Information Technology Ethical Challenges

Slides:



Advertisements
Presentasi serupa
IMPLIKASI ETIS DARI TEKNOLOGI INFORMASI
Advertisements

Etika Pemanfaatan Teknologi Informasi
SAINS & TEKNOLOGI INFORMASI DALAM KONTEKS PENDIDIKAN SEJARAH Hansiswany Kamarga.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy.
Bab 5 Kewaspadaan dan sadar beretika komputer
Foundation of Information Syetem
RESOLUTION DECISIONS.. “Do I STAY? Or should I GO?” “Is He (or She) the RIGHT one for me?” “Should I BUY this? Or SELL that?” “Should I INVEST in.
HelloHaloproject Health Togeth erness Fun Simpl e Wonderfu l.
Violation of children’s By: Brenda Bimantoro. My article Tanpa akta kelahiran hak asasi anak rentan dilanggar. Foto: Sgp Anak-anak jalanan yang tidak.
IMPLIKASI ETIS DARI TEKNOLOGI INFORMASI
Etika dan Dampak IT Terhadap Individu dan Perusahaan
ETIKA DAN KERANGKA HUKUM BIDANG TEKNOLOGI INFORMASI
Bersediakah Anda membantu menjangkau Indonesia dengan Injil? (Will you help reach Indonesia with the Gospel?) A ministry of Campus Crusade for Christ Australia.
PENYUSUNAN STRATEGI.
MICHAEL LIE HADIWIDJOJO 6B Children’s Rights. Education Issue There are some children in Indonesia don’t get education. They have to earn money for helping.
1 Pertemuan 8 Manusia dan hambatannya dalam penggunaan teknologi Matakuliah: H0472 / Konsep Sistem Informasi Tahun: 2006 Versi: 1.
MANUSIA DAN HAMBATANNYA DALAM PENGGUNAAN TEKNOLOGI Pertemuan-8 Mata Kuliah: CSS=113, Konsep Sistem Informasi Tahun Akademik: 2012/2013 Sasaran Pembelajaran.
1 Pertemuan 2 Unit 1 - Careers Matakuliah: G0682 / Bahasa Inggris Ekonomi 1 Tahun: 2005 Versi: versi/revisi.
Arafa Rizka Syaputra( ) Hidsal Jamil( ) Padel Aji Pamungkas( )
-Do you have a close friend? Does she/he have a problem? -What do you say when she/he tells her/his problem? - Did you ever come to your friend house?
Samples: Smart Goals ©2014 Colin G Smith
Implikasi Etis Penggunaan IT
Pert. 16. Menyimak lingkungan IS/IT saat ini
mempengaruhi penggunaan komputer di negara lain.
Membangun Web Site“Cantik”
SISTEM INFORMASI MANAJEMEN
Implikasi etis dari Teknologi Informasi
ETIKA PEMANFAATAN TEKNOLOGI INFORMASI
PENDIDIKAN KARAKTER DALAM MATA PELAJARAN FISIKA SMA
IMPLIKASI ETIS TEKNOLOGI INFORMASI
Implikasi Etis dari Teknologi Informasi
CA113 Pengantar Manajemen Bisnis
DESIGNING AND EVALUATING MANAGEMENT CONTROL SYSTEMS
Analisa & Perancangan sistem
Trust (Kepercayaan) Kuliah 05
CA113 Pengantar Manajemen Bisnis
KELOMPOK 8 IMPLIKASI PENGGUNAAN TEKNOLOGI INFORMASI
Implikasi Etis dari Teknologi Informasi
Trust (Kepercayaan) Kuliah 05
ETIKA PROFESI.
CYBER CRIME Fahrobby adnan S.KOM., MMSI
ETIKA DAN KERANGKA HUKUM BIDANG TEKNOLOGI INFORMASI
An assessment of Pedestrian Ways in Unsyiah
SISTEM INFORMASI MANAJEMEN
Welcome 8clicks Pte Ltd. About us  8CLICKS PTE LTD is best web Development Company in Singapore. It is famous for their web designing services. 8CLICKS.
How to Set Up AT&T on MS Outlook ATT is a multinational company headquartered in Texas. ATT services are used by many people widely across.
How You Can Make Your Fleet Insurance London Claims Letter.
How Can I Be A Driver of The Month as I Am Working for Uber?
How the Challenges Make You A Perfect Event Organiser.
How to Pitch an Event
Grow Your Social Media Communities
Don’t Forget to Avail the Timely Offers with Uber
Evidence-Based Medicine Prof. Carl Heneghan Director CEBM University of Oxford.
CA113 Pengantar Manajemen Bisnis
Angular js training institute in indore
Ethics Issues Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior. Deciding what is right.
Take a look at these photos.... Also, in case you're wondering where this hotel is, it isn't a hotel at all. It is a house! It's owned by the family of.
Group 3 About causal Conjunction Member : 1. Ahmad Fandia R. S.(01) 2. Hesti Rahayu(13) 3. Intan Nuraini(16) 4. Putri Nur J. (27) Class: XI Science 5.
SISTEM INFORMASI MANAJEMEN
If you are an user, then you know how spam affects your account. In this article, we tell you how you can control spam’s in your ZOHO.
How do I Add or Remove a delegate to my Gmail account? Google launched delegation service 9 years ago for Gmail that allows you to give permission to access.
In this article, you can learn about how to synchronize AOL Mail with third-party applications like Gmail, Outlook, and Window Live Mail, Thunderbird.
Right, indonesia is a wonderful country who rich in power energy not only in term of number but also diversity. Energy needs in indonesia are increasingly.
Media Digital Komunikasi Massa Pertemuan 5.
Website: Website Technologies.
Rank Your Ideas The next step is to rank and compare your three high- potential ideas. Rank each one on the three qualities of feasibility, persuasion,
Draw a picture that shows where the knife, fork, spoon, and napkin are placed in a table setting.
2. Discussion TASK 1. WORK IN PAIRS Ask your partner. Then, in turn your friend asks you A. what kinds of product are there? B. why do people want to.
WINTER Template COLOUR CARD 01 Template. PowerPoint chart object 02.
Transcript presentasi:

Information Technology Ethical Challenges Sherri Shade

Ethics eth•ic Pronunciation: (eth'ik), [key] —n. 1. the body of moral principles or values governing or distinctive of a particular culture or group: the Christian ethic; the tribal ethic of the Zuni. 2. a complex of moral precepts held or rules of conduct followed by an individual: a personal ethic. Webster’s Dictionary

IT and Ethics Who is responsible? Who is affected? Should IT Professionals be in the ethics business? Training Refer ethical issues to HR Development Implementation Application

Ethical Behaviors? Is your 80 gigabyte hard drive full? Music and videos That sure is a great music where did you get it? Downloading of music from the web Have you given a friend a copy of your Microsoft Project software? Software Piracy Did you read the confidential company file that was accidentally attached to your email? Computer abuse Did you gain access to the network and invade other workers emails and files? You formatted your hard drive prior to leaving your company because you were angry about leaving. Destruction of property

Information Technology Ethics Deal with proper use of technology devices, data, services, and software. Prior to Technology it may have been easier to know whether the activity was right or wrong Virtual World Judging behaviors is no longer straight forward Ethical or Unethical? A student downloads a sexually explicit picture from the Internet on a computer in the school library. Other students are able to see the picture A student finds the teacher’s password to the school’s information system and uses it to change his grades and vi the grades of other students. A student uses the copy and paste commands to place large parts of an electronic article into an assigned paper. She turns the paper in as her own work A student makes a copy of a software program borrowed from another student to use on his computer at home. A student downloads a graphic file from the web to place on his own webpage. However, he does provide a link to the author’s site. A student uses another student’s project website as a guideline. A student copies a previous published story in his own handwriting and submits it as his own work. For many of us this is not difficult to figure out that these are not ethical decisions Perhaps even without technology the same or similar activity may have occurred. Because of the implementation of technology these activities are easier execute perhaps don’t seem as bad. Technology is actual the catalyst or the enabler to clouding our understanding and choices

Information Technology Ethics New ethical considerations may be required with technology capabilities Email spamming Does the fact that the financial burden of unsolicited ads etc. now falls on the recipient not the sender create new rules? Digital photography What obligations does a anyone have to present an undoctored photo, even if the message is not as good as the digitally enhanced photo? Pornography access What security measures need to be put in place by schools, parents, companies and libraries to keep individuals from seeing inappropriate materials? Intellectual property Do we need better/clearer definitions of property? Globalization of the organization What do we need to better understand cultures, language, and behaviors?

Information Technology Ethics Some users view their computing actions as less serious than their actions in the “real world” Examples: Stealing software from a store – no way! …. However, SW piracy costs businesses billions of dollars per year Most of us would not pick a lock to someone’s house However, guessing passwords to gain access to a website, information, or programs is a common Sometimes the technology is not well understood…romance and fear may accompany a new technologies. Movies, books, TV capitalize on this fear and romance and make unethical or illegal actions seem heroic, or necessary

The Ten Commandments of Computer Ethics Computer Ethics Institute

Challenges: Code of Ethics No Form of licensing for computer professionals Results in no real way to enforce ethical standards within the computing field There is movement within the industry to create a licensing process but there are many issues to be resolved What will be included on the exam? How often will an IT professional be required to renew the license? Developed by several organizations Adoption Implementation Monitoring Example: http://www.acm.org/constitution/code.html

Challenges: Web Design Implementation of features Pop ups Blocking/filters Aliases and redirecting Cookies Privacy policies Security policies Spyware Use of other design features Javascript Graphics - pictures, buttons, logos, icons Content Design layout Accountability/responsibility Outdated material, inaccurate material

Challenges: Commerce Fraud Taxation Free Trade Gambling Auctions Spamming Who were Canter and Siegel? Spamming cell phones? Term papers for sale Atlanta Journal Constitution aritcle

Challenges: Workplace Accessibility Ergonomics Outsourcing Telecommuting Customer relationships – Vendor relationships Should IT professionals be in the ethics business or should other areas of the business handle these issues? Monitoring Should your employer have the right to monitor private email messages? What are the two most popular Web sites for American workers? Playboy and ESPN Playboy and ESPN

Challenges:Workplace 62% of employers monitor employees' eMail and Internet use. 68% cite legal liability as the primary reason to monitor. 87% of companies that monitor have a written eMail Policy, 83.1% an Internet Policy, 68% a Software Policy. 51% of employers have disciplined or terminated employees for violating ePolicy. 35% of organizations have eMail retention & deletion policies in place. 10% of companies have been ordered by courts to turn over employee eMail related to workplace lawsuits. 8.3% of organizations have battled sexual harassment and/or sexual discrimination claims stemming from employee e-mail and/or Internet use. Source: The 2001 Electronic Policies & Practices Survey from The American Management Association, US News & World Report, and The ePolicy Institute-Click Here for Survey Results.

Music Downloads Risk of getting caught Studies have shown that a majority of the people who share music on the Internet are aware that their actions are illegal, said Michael McGuire, a analyst with the Gartner Group. ``But they also know that the chances of getting caught are pretty remote'' Why is “getting caught remote”? There are an estimated 60 million peer-to-peer network subscribers in the United States alone, with tens of millions more in other countries The RIAA is seeking out people who make their music files available for others to download. The networks have features that allow users to block others from downloading their files but allow them to continue to download files

Challenges: Speech Net Etiquette Email privacy Free Speech Email privacy policy “Flaming” – insulting, argumentative or chastising replies to messages Free Speech Accountability and responsibility for web content Abortion sites Outdated information Accurate information Privacy and security policies Porn Professors pc – filled with porn, found by pc maintenance workers Visa – won’t give permission to be used on offensive or pornographic sites Hate MACHADO CASE Internet Filters Should filters be in schools or libraries, and /or should they be mandated by law? Filters can also be set up to filter out other subjects, would this be an ethical violation? Chain Letters

Challenges: Computing Resource Abuse Computers in the Workplace and the Classroom Use or Abuse Internet Access Instant Messenger Laptop use in the classroom Email Legal document Can be modified Flaming Access Computer Usage policy Email policy

Challenges: Computing Resource Abuse Computer Crime Viruses Hackers Theft “These cyber swindles and dot-cons present new challenges to law enforcement” said John Ashcroft US Charges 135 With Net Crimes

Challenges: Privacy Privacy issues are at the top of the list in regards to ethical use of information. Loss of control Misuse of information Risk to physical privacy Risk of identity theft (video) Unwanted intrusions into daily life USA Patriot Act (post 9/11) Efforts to detect and deter terrorist activity Datamining corporate data Loss of business and risk of lawsuits due customers being outraged at their loss of data privacy Cookies Privacy policies

Challenges: Intellectual Property Electronic Copyright Licensing Interoperability Cyberlicenses Shrinkwrap Shareware Freeware MP3 RIAA court case against college students University Internet Usage policies Internet Downloads Files Graphics Text

Challenges: Intellectual Property Patent, trade secrets, and copyright law Who owns the program Who owns the algorithm Software Piracy Why shouldn't I use pirated software? Who am I hurting by doing so? Piracy exists in everywhere. Loss of revenue hurts everyone. All software piracy is illegal and Software piracy is unethical. Various studies have found that the software industry loses approximately $12 billion every year . State Industry Study CD-RW

Challenges: Other Decision making using Expert Systems Network Security Software accuracy and reliability who is ethically responsible? Therac-25 Accidents Killer Robots The Hughes Whistleblowing Case

Conclusion: Some Ideas to Ponder Computer ethics today is now a global effort The gap among the rich and poor nations, rich and poor citizens exists. How can it be eliminated or reduced eithically and morally to provide information and services that will move them to into the world of cyberspace? Will the poor be cut off from job opportunities, education, entertainment, medical care, shopping, voting - because they cannot afford a connection to the global information network? Whose laws will apply in cyberspace when hundreds of countries are incorporated into the global network? What happened? Where did our knowing right from wrong go too? Are we missing an opportunity to introduce ethics at an early age in children by not integrating these thoughts and practices in video games? Should more controls and regulations be introduced into the system? Will they actually help to improve our moral and ethical behavior? Unethical behavior continues to permeate industry, what measures, policies, codes of conduct be changed to change this behavior?

Works Cited: http://www.brook.edu/dybdocroot/its/cei/overview/Ten_Commanments_of_Computer_Ethics.htm http://www.computingcases.org/case_materials/case_materials.html http://www.epolicyinstitute.com/ http://legacy.eos.ncsu.edu/eos/info/computer_ethics/ http://www.spa.org/piracy/ http://www.nd.edu/~rbarger/cases.html http://ksuweb.kennesaw.edu/~kschwaig/present.ppt

Etika komputer & Etika Pemanfaatan Teknologi Informasi Etika Komputer adalah analisa tentang sifat dan dampak sosial teknologi komputer, serta formulasi dan pengesahan kebijakan untuk menggunakan teknologi komputer secara benar. Etika Pemanfaatan Teknologi Informasi dapat diartikan sebagai suatu analisa tentang dampak sosial yang ditimbulkan dalam pemanfaatan teknologi informasi, baik itu dampak negatif maupun dampak positif

alasan utama minat masyarakat yang tinggi terhadap etika komputer Logical Malleability (Kelenturan Logika), Merupakan kemampuan memprogram komputer untuk melakukan apa pun yang kita inginkan. Transformation Factors (Faktor Transformasi), Contohnya fasilitas e-mail yang bisa sampai tujuan dan dapat dibuka atau dibaca dimanapun kita berada. Invisibility Factors (Faktor Tak Kasat Mata ), Berhubungan dengan segala operasi internal komputer yang tak kelihatan sehingga membuka peluang pada penyalahgunaan yang tidak tampak.

Hak-Hak User Dalam Etika Pemanfaatan Teknologi Informasi Hak Sosial dan Komputer Hak atas akses komputer : Setiap orang berhak untuk mengoperasikan komputer dengan tidak harus memilikinya. Hak atas keahlian komputer : Dengan keahlian di bidang komputer dapat membuka peluang pekerjaan yang lebih banyak. Hak atas spesialis komputer : Untuk bidang tertentu diperlukan spesialis bidang komputer, karena tidak semua pemakai komputer menguasai. Hak atas pengambilan keputusan komputer : Meskipun masyarakat tidak berpartisipasi dalam pengambilan keputusan mengenai bagaimana komputer diterapkan, namun masyarakat memiliki hak tersebut.

Hak-Hak User Dalam Etika Pemanfaatan Teknologi Informasi Hak atas Informasi Hak atas Privasi : Sebuah informasi yang sifatnya pribadi baik secara individu maupu dalam suatu organisasi mendapatkan perlindungan atas hukum tentang kerahasiannya. Hak atas Akurasi : Komputer dipercaya dapat mencapai tingkat akurasi yang tidak bisa dicapai oleh sistem nonkomputer. Hak atas Kepemilikan : Umumnya dalam bentuk program-program komputer yang dengan mudahnya dilakukan penggandaan atau disalin secara ilegal. Hak atas Akses : Informasi memiliki nilai, jadi setiap kali kita akan mengaksesnya harus melakukan account atau izin pada pihak yang memiliki informasi tersebut.

Implikasi Etis Dari Pemanfaatan Teknologi Informasi Implikasi etis terhadap pemanfaatan teknologi informasi meliputi : Moral  Sama dengan tradisi kepercayaan mengenai perilaku benar atau salah. Etika  Sama dengan satu set kepercayaan, standar/pemikiran yang mengisi suatu individu, kelompok, masyarakat. Hukum  Sama dengan peraturan perilaku formal yang dipaksakan oleh otoritas berdaulat seperti pemerintah kepada rakyat atau warga negaranya.

Penerapan budaya etika Corporate credo: Merupakan pernyataan ringkas mengenai nilai-nilai yang ditegakkan perusahaan. Program etika: Merupakan suatu system yang terdiri dari berbagai aktivitas yang dirancang untuk mengarahkan pegawai dalam melaksanakan corporate credo. Kode Etik Khusus Perusahaan: Banyak perusahaan merancang kode etik khusus untuk perusahaannya.

Tindakan untuk pencapaian operasi Komputer yang etis Formulasikan suatu kode perilaku. Tetapkan aturan yang berkaitan dengan masalah-masalah IT. Jelaskan sanksi yang akan diambil. Kenali perilaku etis. Fokuskan perhatian pada etika melalui program. Promosikan undang-undang kejahatan komputer.

RUU pemanfaatan teknologi informasi Adanya RUU mengenai pemanfaatan teknologi informasi dan juga RUU yang mengatur transaksi elektronik dan tanda tangan elektronik (digital), termasuk naskah-naskah lainnya mengenai undang-undang dunia cyber. Seperti halnya RUU tentang Informasi Elektronik dan Transaksi Elektronik (RUU-IETE) dan juga RUU tentang Pemanfaatan Teknologi Informasi (RUU-TPTI). Nantinya kedua RUU ini dapat saling melengkapi, ataupun dilebur menjadi satu, yang sebelumnya disempurnakan dengan mendengar usulan atau tanggapan dari beberapa kalangan seperti akademisi, profesional IT ataupun perusahaan IT.

Perlindungan Hukum terhadap Pemanfaatan Teknologi Informasi Perlindungan pemanfaatan teknologi digital. Perlindungan atas data dan informasi beserta hak aksesnya. Perlindungan atas hak kekayaan intelektual. Perlindungan terhadap konsumen internet banking. Perlindungan terhadap anak-anak sebagai obyek yang bertentangan dengan hukum dan etika moral. Pencegahan pornografi di dunia internet.

pembentukan hukum teknologi informasi & penegakan hukum Ada beberapa hal yang menjadi asas dalam pembentukan hukum perundang-undangan mengenai teknologi informasi. Asas tersebut adalah Legalitas, Itikad Baik, Etika, dan Moral. Proses penegakan hukum dan undang-undang yang meliputi pemanfaatan teknologi informasi sudah dimulai dan masih akan berjalan panjang bersama dengan penyempurnaan dan penyesuaian. Dengan peran serta semua pihak yang terkait, lambat laun negara kita akan memiliki suatu produk hukum yang dapat mengatur kehidupan dan pemanfaatan teknologi informasi, sehingga akhirnya masyarakat menyadari bahwa aktifitas apapun yang berhubungan dengan pemanfaatan teknologi informasi memiliki perlindungan hukum dan juga akibat hukum.

Dampak Pemanfaatan Teknologi Informasi yang kurang tepat Rasa takut. Keterasingan. Golongan miskin informasi dan minoritas. Pentingnya individu. Tingkat kompleksitas serta kecepatan yang sudah tidak dapat ditangani. Makin rentannya organisasi. Dilanggarnya privasi. Pengangguran dan pemindahan kerja. Kurangnya tanggung jawab profesi. Kaburnya citra manusia.

Langkah-Langkah Untuk Menghadapi Dampak Pemanfaatan Teknologi Informasi yang kurang tepat Desain yang berpusat pada manusia. Dukungan organisasi. Perencanaan pekerjaan. Pendidikan. Umpan balik dan imbalan. Meningkatkan kesadaran publik. Perangkat hukum. Riset yang maju.

Kesimpulan Etika dalam pemanfaatan teknologi informasi merupakan suatu hal yang sangat penting dan krusial. Sebab, bila kegiatan pemanfaatan teknologi informasi dilakukan tanpa disertai dengan etika dapat menimbulkan berbagai dampak negatif.

Saran Sosialisasikan mengenai aturan dan tata cara beretika dan penegakan aturan dalam hukum harus dilakukan dengan tegas dan konsisten. Hal ini dilakukan untuk mencegah berbagai dampak negatif yang timbul akibat penyalahgunaan teknologi informasi.