issues 15 Technology Manipulation MEDIA Manipulation Manipulation
  • 17. Business Ethics r Ethical Issues 16 Technology Manipulation MEDIA Manipulation Manipulation
  • 18. Business Ethics r Ethical Issues 17 Technology Manipulation MEDIA Manipulation
  • 19. Business Ethics r Ethical Issues 18 P L A G I A R I S M Plagiarism Illegal Copy-Paste Activity Not inserted the original author, if we use their theory
  • 20.
  • 21.
  • 22.
  • 23. r r BIBLIOGRAPHY 21 Using Infromation and Communication Technology. Williams Sawyer. McGraw-Hill. 2005 Management Information Sciences Quarterly Richard O. Mason and Carr P. Collins
  • 24. r r thank you discussion session