kamko 20

Level of risk

•No amount of security measures will completely remove the vulnerability of a computer center or an information system. Each company must determine the level of risk it is willing to accept.
Pustaka
•Living with Computers, version 5.0, Patrick G. Mc. Keown, The Dryden Press, Harcourt Brace College Publishers.
Review
•A computer crime is an illegal act that requires special knowledge of computer technology; computer security comprises the methods used to protect the computer, the data, and user from natural and criminal forces.
•Some experts feel it is impossible to accurate estimate the magnitude of computer crime because so much of it goes unnoticed or unreported.

kamko 19

Data communications

•The mere existence of data communications capabilities, where data are transmitted via communication links from one computer to another, poses a threat to security. Some companies use cryptography – encryption /decryption hardware that scrambles and unscrambles messages.
personnel
•Managers are paying close attention to who gets hired for positions with access to computer-based information systems and sensitive data.
Information systems security
•Diklasifikasi: fisikal dan logikal. Yang pertama terkait hardware,  facilities, magnetic disks, dan lain-lain yang bisa diakses ilegal, dicuri, dihancurkan.
•Logical security is built into the software by permitting only authorized persons to access and use the system. Logical security for on-line systems is acheived primarily by passwords and authorization codes.

kamko 18

Threats take many form

•White collar crime, natural disasters (earthquakes, floods), vandalism, and carelessnes.
•Computer center security: hardware à jika perangkat keras fails, gagal maka MIS fails. Ancaman kegagalan dapat diminimalkan oleh implementing security precautions that prevent access by unauthorized personnel and by taking steps to keep all hardware operational.
software
•Unless properly controlled, the software for an MIS can be modified for personal gain. Thus, close control over software development and the documentation of an MIS is needed to minimize the opportunity for computer crime. Operational control procedures that are built into the design of an MIS will constantly monitor processing accuracy.
File /data bases
•The data base contains the raw material for information. The files /data bases are the life blood of a company and must be protected.

kamko 17

franking privileges

•Legislator à fasilitas free mail. Is massive amount of correspondence an attempt to better inform the constituents, or is it politically motivated and an abuse of the power of the computer?
•Is this application a violation of code of ethics?
Computer-center and system security
•Pertimbangan terpenting dalam membangun dan mengoperasikan sistem informasi adalah keamaan. Semakin lama sistem go on-line, banyak orang yang mengakses sistem.
•Perusahaan harus extremely careful untuk tidak berkompromi terhadap integritas sistem. Sistem informasi mempunyai beberapa point of vulnerability and too much is at stake to overlook the threats to the security of an information system and computer center.

kamko 16

computerized dialers

•Sistem ini digunakan oleh telemarketing dari berbagai produk. Apakah ini invasi terhadap privasi individual?
•Berapa banyak dari kita yang menerima, welcome, kesempatan mendengarkan pesan komersial? Apakah telemarketing melanggar code of ethics?
copyrighted software
•Misalnya dibeli electronic spreadsheet software package. The purchase agreement permits the use of the software on any micro at the office or at his home.
•Biasanya purchase agreement melarang secara tegas penggandaan copyrighted software untuk keperluan selain back up. Bagai mana jikalau ada teman dekat orang tersebut minta copy? Apakah langgar kode etik?

kamko 15

5) … System integrity at all times;

•6) Do not violate the rights or privacy of others; 7) Accomplish each task to the best of your ability; 8) Do not break the law.
•If you follow this eight-point code, it is unlikely that anyone will question your ethics. Nevertheless, well-meaning people routinely violate this simple code because they are unaware of the tremendous detrimental impact of their actions.
With the speed and power of computer
•A minor code infraction easily can be magnified into a costly catastrophe. Kasus implikasi etika aplikasi teknologi informasi: 1) computerized dialers; 2) copyrighted software; 3) franking privileges.
•Kasus 1: sistem otomatis menelpon dan memainkan pesan yang sudah direkam. Nomor telpon dimasukkan ke sistem. Jika tiada jawaban, ditelpon lagi di lain waktu.

kamko 14

It is more the rule than the

•Exception that a computer professional will have ready access to a broad range of sensitive information, both personal and corporate.
•Because of the potential for the abuse of this information, some professional societies have adopted a code of ethics.
The following code of ethics
•Is in keeping with the spirit of those encouraged by computer societies: 1) Maintain the hightest standard of professional behavior; 2) Avoid situations that create a conflict of interest; 3) Do not violate the confidentiality of your employer or those you service; 4) Continue to learn so your knowledge keeps pace with the technology; 5) Use information judiciously and maintain …

kamko 13

Ethics and Computers

•Computer-professional societies adopted a code of ethics. The code warns members that they can be expelled or censured if they violate it.
•Other professional societies publish a code of ethics as well, and they too rarely or never take action against delinquent members.
A carefully drafted code of ethics
•Provides some guidelines for conduct, but professional societies cannot be expected to police  the misdoings of their membership. In many instances, a code violation is also a violation of the law.
•A code of ethics provides direction for computer professionals and users so that they act responsibly in their application of computer technology.