25
 

Ethics and Law in computing

Embed Size (px)

Citation preview

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 1/25

 

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 2/25

 

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 3/25

Ethics and Law in computing

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 4/25

Etika (Ethics)  

Etika komputer adalah sistem berkaitan

standard moral atau nilai yang digunakansebagai panduan bagi pengguna komputer.

Ethics in computing means moral guidelines

to refer to when using the computer and

computer networks.

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 5/25

Undang-undang (Law )

Undang-undang siber  menerangkan

mengenai isu-isu undang-undang berkenaandengan penggunaan teknologi maklumat

antara rangkaian.

Cyber law refers to all areas in law that

requires on understanding of computertechnology such as hardware, software and

internet.

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 6/25

Kesamaan antara etika dan undang-

undang

Kedua-dua adalah sama dari segi:

 – Untuk mengawal pengguna komputer daripadamenyalahgunakan komputer.

 – Untuk menghasilkan masyarakat komputer yang

sihat.

 – Untuk mengelakkan berlakunya jenayahkomputer.

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 7/25

Sim i lar i t ies between ethics and law

Both ethics and law are complementary to

each other and are made: – To guide user from misusing computers

 – To create a healthy computer society. So that

computers are used to contribute to better life

 – To prevent any crime

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 8/25

Perbezaan antara etika dan undang-

undang

Sebagai garis panduan

kepada pengguna komputer.

Pengguna komputer adalah

bebas untuk mengikut etika atau

tidak.

Tiada hukuman dikenakankepada sesiapa yang

melanggarnya.

Boleh diikuti semua tempat di

dunia.

Sebagai peraturan untuk

mengawal pengguna komputer.

Pengguna komputer mesti

mematuhinya.

 Ada hukuman.

Bergantung kepada negara

yang terbabit.

Etika Undang-undang

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 9/25

Different iat ion between ethics and law

 As a guideline to computer

users

Computer users are free to

follow the code of ethics

No punishment for anyone

who violates ethicsUniversal, can be applied

anywhere, all over the world

 As a rule to control computer

users

Computer users must follow

the regulations and law

Punishments for those who

break the lawDepend on country and state

where the crime is committed

Ethics Law

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 10/25

 

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 11/25

Hak milik intelektual

(In tel lec tual Property )

Hak milik intelektual merujuk kepada kerja

yang dibuat oleh pencipta seperti artis,pembuat program dan sebagainya.

Refers to works created by inventors, authors

and artists.

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 12/25

Keperluan dalam menjaga Hak

milik intelektual

Perniagaan berkembang secara global dimana pemilik

mesti sedar kepentingan mendapatkan khidmat

nasihat bagaimana menjaga hak milik mereka. inimerangkumi

o Identiti Produk

o Hakcipta

o Paten

o Rekabentuk

oTrademarks For Brand Identity

oCopyrights For Materials

oPatents For InventionsoDesign For Product Appearance

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 13/25

 

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 14/25

 

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 15/25

 

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 16/25

 

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 17/25

 

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 18/25

Privasi

Keupayaan seseorang untuk mengelakkan

maklumat mereka daripada diketahui oleh orang

lain.

Privasi IT merujuk kepada privasi data and informasi

Privasi dapat dilindungi oleh:

 – Undang-undang (Examples: security management or security

services)

 – Utility Program (Examples: firewall or antivirus)

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 19/25

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 20/25

(B) Perisian Utiliti 

- Menginstall program Anti Spam, Dinding Api(firewall), Anti Perisik dan Antivirus

- Membeli barangan secara tunai

- Menghilangkan sejarah carian internetapabila selesai melayari internet

- Hanya mengisi perkara yang perlu dalamborang internet.

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 21/25

Authentication

Is a process where users verify that they are

who they say they are Two common methods of authentication:

 – Callback system

 – Biometric device (Examples: fingerprint recognition or

voice recognition)

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 22/25

Verification

Is the act of proving or disproving the

correctness of a system with respect to acertain formal specification.

Two common methods of verification:

 – User identification (example: key in user name, showing

exam slip or passport) – Processed object (example: check security card to enter

building or show driver’s license to identify valid driver) 

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 23/25

 

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 24/25

 

8/12/2019 Ethics and Law in computing

http://slidepdf.com/reader/full/ethics-and-law-in-computing 25/25