Upload
lee-chee-kean
View
225
Download
0
Embed Size (px)
Citation preview
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 1/25
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 2/25
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 3/25
Ethics and Law in computing
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 4/25
Etika (Ethics)
Etika komputer adalah sistem berkaitan
standard moral atau nilai yang digunakansebagai panduan bagi pengguna komputer.
Ethics in computing means moral guidelines
to refer to when using the computer and
computer networks.
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 5/25
Undang-undang (Law )
Undang-undang siber menerangkan
mengenai isu-isu undang-undang berkenaandengan penggunaan teknologi maklumat
antara rangkaian.
Cyber law refers to all areas in law that
requires on understanding of computertechnology such as hardware, software and
internet.
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 6/25
Kesamaan antara etika dan undang-
undang
Kedua-dua adalah sama dari segi:
– Untuk mengawal pengguna komputer daripadamenyalahgunakan komputer.
– Untuk menghasilkan masyarakat komputer yang
sihat.
– Untuk mengelakkan berlakunya jenayahkomputer.
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 7/25
Sim i lar i t ies between ethics and law
Both ethics and law are complementary to
each other and are made: – To guide user from misusing computers
– To create a healthy computer society. So that
computers are used to contribute to better life
– To prevent any crime
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 8/25
Perbezaan antara etika dan undang-
undang
Sebagai garis panduan
kepada pengguna komputer.
Pengguna komputer adalah
bebas untuk mengikut etika atau
tidak.
Tiada hukuman dikenakankepada sesiapa yang
melanggarnya.
Boleh diikuti semua tempat di
dunia.
Sebagai peraturan untuk
mengawal pengguna komputer.
Pengguna komputer mesti
mematuhinya.
Ada hukuman.
Bergantung kepada negara
yang terbabit.
Etika Undang-undang
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 9/25
Different iat ion between ethics and law
As a guideline to computer
users
Computer users are free to
follow the code of ethics
No punishment for anyone
who violates ethicsUniversal, can be applied
anywhere, all over the world
As a rule to control computer
users
Computer users must follow
the regulations and law
Punishments for those who
break the lawDepend on country and state
where the crime is committed
Ethics Law
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 10/25
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 11/25
Hak milik intelektual
(In tel lec tual Property )
Hak milik intelektual merujuk kepada kerja
yang dibuat oleh pencipta seperti artis,pembuat program dan sebagainya.
Refers to works created by inventors, authors
and artists.
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 12/25
Keperluan dalam menjaga Hak
milik intelektual
Perniagaan berkembang secara global dimana pemilik
mesti sedar kepentingan mendapatkan khidmat
nasihat bagaimana menjaga hak milik mereka. inimerangkumi
o Identiti Produk
o Hakcipta
o Paten
o Rekabentuk
oTrademarks For Brand Identity
oCopyrights For Materials
oPatents For InventionsoDesign For Product Appearance
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 13/25
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 14/25
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 15/25
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 16/25
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 17/25
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 18/25
Privasi
Keupayaan seseorang untuk mengelakkan
maklumat mereka daripada diketahui oleh orang
lain.
Privasi IT merujuk kepada privasi data and informasi
Privasi dapat dilindungi oleh:
– Undang-undang (Examples: security management or security
services)
– Utility Program (Examples: firewall or antivirus)
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 19/25
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 20/25
(B) Perisian Utiliti
- Menginstall program Anti Spam, Dinding Api(firewall), Anti Perisik dan Antivirus
- Membeli barangan secara tunai
- Menghilangkan sejarah carian internetapabila selesai melayari internet
- Hanya mengisi perkara yang perlu dalamborang internet.
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 21/25
Authentication
Is a process where users verify that they are
who they say they are Two common methods of authentication:
– Callback system
– Biometric device (Examples: fingerprint recognition or
voice recognition)
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 22/25
Verification
Is the act of proving or disproving the
correctness of a system with respect to acertain formal specification.
Two common methods of verification:
– User identification (example: key in user name, showing
exam slip or passport) – Processed object (example: check security card to enter
building or show driver’s license to identify valid driver)
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 23/25
8/12/2019 Ethics and Law in computing
http://slidepdf.com/reader/full/ethics-and-law-in-computing 24/25