PERTEMUAN 1
PENGENALAN ETIKA KOMPUTER
• PENGERTIAN ETIKA
• SEJARAH ETIKA KOMPUTER
• TOPIK-TOPIK ETIKA KOMPUTER
• BEBERAPA KEKELIRUAN (FALLACIES) DALAM ETIKA KOMPUTER
Pengertian Etika
Etika berasal dari bahasa Yunani kuno yakni “Ethos”
Artinya adat kebiasaan atau karakter yang baik.
Fagothey (1953)
Etika adalah studi tentang kehendak manusia, yaitu
kehendak yg berhubungan dengan keputusan yang benar
dan yang salah dalam tindak perbuatannya.
Pengertian Etika
Kamus Besar Bahasa Indoensia
Etika merupakan ilmu tentang apa yang baik dan yang buruk serta
tentang hak dan kewajiban moral (akhlak).
Kumpulan asas / nilai yang berkenaan dengan akhlak
Nilai mengenai yang benar dan salah yang dianut masyarakat
Mengapa Perlu Etika
Kodrat Manusia sebagai makhluk individu dan makhluk
sosial.
Mahluk Individu
Manusia mempunyai:
Akal Budi
Perasaan – merasakan keindahan seni budaya
Kehendak bebas – bisa memilih
Mahluk Sosial
Terikat pada lingkungan
Sejarah Perkembangan Etika Komputer
Nobert Wiener (1950)
Donn Parker (mid 1960)
Walter Maner (mid 1970)
Deborah Johnson (1985)
James Moor (1985)
Terrell War Bynum (1989)
Donald Gotterbarn (1990)
Nobert Wiener
The academic field of information ethics was born—unintentionally
and almost accidentally—in the middle of the Second World War.
At that time, philosopher/scientist Norbert Wiener was working
with a group of scientists and engineers who were involved with
him in the invention of digital computers and radar, and the
creation of a new kind of antiaircraft cannon that could:
(1) perceive the presence of an airplane,
(2) gather information about its speed and trajectory,
(3) predict its future position a few seconds later,
(4) decide where to aim and when to fire the shell,
(5) carry out that decision.
Nobert Wiener
Wiener realized that the new science and technology that he
and his colleagues were creating would have “enormous
potential for good and for evil.”
He predicted that, after the war, the new information
technology would dramatically change the world just as
much as the Industrial Revolution had done in the nineteenth
and early twentieth centuries.
Wiener predicted a “second industrial revolution,” an
“automatic age,” that would generate a staggering number of
new ethical challenges and opportunities.
Nobert Wiener
(Wiener, 1950) The Human Use of Human Beings explored
the likely impacts of information technologies upon central
human values, such as life, health, happiness, security,
freedom, knowledge, opportunities, and abilities.
Wiener’s way of analyzing and trying to resolve information
ethics issues
assimilate new cases by applying already existing, ethically
acceptable laws, rules, and practices.
Nobert Wiener
Wiener’s information ethics ideas and methods apply not only
to computer ethics, in the narrow sense of this term, but also
to other specific areas such as “agent” ethics, Internet ethics,
the ethics of nanotechnology, the ethics of bioengineering,
even journalism ethics, and library ethics.
Donn Parker
In the mid-1960s, for example, Donn Parker—a computer
scientist at SRI International—began to notice and study
unethical and illegal activities of computer professionals.
Parker (1968) gathered example cases of computer crimes,
and he published the article, “Rules of Ethics in Information
Processing,” in Communications of the ACM.
He also headed the development of the first Code of
Professional Conduct for the Association for Computing
Machinery, which eventually was adopted by the ACM in 1973.
Later, he published a number of books and articles on
computer crime.
Walter Maner
A faculty member in Philosophy at Old Dominion University.
In the specific field of computer ethics, in the mid-1970 Walter
Maner coined the name “computer ethics” and offered a
definition of the field.
Computer ethics ethical problems aggravated, transformed
or created by computer technology.
Some old ethical problems were made worse by computers,
while others came into existence because of computer
technology.
Computers might even create new ethical problems that had
never been seen before.
Deborah Johnson
Write a book Computer Ethics (1985).
Computer ethics studies the way in which computers “pose new versions of
standard moral problems and moral dilemmas, exacerbating the old
problems, and forcing us to apply ordinary moral norms in uncharted
realms.”
Topics in computer ethics introduced by Johnson:
ownership of software and intellectual property,
computing and privacy,
responsibility of computer professionals,
the just distribution of technology and human power.
In later editions (1994, 2001), Johnson added new ethical topics, such as:
“hacking” into people’s computers without their permission,
computer technology for persons with disabilities, and the
Internet’s impact upon democracy.
James Moor
1985 in his paper “What is computer ethics?”
Computer are logically malleable
Policy vacuum
conceptual muddle
1996 in his ETHICOM96 keynote address
“informationalization” of a task
Core values
James Moor
Computers are logically malleable in that they can be shaped
and molded to do any activity that can be characterized in
terms of inputs, outputs and connecting logical operations.
Because logic applies everywhere, the potential applications
of computer technology appear limitless.
The computer is the nearest thing we have to a universal tool.
Indeed, the limits of computers are largely the limits of our
own creativity.
James Moor
A typical problem in Computer Ethics arises because there is a
policy vacuum about how computer technology should be
used.
Computers provide us with new capabilities and these in turn
give us new choices for action.
Often, either no policies for conduct in these situations exist
or existing policies seem inadequate.
A central task of Computer Ethics is to determine what we
should do in such cases, that is, formulate policies to guide our
actions.
James Moor
One difficulty is that along with a policy vacuum there is often
a conceptual vacuum.
Although a problem in computer ethics may seem clear
initially, a little reflection reveals a conceptual muddle.
What is needed in such cases is an analysis that provides a
coherent conceptual framework within which to formulate a
policy for action.
James Moor
“informationalization” of a task
This occurs when one uses computers to do an “old” jobmore
efficiently.
Eventually, however, computing begins to do the old job in a new
way, and information processing becomes an integral part of the
task.
The resulting informationalization of a task can sometimes alter
the meanings of old terms and create conceptual muddles that
need to be clarified.
James Moor
Moor called such central human values (such as life, health,
happiness, security, resources, opportunities, and knowledge)
“core values,” and he noted that they are crucial to the long-
term survival of any community.
Terrell War Bynum (1989)
Computer ethics identifies and analyzes the impacts of
information technology on such social and human values as
health, wealth, work, opportunity, freedom, democracy,
knowledge, privacy, security, self-fulfillment, etc.
Donald Gotterbarn (1990)
Computer ethics should be viewed as a branch of professional
ethics.
Proffesional ethics : the values that guide the day-to-day
activities of computing professionals in their role as
professionals.
Donald Gotterbarn
Gotterbarn had been working with a committee of the ACM
creating the third version of that organizations “Code of
Ethics and Professional Conduct” (adopted by the ACM in
1992).
Later, he became Chair of the ACM Committee on Professional
Ethics, and he headed a joint taskforce of the IEEE and ACM to
create the “Software Engineering Code of Ethics and
Professional Practice” (adopted by those organizations in
1999).
In the late 1990s, he created the Software Engineering
Research Institute (SEERI) at East Tennessee State University
Example Topics in Computer Ethics
Computers in the Workplace
Computer Crime
Privacy and Anonymity
Intellectual Property
Professional Responsibility and Globalization
Example Topics in Computer Ethics
Computers in the Workplace
Job satisfaction
Health and safety
How computers impact health and safety when
information technology is introduced into a workplace.
Example Topics in Computer Ethics
Computer Crime
Computer viruses, spyware,
Phishing
DoS (Denial of Service)
Hacking activity
Example Topics in Computer Ethics
Privacy and Anonymity
The ease and efficiency with which computers and networks can
be used to gather, store, search, compare, retrieve, and share
personal information make computer technology especially
threatening to anyone who wishes to keep personal information
out of the public domain or out of the hands of those who are
perceived as potential threats.
The variety of privacy-related issues generated by computer
technology has led to reexamination of the concept of privacy
itself.
Example Topics in Computer Ethics
Intellectual Property
One of the more controversial areas software ownership.
Some people, like Richard Stallman, who started the Free
Software Foundation, believe that software ownership should not
be allowed at all. He claims that all information should be free,
and all programs should be available for copying, studying, and
modifying by anyone who wishes to do so.
Others, such as Deborah Johnson, argue that software companies
or programmers would not invest weeks and months of work and
significant funds in the development of software if they could not
get the investment back in the form of license fees or sales.
Example Topics in Computer Ethics
Professional Responsibility and Globalization
Such globalization issues that include ethics considerations include:
Global laws
Global business
Global education
Global information flows
Information-rich and information-poor nations
Information interpretation
As educational opportunities, business and employment
opportunities, medical services, and many other necessities of life
move more and more into cyberspace, gaps between the rich and the
poor may become even worse, leading to new ethical considerations.
Common Computer Ethics Fallacies
Peter S. Tippett identified the following computer ethics
fallacies, which have been widely discussed and generally
accepted as being representative of the most common.
The Computer Game Fallacy
The Law-Abiding Citizen Fallacy
The Shatterproof Fallacy
The Candy-from-a-Baby Fallacy
The Hacker's Fallacy
The Free Information Fallacy
Common Computer Ethics Fallacies
The Computer Game Fallacy
What computer users often do not consider is that although the
computer operates under very strict rules, the software programs
are written by humans and are just as susceptible to allowing bad
things to happen as people often are in their own lives
Common Computer Ethics Fallacies
The Law-Abiding Citizen Fallacy
Sometimes users confuse what is legal with regard to computer use
with what is reasonable behavior for using computers.
Common Computer Ethics Fallacies
The Shatterproof Fallacy
The belief that what a person does with a computer can do minimal
harm, and only affects perhaps a few files on the computer itself; it
is not considering the impact of actions before doing them.
Example:
Forwarding e-mail without permission of the author can lead to
harm or embarrassment if the original sender was communicating
privately without expectation of his message being seen by any
others.
Using e-mail to stalk someone, to send spam, and to harass or
offend the recipient in some way also are harmful uses of
computers.
Common Computer Ethics Fallacies
The Candy-from-a-Baby Fallacy
Illegal and unethical activity, such as software piracy and
plagiarism, are very easy to do with a computer.
However, just because it is easy does not mean that it is right.
Common Computer Ethics Fallacies
The Hacker's Fallacy
Numerous reports and publications of the commonly accepted
hacker belief is that it is acceptable to do anything with a
computer as long as the motivation is to learn and not to gain or
make a profit from such activities.
Common Computer Ethics Fallacies
The Free Information Fallacy
This fallacy emerged from the fact that it is so easy to copy digital
information and to distribute it widely.
However, this line of thinking completely ignores the fact the
copying and distribution of data is completely under the control
and whim of the people who do it, and to a great extent, the
people who allow it to happen.