Prinsip Etika Keilmuan Bidang Teknologi Informasi dan Penerapannya dalam Karya Tulis Ilmiah

Penulis

  • Agung Bella Putra Utama Universitas Negeri Malang, Jl. Semarang No. 5 Malang, Jawa Timur, Indonesia
  • Aji Prasetya Wibawa Universitas Negeri Malang, Jl. Semarang No. 5 Malang, Jawa Timur, Indonesia
  • Betty Masruroh Universitas Negeri Malang, Jl. Semarang No. 5 Malang, Jawa Timur, Indonesia
  • Vira Setia Ningrum Universitas Negeri Malang, Jl. Semarang No. 5 Malang, Jawa Timur, Indonesia

DOI:

https://doi.org/10.17977/um068v1i82021p630-640

Kata Kunci:

etika keilmuan, etika komputer, teknologi informasi, karya tulis ilmiah

Abstrak

Scientific ethics is widely used in the field of information technology to solve problems. This arises because there is no firmness in the ethical laws of the use of information technology. This article aims to explore the current application of scientific ethics in scientific writing. The method used is library research method. The results of the study show that researchers have used the application of scientific ethics in the field of information technology to find trends in the types of scientific publications. The most popular scientific ethics in the field of information technology is computer ethics. Computer ethics is the analysis of the nature and societal impact of computer technology, and the development and justification of relevant policies regarding the ethical use of information technology. Computer ethics has great potential to be developed because of the problems of: (a) privacy, (b) accuracy, (c) property, and (d) access which are very complex. For further research, researchers can have a broader perspective on the application of computer ethics in the field of information technology. Computer scientists can use this research to find applications of scholarly writing that deepen ethical issues in computer science, whether in conferences, journals, or book publications.

Etika keilmuan banyak digunakan dalam bidang teknologi informasi untuk memecahkan masalah. Hal ini muncul karena belum adanya ketegasan dalam hukum etik penggunaan teknologi informasi. Artikel ini bertujuan untuk mengeksplorasi penerapan etika ilmiah terkini dalam penulisan ilmiah. Metode yang digunakan adalah metode penelitian kepustakaan. Hasil penelitian menunjukkan bahwa peneliti telah menggunakan penerapan etika ilmiah di bidang teknologi informasi untuk menemukan tren jenis publikasi karya ilmiah. Etika ilmiah yang paling populer di bidang teknologi informasi adalah etika komputer. Etika komputer adalah analisis sifat dan dampak sosial dari teknologi komputer, serta pengembangan dan pembenaran kebijakan yang relevan mengenai penggunaan teknologi informasi secara etis. Etika komputer memiliki potensi besar untuk dikembangkan karena masalah: (a) privacy, (b) accuracy, (c) property, dan (d) access yang sangat kompleks. Untuk penelitian selanjutnya, peneliti dapat memiliki perspektif yang lebih luas tentang penerapan etika komputer di bidang teknologi informasi. Ilmuwan komputer dapat menggunakan penelitian ini untuk menemukan aplikasi penulisan ilmiah yang memperdalam masalah etika ilmu komputer, baik dalam konferensi, jurnal, atau publikasi buku.

Referensi

A Study And Comparison Of Ethical Codes For Information Technology Professionals. (2018). Issues In Information Systems. https://doi.org/10.48009/2_iis_2018_174-184

Ada, Ş., & Ghaffarzadeh, M. (2015). Decision Making Based On Management Information System and Decision Support System. European Researcher, 93(4), 260–269. https://doi.org/10.13187/er.2015.93.260

Akakura, T., & Ishii, T. (2016). Development and evaluation of a self-learning support system for Patent Act suited to the current state of intellectual property education in engineering departments. 2016 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), 122–127. https://doi.org/10.1109/TALE.2016.7851781

Al Barghuthi, N. B., & Said, H. (2014). Ethics behind Cyber Warfare: A study of Arab citizens awareness. 2014 IEEE International Symposium on Ethics in Science, Technology and Engineering, 1–7. https://doi.org/10.1109/ETHICS.2014.6893402

Ariana, L. R. (2011). Etika dan Keamanan Sistem Informasi. Fakultas Teknik Informatika Universitas Stikubank.

Aziz, A. A., Lokman, A. M., Ishak, S. A., & Yusof, Z. M. (2011). The Social Aspect Of Human Computer Activities: An Investigation Of Information Technology Ethics. 2011 International Conference on User Science and Engineering (i-USEr ), 234–239. https://doi.org/10.1109/iUSEr.2011.6150572

Budiman, H. (2017). Peran Teknologi Informasi Dan Komunikasi Dalam Pendidikan. Al-Tadzkiyyah: Jurnal Pendidikan Islam, 8(1), 31. https://doi.org/10.24042/atjpi.v8i1.2095

Commission, S. A. L. R. (2006). Privacy and Data Protection (Issue 28 Februari).

Dardiri, A., Dwiyanto, F. A., & Utama, A. B. P. (2020). An integrative review of computational methods for vocational curriculum, apprenticeship, labor market, and enrollment problems. International Journal of Advances in Intelligent Informatics, 6(3), 246. https://doi.org/10.26555/ijain.v6i3.581

Davison, R. M. (2000). Professional Ethics in Information Systems: A Personal Perspective. Communications of the Association for Information Systems, 3. https://doi.org/10.17705/1CAIS.00308

Day, S., Rennie, S., Luo, D., & Tucker, J. D. (2020). Open to the public: Paywalls and the public rationale for open access medical research publishing. Research Involvement and Engagement, 6(1), 4–10. https://doi.org/10.1186/s40900-020-0182-y

Dittrich, D., Bailey, M., & Dietrich, S. (2011). Building an Active Computer Security Ethics Community. IEEE Security & Privacy Magazine, 9(4), 32–40. https://doi.org/10.1109/MSP.2010.199

Duda, S. J., & Peters, V. (2014). Thou shalt not… A look at the ethics of copying software code. 2014 IEEE International Symposium on Ethics in Science, Technology and Engineering, 1–5. https://doi.org/10.1109/ETHICS.2014.6893375

Eleanora, F. N. (2013). Hak Cipta Menurut Undang-Undang Nomor 19 Tahun 2002. Forum Ilmiah, 10(1), 98–109. https://doi.org/10.31227/osf.io/qdxzc

George W. Reynolds. (2014). Ethics in Information Technology. In Journal of Information Science (Issue 5). https://doi.org/10.1177/016555157900100505

Ginting, P. (2008). Kebijakan penanggulangan tindak pidana teknologi informasi melalui hukum pidana tesis.

Jefferies, P. (n.d.). Multimedia, cyberspace and ethics. 2000 IEEE Conference on Information Visualization. An International Conference on Computer Visualization and Graphics, 99–104. https://doi.org/10.1109/IV.2000.859743

Kurniawati, A. (2015). Penegakan Hukum Terhadap Pelanggaran Hak Cipta Melalui Media Internet. In Fakultas Hukum Universitas Hasanuddin (Vol. 151).

Lavoie, R., Main, K., King, C., & King, D. (2020). Virtual experience, real consequences: the potential negative emotional consequences of virtual reality gameplay. Virtual Reality, 0123456789. https://doi.org/10.1007/s10055-020-00440-y

Lembaga Ilmu Pengetahuan Indonesia. (2014). Peraturan Kepala Lembaga Ilmu Pengetahuan Indonesia Nomor 06/E/2013. Lembaga Ilmu Pengetahuan Indonesia, 1–73.

Mason, R. O. (1986). Four Ethical Issues of the Information Age. MIS Quarterly, 10(1), 5. https://doi.org/10.2307/248873

Masrom, M., Ismail, Z., Anuar, R. N., Hussein, R., & Mohamed, N. (2011). Analyzing Accuracy and Accessibility in Information and Communication Technology Ethical Scenario Context. American Journal of Economics and Business Administration, 3(2), 370–376. https://doi.org/10.3844/ajebasp.2011.370.376

Mohamud, I. K., Zeki, A. M., & Saidin, A. Z. (2015). Attitude towards Information Privacy Issues among Students of IIUM. 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 171–175. https://doi.org/10.1109/ACSAT.2015.53

Molok, N. N. A., Chang, S., & Ahmad, A. (2010). Information leakage through online social networking: Opening the doorway for advanced persistence threats. Proceedings of the 8th Australian Information Security Management Conference, March, 70–80.

Moor, J. H. (1985). What is Computer Ethics? Metaphilosophy, 16(4), 266–275. https://¬doi.¬org/-10.1111/j.1467-9973.1985.tb00173.x

Moore, A. (2006). Bad science in the headlines. EMBO Reports, 7(12), 1193–1196. https://¬doi.¬org/-10.1038/sj.embor.7400862

Murray, J., & Fairfield, J. A. T. (2014). Global ethics and virtual worlds: Ensuring functional integrity in transnational research studies. 2014 IEEE International Symposium on Ethics in Science, Technology and Engineering, 1–7. https://doi.org/10.1109/ETHICS.2014.6893453

Nallaperumal, K. (2018). CyberSecurity Analytics to Combat Cyber Crimes. 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 1–4. https://¬doi.org/-10.1109/ICCIC.2018.8782430

Namayandeh, M., & Taherdoost, H. (2009). Review Paper on Computer Ethics and Related Research Models. January, 2–6.

Nisar, R., & Sahar, S. G. (2019). Security and Privacy Issues. 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (ICoMET), 1–6. https://doi.org/¬10.1109/¬ICOMET.-2019.8673529

Prakasa, R. R. (2020). Etika Profesi Dalam Pemanfaatan Teknologi Informasi.

Punchoojit, L., & Hongwarittorrn, N. (2014). The Ethics of computer research: A survey of user acceptance towards mobile HCI research practices and factor influencing the willingness to participate and to share information in research. 2014 International Computer Science and Engineering Conference (ICSEC), 383–388. https://doi.org/10.1109/ICSEC.2014.6978227

Puspitaningrum, A. D. (2015). Etika dan Keamanan Sitem Informasi. Fakultas Teknologi Informasi Universitas Mercu Buana.

Rumetna, M. S. (2018). Pentingnya Memahami Penerapan Privasi Di Era Teknologi Informasi. Jurnal Teknologi Informasi Dan Ilmu Komputer, 11(2).

Shakib, J., & Layton, D. (2014). Interaction between ethics and technology. 2014 IEEE International Symposium on Ethics in Science, Technology and Engineering, 1–5. https://doi.org/10.1109/ETHICS.2014.6893461

Smith, B., Yurcik, W., & Doss, D. (n.d.). Ethical hacking: the security justification redux. IEEE 2002 International Symposium on Technology and Society (ISTAS’02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293), 374–379. https://doi.org/¬10.1109/-ISTAS.¬2002.1013840

Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of Business Research, 104, 333–339. https://doi.org/10.1016/j.jbusres.2019.07.039

Supriyadi. (2016). Community of Practitioners: Solusi Alternatif Berbagi Pengetahuan antar Pustakawan. Lentera Pustaka: Jurnal Kajian Ilmu Perpustakaan, Informasi Dan Kearsipan, 2(2), 83–93. https://doi.org/10.14710/lenpust.v2i2.13476

Suswandari. (2016). Kode Etik Penelitian dan Kepengarangan. In Universitas Muhammadiyah Prof. Dr. Hamka (p. 10).

Tang, L., Ma, W., Grobler, M., Meng, W., Wang, Y., & Wen, S. (2019). Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media. IEEE Access, 7, 75556–75567. https://doi.org/10.1109/ACCESS.2019.2921029

Taylor, L. (2017). What is data justice? The case for connecting digital rights and freedoms globally. Big Data & Society, 4(2). https://doi.org/10.1177/2053951717736335

Wati, I. (2020). Implikasi Etis Dari Pemanfaatan Teknologi Informasi Pada Karyawan PT. Maju Mapan YIC.

Willinsky, J., & Wolfson, L. (2001). The Indexing of Scholarly Journals: A Tipping Point for Publishing Reform? The Journal of Electronic Publishing, 7(2). https://doi.org/10.3998/3336451.0007.202

Wisnu, J., Santoso, H. B., Purbarani, S., & Syulistyo, A. R. (2015). Panduan Penulisan Artikel Ilmiah. In Fakultas Ilmu Komputer Universitas Indonesia (Issue August 2016, pp. 22–23, 34–36).

Xu, Q., Su, Z., Dai, M., & Yu, S. (2020). APIS: Privacy-Preserving Incentive for Sensing Task Allocation in Cloud and Edge-Cooperation Mobile Internet of Things With SDN. IEEE Internet of Things Journal, 7(7), 5892–5905. https://doi.org/10.1109/JIOT.2019.2954380

Zhang, Y., Zhang, S., Zhang, Y., Tao, J., & Wang, P. (2019). A Large-Scale Empirical Study of Internet Users’ Privacy Leakage in China. 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 406–411. https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00083

Zhao, Y., He, L., Li, Z., Yang, L., Dong, H., Li, C., & Wang, Y. (2019). Large-scale Detection of Privacy Leaks for BAT Browsers Extensions in China. 2019 International Symposium on Theoretical Aspects of Software Engineering (TASE), 57–64. https://doi.org/10.1109/TASE.2019.00-19

Diterbitkan

2021-08-25

Terbitan

Bagian

Articles