ArticlePDF Available

LAW AND ETHICS IN SOCIAL MEDIA COMMUNICATION

Authors:

Abstract

Every Environment Has Its Own Laws And Ethics Which Guide Behavior; However, It Does Not Mean That Anybody Is Able To Obey It And It Rises Three Consequences At Legal, Ethic And Social. This Research Is A Quantitative Research With Law In Action Approach, It Is A Non-Doctrinal And Empirical Social Science Study. Internet Brings The World To New Ways Of Thinking, And Communicating. Netiquette Is An Ethical Guide In Behaving / Communicating Among Netizens. Teachers’ Awareness To Communicate Well In Smk Bakti Purwokerto Is At A Poor Level. Bad Habits Communications In Real-World Are Brought Into Cyber Which Often Create Legal Issues. Although No One Has Proceeded To Justice, It Is Quite Worrying Since Their Position As Teachers Should Be Role Models For Their Students. It Is Necessary To Realize The Awareness Of Compliance With The Law And Ethics Of Cyber Communication For These Teachers.Keywords: Netiquette, Internet, Social Media, Law And Ethics, Communication.
258
LAW AND ETHICS OF COMMUNICATING IN SOCIAL MEDIA
Rini Fidiyani, Dewi Sulistianingsih, and Pujiono
Faculty of Law of State University Semarang Indonesia
E-mail: fidiyani.rini@gmail.com
Abstract
Every environment has its own law and ethics as the guidelines how to behave by which the perpet-
rator causes three impacts, such as law, ethic, and social. The methods of the research are quantit-
ative and qualitative research with legal approach as law in action. It is a non-doctrinal empirical
so-cial science. Internet provides a new world, way of thinking, and way to communicate. Thus,
there is Nettiquette, an ethical guideline of how to behave or to communicate among the the
netizens. Mean-while, the teachers’s awareness to properly communicate in one of vocational school
in Purwokerto shows a low level. The bad way in real life communication affects their way in
communicating using social media which then sometimes results in legal matter. Though there has
not been any case re-corded by the court, it is still worrying since teachers should be a role model
for their students. There should be some efforts to make them aware of legal obedience and
communicating ethics in cyberspace for those teachers.
Keywords: netiquette, internet, social media, law and ethics, communication
Abstrak
Setiap lingkungan punya hukum dan etikanya sendiri yang menjadi pedoman bertingkah laku, dimana
pelanggarannya akan menimbulkan tiga akibat sekaligus, yaitu hukum, etika dan social. Penelitian ini
adalah penelitian kuantitatif dan kuantitatif dengan pendekatan terhadap hukum sebagai law in ac-
tion, merupakan studi ilmu sosial yang non-doktrinal dan bersifat empiris. Internet menghadirkan du-
nia, cara berfikir, dan berkomunikasi baru. Netiquette merupakan pedoman etis dalam berperilaku/
berkomunikasi di antara para netizen. Kesadaran untuk berkomunikasi yang baik pada guru “sebuah
sekolah kejuruan” di Purwokerto menunjukkan tingkat yang kurang baik. Kebiasaan buruk dalam ko-
munikasi dunia nyata dibawa ke dunia maya sehingga seringkali menimbulkan persoalan hukum. Meski
belum ada yang sampai ke ranah peradilan, akan tetapi hal ini cukup menghawatirkan mengingat ke-
dudukan mereka sebagai guru yang seharusnya menjadi teladan bagi murid-muridnya. Perlu dilakukan
penyadaran akan kepatuhan terhadap hukum dan etika berkomunikasi di dunia maya bagi bara guru
tersebut.
Kata kunci: netiquette, internet, media social, hukum dan etika, komunikasi.
Introduction
In the last two decades, internet network
infrastructure development (both by govern-
ment and private) followed by the emergence
of communication technology products (in the
form of mobile phones and android) and sup-
porting software which can directly connect to
internet causes significant information or com-
munication traffic development.
1
Katz and Rice
1
Read shortly about the masive development of commu-
nication as the impact of technology information revolu-
tion in Nurudin, “Media Sosial Baru dan Munculnya Revo-
lusi Proses Komunikasi”, Jurnal Komunikator, Vol. 4 No.
2, November 2013, pp. 83-93.
said that the availability of network infrastruc-
ture is one of the prerequisites in internet com-
munication. Other issues related to access is-
sues are society involvement, and social inter-
action and expression.
2
The problem of internet
access is already solved with the rise of internet
providers including built in and android pro-
ducts. However, the real issue lies in other pre-
requisites which are society involvement, and
social interaction and expression.
2
J. Katz and R. Rice, 2004, Social Consequences of Inter-
net Use: Access, Involvement and Interaction, Cam-
bridge, Massachusetts: The MIT Press.
Law and Ethics of Communicating in Social Media 259
Society involvement in this issue has not
been much revealed. It could be because their
activity is not published or still minimum al-
though the number of virtual communities is
growing significantly.
3
Society involvement in
matters of internet negative impact needs to be
improved since the impact on how to commu-
nicate through internet is big. Some ways of in-
teracting and expressing themselves need to be
controlled in order to avoid anarchy in cyber-
space.
The issue of communicating ethics does
not come to laity only, but also it comes to a
teacher, a profession of sharing knowledge and
intelegence. The use of internet in education
has reached a stage of utilization to seek in-
formation such as teaching materials. Futher-
more, problems arise on how teachers commu-
nicate using internet with colleagues, students,
parents, and other communities.
4
As a role mo-
del, teachers should keep their behaviour in
communicating using internet since they can
misuse it for various purposes or interests. This
article discusses two problems: first, teacher’s
awareness of law and ethics at "a vocational
school in Purwokerto" in the use of social media
to communicate; and second, what legal and
ethical issues arise as a result of the use of so-
cial media and what the solutions are.
Research Method
This research is a quantitative and qual-
itative method with a research on law in action
approach. It is social science which is non doc-
trinal and empirical. Research location is at a
vocational school in Purwokerto (school name
deliberately disguised). Source of data in this
research is human (teacher at school). Data
were obtained through questionnaires which
were statistically obtained and supporting data
were sources include documents, archives, and
3
Read about the development of internet virtual com-
munity in Indonesia in Siti Hidayah, “Antropologi Digital
dan Hiperteks: Sebuah Pembahasan Awal”, Jurnal RA-
NAH, Year II No. 1, April 2012, pp. 2-10.
4
Read about this matter in Yasraf Amir Piliang, “Budaya
Teknologi Indonesia: Kendala dan Peluang Masa Depan”,
Jurnal Sosioteknologi, 28th Edition Year 12th, April 2013,
pp. 247-262.
other objects. The obtained data were analyzed
quantitatively.
Discussion
Legal Basis of Freedom of Opinion and Expres-
sion in Indonesia
The basic rules of freedom of opinion and
expression in Indonesia are contained in the
Constitution, the 1945 Constitution Article 28E
paragraph (2) and paragraph (3), and Article
28F. Article 28E Paragraph (2) explains that
Every person shall have the right to the freedom
to believe his/her faith, and to express his/her
views and thoughts, in accordance with his/her
conscience, while paragraph (3) regulates the
right and freedom of association, assembly, and
expression opinions. Article 28F mandates the
state to guarantee the right to communicate
and to obtain information for the purpose of the
development of his/ her self and social environ-
ment, and shall have the right to seek, obtain,
possess, store, process and convey information
by employing all available types of channels.
The basic provisions of this Constitution are fur-
ther elaborated in Article 14 paragraph (1) and
paragraph (2) of Law Number 39 Year 1999 on
Human Rights.
There are some other laws that regulate
about freedom of opinion and expression such
Law Number 40 Year 1999 of Press (Law in
Press), Law Number 14 Year 2008 of Disclosure
of Public Information (KIP), and Law Number 11
Year 2008 of Electronic Information and Trans-
action (ITE Law) and Law Number 19 Year 2016
of Change of ITE Law. Law in Press more em-
phasizes the freedom that is given to press or
reporter in covering, processing or reporting the
information. They are also free from being cen-
sored, banned or broadcasting banned. KIP Law
regulates the freedom to get information about
public information and to limit the type of pub-
lic information that can be accessed with basis
of “decency and public interest”. ITE Law regu-
lates technical aspects of the utilization of Elec-
tronic Information and Transaction using inter-
net, meanwhile those which related to freedom
of expression tends to create a threat for wrong
utilization of electronic channel.
260 Jurnal Dinamika Hukum
Vol. 17 No. 3, September 2017
Freedom of opinion and expression are
not absolute, even though those are one of the
rights that cannot be lessen in every condition
and cannot prosecuted on the basis of retroact-
tive law (Article 28I section (1) 1945 Constitu-
tion jo Article 4 Law Number 39 Year 1999).
This is an irony since the restriction is actually
the reduction of rights that is regulated in pre-
vious article about freedom. In other words,
freedom of opinion and expression are not non
derogable rights but derogable rights.
The limit is regulated in Article 28J 1945
Constitution paragraph (2) 1945 jo Law Article
70 and Article 73 Law Number 39 Year 1999. A
state argues that the restriction is done to en-
sure recognition and respect toward rights and
freedom of others and also to fulfill fair de-
mands according to consideration of morale, re-
ligion value, security and public order in a de-
mocratic society. Similar restriction can be
found in other law with focusing on the informa-
tion that is delivered along with addition in vio-
lation of decency, humiliation, or defamation.
International approval in freedom of opin-
ion and expression is also can be found in Art-
icle 19 Universal Declaration of Human Rights.
The article determines that every people has
right to give opinion and to express. It includes
to hold firmly the thought without any inter-
vention and to find, accept or deliver the in-
formation and idea through any kind of media
without any borderline. The same provision also
can be found in Article 19 paragraph (2) ICCPR,
Article 10 Europe Convention for Protection of
Human Rights and Fundamental Freedom, Art-
icle 13 paragraph (1) American Human Rights
Convention, Article 9 African Charter about Hu-
man Rights and Civil Rights, and Article 23
ASEAN Human Rights Declaration.
The international approval is also fol-
lowed by the unity restriction for the grants of
the freedom. Article 19 paragraph (3) ICCPR de-
termines that implementation of paragraph (2)
creates the particular obligation and responsib-
ility, so certain restrictions are imposed in ac-
cordance with law and as long as needed to:
respect rights or other’s reputation; protect na-
tional security or public order or public morale.
Similar provision also can be found in Article 29
paragraph (2) Universal Declaration of Human
Rights, Article 4 paragraph (1) ICCPR (special
for state of emergency), Article 20 paragraph
(1) ICCPR (prohibition of propaganda), Article
20 paragraph (2) (special for prohibition of Era-
dication of Ethnic and Racial Discrimination),
Article 10 paragraph (2) Europe Convention
about Protection of Human Rights and Funda-
mental Freedom, Article 13 paragraph (2) Ame-
rican Convention about Human Rights and other
articles from similar conventions.
The freedom of opinion and expression
(communication) from a state are strong funda-
mentals for everybody to give their opinion and
express it without any doubt. The existence of
internet is actually expanding the chance for
every people to communicate with whomever
and whenever since internet makes that hap-
pen. However, the freedom that is given by a
state, the facility from internet are sometimes
followed by bad behavior from its user. Many
times were found the use of words, picture,
quote or other sign languages or communication
that show negative behavior. Started from ligh-
test opinion and expression up to those which
can be categorized as hate thought.
The word “hate speech” often translated
as “ujaran kebencian”. There are two term
which commonly uses in international law of hu-
man rights “incitement” and “hate speech”.
The United Nation Human rights committee of-
ten uses the term incitement. Practically, there
are some differences between expert and state
law system, where one of them emphasize on
the word and the other see the impact on hu-
manity and human existence, or evenmore by
looking at the impact for others who called for
hate speech.
5
5 International rule which is re-
lated to this hate speech, emphasizes that all of
5
M. Choirul Anam and Muhammad Hafiz, “Surat Edaran
kapolri tentang Penanganan Ujarn Kebencian (Hate
Speech) dalam Kerangka Hak Asasi Manusia”, Jurnal Ke-
amanan Nasional, Vol. 1 No. 3, 2015, p. 345. Look at
this discussion and next paragraphs in Agus Raharjo,
Legal Protection for Victims of Religious of Offences on
the Internet, Proceedings of International Conference
on Victimology and Victims Assistance in Indonesia, Fac-
ulty of Law Universitas Jenderal Soedirman, Purwokerto,
20-22 September 2016, pp. 34-41.
Law and Ethics of Communicating in Social Media 261
the action that consists of hate speech about
nation, race or religion and it is a incitement to
do discrimantion, hostility or violence must be
prohibited by law (Article 20 Paragraph (2)
ICCPR). This article obligates the country to
prohibit all form of hate speech in domestic
law, including the incitement to do discrimina-
tion which does not affect the violence of na-
tion, race or religion.
6
National law about restriction of freedom
of opinion and expression in public (is not only
limited on hate speech), stated in Article 310
Paragraph (1), Paragraph (2); and Article 311
Paragraph (1) KUHP. This article is more indi-
vidual because it is addresed to individual at-
tack such as prestige, dignity, or self-esteem of
the person who is being attacked. This specific
rule related to internet use for crime stated in
Article 28 Paragraph (2) Law Number 11 Year
2008 of electronic information and transaction.
This article stipulate that everyone who inten-
tionally does not have rights to spread informa-
tion causing hatred or hostility within particic-
ular individu/ group about ethnicity, religion,
race and intergroup (SARA). The criminal provi-
sion of this article is written on Article 45 Para-
graph (2), which stipulates that everyone who
fulfills element of Article 28 Paragraph (1) 0r
Paragraph (2) will be imprisoned at most 6 (six)
years or fines at most Rp1.000.000.000,00 (one
billion rupiah).
Implementation of rights which its free-
dom is guaranteed by the state should encour-
age people to obey the prohibitation or restric-
tion rule. It means this rights is absolute, so the
use must look at the applicable rule. The im-
pact of this ignorance is the issue proceeded in
law and the punishment is heavy. Your mouth
your tiger” now change into your finger your
hell, so we have to be carefull on our finger in
internet communication especially for the key-
board.
Social Media Use in “A Vacational School in
Purwokerto” and The Implication for Freedom
of Opini and Expression
6
M. Choirul Anam and Muhammad Hafiz, ibid.
Our position in understanding information
technology is actually on two different sides. It
is the position of careful (dystopian people) or
optimistic in technology development (neo-fu-
turis people).
7
Perhaps, the position likes tech-
norealist people who become the mediator de-
bate of two previous people. Yet, we are not al-
ways in technorealist position, in some condi-
tions we can turn into dystopian or neo-futurist.
It what makes our self-control in using the in-
ternet is important so we will not fall into the
bigger hole of destruction.
The Internet users have freedom to inter-
act with anyone; thus, they also act, say, or
write anything about their interlocutors or any-
one that they think those people need to be
commented. Anonymity enables everyone to do
anything toward anyone. Anonymous identity
causes fake identity spread around. Neverthe-
less, in cyberspace, there is an ethic which is
called as Nettiquete, a set of ethic when some-
one communicates with others via internet. This
matter needs to be paid attention by netizens in
order to make communication run smoothly.
Social media which exist as the ouptput
of internet development becomes the mainstay
for many people to have communication with
others. Facebook, Twitter, WhatsApp, Skype,
and Instagram are some kinds of social media
that have so many users. Social media refers to
practical activity and behavior in communities
which assemble to share information, knowled-
ge, and opinion through chatting media. Gene-
rally, social media application can be categori-
zed into forum and message boards, review site,
opinion, blogging and microblogging, bookmark-
ing, and sharing media.
8
7
Anthony G. Wilhelm, 2003, Democracy in Digital Age,
Challenges in Political Life in Cyberspace, translated by
N. Veraningtyas menjadi Demokrasi Di Era Digital, Tan-
tangan Kehidupan Politik di Ruang Cyber, Yogyakarta:
Pustaka PelajarCCSS, pp. 5-6; Agus Raharjo, 2016,
Anar-ki di Cyberspace, Bagian Pertama: Filosofi dan
Regulasi Cyberspace, Yogyakarta: Genta Publishing, p.
17; Khanisa, “Dilema Kebebasan Dunia Maya: Kajian dari
Sudut Pandang Negara”, Widyariset, Vol. 16 No. 1, April
2013, pp. 23-30.
8
R. Thackeray, Et.Al., “Use of Social Media in Health Pro-
motion: Purposes, Key Performance Indicators, and Eva-
luation Metrics”, Health Promot Pract., Vol. 13 No. 2,
March 2012, pp. 159-164.
262 Jurnal Dinamika Hukum
Vol. 17 No. 3, September 2017
Media literacy at least has two basic com-
ponents: knowledge and skill. Rosenbaum men-
tions that knowledge and skill are related to the
relationship between public, producer, and
media;
9
meanwhile Martens (2010) categorizes
knowledge and skill of media literacy into four
aspects: media industry, media message, media
public, and media effects. Both of them agree
that there are several basic elements in media
literacy, such as: Media are constructed; Each
person can perceive the same message in
different way; and There are influences of me-
dia toward public.
10
Boyd and Ellison see the
uniqueness of social media not because social
media enable people to interact with strangers,
but it is because the ability of social media to
make someone able to show his or her social re-
lation.
11
Nevertheless, it must be wary that the
use of social media can decrease the quality le-
vel of someone’s relationship in the real world
and it can create problem in daily life.
12
The study on cyberculture allows some-
one have various identities. Identity can find
and become multi-identities. Cyberspace en-
ables its users use identity that they want, and
people can celebrate their freedom in anonym-
ous world. Cyberspace becomes self-laboratory
which characterizes postmodern life, self
becomes self-fashion and self-create.
13
Another
study mentions that there are two impacts of
9
J.E. Rosenbaum, J.W.J. Beentjes and R.P. Konig, “Map-
ping Media Literacy: Key Concepts and Future Direc-
tions”, Communication Yearbook, Vol. 32, 2008, pp.
313-353.
10
Hans Marten, “Evaluating Media Literacy Education:
Concepts, Theories and Future Direction”, Journal of
Media Literacy Education, Vol. 2 No. 1, 2010, pp. 1-22.
11
D.M. Boyd and N. Ellison, “Social Network Sites: Defini-
tion, History, and Scholarship”, Journal of Computer-
Mediated Communication, Vol. 13 No. 1, 2007, pp. 1-11.
12
K. Young, “Online Social Networking: An Australian Per-
spective”, The International Journal of Emerging Tech-
nologies and Society, Vol. 1 No. 7, p 39-57, 2009; R.A.
Davis, G.L. Flett and A Besser, “Validation of a New
Scale for Measuring Problematic Internet Use: Implica-
tion for Pre-Employment Screening”, Cyberpsychology &
Behavior, Vol. 5 No. 4, 2002, pp. 342-343.
13
Sherry Turkle, 1997, Life on the Screen: Identity in the
Age of the Internet, Touchstone Books, Related to this
identity matter, read Wolly Baktiono, “Dunia Cyber-
space Baudrillardian “The Matrix”, Jurnal Ilmiah SCRIP-
TURA, Vol. 2 No. 1, January 2008, pp. 8-17; Maria Nala
Damayanti and Elisabeth Christine Yuwono, “Avatar,
Identitas dalam Cyberspace”, Jurnal Desain Komunikasi
Visual Nirmana, Vol. 15, No. 1, January 2013, pp. 13-18.
social media use for netizens namely preventive
behavior and braggadocian behavior. Preventive
behavior is described as live your live as if your
mother is watching. People which include this
category are those who always be careful in
posting their status, uploading picture or writ-
ing, or sending news. They always think about
what they share through social media since they
are aware that all people around the world pay
attention to them. Braggadocian behavior co-
mes from the word “braggart” which means
liar. People who include this category often
update their status by informing that they do
something cool with narcissistic style in certain
place that they think it is good to be known by
others.
14
Those two studies, theoretically, is back-
lashing because the first one makes it possible
to communicate with lies such as by using an-
onymity. However, the second one teaches or
shows honesty about who you are through post-
ings on social media. Someone can be category-
ized as the first one and others belong to the
second category. Nonetheless, this will ruin
self-image as an ambiguous person or one with
double personality and this is often found in the
era of digital information like today.
Based on the research conducted in voca-
tional school in Purwokerto with 29 respondents
of teachers, the following is the result. First,
the knowledge about social media is obtained
through colleagues (48,3%), others learn it by
themselves (34,5%) and family and friends
(17,2%). Second, period of time in the term of
how long they have been using social media,
most of the respodents answer with 4 (four)
years with 72,4%, 24,1% of respondents answer
with 3 years and only some of them have been
using social media for over than 10 (ten) years
with 3,5%. Third, the purpose of using social
media for the respondents is to look for educa-
tional data (17,2%), entertainment (13,8%), de-
mand for lifestyle (13,8%) and the rest is com-
bination of the reasons with the addition as so-
cial platform. Fourth, the social media mostly
14
Erik Qualman, 2010, Socialnomics, How Social Media
Transforms The Way We Live and Do Business, Burling-
ton: Awareness.
Law and Ethics of Communicating in Social Media 263
used by the respondents are Whatsapp (WA)
with 82,8% and the rest are Facebook, Twitter,
Instagram and others. Fifth, the function of so-
cial media according to the respondents is to
help communicate (96,6%) and as an existence
of activity symbol (3,4%). Sixth, their respond
toward sensitive postings is waiting for the right
time to respond (56,2%) and the rest is instantly
replying, postponing and choosing to respond
only positive postings and ignoring. Seventh, the
respondents who always check on the valid-ity
of the data when they want to post or share so-
mething to the media is 51,7%, those who some-
times check it are 37,9% and the rest never
check and only adjust to what they need.
Eighth, most of the respondents have already
aware of crime in social media including cyber-
crime (82,8%), meanwhile the form or technical
aspects of the crime that they know are false
accusation/provocation, hoax and falsification
of data with 93,1%. Ninth, the effort to deter or
overcome crime through social media, accord-
ing to the respondents, is handing it over to the
government and self-control with 62,1%, 34,5%
of respondents only answer with self-control
and hand over to the government with 3,4%.
Based on the data from the questionnai-
re, we can fathom that teachers have already
been using social media for a while. They also
are also aware of the importance of communi-
cating by using social media, either for work or
only to communicate with their colleagues
outside of work. Thoughtful action toward res-
ponding to post or share information can be
seen from the number of respondents who an-
swer them with carefulness and check the vali-
dity of that information. Their awareness of law
can also be understood through the knowledge
that they know regarding to the forms of crime
and how to handle them.
Those data are only from the surface be-
cause in reality, the social media is often mis-
used to attack others right and status. Based
on the result of interview with the informants,
the following are the explanation. There are
several groups in social media that is often used
to communicate, namely, facebook with two
groups. The first group is school group (consist
of teachers, board members and students) and
teachers group (contains teachers only). In
WhatsApp, there also two groups, namely
groups of teacher and informal group (consist of
teachers who are disappointed with school
policy). Based on 37 teachers, there are some
of them who play role as provocator and spread
hate or hoax.
There is several expressions appeared in
postings of group, such as: first, cursing like
using the name of animal namely, squirrel-ass-
hole, rascal, using the name of bodies to em-
phasize, namely, “your eyes!” and excessive ex-
calamation mark;
15
second, provocation by
spreading hate, especially to someone who are
trusted by member of boards to occupy certain
position; third, false accusation, to school offi-
cials by providing false facts because they dis-
agree with schools policy; fourth, satire, in the
form of postings or status and comment to so-
cial media associated with work or personal.
The behavior of some teachers which are
less ethical in using social media causes work
relations and performance to be disrupted. It is
what actually the perpetrator wants and aims.
Dissatisfaction over: leadership policies, em-
ployment relationships, and honorariums rece-
ived; to be the cause of that improper attitu-
de. This actually indicates the ability of the
perpetrator to adapt to the work environment,
field of work, and behave at a particular time
and place.
Victims of the improper behavior are offi-
cials, former officials and teachers at the
school. If the teacher is the victim, the taken
action is to report it to the school official, vir-
tually block the perpetrator's account from their
social media and physically keep a distance with
15
The use of these words belongs to cyberbullying. Read
about cyberbullying in M. Campbell, “Cyberbullying: An
Old Problem in a New Guise?”, Australian Journal of
Guidance and Counseling, Vol. 15 No. 1, 2005, pp. 68-
76; S. Hindujaa and J. Patchinb, “Cyberbullying: An
Exploratory Analysis of Factors Related to Offending and
Vic-timization”, Deviant Behavior, Vol. 29 No. 2, 2008,
pp. 129-156; E.M. Kraft and J. Wang, “Effectiveness of
Cyber Bullying Prevention Strategies: A Study of Stu-
dents Perspective”, International Journal of Cyber Cri-
minology, Vol. 3 No. 2, 2009 pp. 513-535; Rulli Nasrul-
lah, “Pe-rundungan Siber (CyberBullying) di Status Face-
book Divisi Humas Mabes Polri”, Jurnal Sosioteknologi,
Vol. 14 No. 1, April 2015, pp. 1-11.
264 Jurnal Dinamika Hukum
Vol. 17 No. 3, September 2017
the perpetrator. Many teachers are actually
worried or potentially victimized, so they just
peeked postings in social media without com-
menting, being alert and keeping physically dis-
tant. There are also victims who respond virtu-
ally as well, replying to comments.
The school step in dealing with the pro-
blem is by settling in a kinship, clarifying, whet-
her done by authorized school officials or invol-
ving the foundation. In any clarification, the of-
fender will always circumvent even blame on
the claimant's side. These are the characteris-
tics of irresponsible person. There is no nature
of chivalry, losers, and cowards. Warning has
been done orally as a form of disciplinary action
against employees who violate ethics. However,
this step does not mean anything, because slan-
derous, cursing, sarcasm or other hate speech
persists.
The school has not yet decided to bring
this issue to the realm of the law. Although ba-
sed on evidence and witness, it has fallen into
the category of criminal offenses. The articles
that may be used are Article 27 paragraph (3) of
the ITE Law (if related to defamation) or Article
28 paragraph (2) of the ITE Law (if related to
hate speech), and the general article on defa-
mation and defamation on Article 310 paragraph
(1), paragraph (2); and Article 311 paragraph (1)
of the Criminal Code. The steps taken by the
school is understandable, considering that if
this goes to the realm of law, will cause a com-
motion that will affect the performance of
teachers in teaching, school image and the de-
clining number of students. Many are taken into
consideration before bringing this matter to the
judiciary, and a step to it is the final step if the
offender is no longer able to be coached.
The perpetrators, in the study of cyber-
culture included in the category of braggado-
cian behavior, braggart or liar, dishonest and
the desire for action is considered cool. This
kind of behavior actually shows who he really is,
even in real life they may act the other way
around. This is evident from the denial that is
done when clarified on their posts in social me-
dia. The self is shown as if it is clean, flawless,
honest, brave, and holy. Despite not using an-
onymity to cover his identity, however-in Sherry
Turkel's view-what they do is actually a lie as
well. If between what they post is then denied
in reality (clarification), they actually have a
psychiatric disorder.
16
Conclusion
Freedom of opinion and expression is
guaranteed by the constitution and legislation,
but there is often an expression of excessive
freedom. In general, the legal and ethical awa-
reness of teachers from a "vocational school" in
Purwokerto is good, as indicated by statistical
data on the purpose and function of social me-
dia use which is for educational purposes. Ho-
wever, there are some teachers who make so-
cial media as a means to wreak dissatisfaction
with the policy of school leadership, work atmo-
sphere or honorarium by doing unlawful actions
(curse, provocation, satire, or hate speech) to
school leaders and fellow teachers. The act of
denial is done when clarified for their actions.
It shows a cowardly attitude and unwillingness
to be responsible. The use of judicial channels
is the last step if the concerned can no longer
be done coaching.
References
Anam, M Choirul and Muhammad Hafiz. “Surat
Edaran kapolri tentang Penanganan Ujarn
Kebencian (Hate Speech) dalam Kerangka
Hak Asasi Manusia”. Jurnal Keamanan Na-
sional. Vol. 1 No. 3. 2015. Pp. 341-364;
Baktiono, Wolly. Dunia Cyberspace Baudrillar-
dian “The Matrix”. Jurnal Ilmiah SCRIP-
TURA. Vol. 2 No. 1. January 2008. Pp. 8-
17;
Boyd, D M and N Ellison. “Social Network Sites:
Definition. History. and Scholarship”.
Journal of Computer-Mediated Commu-
nication. Vol. 13 No. 1. 2007. Pp. 1-11;
16
Compare this argument with the similar one about in-
ternet user behaviour as the psychological impact in D.
Satalina, “Kecenderungan Perilaku Cyber Bullying Ditin-
jau dari Tipe Kepribadian Esktrovert dan Introvert”, Jur-
nal Ilmiah Psikologi Terapan, Vol. 2 No. 2, 2014; M.
Ybarra, “Linkages between Depressive Symptomatology
and Internet Harassment among Young Regular Internet
Users”, Cyberpsychol and Behabior, Vol. 7 No. 2, 2004,
pp. 247-257.
Law and Ethics of Communicating in Social Media 265
Campbell, M. “Cyberbullying: An Old Problem in
a New Guise?”. Australian Journal of
Guidance and Counseling. Vol. 15 No. 1.
2005. pp. 68-76;
Damayanti, Maria Nala and Elisabeth Christine
Yuwono. “Avatar. Identitas dalam Cyber-
space”. Jurnal Desain Komunikasi Visual
Nirmana. Vol. 15 No. 1. January 2013. Pp.
13-18. DOI: 10.9744/nirmana.15.1.113-18;
Davis, R A. G L Flett and A Besser. “Validation
of a New Scale for Measuring Problematic
Internet Use: Implication for Pre-Employ-
ment Screening”. Cyberpsychology and
Behavior. Vol. 5 No. 4. 2002. Pp 342-343;
Hidayah, Siti. “Antropologi Digital dan Hiper-
teks: Sebuah Pembahasan Awal”. Jurnal
RANAH, 2nd Year No. 1. April 2012. Pp. 2-
10;
Hindujaa, S and J Patchinb. “Cyberbullying: An
Exploratory Analysis of Factors Related to
Offending and Victimization”. Deviant
Behavior. Vol. 29 No. 2. 2008. Pp. 129-
156;
Katz, J and R Rice. 2004. Social Consequences
of Internet Use: Access, Involvement and
Interaction. Cambridge, Massachusetts:
The MIT Press;
Khanisa. “Dilema Kebebasan Dunia Maya: Kajian
dari Sudut Pandang Negara”. Widyariset.
Vol. 16 No. 1. April 2013. Pp. 23-30;
Kraft, E M and J Wang. “Effectiveness of Cyber
Bullying Prevention Strategies: A Study of
Students Perspective”. International
Journal of Cyber Criminology. Vol. 3 No.
2. 2009. Pp 513-535;
Marten, Hans. “Evaluating Media Literacy Edu-
cation: Concepts. Theories and Future
Direction”. Journal of Media Literacy
Education. Vol. 2 No. 1. 2010. Pp 1-22;
Nasrullah, Rulli. “Perudungan Siber (Cyber Bul-
lying) di Status Facebook Divisi Humas Ma-
bes Polri”. Jurnal Sosioteknologi. Vol. 14
No. 1. April 2015. Pp. 1-11;
Nurudin. “Media Sosial Baru dan Munculnya Re-
volusi Proses Komunikasi”. Jurnal Komuni-
kator. Vol. 4 Vol. 2. November 2013. Pp.
83-93;
Piliang, Yasraf Amir. “Budaya Teknologi Indo-
nesia: Kendala dan Peluang Masa Depan”.
Jurnal Sosioteknologi. 28th Edition Year
12th. April 2013. Pp. 247-262;
Qualman, Erik. 2010. Socialnomics, How Social
Media Transforms The Way We Live and
Do Business. Burlington: Awareness.
Raharjo, Agus. Anarki di Cyberspace (Pandangan
Filosofis tentang Kausa Maraknya Cyber-
crime). Makalah on Konferensi Ke-5 Aso-
siasi Filsafat Hukum Indonesia. Surakarta.
17-18 November 2015;
-------. Legal Protection for Victims of Religious
of Offences on the Internet. Proceedings
of International Conference on Victimol-
ogy and Victims Assistance in Indonesia.
Faculty of Law. Universitas Jenderal Soe-
dirman. Purwokerto. 20-22 September
2016;
-------. 2016. Anarki di Cyberspace, Bagian Per-
tama: Filosofi dan Regulasi Cyberspace.
Yogyakarta: Genta Publishing;
Rosenbaum, J E. J W J Beentjes and R P Konig.
“Mapping Media Literacy: Key Concepts
and Future Directions”. Communication
Yearbook. Vol. 32. 2008. Pp 313-353;
Satalina, D. “Kecenderungan Perilaku Cyber Bul-
lying Ditinjau dari Tipe Kepribadian Esk-
trovert dan Introvert”. Jurnal Ilmiah Psi-
kologi Terapan. Vol. 2 No. 2. 2014. Pp.
294-310;
Thackeray, R. Et.Al. “Use of Social Media in
Health Promotion: Purposes, Key Perform-
ance Indicators, and Evaluation Metrics”.
Health Promot Pract. Vol. 13 No. 2. March
2012. Pp 159-164. DOI: 10.1177/15248399
11433467;
Turkle, Sherry. 1997. Life on the Screen: Iden-
tity in the Age of the Internet. Touch-
stone Books;
Wilhelm, Anthony G. 2003. Democracy in Digital
Age, Challenges in Political Life in Cyber-
space, diterjemahkan oleh N. Veraning-
tyas menjadi Demokrasi Di Era Digital,
Tantangan Kehidupan Politik di Ruang
Cyber, Yogyakarta: Pustaka PelajarCCSS;
Ybarra, M. “Linkages between Depressive Symp-
tomatology and Internet Harassment
among Young Regular Internet Users”. Cy-
berpsychol and Behavior. Vol. 7 No. 2.
2004. Pp 247-257;
Young, K. “Online Social Networking: An Austra-
lian Perspective”. The International Jour-
nal of Emerging Technologies and Society.
Vol. 1 No. 7. 2009. Pp 39-57.
... While the Nigerian Cybercrime Act of 2015 stands as a significant mechanism for the regulation of social media, it's important to note that mainstream media outlets are subject to regulatory measures that social media is not (Mohammed, 2021). Fidiyani et al. (2017) underscored the importance of netizens adhering to prescribed "netiquette" for harmonious communication. ...
Article
Full-text available
This study sought to analyse ethical concerns of social media in Nigeria. The theoretical framework adopted is the Source Credibility Theory. The study employed Critical Discourse Analysis. The population of the study consisted of the top four (4) social networking sites in Nigeria. Out of these, Twitter was purposively selected for its widespread use for youth activism, particularly within the context of the #EndSARS protest; and for being the only social media platform the federal government had temporarily banned for ethical violations. A convenient sample of ten (10) tweets, which included retweets with text and images posted both during and within 18 months after the protest, was used to collect secondary data. Findings demonstrated a mix of ethical and unethical use of Twitter within the context of the protest. The result also revealed that although Twitter is a credible source of information, there were instances of anonymous tweets, which cast some doubts on the credibility of that specific source. The study recommends that beyond social media regulations, there is a need for the promotion of media literacy in Nigeria’s workplaces and educational system. In addition, the form of self-regulation inherent in African ethics should be applied by users of social media to facilitate harmonious communication. This study has made a modest contribution in the area of source credibility theory by proposing a conceptual framework within the context of the study.
... Sebagian besar mahasiswa yang terjangkit Analisis Pengaruh Media Sosial Melalui Aplikasi Digital Tiktok sebagai Media Persuasif ... Edusaintek: Jurnal Pendidikan, Sains dan Teknologi Vol. 10 (1) 2023 | 189 adiksi media sosial mengirimkan pesan singkat kepada dosennya seperti halnya dia mengirimkan pesan singkat kepada temannya di media sosial dengan mengabaikan etika berkomunikasi(Ritonga & Prasetia, 2019). Etika yang dimiliki akan memengaruhi perilaku yang membuat setiap orang diharapkan dapat menaatinya karena hal ini menimbulkan tiga konsekuensi yaitu hukum, etika dan sosial(Fidiyani et al., 2017).Sebagai pengguna internet dan media sosial, mahasiswa perlu belajar menggunakan internet dengan baik dan bijak. Hal ini dikarenakan kebebasan yang ada pada internet dan media sosial masih dibatasi oleh etika dan moral yang berlaku di masyarakat. ...
Article
Full-text available
Tingkat komunikasi pada media sosial memberikan dampak positif dan negatif pada kehidupan masyarakat. Dengan etika komunikasi yang baik hendak terangkai ikatan yang baik serta serasi dalam hidup berdampingan dengan orang lain, tetapi sebaliknya bila tidak terdapat etika komunikasi yang bagus dapat memunculkan kesalahpahaman serta smenimbulkan bentrokan atau hal yang tidak baik saat hidup berdampingan dengan orang lain. Jenis riset ini dengan pendekatan kepustakaan (library research) dengan menggunakan pendekatan studi literatur (literature review) yaitu pada riset pustaka (library research). Hasil penelitian memperlihatkan bahwa adanya antusiasme yang ditunjukkan pada mahasiswa yang tergolong pada kategori remaja, memiliki sifat mengenai rasa yakin akan diri sendiri atau percaya diri ketika terjalinnya komunikasi dengan masyarakat luas. Komunikasi dapat meningkatkan harga diri selaku hasil dari cara komunikasi yang terjalin dan perihal ini yang memberikan pengaruh sikap para remaja. Sebagai pengguna internet dan media sosial, mahasiswa perlu belajar menggunakan internet dengan baik dan bijak. Hal ini dikarenakan kebebasan yang ada pada internet dan media sosial masih dibatasi oleh etika dan moral yang berlaku di masyarakat.
... Social media user awareness must be in line with the basic ethics of life both in the real world and in the virtual world. If there is a violation, Law Number 11 Year 2008 concerning Electronic Information and Transactions (EIT Law) ( Fidiyani, Sulistianingsih, & Pujiono, 2017). ...
Conference Paper
Full-text available
This research interest investigates digital literacy, and basic ethics have become integral to social media with the increasing importance of technology in society. We examined social media, the technology influencing online digital literacy, which impacts writing and reading practices. Basic ethics equals the right thinking on how they leverage social media appropriately and how to engage people correctly. Most people in Indonesia have used social media and have a gap in public knowledge of the news. The news is spread out on social media without control, and they believe it without reading properly. In the COVID-19 pandemic, people believe the hoax news that death is over 500 in a day without showing the data properly. This research has discussed the use of digital literacy and the basic ethics that Indonesian people can instill correctly. One hundred four respondents are distributed via questionnaires in Google Form between March and April 2020. This research used mixed-method, descriptive analysis, observation, and interview with eight respondents for semi-structured qualitative methods. The result found that the relationship between basic ethics and social media is 52.3% which is low, and the relationship between digital literacy and social media is 44.6%. 89.9% of respondents wish that people use social media properly. It concluded that Indonesian people had little digital literacy knowledge and basic ethics to write and read on social media. Moreover, they need to increase their knowledge and apply basic ethics in communicating with others on social media.
... Technology has grown so rapidly, even beyond what humans had predicted. Nevertheless, technological progress must remain in human control, so that positive or negative impacts can be predicted or the role of technology in life is restored to the service of human welfare [11][12][13][14][15][16][17]. The opinion shows that between humans and science and technology there is a reciprocity or symbiotic relationship if the limits of the use of technology are used in accordance with the needs of human beings as a tool to relieve or free the workload. ...
Article
Full-text available
Technology has entered the human physical and spiritual existence. Technology is the reflection of the human soul in nature, it is the materialization of ideas in the human brain itself. Humans are increasingly fragmented and machines are increasingly dominant in human life, which causes problems in various fields, one of the fields is a law on the formulation of criminal acts in various legislation. To clarify this problem, normative research methods are used with a focus on comparative legislation. Laws of increasingly technological and technological nature adopt legal features in the work of science and technology. Lawmakers make rules that reflect technological determinism as well as against it. They glorify technology as well as make technology as one of the factors of criminal liability. This seems in the comparison between general criminal law legislation that originates from the Criminal Code with other laws and regulations that contain technological elements. Technology-based criminal penalties in general criminal law are unknown, and this only arises after the technology is used to commit criminal acts, such as in criminal acts of decency, humiliation, defamation, and crime dimension technology. This rationale needs to be deciphered considering the lawmakers is poor to give an explanation.
Article
Full-text available
The importance and prevalence of social media platforms, one of the most effective communication platforms of the digital age, is increasing day by day. Nowadays, the use of social media stands out as an extremely important strategic tool for both individuals and brands. This situation creates a decisive framework regarding the rules to be followed in communication on social media. All the rules that must be followed in face-to-face communication must also be followed on digital platforms. Therefore, for social media communication in the digital world, there are some basic characteristics that users should have such as procedure, morality, style, courtesy, elegance, tolerance and etiquette. These features highlight the importance of the concept of Netiquette, which is expressed as the etiquette of the digital world. Accordingly, the aim of this study is to analyze and examine the Instagram posts of a home decoration brand within the framework of the Netiquette concept. In this study, in which qualitative research design was used, data were collected with content analysis technique and analyzed with MAXQDA program. Instagram posts made by the brand were analyzed and interpreted with the coding chart created within the scope of Netiquette rules. In this context, the data obtained from the brand's Instagram profile were divided into six main categories as "Online Communication", "Transfer of Emotion", "Consideration of Others", "Sincerity", "Respect" and "Recommendation" in line with the Netiquette concept. In line with the research findings, since all of the posts were made on Instagram, a digital platform, they were included in the category of online communication. However, it was determined that the content of the posts was ranked according to the degree of intensity (from most to least) in line with the Netiquette rules as conveying emotion, thinking of others, sincerity, respect and advice. Moreover, it has been determined that the analyzed brand attaches importance to Netiquette rules in its posts and carries out a planned communication policy as a strategic communication activity. In the light of the findings obtained in the study, it can be suggested that future studies on the concept of Netiquette should be conducted on different brands and individual users.
Article
Social media is a common medium for expression of views, discussion, sharing of content, and promotion of products and ideas. These views are either polite or obscene. The growth of hate speech is one of the negative aspects of the medium and its emergence poses risk factors for society at various levels. Although there are rules and laws for these platforms, they cannot oversee and control all types of content. Thus, there is an urgent need to develop modern algorithms to automatically detect hateful content on social media. Arab society is not isolated from the world, and the usage of social media by its members has highlighted the importance of automated systems that help build an electronic society free of hate and aggression. This article aims to detect hate speech based on Arabic context over the Twitter platform by proposing different novel deep learning architectures in order to provide a thorough analytical study. Also, a comparative study is presented with a different well-known machine learning algorithm, as well as other state-of-the-art algorithms from the literature to be used as a beacon for interested researchers. These models have been applied to the Arabic tweets dataset, which included 15K tweets and 14 features. After training these models, the results obtained for the top two models included an improved bidirectional long short-term memory with an accuracy of 92.20% and a macro F1-score of 92% and a modified convolutional neural network with an accuracy of 92.10% and a macro F1-score of 91%. The results also showed the superiority of the performance of the deep learning models over other models in terms of accuracy.
Preprint
Full-text available
The collaboration of information technology with public transportation has had an impact on improving public services in the form of public transport online, due to the inability of the government to present an ideal form of service. This study illustrates that there is an expectation to be built by the concept of law, that through legal approach it can be used as a remedy to heal wounds from the assumption of failure arising from lack of law in accommodating the needs of the community in providing maximum service on road transport, while the emergence of regulations which gives the legality of an action, the reality actually makes an increasingly chronic wound, and in this paper does not reject the technology to collaborate with conventional products, but ideally these renewable products may fail to cope with human needs, but they should not coincide with the presence of renewable technology. The conclusion of the law should be easy to realize its goal of public transportation innovation and become a wound healer who did not recover from previous product failures.
Article
Full-text available
Tulisan ini mendiskusikan Ujaran Kebencian (Hate Speech) dalam Diskursus HAM. Hate speech merupakan konsep yang sangat rentan berhadap-hadapan dengan hak berpendapat dan berekspresi. Titik singgung ujaran kebencian dalam kerangka HAM berada pada dua diskursus hak, yaitu: a) kebebasan beragama atau berkeyakinan;dan b)kebebasan berekspresi dan berpendapat, c) perlindungan ras dan etnik. Secara konsep ataupun praktik, ujaran kebencian seringkali diterapkan secara berbeda-beda, baik di tingkat global ataupun praktik Negara-negara di dunia. Dengan pendekatan HAM,ada 6 (enam) hal yang harus dilihat di dalam Surat Edaran Kapolri tentang penanganan ujaran kebencian (Hate Speech), yaitu: 1) elemen kejahatan (element of crimes); 2) basis subyek tindakan kejahatan; 3) metode atau cara kejahatan dilakukan; 4) tujuan dari tindakan itu sendiri; 5) Potensi efek dari ujaran kebencian; 6) Pendekatan yang digunakan untuk menangani hate speech.
Article
Full-text available
Akun facebook Divisi Humas Mabes Polri merupakan salah satu akun di media sosial yang dimiliki dan dikelola oleh Markas Besar (Mabes) Polisi Republik Indonesia (Polri). Akun tersebut digunakan untuk memberikan informasi, berita, dan sosialisasi peraturan terkait tugas Polri kepada masyarakat umum. Namun, realitas di media siber dalam konten yang dipublikasikan oleh akun Divisi Humas Mabes Polri tersebut sering ditemukan terjadi bullying atau perundungan. Perundungan ini dilakukan oleh akun-akun lain yang mengomentari setiap status yang dipublikasikan, baik dalam bentuk kata-kata maupun gambar. Dengan menggunakan teknik penelitian analisis media siber, penelitian ini mengungkap bahwa (1) diskusi pada akun tersebut terjadi secara dua arah dari yang kontra sampai pro terhadap perundungan siber dan untuk beberapa kasus hal ini terbukti, (2) adanya kecenderungan memunculkan perundungan siber melalui komentar. Selain itu, penelitian ini juga dapat menunjukkan bahwa (3) perundungan siber yang terjadi selama interaksi bisa dilakukan oleh akun beridentitas maupun anonim.Kata kunci: facebook, polri, CMC, perundungan siberDivisi Humas Mabes Polri facebook account is one of the accounts in social media owned and managed by Markas Besar (Mabes) Polisi Republik Indonesia (Polri). The social media is used to provide information, news, and dissemination of rules related to police duties to the public. However, it was found that the content published by Divisi Humas Mabes Polri facebook accounts often includes bullying or harassment. This abuse or bullying is done by the accounts of others that comment on every status published, either in the form of words or pictures. Using the research technique of Cyber Media Analysis, this study reveals that (1) the discussion in the account occurs in both directions, those against and those pro with cyber-bullying, and in some cases it is proved (2) the tendency of the rise of cyber harassment through the comments. In addition, this study also shows that (3) cyber-bullying that occurs during the interaction can be done by any unidentified or anonymous account.Keywords: facebook, polri, cmc, cyber bully
Article
Full-text available
This chapter examines how different researchers define media literacy (i.e., what people need to know about the media and their use to be deemed media literate). As opposed to previous reviews, this chapter attempts to structure the multitude of definitions using a schematic representation of media production and use. Such a construction provides a thematic overview of diverse definitions of media literacy. Thus, it specifies key aspects of the media and their use in terms of media literacy and corresponding emphasis in the media literacy literature. This analysis reveals that the vast majority of researchers consider understanding how media content is created to be a central aspect of media literacy. Scholars treat the ability to handle the media in a constructive manner as far less important, and the media literacy literature virtually ignores the fact that media producers are prone to media influence. Furthermore, this chapter indicates that little has changed in the field of media literacy in the last few decades, with the majority of the dimensions of media literacy present in definitions utilized in the 1970s and 1980s. Finally, this chapter also identifies the features of media literacy that require additional investigation, such as the relationship between media literacy and Internet-based technologies.
Article
Full-text available
Victimization on the Internet through what has been termed cyberbullying has attracted increased attention from scholars and practitioners. Defined as “willful and repeated harm inflicted through the medium of electronic text” (Patchin and Hinduja 200653. Patchin , J. W. and S. Hinduja . 2006 . “Bullies Move Beyond the Schoolyard: A Preliminary Look at Cyberbullying.” Youth Violence and Juvenile Justice 4 ( 2 ): 148 – 169 . [CrossRef]View all references:152), this negative experience not only undermines a youth's freedom to use and explore valuable on-line resources, but also can result in severe functional and physical ramifications. Research involving the specific phenomenon—as well as Internet harassment in general—is still in its infancy, and the current work seeks to serve as a foundational piece in understanding its substance and salience. On-line survey data from 1,378 adolescent Internet-users are analyzed for the purposes of identifying characteristics of typical cyberbullying victims and offenders. Although gender and race did not significantly differentiate respondent victimization or offending, computer proficiency and time spent on-line were positively related to both cyberbullying victimization and offending. Additionally, cyberbullying experiences were also linked to respondents who reported school problems (including traditional bullying), assaultive behavior, and substance use. Implications for addressing this novel form of youthful deviance are discussed.
Article
Full-text available
Abstract Social network,sites,(SNSs) are increasingly attracting the attention of academic,and,industry researchers intrigued by their affordances and reach.,This special theme section of the,Journal,of Computer-Mediated,Communicationbrings ,together scholarship on these emergent phenomena.,In this introductory article, we describe features of SNSs and propose a comprehensive definition. We then present one perspective on the history of such sites, discussing key changes and developments. After briefly summarizing existing scholarship concerning SNSs, we discuss the articles,in this special section and conclude with considerations for future,research.
Article
Teknologi adalah manifestasi dari imajinasi manusia tentang sebuah dunia yang lebih baik. Melalui teknologi manusia membangun masa depan kebudayaan dan kehidupan mereka. Perkembangan teknologi tidak saja ditentukan oleh nilai-nilai budaya yang ada, tetapi ia justru dapat membentuk budaya-budaya baru: budaya media, budaya informasi atau budaya virtual. Dalam relasi antara teknologi dan budaya, ada sebuah paradoks. Di satu pihak, untuk menumbuhkan teknologi, diperlukan semacam “budaya teknologi”, yaitu nilai-nilai budaya yang mendorong perkembangan teknologi : daya kreativitas, rasionalitas, mental produktif, dan berorientasi ke depan. Di pihak lain, ada berbagai benturan nilai akibat keberadaan teknologi tertentu di dalam masyarakat. Benturan ini terjadi bila teknologi tak hanya dipandang sebagai sebuah alat guna dan utilitas, tetapi sebagai pencipta makna. Nihilisme adalah kondisi ketika manusia menyerahkan diri mereka pada bingkai teknologi, yang kemudian mengendalikan makna hidup mereka: panik, serba cepat, instan, dan tercabut dari alam. Teknologi lalu menjadi semacam „beban sosial‟. Untuk menghindarkan sifat nihilisme teknologi, berbagai paradigma baru diusulkan: “budaya berpikir holistik”, yang melihat teknologi dalam sudut pandang seluas-luasnya; “budaya ketiga”, yaitu simbiosis antara paradigma teknologi dan kebudayaan; dan “teknologi yang manusiawi”, yaitu kombinasi teknologi tinggi dan sentuhan manusia. Kata kunci: teknologi, manusia, kebudayaan, makna, kreativitas Technology is a manifestation of human imagination about a better world. Through technology, humans build their future culture and their lives. Technological development is not only determined by cultural values that exist, but it establishes new cultures instead: the media culture, virtual culture or cultural information. In the relationship between technology and culture, there is a paradox. On the one hand, to develop the technology, some kind of "technological culture" is needed, i.e. cultural values that encourage the development of technology: creativity, rationality, mentally productive and future oriented. On the other hand, there are various conflicts of values due to the existence of certain technologies in society. This collision occurred when the technology is not only seen as a tool for and utility, but as a creator of meaning. Nihilism is the condition when humans submit themselves within the frame of technology, which then controls the meaning of their lives: frantic, fast-paced, instant and unplugging nature. Technology then becomes a sort of 'social burden'. To avoid the nihilism nature of technology, various new paradigm proposed "holistic thinking culture", which saw the technology in the widest angle of view; "third culture", which is a symbiosis between technology and cultural paradigms, and "human technology", which is a combination of high technology and the human touch. Key words: technology, humans, culture, meaning, creativity.
Article
This article synthesizes a large subset of the academic literature on media literacy education. It first argues that media literacy is mostly defined in terms of the knowledge and skills individuals need to analyze, evaluate, or produce media messages. These knowledge and skills mainly relate to four key facets of the mass media phe-nomenon, i.e. media industries, media messages, media audiences, and media effects. Subsequently, it evaluates what is empirically known about the effectiveness of media literacy practices. Suggestions are made for future research.
Article
This paper reports the findings of a survey conducted in Australia in 2007/08 that investigated the experiences of online social network users aged between 15-65 years. This research is underpinned by two socio-cultural theories of learning: Situated Cognition and Activity Theory, and has a particular emphasis on online identity creation. Both quantitative and qualitative data are reported on issues of privacy, relationship between online and offline friends, time spent engaged in online social networking activities, use of photographs and status features and positive and negative experiences associated with online social networking. The findings are then interpreted from a socio-cultural perspective of learning.