netiquette - bina nusantarabcld.binus.edu/blended/admin/files/fckeditor/file... ·  ·...

46
Netiquette Arief Agus Sukmadhani

Upload: hoangminh

Post on 17-Apr-2018

216 views

Category:

Documents


2 download

TRANSCRIPT

Ne t i q u e t t e

Arief Agus Sukmadhani

Learning Outcome

At the end of this course, participant will beable to:

• use basic program computer• apply the ethics of internet while using

internet and communicate through email

At the end of this course, participant will beable to:

• use basic program computer• apply the ethics of internet while using

internet and communicate through email

Agenda

• Computers• Operating system• Internet• Computer Ethics

• Computers• Operating system• Internet• Computer Ethics

3

A World of ComputersComputers are everywhere

4

Computers AreYour Future

5

Computers AreYour Future

What Is a Computer?A computer is an electronic device, operatingunder the control of instructions stored in itsown memory

6

Collectsdata

(input)Processing

Producesinformation

(output)

Information Processing Cycle

The Components of a ComputerA computer contains many electric, electronic, andmechanical components known as hardware

• Allows you to enter data and instructions into a computer• Allows you to enter data and instructions into a computerInput Device

7

• Hardware component that conveys information to one or more people• Hardware component that conveys information to one or more peopleOutput Device

• Case that contains the electronic components of the computer thatare used to process data

• Case that contains the electronic components of the computer thatare used to process dataSystem Unit

• Holds data, instructions, and information for future use• Holds data, instructions, and information for future useStorage Device

• Enables a computer to send and receive data, instructions, andinformation to and from one or more computers or mobile devices

• Enables a computer to send and receive data, instructions, andinformation to and from one or more computers or mobile devices

CommunicationsDevice

The Components of a Computer

8

Computer Software• Software, also called a program, tells the

computer what tasks to perform and howto perform them

System Software• Operating system• Utility program

9

System Software• Operating system• Utility program

Application Software

Categories of Computers

Mobile computers and mobile devices

Personal computers

Embedded computers

Servers

Mobile computers and mobile devices

10

Embedded ComputersAn embedded computer is a special-purposecomputer that functions as a component in alarger product

ConsumerElectronics

HomeAutomation

DevicesAutomobiles

ProcessControllers and

Robotics

Comp Devices &Office Machines

11

ConsumerElectronics

•Mobile anddigitaltelephones

•Digitaltelevisions

•Cameras•Video recorders•DVD players and

recorders•Answering

machines

•Mobile anddigitaltelephones

•Digitaltelevisions

•Cameras•Video recorders•DVD players and

recorders•Answering

machines

HomeAutomation

Devices•Thermostats•Sprinkling

systems•Security

monitoringsystems

•Appliances•Lights

•Thermostats•Sprinkling

systems•Security

monitoringsystems

•Appliances•Lights

•Antilock brakes•Engine control

modules•Airbag controller•Cruise control

•Antilock brakes•Engine control

modules•Airbag controller•Cruise control

ProcessControllers and

Robotics•Remote

monitoringsystems

•Power monitors•Machine

controllers•Medical devices

•Remotemonitoringsystems

•Power monitors•Machine

controllers•Medical devices

Comp Devices &Office Machines

•Keyboards•Printers•Faxes•Copiers

•Keyboards•Printers•Faxes•Copiers

Using Computers

Speed

Reliability

• Advantages • Disadvantages

Health Risks

Violation of PrivacyReliability

Consistency

Storage

Communications

12

Violation of Privacy

Public Safety

Impact on Labor Force

Impact on Environment

Operating Systemsis a set of programs containing instructions that worktogether to coordinate all the activities amongcomputer hardware resources

Start and shutdown a

computer

Provide a userinterface

Manageprograms

Managememory

13

Start and shutdown a

computer

Provide a userinterface

Manageprograms

Managememory

Coordinatetasks

Configuredevices

Establish anInternet

connection

Monitorperformance

Provideutilities

Automaticallyupdate

Control anetwork

Administersecurity

Operating systems often provide users with thecapability of:

Managing filesManaging files Searching forfiles

Searching forfiles

ViewingimagesViewingimages

Securing acomputerSecuring acomputer

14

Managing files Searching forfiles

Searching forfiles

ViewingimagesViewingimages

Securing acomputerSecuring acomputer

Uninstallingprograms

Uninstallingprograms

Cleaning updisks

Cleaning updisks

Defragmentingdisks

Defragmentingdisks

Diagnosingproblems

Diagnosingproblems

Backing upfiles and disks

Backing upfiles and disks

Setting upscreen savers

Setting upscreen savers

Categories of Operating Systems

15

Utility Programs - Compression• A file compression utility shrinks the size of a

file(s)– Compressing files frees up room on the storage media– Two types of compression

• Lossy• Lossless

• Compressed files sometimes are called zippedfiles– Can be uncompressed

• A file compression utility shrinks the size of afile(s)– Compressing files frees up room on the storage media– Two types of compression

• Lossy• Lossless

• Compressed files sometimes are called zippedfiles– Can be uncompressed

16

Activity using Utility Programs• Compress Files using winzip/winrar• Split File using winzip / winrar• Disk Defragment• Scan Virus

• Compress Files using winzip/winrar• Split File using winzip / winrar• Disk Defragment• Scan Virus

17

Internet

18

Networks and the InternetPeople use the Internet for a variety of reasons:

Discovering Computers 2011: Living ina Digital World Chapter 1 19

Communicate Research andAccess Information

Shop Bank and Invest Online Trading

Entertainment Download Videos Share Information Web Application

Green Computing

20

Ethics• Ethics are standards of moral conduct

– Standards of right and wrong behavior

– A gauge of personal integrity

– The basis of trust and cooperation in relationships withothers

• Ethics are standards of moral conduct– Standards of right and wrong behavior

– A gauge of personal integrity

– The basis of trust and cooperation in relationships withothers

21

Computer Ethics• Computer ethics are morally acceptable use of

computers

– i.e. using computers appropriately

• Standards or guidelines are important in thisindustry, because technology changes areoutstripping the legal system’s ability to keep up

• Computer ethics are morally acceptable use ofcomputers

– i.e. using computers appropriately

• Standards or guidelines are important in thisindustry, because technology changes areoutstripping the legal system’s ability to keep up

22

Computer Ethics• Four primary issues

– Privacy – responsibility to protect data aboutindividuals

– Accuracy - responsibility of data collectors toauthenticate information and ensure its accuracy

– Property - who owns information and softwareand how can they be sold and exchanged

– Access - responsibility of data collectors to controlaccess and determine what information a personhas the right to obtain about others and how theinformation can be used

• Four primary issues– Privacy – responsibility to protect data about

individuals– Accuracy - responsibility of data collectors to

authenticate information and ensure its accuracy– Property - who owns information and software

and how can they be sold and exchanged– Access - responsibility of data collectors to control

access and determine what information a personhas the right to obtain about others and how theinformation can be used

23

Avoiding Computer-Related LegalProblems

• Most organizations have a policy definingwhat they consider to be acceptablecomputer use.

• Types of legal problems that arise fromcomputer use include:– Plagiarism– Copyright Infringement– Software Piracy

• Most organizations have a policy definingwhat they consider to be acceptablecomputer use.

• Types of legal problems that arise fromcomputer use include:– Plagiarism– Copyright Infringement– Software Piracy

24

Plagiarism

• Plagiarism is the unauthorized and/oruncited use of someone else’s intellectualproperty.– Intellectual property rights refer to an individual’s

ownership over original works.

• Copyright infringement is plagiarism ofcopyrighted material.

• Legal implications of plagiarism:– Dismissal from school– Lawsuits

• Plagiarism is the unauthorized and/oruncited use of someone else’s intellectualproperty.– Intellectual property rights refer to an individual’s

ownership over original works.

• Copyright infringement is plagiarism ofcopyrighted material.

• Legal implications of plagiarism:– Dismissal from school– Lawsuits

25

Software Piracy• Selling software that contains all or part of a

commercial software program• Using shareware beyond its evaluation period• Violating the terms of a software license• Making copies of site-licensed programs for

personal use• Giving or selling commercial software to others

• Selling software that contains all or part of acommercial software program

• Using shareware beyond its evaluation period• Violating the terms of a software license• Making copies of site-licensed programs for

personal use• Giving or selling commercial software to others

26

Computer Ethics for Computer Users• When using the company computers:

– Respect yourself.– Respect others.– Respect your company.

• When using the company computers:– Respect yourself.– Respect others.– Respect your company.

27

Computer Ethics in Business• A business must protect its data from:

– Loss or damage– Misuse or errors– Unauthorized access

• Backup procedures are used to protect datafrom loss.

• It is the organization’s responsibility to ensurethat its data is as complete as possible.

• Divulging customer data without askingpermission is considered unethical behavior byprivacy advocates.

• A business must protect its data from:– Loss or damage– Misuse or errors– Unauthorized access

• Backup procedures are used to protect datafrom loss.

• It is the organization’s responsibility to ensurethat its data is as complete as possible.

• Divulging customer data without askingpermission is considered unethical behavior byprivacy advocates.

28

Netiquette

Netiquette refers to the guidelinesthat involve showing respect forothers and yourself while you areonline.

29

Netiquette refers to the guidelinesthat involve showing respect forothers and yourself while you areonline.

Rules on NetiquetteAccording to Virginia, had 10 Rules on Netiquette :1. Remember Human2. Adhere to the same standards of behavior online

that you follow in real life.3. Know where you are4. Respecting others5. Make yourself appear online well6. Share expert knowledge7. Helps maintain harmony8. Respect Others Privacy9. Do not Abusing the power and ability10.Be forgiving for mistakes of others

According to Virginia, had 10 Rules on Netiquette :1. Remember Human2. Adhere to the same standards of behavior online

that you follow in real life.3. Know where you are4. Respecting others5. Make yourself appear online well6. Share expert knowledge7. Helps maintain harmony8. Respect Others Privacy9. Do not Abusing the power and ability10.Be forgiving for mistakes of others

30

E-Mail Netiquette• Promptly respond to

messages.• Delete messages after

you read them.• Speak of others

professionally andcourteously.

• Run your computer’santi-virus program onany e-mail received orsent.

• Promptly respond tomessages.

• Delete messages afteryou read them.

• Speak of othersprofessionally andcourteously.

• Run your computer’santi-virus program onany e-mail received orsent.

31

E-Mail Netiquette (Cont)• Keep the message short and to the point.• Don’t type in all capital letters.• Spell check your message before sending it.• Be careful with sarcasm and humor in your

message.• Be mindful of the recipient’s reaction

when you request a return receipt. Thisfeature can be annoying and intrusive.

• Keep the message short and to the point.• Don’t type in all capital letters.• Spell check your message before sending it.• Be careful with sarcasm and humor in your

message.• Be mindful of the recipient’s reaction

when you request a return receipt. Thisfeature can be annoying and intrusive.

32

The nature of threats against informationsystems

1. Passive threat• Natural disasters and political• Human error• system failures

2. Active Threat• Fraud and computer crime• Malicious programs / nosy

1. Passive threat• Natural disasters and political• Human error• system failures

2. Active Threat• Fraud and computer crime• Malicious programs / nosy

33

Roots of computer crime• Information = Money?Information has a value (value) that can

be sold tradedThe value of information can change

with time

• Information = Money?Information has a value (value) that can

be sold tradedThe value of information can change

with time

34

Computer Security RisksA computer security risk is any event or action that

could cause a loss of or damage to computerhardware, software, data, information, or processingcapability

A cybercrime is an online or Internet-based illegal act

A computer security risk is any event or action thatcould cause a loss of or damage to computerhardware, software, data, information, or processingcapability

A cybercrime is an online or Internet-based illegal act

35

Hackers Crackers Script Kiddies Corporate Spies

UnethicalEmployees Cyberextortionists Cyberterrorists

Computer Security Risks

36

Internet and Network AttacksComputer

Virus

• Affects acomputernegativelyby alteringthe way thecomputerworks

Worm

• Copies itselfrepeatedly,using upresourcesand possiblyshuttingdown thecomputer ornetwork

Trojan Horse

• A maliciousprogramthat hideswithin orlooks like alegitimateprogram

Root kit

• Programthat hides ina computerand allowssomeonefrom aremotelocation totake fullcontrol

• Affects acomputernegativelyby alteringthe way thecomputerworks

• Copies itselfrepeatedly,using upresourcesand possiblyshuttingdown thecomputer ornetwork

• A maliciousprogramthat hideswithin orlooks like alegitimateprogram

• Programthat hides ina computerand allowssomeonefrom aremotelocation totake fullcontrol

37

Infected computer has one or more of thefollowing symptoms:

Operating systemruns much slower

than usual

Available memory isless than expected

Files becomecorrupted

Screen displaysunusual message or

image

38

Music or unusualsound playsrandomly

Existing programsand files disappear

Programs or files donot work properly

Unknown programsor files mysteriously

appear

System propertieschange

Operating systemdoes not start up

Operating systemshuts down

unexpectedly

Unauthorized Access and Use

Unauthorized accessis the use of a

computer or networkwithout permission

Unauthorized use isthe use of a

computer or its datafor unapproved or

possibly illegalactivities

Unauthorized accessis the use of a

computer or networkwithout permission

Unauthorized use isthe use of a

computer or its datafor unapproved or

possibly illegalactivities

39

Theft Hardware Theft Software Theft Information Theft

– Identification– Authentication– User name– Password– Passphrase– CAPTCHA– Biometric

Health Concerns of Computer Use

40

Summary• Computer is an electronic device, operating

under the control of instruction stored in itsown memory, that can accept data, processthe data according to specified rules, produceresults, and store the results for future use.

• Computer Security Risk is any event or actionthat could cause a loss of or damage tocomputer hardware, software, data,information or processing capability

• Computer is an electronic device, operatingunder the control of instruction stored in itsown memory, that can accept data, processthe data according to specified rules, produceresults, and store the results for future use.

• Computer Security Risk is any event or actionthat could cause a loss of or damage tocomputer hardware, software, data,information or processing capability

41

Reference• Discovering Computers, Living in a Digital

World. Shelly. B. gary, Vermaat. B. Misty. ShellyCashman 2011.

• http://indah.blog.widyatama.ac.id/2013/04/27/teknik-kompresi-data/

• http://www.kompasiana.com/dennyyapari/apakah-plagiarisme-merupakan-pelanggaran-hak-cipta_550e6254a33311bf2dba81ce

• Net Etiquette. Virginia Shea, Gly kawasaki.2004.

• Discovering Computers, Living in a DigitalWorld. Shelly. B. gary, Vermaat. B. Misty. ShellyCashman 2011.

• http://indah.blog.widyatama.ac.id/2013/04/27/teknik-kompresi-data/

• http://www.kompasiana.com/dennyyapari/apakah-plagiarisme-merupakan-pelanggaran-hak-cipta_550e6254a33311bf2dba81ce

• Net Etiquette. Virginia Shea, Gly kawasaki.2004.

42

APPENDIX

Internet Facilities• E-mail• Web Browser• FTP• Telnet• Mailing List• NewsGroup• Messenger

• E-mail• Web Browser• FTP• Telnet• Mailing List• NewsGroup• Messenger

45

Terms in the Internet• Attachment• Browser• Link• Upload• Download• Domain• FTP• Homepage• Hyperlink• Internet• Intranet

• HTTP• WWW• ISP• URL• Web Hosting• Web server

• Attachment• Browser• Link• Upload• Download• Domain• FTP• Homepage• Hyperlink• Internet• Intranet

46

• HTTP• WWW• ISP• URL• Web Hosting• Web server