kuliah 14 isu-isu sosial yang berkembang.pdf
TRANSCRIPT
-
Isu-Isu Sosial yang Berkembang
-
What is Privacy ?
Beberapa definisi tentang Privasi:
The right to be let alone (Mahkamah Agung Brandeis, 1890)
The right of individuals to control the collection and use of personal information about themselves (Jurnal Privacy)
Privacy is the power to control what others can come to know about you. People gain knowledge about you in only two ways through monitoring or searching ( or by reports relying on the results of monitoring and searching) (Lessig, 1999)
-
3Privasi dan Keamanan
Keamanan terjaminnya data yangtersimpan di komputer
Privasi data pribadi haruslah dijaga dariorang yang tidak berkepentingan ataupengintai
-
Masyarakat dan Kejahatan Komputer
Kejahatan Komputer: menggunakan komputer untuk melakukan perbuatan kriminal.
Sukar untuk menentukannya karena:
Untuk menentukan sebuah perbuatan termasuk kriminal menjadi susah
Para hakim sering dibingungkan dengan isu teknikal yang terlibat dalam beberapa kasus.
Perusahaan enggan untuk menuntut karena takut akan menjadi pemberitaan yang merugikan.
-
Jenis/Bentuk Kejahatan Komputer
Virus Komputer
Penggunaan dan akses yg tidak sah (Unauthorized access and use)
Pengubahan data atau program (Data or program alteration )
Trapdoors
Pemalsuan Digital (Digital counterfeiting)
Penipuan online (Online scams and frauds)
Penggelapan (Cover-ups)
-
Computer Crime Legislation
-
8Kejahatan Komputer
Hacker seseorang yang mencoba untuk mengakses ke sistem komputer secara ilegal Biasanya seorang yang memiliki kepakaran komputer
tingkat tinggi
Social engineering Memaksa seseorang untuk memberikan informasi password
Cracker seseorang yang menggunakan komputer dalam kegiatan ilegal
-
9Metode yang digunakan dalam Kejahatan Komputer
Bomb
Data diddling
Denial of service attacks
Piggybacking
Salami technique
Scavenging
Trapdoor
Trojan horse
-
10
Bomb
Program yang memicu kerusakan pada suatu kondisi tertentu.
Program akan dimatikan pada satu tanggal tertentu
Kadang2 disisipkan / ditanamkan dalam software komersil
Shareware biasanya akan memiliki bomb yang ditanam didalamnya
Return
-
11
Data Diddling
Data yang diubah sebelum atau pada saat memasuki sistem
Pengaudit data harus membuat verifikasi ketepatan sumber data demikian juga halnya dengan pemprosesan yang berlaku
Return
-
12
Denial of Service Attack
Hackers akan memborbardir suatu site dengan request yang melebihi kemampuannya
Mencegah pengguna yang sah untuk mengakses suatu situs
Hacker akan menyebabkan adanya penyerangan yang bersumber dari banyak site yang berbeda secara serentak / bersamaan
Return
-
13
Piggybacking
An illicit user rides into the system on the back of an authorized user
If the user does not exit the system properly, the intruder can continue where the original user has left off
Always log out of any system you log into
Return
-
14
Salami Technique
An embezzlement technique (teknik penggelapan) where small slices of money are funneled (disalurkan) into accounts
Return
-
15
Scavenging
Searching company trash cans and dumpsters for lists of information
Thieves will search garbage and recycling bins of individuals looking for bank account numbers, credit card numbers, etc.
Shred documents that contain personal information
Return
-
16
Trapdoor
An illicit program (program terlarang) left within a completed legitimate program
Allows subsequent unauthorized and unknown entry by the perpetrator (pelaku kejahatan) to make changes to the program
Return
-
17
Trojan Horse
Involves illegal instructions placed in the middle of a legitimate program
Program does something useful, but the Trojan horse instructions do something destructive in the background
Return
-
18
White-Hat Hackers
Hackers that are paid by a company to break into that companys computer systems
Expose security holes and flaws (celah) before criminals find them
Once exposed, flaws can be fixed
-
Computers and Privacy
Privacy refers to how information about individuals is used and by whom.
Modern computer systems have added a new dimension to the privacy issue.
The greater the ability to collect, store, and disseminate information, the greater the potential for abuse of that information.
-
Privacy and Electronic Mail
Company electronic mail
Companies are allowed by law to eavesdrop on the e-mail messages sent by their employees.
At many companies, a formal e-mail policy exists and software is used to enforce it.
Spam
At best, spam is merely an annoyance (gangguan) to recipients and can clog a mail network.
At worst, it can disable a mail network completely.
-
Privacy and Marketing Databases
Marketing databases contain information about the consuming public.
Micromarketers specialize in creating marketing databases and selling information to companies.
Geodemographics categorizes consumers by certain buying preferences.
-
Computer Security and Safeguards Against Computer Crime
Assess risks
Take caution with employees
Restrict system access and use
Secure transmissions
Use antivirus and other crime-prevention software
Have a recovery plan
-
Ethics
Ethics atau etika merujuk kepada standar tingkah laku moral (moral conduct).
Kelakuan yang tidak beretika tidak seharusnya ilegal, walaupun pada beberapa kasus dapat menjadi tindakan ilegal.
-
Why Study Ethics?
Tempat kerja pada masa ini menjadi tersebar dan multikultural.
Banyak organisasi dan sekolah membuat codes of conduct yaitu peraturan yang menjelaskan perbuatan-perbuatan yang dilarang maupun yang dibolehkan.
-
27
Ethics in Computing
Ethics standards of moral conduct
Used to help determine the proper course of action in difficult situations
Computing Issues
Computer ethics
Professional ethics
Programmer responsibility
Ethical use of computers
-
28
Computer Ethics
Ten Commandments of Computer Ethics
Apply general ethical principles to computing
Developed by the Computer Ethics Institute
Return
-
30
Professional Ethics
Relates to ethics of those whose work focuses on computer systems
Code of Ethics and Professional Conduct developed by the Association for Computing Machinery
Divided into sections General principles
Professional responsibilities
Guidelines for organizational systems
Return
-
31
Programmer Responsibility
Bug-free software does not exist
Testing can only show the presence of bugs, not their absence
Issues related to software quality
How much testing is enough?
How many minor bugs are acceptable in software about to be released?
Return
-
32
Ethical Use of Computers
Data quality
Protecting customers personal data
Digitally altering data
Return
-
33
Data Quality
Users are responsible for the quality of data entered into the system
Procedures must be in place to detect and correct inaccurate information
Return
-
34
Protecting Customers Data
Particularly relevant to companies doing business over the Internet
Develop privacy policies stating how data will be used
Two approaches Opt-in policy customers are notified of privacy
policy and must agree before their data can be released
Opt-out policy customers are assumed to agree to the release of their data unless they specifically request it be kept private
Return
-
Intellectual Property Rights
Intellectual property rights refer to the ability to legally use the creation
of others.
-
36
Intellectual Property Rights
Refers to results of intellectual activity in the industrial, scientific, literary, or artistic fields
U.S. Copyright Act provides protection in three areas
Copyrights
Patents
Trademarks
-
Copyrights
Intellectual properties such as books, music, artwork, and movies are protected in the U.S. by copyrightlaws.
Copyrights can be registered and generally last until 70 years after the creators death.
Web developers should be aware of copyright laws so they do not use copyrighted content on their Web sites without appropriate permission.
-
38
Copyrights
Provides the creator of a literary or artistic work with control over its use and distribution
Widespread distribution of music and videos over the Internet has created quite a controversy
Defining fair use has been difficult
Under fair use, you may use copyrighted works for limited purposes
Digital issues
Return
-
39
Digital Fair Use Issues
Copy-protection schemes make it impossible to copy CDs and DVDs Users claim that violates their fair use rights
Software Users may not modify copyrighted software
Digital images Images on the Web may be downloaded and used as screen savers,
but they may not be distributed or altered
Plagiarism Work taken from the Internet must be cited if it is used in a paper or
other presentation
Return
-
Patents
Patent: exclusive right to an invention for the period of 20 years.
Computer-related patents have skyrocketed, and now some business methods and models have been patented.
-
41
Patents
Designed to protect inventions and encourage inventors
Grant patent holder exclusive rights to the invention
Patent Office will grant patent protection to software algorithms and techniques
Will also grant patents for business methods implemented in software
Return
-
Trademarks
Trademark: any word, name, symbol, or other device that identifies an organizations goods and services.
Nonregistered trademarks can use the mark .
Registered trademarks can use the symbol .
-
Health, Ergonomics, and the Environment
Computers have been said to pose a threat to our physical and mental well-being.
Although supporting scientific evidence is far from conclusive, we should all be aware of the major concerns raised about the possible effects of computers on our health.
-
44
Workplace Issues
Healthy computing
Employee monitoring
Environmental concerns
-
45
Healthy Computing
A number of health questions have been raised
Harmful emissions from monitor
Eyestrain from monitor
Back pain from position of chair and desk
Repetitive strain injury
Return
-
46
Repetitive Strain Injury
May affect workers who hold their hands over a keyboard for a long period of time
Carpal tunnel syndrome is the most common form of RSI
Causes
Speed
Repetition
Awkward positioning
Holding a static position for a long timeReturn
-
Ergonomics-Related Concerns
Display devices
Keyboards
Workspace design
-
48
Ergonomics
Refers to human factors related to the use of computers
Ergonomic equipment
Ergonomic behavior
-
49
Ergonomic Equipment
Chair should be pneumatically adjustable
Keyboard platform should be set to proper height
Monitor must be adjustable
Lighting should be adjusted to minimize glare on the screen
Return
-
52
Ergonomic Behavior
Ergonomic equipment must be used properly Turn the screen away from the window to reduce
glare
Cover your screen with a glare protector
Place keyboard to avoid arm and wrist fatigue
Use a raised rest for your wrist
Position your seat back so back is supported
Sit with your feet firmly on the floor
Enlarge fonts so they are easier to see
Take frequent breaks
Return
-
53
Employee Monitoring
Various tools allow an employer to monitor an employees performance Keystroke monitors measure keystrokes per second
Other software tools monitor how long an employee is away from the computer
Monitor the files stored on the hard drive
Monitor the sites visited on the Internet
Many companies have policies that notify employees about monitoring practices
Return
-
54
Environmental Concerns
Power consumption
Computer supplies
PC disposal
Return
-
55
Reducing Power Consumption
Energy Star standards
Limit the power the system consumes when idle
Energy management features
Specify the amount of time the system will wait before turning off system components
Return
-
Environment-Related Concerns
The computer industry is moving to less-power-consumptive hardware, such as Energy Star compliant hardware.
-
57
Computer Supplies
Use these strategies to reduce the amount of paper and toner cartridges used Dont print out everything
Use e-mail instead of faxing or sending a memo
Use the back side of already used paper for draft copies
Save heavyweight bond paper for critical items and use recycled paper for routine printing
Make sure used paper is recycled rather than thrown in the trash
Refill and reuse empty ink-jet and toner cartridges
Return
-
58
PC Disposal
Find ways to prolong the PCs life
Upgrade key components
Give the PC to someone in the organization with more limited computing needs
When you buy a new PC, reuse the keyboard, mouse, and monitor
Donate usable equipment to charities and/or schools
Return
-
59
Jurisdictional Issues (Isu2 Hukum)
International issues
Applying national laws to a world-wide medium is a difficult process
It would be impossible to determine if the content of every Web site was legal according to the laws of every country
Issues exist over which countrys court has jurisdiction
National issues
Issues exist over which localitys court has jurisdiction
Imposition of sales taxes on Internet transactions
-
60
Protecting Children on the Internet
The Internet offers many opportunities for children
There are also unsavory (tidak baik) elements on the Internet
Ways to protect children
Blocking software
Child monitoring
-
61
Blocking Software
Used to prevent children from accessing sites on its updatable list of objectionable sites
Blocks pornographic sites and sites with foul language
Blocks sites requesting names, phone numbers, and credit card numbers
Return
-
62
Child Monitoring
Place the childs computer in a public area instead of his or her bedroom
Restrict usage when parents are not present
Return