Download presentation
Presentation is loading. Please wait.
Published bySuzanna Owen Modified over 8 years ago
1
DDPQ 1612: INFORMATION COMMUNICATION TECHNOLOGY (ICT) LECTURE 1
2
ICT: What comes to mind?
3
What are ICT? n Information n Communication n Technologies the hardware and software that enable society to create, collect, consolidate and communicate information in multimedia formats and for various purposes.
4
Impact of ICT n ICT has made the transfer of digital information from remote sites possible ICT assists and extends the ability of mankind to capture, store, process, understand, use, create, and disseminate information at a speed and scale which had never been thought possible before Shift from Print to Digital Internet
5
Impact of ICT on society merger of the computing, information, communications, entertainment, mass media industries thereby providing a means of exchanging information in the digital format used by computers. ICT - i.e. computer linked to all facets of society
6
Impact of ICT on society Increases level of technology literacy Increases demand for better and faster access to information Aggravates discrepancies between the information rich and information poor. ICT - i.e. computer linked to all facets of society
7
How have ICT impacted YOUR life so far?
8
Expectation of this Course YOURS? THIS COURSE’S? Course Learning Outcome Course Learning Outcome
9
Ethical Issues in ICT Tengku Mohd T. Sembok (2003) presented a paper compiling Information concerning ethical issues in the Asia-Pacific regarding Ethical Issues in ICT
10
Ethical Issues in ICT Digital Divide Poverty Piracy Cybercrime Human Rights Gender Equality Unemployment Crime Loss of privacy Errors Intellectual property Freedom of speech and press Professional Ethics
11
Issues in ICT complex and difficult questions regarding the freedom of expression, access to information, the right to privacy, intellectual property rights, and cultural diversity incidence of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer- related crimes, (e.g. forgery and fraud) content related offenses, e.g. those related to child pornography, and violations of intellectual property rights (IPRs)
12
Issues in ICT threats to critical infrastructure by terrorist activities cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing confidence in transactions and business, the opportunity costs may become substantial.
13
Cybercrime in Malaysian newspapers: Hackers have struck at government websites again, this time targeting the Social Security Organization (Socso) by posting an image of a covered skull on its site at: http://www.perkeso.gov.m y (26th June 2001). 22nd August 2000: A hacker is believed to have tried to dupe internet users into giving away their private financial information by posing as an online executive at Maybank Bhd.
14
Cybercrime in Japan Crime related to internet dating services in Japan more than doubled in the first six months of 2002. The total number of crimes involving the internet was almost 60 percent higher in the first half of 2001 than in the first half of 2000. A worker for NEC Toshiba Space System Co. illegally accessed Mitsubishi Electric Corporation’s antenna designs for a high- speed internet satellite in December 2001
15
Pornography a moral crime in most societies the worst forms of cybercrime is the global trade in child pornography Several operations had been carried out to investigate the seriousness of the matter Ops Wonderland, 1998: identified 100 suspects in 12 countries, > 1 M images of child pornography discovered; Ops Avalanche, 2001: identified 250K subscribers, grossed more than $5M, & 100 arrests in the US alone. Ops Landmark, 2001: identified 11K users, 400 distributors, 130 search and arrest warrants issued in 19 countries.
16
What is Ethics? Ethics are moral standards that help guide behavior, actions, and choices Refers to well-based standards of right and wrong that prescribe what humans ought to do, usually in terms of rights, obligations, benefits to society, fairness, and specific virtues refers to those standards that impose the reasonable obligations to refrain from stealing, murder, assault, slander, and fraud
17
Ethics in Many Areas Business Legal ethics Bioethics Medical Engineering ethics computer ethics centres and programmes
18
ICT Policy and Ethics From issues that have arisen from the adoption of ICT, centres of research are continuously work on identifying means of controlling the impacts through introductions of guidelines and procedures, and to implementing new laws relating to ICT
19
Cyberlaws Countries that have enacted cyberlaws: Australia, India, Japan, Malaysia, Philippines, Korea, Taiwan, Philippines, Singapore, and Pakistan. There is no one definition of the term “cyberlaw” Anything concerned with, related to, or emanating from, any legal aspects or issues concerning any activity of netizens and others, in cyberspace, comes within the ambit of Cyberlaw (Duggal, 2002).
20
ICT Policies of Selected Countries in the Asia-Pacific Singapore Many initiatives taken in tackling cyber security issues aimed at improving confidence in the local electronic commerce scene and hence promoting the use of e-commerce Public Awareness and Professional Competency ICT Security Developers in Singapore Cyber-crime Investigation Capabilities Public Incident Response Capabilities Electronic Transactions Act
21
ICT Policies of Selected Countries in the Asia-Pacific Malaysia Cyberlaws 1. Digital Signature Act 1997 2. Computer Crimes Act 1997 3. Telemedicine Act 1997 4. Communications and Multimedia Act 1998
22
Communications and Multimedia Act 1998 Malaysian Communications and Multimedia Commission (MCMC) also, the “Controller” for the Certification Authorities under the Digital Signature Act 1998. creates a new system of licenses defines the roles and responsibilities of those providing communication and multimedia services.
23
Communications and Multimedia Act 1998 PDRM - have jurisdiction over the CMA and also the CCA (Computer Crimes Act, 1997). All complaints relating to network security matters will be passed to either the MCMC and/or to the police.
24
Computer Crimes Act 1997 (CCA) acts such as unauthorized access to computer material with intent to commit or facilitate the commission of a further offence, unauthorized modification of contents of any computer and/or wrongful communications, abetment and presumption are addressed fraudulent use of a network, improper use of network facilities/ services and interception of communications
25
Digital Signature Act 1997 mainly provides for the licensing and regulation of Certification Authorities CAs issue Digital Signatures and will certify the identity (within certain limits) of a signor by issuing a certificate The Act also makes a digital signature as legally valid and enforceable as a traditional signature
26
The Copy Right Act 1997 serves to protect the expression of thoughts and ideas from unauthorized copying and/or alteration
27
The Telemedicine Act 1997 serves to regulate the practice of tele- consultations in the medical profession provides that any registered doctor may practice “telemedicine,” but other healthcare providers (such as a medical assistant, nurse or midwife) must first obtain a license to do so Patient’s consent and regulations must be handled in an ethical manner
28
Malaysian Administrative Modernization and Management Planning Unit (MAMPU) Security issues in the public sector is administered by MAMPU Within MAMPU is the ICT Security Division launched The Malaysian Public sector Management of Information and Communications Technology Security Handbook (myMIS). The handbook is a set of guidelines concerning compliance and adherence to best practices and measures leading to information and network security.
29
The National IT Council (NITC) and National ICT Security and Emergency Response Centre (NISER) NITC functions as the primary advisor and consultant to the Government on matters pertaining to IT in Malaysia’s national development Promote the sustainable growth of IT development Ensure the smooth integration of new technologies into social and economic development;
30
The National IT Council (NITC) and National ICT Security and Emergency Response Centre (NISER) NISER address e-security issues of the nation and as to act as Malaysia’s CERT (Computer Emergency Response Team) services in research in vulnerability detection, intrusion detection and forensic technology. Offer their services to both public and private sectors
31
That’s all. For lecture today.
32
Tutorial 1 In a group of 2, choose a topic on the issues of policy and ethics in ICT. Find the information on your chosen topic on the internet. Print them out. Write a summary of NOT MORE THAN 1 PAGE on the information obtained. Submission: Friday 15 th June 2012
33
That is all for today. Thank You, Very Much.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.