KEMBAR78
Pengenalan Etika Komputer | PDF | Information Age | Computing
0% found this document useful (0 votes)
79 views34 pages

Pengenalan Etika Komputer

Ethics in computing has its origins in the 1950s with Norbert Wiener's work on the impacts of information technologies. Early pioneers like Donn Parker in the 1960s and Walter Maner in the 1970s helped establish the field of computer ethics. Major topics discussed include privacy, intellectual property, responsibility of computer professionals, and the impacts of technology on society. Deborah Johnson's 1985 book was influential in identifying key issues. James Moor argued that computers are logically flexible and can reshape tasks, sometimes challenging existing norms. The field continues to address new issues around areas like the internet, artificial intelligence, and a just distribution of technology's benefits and harms.

Uploaded by

Eno Fitriyanti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views34 pages

Pengenalan Etika Komputer

Ethics in computing has its origins in the 1950s with Norbert Wiener's work on the impacts of information technologies. Early pioneers like Donn Parker in the 1960s and Walter Maner in the 1970s helped establish the field of computer ethics. Major topics discussed include privacy, intellectual property, responsibility of computer professionals, and the impacts of technology on society. Deborah Johnson's 1985 book was influential in identifying key issues. James Moor argued that computers are logically flexible and can reshape tasks, sometimes challenging existing norms. The field continues to address new issues around areas like the internet, artificial intelligence, and a just distribution of technology's benefits and harms.

Uploaded by

Eno Fitriyanti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 34

PERTEMUAN 1

PENGENALAN ETIKA KOMPUTER

• PENGERTIAN ETIKA
• SEJARAH ETIKA KOMPUTER
• TOPIK-TOPIK ETIKA KOMPUTER
• BEBERAPA KEKELIRUAN (FALLACIES) DALAM ETIKA KOMPUTER
Pengertian Etika

Etika berasal dari bahasa Yunani kuno yakni “Ethos”


 Artinya adat kebiasaan atau karakter yang baik.
Fagothey (1953)
 Etika adalah studi tentang kehendak manusia, yaitu
kehendak yg berhubungan dengan keputusan yang benar
dan yang salah dalam tindak perbuatannya.
Pengertian Etika

Kamus Besar Bahasa Indoensia


 Etika merupakan ilmu tentang apa yang baik dan yang buruk serta
tentang hak dan kewajiban moral (akhlak).
 Kumpulan asas / nilai yang berkenaan dengan akhlak
 Nilai mengenai yang benar dan salah yang dianut masyarakat
Mengapa Perlu Etika

Kodrat Manusia sebagai makhluk individu dan makhluk


sosial.
Mahluk Individu
 Manusia mempunyai:
 Akal Budi
 Perasaan – merasakan keindahan seni budaya
 Kehendak bebas – bisa memilih
Mahluk Sosial
 Terikat pada lingkungan
Sejarah Perkembangan Etika Komputer

Nobert Wiener (1950)


Donn Parker (mid 1960)
Walter Maner (mid 1970)
Deborah Johnson (1985)
James Moor (1985)
Terrell War Bynum (1989)
Donald Gotterbarn (1990)
Nobert Wiener

 The academic field of information ethics was born—unintentionally


and almost accidentally—in the middle of the Second World War.
 At that time, philosopher/scientist Norbert Wiener was working
with a group of scientists and engineers who were involved with
him in the invention of digital computers and radar, and the
creation of a new kind of antiaircraft cannon that could:
 (1) perceive the presence of an airplane,
 (2) gather information about its speed and trajectory,
 (3) predict its future position a few seconds later,
 (4) decide where to aim and when to fire the shell,
 (5) carry out that decision.
Nobert Wiener

 Wiener realized that the new science and technology that he


and his colleagues were creating would have “enormous
potential for good and for evil.”
 He predicted that, after the war, the new information
technology would dramatically change the world just as
much as the Industrial Revolution had done in the nineteenth
and early twentieth centuries.
 Wiener predicted a “second industrial revolution,” an
“automatic age,” that would generate a staggering number of
new ethical challenges and opportunities.
Nobert Wiener

 (Wiener, 1950) The Human Use of Human Beings  explored


the likely impacts of information technologies upon central
human values, such as life, health, happiness, security,
freedom, knowledge, opportunities, and abilities.
 Wiener’’s way of analyzing and trying to resolve information
ethics issues
 assimilate new cases by applying already existing, ethically
acceptable laws, rules, and practices.
Nobert Wiener

 Wiener’’s information ethics ideas and methods apply not only


to computer ethics, in the narrow sense of this term, but also
to other specific areas such as “agent” ethics, Internet ethics,
the ethics of nanotechnology, the ethics of bioengineering,
even journalism ethics, and library ethics.
Donn Parker

 In the mid-1960s, for example, Donn Parker—a computer


scientist at SRI International—began to notice and study
unethical and illegal activities of computer professionals.
 Parker (1968) gathered example cases of computer crimes,
and he published the article, “Rules of Ethics in Information
Processing,” in Communications of the ACM.
 He also headed the development of the first Code of
Professional Conduct for the Association for Computing
Machinery, which eventually was adopted by the ACM in 1973.
 Later, he published a number of books and articles on
computer crime.
Walter Maner

 A faculty member in Philosophy at Old Dominion University.


 In the specific field of computer ethics, in the mid-1970 Walter
Maner coined the name “computer ethics” and offered a
definition of the field.
 Computer ethics  ethical problems aggravated, transformed
or created by computer technology.
 Some old ethical problems were made worse by computers,
 while others came into existence because of computer
technology.
 Computers might even create new ethical problems that had
never been seen before.
Deborah Johnson

Write a book Computer Ethics (1985).


 Computer ethics studies the way in which computers “pose new versions of
standard moral problems and moral dilemmas, exacerbating the old
problems, and forcing us to apply ordinary moral norms in uncharted
realms.”
Topics in computer ethics introduced by Johnson:
 ownership of software and intellectual property,
 computing and privacy,
 responsibility of computer professionals,
 the just distribution of technology and human power.
 In later editions (1994, 2001), Johnson added new ethical topics, such as:
 “hacking” into people’’s computers without their permission,
 computer technology for persons with disabilities, and the
 Internet’’s impact upon democracy.
James Moor

1985 in his paper “What is computer ethics?”


 Computer are logically malleable
 Policy vacuum

 conceptual muddle

1996 in his ETHICOM96 keynote address


 “informationalization” of a task
 Core values
James Moor

 Computers are logically malleable in that they can be shaped


and molded to do any activity that can be characterized in
terms of inputs, outputs and connecting logical operations.
 Because logic applies everywhere, the potential applications
of computer technology appear limitless.
 The computer is the nearest thing we have to a universal tool.
Indeed, the limits of computers are largely the limits of our
own creativity.
James Moor

 A typical problem in Computer Ethics arises because there is a


policy vacuum about how computer technology should be
used.
 Computers provide us with new capabilities and these in turn
give us new choices for action.
 Often, either no policies for conduct in these situations exist
or existing policies seem inadequate.
 A central task of Computer Ethics is to determine what we
should do in such cases, that is, formulate policies to guide our
actions.
James Moor

 One difficulty is that along with a policy vacuum there is often


a conceptual vacuum.
 Although a problem in computer ethics may seem clear
initially, a little reflection reveals a conceptual muddle.
 What is needed in such cases is an analysis that provides a
coherent conceptual framework within which to formulate a
policy for action.
James Moor

“informationalization” of a task
 This occurs when one uses computers to do an “old” jobmore
efficiently.
 Eventually, however, computing begins to do the old job in a new
way, and information processing becomes an integral part of the
task.
 The resulting informationalization of a task can sometimes alter
the meanings of old terms and create conceptual muddles that
need to be clarified.
James Moor

 Moor called such central human values (such as life, health,


happiness, security, resources, opportunities, and knowledge)
“core values,” and he noted that they are crucial to the long-
term survival of any community.
Terrell War Bynum (1989)

 Computer ethics identifies and analyzes the impacts of


information technology on such social and human values as
health, wealth, work, opportunity, freedom, democracy,
knowledge, privacy, security, self-fulfillment, etc.
Donald Gotterbarn (1990)

 Computer ethics should be viewed as a branch of professional


ethics.
 Proffesional ethics : the values that guide the day-to-day
activities of computing professionals in their role as
professionals.
Donald Gotterbarn

 Gotterbarn had been working with a committee of the ACM


creating the third version of that organization’s “Code of
Ethics and Professional Conduct” (adopted by the ACM in
1992).
 Later, he became Chair of the ACM Committee on Professional
Ethics, and he headed a joint taskforce of the IEEE and ACM to
create the “Software Engineering Code of Ethics and
Professional Practice” (adopted by those organizations in
1999).
 In the late 1990s, he created the Software Engineering
Research Institute (SEERI) at East Tennessee State University
Example Topics in Computer Ethics

Computers in the Workplace


Computer Crime
Privacy and Anonymity
Intellectual Property
Professional Responsibility and Globalization
Example Topics in Computer Ethics

Computers in the Workplace


 Job satisfaction
 Health and safety

How computers impact health and safety when


information technology is introduced into a workplace.
Example Topics in Computer Ethics

Computer Crime
 Computer viruses, spyware,
 Phishing
 DoS (Denial of Service)
 Hacking activity
Example Topics in Computer Ethics

Privacy and Anonymity


 The ease and efficiency with which computers and networks can
be used to gather, store, search, compare, retrieve, and share
personal information make computer technology especially
threatening to anyone who wishes to keep personal information
out of the public domain or out of the hands of those who are
perceived as potential threats.
 The variety of privacy-related issues generated by computer
technology has led to reexamination of the concept of privacy
itself.
Example Topics in Computer Ethics

Intellectual Property
 One of the more controversial areas  software ownership.
 Some people, like Richard Stallman, who started the Free
Software Foundation, believe that software ownership should not
be allowed at all. He claims that all information should be free,
and all programs should be available for copying, studying, and
modifying by anyone who wishes to do so.
 Others, such as Deborah Johnson, argue that software companies
or programmers would not invest weeks and months of work and
significant funds in the development of software if they could not
get the investment back in the form of license fees or sales.
Example Topics in Computer Ethics

Professional Responsibility and Globalization


Such globalization issues that include ethics considerations include:
 Global laws
 Global business
 Global education
 Global information flows
 Information-rich and information-poor nations
 Information interpretation
As educational opportunities, business and employment
opportunities, medical services, and many other necessities of life
move more and more into cyberspace, gaps between the rich and the
poor may become even worse, leading to new ethical considerations.
Common Computer Ethics Fallacies

 Peter S. Tippett identified the following computer ethics


fallacies, which have been widely discussed and generally
accepted as being representative of the most common.
 The Computer Game Fallacy
 The Law-Abiding Citizen Fallacy
 The Shatterproof Fallacy
 The Candy-from-a-Baby Fallacy
 The Hacker's Fallacy
 The Free Information Fallacy
Common Computer Ethics Fallacies

 The Computer Game Fallacy


 What computer users often do not consider is that although the
computer operates under very strict rules, the software programs
are written by humans and are just as susceptible to allowing bad
things to happen as people often are in their own lives
Common Computer Ethics Fallacies

 The Law-Abiding Citizen Fallacy


 Sometimes users confuse what is legal with regard to computer use
with what is reasonable behavior for using computers.
Common Computer Ethics Fallacies

 The Shatterproof Fallacy


 The belief that what a person does with a computer can do minimal
harm, and only affects perhaps a few files on the computer itself; it
is not considering the impact of actions before doing them.
 Example:
 Forwarding e-mail without permission of the author can lead to
harm or embarrassment if the original sender was communicating
privately without expectation of his message being seen by any
others.
 Using e-mail to stalk someone, to send spam, and to harass or
offend the recipient in some way also are harmful uses of
computers.
Common Computer Ethics Fallacies

The Candy-from-a-Baby Fallacy


 Illegal and unethical activity, such as software piracy and
plagiarism, are very easy to do with a computer.
 However, just because it is easy does not mean that it is right.
Common Computer Ethics Fallacies

The Hacker's Fallacy


 Numerous reports and publications of the commonly accepted
hacker belief is that it is acceptable to do anything with a
computer as long as the motivation is to learn and not to gain or
make a profit from such activities.
Common Computer Ethics Fallacies

The Free Information Fallacy


 This fallacy emerged from the fact that it is so easy to copy digital
information and to distribute it widely.
 However, this line of thinking completely ignores the fact the
copying and distribution of data is completely under the control
and whim of the people who do it, and to a great extent, the
people who allow it to happen.

You might also like