1
2
Chronology
Back to Definition
Ethical Issues
Netiquette
Cyber-ethics
Conclusion
Discussion Session
3
4
Information Technology have closely related to :
Computer & Communications
Within this Information Age [begin in 1990], Computer and Communications started to combine.
The combination results:
Convergence
Allow device [electronic product] to perform in multiple functions. Example: Cellphone+Digicam, TV+Internet Access, etc
Portability Trading off the power and move to convenience in return for smaller size and weight. Example: PC Tablet, Smartphone, etc
Personalization
Creation of information tailored to your preferences. Example: We will receive special ad that we often needed.
5
Ethics is defined as a set of moral values or principles that govern the conduct of an individual or a group.
Using Information Technology 6th Ed. p.25
To understand many kinds of ethical issues in Information Technology
To understand the basic concepts of ethics in IT Developments
6
Tom Forester and Perry Morrison in Computer Ethics, discuss about some considerations in ethical issues in Information Technology, such as:
Speed and Scale
Unpredictability
Complexity
Great amounts of information can be stored, retrieved, and transmitted at any speed and scale
Com&Com are pervasive, touching nearly every aspects of our lives
Computers are incredibly complex, even their creators are not always understood about the complexity.
7
• What is the safeguards when we want to reveal secret info?
• What things can people keep to them selves and not being cracked?
• Who is responsible for the authenticity, fidelity and accuracy of info?
• Who will take the accountable [responsible for the error?
• Who owns the info?
• How should access to this scarce resource be allocated?
• What info does a person have a right to obtain?
• What will be the requirement and condition that info can be delivered?
Richard O MasonCarr P. CollinsManagement Information Sciences Quarterly
8
Plagiarism
Privacy
Data Security
Less Predictable
Less Reliable
Unmanageable
Out-of-control Cost
Morphing Photo Manipulation
Technology Manipulation
9
Privacy
Privacy is the right of people not to reveal information about themselves.Using Information Technology 6th Ed. p.369
Privacy is had closely related to Data Security. This ethical issues occur when unauthorized access tried to attack our system.
Data Security
Example:
Today, e-banking and e-commerce have becoming lifestyle. People tend to do transaction through internet. Privacy and Data Security become an issue.
Prevention:PIN [Personal Identification Number]
Change Password Regularly
10
Less Predictable Less Reliable
Computers and communications are pervasive, touching nearly every aspects of our lives.
If we compare Com & Com with other pervasive technologies; electricity, television, etc, Com & Com seems lot of less predictable and reliable
EXAMPLE:
• We don’t know that virus attacks our system even though we try to create our defensive system. [less predictable]
• Less Reliable happen when the internet traffic is full [down]
• Flash disk borrowing
11
Unmanageable Out-of-control Cost
Good Example:
Linux Operating System
Bad Example:
Sometimes, we don’t know the development of a program. Someone could modify the program until the initial creator don’t know what happen to the program
12
Technology Manipulation
SOUND Manipulation
PHOTO Manipulation
VIDEO & Television Manipulation
Morphing
13
Technology Manipulation
SOUND Manipulation
Example 1 :
• Frank Sinatra’s 1994 album, titled: DUETS
• In this album Sinatra sang as if in duet with some artists [Barbara Streisand and Bono U2].
• But, truly, Sinatra sang alone in his studio, and then the recording was sent to those artist and dubbed with their own voices.
• So, Frank Sinatra and Streisand+Bono never sang together
Example 2:
L I P S I N G
14
Technology Manipulation
PHOTO Manipulation Morphing
15
Technology Manipulation
MEDIA Manipulation
Manipulation
16
Technology Manipulation
MEDIA Manipulation
Manipulation
17
Technology Manipulation
MEDIA Manipulation
18
P L A G I A R I S M
Plagiarism
Illegal Copy-Paste Activity
Not inserted the original author, if we use their theory
19
Netiquette
Basic rules of Netiquette:1. Don’t waste people’s time
2. Don’t say anything to a person online that you wouldn’t say to his/her face
Specific rules of Netiquette:
1. Consult FAQs
2. Avoid Flaming
3. Don’t SHOUT
4. Be Careful with Jokes
5. Avoid Sloppiness
6. Don’t send huge file attachments
7. When replying, quote only the relevant portion
8. Don’t “overforward”
Network Etiquette
Appropriate online behavior
20
Cyber-ethics = related with censorship of internet information
Data
The word “sex” is the most popular search word on the net. [Yahoo data]
Possibilities to Solve
1. Blocking Software
2. Browsers with Ratings
3. The V-chip
Ethical issues in ICT is not only existed in sex,
crime, or hack, but also happened in another
area of life (entertainment, education, etc)
It is difficult to face the bad ethical issues, but
there are some ways to prevent the bad impact,
such as:
-Developing the awareness of users [esp. for
children u-18]
-Protecting the un-behavioral sites
-etc
21
21
Using Infromation and Communication Technology. Williams Sawyer. McGraw-Hill. 2005
Management Information Sciences Quarterly
Richard O. Mason and Carr P. Collins