r r M. SETIAWAN KUSMULYONO Business Ethics S1 Business Prasetiya Mulya Business School
Business Ethics r Muhammad Setiawan Kusmulyono PRESENTATION 1
Business Ethics r S e s s i o n  9 E t h i c a l  I s s u e s i n Information Technology 2
r A g e n d a Business Ethics Chronology Back to Definition Ethical Issues Netiquette Cyber-ethics Conclusion  Discussion Session  3
Business Ethics r C h r o n o l o g y 4 Information Technology have closely related to : Computer & Communications Within this Information Age [ begin in 1990 ], Computer and Communications started to combine.   The combination results: Convergence Allow device [electronic product] to perform in multiple functions. Example: Cellphone+Digicam, TV+Internet Access, etc Portability Trading off the power and move to convenience in return for smaller size and weight. Example: PC Tablet, Smartphone, etc Personalization Creation of information tailored to your preferences. Example: We will receive special ad that we often needed.
Business Ethics r D e f i n i t i o n 5 Ethics is defined as a set of moral values or principles that govern the conduct of an individual or a group. Using Information Technology 6 th  Ed. p.25 O b j e c t i v e s To understand many kinds of ethical issues in Information Technology To understand the basic concepts of ethics in IT Developments
Business Ethics r P e r s p e c t i v e 6 Tom Forester and Perry Morrison in  Computer Ethics , discuss about some considerations in ethical issues in Information Technology, such as: Speed and Scale Unpredictability Complexity Great amounts of information can be stored, retrieved, and transmitted at any speed and scale Com&Com are pervasive, touching nearly every aspects of our lives  Computers are incredibly complex, even their creators are not always understood about the complexity.
Business Ethics r Ethical Issues 7 What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for the authenticity, fidelity and accuracy of info? Who will take the accountable [responsible for the error? Who owns the info? How should access to this scarce resource be allocated? What info does a person have a right to obtain? What will be the requirement and condition that info can be delivered? Richard O Mason Carr P. Collins Management Information Sciences Quarterly P Privacy A Accuracy P Property A Accessibility
Business Ethics r Ethical Issues 8 Plagiarism Privacy Data Security Less Predictable Less Reliable Unmanageable Out-of-control Cost Morphing  Photo Manipulation Technology Manipulation
Business Ethics r Ethical Issues 9 Privacy Privacy is the right of people not to reveal information about themselves. Using Information Technology 6 th  Ed. p.369 Privacy is had closely related to Data Security. This ethical issues occur when unauthorized access tried to attack our system. Data Security Example : Today, e-banking and e-commerce have becoming lifestyle. People tend to do transaction through internet. Privacy and Data Security become an issue.  Prevention: PIN [Personal Identification Number] Change Password Regularly
Business Ethics r Ethical Issues 10 Less Predictable Less Reliable Computers and communications are pervasive, touching nearly every aspects of our lives. If we compare Com & Com with other pervasive technologies; electricity, television, etc, Com & Com seems lot of less predictable and reliable EXAMPLE : We don’t know that virus attacks our system even though we try to create our defensive system.  [less predictable]  Less Reliable happen when the internet  traffic is full [down] Flash disk borrowing
Business Ethics r Ethical Issues 11 Unmanageable Out-of-control Cost Good Example: Linux Operating System Bad Example: Sometimes, we don’t know the development of a program. Someone could modify the program until the initial creator don’t know what happen to the program
Business Ethics r Ethical Issues 12 Technology Manipulation SOUND Manipulation PHOTO Manipulation VIDEO & Television  Manipulation Morphing
Business Ethics r Ethical Issues 13 Technology Manipulation SOUND Manipulation Example  1 : Frank Sinatra’s 1994 album, titled: DUETS In this album Sinatra sang as if in duet with some artists [Barbara Streisand and Bono U2]. But, truly, Sinatra sang alone in his studio, and then the recording was sent to those artist and dubbed with their own voices. So, Frank Sinatra and Streisand+Bono never sang together Example  2: L I P S I N G
Ethical Issues 14 Technology Manipulation PHOTO Manipulation Morphing
Business Ethics r Ethical Issues 15 Technology Manipulation MEDIA Manipulation Manipulation
Business Ethics r Ethical Issues 16 Technology Manipulation MEDIA Manipulation Manipulation
Business Ethics r Ethical Issues 17 Technology Manipulation MEDIA Manipulation
Business Ethics r Ethical Issues 18 P L A G I A R I S M Plagiarism  Illegal Copy-Paste Activity Not inserted the original author, if we use their theory
Business Ethics r Netiquette 19 Netiquette Basic rules of Netiquette: Don’t waste people’s time Don’t say anything to a person online that you wouldn’t say to his/her face Specific rules of Netiquette: Consult FAQs Avoid Flaming Don’t SHOUT Be Careful with Jokes Avoid Sloppiness Don’t send huge file attachments When replying, quote only the relevant portion Don’t “overforward”  Network Etiquette Appropriate online behavior
Business Ethics r Cyber-ethics 20 Cyber-ethics   = related with censorship of internet information Data The word “sex” is the most popular search word on the net. [Yahoo data] Possibilities to Solve Blocking Software Browsers with Ratings The V-chip
r r C O N C L U S I O N Ethical issues in ICT is not only existed in sex, crime, or hack, but also happened in another area of life (entertainment, education, etc) It is difficult to face the bad ethical issues, but there are some ways to prevent the bad impact, such as: Developing the awareness of users [esp. for children u-18] Protecting the un-behavioral sites etc 21
r r BIBLIOGRAPHY 21 Using Infromation and Communication Technology. Williams Sawyer. McGraw-Hill. 2005 Management Information Sciences Quarterly Richard O. Mason and Carr P. Collins
r r thank you discussion session

Ethical Issues In ICT

  • 1.
    r r M.SETIAWAN KUSMULYONO Business Ethics S1 Business Prasetiya Mulya Business School
  • 2.
    Business Ethics rMuhammad Setiawan Kusmulyono PRESENTATION 1
  • 3.
    Business Ethics rS e s s i o n 9 E t h i c a l I s s u e s i n Information Technology 2
  • 4.
    r A ge n d a Business Ethics Chronology Back to Definition Ethical Issues Netiquette Cyber-ethics Conclusion Discussion Session 3
  • 5.
    Business Ethics rC h r o n o l o g y 4 Information Technology have closely related to : Computer & Communications Within this Information Age [ begin in 1990 ], Computer and Communications started to combine. The combination results: Convergence Allow device [electronic product] to perform in multiple functions. Example: Cellphone+Digicam, TV+Internet Access, etc Portability Trading off the power and move to convenience in return for smaller size and weight. Example: PC Tablet, Smartphone, etc Personalization Creation of information tailored to your preferences. Example: We will receive special ad that we often needed.
  • 6.
    Business Ethics rD e f i n i t i o n 5 Ethics is defined as a set of moral values or principles that govern the conduct of an individual or a group. Using Information Technology 6 th Ed. p.25 O b j e c t i v e s To understand many kinds of ethical issues in Information Technology To understand the basic concepts of ethics in IT Developments
  • 7.
    Business Ethics rP e r s p e c t i v e 6 Tom Forester and Perry Morrison in Computer Ethics , discuss about some considerations in ethical issues in Information Technology, such as: Speed and Scale Unpredictability Complexity Great amounts of information can be stored, retrieved, and transmitted at any speed and scale Com&Com are pervasive, touching nearly every aspects of our lives Computers are incredibly complex, even their creators are not always understood about the complexity.
  • 8.
    Business Ethics rEthical Issues 7 What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for the authenticity, fidelity and accuracy of info? Who will take the accountable [responsible for the error? Who owns the info? How should access to this scarce resource be allocated? What info does a person have a right to obtain? What will be the requirement and condition that info can be delivered? Richard O Mason Carr P. Collins Management Information Sciences Quarterly P Privacy A Accuracy P Property A Accessibility
  • 9.
    Business Ethics rEthical Issues 8 Plagiarism Privacy Data Security Less Predictable Less Reliable Unmanageable Out-of-control Cost Morphing Photo Manipulation Technology Manipulation
  • 10.
    Business Ethics rEthical Issues 9 Privacy Privacy is the right of people not to reveal information about themselves. Using Information Technology 6 th Ed. p.369 Privacy is had closely related to Data Security. This ethical issues occur when unauthorized access tried to attack our system. Data Security Example : Today, e-banking and e-commerce have becoming lifestyle. People tend to do transaction through internet. Privacy and Data Security become an issue. Prevention: PIN [Personal Identification Number] Change Password Regularly
  • 11.
    Business Ethics rEthical Issues 10 Less Predictable Less Reliable Computers and communications are pervasive, touching nearly every aspects of our lives. If we compare Com & Com with other pervasive technologies; electricity, television, etc, Com & Com seems lot of less predictable and reliable EXAMPLE : We don’t know that virus attacks our system even though we try to create our defensive system. [less predictable] Less Reliable happen when the internet traffic is full [down] Flash disk borrowing
  • 12.
    Business Ethics rEthical Issues 11 Unmanageable Out-of-control Cost Good Example: Linux Operating System Bad Example: Sometimes, we don’t know the development of a program. Someone could modify the program until the initial creator don’t know what happen to the program
  • 13.
    Business Ethics rEthical Issues 12 Technology Manipulation SOUND Manipulation PHOTO Manipulation VIDEO & Television Manipulation Morphing
  • 14.
    Business Ethics rEthical Issues 13 Technology Manipulation SOUND Manipulation Example 1 : Frank Sinatra’s 1994 album, titled: DUETS In this album Sinatra sang as if in duet with some artists [Barbara Streisand and Bono U2]. But, truly, Sinatra sang alone in his studio, and then the recording was sent to those artist and dubbed with their own voices. So, Frank Sinatra and Streisand+Bono never sang together Example 2: L I P S I N G
  • 15.
    Ethical Issues 14Technology Manipulation PHOTO Manipulation Morphing
  • 16.
    Business Ethics rEthical Issues 15 Technology Manipulation MEDIA Manipulation Manipulation
  • 17.
    Business Ethics rEthical Issues 16 Technology Manipulation MEDIA Manipulation Manipulation
  • 18.
    Business Ethics rEthical Issues 17 Technology Manipulation MEDIA Manipulation
  • 19.
    Business Ethics rEthical Issues 18 P L A G I A R I S M Plagiarism Illegal Copy-Paste Activity Not inserted the original author, if we use their theory
  • 20.
    Business Ethics rNetiquette 19 Netiquette Basic rules of Netiquette: Don’t waste people’s time Don’t say anything to a person online that you wouldn’t say to his/her face Specific rules of Netiquette: Consult FAQs Avoid Flaming Don’t SHOUT Be Careful with Jokes Avoid Sloppiness Don’t send huge file attachments When replying, quote only the relevant portion Don’t “overforward” Network Etiquette Appropriate online behavior
  • 21.
    Business Ethics rCyber-ethics 20 Cyber-ethics = related with censorship of internet information Data The word “sex” is the most popular search word on the net. [Yahoo data] Possibilities to Solve Blocking Software Browsers with Ratings The V-chip
  • 22.
    r r CO N C L U S I O N Ethical issues in ICT is not only existed in sex, crime, or hack, but also happened in another area of life (entertainment, education, etc) It is difficult to face the bad ethical issues, but there are some ways to prevent the bad impact, such as: Developing the awareness of users [esp. for children u-18] Protecting the un-behavioral sites etc 21
  • 23.
    r r BIBLIOGRAPHY21 Using Infromation and Communication Technology. Williams Sawyer. McGraw-Hill. 2005 Management Information Sciences Quarterly Richard O. Mason and Carr P. Collins
  • 24.
    r r thankyou discussion session