Information System raises new ethical problems. This is more evident a terjemahan - Information System raises new ethical problems. This is more evident a Bahasa Indonesia Bagaimana mengatakan

Information System raises new ethic

Information System raises new ethical problems. This is more evident at this time of the previous. Because of the challenges caused by the computer system, the progress of the network, the Internet and electronic trading on the protection of privacy and intellectual property.

Ethics refers to a principle of right and wrong that someone used, which act as a moral free agency, to make the decision to drive behavior.

Understanding Ethics and Social Issues Related to Information System

The introduction of the new information technologies have the impact that such wave, raises issues of ethics, social and political need to be addressed at the level of individuals, communities and countries. This issue has five dimensions of moral: the rights and obligations, rights and obligations of ownership, accountability and control, quality systems and quality of life.

Model reasoning Issues About Ethics, Social and Political
* Trends in Technology, which raise the Main Issues of Ethics

Trends-trends, such as:
• speed computer folded twice every 18 months
• Cost of data storage decreases quickly
• Progress analysis of the data
• Progress network and the Internet

In which each of these trends have the effect of each.

Profiling: the use of the computer to combine data from many sources and produce electronic documents containing information about individuals.

Profiling can be obtained when we make a purchase with a credit card that can make personal information available to the company's market research, marketing through television and direct mail. Example of a technology analysis of the latest data, which provide more capacity profiling for the private sector and the government called nonobvious relationship awareness (NORA).

Ethics in the Information Society
* Basic concept: Responsibility, Accountability, and Liability.

Responsibility is an important element of ethical actions. Responsibility means that you accept all the costs, obligations and the requirement that will appear as a consequence of your decision.

Accountability is a characteristic of the social system which is a mechanism that determine who is responsible for the action, who is responsible.

Liability is characteristic of the political system where a body of law to take the role of the individual to give permission to repair damage caused by the perpetrator, the system, or other organizations. This liability use compulsory process.

Establishing a Basic concepts for analysis of the ethical foundation of information systems and manage their information systems:

1. Information technology filtered through institution social organizations, and individuals.
2. Responsibility for the consequences clearly fall on the technology institution manager, organizations and individuals.
3. In a political community that ethical, people can recover from the damage done to them through a law that was characterized by compulsory process.

Analysis of Ethics

5 steps in the face of situations that seem to raise ethical issues:

1. Identify and describe the fact.
2. Define the conflict or problem identification and noble values that are involved.
3. Identify stakeholders.
4. Identification of the options that you can take with the base.
5. Identification of the potential consequences of your choice.

Principles of Ethical Candidate

Golden Rule. Treat others as you expect other people treat you.

Immanuel Kant's Categorical Imperative. If an action is not good to be done by all people, the action is not good to be done by anyone as well.

Descartes' Rules of Change. If an action can not be done repeatedly, this action is not taken to correct.

Utilitarian Principles. Take action, which can reach a value greater than or noble.

Risk Aversion Principles. Take the actions that result in potential danger and cost the least.

Ethical "no free lunch" Rule. Assume that all objects are not real and tangible owned by someone unless there is another statement. Ex. If someone has to do something useful for us, something is worth, and we must assume that the author would like to compensation of the works.

Professional Code of Conduct

Code of ethics is the promise of the profession to address themselves in public.

Moral Dimensions of the Information System
* Information Rights: Freedom and Privacy in the Internet Era

Privacy is left to individual claims of its own, free from the supervision or intervention from other individuals or organizations, including the state.

Fair Information Practices (FIP) is a set of principles that govern the collection and use of information about individuals.

* Instruction on the European Data Protection

Informed Consent is as permission can be defined as the permission is given when all the facts necessary to make a rational decision was known.

* Challenges of Internet Privacy

So far this challenge to the privacy of Internet users have not fully guaranteed, for example, in Indonesia because there is no legislation or the protection of customer privacy. Things that can disturb the privacy of users such as cookies, Web bugs, and spyware, etc.

Cookies are small files stored on the computer's hard drive when users visit a particular Web site.

Web bugs are hidden and the device is not used to supervise the behavior of Internet users as online.

Spyware can install itself secretly on a computer with Internet users in the application that big. After installed, spyware make the Web site to send ads and other materials is not desired user.
Spyware can also record data about what the button is pressed the user to send data and information to other sites on the Web without the user.

Model permission of the personal information on customers there are 2:

Opt-out, allowing the collection of personal information to customers specifically request that the data are not collected again.
Opt-in, where the company is prohibited herd any personal information until the customer specifically decided to allow the information gathered and used.

* Technical Solutions

In addition to laws, new technology has to work to protect the privacy of users during interact on the Web. Currently there are tools to help users determine the type of personal data that can be taken by the Web sites. Limits to privacy preferences, called P3P that allows automated communication between a privacy policy site and trade visitors. Users can use P3P to select the desired level of privacy when interacting with the Web site.

Property Rights: Intellectual Property

Intellectual property protected by various protection in three different legal traditions: confidentially trademarks, copyrights and patents.

Trade Secret.
Paper products such as intellectual any formula, device, pattern or compilation of data used for a business purpose can be classified as a trade secret.

Copyright.
Copyright (copyright) is a recognition by the laws that protect intellectual property creators of multiplication results of his work by other parties for the purpose of any age during the creator of life plus 70 years during the resultant died. For works owned companies, copyright protection will expire 95 years after the creation of the first.

Patent Rights.
Patent (patent) to provide exclusive monopoly rights to the owners of ideas and expression of a discovery for 20 years.

The Challenge for Intellectual Property Rights

Growth electronic network, including the Internet, has made the protection of intellectual property, the more difficult. The Internet was designed to transmission information with the free world, including the information that is protected by copyright. With the World Wide Web, we can easily copy and distribution any files such as digital music, video, etc. to thousands and millions of people around the world and a different computer system. Information can not be copied from a legitimate place and distributed through the network system and other parties, although this does not wish to participate in the process of the violations.

Accountability, Liability and Control

If someone is injured by the machines are, who should be asked for the responsibility?

The Problem of Liability with Regard to the Computer.

There are many things that have problems with the engine, for example, the ATM machine suddenly become jammed, the check can not be withdrawn because of operational errors in the computer center banks, the virus that causes lost important files, etc.
Who is responsible for the difficulties faced by the executive information system that is given full responsibility for any losses incurred by the system they developed staff, who created the software, the operator, etc..

Quality System: Quality Data and System Error

Until this far the most common cause of the failure of the system business is the quality of the data, because only a few companies that check the quality of the data.

Three sources of principle that poor performance of the system are:

1. Bugs and errors from the software.
2. Failure facilities or hardware device that is caused by natural or other causes.
3. The quality of input data that bad.

There are obstacles to technology to improve the software, and users should beware of the possibility for a very serious failure. Industry software standard testing has not been found to produce software, and users should be careful of the possibility for a very serious failure. Industry software standard testing has not been found to produce software that performance can be accepted but not perfect.

Quality of Life: Equity, Access and Limits

Computers and technology can damage a valuable element of culture and community, although on the other hand, can also provide benefits.

Balancing Power: The Center versus the border.
Speed Change: Reducing Time Response to Competition

Maintaining limits: Family, Work and Free Time.
Dependence and vulnerability.
Computer Crimes and Abuse.

Computer Crime i
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
Information System raises new ethical problems. This is more evident at this time of the previous. Because of the challenges caused by the computer system, the progress of the network, the Internet and electronic trading on the protection of privacy and intellectual property. Ethics refers to a principle of right and wrong that someone used, which act as a moral free agency, to make the decision to drive behavior. Understanding Ethics and Social Issues Related to Information System The introduction of the new information technologies have the impact that such wave, raises issues of ethics, social and political need to be addressed at the level of individuals, communities and countries. This issue has five dimensions of moral: the rights and obligations, rights and obligations of ownership, accountability and control, quality systems and quality of life. Model reasoning Issues About Ethics, Social and Political * Trends in Technology, which raise the Main Issues of Ethics Trends-trends, such as: • speed computer folded twice every 18 months • Cost of data storage decreases quickly • Progress analysis of the data • Progress network and the Internet In which each of these trends have the effect of each. Profiling: the use of the computer to combine data from many sources and produce electronic documents containing information about individuals. Profiling can be obtained when we make a purchase with a credit card that can make personal information available to the company's market research, marketing through television and direct mail. Example of a technology analysis of the latest data, which provide more capacity profiling for the private sector and the government called nonobvious relationship awareness (NORA). Ethics in the Information Society * Basic concept: Responsibility, Accountability, and Liability.Responsibility is an important element of ethical actions. Responsibility means that you accept all the costs, obligations and the requirement that will appear as a consequence of your decision. Accountability is a characteristic of the social system which is a mechanism that determine who is responsible for the action, who is responsible. Liability is characteristic of the political system where a body of law to take the role of the individual to give permission to repair damage caused by the perpetrator, the system, or other organizations. This liability use compulsory process. Establishing a Basic concepts for analysis of the ethical foundation of information systems and manage their information systems: 1. Information technology filtered through institution social organizations, and individuals. 2. Responsibility for the consequences clearly fall on the technology institution manager, organizations and individuals. 3. In a political community that ethical, people can recover from the damage done to them through a law that was characterized by compulsory process. Analysis of Ethics 5 steps in the face of situations that seem to raise ethical issues: 1. Identify and describe the fact. 2. Define the conflict or problem identification and noble values that are involved.3. Identify stakeholders. 4. Identification of the options that you can take with the base. 5. Identification of the potential consequences of your choice. Principles of Ethical Candidate Golden Rule. Treat others as you expect other people treat you. Immanuel Kant's Categorical Imperative. If an action is not good to be done by all people, the action is not good to be done by anyone as well. Descartes' Rules of Change. If an action can not be done repeatedly, this action is not taken to correct. Utilitarian Principles. Take action, which can reach a value greater than or noble.Risk Aversion Principles. Take the actions that result in potential danger and cost the least. Ethical "no free lunch" Rule. Assume that all objects are not real and tangible owned by someone unless there is another statement. Ex. If someone has to do something useful for us, something is worth, and we must assume that the author would like to compensation of the works. Professional Code of Conduct Code of ethics is the promise of the profession to address themselves in public.
Moral Dimensions of the Information System
* Information Rights: Freedom and Privacy in the Internet Era

Privacy is left to individual claims of its own, free from the supervision or intervention from other individuals or organizations, including the state.

Fair Information Practices (FIP) is a set of principles that govern the collection and use of information about individuals.

* Instruction on the European Data Protection

Informed Consent is as permission can be defined as the permission is given when all the facts necessary to make a rational decision was known.

* Challenges of Internet Privacy

So far this challenge to the privacy of Internet users have not fully guaranteed, for example, in Indonesia because there is no legislation or the protection of customer privacy. Things that can disturb the privacy of users such as cookies, Web bugs, and spyware, etc.

Cookies are small files stored on the computer's hard drive when users visit a particular Web site.

Web bugs are hidden and the device is not used to supervise the behavior of Internet users as online.

Spyware can install itself secretly on a computer with Internet users in the application that big. After installed, spyware make the Web site to send ads and other materials is not desired user.
Spyware can also record data about what the button is pressed the user to send data and information to other sites on the Web without the user.

Model permission of the personal information on customers there are 2:

Opt-out, allowing the collection of personal information to customers specifically request that the data are not collected again.
Opt-in, where the company is prohibited herd any personal information until the customer specifically decided to allow the information gathered and used.

* Technical Solutions

In addition to laws, new technology has to work to protect the privacy of users during interact on the Web. Currently there are tools to help users determine the type of personal data that can be taken by the Web sites. Limits to privacy preferences, called P3P that allows automated communication between a privacy policy site and trade visitors. Users can use P3P to select the desired level of privacy when interacting with the Web site.

Property Rights: Intellectual Property

Intellectual property protected by various protection in three different legal traditions: confidentially trademarks, copyrights and patents.

Trade Secret.
Paper products such as intellectual any formula, device, pattern or compilation of data used for a business purpose can be classified as a trade secret.

Copyright.
Copyright (copyright) is a recognition by the laws that protect intellectual property creators of multiplication results of his work by other parties for the purpose of any age during the creator of life plus 70 years during the resultant died. For works owned companies, copyright protection will expire 95 years after the creation of the first.

Patent Rights.
Patent (patent) to provide exclusive monopoly rights to the owners of ideas and expression of a discovery for 20 years.

The Challenge for Intellectual Property Rights

Growth electronic network, including the Internet, has made the protection of intellectual property, the more difficult. The Internet was designed to transmission information with the free world, including the information that is protected by copyright. With the World Wide Web, we can easily copy and distribution any files such as digital music, video, etc. to thousands and millions of people around the world and a different computer system. Information can not be copied from a legitimate place and distributed through the network system and other parties, although this does not wish to participate in the process of the violations.

Accountability, Liability and Control

If someone is injured by the machines are, who should be asked for the responsibility?

The Problem of Liability with Regard to the Computer.

There are many things that have problems with the engine, for example, the ATM machine suddenly become jammed, the check can not be withdrawn because of operational errors in the computer center banks, the virus that causes lost important files, etc.
Who is responsible for the difficulties faced by the executive information system that is given full responsibility for any losses incurred by the system they developed staff, who created the software, the operator, etc..

Quality System: Quality Data and System Error

Until this far the most common cause of the failure of the system business is the quality of the data, because only a few companies that check the quality of the data.

Three sources of principle that poor performance of the system are:

1. Bugs and errors from the software.
2. Failure facilities or hardware device that is caused by natural or other causes.
3. The quality of input data that bad.

There are obstacles to technology to improve the software, and users should beware of the possibility for a very serious failure. Industry software standard testing has not been found to produce software, and users should be careful of the possibility for a very serious failure. Industry software standard testing has not been found to produce software that performance can be accepted but not perfect.

Quality of Life: Equity, Access and Limits

Computers and technology can damage a valuable element of culture and community, although on the other hand, can also provide benefits.

Balancing Power: The Center versus the border.
Speed Change: Reducing Time Response to Competition

Maintaining limits: Family, Work and Free Time.
Dependence and vulnerability.
Computer Crimes and Abuse.

Computer Crime i
Sedang diterjemahkan, harap tunggu..
Hasil (Bahasa Indonesia) 2:[Salinan]
Disalin!
Sistem informasi menimbulkan masalah etika baru. Hal ini lebih jelas pada saat ini dari sebelumnya. Karena tantangan yang disebabkan oleh sistem komputer, kemajuan jaringan, Internet dan perdagangan elektronik pada perlindungan privasi dan kekayaan intelektual. Etika mengacu pada prinsip benar dan salah bahwa seseorang digunakan, yang bertindak sebagai agen bebas moral yang , untuk membuat keputusan untuk mendorong perilaku. Memahami Etika dan Masalah Sosial Terkait Sistem Informasi Pengenalan teknologi informasi baru telah dampak gelombang tersebut, menimbulkan masalah etika, sosial dan kebutuhan politik yang harus ditangani pada tingkat individu, masyarakat dan negara. Masalah ini memiliki lima dimensi moral: hak dan kewajiban, hak dan kewajiban kepemilikan, akuntabilitas dan kontrol, sistem mutu dan kualitas hidup. Penalaran Model Isu Tentang Etika, Sosial dan Politik * Tren Teknologi, yang meningkatkan Isu Utama Etika Tren-tren, seperti: • komputer kecepatan dilipat dua kali setiap 18 bulan • Biaya penyimpanan data menurun dengan cepat • analisis Perkembangan data • jaringan Kemajuan dan Internet Di mana masing-masing dari tren ini memiliki efek masing-masing. Profiling: yang penggunaan komputer untuk menggabungkan data dari berbagai sumber dan menghasilkan dokumen elektronik yang berisi informasi tentang individu. Profiling dapat diperoleh ketika kita melakukan pembelian dengan kartu kredit yang dapat membuat informasi pribadi tersedia untuk riset pasar perusahaan, pemasaran melalui televisi dan direct mail . Contoh analisis teknologi data terbaru, yang menyediakan lebih kapasitas profiling untuk sektor swasta dan pemerintah yang disebut yang belum ada hubungan kesadaran (Nora). Etika dalam Masyarakat Informasi * Konsep dasar:. Tanggung Jawab, Akuntabilitas, dan Kewajiban Responsibility adalah penting unsur tindakan etis. Tanggung jawab berarti bahwa Anda menerima semua biaya, kewajiban dan kebutuhan yang akan muncul sebagai konsekuensi dari keputusan Anda. Akuntabilitas merupakan karakteristik dari sistem sosial yang merupakan mekanisme yang menentukan siapa yang bertanggung jawab atas tindakan, siapa yang bertanggung jawab. Kewajiban adalah karakteristik sistem politik di mana sebuah badan hukum untuk mengambil peran individu untuk memberikan izin untuk memperbaiki kerusakan yang disebabkan oleh pelaku, sistem, atau organisasi lainnya. Kewajiban ini menggunakan proses wajib. Membangun konsep dasar untuk analisis dasar etika sistem informasi dan mengelola sistem informasi mereka: 1. Teknologi informasi disaring melalui lembaga sosial organisasi, dan individu. 2. Tanggung jawab atas konsekuensi jelas jatuh pada lembaga teknologi manajer, organisasi dan individu. 3. Dalam sebuah komunitas politik yang etis, orang dapat pulih dari kerusakan yang dilakukan kepada mereka melalui undang-undang yang ditandai dengan proses wajib. Analisis Etika 5 langkah dalam menghadapi situasi yang tampaknya mengangkat isu-isu etika: 1. Mengidentifikasi dan menggambarkan fakta. 2. Mendefinisikan konflik atau masalah identifikasi dan nilai-nilai luhur yang terlibat. 3. Mengidentifikasi stakeholder. 4. Identifikasi pilihan yang dapat Anda ambil dengan dasar. 5. Identifikasi potensi konsekuensi dari pilihan Anda. Prinsip Calon Etis Golden Rule. Perlakukan orang lain seperti yang Anda harapkan orang lain memperlakukan Anda. Immanuel Kant Imperatif Kategoris. Jika tindakan tidak baik yang harus dilakukan oleh semua orang, tindakan tidak baik untuk dilakukan oleh siapa saja juga. Descartes 'Aturan Perubahan. Jika tindakan tidak dapat dilakukan berulang kali, tindakan ini tidak diambil untuk memperbaiki. Prinsip utilitarian. Mengambil tindakan, yang dapat mencapai nilai lebih dari atau mulia. Risiko Prinsip keengganan. Mengambil tindakan yang mengakibatkan potensi bahaya dan biaya sedikitnya. Etis "ada makan siang gratis" Rule. Berasumsi bahwa semua benda tidak nyata dan nyata yang dimiliki oleh seseorang kecuali ada pernyataan lain. Ex. Jika seseorang harus melakukan sesuatu yang berguna bagi kita, sesuatu yang bernilai, dan kita harus mengasumsikan bahwa penulis ingin kompensasi dari karya-karya. Kode Etik Profesi Kode etik adalah janji profesi untuk mengatasi diri di depan umum. Dimensi Moral dari Sistem Informasi * Informasi Hak: Kebebasan dan Privasi di Internet Era Privasi yang tersisa untuk klaim individu sendiri, bebas dari pengawasan atau intervensi dari individu lain atau organisasi, termasuk negara. Adil Informasi Praktek (FIP) adalah satu set prinsip yang mengatur pengumpulan dan penggunaan informasi tentang individu. * Instruksi pada Perlindungan Data Eropa Informed Consent adalah sebagai izin dapat didefinisikan sebagai izin diberikan bila semua fakta yang diperlukan untuk membuat keputusan yang rasional dikenal. * Tantangan Internet Privasi Sejauh tantangan ini dengan privasi pengguna internet belum sepenuhnya dijamin, misalnya, di Indonesia karena tidak ada undang-undang atau perlindungan privasi pelanggan. Hal-hal yang dapat mengganggu privasi pengguna seperti cookies, Web bug, dan spyware, dll Cookie adalah file kecil yang disimpan pada hard drive komputer ketika pengguna mengunjungi situs web tertentu. Web bug tersembunyi dan perangkat tidak digunakan untuk mengawasi perilaku pengguna internet online. Spyware dapat menginstal sendiri diam-diam di komputer dengan pengguna internet di aplikasi yang besar. Setelah terinstal, spyware membuat situs Web untuk mengirim iklan dan bahan lainnya tidak diinginkan pengguna. Spyware juga dapat merekam data tentang apa tombol ditekan pengguna untuk mengirim data dan informasi ke situs lain di Web tanpa pengguna. Izin Model informasi pribadi pada pelanggan ada 2: Opt-out, yang memungkinkan pengumpulan informasi pribadi kepada pelanggan secara khusus meminta bahwa data tidak dikumpulkan lagi. Opt-in, di mana perusahaan dilarang kawanan informasi pribadi apapun sampai pelanggan khusus memutuskan untuk memungkinkan informasi yang dikumpulkan dan digunakan. * Solusi Teknis Selain undang-undang, teknologi baru harus bekerja untuk melindungi privasi pengguna saat berinteraksi di Web. Saat ini ada alat untuk membantu pengguna menentukan jenis data pribadi yang dapat diambil oleh situs Web. Batas preferensi privasi, disebut P3P yang memungkinkan otomatis komunikasi antara situs kebijakan privasi dan pengunjung perdagangan. Pengguna dapat menggunakan P3P untuk memilih tingkat yang diinginkan privasi ketika berinteraksi dengan situs Web. Hak Kekayaan: Kekayaan Intelektual Kekayaan intelektual yang dilindungi oleh berbagai perlindungan dalam tiga tradisi hukum yang berbeda: rahasia merek dagang, hak cipta dan paten. Rahasia Dagang. Produk kertas seperti intelektual rumus, perangkat, pola atau kompilasi data yang digunakan untuk tujuan bisnis dapat diklasifikasikan sebagai rahasia dagang. Hak Cipta. Copyright (hak cipta) merupakan pengakuan oleh hukum yang melindungi pencipta kekayaan intelektual dari hasil perkalian karyanya oleh pihak lain untuk tujuan dari segala usia selama pencipta hidup ditambah 70 tahun selama resultan meninggal. Untuk karya yang dimiliki perusahaan, perlindungan hak cipta akan berakhir 95 tahun setelah penciptaan pertama. Hak Paten. Paten (patent) untuk memberikan hak monopoli eksklusif untuk pemilik ide dan ekspresi penemuan selama 20 tahun. Tantangan untuk Hak Kekayaan Intelektual jaringan elektronik pertumbuhan, termasuk internet, telah membuat perlindungan kekayaan intelektual, semakin sulit. Internet dirancang untuk transmisi informasi dengan dunia bebas, termasuk informasi yang dilindungi oleh hak cipta. Dengan World Wide Web, kita dapat dengan mudah menyalin dan distribusi file seperti musik digital, video, dll untuk ribuan dan jutaan orang di seluruh dunia dan sistem komputer yang berbeda. Informasi tidak dapat disalin dari tempat yang sah dan didistribusikan melalui sistem jaringan dan pihak-pihak lain, meskipun hal ini tidak ingin berpartisipasi dalam proses pelanggaran. Akuntabilitas, Kewajiban dan Kontrol Jika seseorang terluka oleh mesin yang, yang harus meminta tanggung jawab? Masalah Kewajiban dengan Regard untuk Komputer. Ada banyak hal yang memiliki masalah dengan mesin, misalnya, mesin ATM tiba-tiba menjadi macet, cek tidak dapat ditarik karena kesalahan operasional di pusat komputer bank, virus yang menyebabkan file-file penting yang hilang, dll Siapa yang bertanggung jawab untuk kesulitan yang dihadapi oleh sistem informasi eksekutif yang diberikan tanggung jawab penuh atas kerugian yang timbul oleh sistem yang mereka kembangkan staf, yang menciptakan software, operator, dll . Kualitas Sistem: Kualitas Data dan Kesalahan Sistem. Sampai penyebab yang paling umum ini kegagalan bisnis sistem adalah kualitas data, karena hanya beberapa perusahaan yang memeriksa kualitas data Tiga sumber prinsip bahwa kinerja yang buruk dari sistem ini adalah: 1. Bug dan kesalahan dari perangkat lunak. 2. Fasilitas kegagalan atau perangkat keras yang disebabkan oleh sebab-sebab alamiah atau lainnya. 3. Kualitas input data yang buruk. Ada hambatan untuk teknologi untuk meningkatkan perangkat lunak, dan pengguna harus berhati-hati kemungkinan untuk gagal sangat serius. Pengujian standar industri perangkat lunak belum ditemukan untuk menghasilkan perangkat lunak, dan pengguna harus berhati-hati dari kemungkinan untuk gagal sangat serius. Pengujian standar industri perangkat lunak belum ditemukan untuk menghasilkan perangkat lunak yang kinerja dapat diterima tetapi tidak sempurna. Kualitas Hidup: Ekuitas, Akses dan Batas Komputer dan teknologi bisa merusak elemen berharga dari budaya dan masyarakat, meskipun di sisi lain, juga dapat memberikan manfaat. Balancing Power:. Pusat vs perbatasan Kecepatan Ganti: Mengurangi Respon Waktu untuk Kompetisi Menjaga batas: Keluarga, Kerja dan Free Time. Ketergantungan dan kerentanan. Kejahatan Komputer dan Penyalahgunaan. Kejahatan Komputer i

















































































































































Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2025 I Love Translation. All reserved.

E-mail: