SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
Chapter 9
Social Networking
Ethics in Information Technology, Fourth Edition
Donaya Pasha, S.Kom., M.Kom., MOS.
Objectives
Ethics in InformationTechnology, Fourth Edition2
• As you read this chapter, consider the following questions:
• What are social networks, how do people use them, and what
are some of their practical business uses?
• What are some of the key ethical issues associated with the use
of social networkingWeb sites?
• What is a virtual life community, and what are some of the
ethical issues associated with such a community?
What Is a Social Networking Web Site?
Ethics in InformationTechnology, Fourth Edition3
• Creates an online community of Internet users that
eliminates barriers created by time, distance, and cultural
differences
• Allows people to interact with others online by sharing
opinions, insights, information, interests, and experiences
• Members may use the site to interact with friends, family
members, and colleagues they already know
• Members may also wish to develop new personal and
professional relationships
Ethics in InformationTechnology, Fourth Edition4
Ethics in InformationTechnology, Fourth Edition5
What Is a Social Networking Web Site?
(cont’d.)
Ethics in InformationTechnology, Fourth Edition6
• Endless range of interests and a wide range of social
networkingWeb sites catering to those interests
• Over 314.5 million social network users worldwide
• Average visitor spends almost six hours per month
• Popularity increasing mostly rapidly among those aged 50
and older
Business Applications of Online Social
Networking
Ethics in InformationTechnology, Fourth Edition7
• Social network advertising
• Uses social networks to communicate and promote the benefits
of products and services
• Social network advertising strategies
• Direct advertising
• Banner ads on social networkingWeb site
• Advertising using an individual’s network of friends
• People frequently make decisions based on input from their close group
of friends
• Ethical issues with exploiting an individual’s personal relationships for the
financial benefit of a company
Business Applications of Online Social
Networking (cont’d.)
Ethics in InformationTechnology, Fourth Edition8
• Social network advertising strategies (cont’d.)
• Indirect advertising through groups
• Interested users can join by becoming “fans”
• Fans gained in this manner may not remain loyal
• Company-owned social networkingWeb site
• Users can talk about what new products, services, or improvements they
would like to see
• Viral marketing
• Users pass along marketing message to others, creating the potential for
exponential growth
The Use of Social Networks in the
Hiring Process
Ethics in InformationTechnology, Fourth Edition9
• 89% of recruiters use some form of social media in the
recruiting process
• Employers can and do look at the social networking profiles
of job candidates when hiring
• Companies may reject candidates who post:
• Information about their drinking or drug use
• Provocative or inappropriate photos
• Discriminatory remarks relating to race, gender, or religion
• Confidential information
The Use of Social Networks in the
Hiring Process (cont’d.)
Ethics in InformationTechnology, Fourth Edition10
• Employer cannot legally screen applicants based on race or
ethnicity, but:
• Members of social networkingWeb sites frequently provide sex,
age, marital status, sexual orientation, religion, and political
affiliation data
• Personal photos may reveal a disability or user’s race or
ethnicity
• Individuals may reveal data that are protected by civil rights
legislation
Use of Social Media to Improve
Customer Service
Ethics in InformationTechnology, Fourth Edition11
• Consumers use social networks to share their experiences,
both good and bad, with others
• Also seek help and advice on how to use products more
effectively and how to deal with special situations
• Unless organizations monitor social networks, customers are
left to resolve questions and issues on their own, risking loss
of customers and future sales
Social Shopping Web Sites
Ethics in InformationTechnology, Fourth Edition12
• Combine two highly popular online activities: shopping and
social networking
• Shoppers and sellers can share information and make
recommendations while shopping online
• Revenue is generated through retailer advertising or by
sharing with retailers data about their members’ likes and
dislikes
• Retailers can design product improvements based on input
and get ideas for new product lines
• Great way for small businesses to boost sales
Ethics in InformationTechnology, Fourth Edition13
Social Networking Ethical Issues
Ethics in InformationTechnology, Fourth Edition14
• Ethical issues for social networkingWeb sites are:
• Cyberbullying
• Cyberstalking
• Sexual predators
• Uploading inappropriate material
• Cyberbullying
• Harassment, torment, humiliation, or threatening of one minor
by another minor or group of minors via the Internet or cell
phone
• Cyberbullying can become so intense, child commits suicide
Ethics in InformationTechnology, Fourth Edition15
Social Networking Ethical Issues
(cont’d.)
Ethics in InformationTechnology, Fourth Edition16
• Numerous forms of cyberbullying
• Sending mean-spirited or threatening messages
• Sending thousands of text messages to victim’s cell phone and
running up a huge cell phone bill
• Impersonating victim and sending inappropriate messages to
others
• Stealing victim’s password and modifying his or her profile to
include racist, homophobic, sexual, or other inappropriate data
that offends others or attracts the attention of undesirable
people
Social Networking Ethical Issues
(cont’d.)
Ethics in InformationTechnology, Fourth Edition17
• Numerous forms of cyberbullying (cont’d.)
• Posting mean, personal, or false information about the victim in
the cyberbully’s blog
• Creating aWeb site whose purpose is to humiliate or threaten
the victim
• Taking inappropriate photos of the victim and either posting
online or sending to others via cell phone
• Setting up an Internet poll to elicit responses to embarrassing
questions regarding victim
• Sending inappropriate messages while playing interactive games
Social Networking Ethical Issues
(cont’d.)
Ethics in InformationTechnology, Fourth Edition18
• Cyberstalking
• Threatening behavior or unwanted advances using the Internet
or online and electronic communications
• Adult version of cyberbullying
• Can escalate into:
• Abusive or excessive phone calls
• Threatening or obscene mail
• Trespassing
• Vandalism
• Physical stalking
• Physical assault
Social Networking Ethical Issues
(cont’d.)
Ethics in InformationTechnology, Fourth Edition19
• Cyberstalking (cont’d.)
• Over three dozen states have laws prohibiting cyberstalking
• Current federal statues address some forms of cyberstalking,
but there are large gaps in federal and state law
Social Networking Ethical Issues
(cont’d.)
Ethics in InformationTechnology, Fourth Edition20
• Encounters with sexual predators
• Some social networkingWeb sites are criticized for not
protecting minors from sexual predators
• MySpace banned 90,000 registered sex offenders from its site
• Legislators are pushing social networkingWeb sites to adopt
stronger safety measures
Social Networking Ethical Issues
(cont’d.)
Ethics in InformationTechnology, Fourth Edition21
• Uploading of inappropriate material
• Social networkingWeb sites have policies against uploading
videos depicting violence or obscenity
• Most social networkingWeb sites have terms of use agreements
that give the sites the right to delete material and terminate
users accounts that violate their policy
• MostWeb sites do not have sufficient resources to review all
material posted
Online Virtual Worlds
Ethics in InformationTechnology, Fourth Edition22
• Virtual world is a shared multimedia, computer-generated
environment in which users represented by avatars can act,
communicate, create, retain ownership of what they create,
and exchange assets with each other
• Massively multiplayer online game (MMOG) is multiplayer
video game capable of supporting hundreds or even thousands
of concurrent players
• Massively multiplayer online role playing game (MMORPG) provides
huge online world in which players take on the role of a character and
control that character’s action
Online Virtual Worlds (cont’d.)
Ethics in InformationTechnology, Fourth Edition23
• Avatars can do everything one can do in real life
• Shop, hold jobs, run for political office
• Develop relationships with other avatars
• Start up new businesses
• Engage in criminal activities
Crime in Virtual Worlds
Ethics in InformationTechnology, Fourth Edition24
• Should law enforcement—real or virtual—get involved in
acts that occur in virtual worlds?
• Criminal acts in a virtual world:
• Can be clearly illegal, such as trafficking in actual drugs or
stolen credit cards
• May not be real-life crime, such as virtual muggings and sex
crimes that can cause real life anguish
• May be in the gray area, for example, unfair operation of virtual
casinos
Crime in Virtual Worlds (cont’d)
Ethics in InformationTechnology, Fourth Edition25
• Virtual worlds have rules against offensive behavior in public,
such as using racial slurs or performing overtly sexual
actions, but:
• Consenting adults can travel to private areas and engage in
socially unacceptable behavior
• Bad deeds done online can often be mediated by game
administrators based on rules of the game
Educational and Business Uses of
Virtual Worlds
Ethics in InformationTechnology, Fourth Edition26
• New Media Consortium (NMC)
• International consortium of hundreds of organizations
• Explores new media and technologies to improve teaching,
learning, and creative expression
• Also builds custom virtual learning worlds, simulations, and
learning games
Educational and Business Uses of
Virtual Worlds
Ethics in InformationTechnology, Fourth Edition27
• Second LifeWork Microsites
• Enable businesses and government agencies to use Second Life
for virtual meetings, events, training, and simulations
• Stimulates engaged, collaborative learning to augment their
traditional curriculum
Summary
Ethics in InformationTechnology, Fourth Edition28
• Social networkingWeb sites
• Create an online community of Internet users
• Break down barriers created by time, distance, and cultural
differences
• Allow people to interact with others online by sharing opinions,
insights, information, interests, and experiences
• Social network advertising uses social networks to inform,
promote, and communicate the benefits of products and
services
Summary (cont’d.)
Ethics in InformationTechnology, Fourth Edition29
• Social network advertising strategies
• Direct advertising
• Advertising using network of friends
• Indirect advertising through groups
• Advertising via company-ownedWeb sites
• Viral marketing
• Employers look at the social network profiles of job
candidates when hiring
Summary (cont’d)
Ethics in InformationTechnology, Fourth Edition30
• Consumers use social networks to share their experiences and
seek help and advice
• Unless organizations monitor social networks, customers are
left to resolve questions and issues on their own, risking loss of
customers and future sales
• Ethical issues for social networkingWeb sites are:
• Cyberbullying
• Cyberstalking
• Sexual predators
• Uploading inappropriate material
Summary (cont’d.)
Ethics in InformationTechnology, Fourth Edition31
• Online virtual world is a computer-simulated world
• Visitor can move in three-dimensional space
• Visitor can communicate and interact with other visitors
• Visitor can manipulate elements of the simulated world

Contenu connexe

Tendances (20)

Ethic02
Ethic02Ethic02
Ethic02
 
Living in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxLiving in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptx
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
TIAD 2016 : Ethics in software development
TIAD 2016 : Ethics in software developmentTIAD 2016 : Ethics in software development
TIAD 2016 : Ethics in software development
 
History of computer crime
History of computer crimeHistory of computer crime
History of computer crime
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide Web
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printing
 
Lesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxLesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptx
 
Footprinting
FootprintingFootprinting
Footprinting
 
Digital Ethics
Digital EthicsDigital Ethics
Digital Ethics
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Server operating system
Server operating systemServer operating system
Server operating system
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Security & Privacy of Information Technology
Security & Privacy of Information TechnologySecurity & Privacy of Information Technology
Security & Privacy of Information Technology
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Digital law
Digital lawDigital law
Digital law
 
NMap
NMapNMap
NMap
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
Chapter 8_dp-pertemuan_12-13
 Chapter 8_dp-pertemuan_12-13 Chapter 8_dp-pertemuan_12-13
Chapter 8_dp-pertemuan_12-13
 

Similaire à Chapter 9_dp-pertemuan_14

7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetejNishaTariq1
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttwNishaTariq1
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentationshannoncmorris
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
Media law for community journalists and bloggers
Media law for community journalists and bloggersMedia law for community journalists and bloggers
Media law for community journalists and bloggersjtownend
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
The Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social MediaThe Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social Mediajlipsey
 
Longmeadow 2012
Longmeadow 2012Longmeadow 2012
Longmeadow 2012Tish Grier
 
Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Pod Legal
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)Pod Legal
 
Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01overcertified
 

Similaire à Chapter 9_dp-pertemuan_14 (20)

Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 
4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Media law for community journalists and bloggers
Media law for community journalists and bloggersMedia law for community journalists and bloggers
Media law for community journalists and bloggers
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Industry 4.0 for Society 5.0
Industry 4.0 for Society 5.0Industry 4.0 for Society 5.0
Industry 4.0 for Society 5.0
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
The Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social MediaThe Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social Media
 
Longmeadow 2012
Longmeadow 2012Longmeadow 2012
Longmeadow 2012
 
Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01
 

Plus de UNIVERSITAS TEKNOKRAT INDONESIA

Chapter 11 pertemuan 15- donpas - it business and ethic.ppt
Chapter 11 pertemuan 15- donpas - it business and ethic.pptChapter 11 pertemuan 15- donpas - it business and ethic.ppt
Chapter 11 pertemuan 15- donpas - it business and ethic.pptUNIVERSITAS TEKNOKRAT INDONESIA
 
Chapter 08 pertemuan 12 - donpas - lanjutan pengenalan e-business and e-comme...
Chapter 08 pertemuan 12 - donpas - lanjutan pengenalan e-business and e-comme...Chapter 08 pertemuan 12 - donpas - lanjutan pengenalan e-business and e-comme...
Chapter 08 pertemuan 12 - donpas - lanjutan pengenalan e-business and e-comme...UNIVERSITAS TEKNOKRAT INDONESIA
 
Chapter 08 pertemuan 11- donpas - e-business dan e-commerce
Chapter 08 pertemuan 11- donpas - e-business dan e-commerceChapter 08 pertemuan 11- donpas - e-business dan e-commerce
Chapter 08 pertemuan 11- donpas - e-business dan e-commerceUNIVERSITAS TEKNOKRAT INDONESIA
 
Chapter 07 pertemuan 9- donpas - keunggulan kompetitif ti dan si strategis
Chapter 07 pertemuan 9- donpas - keunggulan kompetitif ti dan si strategisChapter 07 pertemuan 9- donpas - keunggulan kompetitif ti dan si strategis
Chapter 07 pertemuan 9- donpas - keunggulan kompetitif ti dan si strategisUNIVERSITAS TEKNOKRAT INDONESIA
 
Chapter 4 pertemuan 6- donpas - infrastruktur teknologi informasi
Chapter 4 pertemuan 6- donpas - infrastruktur teknologi informasiChapter 4 pertemuan 6- donpas - infrastruktur teknologi informasi
Chapter 4 pertemuan 6- donpas - infrastruktur teknologi informasiUNIVERSITAS TEKNOKRAT INDONESIA
 
Chapter 01 pertemuan 1&2- donpas - konsep dasar sistem komputer dan ti
Chapter 01 pertemuan 1&2- donpas - konsep dasar sistem komputer dan tiChapter 01 pertemuan 1&2- donpas - konsep dasar sistem komputer dan ti
Chapter 01 pertemuan 1&2- donpas - konsep dasar sistem komputer dan tiUNIVERSITAS TEKNOKRAT INDONESIA
 

Plus de UNIVERSITAS TEKNOKRAT INDONESIA (18)

Chapter 11 pertemuan 15- donpas - it business and ethic.ppt
Chapter 11 pertemuan 15- donpas - it business and ethic.pptChapter 11 pertemuan 15- donpas - it business and ethic.ppt
Chapter 11 pertemuan 15- donpas - it business and ethic.ppt
 
Chapter 10 pertemuan 14- donpas - computer security
Chapter 10 pertemuan 14- donpas - computer securityChapter 10 pertemuan 14- donpas - computer security
Chapter 10 pertemuan 14- donpas - computer security
 
Chapter 09 pertemuan 13- donpas - mobile computing
Chapter 09  pertemuan 13- donpas - mobile computingChapter 09  pertemuan 13- donpas - mobile computing
Chapter 09 pertemuan 13- donpas - mobile computing
 
Chapter 08 pertemuan 12 - donpas - lanjutan pengenalan e-business and e-comme...
Chapter 08 pertemuan 12 - donpas - lanjutan pengenalan e-business and e-comme...Chapter 08 pertemuan 12 - donpas - lanjutan pengenalan e-business and e-comme...
Chapter 08 pertemuan 12 - donpas - lanjutan pengenalan e-business and e-comme...
 
Chapter 08 pertemuan 11- donpas - e-business dan e-commerce
Chapter 08 pertemuan 11- donpas - e-business dan e-commerceChapter 08 pertemuan 11- donpas - e-business dan e-commerce
Chapter 08 pertemuan 11- donpas - e-business dan e-commerce
 
Chapter 07 pertemuan 9- donpas - keunggulan kompetitif ti dan si strategis
Chapter 07 pertemuan 9- donpas - keunggulan kompetitif ti dan si strategisChapter 07 pertemuan 9- donpas - keunggulan kompetitif ti dan si strategis
Chapter 07 pertemuan 9- donpas - keunggulan kompetitif ti dan si strategis
 
Chapter 06 pertemuan 8- donpas - ti dan decision making
Chapter 06 pertemuan 8- donpas - ti dan decision makingChapter 06 pertemuan 8- donpas - ti dan decision making
Chapter 06 pertemuan 8- donpas - ti dan decision making
 
Chapter 05 pertemuan 7- donpas - manajemen data
Chapter 05 pertemuan 7- donpas - manajemen dataChapter 05 pertemuan 7- donpas - manajemen data
Chapter 05 pertemuan 7- donpas - manajemen data
 
Chapter 4 pertemuan 6- donpas - infrastruktur teknologi informasi
Chapter 4 pertemuan 6- donpas - infrastruktur teknologi informasiChapter 4 pertemuan 6- donpas - infrastruktur teknologi informasi
Chapter 4 pertemuan 6- donpas - infrastruktur teknologi informasi
 
Chapter 03 pertemuan 4- donpas- concept and management
Chapter 03  pertemuan 4- donpas- concept and managementChapter 03  pertemuan 4- donpas- concept and management
Chapter 03 pertemuan 4- donpas- concept and management
 
Chapter 02 pertemuan 3- donpas-pti - software
Chapter 02 pertemuan 3- donpas-pti - softwareChapter 02 pertemuan 3- donpas-pti - software
Chapter 02 pertemuan 3- donpas-pti - software
 
Chapter 01 pertemuan 1&2- donpas - konsep dasar sistem komputer dan ti
Chapter 01 pertemuan 1&2- donpas - konsep dasar sistem komputer dan tiChapter 01 pertemuan 1&2- donpas - konsep dasar sistem komputer dan ti
Chapter 01 pertemuan 1&2- donpas - konsep dasar sistem komputer dan ti
 
Chapter 10_dp-pertemuan_15-16
 Chapter 10_dp-pertemuan_15-16 Chapter 10_dp-pertemuan_15-16
Chapter 10_dp-pertemuan_15-16
 
Chapter 7_dp-pertemuan_11
 Chapter 7_dp-pertemuan_11 Chapter 7_dp-pertemuan_11
Chapter 7_dp-pertemuan_11
 
Chapter 6_dp-pertemuan_9
 Chapter 6_dp-pertemuan_9 Chapter 6_dp-pertemuan_9
Chapter 6_dp-pertemuan_9
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
Chapter 2_dp-pertemuan 2&3
 Chapter 2_dp-pertemuan 2&3 Chapter 2_dp-pertemuan 2&3
Chapter 2_dp-pertemuan 2&3
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
 

Dernier

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Dernier (20)

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

Chapter 9_dp-pertemuan_14

  • 1. Chapter 9 Social Networking Ethics in Information Technology, Fourth Edition Donaya Pasha, S.Kom., M.Kom., MOS.
  • 2. Objectives Ethics in InformationTechnology, Fourth Edition2 • As you read this chapter, consider the following questions: • What are social networks, how do people use them, and what are some of their practical business uses? • What are some of the key ethical issues associated with the use of social networkingWeb sites? • What is a virtual life community, and what are some of the ethical issues associated with such a community?
  • 3. What Is a Social Networking Web Site? Ethics in InformationTechnology, Fourth Edition3 • Creates an online community of Internet users that eliminates barriers created by time, distance, and cultural differences • Allows people to interact with others online by sharing opinions, insights, information, interests, and experiences • Members may use the site to interact with friends, family members, and colleagues they already know • Members may also wish to develop new personal and professional relationships
  • 6. What Is a Social Networking Web Site? (cont’d.) Ethics in InformationTechnology, Fourth Edition6 • Endless range of interests and a wide range of social networkingWeb sites catering to those interests • Over 314.5 million social network users worldwide • Average visitor spends almost six hours per month • Popularity increasing mostly rapidly among those aged 50 and older
  • 7. Business Applications of Online Social Networking Ethics in InformationTechnology, Fourth Edition7 • Social network advertising • Uses social networks to communicate and promote the benefits of products and services • Social network advertising strategies • Direct advertising • Banner ads on social networkingWeb site • Advertising using an individual’s network of friends • People frequently make decisions based on input from their close group of friends • Ethical issues with exploiting an individual’s personal relationships for the financial benefit of a company
  • 8. Business Applications of Online Social Networking (cont’d.) Ethics in InformationTechnology, Fourth Edition8 • Social network advertising strategies (cont’d.) • Indirect advertising through groups • Interested users can join by becoming “fans” • Fans gained in this manner may not remain loyal • Company-owned social networkingWeb site • Users can talk about what new products, services, or improvements they would like to see • Viral marketing • Users pass along marketing message to others, creating the potential for exponential growth
  • 9. The Use of Social Networks in the Hiring Process Ethics in InformationTechnology, Fourth Edition9 • 89% of recruiters use some form of social media in the recruiting process • Employers can and do look at the social networking profiles of job candidates when hiring • Companies may reject candidates who post: • Information about their drinking or drug use • Provocative or inappropriate photos • Discriminatory remarks relating to race, gender, or religion • Confidential information
  • 10. The Use of Social Networks in the Hiring Process (cont’d.) Ethics in InformationTechnology, Fourth Edition10 • Employer cannot legally screen applicants based on race or ethnicity, but: • Members of social networkingWeb sites frequently provide sex, age, marital status, sexual orientation, religion, and political affiliation data • Personal photos may reveal a disability or user’s race or ethnicity • Individuals may reveal data that are protected by civil rights legislation
  • 11. Use of Social Media to Improve Customer Service Ethics in InformationTechnology, Fourth Edition11 • Consumers use social networks to share their experiences, both good and bad, with others • Also seek help and advice on how to use products more effectively and how to deal with special situations • Unless organizations monitor social networks, customers are left to resolve questions and issues on their own, risking loss of customers and future sales
  • 12. Social Shopping Web Sites Ethics in InformationTechnology, Fourth Edition12 • Combine two highly popular online activities: shopping and social networking • Shoppers and sellers can share information and make recommendations while shopping online • Revenue is generated through retailer advertising or by sharing with retailers data about their members’ likes and dislikes • Retailers can design product improvements based on input and get ideas for new product lines • Great way for small businesses to boost sales
  • 14. Social Networking Ethical Issues Ethics in InformationTechnology, Fourth Edition14 • Ethical issues for social networkingWeb sites are: • Cyberbullying • Cyberstalking • Sexual predators • Uploading inappropriate material • Cyberbullying • Harassment, torment, humiliation, or threatening of one minor by another minor or group of minors via the Internet or cell phone • Cyberbullying can become so intense, child commits suicide
  • 16. Social Networking Ethical Issues (cont’d.) Ethics in InformationTechnology, Fourth Edition16 • Numerous forms of cyberbullying • Sending mean-spirited or threatening messages • Sending thousands of text messages to victim’s cell phone and running up a huge cell phone bill • Impersonating victim and sending inappropriate messages to others • Stealing victim’s password and modifying his or her profile to include racist, homophobic, sexual, or other inappropriate data that offends others or attracts the attention of undesirable people
  • 17. Social Networking Ethical Issues (cont’d.) Ethics in InformationTechnology, Fourth Edition17 • Numerous forms of cyberbullying (cont’d.) • Posting mean, personal, or false information about the victim in the cyberbully’s blog • Creating aWeb site whose purpose is to humiliate or threaten the victim • Taking inappropriate photos of the victim and either posting online or sending to others via cell phone • Setting up an Internet poll to elicit responses to embarrassing questions regarding victim • Sending inappropriate messages while playing interactive games
  • 18. Social Networking Ethical Issues (cont’d.) Ethics in InformationTechnology, Fourth Edition18 • Cyberstalking • Threatening behavior or unwanted advances using the Internet or online and electronic communications • Adult version of cyberbullying • Can escalate into: • Abusive or excessive phone calls • Threatening or obscene mail • Trespassing • Vandalism • Physical stalking • Physical assault
  • 19. Social Networking Ethical Issues (cont’d.) Ethics in InformationTechnology, Fourth Edition19 • Cyberstalking (cont’d.) • Over three dozen states have laws prohibiting cyberstalking • Current federal statues address some forms of cyberstalking, but there are large gaps in federal and state law
  • 20. Social Networking Ethical Issues (cont’d.) Ethics in InformationTechnology, Fourth Edition20 • Encounters with sexual predators • Some social networkingWeb sites are criticized for not protecting minors from sexual predators • MySpace banned 90,000 registered sex offenders from its site • Legislators are pushing social networkingWeb sites to adopt stronger safety measures
  • 21. Social Networking Ethical Issues (cont’d.) Ethics in InformationTechnology, Fourth Edition21 • Uploading of inappropriate material • Social networkingWeb sites have policies against uploading videos depicting violence or obscenity • Most social networkingWeb sites have terms of use agreements that give the sites the right to delete material and terminate users accounts that violate their policy • MostWeb sites do not have sufficient resources to review all material posted
  • 22. Online Virtual Worlds Ethics in InformationTechnology, Fourth Edition22 • Virtual world is a shared multimedia, computer-generated environment in which users represented by avatars can act, communicate, create, retain ownership of what they create, and exchange assets with each other • Massively multiplayer online game (MMOG) is multiplayer video game capable of supporting hundreds or even thousands of concurrent players • Massively multiplayer online role playing game (MMORPG) provides huge online world in which players take on the role of a character and control that character’s action
  • 23. Online Virtual Worlds (cont’d.) Ethics in InformationTechnology, Fourth Edition23 • Avatars can do everything one can do in real life • Shop, hold jobs, run for political office • Develop relationships with other avatars • Start up new businesses • Engage in criminal activities
  • 24. Crime in Virtual Worlds Ethics in InformationTechnology, Fourth Edition24 • Should law enforcement—real or virtual—get involved in acts that occur in virtual worlds? • Criminal acts in a virtual world: • Can be clearly illegal, such as trafficking in actual drugs or stolen credit cards • May not be real-life crime, such as virtual muggings and sex crimes that can cause real life anguish • May be in the gray area, for example, unfair operation of virtual casinos
  • 25. Crime in Virtual Worlds (cont’d) Ethics in InformationTechnology, Fourth Edition25 • Virtual worlds have rules against offensive behavior in public, such as using racial slurs or performing overtly sexual actions, but: • Consenting adults can travel to private areas and engage in socially unacceptable behavior • Bad deeds done online can often be mediated by game administrators based on rules of the game
  • 26. Educational and Business Uses of Virtual Worlds Ethics in InformationTechnology, Fourth Edition26 • New Media Consortium (NMC) • International consortium of hundreds of organizations • Explores new media and technologies to improve teaching, learning, and creative expression • Also builds custom virtual learning worlds, simulations, and learning games
  • 27. Educational and Business Uses of Virtual Worlds Ethics in InformationTechnology, Fourth Edition27 • Second LifeWork Microsites • Enable businesses and government agencies to use Second Life for virtual meetings, events, training, and simulations • Stimulates engaged, collaborative learning to augment their traditional curriculum
  • 28. Summary Ethics in InformationTechnology, Fourth Edition28 • Social networkingWeb sites • Create an online community of Internet users • Break down barriers created by time, distance, and cultural differences • Allow people to interact with others online by sharing opinions, insights, information, interests, and experiences • Social network advertising uses social networks to inform, promote, and communicate the benefits of products and services
  • 29. Summary (cont’d.) Ethics in InformationTechnology, Fourth Edition29 • Social network advertising strategies • Direct advertising • Advertising using network of friends • Indirect advertising through groups • Advertising via company-ownedWeb sites • Viral marketing • Employers look at the social network profiles of job candidates when hiring
  • 30. Summary (cont’d) Ethics in InformationTechnology, Fourth Edition30 • Consumers use social networks to share their experiences and seek help and advice • Unless organizations monitor social networks, customers are left to resolve questions and issues on their own, risking loss of customers and future sales • Ethical issues for social networkingWeb sites are: • Cyberbullying • Cyberstalking • Sexual predators • Uploading inappropriate material
  • 31. Summary (cont’d.) Ethics in InformationTechnology, Fourth Edition31 • Online virtual world is a computer-simulated world • Visitor can move in three-dimensional space • Visitor can communicate and interact with other visitors • Visitor can manipulate elements of the simulated world