Tindakan Hacking dan Profesi Hacker: Persoalan Etis antara Utilitarianisme dan Deontologi
Main Article Content
Abstract
This research was conducted to see concrete evidence of the ethical theory of utilitarianism and the ethical theory of obligation or deontology on the issue of hackers as a profession and the act of hacking, where both of these things are still difficult to determine as a good thing or a bad thing because of the many types of hackers who have their own backgrounds and motives such as gray hat hackers and vigilante hackers. This research method is quantitative descriptive research, with data sources obtained from a survey method in the form of a questionnaire. The population in this study are people who know or have heard the concept of hackers and hacking, with a sample obtained through random sampling techniques totaling 100 respondents. The results of the questionnaire showed a division of respondents' opinions on several questions concerning the issue of gray hat hackers and vigilante hackers. Respondents' opinions on the concept of gray hat hackers were 46 agreed (46%), 11 strongly agreed (11%), 30 disagreed (30%), and 13 strongly disagreed (13%). Respondents' opinions on the vigilante hacker concept were 35 agreed (35%), 11 strongly agreed (11%), 42 disagreed (42%), 12 strongly disagreed (12%). Agreeing and strongly agreeing opinions are a form of utilitarianism that recognizes gray hat hackers and vigilante hackers are a good thing because they are beneficial to most people, while disagreeing and strongly disagreeing opinions show a deontological view that considers gray hat hackers and vigilante hackers as a bad thing because hacking is an illegal act. By introducing the concepts of gray hat hackers and vigilante hackers, this research has successfully shown concrete evidence of both theories.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
Arifah, D. A. (2011). Kasus cybercrime di indonesia. jurnal Bisnis dan Ekonomi, 18(2). Retrieved from https://unisbank.ac.id/ojs/index.php/fe3/article/view/2099/767
Barrow, J. M., & Khandhar, P. B. (2022). Deontology. StatPearls Publishing, Treasure Island (FL). http://europepmc.org/books/NBK459296
Gray, K., & Schein, C. (2012). Two Minds Vs. Two Philosophies: Mind Perception Defines Morality and Dissolves the Debate Between Deontology and Utilitarianism. Review of Philosophy and Psychology, 3. https://doi.org/10.1007/s13164-012-0112-5
Hardani, H., Andriani, H., Fardani, R. A., Ustiawaty, J., Utami, E. F., Sukmana, D. J., & Istiqomah, R. R. (2020). Buku Metode penelitian kualitatif & kuantitatif. Yogyakarta: Pustaka Ilmu.
Karina, D. (2022, November 11). 44 Juta Data MyPertamina Diduga Bocor, Pertamina dan Telkom Bakal Investigasi. Kompas TV. Retrieved from https://www.kompas.tv/article/347339/44-juta-data-mypertamina-diduga-bocor-pertamina-dan-telkom-bakal-investigasi
Kumalasari, V. (2021). ETIKA PROFESI, Dalam Bidang Teknologi Informasi. Penerbit Yayasan Prima Agus Teknik, 1-75. Retrieved from https://digilib.stekom.ac.id/assets/dokumen/ebook/feb_b48db5b7d841a92b6dbd5a6209a3f41107806e45_1642141125.pdf.
Levy, S. (1984). Hackers: Heroes of the computer revolution (Vol. 14). Garden City, NY: Anchor Press/Doubleday.
Tanczer, L. M. (2020). 50 shades of hacking: How IT and cybersecurity industry actors perceive good, bad, and former hackers. Contemporary Security Policy, 41(1), 108–128. https://doi.org/10.1080/13523260.2019.1669336
Tiller, J. S. (2004). The ethical hack: a framework for business value penetration testing. Auerbach publications.
Utomo, G. A. (2019). Ethical hacking. Cyber Security dan Forensik Digital, 2(1), 8-15.
Vivi Kumalasari. (2021). ETIKA PROFESI, Dalam Bidang Teknologi Informasi. Penerbit Yayasan Prima Agus Teknik, 7(1), 1-75. Retrieved from https://penerbit.stekom.ac.id/index.php/yayasanpat/article/view/249
Whitton, A. (2007). Vigilantism, Vigilante Justice, and Victim Self-Help.