APPENDIX A Saya Yamani Febriansyah, mahasiswa Universitas Binus International. Saat ini saya sedang menjalankan tugas akhir (skripsi) mengenai Kesadaran etika berkomputer mahasiswa, yang berjudulkan: Information Systems undergraduate students awareness towards computer ethics. Dengan ini, saya meminta kesediaan anda untuk membantu pelaksanaan pengumpulan data untuk skripsi saya, dengan menjawab beberapa pertanyaan dibawah ini. Informasi yang anda berikan akan sangat bermanfaat demi kelancaran dan penyelesaian riset ini. Sebelumnya, saya ucapkan banyak terima kasih atas kesediaan anda untuk berpartisipasi dalam riset ini. Salam Hormat, Yamani Febriansyah * Required
Gender * o Male o Female Age * o o o o o
16 - 18 18 - 20 20 - 22 22 - 24 >24
Year of study * o o o o
Freshman (first year) Sophomore (second year) Junior (third year) Senior (fourth year and above)
Duration of computer use * o o o o
1 - 10 Hours per week 11 - 20 Hours per week 21 - 30 Hours per week >30 Hours per week
Study Major * o Information Systems
o o o o o o o o
Marketing Accounting Computer Science Art & Design HTM Fashion Management Film International Business
Berikut ini adalah beberapa pernyataan mengenai penggunaan komputer. Pada bagian ini anda diminta me-rating apakah hal-hal tersebut etis untuk dilakukan. Dengan angka 1 sebagai 'sangat etis (strongly ethical)' dan 6 sebagai 'sangat tidak etis (strongly unethical)'. Use a computer to harm other people * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Prevent other people completing their computer work * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Look around other people's computer files * 1
2
3
4
5
6
Strongly Ethical Use a computer to steal. * 1
2
Strongly Unethical
3
4
5
6
Strongly Strongly Ethical Unethical Use a computer to spread misleading information. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Copy or use copyrighted software for which you have not paid. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Use other people’s computer system without authorization. *
1
2
3
4
5
6
Strongly Strongly Ethical Unethical Take other people’s intellectual output ( includes text, data, images, sound or performance) without owner's permission * 1
2
3
4
5
6
Strongly Ethical Using crack programs. * 1
2
Strongly Unethical
3
4
5
6
Strongly Ethical Copying licensed CDs, DVDs. * 1
2
3
4
Strongly Unethical
5
6
Strongly Strongly Ethical Unethical Selling licensed CDs, DVDs which are reproduced against regulations. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Using materials like pictures, animations, etc. without the permission from the owner. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Do not think about the social consequences of the program you are writing or the system you are designing. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Do not use a computer in ways that ensure consideration and respect for your fellow humans. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Disturbing people by using the nature of virtual environment (anonymous online identity, no posting filter etc.) *
1
2
3
4
5
6
Strongly Strongly Ethical Unethical Carrying propaganda in the Internet that threatens social peace. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Allowing children to play computer games of violence. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Permitting children to enter inappropriate sites on the Internet in Internet Cafes (Warnet) * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Web masters’ delivering the personal information of website's members to other people. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Intentionally damaging the hardware of computers designed for public use. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Copying the data in a computer without the permission of the owner. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Sending a private mail to others without the permission of the original sender. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Sending pornographic mail to people without request. *
1
2
3
4
5
6
Strongly Strongly Ethical Unethical Intentionally sending a computer virus by e-mail. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Using others’ personal information without permission. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Sending someone’s personal information to a web page without permission. * 1
2
3
4
5
6
Strongly Strongly Ethical Unethical Using the network of an individual or institution to access the Internet without permission. * 1
2
3
4
5
6
Strongly Ethical Hacking through the Internet. * 1 Strongly Ethical
2
3
4
Strongly Unethical
5
6 Strongly Unethical
Yamani Febriansyah Jl. Palem VIII no. 55, Petukangan Utara Jakarta Selatan [Postal Code] Phone: 0816-‐858-‐300 E-‐Mail:
[email protected]
Education
2008 – 2012
• SAP Fundamental Course
2011
• SMA Al-‐Azhar 1
2005 -‐ 2008
• Binus Century FunD Bike (Head of Promotion)
2011
• SIMBIZ at Binus International University (Division of competition)
2009
• Binus International University [School of Information Systems]
Organizational Experience
Skills • Profficient in some programming language (C, C++, C#)
• Database and SQL Query knowledge
• Project Management knowledge
• Business process modeling knowledge • Fluent in English