Article 5
Article 5
26
Circulation in Computer Science
International Conference on Engineering, Computing & Information Technology (ICECIT 2017), pp:25-28
www.ccsarchive.org
spoofing), Password based attack and Denial – of – Service got them as Halal view. That is why people are to do their
Attack [3]. works in the best way even there is no punishment of the work
leader because the important punishment of Allah [4].
4.1 Islamic perspective for attacking Responsible to do responsible to do their works in the best way
(obtrusion) Ethics: even there is no punishment of the work leader because the
The existence of Information Technology in various huge important punishment of Allah [8].
domains leads to be computerized environments. The human
behavior to use information, steal or attacks reflect the human 5.1 Islamic perspective for hard work
Islamic ethics. Interference and espionage are described in Ethic:
Islamic law as generalized issues. They are considered as Information technology is considered as a crucial material,
unethical Islamic issues because the Islam is asked the people because it has soft detailed data related to specific domain. The
not to interfere in each other; also the Islam prevents them to work related to IT domain must be accuracy and confirmed
butt in others [1]. because it is depended on IT procedure. Any rubbish or mess
of usage information technology will conflict the data mad
4.2 Objectives: leads the data and then leads to information damage. Islam
Information Technology is an attractive environment for encourages the people in clear message to work perfection, to
attacking process because it has the confidentiality personal use information in optimal usage and do maximum effort to
information and all communication partners that help the finalize the work in efficient way [6].
attacker to read, steal or interrupt them. The important of
saving information of attackers is to work in smoothly 5.2 Objectives:
environment as the Islamic one without effect any harmful to The work hard in any tasks related to information technology
other part through acted unkindly behaviors such as changing is increased IT development and revolution. It is opened for
the stored data or exploit messaging to anyone through specific new thinking process of solving problems using information
user name and password. The evidence that describe the technology. It is affected on the quality of information that
prevention of attached issues is shown below [2]. manipulated or accessed on it. Hard work is accomplished by
person itself motivated by Islam. The Quran and Hadith is
َََ}منَ ُحسن:َ َقالَرسولَهللا:َقال،عنَأبيَهريرةَرضيَهللاَعنه guided us this ethics.
َ {إسالمَالمرءَتركهَماَالَيعـنيه َسولُهَُو ْال ُمؤْ مِّ نُونَوستُردُّونَإِّلىَعال ِِّّم َّ وقُ ِّلَاعْملُواَْفسير
ُ ىََّللاَُعمل ُك ْمَور
[3773:َوابنَماجه1328َ:َرواهَالترمذي،]حديثَحسن َ َشهاد ِّةَفيُن ِّبئ ُ ُكمَ ِّبماَ ُكنت ُ ْمَت ْعملُون ِّ ْالغ ْي
َّ بَوال
On the authority of Abu Hurairah, who said: The messenger of [9:105] And say (unto them): Act! Allah will behold your
Allah said: "Part of someone's being a good Muslim is his actions, and (so will) His messenger and the believers, and ye
leaving alone that which does not concern him." fine hadith will be brought back to the Knower of the invisible and the
narrated by Termithi and others visible, and He will tell you what ye used to do.
َسوا
ُ سَّ َالظ ِّنَإِّثْ ٌمَوالَتجَّ َالظ ِّنَإِّ َّنَب ْعض
َّ اَمن ً َِّياَأيُّهاَالَّذِّينَآمنُواَاجْ تنِّبُواَكث
ِّ ير ََقالَرسولَهللاَملسو هيلع هللا ىلصَ“َإنَهللاَيحب:َعنَعائشةَرضيَهللاَتعالىَعنهاَقالت
ْ
َُض ُكمَب ْعضًاَأيُحِّ بُّ َأحدُ ُك ْمَأنَيأ ُكلَلحْ مَأخِّ يهَِّم ْيتًاَفك ِّر ْهت ُ ُموهُ والَي ْغتبَبَّ ْع َ ”إذاَعملَأحدكمَعمالًَأنَيتقنه
َ ََرحِّ ي ٌم
َّ ٌََّللاَت َّواب َّ ُواتَّق
َّ واََّللاَإِّ َّن Hadith translation; “Allah loves someone who when he works,
he performs it in perfect manner (itqan)”
[49:12] Believers, abstain from most suspicion, some
suspicion is a sin. Neither spy nor backbite one another would 5.3 Disadvantages:
any of you like to eat the flesh of his dead brother? Surely, you The information will be messed.
would loathe it. Fear Allah, without doubt Allah turns (in Lateness in development and revolution that will be
mercy) and He is the Merciful. returned to the community.
Misrepresentation on Islamic ethics view.
4.3 Disadvantages Decrease in the quality of Information Technology
The consequences of non- adoption of this ethics:
Trouble environment can be created.
6. TIME UTILIZATION
Time has an intrinsic value in our Lives. Information
Damage in the information stored in database.
Technology is a big world that needs a lot of time to
Loss of security and privacy issues because the data accomplish some tasks. The time importance is drawn in the
is attacked. Islamic ethics through good usage of time. Time utilization
means determining specific time to accomplish specific tasks
5. HARD WORK and not wasting one’s time through the usage [1].
The effective and efficiency in the quality of work are guided
to development and evolution, information technology is a 6.1 Islamic perspective for time
critical domain, all tasks must be done in accuracy and good
manner, any careless or doubted work makes a trouble in the Utilization Ethics
work environment and effect on the success or failure of the Information Technology is a big world needs a lot of time to
companies. Islam is asked the people to execute and accomplish some tasks. Islam believes that there is a time
implement the assigned tasks in optimal way. They must do spending judgment in hereafter life. The time must not be
the works from conscience and sincerity. If the tasks are done wasted in any way; it will be spent in a good manner because
sincerity, Allah will bless people and their salaries in current the time is passed daily and Allah will judge the person on
life and will raise the good deed level in hereafter because they how he spends his time, in what you spend, and for what you
27
Circulation in Computer Science
International Conference on Engineering, Computing & Information Technology (ICECIT 2017), pp:25-28
www.ccsarchive.org
spend. If human beings do not waste or abuse time, but rather 7. CONCLUSION
think of it as a blessing from God then they have every reason Many services in current society work online with advanced
to hope for success both in this life and in the hereafter. Islam technologies; it might be a big loss in case of any exploitation
is our guidance to respect and care of time in any domain. activity. Therefore, more effort is required to make awareness
Information Technology (IT) is sensitive to time issues, of the advantages and disadvantages of using IT services,
because the process of the work depends on the information putting some guiding principles and security measures to avoid
itself, passing, exchanging or manipulating [7]. misuse of services. Islamic teaching conveys a full meaning of
information in every aspect of life.
6.2 Objectives:
The time that needs to perform task related to IT domains must This research shows that there are some issues that are
be expected to complete the task in specific time. Any lateness common to IT ethics. It is very important to develop the
or wasting time may be an effect on the system itself, like Islamic outlook to IT ethics especially since to know the most
spending salaries, reservation tickets and so on. It helps to Islamic countries place it at the center of their legal Acts for
keep the information up to data immediately. That leads to the computer crimes like Saudi Arabia.
developmental revolution. Time utilization encourages doing
the work in perfect way based on the specific time. Also, it This study will be helped non-Muslim users in knowing more
makes the environment as work optimally even through each and more about Islam how to gather all ethics that will be
IT worker spend his time in effective way that is related to treated with others in various domains.
work environment. So there is no time to make problems
between users, open unethical sites, or thinking to do any
8. REFERENCES
[1] A. D. Bundschuh, "Ethics in the IT Community," SANS
computer crime because his time is full and spent in optimal
Institute, Nov. 2004.
way. This ethics is controlled through Allah swears with time
in the Quran and the Prophet stresses the importance of Time. [2] J. Ibrahim and F. Altaf Haqani, "Information Security in
ICT from an Islamic Perspective," International Journal
of Science and Research (IJSR), vol. 3, no. 12, ISSN
َ َوليا ٍلَع ْش ٍر َو ْالفجْ ِّر (Online): 2319-7064 , pp. 773–778, Dec. 2014
[89:1] By the Dawn , [89:2]And ten nights, [3] "Application of Privacy, Security and Ethics in Islamic
Concerned ICT" Middle-East Journal of Scientific
Research, vol. 14, no. 11, ISSN 1990-9233, pp. 1548–
َ ََاإلنسانَلفِّيَ ُخس ٍْر
ِّ ِّإ َّن ْ و ْالع
َص ِّر 1554, 2013
[103:1] By time, Indeed, [103:2] mankind is in loss, [4] A. P. D. S. Ahmad and D. M. Y. Owoyemi, "The Concept
of Islamic Work Ethic: An Analysis of Some Salient
َ،َرضيَهللاَعنه،َنضلةَبنَعبيدَاألسلمى-براءَثمَزاى-َعنَأبيَبرزة
Points in the Prophetic Tradition," International Journal
ََ َ"الَتزولَقدماَعبدَيومَالقيامةَحتىَيسألَعن:َََقالَرسولَهللاَملسو هيلع هللا ىلص:َقال
َ of Business and Social Science, vol. 3, no. 20, pp. 116–
َ،َوعنَمالهَمنَأينَاكتسبه،َوعنَعلمهَفيماَفعلَفيه،َعمرهَفيماَأفناه 123, Oct. 2012.
ََحديثَحسن:َرواهَالترمذيَوقاال
َ (َ(ََ"ََوعنَجسمهَفيمَأباله،وفيماَأنفقه
َ
.َ)َ)َصحيح
َ [5] A. K. Masum, "Ethical Issues in Computer use: A Study
from Islamic Perspective," Global Journal of Computer
Abu Barzah (May Allah be pleased with him) reported: Science and Technology Interdisciplinary, vol. 3, no. 2
Version 1, ISSN(online). 0975-4172, pp. 5–11, 2013.
Messenger of Allah ( ) said, "Man's feet will not move on [6] A. K. M. Masum, M. C. Ullah, and M. A. K. Azad,
the Day of Resurrection before he is asked about his life, how "Information technology (IT) ethics in the light of Islam,"
did he consume it, his knowledge, what did he do with it, his IIUC Studies, vol. 9, ISSN 1813-7733 , pp. 243–260,
wealth, how did he earn it and how did he dispose of it, and Dec. 2011.
about his body, how did he wear it out" [At-Tirmidhi].
[7] S. Hosseini, A. Ramchahi, and R. Yusuf, "The Impact of
6.3 Disadvantages: Information Technology on Islamic Behaviour," Journal
Interrupt the information and communication of Multidisciplinary Engineering Science and Technology
process. (JMEST), vol. 1, no. 5, pp. 135–141, Dec. 2014.
Slowing down the development and evolution. [8] A. Asadullah, B. Yerima, and Y. Aliyu, "The Ethics of
Trouble environment will be created. Information and Communication Technology: An Islamic
Failure and damage of institutions. Overview," International Journal of Information and
Communication Technology Research, vol. 4, no. 2, pp.
45–49, Feb. 2014.