Vous êtes sur la page 1sur 10

Course Name: CB142

Year : 2011
Session 6

Ethical aspects of
Information Technology
Learning Outcome

Student will be able to understand the


possibility of ethical issues in using
information technology

Bina Nusantara
The Power of Information Technology
1). IT provides powerful new capabilities such as monitoring,
surveilliance, data linking, and database searching. These
capabilities can be utilized wisely and ethically, or they can be
used to create mischief, to spy on people, and to profit, from
new scams.

2). It transforms relationships between people, depersonalizing


human contact and replacing it with instant, paperless
communications. This phenomenon can sometimes lead people into
temptation by creating a false sense of realiy and by disguisting the
true nature of their actions, such as breaking into a computer
system.

Bina Nusantara
3). IT transforms relationships between individuals and
organizations, raising new versions of issue such as accountability
and responsibility.

4). Finally, IT unrealiability creates new uncertainties and a whole


series of ethical choices for those who operate complex
systems and those who design and build them.

5). Computer producers and vendors too often neglect to


adequately consider the eventual users of theri systems, yet they
should not escape responsibility for the consequences of their
system design.

Ref. Tom Forester and Perry Morrison, Computer Ethics, London: The
MIT Press, 1999, p.10-11
Bina Nusantara
Main Component of Information Technology
Computer software
Computer software encompasses a wide range of tools from
operating system software to popular application such as spreadsheets,
databases, and word-processing packages. The database in particular has
had a profound impact on information management.
A database is simply a collection of information organized
according to a logical structure. For example, a firms employee
database would include a employees address, phone number, department, and
so forth.
A related technology that makes efficient data management possible
is sophisticated storage devices.
The database and storage facilitate the collection, manipulation,
retrieval, dissemination of information, thus making it possible for
information to be treated as a commodity that can be packaged
and sold efficiently

Bina Nusantara
Networks
A Vital component of the information infrastructure is
the network which permits computers to
communicate with one her.
The ability to exchange information on data
networks is crucial for may organizations.
It also makes possible a virtual corporation and
even virtual community.
The problem, then, is that networked computing
challenges the laws and norms that have
traditionally prevailed to control the distribution and
ownership of information
Where is the locus of responsibility for security in a
networked environment?
Who is liable if there is a security breach? And so forth
Bina Nusantara
Computer Hardware
The most notable and significant trend in computer
hardware, however, is the rapid proliferation of
personal computer (PCs) and workstations.
The personal computer has become a
commonplace and powerful tool in organizations
and household.
As a consequence, computers are no longer the
private preserve of government, large
businesses, and research Institutions; extraordinary
power is becoming available to a wide segment of
society
But with this power comes the potential for abuse
and the need for users to act responsibility.
One of the main areas of abuse is managements
use of PC
Bina Nusantara to keep tabs on its employees.
Information Technology as an
instrument of national unity
Indonesia consists of numerous ethnic groups,
religions, races, cultures and islands.
Infomation technology can be a means to unite
the various ethnics, religions, races, cultures and
islands.
Infomasi technology can be used as a means to
build social solidarity as a nation.
Case Study 1

Its Not Your Job to Be a Data Cop!


Robert Wessell works as mail manager division of a well-established
and highly profitable corporation that has carved out a niche as an
information broker. This division rents out various mailing list to direct
marketers. Most of the companys customers are reputable
organizations and use these data conscientiously for legitimate
purposes. Mr. Wessell received a request from a new customer.
Wessel knew that the company recently gained some notoriety for
targeting vulnerable segments of population.
Mr. Wessell decides to articulate his concerns to his boss, Ms. Jane
Manning. Ms. Manning is unsympathetic to this request. She is not
sure that the company can control the data. But Mr. Wessell urge and
try to get the trust from his boss. Ms. Manning ends the meeting by
exclaiming, Look, Robert, its not your job to be a data cop! Wessell is
still unsatisfied. Identify and analyze the basic ethical issues in this
case.
Bina Nusantara
Case study 2: Vital information at Complex
Martha Van Hussen, Regional Director of sales at Complex Corporation, was feeling vaguely uneasy as
she sipped her morning coffee and glance d again at the latest memo from corporate headquarters. The
memo stressed one more the need to bloc absolutely any information leaks to competitors both about
changes in Complexs rapidly evolving line computer software products and about its latest marketing
strategies.
What worried her was not so much that one of her salespeople would intentionally provide information to
competitors, as that someone might allow an unintentional leak. It was true, she confessed to herself,
two members of her twenty-member sales force hand been disgruntled over recent salary decisions and
had threatened to quit. But she doubted they would actually commit an act of outright sabotage. More
probelmatic was the fact that one of her salesperson, Frank Wright, was married to an employee of one
of Complexs major competitors. Because Franks wife, Hillary, was a software designer, Martha knew
she could interpret any relevant information, even off-hand information offered in casual remarks,
decisively. Of course, Martha had no reason to question the conduct of either Frank or Hillary. Both
seemed to be good, down-to-earth types, and she had especially enjoyed chatting with them at a recent
dinner party. Frank, furthermore, had done well during his first three years with the company. To further
complicate the overall problem, two other members of her staff had relatives working for competing
firms. In one case the relative was an uncle, and in the other it was a causin. She also knew that her
sales staff me infrequently with other salespersons from rival firms at conferences an exhits. Identify and
analyze the ethical problem of the case above. (ref. Richard A. Spinello, Ethical Aspects of Information
Technology, New Jersey: Pretince Hall, 1994, p.42-43)
Bina Nusantara

Vous aimerez peut-être aussi