3.1: Socio-Technical Systems in Professional Decision Making
- Page ID
- 20503
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)
( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\id}{\mathrm{id}}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\kernel}{\mathrm{null}\,}\)
\( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\)
\( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\)
\( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)
\( \newcommand{\vectorA}[1]{\vec{#1}} % arrow\)
\( \newcommand{\vectorAt}[1]{\vec{\text{#1}}} % arrow\)
\( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vectorC}[1]{\textbf{#1}} \)
\( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)
\( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)
\( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)Module Introduction
Milagro Beanfield War: Joe Mondragon has created quite a stir in Milagro, a small village in New Mexico. He has illegally diverted water from the irrigation ditch to his field to grow beans. Access to scarce water in New Mexico has created sharp political and social disputes which have reached a crises point in Milagro. Competing with traditional subsistence farmers like Joe is the profitable recreation industry. Ladd Devine, a wealthy developer, has joined with the state government in New Mexico to build a large recreational center consisting of a restaurant, travel lodge, individual cabins and a lavish golf course. Since there is not enough water to cover both recreational and agricultural uses and since Ladd Devine's project promises large tax revenues and new jobs, the state government has fallen behind him and has promised to give to the recreational facilities all the water it needs. Hence, the problem created by Mondragon's illegal act. You work for Ladd Devine. He has asked you to look into local opposition to the recreational facility. Along these lines, you attend the town meeting scheduled by Ruby Archuleta in the town's church. You are concerned about Charlie Bloom's presentation and the impact it may have on the local community. Prepare a STS analysis to test Bloom's assertions and better prepare Ladd Devine for local opposition to his facility.
Incident at MoralesFred is a chemical engineer hired by Phaust Corporation to design and make operational a new chemical plant for the manufacture of their newly redesigned paint thinner. Under financial pressure from the parent French company, Chemistre, they have decided to locate their new plant in Morales, Mexico to take advantage of lower costs and more flexible government regulations. You are well on the way toward designing this new plant when news comes from Chemistre that all budgets are being cut 20% to finance Chemistre's latest takeover acquisition. You are Fred and are now faced with a series of difficult financial-engineering decisions. Should you hold out for the more expensive Lutz and Lutz controls or use the cheaper ones produced locally? Should you continue with the current plant size or cut plant size and capacity to keep within budgetary constraints? You have also been made aware of the environmental and health risks associated with not lining the waste ponds used by the plant. Do you advocate lining the ponds or not, the latter being within compliance for Mexican environmental and health regulations. Prepare a STS analysis to help you make and justify these decisions. Make a series of recommendations to your supervisors based on this study.
Puerto Rican Projects
- Your company, Cogentrix, proposes a cogeneration plant that uses coal, produces electricity, and creates steam as a by-product of electricity generation process. Because the steam can be sold to nearby tuna canning plants, your company wishes to study the feasibility of locating its plant in or near Mayaguez, Puerto Rico. (Co-generation technology has become very popular and useful in some places.) Carry out an STS analysis to identify potential problems. Make a recommendation to your company. If your recommendation is positive, discuss how the plant should be modified to fit into the Mayaguez, Puerto Rico STS.
- Your company, Southern Gold Resources, is interested in mining different regions in central Puerto Rico for copper and gold. But you know that twenty years earlier, two proposals by two international mining companies were turned down by the PR government. Carry out a STS study to examine the feasibility of designing a different project that may be more acceptable to local groups. What does your STS analysis tell you about social and ethical impacts, financial promise, and likely local opposition. Can profitable mining operations be developed that respect the concerns of opposed groups? What is your recommendation based on your STS analysis?
- Windmar, a company that manufactures and operates windmills for electricity generation has proposed to locate a windmill farm in a location adjacent to the Bosque Seco de Guanica. They have encountered considerable local opposition. Carry out a STS analysis to understand and clarify this opposition. Can the concerns of local stakeholders be addressed and the windmill farm still remain profitable? How should the windmill project be modified to improve its chances of implementation?
Things to Know about STSs
What is a Socio-Technical System? (STS): A socio-technical system (STS) is a tool to help a business anticipate and successfully resolve interdisciplinary business problems. "Interdisciplinary business problems" refer to problems where financial values are intertwined with technical, ethical, social, political, and cultural values. (Reference: Chuck Huff, Good Computing: A Virtue Approach to Computer Ethics, draft manuscript for Jones and Bartlett Publishers)
Some Things to Know About STSs
- Socio-Technical systems provide a tool to uncover the different environments in which business activity takes place and to articulate how these constrain and enable different business practices.
- A STS can be divided into different components such as hardware software, physical surroundings, people/groups/roles, procedures, laws/statutes/regulations, and information systems. Other components include the natural environment, markets, and political systems.
- But while different components can be distinguished, these are, in the final analysis, inseparable. Socio-Technical Systems are first and foremost systems: their components are interrelated and interact so that a change in one often produces changes that reverberate through the system.
- Socio-Technical systems embody moral values such as justice, responsibility, respect, trust, and integrity as well as non-moral values such as efficiency, satisfaction, productivity, effectiveness, and profitability. Often these values can be located in one or more of the system components. Often they conflict with one another causing the system as a whole to change.
- STSs change, and this change traces out a path or trajectory. The normative challenge here is to bring about and direct changes that place the STS on a value-positive trajectory. In the final analysis, we study STS to make sure that they change in a value-realizing direction.
Constituents or Sub-Environments of Business Activity
Paragraph summary of sub-environments of business followed by a table devoted to each one.
- Technology including hardware, software, designs, prototypes, products, or services. Examples of engineering projects in Puerto Rico are provided in the PR STS grid. In the Therac-25 case, the hardware is the double pass accelerator, in Hughes the analog-to-digital integrated circuits, and in Machado the UNIX software system and the computers in the UCI laboratories that are configured by this system. Because technologies are structured to carry out the intentions of their designers, they embed values.
- Physical Surroundings. Physical surroundings can also embed values. Doors, by their weight, strength, material, size, and attachments (such as locks) can promote values such as security. Physical surroundings promote, maintain, or diminish other values in that they can permit or deny access, facilitate or hinder speech, promote privacy or transparency, isolate or disseminate property, and promote equality or privilege.
- People, Groups, and Roles. This component of an STS has been the focus of traditional stakeholder analyses. A stakeholder is any group or individual which has an essential or vital interest in the situation at hand. Any decision made or design implemented can enhance, maintain, or diminish this interest or stake. So if we consider Frank Saia a decision-maker in the Hughes case, then the Hughes corporation, the U.S. Air Force, the Hughes sub-group that runs environmental tests on integrated circuits, and Hughes customers would all be considered stakeholders.
- Procedures. How does a company deal with dissenting professional opinions manifested by employees? What kind of due process procedures are in place in your university for contesting what you consider to be unfair grades? How do researchers go about getting the informed consent of those who will be the subjects of their experiments? Procedures set forth ends which embody values and legitimize means which also embody values.
- Laws, statutes, and regulations all form essential parts of STSs. This would include engineering codes as well as the state or professional organizations charged with developing and enforcing them
- The final category can be formulated in a variety of ways depending on the specific context. Computing systems gather, store, and disseminate information. Hence, this could be labeled data and data storage structure. (Consider using data mining software to collect information and encrypted and isolated files for storing it securely.) In engineering, this might include the information generated as a device is implemented, operates, and is decommissioned. This information, if fed back into refining the technology or improving the design of next generation prototypes, could lead to uncovering and preventing potential accidents. Electrical engineers have elected to rename this category, in the context of power systems, rates and rate structures.
Component | Description | Examples | Frameworks | More Frameworks |
Technological | Hardware: Machines of different kinds | Door (with tasks delegated to it such as automatically shutting and being locked) | Value Discovery (identifying and locating values in STS) | Social Constructionism>: Restoring interpretive flexibility to reconstruct a technology to remove bias and realize value |
Code that configures machines around human purposes | Power generating technologies based on renewable and nonrenewable resources | Value Translation (Operationalizing and implementing values in an STS by designing and carrying out a procedure) | Identifying and mitigating complexity in the form of tightly-coupled systems and non-linear causal chains | |
Technology can constrain business activity by de-skilling | Automobiles, computers, cell phones all of which have produced profound changes in our STSs | Value Verification (Using methods of participatory observation to determine how effectively values have been realized.) | De-centralizing control and authority | |
Technology, especially software, can instrument human action | Microsoft Office, Firefox Browser, Google Chrome, Google Docs, Social Networking software | Transperspectivity: discovering strands of construction of current STS; identifying possibilities for reconstruction | Designing to avoid the technological imperative and reverse adaptation (where humans abandon ends and serve the ends of technologies |
Component | Description | Examples | Frameworks | More Frameworks |
Ethical Environment | Moral Constructs: Spheres of justice where distribution takes place according to context-dependent rules (Rules) | Basic Moral Concepts: rights, duties, goods, values, virtues, responsibility, and justice | Utilitarianism: Happiness is tied to maximizing the satisfaction of aggregated preferences. | Basic Capabilities: life, bodily health, bodily integrity |
Social Constructs: Power and its distribution among groups and individuals | Intermediate Moral Concepts: Privacy, Property, Informed Consent, Free Speech, due Process, Safety/Risk | Rights: Capacities of action that are essential to autonomy, vulnerable to standard threats, and correlated with feasible duties | Cognitive Capabilities: Sense, Imagination, Thought; Emotion; Practical Reason | |
Right: A right is a capacity of action, essential to autonomy, that others are obliged to recognize and respect. | Privacy: If the information is directly relevant to the relation to the holder and the seeker, then it is not private. | Virtues: Settled dispositions toward choosing the mean between extremes of excess and defect. (Courage is the mean between cowardice and recklessness) | Social Capabilities: Affiliations, Other Species | |
Duty: A duty is a principle that obliges us to recognize and respect the rights of others. | Property: That with which I mix my labor is mine. Intellectual property is non-rivalrous and non-excludable. | Capabilities Approach: For Nussbaum, capabilities answer the question, “What is this person able to do or be?” For Sen, capabilities are “‘substantial freedoms,’ a set of (causally interrelated) opportunities to choose and act.” | Capabilities that address vulnerabilities: Play and Control over one's environment |
Physical Surroundings | Description | Examples | Frameworks | Frameworks |
Physical environment imposes constraints (limits) over actions that restrict possibilities and shape implementation. | Influence of rivers, mountains, and valleys on social and economic activities such as travel, trade, economic and agricultural activity, commerce, industry, and manufacturing. | Classroom environment enables or constrains different teaching and learning styles. For example, one can pair off technically enhanced and technically challenged classrooms with student-centered and teacher-centered pedagogical styles and come up with four different learning environments. Each constrains and enables a different set of activities. | The physical arrangement of objects in the classroom as well as the borders created by walls, doors, and cubicles can steer a class toward teacher-centered or student-centered pedagogical styles. |
Stakeholders | Description | Examples | Frameworks | Frameworks |
Any group or individual that has a vital interest at play (at stake) in the STS. | Market Stakeholders: Employees, Stockholders | Non-Market Stakeholders: communities, activist groups and NGOs | Role: The place or station a stakeholder occupies in a given organizational system and the associated tasks or responsibilities. | |
customers, suppliers retailers/wholesalers, creditors | business support groups, governments, general public (those impacted by projects who do not participate directly in their development | Interests: Goods, values, rights, interests, and preferences at play in the situation which the stakeholder will act to protect or promote. | ||
(Distinction between market and non-market stakeholders comes from Lawrence and Weber, Business and Society: Stakeholders, Ethics, Public Policy, 12th edition. McGraw-Hill, 14-15. | Alliances are discussed by Patricia Werhane et al., Alleviating Poverty Through Profitable Partnerships: Globalization, Markets, and Economic Well-being. Routledge (2009). | Relation: Each stakeholder is related to other stakeholders in an alliance and each relation is tied to goods and values. |
Procedural | Description | Examples | Framework | Framework |
A series of interrelated actions carried out in a particular sequence to bring about a desired result, such as the realization of a value. Procedures can schematize value by setting out a script for its realization. | Hiring a new employee: (a) settling on and publishing a job description; (b) soliciting and reviewing applications from candidates; (c) reducing candidate list and interviewing finalists; (d) selecting a candidate; (e) tendering that candidate a job offer.Other procedures: forming a corporation, filing for bankruptcy, gaining consent to transfer TGI and PII to a third party (Toysmart: opt-in and opt-out procedures). | Value Realization Process in Software Engineering: (a) Discovery: Uncovering values shared by a given community; (b) Translation: operationalizing and implementing values in a given STS; (c) Verification: using methods of participatory observation (surveys and interviews) to validate that the values in question have been discovered and translated. | Challenging the Statement of Values: (a) A stakeholder group raises a conceptual, translation, range, or development issue; (b) Group presents their challenge and response to other stakeholders; (c) If other stakeholder groups agree, then the challenge leads to a revision in the SOV; (d) Community as a whole approves the revision. |
Laws, Statutes, Regulations | Description | Examples | Frameworks | Frameworks |
Laws differ from ethical principles and concepts in that laws prescribe the minimally moral while ethical principles and concepts routinely explore higher moral "spaces." | Criminal Law: Applies to individuals; interested party in a criminal trial is society, not the victim. | Civil Law: Torts concern wrongful injury. The objective of a tort is to make the victim "while" after an injury. | US and British law work through a common law system where current decisions are based on past decisions or precedent. | |
Ethical principles challenge and criticize laws by bringing into question their normative content. | Involves proving a mens rea (guilty mind) and actus reus (guilty or law-breaking act) and that the mens rea caused the actus reus. | To prevail in a tort one ust prove (in order of severity) negligence, recklessness, or intent. | The Puerto Rican system of law is based on the Napoleonic code where decisions relate directly to existing law and statute and precedent plays a weaker role. | |
Laws can challenge ethical principles and concepts by raising issues of practicality. Also, as in responsibility theory, the law can structure and inform the moral discussion. | Criminal law does not apply to corporations because they "have no soul to damn and no body to kick" Baron Thurlow | Negligence involves proving that the defendant failed to meet some standard of due care. | Question: How does the statute-based Napoleonic system in PR constrain and enable business practice in relation to other systems such as the British and American common law systems? | |
Contract law concerns the violation of the terms of a contract. |
Market Environment | Description | Examples | Frameworks | Frameworks |
Business takes place within different markets that shape supply, demand, and price. Globalization frequently requires that a business be adept at operating across different markets | Laissez- Faire: Each economic unit makes choice based on rational (enlightened) self-interest. (Private ownership of goods.) | Assumptions of a Free Market System: (a) Individual decisions are aggregated. (b) Information flows through price structure. | Recent economic studies of the limits of laissez-faire markets: | |
Liberal use made here of notes from Economics class taught by CR Winegardner, University of Toledo, 1971-1972 | Liberal Democratic Socialism: Limited government intervention is needed to improve upon the choice of individual economic units. (Mixture of private and public ownership) | (c) Free association. (d) Absence of force or fraud. (e) Individual agents are rational utility maximizer | (a) Information Asymmetries (as studied by Stiegliz). (b) Monopolies which, in the absence of competition, can dictate standards of price, product and service. | |
Materials also take from Natural Capitalism from Lovins and Hawkings. | Communist, Authoritarian Socialism: The state is in the best position to know what choices and policies are beneficial for the economy as a whole and its component parts. (Public ownership of goods and services) | (f) Governments should adopt a hands-off stance because interference disrupts the ability of markets to produce utility-maximizing conditions.(4,4) | Animal spirits deflect economic decision-making away from perfect utility maximizing. They include confidence, fairness, corruption, money illusion, and stories.(4,5) | |
(5,1) | (5,2) | (5,3) | (5,4) | Ghoshal: bad management theories are destroying good mangement practices as they become self-fulfilling prophecies. Ghoshal is especially critical of agency theory, compliance/punitive approaches to corporate governance, and the theory of human nature he calls "Homo Economicus."(5,5) |
Information Environment(1,1) | Description(1,2) | Examples(1,3) | Frameworks(1,4) | Frameworks(1,5) |
(2,1) | How data and information is collected, stored, and transmitted along with ethical issues such as informed consent and privacy that accompany information management (2,2) | Informed Consent: Obtaining consent from information holder when collecting, storing, and transferring personal identifying information or transaction generated information.(2,3) | Privacy in Context (2,4) | Data Transfer and Informed Consent(2,5) |
(3,1) | (3,2) | Belmont Report: (a) Principles: Respect for persons, beneficence, and justice; (b) Application 1: Informed consent as "subjects to the degree that they are capable be given the opportunity to choose what shall or shall not happen to them;" (c) Application 2: assessment of risks and benefits; (d) Application 3: Selection of subjects for experiment.(3,3) | (a) Identify individuals in groups in a context; (b) Identify the roles played by these individuals and groups.(3,4) | Opt-in: Information is not transferred unless data-holder expressly consents; Opt-out: Data will be transferred unless holder expressly refuses or withdraws consent.(3,5) |
(4,1) | (4,2) | Conditions of Informed Consent Information, Comprehension, Voluntariness. (4,3) | (c) Identify context-relative norms that guide activities within context and between one context and another. (Materials on privacy in context are taken from Helen Nissembaum in her book, Privacy in Context(4,4) | Fair Information Practices: (a) Notice: full disclusure and redress (way to resolve problems); (b) Choice: Choice about how informaitn is to be used; (c) Access: access to stored and about to be disclosed information; (d) Security: ways that information will be kept secure and unauthorized access prevented incollection, storage, and transfer of information.(4,5) |
Natural Environment (1,1) | Description (1,2) | Examples (1,3) | Frameworks (1,4) | Frameworks(1,5) |
(2,1) | Wicked Problems(2,2) | Principles of Systainability according to B. Norton(2,3) | Four Theoretical Approaches to Environmental Ethics(2,4) | Environmental Value as determined by shadow markets(2,5) |
(3,1) | (a) Difficulties in formulating and structuring problem; (b) Non-compatibility of solutions (several ways of stating solutions).(3,2) | Precautionary Principle: "in situations of high risk and high uncertainty,always choose the lowest risk option." (Cass Sunstein distinguishes several senses of the PP including one which makes it impossible to deviate from the status quo) (Norton 348)(3,3) | (a) Extensionism: Peter Singer's extension of Utilitarianism to cover sentient beings; (b) Tom Regan's ascription of rights to select animals. Biocentrism: Taylor's attribution of moral consideration to all teleological centers of a life.(3,4) | Willingness-to-pay: Resource in question would go to the highest bidder, that is, value is dependent on most intense preference and the disposable income to assert that preference(3,5) |
(4,1) | (c) Wicked problems are "non-repeatable" in that they are context-dependent. This renders learning from previous problems and solutions much more difficult; (d) Wicked problems involve "competing values" that cannot be realized at the same time and that cannot be homogenized or plotted on a single scale; (e) Wicked problems exhibit "open-ended inter-temporal effects". Closely paraphrased from Norton, Systainability, 133-5(4,2) | Safe Minimum Standard: "save the resource, provided the costs of doing so are bearable" (Norton 346)(4,3) | Land Ethics: A thing has value or is good insofar as it promotes the integrity, stability, and beauty of the biotic community. Biotic community includes humans, non-humans, species, and ecosystems all interacting as a system. From Aldo Leopole, Sand County Almanac; Virtue Environmental Ethics: Approach centers on virtues as habits that promote sustainable transactions with the natural environment. Hursthouse provides a provocative example with the virtue, respect for nature.(4,4) | Willingness-to-sell: Resource is owned by the public so its value is determined by its selling rather than buying price. This frees bid fromdisposable income. Now value becomes more reflective of the identity-conferring beliefs and attitudes of a community and its members.(4,5) |
Ethics of STS Research
- Right of Free and Informed Consent: This is the right of participants in a research project to know the harms and benefits of the research. It also includes the right not to be forced to participate in a project but, instead, offer or withdraw voluntarily their consent to participate. When preparing an STS analysis, it is mandatory to take active measures to facilitate participants's free and informed consent.
- Any STS analysis must take active measures to recognize potential harms and minimize or eliminate them. This is especially the case regarding the information that may be collected about different individuals. Special provisions must be taken to maintain confidentiality in collecting, storing, and using sensitive information. This includes careful disposal of information after it is no longer needed.
Participatory Observation
- As we said above, a socio-technical system (STS) is “an intellectual tool to help us recognize patterns in the way technology is used and produced.” Constructing these tools requires combining modes of analysis that are ordinarily kept separate. Because STSs embed values, they are normative. These values can help to chart out trajectories of change and development because they outline values that the system needs to realize, maintain, or even enhance. In this way, the study of STSs is normative and a legitimate inquiry for practical and professional ethics. On the other hand, STS analysis requires finding out what is already there and describing it. So STS analysis is descriptive as well. In this textbox, we will talk briefly about the descriptive or empirical components of STS analysis. This material is taken from the draft manuscript of Good Computing: A Virtue Approach to Computer Ethics and has been developed by Chuck Huff.
- Interviews: Semi-Structured and Structured Interviews conducted with those familiar with a given STS provide an excellent source of information on the constituents of a given STS and how these fit together into an interrelated whole. For example, the STS grid on power systems was put together by experts in this area who were able to provide detailed information on power rates and protocols, software used to distribute energy through the gridlines, and different sources (representing both hard and soft technologies) of power generation.
- Field Observation: Those constructing a STS analysis go directly to the system and describe it in its day-to-day operation. Two books provide more information on the types and techniques of field observation: 1. David M. Fetterman, Ethnography: 2nd Edition, Applied Social Research Methods Series, Vol 17. London, UK.: Sage Publishers, 1998 and 2. James P. Spradley, Participant Observation. New York, Harcourt, 1980. The data collected in this method can also be used to construct day-in-the-life scenarios that describe how a given technology functions on a typical day. These scenarios are useful for uncovering value conflicts and latent accidents. See James T. Reason, Human Error, Cambridge, UK.: Cambridge University Press, 1990 for information on latent accidents, how they are detected, and how they are prevented.
- Questionnaires: Questionnaires are useful for gathering general information from large numbers of people about a STS. Constructing good questionnaires is a difficult process that requires patience as well as trial and error. (Trying out questions on classmates and friends is the best way to identify unclear or misleading questions.) Avoiding complex, overly leading, and loaded questions represent a few of the challenges facing those who would construct useful questionnaires.
- Archival and physical trace methods: Looking at user manuals provides insight into how a system has been designed and how it works. Studying which keys are worn down on computer keyboards provides information on the kind of work being done. Comparing how a system is intended to work with how it is in fact being used is also illuminating, especially when one is interested in tracing the trajectory of a STS. Working with archival and physical trace methods requires critical thought and detective work.
- None of the above methods, taken in isolation, provides complete information on a STS. Triangulation represents the best way to verify data and to reconcile conflicting data. Here we generate evidence and data from a variety of sources then compare and collate. Claims made by interviewees that match direct on-site observations confirm one another and indicate data strength and veracity. Evidence collected through questionnaires that conflicts with evidence gathered through archival research highlights the need for detective work that involves further observation, comparison, interpretation, and criticism.
- Developing STS analyses bears a striking resemblance to requirements analysis. In both cases, data is collected, refined, and put together to provide an analysis. A key to success in both is the proper combination of normative and descriptive procedures.
Exercise 1: Make a Table that Describes the Socio-Technical System
Directions: Identify the constituents of the Socio-Technical System. Use the broad categories to prompt you.
- What are the major hardware and software components?
- Describe the physical surroundings.
- What are the major people groups or roles involved?
- Describe any procedures in the STS.
- Itemize the laws, statutes, and regulations.
- Describe the data and data structures in your STS. Use the two templates below that fill in this table for energy generation systems and for engineering ethics in Puerto Rico.
Hardware | Software | Physical Surroundings | People, Groups, Roles | Procedures | Laws | Data and Data Structures | |
Exercise 2: Identify Value Mismatches in the STS
Directions: identify the values embedded in the STS. Use the table below to suggest possible values as well as the locations in which they are embedded.
- Integrity: "Integrity refers to the attributes exhibited by those who have incorporated moral values into the core of their identities. Such integration is evident through the way values denoting moral excellence permeate and color their expressions, actions, and decisions. Characteristics include wholeness, stability, sincerity, honesty to self and others, authenticity, and striving for excellence.
- Justice: Justice as fairness focuses on giving each individual what is his or her due. Three senses of justice are (1) the proper, fair, and proportionate use of sanctions, punishments and disciplinary measures to enforce ethical standards (retributive justice), (2) the objective, dispassionate, and impartial distribution of the benefits and burdens associated with a system of social cooperation (distributive justice), (3) an objectively determined and fairly administered compensation for harms and injustices suffered by individuals (compensatory justice), and (4) a fair and impartial formulation and administration of rules within a given group.
- Respect: Respecting persons lies essentially in recognizing their capacity to make and execute decisions as well as to set forth their own ends and goals and integrate them into life plans and identities. Respects underlies rights essential to autonomy such as property, privacy, due process, free speech, and free and informed consent.
- Responsibility: (Moral) Responsibility lies in the ability to identify the morally salient features of a situation and then develop actions and attitudes that answer to these features by bringing into play moral and professional values. Responsibility includes several senses: (1) individuals are responsible in that they can be called upon to answer for what they do; (2) individuals have responsibilities because of commitments they make to carrying out the tasks associated with social and professional roles; (3) responsibility also refers to the way in which one carries out one's obligations (This can range from indifference to others that leads to minimal effort to high care for others and commitment to excellence)
- Free Speech: Free Speech is not an unlimited right. Perhaps the best place to start is Mill's argument in On Liberty. Completely true, partially true, and even false speech cannot be censored, the latter because censoring false speech deprives the truth of the opportunity to clarify and invigorate itself by defending itself. Mill only allows for a limitation of free speech based on harm to those at which the speech is directed. Speech that harms an individual (defamatory speech or shouting "fire" in a crowded theatre) can be censored out of a consideration of self-defense, not of the speaker, but of those who stand to be harmed by the speech.
- Privacy: If an item of information is irrelevant to the relation between the person who has the information and the person sho seeks it, then that information is private. Privacy is necessary to autonomy because control over information about oneself helps one to structure and shape one's relations with others.
- Property: According to Locke, we own as property that with which we have mixed our labor. Thomas Jefferson argues that ideas are problematic as property because, by their very nature, they are shared once they are expressed. They are also nonrivalrous and nonexclusive.
Drawing Problems from Embedded Values
- Changes in an STS (e.g., the integration of a new technology) produce value mismatches as the values in the new component conflict with those already existing within the STS. Giving laptops to children produces a conflict between children's safety requirements and the safety features embedded in laptops as designed for adults.
- Changes within an STS can exaggerate existing value conflicts. Using digitalized textbooks on laptop computers magnifies the existing conflict concerning intellectual property; the balance between copyrights and educational dissemination is disrupted by the ease of copying and distributing digitalized media.
- Changes in STS can also lead to long term harms. Giving laptops to children threatens environmental harm as the laptops become obsolete and need to be safely disposed of.
Hardware | Software | Physical Surroundings | People, Groups, Roles | Procedures | Laws | Data and Data Structures | |
Integrity | |||||||
Justice | |||||||
Respect | |||||||
Responsibility for Safety | |||||||
Free Speech | |||||||
Privacy | |||||||
Intellectual Property |
Using Socio-Technical System Grids for Problem Specification
The activity of framing is a central component of moral imagination. Framing a situation structures its elements into a meaningful whole. This activity of structuring suggests both problems and solutions. Framing a situation in different ways offers alternative problem specifications and solution possibilities. Since skillful framing requires practice, this part of the module suggests how socio-technical system tables can help provide different frames for problem specification and solution generation.
Different Problem Frames
- Technical Frame: Engineers frame problems technically, that is, they specify a problem as raising a technical issue and requiring a technical design for its resolution. For example, in the STS grid appended below, the Burger Man corporation wishes to make its food preparation areas more safe. Framing this technically, it would be necessary to change the designs of ovens so they are more accident-proof.
- Physical Frame: How can the Burger Man corporation redesign its restaurants as physical facilities to make them more accessible? One way is to change the access points by, say, designing ramps to make restaurants wheelchair accessible. Framing this as a physical problem suggests solutions based on changing the physical structure and arrangement of the Burger Man STS.
- Social Frame: Burger Man as a corporation has stakeholders, that is, groups or individuals who have an essential interest at play in relation to the corporation. For example, framing the problem of making Burger Man more safe as a social problem might suggest the solution of integrating workplace safety into worker training programs and conducting regular safety audits to identify embedded risks.
- Financial or Market-Based Frames: Burger Man is a for-profit corporation which implies that it has certain financial responsibilities. Consequently, Burger Man should be concerned with how to provide safe, child-proof chairs and tables that do not cut unduly into corporate profits. But like the legal perspective, it is necessary to conduct ethical and social framing activities to compensate for the one-sidedness of financial framing.
- Managerial Frame: Many times ethical problems can be framed as managerial problems where the solution lies in changing managerial structures, reporting relations, and operating procedures. For example, Burger Man may develop a specific procedure when a cashier finishes a shift and turns over the cash register and its contents to another cashier. Burger Man may develop cleaning procedures and routines to minimize the possibility of serving contaminated or spoiled food to customers.
- Legal Frame: Burger Man may choose to frame its environmental responsibilities into developing effective procedures for complying with OSHAA and EPA regulations. Framing a problem legally certainly helps to identify effective and necessary courses of action. But, because the ethical and social cannot be reduced to the legal, it is necessary to apply other frames to uncover additional risks not suggested by the legal framing.
- Environmental Framing: Finally, how does Burger Man look from the environmental standpoint? Does it consider environmental value (environmental health, safety, and integrity) as merely a side constraint to be addressed only insofar as it interferes with realizing supposedly more important values such as financial values? Is it a value to be traded off with other values? (For example, Burger Man may destroy the local environment by cutting down trees to make room for its latest restaurant but it offsets this destruction through its program of planting new trees in Puerto Rican tropical rain forests.) Framing a problem as an environmental problem puts the environment first and sets as a goal the integration of environmental values with other values such as worker safety and corporate profits.
Media File Uplinks
This module consists of two attached Media Files. The first file provides background information on STSs. The second file provides two sample STS grids or tables. These grids will help you to develop specific STSs to analyze cases in engineering, business, and computer ethics without having to construct a completely new STS for each case. Instead, using the two tables as templates, you will be able to zero in on the STS that is unique to the situation posed by the case. This module also presents background constraints to problem-solving in engineering, business, and computer ethics. These constraints do not differ absolutely from the constituents of STSs. However, they pose underlying constraints that outline the feasibility of an ethical decision and help us to identify obstacles that may arise when we attempt to implement ethical decisions.
Socio-Technical Environments Table
STS2.pdfReferences
- Brincat, Cynthia A. and Wike, Victoria S. (2000) Morality and the Professional Life: Values at Work. Upper Saddle River, NJ: Prentice Hall.
- Huff, Chuck and Jawer, Bruce, "Toward a Design Ethics for Computing Professionals in Social Issues in Computing: Putting Computing in its Place, Huff, Chuck and Finholt, Thomas Eds. (1994) New York: McGraw-Hill, Inc.
- Solomon, Robert C. (1999) A Better Way to Think About Business: How Personal INtgrity Leads to Corporate Success. Oxford, UK: Oxford University Press.
- Wike, Victoria S. (2001) "Professional Engineering Ethics Behavior: A Values-based Approach," Proceedings of the 2001 American Society for Engineering Education Annual Conference and Exposition, Session 2461.
Bibliographical Information on Power STS
- Acceptable Evidence: Science and Values in Risk Management, edited by Deborah G. Mayo and Rachelle D. Hollander. London, UK: Oxford University Press, 1991.
- K. S. Shrader-Frechette. “Ethics and Energy” in Earthbound: New Introductory Essays in Environmental Ethics, 1st Edition, edited by Tom Regan. NY, NY: Random House, 1984.
- Nancy G. Leveson. Safeware: System Safety and Computers. NY, NY: Addison-Wesley Publishing Company, 1995.
- Charles Perrow. Normal Accidents: Living with High-Risk Technologies. North America, Basic Books, 1984.
- Malcolm Gladwell. “Blowup” in The New Yorker, January 22, 1996: 32-36.
- James Reason. Human Error. Cambridge, UK: Cambridge University Press. 1990.
- Mark Sagoff. The Economy of the Earth: Philosophy, Law, and the Environment. Cambridge, UK: Cambridge University Press, 1988.