SlideShare a Scribd company logo
8
Most read
9
Most read
10
Most read
r r M. SETIAWAN KUSMULYONO Business Ethics S1 Business Prasetiya Mulya Business School
Business Ethics r Muhammad Setiawan Kusmulyono PRESENTATION 1
Business Ethics r S e s s i o n  9 E t h i c a l  I s s u e s i n Information Technology 2
r A g e n d a Business Ethics Chronology Back to Definition Ethical Issues Netiquette Cyber-ethics Conclusion  Discussion Session  3
Business Ethics r C h r o n o l o g y 4 Information Technology have closely related to : Computer & Communications Within this Information Age [ begin in 1990 ], Computer and Communications started to combine.   The combination results: Convergence Allow device [electronic product] to perform in multiple functions. Example: Cellphone+Digicam, TV+Internet Access, etc Portability Trading off the power and move to convenience in return for smaller size and weight. Example: PC Tablet, Smartphone, etc Personalization Creation of information tailored to your preferences. Example: We will receive special ad that we often needed.
Business Ethics r D e f i n i t i o n 5 Ethics is defined as a set of moral values or principles that govern the conduct of an individual or a group. Using Information Technology 6 th  Ed. p.25 O b j e c t i v e s To understand many kinds of ethical issues in Information Technology To understand the basic concepts of ethics in IT Developments
Business Ethics r P e r s p e c t i v e 6 Tom Forester and Perry Morrison in  Computer Ethics , discuss about some considerations in ethical issues in Information Technology, such as: Speed and Scale Unpredictability Complexity Great amounts of information can be stored, retrieved, and transmitted at any speed and scale Com&Com are pervasive, touching nearly every aspects of our lives  Computers are incredibly complex, even their creators are not always understood about the complexity.
Business Ethics r Ethical Issues 7 What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for the authenticity, fidelity and accuracy of info? Who will take the accountable [responsible for the error? Who owns the info? How should access to this scarce resource be allocated? What info does a person have a right to obtain? What will be the requirement and condition that info can be delivered? Richard O Mason Carr P. Collins Management Information Sciences Quarterly P Privacy A Accuracy P Property A Accessibility
Business Ethics r Ethical Issues 8 Plagiarism Privacy Data Security Less Predictable Less Reliable Unmanageable Out-of-control Cost Morphing  Photo Manipulation Technology Manipulation
Business Ethics r Ethical Issues 9 Privacy Privacy is the right of people not to reveal information about themselves. Using Information Technology 6 th  Ed. p.369 Privacy is had closely related to Data Security. This ethical issues occur when unauthorized access tried to attack our system. Data Security Example : Today, e-banking and e-commerce have becoming lifestyle. People tend to do transaction through internet. Privacy and Data Security become an issue.  Prevention: PIN [Personal Identification Number] Change Password Regularly
Business Ethics r Ethical Issues 10 Less Predictable Less Reliable Computers and communications are pervasive, touching nearly every aspects of our lives. If we compare Com & Com with other pervasive technologies; electricity, television, etc, Com & Com seems lot of less predictable and reliable EXAMPLE : We don’t know that virus attacks our system even though we try to create our defensive system.  [less predictable]  Less Reliable happen when the internet  traffic is full [down] Flash disk borrowing
Business Ethics r Ethical Issues 11 Unmanageable Out-of-control Cost Good Example: Linux Operating System Bad Example: Sometimes, we don’t know the development of a program. Someone could modify the program until the initial creator don’t know what happen to the program
Business Ethics r Ethical Issues 12 Technology Manipulation SOUND Manipulation PHOTO Manipulation VIDEO & Television  Manipulation Morphing
Business Ethics r Ethical Issues 13 Technology Manipulation SOUND Manipulation Example  1 : Frank Sinatra’s 1994 album, titled: DUETS In this album Sinatra sang as if in duet with some artists [Barbara Streisand and Bono U2]. But, truly, Sinatra sang alone in his studio, and then the recording was sent to those artist and dubbed with their own voices. So, Frank Sinatra and Streisand+Bono never sang together Example  2: L I P S I N G
Ethical Issues 14 Technology Manipulation PHOTO Manipulation Morphing
Business Ethics r Ethical Issues 15 Technology Manipulation MEDIA Manipulation Manipulation
Business Ethics r Ethical Issues 16 Technology Manipulation MEDIA Manipulation Manipulation
Business Ethics r Ethical Issues 17 Technology Manipulation MEDIA Manipulation
Business Ethics r Ethical Issues 18 P L A G I A R I S M Plagiarism  Illegal Copy-Paste Activity Not inserted the original author, if we use their theory
Business Ethics r Netiquette 19 Netiquette Basic rules of Netiquette: Don’t waste people’s time Don’t say anything to a person online that you wouldn’t say to his/her face Specific rules of Netiquette: Consult FAQs Avoid Flaming Don’t SHOUT Be Careful with Jokes Avoid Sloppiness Don’t send huge file attachments When replying, quote only the relevant portion Don’t “overforward”  Network Etiquette Appropriate online behavior
Business Ethics r Cyber-ethics 20 Cyber-ethics   = related with censorship of internet information Data The word “sex” is the most popular search word on the net. [Yahoo data] Possibilities to Solve Blocking Software Browsers with Ratings The V-chip
r r C O N C L U S I O N Ethical issues in ICT is not only existed in sex, crime, or hack, but also happened in another area of life (entertainment, education, etc) It is difficult to face the bad ethical issues, but there are some ways to prevent the bad impact, such as: Developing the awareness of users [esp. for children u-18] Protecting the un-behavioral sites etc 21
r r BIBLIOGRAPHY 21 Using Infromation and Communication Technology. Williams Sawyer. McGraw-Hill. 2005 Management Information Sciences Quarterly Richard O. Mason and Carr P. Collins
r r thank you discussion session

More Related Content

PDF
Living in the IT-ERA-Syllabus from MVGFCI
PPT
Impact of ict on society
PPTX
Chap1 introducing today's technologies
PPT
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
PDF
The-Netiquette-and-the-Computer-Ethics.pdf
PPTX
Information-Control-and-Privacy.Powerpoint
PPTX
ICT in Society
PPTX
ICT AND ITS ROLE IN SOCIAL CHANGE.pptx
Living in the IT-ERA-Syllabus from MVGFCI
Impact of ict on society
Chap1 introducing today's technologies
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
The-Netiquette-and-the-Computer-Ethics.pdf
Information-Control-and-Privacy.Powerpoint
ICT in Society
ICT AND ITS ROLE IN SOCIAL CHANGE.pptx

What's hot (20)

PDF
Ethical and Social Issues in ICT
PPTX
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
PPT
Computer Ethics Presentation
PDF
Responsible Use of Social Media
PPTX
Chapter 3 Computers and Mobile Devices
PPTX
Social and Professional Issues in Computing - Ethics
PPTX
WHAT IS INFORMATION COMMUNICATION TECHNOLOGY?
PPTX
Netiquette
PPTX
Social and professional issuesin it
PPTX
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
PPTX
Digital Citizenship
PPTX
Internet ethics
PPTX
Lecture 1 introduction to computing
PPTX
Troubleshoot beeping computers
PPTX
Ethics for IT Workers and IT Users
PPTX
Living in the IT Era - Lesson 3.pptx
PPT
Business Information & ICT - ICT In Business
DOCX
gee-ie-living-in-the-it-era-syllabuspdf.docx
PPTX
The 9 Elements of Digital Citizenship
PPTX
Uses of computer
Ethical and Social Issues in ICT
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
Computer Ethics Presentation
Responsible Use of Social Media
Chapter 3 Computers and Mobile Devices
Social and Professional Issues in Computing - Ethics
WHAT IS INFORMATION COMMUNICATION TECHNOLOGY?
Netiquette
Social and professional issuesin it
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
Digital Citizenship
Internet ethics
Lecture 1 introduction to computing
Troubleshoot beeping computers
Ethics for IT Workers and IT Users
Living in the IT Era - Lesson 3.pptx
Business Information & ICT - ICT In Business
gee-ie-living-in-the-it-era-syllabuspdf.docx
The 9 Elements of Digital Citizenship
Uses of computer

Viewers also liked (8)

PPTX
BTEC National in ICT: Unit 3 - Ethical Issues
PPTX
Intellectual property rights
PPTX
Intellectual property rights
PPTX
Intellectual property rights
PPTX
Working with ict ethical social and legal issues
PPTX
Intellectual Property Rights In India: Patents Trademarks And Copyrights
PPT
Legal, Ethical and Social Issues in Technology
PPTX
Intellectual Property Rights
BTEC National in ICT: Unit 3 - Ethical Issues
Intellectual property rights
Intellectual property rights
Intellectual property rights
Working with ict ethical social and legal issues
Intellectual Property Rights In India: Patents Trademarks And Copyrights
Legal, Ethical and Social Issues in Technology
Intellectual Property Rights

Similar to Ethical Issues In ICT (20)

PPTX
chapter 5.pptxggggggggggggggggggggggggggg
PPTX
7.-ETHICAL-AND-SOCIAL-ISSUES-IN-INFORMATION-SYSTEMS.pptx
PDF
Ethics In Information Technology 3rd Edition George Reynolds
PPTX
Krishna kumar singh
PPTX
Ethics in IT
PPT
Computer Ethics
DOCX
chapter 3 AIS by james hall summarize in book
PPTX
computer ethics
PPTX
Corporate ethics
PPT
Bus ethics and tech
PPTX
chapter 6 Ethics and Professionalism of ET.pptx
PPTX
corporateethics11111111111111111111.pptx
PPTX
PPT
Ethical-Issues-Related-to-IS-use-and-Design (3).ppt
PPTX
COMPUTER ETHICS
PPT
Ethical And Social Issues in MIS - Management Information System
PDF
Computer ethics
PPTX
Legal And Ethical Aspects.pptx
PPTX
MIS.pptx
chapter 5.pptxggggggggggggggggggggggggggg
7.-ETHICAL-AND-SOCIAL-ISSUES-IN-INFORMATION-SYSTEMS.pptx
Ethics In Information Technology 3rd Edition George Reynolds
Krishna kumar singh
Ethics in IT
Computer Ethics
chapter 3 AIS by james hall summarize in book
computer ethics
Corporate ethics
Bus ethics and tech
chapter 6 Ethics and Professionalism of ET.pptx
corporateethics11111111111111111111.pptx
Ethical-Issues-Related-to-IS-use-and-Design (3).ppt
COMPUTER ETHICS
Ethical And Social Issues in MIS - Management Information System
Computer ethics
Legal And Ethical Aspects.pptx
MIS.pptx

More from kelly kusmulyono (10)

PPT
Arcelik Turkey
PPT
Product Development (Indonesian Version)
PPT
Problem Analysis
PPT
Problem Analysis Framework
PPT
Decision Analysis Introduction
PPT
Nike Internal-External Assessment
PPT
Celebrity Endorser
PPT
Nike Environmental Analysis
PPT
Risk Exposure & Internal Control Structure
Arcelik Turkey
Product Development (Indonesian Version)
Problem Analysis
Problem Analysis Framework
Decision Analysis Introduction
Nike Internal-External Assessment
Celebrity Endorser
Nike Environmental Analysis
Risk Exposure & Internal Control Structure

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Big Data Technologies - Introduction.pptx
PDF
cuic standard and advanced reporting.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Cloud computing and distributed systems.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation theory and applications.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
Big Data Technologies - Introduction.pptx
cuic standard and advanced reporting.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Cloud computing and distributed systems.
Chapter 3 Spatial Domain Image Processing.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The AUB Centre for AI in Media Proposal.docx
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Ethical Issues In ICT

  • 1. r r M. SETIAWAN KUSMULYONO Business Ethics S1 Business Prasetiya Mulya Business School
  • 2. Business Ethics r Muhammad Setiawan Kusmulyono PRESENTATION 1
  • 3. Business Ethics r S e s s i o n 9 E t h i c a l I s s u e s i n Information Technology 2
  • 4. r A g e n d a Business Ethics Chronology Back to Definition Ethical Issues Netiquette Cyber-ethics Conclusion Discussion Session 3
  • 5. Business Ethics r C h r o n o l o g y 4 Information Technology have closely related to : Computer & Communications Within this Information Age [ begin in 1990 ], Computer and Communications started to combine. The combination results: Convergence Allow device [electronic product] to perform in multiple functions. Example: Cellphone+Digicam, TV+Internet Access, etc Portability Trading off the power and move to convenience in return for smaller size and weight. Example: PC Tablet, Smartphone, etc Personalization Creation of information tailored to your preferences. Example: We will receive special ad that we often needed.
  • 6. Business Ethics r D e f i n i t i o n 5 Ethics is defined as a set of moral values or principles that govern the conduct of an individual or a group. Using Information Technology 6 th Ed. p.25 O b j e c t i v e s To understand many kinds of ethical issues in Information Technology To understand the basic concepts of ethics in IT Developments
  • 7. Business Ethics r P e r s p e c t i v e 6 Tom Forester and Perry Morrison in Computer Ethics , discuss about some considerations in ethical issues in Information Technology, such as: Speed and Scale Unpredictability Complexity Great amounts of information can be stored, retrieved, and transmitted at any speed and scale Com&Com are pervasive, touching nearly every aspects of our lives Computers are incredibly complex, even their creators are not always understood about the complexity.
  • 8. Business Ethics r Ethical Issues 7 What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for the authenticity, fidelity and accuracy of info? Who will take the accountable [responsible for the error? Who owns the info? How should access to this scarce resource be allocated? What info does a person have a right to obtain? What will be the requirement and condition that info can be delivered? Richard O Mason Carr P. Collins Management Information Sciences Quarterly P Privacy A Accuracy P Property A Accessibility
  • 9. Business Ethics r Ethical Issues 8 Plagiarism Privacy Data Security Less Predictable Less Reliable Unmanageable Out-of-control Cost Morphing Photo Manipulation Technology Manipulation
  • 10. Business Ethics r Ethical Issues 9 Privacy Privacy is the right of people not to reveal information about themselves. Using Information Technology 6 th Ed. p.369 Privacy is had closely related to Data Security. This ethical issues occur when unauthorized access tried to attack our system. Data Security Example : Today, e-banking and e-commerce have becoming lifestyle. People tend to do transaction through internet. Privacy and Data Security become an issue. Prevention: PIN [Personal Identification Number] Change Password Regularly
  • 11. Business Ethics r Ethical Issues 10 Less Predictable Less Reliable Computers and communications are pervasive, touching nearly every aspects of our lives. If we compare Com & Com with other pervasive technologies; electricity, television, etc, Com & Com seems lot of less predictable and reliable EXAMPLE : We don’t know that virus attacks our system even though we try to create our defensive system. [less predictable] Less Reliable happen when the internet traffic is full [down] Flash disk borrowing
  • 12. Business Ethics r Ethical Issues 11 Unmanageable Out-of-control Cost Good Example: Linux Operating System Bad Example: Sometimes, we don’t know the development of a program. Someone could modify the program until the initial creator don’t know what happen to the program
  • 13. Business Ethics r Ethical Issues 12 Technology Manipulation SOUND Manipulation PHOTO Manipulation VIDEO & Television Manipulation Morphing
  • 14. Business Ethics r Ethical Issues 13 Technology Manipulation SOUND Manipulation Example 1 : Frank Sinatra’s 1994 album, titled: DUETS In this album Sinatra sang as if in duet with some artists [Barbara Streisand and Bono U2]. But, truly, Sinatra sang alone in his studio, and then the recording was sent to those artist and dubbed with their own voices. So, Frank Sinatra and Streisand+Bono never sang together Example 2: L I P S I N G
  • 15. Ethical Issues 14 Technology Manipulation PHOTO Manipulation Morphing
  • 16. Business Ethics r Ethical Issues 15 Technology Manipulation MEDIA Manipulation Manipulation
  • 17. Business Ethics r Ethical Issues 16 Technology Manipulation MEDIA Manipulation Manipulation
  • 18. Business Ethics r Ethical Issues 17 Technology Manipulation MEDIA Manipulation
  • 19. Business Ethics r Ethical Issues 18 P L A G I A R I S M Plagiarism Illegal Copy-Paste Activity Not inserted the original author, if we use their theory
  • 20. Business Ethics r Netiquette 19 Netiquette Basic rules of Netiquette: Don’t waste people’s time Don’t say anything to a person online that you wouldn’t say to his/her face Specific rules of Netiquette: Consult FAQs Avoid Flaming Don’t SHOUT Be Careful with Jokes Avoid Sloppiness Don’t send huge file attachments When replying, quote only the relevant portion Don’t “overforward” Network Etiquette Appropriate online behavior
  • 21. Business Ethics r Cyber-ethics 20 Cyber-ethics = related with censorship of internet information Data The word “sex” is the most popular search word on the net. [Yahoo data] Possibilities to Solve Blocking Software Browsers with Ratings The V-chip
  • 22. r r C O N C L U S I O N Ethical issues in ICT is not only existed in sex, crime, or hack, but also happened in another area of life (entertainment, education, etc) It is difficult to face the bad ethical issues, but there are some ways to prevent the bad impact, such as: Developing the awareness of users [esp. for children u-18] Protecting the un-behavioral sites etc 21
  • 23. r r BIBLIOGRAPHY 21 Using Infromation and Communication Technology. Williams Sawyer. McGraw-Hill. 2005 Management Information Sciences Quarterly Richard O. Mason and Carr P. Collins
  • 24. r r thank you discussion session