Professional Documents
Culture Documents
Isyu Sosial
Dampak Positif 1. Komunikasi yang lebih baik. 2. Transportasi data yang cepat & aman. 3. Pekerjaan selesai lebih cepat & akurat. 4. Efisiensi tenaga kerja
Dampak Negatif 1. Manusia tergantung dengan komputer. 2. Kehilangan pekerjaan karena komputer lebih cepat & teliti. 3. Hacker yang merusak datadata dalam komputer walaupun sudah di
password.
Computer Crime
The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources The unauthorized release of information The unauthorized copying of software Denying an end user access to his or her own hardware, software, data, or network resources Using or conspiring to use computer or network resources illegally to obtain information or tangible property
Hacking
Definition: The obsessive use of computers, or the unauthorized access and use of networked computer systems
Cyber Theft
Definition: Computer crime involving the theft of money
Unauthorized Use
Definition: Time and resource theft may range from doing private consulting or personal finances, or playing video games, to unauthorized use of the Internet on company networks
Piracy
Software Piracy unauthorized copying of computer programs Piracy of Intellectual Property unauthorized copying of copyrighted material, such as music, videos, images, articles, books and other written works especially vulnerable to copyright infringement
Privacy Issues
Accessing individuals private e-mail conversations and computer records, and collecting and sharing information about individuals gained from their visits to Internet websites and newsgroups Always knowing where a person is, especially as mobile and paging services become more closely associated with people rather than places
Privacy Issues
Using customer information gained from many sources to market additional business services Collecting telephone numbers, email addresses, credit card numbers, and other personal information to build individual customer profiles
Computer Matching
Definition: Using physical profiles or personal data and profiling software to match individuals with data
Privacy Laws
Definition: Rules that regulate the collection and use of personal data by businesses
Censorship
Spamming indiscriminate sending of unsolicited e-mail messages to many Internet users Flaming sending extremely critical, derogatory, and often vulgar e-mail messages or newsgroup postings to other users on the Internet or online services
Other Challenges
Employment significant reductions in job opportunities as well as different types of skills required for new jobs Computer Monitoring computers used to monitor the productivity and behavior of employees as they work
Other Challenges
Working Conditions jobs requiring a skilled craftsman have been replaced by jobs requiring routine, repetitive tasks or standby roles Individuality dehumanize and depersonalize activities because computers eliminate human relationships
Next Week
Computer and Industry Sebutkan perbedaan worm, trojan dan virus Bagaimana komputer dan IT mempengaruhi dunia Industri Sebutkan contoh implementasi yang kompleks dengan menyebutkan detil aplikasi, rancangan, teknologi Buat presentasinya
Reference
Information System Management, McGrawhill