Presentation is loading. Please wait.

Presentation is loading. Please wait.

Pertemuan 9 Cyberspace & Cyber ethics – Social Network MK Etika Profesi.

Similar presentations


Presentation on theme: "Pertemuan 9 Cyberspace & Cyber ethics – Social Network MK Etika Profesi."— Presentation transcript:

1 Pertemuan 9 Cyberspace & Cyber ethics – Social Network MK Etika Profesi

2 Computer Network vs Social Network ?

3

4

5 Computer Network Definition : a distributed system consisting of loosely coupled computing elements and other devices. Communicate each other. Wired or Wireless. Communication rules called protocols.

6 Computer Network Models Centralized Distributed

7 Computer Network Types

8 Social Networks Definition : a theoretical network where each node is an individual, group, or organization who independently generate, captures and disseminates information and also serves as a relay for other members of the network. Individual nodes collaborate to propagate the information in the network.

9 Online Social Networks (OSNs) Social Networks – Electronics Communication Infrastructure

10 Types of OSNs Chat Network Blog Network Instant Messaging Network Online Social Networks

11 Services of Online Social Networks Mostly consist of: – User Profile – Social or business links of interests – Additional services Examples: – Friends based : FB, MySpace, Path, Ig – Movie & music : Flixster, iLike – Mobile : Dodgeball, Loopt, Mozes – Hobby & special interest: ActionProfiles, FanIQ – Business: LinkedIn – Books: GoodReads, Shelfari – Running: endomondo

12 Privacy Issues in OSNs Privacy violation in OSNs : intrusion, misuse of information, interception and information matching ( Pelanggaran privasi di OSNs : intrusi, penyalahgunaan informasi, intersepsi dan penyamaan informasi) The issues: – Sharing personal information (give out too much information, anyone can set up an account, updating profiles everywhere) – Lack of precise rules by the OSNs n (kurangnya aturan yang tepat oleh OSNs) – Leakage of private information to third parties ( kebocoran informasi pribadi ke pihak ketiga) – Inter-linkage in OSNs

13 Ethical Issues in OSNs OSNs governed by no central command, but an equally shared sense of responsibility. (OSNs diatur oleh perintah pusat, namun tanggung jawabnya dibagi bersama) The core of ethical problem in OSNs in particular and cyberspace in general: (inti dari masalah etika di OSNs pada khusunya dan di dunia maya pada umumnya) – Virtual personality – Anonymity – Multiple personality

14 List of online abuses (penyalahgunaan) : – Potential misuse – Cyberbullying, cyberstalking, cyber-harrasment (pelecehan) Half of adolescents and teens have been bullied online More than 1 of 3 young people have experienced cyberthreats Over 25% teens have been bullied repeatedly – Risk of child safety – Psychological effects of OSN-ing  Addiction Indicator of excessive use of SN-ing are Narcissistic Personalities, Have no Friend but have Facebook Friend, Spend more time online than offline – Free speech, ex: Bayer vs Evans Case in Florida

15 Security & Crimes in OSNs List of Online Crime: – Unlawful access to information – Illegal interception of information – Unlawful use of telecommunication equipment – Forgery with use of computer measures – Intrusions of the Public Switched & Public Network – Network Integrity Violation – Privacy Violation – Industrial espionage – Pirated computer software – Fraud using of computing system – Internet/mail abuse – Using computer technology to commit murder, terrorism, pornography and hacking

16 Ways to Perpetuate (mengabadikan) Crimes in OSNs System Penetration : gaining unauthorized access to a protected systems resources – Targeted system are IP Addresses of host, accessible TCP port numbers, operating system used in the hosts network Denial of Service Attacks : interrupting the service of the target system  unable to deliver the service – Ex.:IP spoofing, buffer overflow, ping of death

17 Defense Against Crimes in OSNs Effective defense plan consists of prevention, detection, analysis and response Prevention including: – A security policy – Risk management – Vulnerability assessment – Penetration testing – Regular audit – Proven security protocols – Legislation – Mass education – Use strong cryptographic algorithm

18 Best Practice in OSNs 1.Authentication 2.Access Control 3.Legislation 4.Self regulation 5.Detection 6.Reccovery

19 Reference [1] Priyanto, H, “Materi Etika Profesi”


Download ppt "Pertemuan 9 Cyberspace & Cyber ethics – Social Network MK Etika Profesi."

Similar presentations


Ads by Google