KEPRIBADIAN SEHAT

Pribadi yang dewasa merupakan label positif bagi orang yang dianggap telah mencapainya. Sayang, banyak orang tak pernah berpikir menjadi dewasa. Padahal, kepribadian dewasa merupakan ukuran perkembangan kepribadian yang sehat. 

Kepribadian yang dewasa diartikan secara berbeda-beda oleh banyak orang. Hal ini tercermin dari beberapa pendapat berikut ini. Menjawab pertanyaan dosen dalam kuliah tentang kepribadian di sebuah fakultas psikologi, ada mahasiswa yang mengartikan dewasa kepribadian sebagai sabar, tidak berlebihan dalam mengekspresikan emosi, dan pandai mengelola hubungan dengan orang lain.

Ada juga yang mengartikan kemampuan untuk memecahkan berbagai masalah kehidupan dengan bijaksana. Beberapa mahasiswa menunjuk pada kemampuan memenuhi tugas-tugas perkembangan masa dewasa dengan baik, seperti memiliki pekerjaan dan filsafat hidup yang mantap, kondisi batin yang stabil, dan sebagainya.

Tulisan ini menyajikan kriteria yang lebih utuh mengenai kepribadian yang dewasa dari seorang sesepuh yang ikut merintis Psikologi, yakni Gordon W. Allport (1897-1967). Hingga saat ini teori-teorinya (tentang kepribadian yang sehat) tetap relevan.

Berikut adalah tujuh kriteria dari Allport tentang sifat-sifat khusus kepribadian yang sehat.

1. Perluasan Perasaan Diri

Menilai Pribadi Orang



Dalam perkenalan pertama dengan orang asing yang baru kita kenal... yang harus diperhatikan adalah gerak tubuh, karena hal ini diatur oleh alam bawah sadar yang cenderung berpengaruh besar pada penciptaan karakter seseorang.

sedangkan, raut muka, dapat diciptakan, dan berubah kapan saja, sesuai dengan keadaan seseorang, karena hal ini adalah reaksi akibat aksi yang diterima oleh fungsi saraf yang sadar.
contoh; pada saat si A tersenyum kepada si B dan keadaan si B sedang jengkel, si B tidak mungkin tersenyum.lalu, si C melihat kejadian tersebut.
pertanyaan: apakah kita dapat katakan bahwa si B itu bukan orang yang ramah ?? sedangkan kita gak tahu, mungkin si B baru saja di pecat dari pekerjaannya...

pertama, kalau kenalan dengan orang,(posisi berdiri) lihat bagaimana berdirinya... dia terlebih dahulu atau

Back up Ps2 game,CD



Okay, these are some methods to backup PS2 titles and Xbox titles, in order to play a backup you need a modchip of some sort, I have also included a tutorial on boot methods. Follow any one of these instructions to fit your needs. You can tell what format the PS2 title is by looking at the written side of the disc, DVD's are Silver and CD's are Purple. The DVD backup methods here consist of reading the image to the hard drive then burning it to the media for an easier backup, this depends on your hardware and it?s setup. I say that because the proper setup would be to have the Reader and Writer on separate IDE cables. This allows no cross information when doing Disc to Disc/On the fly copying. But, since most people would not know how to check or fix this, I suggest reading the image to your Hard Drive and then burning from there. *A little useful trick*, If the DVD backup "image" is small enough in size you can fit it onto a CD-R (80 minute or larger if need be) instead of using a more expensive DVD-R. I have done this succesfully using Prassi and the first tutorial for it below. In addition a DVD Movie backup will play on a PS2/Xbox without a chip. As I get more info I will update. Dexter

All Bout Spyware


There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

php Navigation




if($_SERVER['QUERY_STRING'] == "SoD")
 print "owns you!";
else
 print "don't front!";
?>


Description: Instead of calling files like ( index.php?str=blah ) , you could do ( index.php?SoD ) and it would print out "owns you!". You can add more strings in there, this is just an example.



   $vars = explode(",", urldecode(getenv('QUERY_STRING')));
   $v1 = array_shift($vars);
   $v2 = array_shift($vars);
   $v3 = array_shift($vars);

   switch ($v1) {
       case 'first.1': {
           print("This is v1, first string case 'file.php?first.1'.");
           break;
           }
      case 'first.2': {
      switch ($v2) {
           case 'second': {
               switch($v3) {
                   case 'third': {
                     print("This is v3, the last case 'file.php?first.2,second,third'.");
                     break;
                   }
               }
           }
       }
       }
   }


Description: This basically does what the 1st one does but with more strings and a different seperator rather than '&'. I don't really want to go into too much detail on the thread so if people are confused or need explaining, reply or PM me.

That's it for the navigation as I am not going to do the other due to they're everywhere else and I wanted to be different and show everyone this method.

The REAL way to hack RemoteAccess




Well dewdz, ya seen the file text about hacking RemoteAccess and you wanna
crack that H/P or warez RA board for mega ratios?  Get Real!

RA *CAN* be hacked but only in the same way as any other BBS sox...  no
sysop reading that file was shat themselves .. here's why not:

Basically the technique outlined involved you writing a trojan and
disguising it as some program the sysop is really gagging for in the hope
is he'll run it on his system.  Wot it'll really do is copy his USER.BBS
onto the filebase so you can call back later and d/l it... neat idea, and
one that in *theory* will work with most BBS sox (most are EVEN easier coz
they don't encrypt the users file like RA) but their execution of it sucks!

Firstly, their compiled batch file relied on the sysop running RA off their
C: drive from the directory \RA...  Yeah, maybe some lame PD board they
hang out on is like that but most sysops I know run multiple drives and
many have more complex directory structures...       Lame Hacker 0 - Sysop 1

Okay... letz assume they got on some lame fucking board and the users file
*is* C:\RA\USERS.BBS - next step is to copy the file into the filebase and
make it d/lable.  How do they do that? (patronising Dez Lymon voice) .

Their idea was to copy the file into D:\FILES\UPLOAD ..  Yeah sure guyz...
EVERY board uses the D: drive for the filebase and happen to have a file
area in \FILES\UPLOAD - NOT!!!!!!                    Lame Hacker 0 - Sysop 2

Right, so they got better odds than winning the national fucking lottery and
all the above worked (yeah man, we're dreamin' but let's give 'em a chance).
What next?  The file has to be d/lable...  you found a sysop that makes
UNCHECKED & UNSCANNED files available for download?  Fuck off!  Get a life!
                                                     Lame Hacker 0 - Sysop 3

So...  okay....  we got a sysop that's so fucking lame he doesn't deserve
to to breath the same air as the rest of the human race and uses all the
above paths and makes unchecked uploads d/lable.  RA by default won't allow
files to be d/led UNLESS they're in the file database.  Unless the USERS.BBS
destination ALREADY EXISTED in that area and was previously in the area
database there's NO WAY you can d/l it.

The way they "solved" this was to add an entry to FILES.BBS in the file
directory.  Nice one... EXCEPT RA DOESN'T USE FILES.BBS AS IT'S FILE
DATABASE.   Unless you happen to be lucky enough that the sysop does an
import from FILES.BBS to the REAL file database before checking out your
planted file (most RA sysops only import from FILES.BBS when adding CDROMs)
the addition of this entry will do FUCK ALL!         Lame Hacker 0 - Sysop 4
                                                   
To quote from the author "This is a generic program and you will have to
tailor it so it will meet your needs." - yeah man, fucking rethink, redesign
and rewrite it more like!

Oh yeah... EVEN IF YOU DO get a copy of the USER.BBS file downloaded THE
PASSWORDS ARE ENCRYPTED!!!                       Lame Hacker :(  -  Sysop:-)


So how can U hack RA?  Well, the idea was okay but, like hacking any system,
you gotta KNOW the system ya gonna hack b4 U stand a chance.

Most sysops will use the DOS environment variable RA set to the RA system
directory so that external doors can find the system files...  that's very
helpful of the sysop, to show us where we can find his config files.

In the RA system directory should be the file CONFIG.RA.  You might want to
include a check for this file within your program and possibly do a disk
and directory scan for the file if RA isn't defined or is set incorrectly.

I'm not *entirely* sure about other versions of RA, but in the current
release (2.02) the CONFIG.RA offset &h3E4 is where the name of the mail
directory starts.  This is the path where USERS.BBS will be found.

Next you need to know for SURE the name of a directory which stores the
files for a filearea from which you are able to download.

I suggest you do this in one of three ways:

1)  Interogate the file FILES.RA in the RA system directory which contains
    the filebase area configs.  You *could* just search the directory for a
    valid path but you'd wouldn't know if you had d/l access to the area.

2)  If you want to be a bit more clever you could interpret the file and
    find out the minimum security level required to d/l from each area and
    dump your copy of USERS.BBS in the area with the lowest access level,
    pretty much guaranteeing that you'll be able to get to the file.  This
    doesn't take security flags into account so there's still a SLIM
    possiblity you won't be able to d/l the file unless you also write flag
    testing into your program.

3)  My favourite technique is to have the program read a small config file
    which is uploaded with your archive.  This file just contains the name
    of a file you KNOW you have d/l access from.  You can then either do a
    global search for that filename or, preferably (coz it's faster) read
    FILES.RA for the paths used by the filebase and search those.

So now you have the location of the USERS.BBS and the destination directory
you simply need to copy the file.  However, even though the file is sitting
in a filebase directory it STILL isn't available for d/l... why?  Because
it's not in the filearea database.

You could get clever and find amend filearea database files directly if you
get the fileareas path from CONFIG.RA (offset &hC12) and write to the files
HDR\FBD#####.HDR (header) IDX\FDB#####.IDX (index) and, if you want to add
a description, TXT\FBD#####.TXT, where ##### is the RA file area number.

There *is* an easier way.  Shell out to DOS and execute the RAFILE utility
from the RA program path, passing the arguments "ADOPT filename #####".

E.g. the BASIC command would be:

             SHELL "RAFILE ADOPT "+filename$+STR$(areanum)

Where filename$ contains the name of your USERS.BBS copy and areanum is the
RA filearea number.  If your filename was USERTEST.ZIP and you'd copied it
to the directory used for RA file area 10 you'd be executing:

             RAFILE ADOPT USERTEST.ZIP 10

This will "adopt" the file, adding it to the RA file database, making it
available for d/l (assuming you have the appropriate rights to the area).

All you need to do now is to package this trojan file to entice the sysop
into running it...  In the LAME method for hacking RA the author used DSZ
as an example.  That was about the most realistic part of the file and the
only bit worth leaching!  


Your archive:
                DSZ.EXE (your program)
                DSZ.DAT (the *real* DSZ.EXE)
                DSZ.CFG (small file containing the name of a *known*
                         d/lable file - preferabbly encrypted)
                + any other files that normally come with DSZ


             
Flow diagram for DSZ.EXE trojan:

                            _______
                           /       \
                          |  Start  |
                           \_______/
                               |
                               |
                      +--------+--------+
                      | Read enviroment |
                      |   variable RA   |
                      +--------+--------+
                               |
                               |
                              / \
                            /     \
                          /CONFIG.RA\          +---------------------+
                        /  exist in   \___>____| Scan drives & paths |
                        \  that path  / No     | search for the file |
                          \    ?    /          +----------+----------+
                            \     /                       |
                              \ /                         |
                           Yes |                          |
                               +------------<-------------+
                               |
                      +--------+--------+
                      | Read CONFIG.RA  |
                      | to get location |
                      |   of USERS.BBS  |
                      +--------+--------+
                               |
                               |
                      +--------+--------+
                      | Read DSZ.CFG to |
                      | get a filename  |
                      +--------+--------+
                               |_____________<____________
                               |                          |
                      +--------+--------+                 |
                      | Read FILES.RA to|                 |
                      | get name of the |                 |
                      |  next filearea  |                 |
                      +--------+--------+                 |
                               |                          |
                               |                          |
                              / \                         |
                            /     \                       |
                          /does area\                     |
                        / contain the \________>__________|
                        \     file    / No
                          \    ?    /
                            \     /                    
                              \ /                      
                           Yes |                        
                               |
                      +--------+--------+
                      | Copy USERS.BBS  |
                      | to the filearea |
                      |    directory    |
                      +--------+--------+
                               |
                               |
                      +--------+--------+
                      | Run RAFILE with |
                      | ADOPT to update |
                      |   RA database   |
                      +--------+--------+
                               |
                               |
                      +--------+--------+
                      | Delete DSZ.EXE  |
                      |   and DSZ.CFG   |
                      +--------+--------+
                               |
                               |
                      +--------+--------+
                      | Rename DSZ.DAT  |
                      |   to DSZ.EXE    |
                      +--------+--------+
                               |
                            ___|___
                           /       \
                          |  Stop!  |
                           \_______/
                           
Once you've uploaded the file, preferably using a pseudonym, post the sysop
a message telling him how c00l your upload is.  Wait a day or so and dial
back.  Do a filename search using the name you decided to use for your copy
of USERS.BBS and d/l it.

The next step, now you have the USERS.BBS file is to crack the passwords.
I only know of ONE crack program out there which has the RA password
encryption algorythm, a program based on the popular Unix CRACKERJACK
program called RA-CRACK.  This simply takes a given word, encrypts it, and
compares it to the USERS.BBS file to find a user with a matching password.

RA-CRACK takes it's source words from a text file so it would be possible
to either:

 a)  Use a TXT dictionary file as the source.  All passwords that are
     normal words will be found.  This method will usually find about 90%
     of the user passwords.

 b)  Write a "brute force" cracker using a small routine that "counts"
     through valid ASCII character combinations from "!" (ASCII 33) upto
     a string containing 25 (max length of a RA password) null characters
     (ASCII 255), passing these via a text file to RA-CRACK.  This SHOULD
     be _100%_ successful, but SLOW!


Closing the Net



 

[Reproduced with permission from the January 1991 issue of _Reason_
magazine.  A one-year subscription (11 issues) is $19.95.  Copyright
1991 by the Reason Foundation, 2716 Ocean Park Blvd., Suite 1062,
Santa Monica, CA 90405.  Please do not remove this header.]

       Back in early February, newspapers across the country reported that
computer hackers were interfering with emergency calls over the 911
communications network.  The reports said the hackers had penetrated the
system using information from a secret computer document.
       The scare grew out of an indictment by a grand jury in Lockport,
Illinois.  On February 7, Craig Neidorf and Robert Riggs were indicted on
seven counts of wire fraud, violation of the Computer Fraud and Abuse Act
of 1986, and interstate transportation of stolen goods.
       Prosecutors alleged that Neidorf and Riggs had conspired to steal,
using fraudulent methods, a confidential and proprietary document from the
Bell South telephone company.  This document, it was claimed, could allow
computer hackers to disrupt the 911 emergency network.
       The arrest of Neidorf and Riggs was only the beginning. The Secret
Service, which has authority over crimes involving government computers,
had embarked on a vast, nationwide investigation of hacker activity:
Operation Sun Devil.


       Imagine the night face of North America, shining not with cities but
with lines of light showing the transmission of data.  Brightest are New
York City, the financial capital, and California, the technological
capital, with Washington, D.C., a close third. The lines that crisscross
the country are telephone wires and cables, microwave transmissions, and
packet-switching networks designed for computer communication. Here and
there, beams dart into space to reflect off satellites and back to earth.
       The computer networks in this country are huge. The largest are
entities like UseNet and InterNet, which link every academic computing
center of any size and are accessible to every scientist, university
student, and faculty member in the nation.  The networks also include
government-operated systems, such as MilNet, which links military computers
that do not carry confidential information.  And there are the commercial
services, such as Dow Jones News/Retrieval, SportsNet, CompuServe, GEnie,
and Prodigy.  CompuServe is the largest of these, with half a million
subscribers.
       In addition to these massive entities are thousands of tiny bulletin
board services, or BBSes.  Anyone with a computer and a modem can start a
BBS; others can then call it up and use it.  BBSes offer, in miniature,
essentially the same services that the commercial nets offer:  the ability
to chat with others by posting messages to an electronic bulletin board and
the ability to upload and download software and text files.  There are more
than 5,000 BBSes in the United States, most of them operated for fun.  Few
charge their users.  In my local calling area alone, I know of BBSes for
writers, gamers, Macintosh enthusiasts, gays, and the disabled -- and I'm
sure there are others.
       The vast majority of BBSes deal with unexceptional topics.  But some
boards deal with questions of computer security.  These attract hackers.
       Naturally, hackers discuss their hobby: breaking into computers.
Usually, however, bulletin board discussions are general in nature.
Hackers are not stupid, and they know that posting credit card numbers or
the like is evidence of criminal activity.  By and large, BBS discussions
rarely, if ever, contain information that would be illegal if published in
print form.  It's not illegal, after all, to tell your readers how to
commit illegal acts.  If it were, books like _The_Anarchist's_Cookbook_ and
_Scarne_on_Cards_ (and half the murder mysteries in print) would be banned.
       The laws dealing with electronic transmissions, however, are far
from clear.  And the methods used to enforce these vague laws set a
dangerous precedent for abridging freedom of speech.
       In the future, the Net -- the combination of all the computer
networks -- will be the primary means of information transmission, with
print publication merely its adjunct.  The Net will replace the press, and
users of the Net must enjoy precisely the freedoms enjoyed by the press.
If users of the Net have to worry about police surveillance, if censorship
is rife, if the state forbids mere discussion of certain topics -- then the
liberty for which the Founders fought will have been destroyed, not by war
or tyranny, but by mere technological change.


       From the government's point of view, the arrest of Neidorf and Riggs
did not end the threat to the 911 network.  The document they had stolen
was not a single piece of paper that could be returned to its rightful
owner. It was an electronic document that Riggs had downloaded from a Bell
South computer.
       Riggs belonged to a hacker group called the Legion of Doom, whose
members shared information.  It was likely that others in the group had
copies of the 911 document.  Worse, Riggs had uploaded the 911 document to
a bulletin board service in Lockport, Illinois.  Neidorf had downloaded the
file from the Lockport BBS.  Anyone else who used the same BBS could have
downloaded it, too, meaning that dozens of people might have this dangerous
information.  Worse yet, Neidorf had published an edited version of the
Bell South document in an issue of his underground computer magazine,
_Phrack_.
       Unlike conventional magazines, _Phrack_ never saw a printing press;
it was distributed electronically.  After preparing an issue, Neidorf would
dispatch it, via various computer networks, to his address list of 1,300
names. Any recipient could then upload the magazine to a bulletin board or
to one of the academic or commercial nets.  That meant thousands, perhaps
millions, of people had access to the information in the Bell South
document.
       We may imagine that the Secret Service was gravely concerned about
the potential threat to emergency services.  If not, then their subsequent
actions are hard to fathom.


       On March 1, 1990, employees of Steve Jackson Games, a small game
company in Austin, Texas, arrived at their place of business to find that
they were barred from the premises.  The Secret Service had a warrant, and
the agents conducting the search wouldn't let anyone in until they were
done.
       The agents ransacked the company's offices, broke a few locks, and
damaged some filing cabinets.  They searched the warehouse so thoroughly,
says company founder Steve Jackson, that afterward it "looked like a
snowstorm," with papers strewn randomly.  The agents confiscated three
computers, a laser printer, several pieces of electronic equipment
(including some broken equipment from a storeroom), several hard drives,
and many floppy disks. They told Jackson they were seizing the equipment
"as evidence" in connection with a national investigation.
       Among the equipment seized was the computer through which S.J. Games
ran a BBS to communicate with customers and freelancers.  It had never been
a congregating point for hackers and was about as much a threat to the
public order as a Nintendo game.
       The loss of the equipment was bad enough.  Worse, the Secret Service
seized all existing copies -- on hard drives, floppy disks, and paper -- of
S.J. Games' next product, a game supplement called GURPS Cyberpunk.  The
loss of that data shot Jackson's publication schedule to hell. Like many
small publishers, S.J. Games runs on tight cash flow.  No new products, no
income.  No income, no way to pay the bills.
       Over the next several weeks, Jackson was forced to lay off about
half of his 17 employees.  By dint of hard work, he and his staff managed
to reproduce the data they'd lost, mostly from memory. S.J. Games finally
published GURPS Cyberpunk as "The Book Seized by the Secret Service."  It
has sold well by the (low) standards of the field.
       Jackson estimates the raid has cost him more than $125,000, a sum a
small company like his can ill afford. (The company's annual revenue is
less than $2 million.) He was nearly put out of business by the Secret
Service.
       What justified the raid and the seizures?  Apparently, this:  The
managing editor of Steve Jackson Games is Loyd Blankenship.  Blankenship
ran The Phoenix Project, a BBS of his own in the Austin area.  Blankenship
consorted with hackers.  He was fascinated by the computer underground and
planned to write a book about it.  He may or may not have once been a
hacker himself.  He certainly knew and corresponded electronically with
admitted members of the Legion of Doom.
       But perhaps Blankenship's worst luck was this:  An issue of
Neidorf's _Phrack_ magazine included an article titled "The Phoenix
Project."  As it happens, that article had nothing to do with Blankenship's
BBS of the same name.  But the Secret Service was well aware of the
contents of _Phrack_.  Indeed, the revised indictment of Neidorf and Riggs,
issued in July, cited the article by title.  The same morning that the
Secret Service raided Steve Jackson Games, agents awakened Blankenship and
held him at gunpoint as they searched his house.  They seized his computer
and laser printer as "evidence."
       Consider the chain of logic here.  Robert Riggs is accused of a
crime. Riggs belongs to a group.  Loyd Blankenship is friends with other
members of the group, though not with Riggs himself.  Steve Jackson Games
employs Blankenship.  Therefore, the Secret Service does grievous financial
injury to Steve Jackson Games. This is guilt by association taken to an
extreme.
       Neither Blankenship, nor Steve Jackson Games, nor any company
employee, has ever been charged with so much as spitting in a public place.
The Secret Service refuses to comment, saying only that S.J. Games was not
a target of the investigation.
       The company is now receiving legal help from the Electronic Frontier
Foundation, an organization devoted to promoting civil liberties in
electronic media.  The Secret Service has returned most -- but not all --
of the company's seized equipment.  Some of it is broken and irreparable.
The government has made no offer of restitution or replacement.


       On May 8, 1990, the Secret Service executed 28 or more search
warrants in at least 14 cities across the country.  The raids involved more
than 150 agents, plus state and local law enforcement personnel.
       According to a press release from the U.S. Attorney's office in
Phoenix, the operation targeted "computer hackers who were alleged to have
trafficked in and abused stolen credit card numbers [and] unauthorized
long-distance dialing codes, and who conduct unauthorized access and damage
to computers." The agency claimed the losses might amount to millions of
dollars.  In later releases and news reports, that figure was inflated to
tens of millions of dollars.
       Nationwide, the government seized at least 40 computers and 23,000
disks of computer information. In most cases, the subjects of these
searches have remained anonymous.  Presumably, they have either been
advised by counsel to remain silent or have been so intimidated that they
wish to attract no further attention.
       John Perry Barlow reports in _Whole_Earth_Review_ that the Secret
Service held families at gunpoint while agents charged into the bedrooms of
teenage hacker suspects.  He adds that some equipment seizures deprived
self-employed mothers of their means of support.  These reports remain
unconfirmed.  It's clear, however, that the Secret Service closed down a
number of BBSes by the simple expedient of seizing "as evidence" the
computers on which those BBSes operated.
       Bulletin board services are venues for speech.  They are used mainly
to exchange information and ideas.  Nothing in the nature of the technology
prevents the exchange of illegal ideas.  But in a free society, the
presumption must be that, in absence of proof to the contrary, the use of a
medium is legitimate.  The Secret Service has not indicted, let alone
convicted, the operators of any of the BBSes closed down on May 8.
       If law enforcement officials suspect that a magazine, newspaper, or
book publisher may be transmitting illegal information, they get a warrant
to search its files and perhaps a restraining order to prevent publication.
They don't, however, seize its printing presses to prevent it from
operating.  A clearer violation of freedom of the press could hardly be
imagined.  Yet that is precisely what the Secret Service has done to these
BBSes.
       One of the BBSes closed down was the JolNet BBS in Lockport,
Illinois, which Neidorf and Riggs had used to exchange the 911 document.
Ironically, JolNet's owner, Richard Andrews, had triggered the
investigation by noticing the document, deciding it was suspicious, and
notifying the authorities.  He had cooperated fully with the investigators,
and they rewarded him by seizing his equipment.


       The Ripco BBS in Chicago was among those raided by the Secret
Service.  Operated by Bruce Esquibel under the handle of "Dr. Ripco," it
was a freewheeling, wide-ranging board, one of the best known BBSes in the
Chicago area.  Speech was extraordinarily free on the Ripco board.
       "I felt that any specific information that could lead to direct
fraud was not welcome and would be removed, and persons who repeated
violating this themselves would be removed from the system also," Esquibel
writes.  But just about anything else was open for discussion. Hackers did
indeed discuss ways of breaking into computers.  And the Ripco board
contained extensive text files, available for downloading, on a variety of
subjects to which some might take exception.  For instance, there was a
series of articles on bomb construction -- material publicly available from
books such as _The_Anarchist's_Cookbook_.
       Along with the computer on which Ripco operated, the Secret Service
seized two other computers, a laser printer, and a 940-megabyte WORM drive,
an expensive piece of equipment.  The additional seizures mystify Esquibel.
"My guess is that after examining the rat's nest of wires around the three
computers, they figured anything plugged into the power strip must have
been tied in with [the rest] in some way," he says.
       The Secret Service has yet to return any of Esquibel's equipment.
He has yet to be charged with any crime, other than failure to register a
firearm.  (He had three unlicensed guns at his office; he informed the
Secret Service agents of this before they began their search.) Says
Esquibel, "The government came in, took my personal property to determine
if there was any wrongdoing somewhere. It seems like a case of being
guilty until proven innocent...It's just not right...I am not a hacker; [I
don't] have anything to do with credit cards or manufactured explosives.
Until the weapons charge I never had been arrested, and even my driving
record has been clean since 1978."
       It appears that the Secret Service has already achieved its goal.
The Ripco board was a place where "dangerous" speech took place, and the
agency closed it down. Why bother charging Esquibel with a crime?
Especially since he might be acquitted.


       Secret Service agents searched the home of Len Rose, a computer
consultant from Baltimore, on May 8.  The agents not only seized his
computers but confiscated every piece of electronic equipment in the house,
including his fax machine, along with some family pictures, several boxes
of technical books, and a box containing his U.S. Army medals.
       On May 15, Rose was indicted on four counts of wire fraud, aiding
and abetting wire fraud, and interstate transportation of stolen goods.
Among other things, the indictment alleged that Rose is a member of the
Legion of Doom, a claim both he and admitted Doomsters vociferously deny.
       The interstate-transportation charge is based on the fact that Rose
was in possession of source code for Unix, an operating system used by a
wide variety of minicomputers and computer workstations.  (Source code is
the original text of a program.)  In theory, Unix is the property of AT&T,
which developed the system.  AT&T maintains that Unix is protected as a
confidential, unpublished work.  In fact, AT&T has sold thousands of copies
across the country, and every systems programmer who works with Unix is
likely to have some of the source code lying around.
       The wire-fraud counts are based on the fact that Rose sent a copy of
a "Trojan horse" program by electronic mail.  Trojan horse programs are
sometimes used by hackers to break into computers; they are also sometimes
used by systems managers to monitor hackers who try to break in.  In other
words, a Trojan horse program is like a crowbar:  You can use it to break
into someone's house, or you can use it to help renovate your own house.
It has both legitimate and illegitimate uses.
       Rose is a computer consultant and has dealt with security issues
from time to time.  He maintains that his Trojan horse program was used
solely for legitimate purposes -- and, in any case, would no longer work,
because of changes AT&T has made to Unix since Rose wrote the program.
Rose is not charged with actually attempting to break into computers,
merely with possessing a tool that someone could use to break in.  In
essence, the Secret Service found Len Rose in possession of a crowbar and
is accusing him of burglary.
       By seizing Rose's equipment, the Secret Service has effectively
denied him his livelihood.  Without his equipment, he cannot work.  Rose
says he has lost his home, his credit rating and credit cards, his
business, and some of his friends.  He can no longer afford to retain his
original attorney and is now represented by a public defender.
       Rose's difficulties are compounded by a theft conviction arising
from a dispute with a former client regarding the ownership of computer
equipment.  Nevertheless, it seems brutal for the Secret Service to deny
him the means to support his family and to pay for an effective defense.
Investigators must long ago have gleaned whatever evidence his equipment
may have contained.


       Ultimately, the case against Neidorf and Riggs fell apart.  In June,
the grand jury issued a revised indictment.  It dropped the charges of
violating the Computer Fraud and Abuse Act and added seven new counts of
wire fraud, some involving electronic mail between Neidorf and Riggs.
Neidorf was charges with two counts of wire fraud for uploading issues of
_Phrack_ to JolNet.  In other words, mere distribution of his publication
was deemed to be "fraud" because _Phrack_ contained material the Secret
Service claimed had been obtained by fraudulent means. The new indictment
also reduced the "value" of the document Riggs allegedly stole from more
than $70,000 to $20,000.
       On July 9, Riggs pleaded guilty in a separate indictment to one
count of conspiracy in breaking into Bell South's computer.  Sentencing was
set for September 14 -- after Neidorf's trial was to begin.  Riggs agreed
to be a witness for the prosecution of Neidorf.
       On July 28, Neidorf's trial began in Chicago.  Within four days, it
was over.  The prosecution's case had collapsed.
       Under cross-examination, a Bell South employee admitted that the
stolen document was far from confidential.  Indeed, any member of the
public could purchase a copy by calling an 800 number, requesting the
document, and paying $13 -- far less than the $20,000 claimed value or the
$5,000 minimum required to support a charge of transporting stolen goods
across state lines.
       Testimony also revealed that the contents of the document could not
possibly allow someone to enter and disrupt the 911 network.  The document
merely defined a set of terms used in telecommunications and described the
procedures used by Bell personnel in setting up a 911 system.
       Riggs, testifying for the prosecution, admitted that he had no
direct knowledge that Neidorf ever gained illegal access to anything; that
Neidorf was not himself a member of the Legion of Doom; and that Neidorf
had not been involved in the initial downloading of the document in any
way.
       In short, Neidorf and Riggs had not conspired; therefore, Neidorf
should not have been charged with the fraud counts.  The only value of
which Bell South was "deprived" by Riggs's downloading was $13; therefore,
he was, at worst, guilty of petty theft.  The interstate-transportation
counts were moot, since the "stolen goods" in question were worth less than
the $5,000 minimum.
       Not only was there no case against Neidorf -- there also was no case
against Riggs. The government dropped the case against Neidorf.  Riggs,
however, had already pleaded guilty.


       The computer nets do need policing.  Computer crooks can steal and
have stolen millions of dollars.  But a balance must be struck between
civil liberties and the legitimate needs of law enforcement.  The laws as
currently constituted are inadequate from both perspectives, and the Secret
Service seems determined to interpret them with a callous disregard for
civil liberties.
       To attack computer crime, prosecutors primarily use the statutes
dealing with wire fraud and interstate transportation of stolen goods, the
Computer Fraud and Abuse Act of 1986, and the Electronic Communication
Privacy Act of 1986.  The wire fraud statute prohibits the use of the
telephone, wire services, radio, and television in the commission of fraud.
The courts have, logically, interpreted it to apply to electronic
communications as well.
       The interstate transportation statute prohibits transportation of
stolen goods valued at $5,000 or more across state lines.  Neidorf's lawyer
moved to dismiss those counts, claiming that nothing tangible is
transported when a document is uploaded or downloaded. The judge ruled
that tangibility was not a requirement and that electronic transmission
could constitute transportation.  The Computer Fraud and Abuse Act
prohibits knowingly, and with intent to defraud, trafficking in information
that can be used to gain unauthorized access to a computer.
       The Electronic Communications Privacy Act makes it a crime to
examine private communications transmitted electronically.  Among other
things, it requires law enforcement agencies to obtain search warrants
before opening electronic mail.  It is unclear whether electronic mail
files on a BBS's hard drive are covered by a warrant that permits seizure
of the hard drive, or whether separate warrants are needed for each
recipient's mail.
       The reliance on fraud statutes to fight computer crime presents
problems.  Fraud is the use of chicanery, tricks, or other forms of
deception in a scheme to deprive the victim of property.  Most attempts by
hackers to gain illegal access to a computer do involve chicanery or
tricks, in some sense -- the use of other people's passwords, the use of
known bugs in systems software, and so on.  Much of the time, however, a
hacker does not deprive anyone of property.
       If the hacker merely signs on and looks around, he deprives the
computer operators of a few dollars of computer time at worst. If he
downloads a file, the owner still has access to the original file.  If the
file's confidentiality has value in itself -- as with a trade secret --
downloading it does deprive the owner of something of value, but this is
rarely the case.
       We need a "computer trespass" statute, with a sliding scale of
punishments corresponding to the severity of the violation.  Just as
burglary is punished more severely than trespass, so a hacker who steals
and uses credit card numbers ought to be punished more severely than one
who does nothing more than break into a computer and examine a few public
files. In the absence of such a scheme, law enforcement personnel
naturally try to cram all computer violations into the category of fraud,
since the fraud statutes are the only laws that currently permit
prosecution of computer crimes.  As a result, petty crimes are charged as
felonies -- as with Neidorf and Riggs.


       Legitimate users and operators of computer networks need to be
protected from arbitrary seizures and guilt by electronic association. The
criminal code permits law enforcement personnel to seize equipment used in
a crime or that might provide criminal evidence, even when the owner has no
knowledge of the crime.  But the purpose of such seizures is to allow the
authorities access to evidence of criminal activity, not to shut down
businesses.  Searchers need not remove computer equipment to inspect the
files it contains.  They can sit down and make copies of whatever files
they want on the spot. Even if they expect some piece of incriminating
material to be hidden particularly well -- for example, in a specially
protected file or in a ROM chip -- it is unreasonable to hold onto the
seized equipment indefinitely.
       And it's clearly wrong to seize equipment that cannot, by any
stretch of the imagination, contain incriminating data.  In both the Steve
Jackson and Ripco cases, the Secret Service seized laser printers along
with other equipment.  Laser printers have no permanent memory (other than
the factory-supplied ROM chips that tell them how to operate). They print
words on paper, that's all.  They cannot contain incriminating information.
       Even computers themselves cannot possibly constitute evidence.  When
you turn off a computer, its memory dies.  Permanent data exist only on
storage media -- hard drives, floppy disks, tape drives, and the like.
Even if law enforcement personnel have some compelling reason to take
storage media away to complete a search, they have no reason to take the
computers that use those media.
       Just as a computer is not evidence because it once carried
incriminating information, a network is not a criminal enterprise because
it once carried data used in or derived from fraudulent activity.  Yet
under current law, it seems that the operator of a bulletin board is liable
if someone posts an illegal message on it.  Say I run a BBS called Mojo.
You dial Mojo up and leave Mario Cuomo's MasterCard number on the board,
inviting anyone to use it.  Six people sign on, read the message, and fly
to Rio courtesy of the governor before I notice the message and purge it.
Apparently, I'm liable -- even though I had nothing to do with obtaining
Cuomo's credit card number, never used it, and strenuously object to this
misuse of my board.
       Such an interpretation threatens the very existence of the academic
and commercial nets.  A user of UseNet, for instance, can send a message to
any other user of UseNet.  The network routes messages in a complex fashion
-- from Computer A to Computer B to Computer C, and so on, depending on
what computers are currently live, the volume of data transmitted among
them, and the topography of the net itself.  The message could pass through
dozens of computers before reaching its destination.  If someone uses the
message to commit fraud, the system operators of every computer along its
path may be criminally liable, even though they would have no way of
knowing the contents of the message.
       Computer networks and BBSes need the same kind of "common carrier"
protection that applies to the mails, telephone companies, and wire
services.  Posting an illegal message ought to be illegal for the person
who posts it -- but not for the operator of the board on which the message
appears.
       The main function of the Net is to promote communication.  People
use it to buy goods, research topics, download software, and a myriad of
other things as well, but most of their computing time is spent
communicating: by posting messages to bulletin boards, by "chatting" in
real time, by sending electronic mail, by uploading and downloading files.
It makes no sense to say that discussion of a topic in print is OK, but
discussion of the same topic via an electronic network is a crime.
       Yet as currently interpreted, the law says that mere transmission of
information that someone _could_ use to gain access to computers for
fraudulent purposes is itself fraud -- even if no fraudulent access takes
place. The Secret Service, for instance, was willing to indict Neidorf for
publishing information it thought could be used to disrupt the 911 network
-- even though neither Neidorf nor anyone else actually disrupted it.  We
must clearly establish that electronic communications are speech, and enjoy
the same protections as other forms of speech.
       The prospects for such legal reform are not bright.  Three times in
this century, technological developments have created new venues for
speech:  with radio, with television, and with cable.  On the grounds of
scarcity, government restricts freedom of speech on radio and television;
on the grounds of natural monopoly, government regulates speech on cable.
Recent events, such as the conviction of former Cornell graduate student
Robert T. Morris for introducing a virus into the nationwide ARPANet, have
aroused worry about hacker crimes.  But concern for the rights of
legitimate users of computer nets has not received that same level of
publicity.  If anything, recent trends lean toward the adoption of more
draconian laws -- like the Computer Fraud and Abuse Act, which may make it
illegal even for computer security professionals to transmit information
about breaches of security.


       The Net is vast -- and growing fast.  It has already changed the
lives of thousands, from scientists who learn of new breakthroughs far more
quickly than if they had to wait for journal publication, to stay-at-home
writers who find in computer networks the personal contact they miss
without office jobs.  But the technology is still in its infancy.  The Net
has the capacity to improve all our lives.
       A user of the Net can already find a wide variety of information,
from encyclopedia entries to restaurant reviews.  Someday the Net will be
the first place citizens turn to when they need information.  The morning
paper will be a printout, tailored to our interests and specifications, of
articles posted worldwide; job hunters will look first to the Net; millions
will use it to telecommute to work; and serious discussion will be given to
the abolition of representative government and the adoption of direct
democracy via network voting.
       Today, we are farmers standing by our country lanes and marveling as
the first primitive automobiles backfire down the road.  The shape of the
future is murky.  We cannot know what the Net will bring, just as a farmer
seeing a car for the first time couldn't possibly have predicted six-lane
highways, urban sprawl, the sexual revolution, and photochemical smog.
Nonetheless, we can see that something remarkable is happening, something
that will change the world, something that has the potential to transform
our lives.  To ensure that our lives are enriched and not diminished, we
must ensure that the Net is free.

By
Greg Costikyan

Mengenal Beberapa Tokoh Psikologi


Mempelajari ilmu psikologi tentu belum terasa lengkap tanpa mengenal para tokoh yang menjadi pendiri atau yang mempelopori berbagai teori psikologi yang digunakan saat ini. Selain itu demi memenuhi banyak permintaan dari para pembaca, maka kami mencoba untuk menguraikan riwayat singkat para tokoh psikologi dan hasil karya mereka.

Wilhelm Wundt dilahirkan di Neckarau pada tanggal 18 Agustus 1832 dan wafat di Leipzig pada tanggal 31 Agustus 1920. Wilhelm Wundt seringkali dianggap sebagai bapak psikologi modern berkat jasanya mendirikan laboratorium psikologi pertama kali di Leipzig. Ia mula-mula dikenal sebagai seorang sosiolog, dokter, filsuf dan ahli hukum. Gelar kesarjanaan yang dimilikinya adalah dari bidang hukum dan kedokteran.  Ia dikenal sebagai seorang ilmuwan yang banyak melakukan penelitian, termasuk penelitian tentang proses sensory  (suatu proses yang dikelola oleh panca indera). 

SEJARAH PRA PSIKOLOGI




PSIKOLOGI SEBAGAI BAGIAN DARI FILSAFAT

Pendekatan dan orientasi filsafat masa Yunani yang terarah pada eksplorasi alam, empirical observations, ditandai dengan kemajuan di bidang astronomi dan matematika, meletakkan dasar ciri natural science pada psikologi, yaitu objective, experimentation and observation, the real activity of living organism. Pertanyaan utama yang selalu berulang :
Why do we behave as we do?
Why are we able to generate reasonable explanation of some actions but not of others?
Why do we have moods?
Why do we seem to know what we know?


Efforts to find ‘the cause’.
Comte: causal explanation adalah indikator untuk perkembangan tahap intelektual bagi peradaban manusiaMasa Pra Yunani Kuno : tahap intelektual masih primitif
yaitu theological/animism : atribusi ‘the cause’ pada dewa-dewa atau spiritual power. Contoh : Mesir
Manusia adalah pihak yang lemah. Perilaku ditentukan oleh kekuatan para spirit, maka tugas utama manusia adalah menjaga hubungan baik dengan mereka dengan cara menjunjung tinggi otoritas para spirit.
Kejayaan masa Yunani ditandai oleh pemikiran dari tiga filsuf besar: Socrates, Plato, Aristoteles; walau masih dipengaruhi pemikiran-pemikiran masa sebelumnya (masa Yunani Kuno)
Masa Yunani Kuno (Cosmological Period)
Adalah masa transisi dari pola pikir animisime ke awal dari natural science.
Penentu aktivitas manusia adalah alam atau lingkungan. Pada masa ini perilaku manusia berusaha diterangkan melalui prinsip-prinsip alam atau prinsip yang dianalogikan dengan gejala alam.
Ada 5 orientasi : naturalistic, biological, mathematical, eclectic, dan humanistic.
1.     Naturalistic : 
adanya elemen dasar bagi penentu kehidupan. Contoh : Thales (air), Anaximenes (udara).
Ide ttg permanence vs change dari zat yang dianalogikan kepada aktivitias manusia, menimbulkan ide ttg jiwa
Pola pikir deduktif : generalisasi gejala alam pada perilaku manusia
2.     Biologic : 
Mengangkat posisi manusia di atas gejala alam yang lain, memisahkan proses-proses pada manusia dari proses-proses yang ada pada mahluk lain di alam.
Proses-proses fisiologis primer untuk menjelaskan perilaku manusia
Tokoh : Hippocrates, Alcmeon, Empedocles.
3.     Mathematical :
Pendekatan yang melangkah lebih jauh dari dasar dunia fisik, mengarahkan pada hal-hal yang logis tapi abstrak, merupakan bekal bagi kekuatan reason.
4.     Eclectic :
Menentang ide adanya suatu prinsip dasar dan ‘kebenaran umum’. Idenya sangat mendasar berbeda dari orientasi lainnya.
Menekankan pada informasi sensoris, sangat operasional dan praktis
Sikap ilmuwan harus skeptik
Tokoh : The sophists- universal lecturers
5.     Humanistic :
Fokus : rationality & intentionality. Ratio adalah penentu kehidupan manusia beserta segala konsekuensinya. Tokoh utama : Socrates.
Tokoh penerus Socrates : Plato & Aristoteles
Ketiga tokoh tersebut : search for framework of human knowledge. Peletak dasar bagi kerangka pikir tipikal barat : rational, logic, objective.
Disebarluaskan oleh Alexander Agung (murid Aristoteles) melalui ekspansi militer.


Psikologi modern

Psikologi modern
Individu-individu yang mengalami gejala ini menjalani hidup seakan-akan tidak ada
hari esok.. Karenanya tidak ada perencanaan-perencanaan untuk masa depan.
2. Sikap Fatal terhadap hidup.
Individu yang terlanda gejala ini melihat rencana masa depan sebagai kesia-siaan.
Mereka bertingkah laku seolah-olah bukan dari dirinya sendiri dan bukan untuk
dirinya sendiri. Mereka cenderung mendevaluasi dirinya sendiri dan kehidupannnya.
3. Konformisme dan Kolektivisme.
Terlihat pada individu yang meleburkan diri ke dalam massa, kehilangan
kepribadiannya dan bertingkah laku seakan-akan mereka adalah fungsi atau alat
belaka dari massa, atau dinegara-negara totaliter, dari negara.
4. Fanatisme.
Individu yang terlanda fanatisme mngingkari kepribadian orang lain. Mereka hanya
mau mendengar opini-opini mereka sendiri yang pada hakikatnya bukan opini-opini
pribadi mereka, melainkan opini-opini penguasa, opini-opini partai, atau opini-opini
publik.
Rollo May, tokoh psikologi eksistensial lainnya menyoroti permasalahan
manusia-manusia modern pula. Ia menyatakan ada tiga masalah utama manusia
modern, yaitu kekosongan, kesepian, dan kecemasan.
Individu-individu yang mengalami gejala ini menjalani hidup seakan-akan tidak ada
hari esok.. Karenanya tidak ada perencanaan-perencanaan untuk masa depan.
2. Sikap Fatal terhadap hidup.
Individu yang terlanda gejala ini melihat rencana masa depan sebagai kesia-siaan.
Mereka bertingkah laku seolah-olah bukan dari dirinya sendiri dan bukan untuk
dirinya sendiri. Mereka cenderung mendevaluasi dirinya sendiri dan kehidupannnya.
3. Konformisme dan Kolektivisme.
Terlihat pada individu yang meleburkan diri ke dalam massa, kehilangan
kepribadiannya dan bertingkah laku seakan-akan mereka adalah fungsi atau alat
belaka dari massa, atau dinegara-negara totaliter, dari negara.
4. Fanatisme.
Individu yang terlanda fanatisme mngingkari kepribadian orang lain. Mereka hanya
mau mendengar opini-opini mereka sendiri yang pada hakikatnya bukan opini-opini
pribadi mereka, melainkan opini-opini penguasa, opini-opini partai, atau opini-opini
publik.
Rollo May, tokoh psikologi eksistensial lainnya menyoroti permasalahan
manusia-manusia modern pula. Ia menyatakan ada tiga masalah utama manusia
modern, yaitu kekosongan, kesepian, dan kecemasan.

Kekosongan adalah kondisi individu yang tidak lagi mengetahui apa yang
diinginkannnya, dan tidak lagi memeiliki kekuasaan terhadap apa yang terjadi dan
dialaminya. Kekosongan telah mengarahkan individu-individu menjadi outer
directed yakni mengarahkan diri pada orang lain dalam rangka mencari pegangan
dan petunjuk untuk menentukan hidup. Ciri pertama kekosongan adalah bisa
merespon tapi tidak bisa memilih sendiri respon apa yang paling baik bagi
masalah-masalahnya. Ciri kedua adalah pasivitas terhadap ligkungan sosial. Ciri
ketiga adalah apati terhadap dunia sekitar, atau tidak perduli.
2. Kesepian
Kesepian dialami individu-individu dalam masyarakat sebagai akibat langsung dari
kekosongan, keterasingan dari diri sendiri dan sesama. Individu dalam masyarakat
modern mengalami ketakutan akan kesepian. Mereka memiliki hasrat yang kuat
untuk diterima orang lain, dan memiliki ketakutan yang dalam akan ditolak.
Kegiatan menciptakan kebersamaan dengan orang-orang dilandasi oleh ketakutan
diisolasi oleh orang lain bukan untuk menciptakan hubungan yang akrab dan
hangat.
3. Kecemasan
Ketidakmenentuan yang semakin besar dari hari ke hari, tidak bisa tidak telah
meningkatkan kecemasan individu dalam masyarakat modern. Kecemasan timbul
karena perubahan traumatik yang dialami sebelumnya, yakni hilangnya nilai-nilai
persaingan individu yang ditujukan kepada kesejahteraan bersama yang digantikan
oleh persaingan antar individu yang eksploitatif, hilangnya penghargaan atas
keutuhan pribadi yang digantikan oleh pembagian pribadi menjadi rasionalitas dan
emosionalitas (berpikir dianggap baik, mengalami emosi dianggap buruk),
hilangnya rasa berharga, rasa bermartabat, dan rasa diri dari individu-individu.
Individu yang cemas bingung siapa dirinya dan apa yang harus diperbuatnya.
Salah seorang tokoh psikologi yang paling terkenal dalam menyoroti
persoalan-persoalan masyarakat adalah Erich Fromm. Gagasannya mencakup
masalah yang luas di masyarakat. Ia melihat bahwa masyarakat modern sekarang
ini telah semakin terisolasi dan mengalami kesepian karena dipisahkan oleh alam
dan dari orang-orang lain. Dalam sejarah manusia, dari waktu ke waktu manusia

1. Kekosongan.
semakin bebas dalam menentukan apapun mengenai hidupnya, akan tetapi mereka
juga semakin merasa kesepian. Tercerabutnya manusia modern dari
hubungan-hubungan akrab dan hangat atas dasar kemanusiaan belaka, telah
menjadikan manusia menjadi mesin-mesin hidup. Tapi itu konsekuensi yang harus
dibayar dari pola kehidupan sekarang, yang terlalu ‘teratur’ dan tanpa warna.
Jangan heran jika suatu saat (kini sudah) terjadi anti-modern, suatu gerakan yang
bukan tanpa dasar tentunya, jika menilik tulisan diatas.

ALIRAN FUNGSIONALISME



Aliran fungsionalisme merupakan aliran psikologi yang pernah sangat dominan pada
masanya, dan merupakan hal penting yang patut dibahas dalam mempelajari psikologi.
Pendekatan fungsionalisme berlawanan dengan pendahulunya, yaitu strukturalisme. Aliran
fungsionalisme juga keluar dari pragmatism sebagai sebuah filsafat.
Aliran fungsionalisme berbeda dengan psikoanalisa, maupun psikologi analytis, yang
berpusat kepada seorang tokoh. Fungsionalisme memiliki macam-macam tokoh antara lain
Willian James, John Dewey, J.R.Anggell dan James Mc.Keen Cattell .

A. Definisi Fungsionalisme
Fungsionalisme adalah orientasi dalam psikologi yang menekankan pada proses mental
dan menghargai manfaat psikologi serta mempelajari fungsi-fungsi kesadaran dalam
menjembatani antara kebutuhan manusia dan lingkungannya. Maksudnya, Fungsionalisme
memandang bahwa masyarakat adalah sebuah sistem dari beberapa bagian yang saling
berhubungan satu sama lain dan tak bisa dipahami secara terpisah.
Fungsionalisme adalah sebuah studi tentang operasi mental, mempelajari fungsi-fungsi
kesadaran dalam menjembatani antara kebutuhan manusia dan lingkungannya.
Fungsionalisme menekankan pada totalitas dalam hubungan pikiran and perilaku. Dengan
demikian, hubungan antar manusia dengan lingkungannya merupakan bentuk manifestasi dari
pikiran dan perilaku.
Fungsionalisme memandang bahwa pikiran, proses mental, persepsi indrawi, dan
emosi adalah adaptasi organisme biologis. Fungsionalisme lebih menekankan pada fungsifungsi
dan bukan hanya fakta-fakta dari fenomena mental, atau berusaha menafsirkan
fenomena mental dalam kaitan dengan peranan yang dimainkannya dalam kehidupan.
Fungsionalisme juga memandang bahwa psikologi tak cukup hanya mempersoalkan
apa dan mengapa terjadi sesuatu (strukturalisme) tetapi juga mengapa dan untuk apa (fungsi)
suatu tingkah laku tersebut terjadi. Fungsionalisme lebih menekankan pada aksi dari gejala
psikis dan jiwa seseorang yang diperlukan untuk melangsungkan kehidupan dan berfungsi
untuk penyesuaian diri psikis dan sosial.

B. Ciri – ciri Fungsionalisme
Aliran fungsionalisme memiliki beberapa ciri khas, yaitu :
o Menekankan pada fungsi mental dibandingkan dengan elemen-elemen metal.
o Fungsi-fungsi psikologis adalah adaptasi terhadap lingkungan sebagaimana
adaptasi biologis Darwin. Kemampuan individu untuk berubah sesuai tuntutan
dalam hubungannya dengan lingkungan adalah sesuatu yang terpenting.
o Sangat memandang penting aspek terapan atau fungsi dari psikologi itu sendiri
bagi berbagai bidang dan kelompok manusia.
o Aktivitas mental tidak dapat dipisahkan dari aktivitas fisik, maka stimulus dan
respons adalah suatu kesatuan.
o Psikologi sangat berkaitan dengan biologi dan merupakan cabang yang
berkembang dari biologi. Maka pemahaman tentang anatomi dan fungsi
fisiologis akan sangat membantu pemahaman tentang fungsi mental.
o Menerima berbagai metode dalam mempelajari aktivitas mental manusia,
meskipun sebagian besar riset dilakukan di Univ. Chicago ( pusat
perkembangn fungsionalisme) menggunakn metode eksperimen, pada
dasarnya aliran fungsionalisme tidk berpegang pada satu metode inti. Metode
yang digunnakan sangat tergantung dari permasalahan yang dihadapi.

C. Metode – metode dalam Fungsionalisme
Aliran ini mempelajari fungsi dan tingkah laku atau proses mental, bukan hanya
mempelajari struktural.
Metode yang dipakai oleh aliran fungsionalisme dikenal sebagai metode observasi
tingkah laku dan instropeksi .
1. Metode observasi tingkah laku terbagi menjadi 2 (dua) yaitu:
a. Metode Fisiologis
Menguraikan tingkah laku dari sudut pandang anatomi dan ilmu faal. Jadi,
mempelajari perilaku yang dikaitkan dengan organ-organ tubuh dan sistem
sarafnya.
b. Metode Variasi Kondisi
Tidak semua tingkah laku manusia dapat dijelaskan dengan anatomi dan
fisiologi, karena manusia mempunyai sudut psikologis. Metode variasi kondisi
inilah yang merupakan metode eksperimen dari aliran fungsionalisme.
3 Aliran Fungsionalisme – http://psikologi.or.id
2. Metode Instrospeksi
Stimulus berasal dari lingkungan secara alamiah, bisa pada banyak bagian
sekaligus sehingga jiwa menunjukkan fungsinya. Metode ini terlalu bersifat
subjektif sehingga sulit di sistematikan dan sulit dikuantitatifkan.

D. Aliran dalam Fungsionalisme
Fungsionalisme mempunyai 2 (dua) aliran, namun pendiri fungsionalisme itu sendiri
adalah :
William James (1842-1910)
James termasuk pendukung aliran evolusionalisme dan bersamaan John Dewey
mendirikan aliran fungsionalisme. James tergolong orang yang berpikiran bebas. Yaitu
bebas mengeluarkan dan mengembangkan ide atau kritik yang orisinil. Salah satu ciri
jalan pikirannya adalah berusaha sedekat mungkin dengan kenyataan.
Teori emosi
• Menjelaskan tentang hubungan antara perubahan fisiologis dengan emosi
•Emosi identik dengan perubahan-perubahan peredaran darah
• Emosi adalah hasil dari persepsi seseorang tentang perubahan-perubahan yang
terjadi pada tubuh terhadap rangsang dari luar
• Membantah pernyataan bahwa emosilah yang menyebabkan perubahan pada
tubuh.
1. Aliran Fungsionalisme Chicago
Terdapat banyak tokoh Fungsionalisme di Universitas Chicago sehingga dapat
dikatakan menjadi aliran tersendiri yang disebut Fungsionalisme Chicago.
a. John Dewey (1859-1952)
• Pada tahun 1886 menulis buku yang berjudul “Psychology” dan dalam
bukunya ini beliau mengenalkan cara orang Amerika belajar ppsikologi yaitu
melalui cara pragmatisme
• Sarjana-sarjana di Amerika kurang tertarik dengan pertanyaan “Apakah jiwa
itu?” tetapi lebih tertarik pada pertanyaan “Apakah kegunaan jiwa?”
• John Dewey juga menganjurkan metode yang Ia sebut dengan Learning by
doing (belajar sambil melakukan)
4 Aliran Fungsionalisme – http://psikologi.or.id
• Dewey berpendapat bahwa segala pemikiran dan perbuatan harus selalu
mempunyai tujuan, oleh karena alasan itulah ia menentang teori
elementarisme.
b. James Rowland Angell
James memiliki tiga pandangan terhadap fungsionalisme, yaitu:
• Fungsionalisme adalah psikologi tentang “mental operation” (aktivitas
bekerjanya jiwa) sebagai lawan dari psikologi tentang elemen-elemen mental,
• Fungsionalisme adalah psikologi tentang kegunaan dasar-dasar kesadaran. Ini
juga disebut sebagai teori emergensi dari kesadaran,
• Fungsionalisme adalah psiko-phisik, yaiitu psikologi tentang keseluruhan
organisme yang terdiri dari badan dan jiwa.
2. Aliran Fungsionalisme Columbia
Selain di Chhicago, Fungsionalisme juga mempunyai banyak tokoh di
Teachers College Columbia yang disebut aliran Columbia. Ciri aliran ini adalah
kebebasannya meneliti tingkah laku yang dianggap sebagai kesatuan yang tak
dapat dipisahkan dan psikologi tak perlu ersifat deskriptif karena yang penting
adalah korelasi tingkah laku dengan tingkah laku lain.
a. James MC Keen Cattel (1866-1944)
Keen Cattel mengusung teori mengenai kebebasan dalam mempelajari tingkah
laku. Ia mempunyai dua pandangan mengenai aliran fungsionalisme, yaitu:
• Fungsionalisme tidak perlu menganut paham dualisme karena manusia
dianggap sebagai keseluruhan yang merupakan suatu kesatuan,
• Fungsionalisme tidak perlu deskriptif dalam mempelajari tingkah laku, karena
yang penting adalah fungsi tingkah laku. Sehingga yang harus dipelajari
adalah hubungan (korelasi) antara satu tingkah laku dengan tingkah laku
lainnya.
• Dapat dikatakan bahwa semua cabang-cabang psikologi modern merupakan
perkembangan dari fungsionalisme. Dalam percobaanya Cattel menemukan
“kapasitas individual” kemudian ia menciptakan alat-alat untuk mengukur
5 Aliran Fungsionalisme – http://psikologi.or.id
kapasitas, kemampuan individual yang sekaran kita kenal sebagai psikotes /
mental test.
b.Edward Lee Thorndike (1874-1949)
Edward Lee pernah bekerja di “Teachers College of Columbia” dibawah
kepemimpinan James Mc. Keen Cattel. Thorndike lebih menekankan
penelitiannya pada cara dan dasar belajar. Dasar pembelajaran yaitu asosiasi dan
cara coba-salah (trial and error). Ia merumuskan beberapa prinsip:
• The Law of Effect yaitu hukum yang menyatakan intensitas hubungan
antara stimulus-respons akan meningkat jika mengalami keadaan yang
menyenangkan, sebaliknya akan melemah jika keadaan tak
menyenangkan.jika terjadi suatu keadaan akan terjadi asosiasi dengan
keadaan yang sebelumnya yaitu hubungan stimulus-respon atau responsrespons.
• The Law of Exercise atau The Law of use and disuse adalah hukum bahwa
stimulus-respons dapat timbul atau didorong dengan latihan berulangulang.
Jika tak dilatih hubungan tersebut akan melemah dan kemudian
menghilang.
F.Sumbangsih bagi Dunia Psikologi
• Mengembangkan ruang lingkup psikologi dari segi kelompok subyek
(anak, binatang) maupun bidang kajian (psikologi abnormal, psychological
testing, psikologi terapan). Hal ini dimungkinkan karena aliran
fungsionalisme lebih terbuka kepada perbedaan individual dan bidang
aplikasi daripada strukturalisme. Salah satu pelopor psychological testing
adalah James McKeen Cattell, mantan murid Wundt. Selanjutnya bidang
psychological testing ini menjadi salah satu bidang kajian penting dan
paling populer dalam psikologi.
• Memperkenalkan pentingnya perilaku nyata sebagai representasi dari
aktivitas mental. Pandangan ini mempersiapkan jalan bagi berkembangnya
aliran baru, behaviorisme yang berpegang pada perilaku nyata sebagai
satu-satunya obyek psikologi
6 Aliran Fungsionalisme – http://psikologi.or.id
• Memperkenalkan konsep penyesuaian diri sebagai obyek psikologi.
Konsep adaptasi dan adjustmen ini menjadi konsep yang sangat penting
dan sentral bagi beberapa bidang studi psikologi selanjutnya, seperti
kesehatan mental dan psikologi abnormal.
Kritik terhadap Fungsionalisme
• Kritik utama dari aliran strukturalisme adalah lebih pentingnya isi/elemen mental
daripada prosesnya. Pada masa dimana terjadi persaingan ketat antara fungsionalisme
dan strukturalisme, kritik ini cukup mendapat perhatian penting.
• Kurang adanya fokus yang jelas dan terarah dalam aliran fungsionalisme. Para tokoh
tidak pernah terlalu jelas dan elaboratif dalam mengungkapkan konsep-konsepnya
dalam karya mereka. Akibatnya aliran ini dianggap tidak terlalu utuh dan terintegrasi
dan berdampak pada posisinya yang kurang kuat sebagai sebuah sistem.
• Bersifat teleological, sesuatu ditentukan oleh tujuannya. Hal ini menggambarkan
orientasi pragmatisme yang seringkali dikritik sebagai lebih berorientasi pada hasil
dan tidak memperhatikan proses.
• Terlalu eklektik, mencampurkan berbagai ide dan konsep dari beragam sumber
sehingga terkesan kompromistis dan kehilangan bentuk asli. Pada dasarnya,
fungsionalisme memang tidak ingin muncul sebagai sebuah aliran yang strict dan
lebih memilih untuk dapat lebih fleksibel dalam mencapai tujuan-tujuannya.
7 Aliran Fungsionalisme – http://psikologi.or.id
Kesimpulan
Fungsionalisme adalah aliran psikologi yang memandang bahwa manusia harus
dipandang secara menyeluruh. Apa yang dilakukan manusia sebagai aksi adalah hal yang
kompleks yang merupakan manifestasi dari jiwa dan mempunyai maksud tertentu bukan
hanya disebabkan oleh sesuatu hal. Fungsionalisme memandang bahwa pikiran, proses
mental, persepsi indrawi, dan emosi adalah adaptasi organisme biologis.
Beberapa ciri fungsionalisme diantaranya adalah menekankan fungsi dibanding
elemen mental, memandang penting kemampuan individu untuk berubah sesuai tuntutan
lingkungannya, serta menerima berbagai metode dalam mempelajari aktivitas mental
manusia.
Terdapat dua metode yang digunakan dalam fungsionalisme, yaitu : Metode observasi
tingkah laku terbagi menjadi Metode Fisiologis dan Metode Variasi Kondisi, serta Metode
Instrospeksi.
Pendiri fungsionalisme adalah William James dan John Dewey. Aliran
Fungsionalisme terdiri atas aliran fungsionalisme Chicago ( John Dewey, James Rowland
Angel ) dan fingsionalisme California ( James Cattel dan Thorndike ).
Aliran fungsionalisme dapat memberi pengaruh positif dalam dunia psikologi, yaitu
mengembangkan ruang lingkup psikologi dari segi kelompok subyek (anak, binatang)
maupun bidang kajian (psikologi abnormal, psychological testing, psikologi terapan),
memperkenalkan pentingnya perilaku nyata sebagai representasi dari aktivitas mental dan
memperkenalkan konsep penyesuaian diri sebagai obyek psikologi.
Fungsionalisme juga menuai kritikan dari banayak pihak, yaitu Ditentang oleh Aliran
strukturalisme, kurang adanya fokus yang jelas dan terarah dalam aliran fungsionalisme;
Bersifat teleological, sesuatu ditentukan oleh tujuannya; terlalu eklektik, mencampurkan
berbagai ide dan konsep dari beragam sumber sehingga terkesan kompromistis dan
kehilangan bentuk.
By kode-blogger
kode