Professional Documents
Culture Documents
Year : 2011
Session 6
Ethical aspects of
Information Technology
Learning Outcome
Bina Nusantara
The Power of Information Technology
1). IT provides powerful new capabilities such as monitoring,
surveilliance, data linking, and database searching. These
capabilities can be utilized wisely and ethically, or they can be
used to create mischief, to spy on people, and to profit, from
new scams.
Bina Nusantara
3). IT transforms relationships between individuals and
organizations, raising new versions of issue such as accountability
and responsibility.
Ref. Tom Forester and Perry Morrison, Computer Ethics, London: The
MIT Press, 1999, p.10-11
Bina Nusantara
Main Component of Information Technology
Computer software
Computer software encompasses a wide range of tools from
operating system software to popular application such as spreadsheets,
databases, and word-processing packages. The database in particular has
had a profound impact on information management.
A database is simply a collection of information organized
according to a logical structure. For example, a firms employee
database would include a employees address, phone number, department, and
so forth.
A related technology that makes efficient data management possible
is sophisticated storage devices.
The database and storage facilitate the collection, manipulation,
retrieval, dissemination of information, thus making it possible for
information to be treated as a commodity that can be packaged
and sold efficiently
Bina Nusantara
Networks
A Vital component of the information infrastructure is
the network which permits computers to
communicate with one her.
The ability to exchange information on data
networks is crucial for may organizations.
It also makes possible a virtual corporation and
even virtual community.
The problem, then, is that networked computing
challenges the laws and norms that have
traditionally prevailed to control the distribution and
ownership of information
Where is the locus of responsibility for security in a
networked environment?
Who is liable if there is a security breach? And so forth
Bina Nusantara
Computer Hardware
The most notable and significant trend in computer
hardware, however, is the rapid proliferation of
personal computer (PCs) and workstations.
The personal computer has become a
commonplace and powerful tool in organizations
and household.
As a consequence, computers are no longer the
private preserve of government, large
businesses, and research Institutions; extraordinary
power is becoming available to a wide segment of
society
But with this power comes the potential for abuse
and the need for users to act responsibility.
One of the main areas of abuse is managements
use of PC
Bina Nusantara to keep tabs on its employees.
Information Technology as an
instrument of national unity
Indonesia consists of numerous ethnic groups,
religions, races, cultures and islands.
Infomation technology can be a means to unite
the various ethnics, religions, races, cultures and
islands.
Infomasi technology can be used as a means to
build social solidarity as a nation.
Case Study 1