Pemanfaatan Etika Komputer Dalam Jaringan Peer To Peer Studi Kasus : Torrent
DOI:
https://doi.org/10.33488/1.ma.2016.2.63Keywords:
EnglishAbstract
Sharing information in the world of technology has become easier with peer-to-peer applications such as torrents. This application allows everyone from anywhere to share various kinds of files ranging from movies, music, software, games, and others. But sometimes what is found in torrents are pirated files. It could be a software or game crack, a scan or a copy of a book, a film recording using a personal camera, and so on. Copyright issues, piracy, and malware are what make torrents seem like a free black market. From this application sometimes there is a malware that harms the downloader so that they become a botnet for malware spreaders to mine bitcoins. This ethical issue will be discussed based on Kantian ethics and an analysis of information technology ethics that produces policy proposals regarding the use of torrents. This research uses the methodology of solving ethical problems of information technology according to Meyenn by producing policies to regulate the use of Torrents.
Keywords: information sharing, peer to peer, torrent, information technology ethics, botnet, bitcoin
Downloads
References
uTorrent, "Help: uTorrent," 2013. [Online]. Available: http://help.utorrent.com/.
Bittorrent, "Introduction: Bittorrent," 2008. [Online]. Available: http://bittorrent.org/introduction.html.
I. C. K, Teknik Berbagi Objek lewat Jaringan P2P, Jakarta: Elex Media Komputindo, 2010.
F. S. Grodzinsky and H. T. Tavani, "Online file sharing: resolving the tensions between privacy and property interests," ACM SIGCAS Computers and Societ, vol. 38, no. 4, pp. 28 -39, 2008.
H. T. Tavani, Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, Hoboken: John Wiley and Sons, 2004.
M. A. Carrier, "The Pirate Bay, Grokster, and Google," Journal of Intellectual Property Rights, vol. 15, pp. 7 -18, 2010.
H. Nissenbaum, "Privacy as Contextual Integrity," Washington Law Review, vol. 79, no. 1, pp. 119 -157, 2004.
A.Drachen, K. Bauer and R. W. D. Veitch, "Only the good... get pirated: game piracy activity vs. metacritic score," in 6th International Conference on Foundations of Digital Games, New York, 2011.
A. Meyenn, "A proposed methodology for the teaching of Infor
mation Technology ethics in schools," in Conferences in Research and Practice in Information Technology, 2000.
A. D. Berns and E. Jung, "Searching for Malware in BitTorrent," University of Iowa Computer Science Technical Report UICS-08-05, Iowa, 2008.
J. Cheng and R. Donahue, "The Pirate Bay Torrent Analysis and Visualization," International Journal of Computer Science Engineering and Technology, vol. 3, no. 2, pp. 38 -42, 2013.
Claud, "Bitcoin Miner Malware," Antiy Labs, 18 September 2012. [Online]. Available: http://www.antiy.net/p/bitcoin-miner-malware/. [Accessed 12 Oktober 2015].
B. Proffitt, "Readwrite.com," 19 September 2012. [Online]. [Accessed 2015].[14]JoSephson Institute of Ethics, [Online]. Available: http://josephsoninstitue.org/MED/med5steps.htm.
BitTorrent, Inc, "Homepage learn: μTorrent," 2015. [Online].Available: http://www.utorrent.com/desktop/?x-source=utpro-homepage-learn#pro.
Downloads
Published
Issue
Section
License
Media Aplikom applies the Creative Commons Attribution (CC BY) license to works we publish. Under this license, authors retain ownership of the copyright for their content, grant the journal right of first publication, but allow anyone to download, reuse, reprint, modify, distribute and/or copy the content as long as the original authors and source are cited. No permission is required from the authors or the publishers. Appropriate attribution can be provided by simply citing the original article.
