Download presentation
Presentation is loading. Please wait.
Published byJean Hall Modified over 8 years ago
1
Pertemuan 9 Cyberspace & Cyber ethics – Social Network MK Etika Profesi
2
Computer Network vs Social Network ?
5
Computer Network Definition : a distributed system consisting of loosely coupled computing elements and other devices. Communicate each other. Wired or Wireless. Communication rules called protocols.
6
Computer Network Models Centralized Distributed
7
Computer Network Types
8
Social Networks Definition : a theoretical network where each node is an individual, group, or organization who independently generate, captures and disseminates information and also serves as a relay for other members of the network. Individual nodes collaborate to propagate the information in the network.
9
Online Social Networks (OSNs) Social Networks – Electronics Communication Infrastructure
10
Types of OSNs Chat Network Blog Network Instant Messaging Network Online Social Networks
11
Services of Online Social Networks Mostly consist of: – User Profile – Social or business links of interests – Additional services Examples: – Friends based : FB, MySpace, Path, Ig – Movie & music : Flixster, iLike – Mobile : Dodgeball, Loopt, Mozes – Hobby & special interest: ActionProfiles, FanIQ – Business: LinkedIn – Books: GoodReads, Shelfari – Running: endomondo
12
Privacy Issues in OSNs Privacy violation in OSNs : intrusion, misuse of information, interception and information matching ( Pelanggaran privasi di OSNs : intrusi, penyalahgunaan informasi, intersepsi dan penyamaan informasi) The issues: – Sharing personal information (give out too much information, anyone can set up an account, updating profiles everywhere) – Lack of precise rules by the OSNs n (kurangnya aturan yang tepat oleh OSNs) – Leakage of private information to third parties ( kebocoran informasi pribadi ke pihak ketiga) – Inter-linkage in OSNs
13
Ethical Issues in OSNs OSNs governed by no central command, but an equally shared sense of responsibility. (OSNs diatur oleh perintah pusat, namun tanggung jawabnya dibagi bersama) The core of ethical problem in OSNs in particular and cyberspace in general: (inti dari masalah etika di OSNs pada khusunya dan di dunia maya pada umumnya) – Virtual personality – Anonymity – Multiple personality
14
List of online abuses (penyalahgunaan) : – Potential misuse – Cyberbullying, cyberstalking, cyber-harrasment (pelecehan) Half of adolescents and teens have been bullied online More than 1 of 3 young people have experienced cyberthreats Over 25% teens have been bullied repeatedly – Risk of child safety – Psychological effects of OSN-ing Addiction Indicator of excessive use of SN-ing are Narcissistic Personalities, Have no Friend but have Facebook Friend, Spend more time online than offline – Free speech, ex: Bayer vs Evans Case in Florida
15
Security & Crimes in OSNs List of Online Crime: – Unlawful access to information – Illegal interception of information – Unlawful use of telecommunication equipment – Forgery with use of computer measures – Intrusions of the Public Switched & Public Network – Network Integrity Violation – Privacy Violation – Industrial espionage – Pirated computer software – Fraud using of computing system – Internet/mail abuse – Using computer technology to commit murder, terrorism, pornography and hacking
16
Ways to Perpetuate (mengabadikan) Crimes in OSNs System Penetration : gaining unauthorized access to a protected systems resources – Targeted system are IP Addresses of host, accessible TCP port numbers, operating system used in the hosts network Denial of Service Attacks : interrupting the service of the target system unable to deliver the service – Ex.:IP spoofing, buffer overflow, ping of death
17
Defense Against Crimes in OSNs Effective defense plan consists of prevention, detection, analysis and response Prevention including: – A security policy – Risk management – Vulnerability assessment – Penetration testing – Regular audit – Proven security protocols – Legislation – Mass education – Use strong cryptographic algorithm
18
Best Practice in OSNs 1.Authentication 2.Access Control 3.Legislation 4.Self regulation 5.Detection 6.Reccovery
19
Reference [1] Priyanto, H, “Materi Etika Profesi”
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.