Etika Teknologi Informasi

Slides:



Advertisements
Presentasi serupa
TANTANGAN DARI SISTEM INFORMASI
Advertisements

Peranan dan dampak Penggunaan Teknologi Informasi dan Komunikasi
Etika Profesi Teknologi Informasi
Etika Profesi Teknologi Informasi Hendro Subagyo IlmuKomputer.Com – Brainmatics.Com Bimbingan Teknis Bendum & Perencanaan Teknis 2008 Dirjen. Perbendaharaan,
RESIKO DAN KEAMANAN E-COMMERCE
Etika dan Keamanan Sistem Informasi
Etika Profesi Teknologi Informasi Materi 8 Sumber : Bahan Ajar Komputer dan Masyarakat oleh Didik Tristianto (Universitas Narotama)
ETIKA PROFESI SESI 3 : ETIKA PEMANFAATAN TEKNIK INFORMASI
4.1 © 2007 by Prentice Hall Etika dan Mengamankan Sistem Informasi.
Etika, Kejahatan Komputer, dan Keamanan Sistem Informasi
Etika, Kejahatan Komputer, dan Keamanan Sistem Informasi
BENTUK KEAMANAN DENGAN MENGGUNAKAN PASSWORD
Foundation of Information Syetem
TANTANGAN DALAM HAL ETIKA DAN KEAMANAN
BAB XVI KEAMANAN PADA INTRANET
HUKUM, ETIKA, DAN DAMPAK SOSIAL DARI E-COMMERCE
By : Nanda Prasetia, ST. Tujuan perkuliahan hari Kamis, 5 Juli 2012  Di akhir kuliah Mahasiswa dapat menyebutkan apa saja yang harus diamankan dan tipe-tipe.
Etika, Kejahatan Komputer, dan Keamanan Sistem Informasi
HUKUM, ETIKA, DAN DAMPAK SOSIAL DARI Teknologi Informasi
Doris Febriyanti M.Si ETIKA PROFESI Doris Febriyanti M.Si
ETIKA DAN KEAMANAN DALAM SISTEM INFORMASI
Management Information Systems, 9th edition,
Etika, Kejahatan Komputer, dan Keamanan Sistem Informasi
Etika & Kebebasan Pribadi (Privacy) Berkomputer KEAMANAN KOMPUTER
Website Security.
PROTEKSI ASET INFORMASI
KEAMANAN SISTEM INFORMASI
INFRASTRUCTURE SECURITY
Implikasi Etis Penggunaan IT
KEAMANAN DALAM E-COMMERCE
Isu Etika dan Sosial dalam Perusahaan Digital
SLIDE 1 : KEAMANAN SISTEM INFORMASI
Pengamanan Jaringan Komputer
HUKUM, ETIKA, DAN DAMPAK SOSIAL DARI E-COMMERCE Materi Pertemuan ke-14
Brilliani Ayunda Putri
Electronic Commerce Pertemuan 5.
REVIEW VIDEO CRYPTOGRAPHY AND HOW SSL WORKS
SISTEM INFORMASI MANAJEMEN
Implikasi etis dari Teknologi Informasi
DIGITAL CERTIFICATE (SERTIFIKASI DIGITAL)
KEAMANAN DALAM E-COMMERCE
Isu Etika dan Sosial dalam Perusahaan Digital
PENGELOLAAN DATA Roni Kurniawan M.Si.
KEAMANAN INFORMASI INFORMATION SECURITY
ETIKA PROFESI DALAM BIDANG TEKNIK INFORMATIKA
Etika, Kejahatan Komputer, dan Keamanan Sistem Informasi
ETIKA DALAM SISTEM INFORMASI
PENDIDIKAN ETIKA PROFESI HUBUNGANNYA PADA PENGGUNAAN KOMPUTER
KEAMANAN SISTEM INFORMASI
Bab 5 Isu-Isu Etika dan Sosial Dalam Perusahaan Digital
Etika Profesi.
Etika Profesi Dalam Sistem Informasi
Pertemuan 2 Sejarah dan Perkembangan Etika Profesi
Etika, Kejahatan Komputer, dan Keamanan Sistem Informasi
SLIDE 1 : KEAMANAN JARINGAN
Bab II SEJARAH DAN PERKEMBANGAN ETIKA
KAJIAN ETIKA PROFESI DI BIDANG IT.
HUKUM, ETIKA, DAN DAMPAK SOSIAL DARI E-COMMERCE
MATERI VII BENTUK KEAMANAN DENGAN MENGGUNAKAN PASSWORD
SISTEM INFORMASI MANAJEMEN
ETIKA DALAM SISTEM INFORMASI
Ethics Issues Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior. Deciding what is right.
HUKUM, ETIKA, DAN DAMPAK SOSIAL DARI E-COMMERCE
Isu-isu dan Peluang Teknologi Informasi
IMPLIKASI ETIS dari TEKNOLOGI INFORMASI
Keamanan Sistem E-Bisnis
SISTEM INFORMASI MANAJEMEN
IMPLIKASI ETIS dari TEKNOLOGI INFORMASI
Etika Profesi Teknologi Informasi Pokok Bahasan ke-9.
Etika bisnis dan e-commerce
Transcript presentasi:

Etika Teknologi Informasi Information Systems Today Leonard Jessup and Joseph Valacich

© 2003 Prentice Hall, Inc.

Tujuan Memahami bagaimana etika komputer memengaruhi SI Memahami privasi, akurasi, kepemilikan dan aksesibilitas informasi

Etika Sistem Informasi Tiga gelombang perubahan menurut Alvin Toffler Pertanian Revolusi Industri Abad Informasi Melek Komputer Mengetahui bagaimana menggunakan komputer Kesenjangan Digital Gap antara mereka yang dapat mengakses komputer dan yang tidak memilikinya Etika Komputer Perilaku baku selama bersinggungan dengan penggunaan sistem informasi

Etika Sistem Informasi Privasi Perlindungan informasi personal seseorang Pencurian Identitas Pencurian nomor jaminan sosial, nomor kartu kredit, atau informasi personal lainnya. Keakuratan Informasi Berkaitan dengan autentikasi atau kebenaran informasi Kepemilikan Informasi Berhubungan dengan siapa yang memiliki informasi tentang individu dan bagaimana informasi dapat dijual dan dipertukarkan © 2003 Prentice Hall, Inc.

Etika Sistem Informasi Keakuratan Informasi Berkaitan dengan autentikasi atau kebenaran informasi Kepemilikan Informasi Berhubungan dengan siapa yang memiliki informasi tentang individu dan bagaimana informasi dapat dijual dan dipertukarkan © 2003 Prentice Hall, Inc.

Etika Sistem Informasi Aksesibilitas Informasi Berkaitan dengan informasi apa seseorang berhak memperoleh dan bagaimana informasi dapat digunakan Isu-isu dalam aksesibilitas Carnivore Electronic Communications Privacy Act (ECPA) Monitoring e-mail HAKI UU ITE

Etika Sistem Informasi Kebutuhan kode etik berperilaku Etika bisnis Plagiarisme Cybersquatting © 2003 Prentice Hall, Inc.

Etika dan Pergaulan Apakah computer ethics? Pedoman Moral yang mengatur penggunaan komputer dan sistem informasi Menggunakan komputer dan jaringan tidak syah Pencurian Software Ketepatan Informasi Intellectual property rights hak yang didapatkan atas pekerjaan mereka Kode Produk Privasi Informasi

Privasi Informasi Bagaimana cara-cara untuk menjaga informasi pribadi? Isi informasi yang diperlukan hanya pada formulir pengembalian, garansi, dan pendaftaran Install sebuah cookie manager untuk menyaring cookies Sign up untuk menyaring e-mail melalui penyedia layanan internet anda atau gunakan program anti spams seperti Brightmail Bersihkan file histori ketika anda mengakhiri browsing Avoid shopping club and buyers cards Set up account e-mail bebas; gunakan alamat e-mail untuk formulir pedagang Jangan membalas spam untuk alasan apapun Inform merchants that you do not want them to distribute your personal information Matikan sharing file dan printer pada koneksi internet Berselancar di Web secara anonim dengan program seperti Freedom Web Secure atau melalui situs web anonim seperti Anonymizer.com Batasi jumlah informasi yang anda sediakan ke website; hanya isi satu informasi yang diperlukan saja Instal sebuah firewall personal

Privasi Informasi Apakah cookie? File kecil pada komputer yang berisi data-data tentang anda Beberapa website menjual atau memperdagang-kan informasi yang disimpan dalam cookies anda Set browser untuk menerima cookies, meminta untuk menerima cookies atau menonaktifkan cookies Preferensi User Seberapa sering anda mengunjungi Web sites Kepentingan dan kebiasaan browsing Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click Cookies below Chapter 10

Masalah Kesehatan Layanan Komputer Apa tindakan pencegahan yang dapat mencegah tendonitis atau sindrom yang menembus tangan? Ambil waktu istirahat saat komputer bekerja Gunakan istirahat pergelangan tangan Latihan tangan dan pergelangan Minimalkan jumlah peralihan antara keyboar dan mouse

Masalah Kesehatan Layanan Komputer Bagaimana mata anda bisa mudah kelelahan saat bekerja di depan komputer?

Masalah Kesehatan Layanan Komputer Apakah ergonomics? Ilmu terapan yang ditujukan untuk kenyamanan, efisiensi, dan keselamatan bekerja di tempat kerja Ketinggian keyboard 23” s/d 28” siku 90° dan lengan dan tangan sejajar dengan lantai Sesuaikan sandaran Sesuaian tempat duduk diatur ketinggian kursi dengan 5 kaki untuk stabilitas kaki datar di lantai

Profesi & Etika Sebagaimana etika untuk profesi: dokter guru (Pendidik) teknisi Sales ….

TIK Tingkatkan Kapasitas Intelektual Dengan bantuan teknologi informasi & kompunikasi kecerdasan dan kapasitas manusia meningkat

Big capacity  big responsibility

Problem Masalahnya tidak begitu banyak keamanan fisik perangkat keras (melindunginya dari pencurian, kebakaran, banjir, dll), melainkan "keamanan secara logika" -- Spafford, Heaphy and Ferbrache, 1989

PAPA = 4 Isu Etika Era Informasi Privacy/kebebasan pribadi Accuracy/ketepatan Property/kepemilikan Accessibility/kemudahan akses Privacy Informasi seseorang atau terkait seseorang mana yang: Boleh dibuka orang lain? Dalam kondisi/syarat apa? Apa yang dapat seseorang sembunyikan dari orang lain?

Dua Pengganggu Privacy Perkembangan TI Meningkatkan komunikasi, komputasi, storage, retrieval, dan pengawasan Pertumbuhan nilai informasi untuk pengambilan keputusan

Privacy Konservatif: Privasi hal penting bagi klien anda. Mereka percayakan data sensitif mereka, dan berharap anda tidak mengintipnya. Liberal: Bagian dari tugas administrator adalah memverifikasi integritas data. Tidak masalah untuk melihat data. Kecuali kalau anda membocorkannya Kesimpulan: Sebagai administrator untuk backup dan replikasi data, mereview data yang dipercayakan kepada anda dilakukan seperlunya bila terkait dengan pekerjaan. You are the DBA at a backup data center.Your company provides back up and redundant data services for several different businesses.Your job is simply to back up the data and make sure the data replication technology is working appropriately. Is it acceptable for you to check out all of the information in the databases of all of your clients? Conservative Privacy is a very important matter with clients.They are entrusting you with their sensitive data and are not expecting you to snoop through it. Be professional and do not inspect or review the data entrusted to you. Liberal Part of the job of an administrator in a backup location is to verify data integrity, which will require you to review the data from time to time. There is nothing wrong with reviewing the data. If, however, you divulge information about the data, that is another story. SUMMARY As the administrator of back up and replication services, reviewing data entrusted to you should be done when necessary as part of your job function. Reviewing data for nosey purposes should not be done; however, there are no rules against it in most cases.

Sekuriti vs Invasi Privacy? Pekerjaan Anda: database administrator di ISP. Anda bertugas mengamati trafik pengguna. Data: log web akses Problem: Apakah Anda dibenarkan mereview akses data sehingga anda mengetahui hal-hal melakukan yang dilakukan pengguna? Knowledge of Private Personal Information – Security vs. Invasion of Privacy? The Internet Service Provider (ISP) you are a DBA for collects detailed data about users’ online activities. It keeps track of the Web sites users go to. Is it appropriate for you as the DBA to review this data and see who is accessing pornographic sites or have other unusual sites that could be embarrassing to the ISP user? Conservative You are entrusted with sensitive information about ISP users and should never abuse that trust. Reviewing usage is not appropriate. Liberal As a DBA for an ISP company, you should review the usage of its users. It is your responsibility from a security point of view. If the users are accessing illegal sites, your company could be at risk.This is a security function of your job. SUMMARY Reviewing sensitive information about ISP clients is a touchy issue. By reviewing what sites they visit, you may obtain information that someone is trying to learn how to build a bomb or other terrorist activity, which could target your company and hurt other people. However, customer information must have some level of privacy. Check the customer agreement the clients have with your company to determine what you can legally do with client information to balance out your role of security versus invasion of personal privacy.

Sekuriti vs Invasi Privacy? Konservatif: Anda dipercayai menjaga informasi sensitif para pengguna ISP. Jangan lukai kepercayaan itu. Liberal: Tugas Anda untuk menjaga keamanan. Jika pengguna mengakses situs ilegal, perusahaan Anda akan beresiko. Kesimpulan: Tipis! Cek perjanjian dengan customer, apakah Anda legal melakukannya. Demi keseimbangan antara sekuriti dan privacy. Knowledge of Private Personal Information – Security vs. Invasion of Privacy? The Internet Service Provider (ISP) you are a DBA for collects detailed data about users’ online activities. It keeps track of the Web sites users go to. Is it appropriate for you as the DBA to review this data and see who is accessing pornographic sites or have other unusual sites that could be embarrassing to the ISP user? Conservative You are entrusted with sensitive information about ISP users and should never abuse that trust. Reviewing usage is not appropriate. Liberal As a DBA for an ISP company, you should review the usage of its users. It is your responsibility from a security point of view. If the users are accessing illegal sites, your company could be at risk.This is a security function of your job. SUMMARY Reviewing sensitive information about ISP clients is a touchy issue. By reviewing what sites they visit, you may obtain information that someone is trying to learn how to build a bomb or other terrorist activity, which could target your company and hurt other people. However, customer information must have some level of privacy. Check the customer agreement the clients have with your company to determine what you can legally do with client information to balance out your role of security versus invasion of personal privacy.

Informasi Gaji Rekan Anda.. Pekerjaan Anda: database administrator. Anda menjaga integritas & konsistensi data. Data: data pegawai bersama gajinya Problem: Anda menemukan variasi gaji yang berbeda, tetapi menurut anda tidak sesuai dengan pekerjaan dan prestasi. Teman anda salah satu yang mungkin dirugikan. Bolehkah anda memberitahu teman anda? Conservative Disclosing information about salaries is not up to you and is in breach of your responsibility of protecting the data as DBA.You are in a trusted role as a DBA and should not disclose information to the employees within the company for any reason whatsoever.This type of behavior is completely unacceptable. Liberal Since the company you are employed by is doing something a little shady with their employees, you do not owe them anything. Friends are friends, and they should know that they are being seriously jilted.Tell your friends but ask them not to spill the beans so that you can provide them with future information. While you are at it, you should check the salaries of other IT personnel to make sure you are being paid what you deserve. SUMMARY The role of the DBA provides many challenges. The DBA has access to detailed client records, credit card information, employee payroll data, and much more. In some cases, there are legal and government requirements for how this data should be handled in regard to privacy. In other cases, there are no legal requirements or company policies and it is up to the DBA to determine what their own personal ethics are in relation to the information they have at their fingertips.

Informasi Gaji Rekan Anda.. Konservatif: Keputusan ttg gaji bukan tanggung-jawab anda. Anda tercaya sebagai DBA, jangan lukai kepercayaan bos anda. Liberal: Teman adalah teman. Mereka berhak tahu bahwa mereka dirugikan. Tetapi beritahu teman anda, bahwa jangan telan pil itu, sehingga anda dapat memberitahu mereka untuk informasi di masa depan. Kesimpulan: DBA memiliki akses yang detail terhadap kredit card, gaji, dll. Dalam beberapa kasus tidak ada peraturan khusus dari perusahaan, ini semua tergantung kepada etika profesional Anda. Conservative Disclosing information about salaries is not up to you and is in breach of your responsibility of protecting the data as DBA.You are in a trusted role as a DBA and should not disclose information to the employees within the company for any reason whatsoever.This type of behavior is completely unacceptable. Liberal Since the company you are employed by is doing something a little shady with their employees, you do not owe them anything. Friends are friends, and they should know that they are being seriously jilted.Tell your friends but ask them not to spill the beans so that you can provide them with future information. While you are at it, you should check the salaries of other IT personnel to make sure you are being paid what you deserve. SUMMARY The role of the DBA provides many challenges. The DBA has access to detailed client records, credit card information, employee payroll data, and much more. In some cases, there are legal and government requirements for how this data should be handled in regard to privacy. In other cases, there are no legal requirements or company policies and it is up to the DBA to determine what their own personal ethics are in relation to the information they have at their fingertips.

Membangun Ke-buta-an Selektif Seorang DBA perlu membangun “blind-spot” ketika menangani data perusahaan. Kirim data sensitif via Email Tolak mentah-mentah. Informasikan dan negosiasikan untuk mengirim dg cara lain. Developing Selective Blindness Remember when you were a kid and your mother asked you to go get something out of the kitchen, you came back to tell her that you couldn’t find it and it was right in front of your face? (Okay, some of us have been guilty of that as recently as last week, but I digress.) To be a good DBA, you need to develop a similar “blind spot” when dealing with your company’s data. Yes, it’s true that you have access to pretty much anything you’d want to see. And it’s also true that in the course of designing or troubleshooting a database, you’ll probably need to examine live data, be it financial, payroll, or human resources-related. In these cases, you should be able to look at the contents of a query or report without really seeing what’s on it. This means that any inadvertent discoveries you make, like “Nancy makes more than me” or “Maria took 37 sick days last year” is something that you’re ethically bound to keep to yourself. Your coworkers wouldn’t take any more kindly to you invading their privacy than you would if they invaded yours. Laura E. Hunter Network Engineer & Technical Trainer

Accuracy Siapa yang bertanggung-jawab kepada: Autentikasi, ketepatan, dan keakuratan informasi? Siapa yang harus menanggung bila ada error di informasi dan bagaimana kesalahan itu berakibat kepada sistem secara keseluruhan? Misinformasi dapat berakibat fatal terhadap kehidupan seseorang. Khususnya saat bila pihak yang memiliki informasi tak akurat tersebut diuntungkan dengan adanya power dan otoritas.

Data Tanpa Integritas = Data Terkontaminasi Memberbaiki data dengan pembersihan tidak sulit. Tapi mahal. Perlu specialist. Rubah data untuk tujuan marketing Problem: Anda mendapat tugas memasukkan data dan menggambar grafik untuk laporan keuangan. Bos anda meminta untuk menghapus tampilan yang rendah, karena akan menyebabkan laporan akan jelek secara keseluruhan. Cleansing data isn’t quite as hard, but it is as expensive. It requires specialists to write hundreds of scripts to test for this and that condition The operations folks have responsibility too; suppose you were trying to enter the amount of a payment and you were told to enter round numbers, $99 instead of $99.99 because it is faster. How long would the database remain accurate? A minute? One of the times of greatest danger for a database is during a maintenance update. All too often, the maintenance coder removes critical checks and balances, either to get the job done faster or because they do not understand the total system. The DBA must be the keeper of the gate; the database is only valuable to the organization if its data has integrity. Your responsibility includes investigating every possible source of database contamination.

Rubah data untuk tujuan marketing Konservatif: Merubah data akan menyebabkan masalah-masalah lain yang berkelanjutan. Tolak permintaan bos anda dan jelaskan bahwa Anda tidak ingin terlibat dalam masalah hukum. Liberal: Itu adalah hak prerogatif bos anda. Pastikan saja bahwa itu tidak membuat data menjadi tidak akurat, dengan hanya membatasi laporan. Jangan terjebak dalam merubah atau menghapus data. Kesimpulan: Sayangnya hal ini sering terjadi. Tidak melaporkan sesi data tertentu lebih baik daripada merubah data. Selalu ingat hukum dan etika profesional Anda. Karena apa yang Anda lakukan akan menjadi bahan pijakan suatu keputusan. You are pulling this quarter’s data together for the corporate financial report that will go out to the investors.Your boss asks you to remove some of the low figures because they take down the whole report. Do you do it? Conservative Changing financial data can get you into a mess of trouble. Refuse to remove the low figures and explain that you do not want to put yourself at legal risk. Liberal In this issue, if your boss wants to remove a whole section of data from the report that is his prerogative. Just make sure that it does not make the report inaccurate. It is up to him to limit the results on the report. Be careful not to venture into the area of altering or deleting data. SUMMARY Unfortunately, this type of request happens all of the time when issuing financial or marketing data. Not reporting on sections of data when it is not required is less of an issue than actually altering data. This problem ventures into the area of legal issues and should be handled with utmost care and responsibility. Keep in mind the law and your own personal ethics when making the decision to format financial or marketing data.

Tidak sesuai SOP Kesimpulan: Problem: Anda seorang tester salah satu perusahaan “Amy”. Seorang teman anda melewati beberapa tahapan SOP, karena dianggap menghabiskan waktu saja. Ia mengatakan bahwa ia tahu bagian program yang sulit tsb. Konservatif: Anda harus beritahu tester leader Anda, karena ia akan merusak hasil testing secara keseluruhan. Liberal: Nasehati ia secara pribadi, dan informasikan kepada tester leader pada saat yang tepat. You are a member of a group of software testers for an application-specific database management product. One of your fellow testers,“Amy,” routinely skips through portions of the test believing that the test plan is a waste of time. She says she knows what the tricky parts of the program are and can more constructively go right to them. Conservative You should let the test leader know of Amy’s habits, because she is endangering the results of the entire test suite.You will likely make your future work life with Amy uncomfortable, but if you do not inform the lead tester, your own sense of completeness and pride in your work will be tarnished. Liberal Since Amy seems unwilling to change her practice, it is doubtful you will get anywhere in talking to her further. If you report her, you will alienate her. Continue to do your work according to the test plan, and respond honestly to any questions about how the tests were run. SUMMARY You must inform the others of Amy’s way of working, since what she is doing directly affects the work you are doing. You are part of the team responsible for product testing. Tell your manager. You can inform Amy ahead of time that you feel compelled to take the matter to management, but do not expect her to change her ways. Even if she were to change, you still need to inform the test lead because the testing that has gone on so far is affected. If the lead tester wants to let it go, that is their decision. If Amy is right that there is a problem with the test plan, the plan should be changed for all. Kesimpulan: Pekerjaan yang tidak sesuai prosedur, merusak konsitensi dan integritas data. Yang pada akhirnya merusak reliabilitas program/software dan kredibilitas institusi.

Liberal: Konservatif: Nasehati ia secara pribadi, dan informasikan kepada tester leader pada saat yang tepat. Konservatif: Anda harus beritahu tester leader Anda, karena ia akan merusak hasil testing secara keseluruhan. Kesimpulan: Pekerjaan yang tidak sesuai prosedur, merusak konsitensi dan integritas data. Yang pada akhirnya merusak reliabilitas program/software dan kredibilitas institusi. You are a member of a group of software testers for an application-specific database management product. One of your fellow testers,“Amy,” routinely skips through portions of the test believing that the test plan is a waste of time. She says she knows what the tricky parts of the program are and can more constructively go right to them. Conservative You should let the test leader know of Amy’s habits, because she is endangering the results of the entire test suite.You will likely make your future work life with Amy uncomfortable, but if you do not inform the lead tester, your own sense of completeness and pride in your work will be tarnished. Liberal Since Amy seems unwilling to change her practice, it is doubtful you will get anywhere in talking to her further. If you report her, you will alienate her. Continue to do your work according to the test plan, and respond honestly to any questions about how the tests were run. SUMMARY You must inform the others of Amy’s way of working, since what she is doing directly affects the work you are doing. You are part of the team responsible for product testing. Tell your manager. You can inform Amy ahead of time that you feel compelled to take the matter to management, but do not expect her to change her ways. Even if she were to change, you still need to inform the test lead because the testing that has gone on so far is affected. If the lead tester wants to let it go, that is their decision. If Amy is right that there is a problem with the test plan, the plan should be changed for all.

Intellectual Property

Property Siapa pemilik informasi? Bagaimana harganya? Siapa channel atau bagaimana informasi itu mengalir? Siapa yang boleh mengakses? Sebuah informasi mungkin memerlukan harga yang tinggi untuk memproduksinya. Sekali diproduksi secara digital, maka ia mudah direproduksi dan didistribusikan, tanpa merusak produk aslinya.

Kerentanan Kekayaan Intelektual Kehilangan informasi Lemahnya proteksi terhadap informasi Ketergantungan kepada informasi Informasi dimana kita tergantung tidak andal (error)

Accessibility Informasi apa yang dapat diperoleh oleh seseorang atau organisasi? Dalam kondisi seperti apa? Sama dengan “Privacy” tapi dari sudut pandang pengguna informasi.

Standar Etika Profesi IT ACM “Code of Ethics and Professional Conduct” Computer Ethics Institute “The Ten Commandements of Ethic's” Data Processing Management Association “Code of Ethics and Standards of Conduct”

Referensi Richard O. Mason, Four Ethical Issues of the Information Age, Management Information Systems Quarterly, Vol. 10, No. 1, March, 1986 Stanford Encyclopedia of Philosophy, Computer and Information Ethics, tanggal akses 3 November 2008 Stephen Northcutt, IT Ethics Handbook Right and Wrong for IT Professionals, Syngress Publishing, Inc., 2004 Spafford, E., K. Heaphy, and D. Ferbrache, Computer Viruses: Dealing with Electronic Vandalism and Programmed Threats, Arlington, VA: ADAPSO (now ITAA), 1989.