Privasi
Masyarakat menginginkan kebebasan penuh dalam mengontrol
tentang apa dan bagaimana informasi tentang diri mereka dapat
diakses oleh orang lain. Ini adalah salah satu permasalahan dalam
privasi. Setelah diciptakan shared database penting untuk diciptakan
pengamanan untuk melindungi privasi mereka. Menciptakan sebuah
masalah baru lagi yaitu tentang Ownership dalam informasi pribadi
tentang perusahaan atau industri.
Ownership of Property
Hukum di desain untuk menjaga properti yang berwujud dan
sekarang telah berkembang untuk menjaga kepemilikan properti
intelektual, seperti Perangkat Lunak. Pertanyaannya, kekayaan
intelektual apa saja yang dapat dilindungi oleh hukum? Gagasan?
Media? Kode Sumber Perangkat Lunak? Hak paten dharapkan untuk
melindungi pihak pihak yang menciptakan perangkat lunak dari
ancaman pembajakan.
Equity in Access
Beberapa faktor dapat membatasi tekonologi komputasi. Status
ekonomi seseorang dapat menunjukkan kemampuan seseorang
mendapatkan teknologi informasi. Budaya juga dapat membatasi
akses, contohnya ketika sebuah dokumen disimpan hanya dalam satu
bahasa atau diartikan secara tidak tepat dalam bahasa lain.
Penyalahgunaan Komputer
Penyalahgunaan
komputer
dapat
dalam
berbagai
cara.
Menggandakan perangkat lunak demi keuntungan perusahaan secara
illegal, mengintip dokumen orang lain. Walaupun menggandakan
perangkat lunak (kecuali untuk kepentingan backup) adalah jelas
perbuatan yang melanggar hukum, tetapi tetap sering dilakukan.
Mengapa beberapa orang merasa tidak perlu patuh pada hukum ini?
Beberapa orang melayangkan argumen, apakah developer program
dirugikan atas penggandaan illegal? Apakah berpengaruh jika waktu
kerja komputer melebihi batas?
perusahaan
untuk
melakukan
o Perusahaan
public
harus
melaporkan
laporan
keuangannya
o Laporan tahunan kepada SEC harus ada pernyataan
dari manajemen agar ada pertanggungjawaban untuk
menciptakan dan membuat control internal menjadi
efektif
o Perusahaan harus memastikan bahwa perusahaan
meberikan informasi apa adanya tentang kondisi
keuangan dan hasil kerja perusahaan tersebut.
o Apabila diketahui member kesaksian palsu tentang
kondisi perusahaan mereka maka tindakan tersebut
akan menjadi tindakan criminal
5) Fraud and Criminal Penalties
SOX menciptakan hukum baru untuk perusakan dokumen
atau bukti dari kertas kerja audit, penipuan surat utang,
serta aksi untuk melindungi whistleblower.
Computer Ethics
Analysis of the impact of computer technology on the environment and
society, and how to respond by making regulations concerning the ethical
use of such technology and the hardware and software associated with
computer network connections
3 levels of Computer Ethics:
Pop Computer Ethics
received information from popular media reports and findings (media pop /
Magazine) about the good or bad of a technology.
The Computer Ethics
involve interested parties and experts in the world of technology. All experts
must have the ethics of this stage is based on the ability and understanding
of the technology that they have.
Theoretical Computer Ethics
applied to researchers who examined the philosopher, sociology and
psychology of computer technology with the goal of finding a new
understanding of the application of environmental technology and society.
New problem, or just a mistake on Old Problems in the application of the
technology world.
Privacy
Society wants full freedom of control of what and how information about
them can be accessed by others. This is one of the problems in privacy.
Having created an important shared database to be created safeguards to
protect their privacy. Creating a new problem again is about the 'Ownership'
in private information about the company or industry.
Security (Accuracy and Confidentiality)
Computer security must be developed to avoid undesirable things such as
confidential data loss. The security system is also expected to minimize the
possibility of fraud and other computer system error. ethical issues that arise
involving security arising from the rampant sharing, computer database has
the potential to be vandalized by someone who is spreading false
information. For example, the system can be used to maintain the security of
private property, but also removes the freedom of access to the data, which
can have a negative impact for some people.
Ownership of Property
The law is designed to safeguard the intangible property and now has grown
to keep the ownership of intellectual property, such as the Software. The
question is, what intellectual property can be protected by law? The idea?
The media? Software Source Code? Dharapkan patents to protect the party
that created the software from the threat of piracy.
Equity in Access
Several factors may limit the computing Tekonologi. Economic status of a
person can show a person's ability to get information technology. Culture can
also restrict access, for example, when a document is stored in only one
language or interpreted incorrectly in other languages.
Artificial Intelligence (Artificial Intelligence)
New discussion in the community and ethical issues arise from the popularity
of expert systems, such as the proliferation of systems that have been
marketed, a decision-maker instead of an expert, some people rely on that
system. But the ability of both the systems are in the code by programmers
and an expert should be in konsiderasikan based on the possibility that they
can cause errors of the decisions taken. as expert systems try to mimic the
style of a manager's decision-making, individual thought patterns can affect
the decisions, not objective anymore. Who is responsible for the rationale of
an expert system? who is responsible for decisions taken and implemented
by the expert system?
Unemployment and Displacement
It would appear a lot of unemployment due to the use of information
technology. Some people who tidap ready to be replaced by computers.
Computer Misuse
Misuse of the computer can be in a variety of ways. Doubling software
illegally for profit company, peering documents others. Although doubling
the software (except for the benefit of the backup) is clearly an unlawful act,
but still often done. Why do some people feel no need to obey this law?
Some people cast the argument, whether the program developer aggrieved
over illegal duplication? Does it matter if a computer work time exceeds the
limit?