RSS

tugas SIM "Ethics"

Kelompok 5:
Fika Rachmanella
Rimona Larasati
Yohandi Zikkry
Ilham R. Ersyafdi
Iqbal Kamal R
Ahmad Khoironi
Eko Aris P


1. In what ways are ethical, social, and political issues connected? Give some examples.
Ethics refers to principles of right and wrong which individuals use to guide their behavior. Individuals act within a social environment that, in turn, exists within a political environment. Ethical dilemmas are problems that affect society and that often are addressed in the political arena. For example, new computer technology makes it easier to gain private information about individuals, creating an ethical dilemma for the potential user of that information (whether or not to invade the privacy of the individual). Society will respond by demanding new laws to regulate the use of data. Students will be able to give a range of examples of this connection.

2. What are the key technology trends that heighten ethical concerns?
The doubling of computing power every 18 months is creating a growing dependence on systems and a consequent vulnerability to system errors, poor data quality, and failure of critical systems. Advances in data storage techniques and rapidly declining storage costs provide for massive data storage capabilities on individual systems and enable the routine violation of individual privacy. Advances in datamining techniques for large databases allow those who are able to dominate supercomputing capacity (large businesses and governments) to increase their power over individuals through the analysis of massive amounts of data about individuals. Advances in telecommunications infrastructure allow the movement of massive amounts of data at greatly reduced cost, permitting the use of data and, as a result, the invasion of privacy on a scale and precision unimaginable to us now.

3. What are the differences between responsibility, accountability, and liability?
Responsibility means that you accept the potential costs, duties, and obligations for the decisions you make. Accountability is a feature of systems and social institutions that allows the determination of who is responsible. Liability is a feature of political systems that permits individuals to recover damages done to them by responsible individuals or organizations.

4. What are the five steps in an ethical analysis?
The five steps in an ethical analysis are outlined in the Manager's Toolkit. The five steps include
(1) identify and describe clearly the facts;
(2) define the conflict or dilemma and identify the higher order values involved;
(3) identify the stakeholders;
(4) identify the options you can reasonably take, and
(5) identify the potential consequences of your options.

5. Identify and describe six ethical principles.
The six ethical principles include the golden rule, Immanuel Kant's Categorical Imperative, Descartes' rule of change, Utilitarian Principle, Risk Aversion Principle, and ethical "no free lunch" rule. The golden rule suggests doing unto others as you would have them do unto you. Kant's Categorical Imperative suggests that if an action is not right for everyone to take, then it is not right for anyone. Descartes' rule of change, also known as the slippery slope rule, suggests that if an action cannot be taken repeatedly, then it is not right to be taken at any time. The Utilitarian Principle suggests taking the action that achieves the higher or greater value. The Risk Aversion Principle suggests taking the action that produces the least harm or the least potential cost. The ethical "no free lunch" rule says that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise.

6. What is a professional code of conduct?
When groups of people claim to be professionals, they take on special rights and obligations. As professionals, they enter into even more constraining relationships with employers, customers, and society because of the special claims to knowledge, wisdom, and respect. Professional codes of conduct are promulgated by associations of professionals in order to regulate entrance qualifications and competencies and to establish codes of ethics.

7. What are meant by "privacy" and "fair information practices”?
Privacy is the claim that individuals have the right to be left alone, free from surveillance or interference from other individuals or organizations, including the state. Claims to privacy involve the workplace as well as the home. Information technology threatens individual claims to privacy by making the invasion of privacy cheap, profitable, and effective.
The fair information practices (FIP) is a set of principles governing the collection and use of information about individuals. The five FIP principles are:
(1) notice/awareness;
(2) choice/consent;
(3) access/participation;
(4) security; and
(5) enforcement.

8. How is the Internet challenging the protection of individual privacy?
Cookies, Web bugs, and other means of collecting information about Internet users can be shared without the Internet user's consent. This allows information that a user may have given voluntarily for a good purpose, say logging into the New York Times site, to be shared with some other site. Spamming or e-mail that uses a user’s e-mail address is another invasion of privacy.


9. What are the three different regimes that protect intellectual property rights? What challenges to intellectual property rights are posed by the Internet?
Three different legal traditions that protect property rights are trade secret, copyright, and patent. A trade secret is any intellectual work product used for a business purpose that can be classified as belonging to that business, provided it is not based on information in the public domain. The drawback to trade secret protection is that once an idea falls into the public domain, it no longer can be protected as a trade secret. A copyright is a statutory grant that protects creators of intellectual property against copying by others for any purpose for a period of 28 years. (For work created on or after January 1, 1978, the intellectual property is protected during the author's lifetime plus 70 years after his death.) The drawback of this protection is that underlying ideas are not protected, only their manifestations in a work. A patent grants the owner a monopoly on the ideas behind an invention for 20 years. While patent protection does grant a monopoly on the underlying concepts and ideas, the difficulty is passing stringent criteria of non-obviousness, originality, and novelty. The Internet makes it very easy to widely distribute and reproduce intellectual property.

10. Why is it so difficult to hold software services liable for failure or injury?
It is very difficult, if not impossible, to hold software producers liable for their software products because it is only when software acts as a part of a defective product that strict liability pertains. If the software is strictly a service (not part of a product), these laws do not apply. As part of a product, software is still considered to be like books, which historically are protected from liability claims by the First Amendment guaranteeing freedom of expression.

11. What is the most common cause of system quality problems?
The three principal sources of system quality problems are hardware and facility failures, software bugs and errors, and data quality. However, the most common cause of system quality problems is data quality. According to the 1998 Redman study cited in the textbook, individual organizations report data error rates ranging from 0.5 to 30 percent.

12. Name and describe four "quality of life" impacts of computers and information systems.
The textbook describes eight "quality of life" impacts of computers and information systems. These include balancing power, rapidity of change, maintaining boundaries, dependency and vulnerability, computer crime and abuse, employment, equity and access, and health risks.
Balancing power describes the shift toward highly decentralized computing, coupled with an ideology of "empowerment" of thousands of workers and decentralization of decision making to lower organizational levels. The problem is that the lower-level worker involvement in decision making tends to be trivial. Key policy decisions are as centralized as in the past.
The rapidity of change impact suggests that information systems have increased the efficiency of the global marketplace. As a result, businesses no longer have many years to adjust to competition. Businesses can now be wiped out very rapidly, and along with them, jobs.
The maintaining boundaries impact suggests that portable computers and telecommuting have created the condition where people can take their work anywhere with them and do it at any time. As a result, workers find that their work is cutting into family time, vacations, and leisure, weakening the traditional institutions of family and friends and blurring the line between public and private life.
The dependency and vulnerability impact suggests that businesses, governments, schools, and private associations are becoming more and more dependent on information systems, and so they are highly vulnerable to the failure of those systems.
The computer crime and abuse impact suggests that computers have created new opportunities for committing crimes and have themselves become the target of crimes.
The employment impact suggests that redesigning business processes could potentially cause millions of middle-level managers and clerical workers to lose their jobs. Worse, if reengineering actually works as claimed, these workers will not find similar employment because the demand for their skills will decline.
The equity and access impact suggests that access to computer and information resources is not equitably distributed throughout society. Access is distributed inequitably along racial, economic, and social class lines (as are many other information resources). Poor children attending poor school districts are less likely to use computers at school. Children from wealthy homes are five times more likely to use PCs for schoolwork than poor children. Whites are three times more likely to use computers at home for schoolwork than African-Americans. Potentially, we could create a society of information haves and have-nots, further increasing the social cleavages in our society.
Health risks have been attributed to computers and information technologies. For instance, business now spends $20 billion a year to compensate and treat victims of computer-related occupational diseases. Those illnesses include RSI (repetitive stress injury), CVS (computer vision syndrome), and technostress.

13. What is technostress, and how would you identify it?
Technostress is defined as stress induced by computer-use. Its symptoms are aggravation, hostility towards humans, impatience, and enervation.

14. Name three management actions that could reduce RSI.
Management can reduce RSI (repetitive stress injury) by using workstations (mainly keyboards) designed for a neutral wrist position (using a wrist rest to support the wrist). Use of proper monitor stands and footrests will contribute to proper posture and so reduce RSI, as will allowing (or requiring) employees to take frequent breaks from their work to walk around. Finally, use of new, ergonomically designed keyboards will also help.
 

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

tugas simventure kelompok 5

YOHANDI ZIKKRY
 IQBAL KAMAL RAMADHAN
AHMAD KHOIRONI
 ILHAM RAMADHAN ERSYAFDI
FIKA RACHMANELLA
RIMONA LARASSATI
EKO ARIS PRIYANTO

BULAN KE-1





UNTUNG PERTAMA BULAN KE-2


UNTUNG TERBESAR BULAN JULY 12

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Tugas Kelompok Produksi

KELOMPOK 5

Ilham Ramadhan Ersyafdi (833582840)
Eko Aris Priyanto (8335082840)
Ahmad Khoironi (8335082866)
Iqbal Kamal Ramadhan (8335082874)
Yohandi Zikkry Kurnia (8335083599)
Fika Rachmanella (8335083607)
Rimona Larassati (83350836120

S1 Akuntansi Reg 2008

Jumlah Produksi Pakaian : 100 pcs
jenis produksi pakaian : - Tshirt : 60 pcs
- Jaket : 20 pcs
- Sweater: 20 pcs
Anggaran divisi Produksi : Rp. 50.000.000
Perkiraan biaya produksi
1. Mesin Jahit Singer tipe 8280 : 5 X Rp. 1.800.000 = Rp. 9.000.000
2. Mesin Sablon Press : 1 X Rp. 5.000.000 = Rp. 5.000.000
3. 1 Set Komputer : Rp. 2.500.000 = Rp. 2.500.000
3. Bahan Baku Pakaian : 400 m X Rp. 30.000 = Rp. 12.000.000
4. Upah Tenaga Kerja : 10 Orang X Rp. 1.000.000 = Rp. 10.000.000
5. Peralatan Jahit Untuk 100 Pcs = Rp. 3.000.000
6. Biaya Overhead Pabrik = Rp. 8.500.000
- Listrik Per Bulan Rp. 500.000
- Sewa Bangunan 12 Bulan Rp. 6.000.000
- Gaji Penjaga Gudang Rp. 900.000
- Gaji Supervisor Rp. 1.100.000
Total Perkiraan biaya produksi Rp. 50.000.000


SIZE
COWOK
-XS = Lebar 40 ; Panjang 60
-S = Lebar 44 ; Panjang 64
-M = Lebar 48 ; Panjang 68
-L = Lebar 52 ; Panjang 72
-XL = Lebar 56 ; Panjang 76
-XXL = Lebar 60 ; Panjang 80
-XXXL = Lebar 64 ; Panjang 84
-XXXXL = LEBAR 68; PANJANG 88


CEWEK
-S = Dada/pinggang 42/44 ; Panjang 56
-M = Dada/pinggang 44/46 ; Panjang 60
-L = Dada/pinggang 46/48 ; Panjang 64
-XL = Dada/pinggang 48/50 ; Panjang 68
-XXL = Dada/pinggang 50/52 ; Panjang 72
-XXXL = Dada/pinggang 52/54 ; Panjang 76
-XXXXL = Dada/pinggang 54/56 ; Panjang 80

KET: untuk ukuran XXL : +5000
untuk ukuran XXXL:+10000


Contoh T Shirt : klik di sini

Contoh Jacket : klik di sini

Contoh Sweater : Klik di sini

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

SESI 3

Ilham R Ersyafdi
Eko Aris Priyanto
Ahmad Khoironi
Iqbal K.R.
Yohandi Z.K.
Rimona L.
Fika Rachmanella

13.Object-oriented programming (OOP) is a programming paradigm that uses “objects” – data structures consisting of data fields and methods together with their interactions – to design applications and computer programs.

the main difference is that structured programming deals with the flow of execution, and not, primarily, with the data. The mathematical basis for structured programming has to do with the elimination of arbitrary jumps (GOTOs) in favor of code blocks and functions. In particular, “information hiding” as it relates to data isn’t fully developed in structured programming; structured programming has to do with the organization of the code, rather than the data, and pure structured programming passes data around in the form of function arguments (conceptually, “on the stack”).

In contrast, object oriented programming primarily deals with data issues. The object/class paradigm promotes clean, flexible organization of data in the same way that structured programming promotes clean, flexible organization of code. In a pure object oriented approach, the flow of program execution is treated as bits of behavior associated with the packets of data that are “objects”.

14. Java is a programming language originally developed by James Gosling at Sun Microsystems (which is now a subsidiary of Oracle Corporation) and released in 1995 as a core component of Sun Microsystems’ Java platform. The language derives much of its syntax from C and C++ but has a simpler object model and fewer low-level facilities. Java applications are typically compiled to bytecode (class file) that can run on any Java Virtual Machine (JVM) regardless of computer architecture. java has OOP facility that makes designing, creating, developing, and allocating a failure from Java-based program easier, faster, and more organized.

15. HTML, which stands for HyperText Markup Language, is the predominant markup language for web pages. It is written in the form of HTML elements consisting of “tags” surrounded by angle brackets within the web page content. It is the building blocks of all basic websites.
Extensible Markup Language (XML) is a set of rules for encoding documents in machine-readable form.

HTML is actually a loosely defined subset of XML. However, whereas XML is a strict language (as you will learn), HTML takes many liberties that have helped it become the popular presentation tool it is today. Although the spirit of the young Internet encouraged freedom, developers have now realized that the freedom of HTML has repercussions. Because HTML is so flexible, many browsers and Web applications have added their own functionality to the base HTML protocol. Like all enhanced functionality, this comes with additional security risks.

For this reason, efforts are underway to replace HTML with a much more regulated and standardized markup language known as XHTML.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

SESI 2

Ilham Ramadhan Ersyafdi (833582840)
Eko Aris Priyanto (8335082840)
Ahmad Khoironi (8335082866)
Iqbal Kamal Ramadhan (8335082874)
Yohandi Zikkry Kurnia (8335083599)
Fika Rachmanella (8335083607)
Rimona Larassati (83350836120

S1 Akuntansi Reg 2008

KELOMPOK 5


JAWABAN DIKELAS.
Karena adanya perubahan dan system akuntansi dari proses data Ms.excel menjadi accurate, sehingga proses data menjadi lebih mudah. sehingga perlu ada beberapa aset yang harus dilease atau tetap dipertahankan.

yang di lease.
Patent : hal ini perlu dilease karena dengan berubahnya sistem maka secara otomatis perusahaan tidak terlalu membutuhkan softwere sebelumnya
Vehicles : dengan adanya sistem baru maka yg sudah terintegrasi, maka tidak diperlukan kendaraan utk mengantarkan data-data perusahaan
Warehouse : dengan adanya sistem baru maka yg sudah terintegrasi maka produksi barang pun bisa semaikn efisien dgn menggunakan JIT
Land : dengan adanya sistem baru maka yg sudah terintegrasi maka tanah sebaiknya di lease untuk agar lebih efisien dan menghasilkan.
computer station

yang di keep:
web server: dengan adanya sistem baru maka yg sudah terintegrasi maka dibutuhkan web server yang lebuh baik untuk menampung data.
communication network:dengan adanya sistem baru maka yg sudah terintegrasi diperlukan komunikasi agar tidak terjadi kesalahpahaman.

Contoh kasus;
http://swa.co.id/2005/06/ganti-sistem-demi-mendongkrak-kinerja/

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

SESI 1

Finance Group (Kelompok 5)
Ilham Ramadhan Ersyafdi (833582840)
Eko Aris Priyanto (8335082840)
Ahmad Khoironi (8335082866)
Iqbal Kamal Ramadhan (8335082874)
Yohandi Zikkry Kurnia (8335083599)
Fika Rachmanella (8335083607)
Rimona Larassati (83350836120

S1 Akuntansi Reg 2008

SOLUSI :
1. Menawarkan obligasi / saham kepada para investor untuk mendapatkan tambahan dana
2. Mencoba mengajukan pinjaman ke bank
3. Melakukan kerjasama berupa Joint Venture (membuka aflisiasi dengan perusahaan lain yang tertarik untuk bergabung dengan perusahaan kita)
4. Berupaya menagih bad debt kepada perusahaan yang memiliki hutang kepada perusahaan kita
5. Jika dari semua opsi di atas sudah tidak dapat dilakukan, maka pilihan terakhir adalah menjual aset perusahaan.

http://bataviase.co.id/node/346414

Laba Indosat Turun 71,5 Persen
18 Aug 2010
* Ekonomi
* Republika
Agung Budiono
Sejak dibeli Qtel, Indosat dinilai belum 1 menunjukkan performa maksimal.
JAKARTA - Laba bersih emiten sektor telekomunikasi PT Indosat Tbk merosot tajam pada semester pertama 2010. Jika dibandingkan periode yang sama tahun sebelumnya, penurunan itu mencapai 71,5 persen.
Sejauh ini belum diketahui secara pasti penyebab penurunan laba bersih itu karena Indosat memang baru menyampaikan laporan keuangannya.
Dalam ikhtisar laporan keuangan itu disebutkan, laba bersih Indosat pada semester pertama 2010 tercatat Rp 287,1 miliar atau turun Rp 720 miliar jika dibandingkan dengan periode yang sama tahun lalu yang mencapai Rp 1,007 triliun.
Pada saat yang sama, perseroan mencatat kenaikan pendapatan usaha sebesar Rp 9,66 triliun atau naik 5,8 persen dibanding semester pertama 2009. Dan, jika dibandingkan pencapaian kuartal pertama tahun ini, pendapatan usaha Indosat meningkat 4,1 persen.
Direktur Utama Indosat Harry Sasongko menuturkan, peningkatan pendapatan ini disokong adanya pertumbuhan bisnis seluler yang tumbuh hingga 7,7 persen dibandingkan triwulan sebelumnya, atau 14,4 persen dibandingkan dengan semester pertama tahun lalu.
“Pertumbuhan yang terus berlanjut disebabkan inisiatif strategis yang diimplementasikan oleh tim manajemen yang baru, juga perubahan strategi menuju strategi yang berimbang,” katanya dalam keterangan tertulisnya, Senin (16/8).
Untuk posisi laba sebelum bunga, pajak, depresiasi, dan amortisasi (EBITDA) tercatat sebesar Rp 4,6 triliun, atau naik 6,8 persen dibanding periode yang sama thun lalu sebesar Rp 4,32 triliun. “Perbaikan EBITDA tersebut didorong program efisiensi biaya yang ditempuh manajemen perseroan.”
Posisi utang perseroan saat ini juga meningkat, yakni Rp 24,7 triliun atau naik 8,9 persen dibanding periode yang sama tahun sebelumnya sebesar 22,6 triliun. Sedangkan, jumlah pelanggan seluler Indosat tercatat 37,8 juta atau naik 34,5 persen dibanding periode yang sama 2009 sebanyak 28,1 juta pelanggan.
Berkaitan dengan traffic jaringan saat Idul Fitri, lanjut Harry, Indosat telah mempersiapkan jaringan dan program pemasaran. “Hal itu untuk memastikan penyampaian layanan dengan kualitas terbaik bagi pelanggan kami dalam menyambut Hari Raya.”
Menurut Harry, akan ba-nyak tantangan yang muncul pada semester kedua tahun ini. Namun, ia yakin Indosat dapat melalui tantangan tersebut.
Harus cari solusi
Terkait penurunan laba bersih Indosat, analis Lau-tandhana Securities, Willy Sanjaya, menjelaskan, sektor telekomunikasi saat ini dihadapkan pada adanya perang tarif antaroperator. Menurut dia, Indosat sebagai salah satu operator harus mencari solusi untuk menghadapi situasi semacam ini.
“Bisa jadi, laba bersih turun salah satunya dikarenakan kondisi tersebut (perang tarif). Perseroan harus segera mencari solusi dalam situasi sekarang.”
Selain itu, lanjut Willy, persaingan dengan jaringan internet juga kian menggerus penggunaan telepon. Karena itu, banyak operator terus mengembangkan teknologi untuk penggunaan internet.
“Indosat juga harus mampu mengembangkan jaringan teknologi internetnya.”
Willy menilai, sejak dibeli oleh perusahaan telekomunikasi asal Timur Tengah, Qtel, perseroan tidak menunjukkan performa yang maksimal. “Saya belum mendengar manuver yang menarik dari Indosat belakangan ini.” ed wachidah handasah
Bookmark and Share

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Anggota Engineering & Production Group

Dukung Indonesia