Vous êtes sur la page 1sur 26

Slide 1

Kuliah 2. C
Etika Penggunaan Komputer
Slide 2
Computer Ethics
Computers cause new ethical problems
Computer ethics uses basic ethical principles to help
you make the right decisions
Slide 3
Ethical Principles
Ethical principles are tools which are used to think
through difficult situations
Three useful ethical principles:
An act is ethical if, were everyone to act the same, society
benefits from it
An act is ethical if people are treated as ends and not as a
means to ends
An act is ethical if it is fair to all parties involved
Slide 4
Your Schools Code of Conduct
Read acceptable use
Respect yourself
Respect others
Respect academic
Slide 5
Ten Commandments of Computer Ethics
1. Don't use a computer to harm other people
2. Don't interfere with other peoples computer work
3. Don't snoop around in other peoples files
4. Don't use a computer to steal
5. Don't use a computer to bear false witness
Slide 6
Ten Commandments of Computer Ethics
6. Don't copy or use proprietary software for which
you have not paid
7. Don't use other peoples computer resources
without authorization or proper compensation
8. Don't appropriate other peoples intellectual output
9. Dont think about the social consequences of the
program you write or the system you design
10. Dont use a computer in ways that show
consideration and respect for your fellow humans
Slide 7
Netiquette refers to the guidelines that involve
showing respect for others and yourself while you are
Slide 8
Mailing List Netiquette
Read the discussions for the past few days before posting
Read the Frequently Asked Questions (FAQs) list
before posting questions
Dont belittle people for grammatical errors
Dont post inflammatory messages
Learn how to unsubscribe from the list
Slide 9
E-Mail Netiquette
Promptly respond to
Delete messages after you
read them
Speak of others
professionally and
Run your computers anti-
virus program on any e-
mail received or sent
Slide 10
E-Mail Netiquette (continued)
Keep the message short and to the point
Dont type in all capital letters
Spell check your message before sending it
Be careful with sarcasm and humor in your message
Be mindful of the recipients reaction when you request a
return receipt; this feature can be annoying and intrusive
Slide 11
Internet Relay Chat Netiquette
Listen to the discussion for a while before joining it
Learn the commonly used abbreviations
Dont flood the channel with text
Dont harass others with unwanted invitations
Be careful if you are asked to type in a command; it may
have unexpected results
Use the ignore command when being bothered
Slide 12
Computer Games: Too Much Violence?
Splatter games emphasize all-out violence
Some say it increases violent behavior
Others say it provides an outlet for violent feelings
Slide 13
Computer Ethics for Organizations
A business must protect its data from:
Loss or damage
Misuse or errors
Unauthorized access
Backup procedures are used to protect data from loss
It is the organizations responsibility to ensure that its
data is as complete as possible
Divulging customer data without asking permission is
considered unethical behavior by privacy advocates
Slide 14
Whistle-blowing refers to employees reporting their
companys dangerous or illegal acts to regulatory
agencies or the press
Some laws exist to protect whistle-blowers, but many
find themselves unemployed and blacklisted
Slide 15
Computer Ethics for Computer Professionals
The field of computer ethics specifies ethical codes for
computing professionals
The core of a computer professionals code of ethics is to
preserve and protect human life from harm
The essential elements relating to conduct that identify a
professional activity are:
A high standard of skill and knowledge
A confidential relationship with people served
Public reliance upon the standards of conduct in established
The observance of an ethical code
Excerpt from the Code of Ethics of the Institute for Certification of Computing Professionals
Slide 16
The ACM Code of Conduct
A computing professional:
Contributes to society and human well-being
Avoids harm to others
Is honest and trustworthy
Is fair and takes action not to discriminate on the basis of
race, sex, religion, age, disability, or national origin
Honors property rights, including copyrights and patents
Gives proper credit when using the intellectual property of
Respects other individuals rights to privacy
Honors confidentiality
Slide 17
Safety First
Programmers can produce programs with errors
Computer experts agree that the liability for a program
failure should be shared among the programmer, the
software company, and the organization that buys the
Slide 18
Its Not Just Unethical, Its Illegal, Too
Types of legal problems that arise from computer use
Software Piracy
Copyright Infringement
Slide 19
Plagiarism is the unauthorized and/or uncited use of
someone elses intellectual property
Intellectual property rights refer to an individuals
ownership over original works
Legal implications of plagiarism:
Dismissal from school
Slide 20
Copyright infringement is plagiarism
of copyrighted material
The Fair use doctrine states that a
brief selection from copyrighted work
can be used for commentary, parody,
news reporting, research, and
Slide 21
Libel is the publication of a false statement that
injures ones business or reputation
Slide 22
Software Piracy
Selling software that contains all
or part of a commercial software
Using shareware beyond its
evaluation period
Violating the terms of a software
Making copies of site-licensed
programs for personal use
Giving or selling commercial
software to others
Slide 23
Software and Copyrights
Public domain software can be copied, sold, and
Shareware is copyrighted software that can be used
without a license for a specified time
Trial versions can be copied
When the evaluation period ends, a registration fee is paid for
continued use of the software
Commercial software is copyrighted
You must purchase the software to use it
Organizations purchase a site license to use the software on
all of their computers
Slide 24
Software and Copyrights (continued)
General Public License (GPL) specifies that anyone
may freely copy, use, and modify the software, but it
cannot be sold for profit
Copyright protection schemes thwart the illegal use of
Machine dependent
programs can only be
used on the machine on
which they were installed
Slide 25
Are you guilty of software piracy?
Incorporating all or part of a GPL program in a
commercial program that you sell
Continue to use shareware after expiration without
Violate terms of software license
Making copies of site-licensed
Giving or selling copies of
commercial software to others
Slide 26
File Sharing: Music, Movies, and More
An increasing number of Internet users are making
illegal copies of music
Rationalizations copyright violators use:
Its OK to download MP3 files if I only keep them for 24
Its free advertising for the band
Its legal because I dont charge any money for sharing