Computing is Socio-Technical or: Why Stakeholder Listing is Inadequate for Thoughtful Ethical Analysis Chuck Huff St. Olaf College For NSF Computer Ethics.

Slides:



Advertisements
Similar presentations
Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,
Advertisements

School/Centre: Reflecting on the effectiveness of Self-Evaluation Resource The levels on the board are as in How Good Is Our school? Above the board, type.
Where do you go from here? There are many opportunities awaiting you – but it is all up to you! There are many opportunities awaiting you – but it is all.
Components of GIS.
“An Investigation of the Therac-25 Accidents” by Nancy G. Leveson and Clark S. Turner Catherine Schell CSC 508 October 13, 2004.
The Therac-25: A Software Fatal Failure
An Investigation of the Therac-25 Accidents Nancy G. Leveson Clark S. Turner IEEE, 1993 Presented by Jack Kustanowitz April 26, 2005 University of Maryland.
Therac-25 Lawsuit for Victims Against the AECL
Workshop on High Confidence Medical Device Software and Systems (HCMDSS) Research & Roadmap June 2-3, 2005 Philadelphia, PA. Manufacturer/Care-Giver Perspective.
CSCU 411 Software Engineering Chapter 2 Introduction to Software Engineering Management.
Sixth Hour Lecture 10:30 – 11:20 am, September 9 Framework for a Software Management Process – Artifacts of the Process (Part II, Chapter 6 of Royce’ book)
Decision Making Manual: A Toolkit for Making Moral Decisions William J. Frey (UPRM) José A. Cruz-Cruz (UPRM) Chuck Huff (St. Olaf)
Computer Engineering 203 R Smith Requirements Management 6/ Requirements IEEE Standard Glossary A condition or capability needed by a user to solve.
Compressor ReVamp and Fabrication PO9452. Update Revised Concept Generation Selected some concepts Scheduled Conference call with Dresser Rand Schedules.
An expert system is a package that holds a body of knowledge and a set of rules on a subject that has been gained from human experts. An expert system.
Chapter 1 Introduction to Databases
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
The Role of DBMS in Computing
Mainframe Jobs at Verizon
Sharifah Hapsah Shahabudin Vice Chancellor 11 th Malaysian Education Summit 2007 Malaysian Education: Winning in the Global Race 11 th Malaysian Education.
CIS 321—IS Analysis & Design Chapter 1: The World of the Modern Systems Analyst.
Computers & Employment By Andrew Attard and Stephen Calleja.
Symposium 2001June 24, 2001 Curriculum Is Just the Beginning Chris Stephenson University of Waterloo.
1 Systems Analysis and Design in a Changing World, Fourth Edition.
Information Systems Security Computer System Life Cycle Security.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Human Resource Development for the Central Pollution Control Board National Comprehensive Training Needs Assessment CPCB-InWEnt-GTZ/ASEM Concept for the.
System Development Process Prof. Sujata Rao. 2Overview Systems development life cycle (SDLC) – Provides overall framework for managing system development.
Chapter 16 Quality Assurance Through Software Engineering Systems Analysis and Design Kendall & Kendall Sixth Edition.
Dimitrios Christias Robert Lyon Andreas Petrou Dimitrios Christias Robert Lyon Andreas Petrou.
Chapter 1 Computers: Tools for an Information Age.
Chapter 7 Applying UML and Patterns Craig Larman
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
What you know… You work at the East Texas Cancer Center in Tyler, Texas as a physicist who “maintains and checks the machine regularly.” (Huff 2005) Patient.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
CSI-MAXIMUS, Inc CSI Comprehensive Service & Support Implementing the CSI Way.
1 ISA&D29-Oct ISA&D29-Oct-13 Systems Analyst: problem solver IT and Strategic Planning.
Chapter 2 Introduction to Systems Architecture. Chapter goals Discuss the development of automated computing Describe the general capabilities of a computer.
Module 4: Systems Development Chapter 14: Design And Implementation.
SAMI & IMCA MARITIME CYBER SECURITY WORKSHOP
1 Susan Tyner Pritchett, RN Information System Specialist Medical College of Georgia Health, Inc th St. Augusta, GA
CS223: Software Engineering Lecture 2: Introduction to Software Engineering.
Chapter 9 The People in Information Systems. Learning Objectives Upon successful completion of this chapter, you will be able to: Describe each of the.
State of Georgia Release Management Training
Teaching slides Chapter 1. Chapter 1: Introduction Introduction Components of a computer Building the software products What is software engineering?
1 Software Maintenance and Evolution CSSE 575: Session 4, Part 2 Software Maintenance Process Steve Chenoweth Office Phone: (812) Cell: (937)
SYSTEMSDESIGNANALYSIS 1 Chapter 21 Implementation Jerry Post Copyright © 1997.
Use Case Diagrams. Introduction In the previous Lecture, you saw a brief review of the nine UML diagrams. Now that you have the clear, you'll start to.
Ethical Behavior of IS Professionals and Unified Code of Conduct MERDAN HOJANEPESOV ETHICAL, LEGAL, AND SOCIAL ISSUES IN INFORMATION TECHNOLOGY (COMP.
Randy Modowski Adam Reimel Max Varner COSC 380 May 23, 2011 Accountability.
Consumer rights when subscribing to an internet service.
Class 2 What is social work and what do social workers do ?
Chapter 4. CONCEPT OF THE OPERATING SYSTEM MANAGING ESSENTIAL FILE OPERATIONS.
Principles of Information Systems Eighth Edition
Software Project Configuration Management
PERSONAL SAFETY INTERLOCKS External EHS Expert Panel Workshop
Documentation needed to support a software safety case P.-J. Courtois
System Design, Implementation and Review
Clinical Engineering Lecture (3).
IT Roles and Responsibilities
Class 2 What is social work and what do social workers do ?
Physical Architecture Layer Design
Online Shopping APP.
Systems Design, Implementation, and Operation
Disability Services Agencies Briefing On HIPAA
Software Development Process
Week 13: Errors, Failures, and Risks
System Analysis and Design
LO1 - Know about aspects of cyber security
Presentation transcript:

Computing is Socio-Technical or: Why Stakeholder Listing is Inadequate for Thoughtful Ethical Analysis Chuck Huff St. Olaf College For NSF Computer Ethics Workshop, 2002 Some informal musings and a request for feedback on the topic:

Beginnings Much case analysis begins with a listing of stakeholders, not a bad idea But how do we know we have the right set of stakeholders? There is no easy rule for completion

Components of an STS Socio-Technical systems include: –Hardware: Mainframes, Workstations, Peripheral, connecting networks –Software: operating systems, utilities, application programs, specialized code –Physical surroundings –People: Individuals, groups, roles (support, training, management, line personnel, engineer), agencies –Institutions: corporations, associations, government agencies etc. –Procedures, both official and actual: Management models, Reporting relationships, Documentation requirements, Data flow, Rules & norms –Laws and regulations –Data and Data Structures

An STS Is Not Static or Value-Neutral An STS will change over time, and this change has a trajectory. –An STS is configurable in all its elements, and this allows for change over time –Individual components of the STS have their own trajectories. –Trajectories are most influenced by and usually support those with social power They are not value neutral – their use creates winners and losers

An Example: Therac 25

The Therac 25 STS Hardware: Therac 20 w/ PDP-11, Therac 25 & PDP-11, the console Software: real-time control software, interface Physical surroundings:the shielded room, emergency shutoffs, cameras, hospital setting People: Patients, Operators, Medical physicists, AECL, Programmer, Doctors, Hospital Administrators, Maintenance personnel, Therac User groups Institutions: Atomic Energy Canada LTD, Canadian Radiation Protection Board, US FDA, Hospitals Procedures, both official and actual: Support agreements, Machine Setup, Reporting Procedures (AECL and FDA), Scheduling procedures Laws and regulations: FDA regulations Data and Data Structures: counters, data on machine state, data on console state, data on patients

Gosh!  Certainly a complex system with many technical aspects and social actors  The trajectory was influenced by the lowly (medical physicist) and the mighty (FDA).  The design was flawed, but many social procedures were flawed too.  An actor aware of the system can act with more effectiveness  A designer unaware of the system can be in grave danger  A Social Impact Statement (coming Thursday) is a useful ethical tool  There are more stakeholders than are dreamt of in your philosophy

What Next?  How to control this complexity …  Avoiding paralysis of analysis  How to teach using these ideas?