Ethics, Ambient Intelligence, and the Emergence of Cyborgian Societies

AUTHOR
Terrell Ward Bynum

ABSTRACT

Predicting the future of society is a risky activity typically left to fools and sages. Nevertheless, this presentation will contain outright predictions about the future of society and the future of ICT-related ethical issues. It will presuppose James Moor’s “policy vacuums” account of the nature and importance of information ethics, and it will assume the truth of Norbert Wiener’s prediction that cybernetic machines will play an increasingly important social role as time goes on. Most importantly, it will take as a central assumption Wiener’s prediction that machines and living organisms, increasingly, will be merged together to create entities that are part biological and part mechanical. Today, such beings are often called “cyborgs” (cybernetic organisms).

According to Wiener, all animals and some machines are cybernetic entities that take in information from their environment, then process that information in ways that empower them to react to their environment and adjust themselves to it. Such information processing activities include, for example, perceiving, recognizing, categorizing, remembering, calculating, inferring, deciding, acting, and so on. In the past, some philosophers have assumed – mistakenly, I believe – that only humans (and perhaps angels, devils and gods) can engage in such “sophisticated” activities as categorizing, recognizing, inferring, deciding and acting. In this presentation, I will assume that all humans, many animals, and some machines can engage in such activities. I also will assume that “aspects, parts and pieces” of such information processing activities can be electronically instilled into objects and organisms that did not have them in the past – thus, creating “ambient intelligence”.

Given the above-described assumptions, I will argue that today’s “information societies” are rapidly evolving into societies in which humans, other animals, and machines – even buildings, clothing, furniture, roadways, and other objects – will be interrelated and coordinated by ambient intelligence technology to create increasingly complex “cyborgian units”. Thus, when virtually everything interacts and communicates with everything else, and the difference between “online” and “offline” essentially disappears, then individual persons, particular animals, certain machines and other entities will be electronically united and coordinated to create powerful “cyborgian units” and thereby achieve previously unattainable goals. In such a society, a person or an animal or a machine or an object could function simultaneously as part of many different cyborgian units; and those units could also be combined to generate even larger and more sophisticated “meta-units”. Finally, all such units and meta-units working together could constitute an entire society – becoming, quite literally, a “cyborgian society”.

In the coming cyborgian societies, the above-described units and meta-units will utilize capacities and qualities of many different entities to bring into existence a staggering number of new possibilities that could not have been realized in the past. The result will be innumerable “policy vacuums” (to use Moor’s apt turn of phrase) that cry out for new laws, new rules of behavior, and new standards of good practice – new “policies” to assure that cyborgian societies will be ones in which justice and ethical behavior are encouraged and preserved.

It’s not what you know it’s where you’re from: A Case for Social Justice in the International Flow of Knowledge with Specific Reference to African Scholars

AUTHOR
J. J. Britz and Ms S. R. Ponelis

ABSTRACT

Introduction

The global migration of people is an authentic sign or the times we are living in. The global workforce, amongst others, includes many who are skilled and come from rich educational heritages. They seek new opportunities to share their knowledge in the newly formed global communities; this includes the many international scholars that travel around the world attending conferences in order to obtain feedback and input to their work prior to publication. However, not all academics are born equal: for example, conferences held in African countries are few and far between and often not attended by many academics from outside of Africa, which necessitates these academics to travel more widely to conferences in Europe and North America. However, no African academic (traveling on a passport from an African country), even with impressive credentials, can merely get on an airplane to attend such a conference, not only because of geographic and financial reasons, but also because of political reasons. Most European countries, as well as the USA and Canada, have strict visa requirements for most African countries. And although technology makes it possible to make presentations virtually, not being physically present does limit the opportunities for knowledge sharing and exchange – an important component of such gatherings and one of the reasons conferences continue to be held and attended in spite of the current economic climate.

To put this in practical terms: why should scholars from Africa, just because of their country of origin, be restricted in many ways to travel to Europe to attend conferences while the same does not apply to their counterparts from countries like the USA and Canada? This state of affairs seriously hampers development and creativity that will benefit humanity by limiting the ability to learn from one another and to share knowledge. Thus it is a matter of social justice, not only because of the limits placed on international travel (irrespective of the reasons given as justification) but also because of the impact that this limitation imposes on human development. The global movement of people demand a fresh look at the interpretation and application of social justice – particularly as it pertains to the rights of nation states and the right of freedom of movement of scholars to share their knowledge on global platforms.

The intention of our paper is not to provide clear-cut answers to all the questions relating to the international movement of people, but to open the debate following our claim that we need to rethink, from a social justice perspective, the international movement of particularly African scholars and their ability to share their knowledge globally.

The research problem and content

It is this moral imperative that prompts our research question which specifically focuses, from a social justice perspective, on the political hindrances that many African scholars face in their efforts to attend and participate at international conferences in Europe and North America. In using Amartya Sen’s capability approach we argue that the global sharing of knowledge between scholars should be regarded as one of the ‘basic capabilities’ (Sen, 1993) since it does not only create opportunities for the development of Africa , but it is also instrumental to our freedom and to achieve human well-being. The strict travel arrangements by most European countries and the USA and Canada for African scholars form part of what Sen refers to as the social and structural constrains that influence and restrict global human development and well being.

We argue therefore that the international community has a moral and legal responsibility to create a more open and fair structure that should support the freer flow of knowledge between African scholars and their counterparts in Europe and North America. We view justice as one of the most important virtues regulating human behavior in the global knowledge society. We therefore use it as a normative instrument to argue our case for a fairer structure that will allow Africans more flexibility to travel and at the same time acknowledging the rights and responsibilities of the nation-state towards it own citizens (for example national security, human trafficking and disease control) but also towards global citizens (allowing scholars more from African countries more freedom of movement). We identified and use five categories of social justice in our analysis. These are:

  • Justice as recognition according to which the moral dignity of fellow beings necessitates equitable and fair treatment with respect to freedom of movement.
  • Justice as reciprocity that requires fundamental fairness with respect to exchanges between academics as a group and in particular that the same rules and norms will apply in similar situations.
  • Justice as participation that requires the creation of equal opportunities for scholars to exchange their knowledge at international conferences.
  • Justice as enablement which demands from society at large to enable the self-enablement and self-determination of individuals.
  • Justice as contribution that supports our contention that society should be structured in such a manner so that scholars are able to make a productive contribution to their own and the broader global society.

Based on our moral analysis we develop a set of moral guidelines and we propose an ‘academic travel card’ for African scholars that should meet the criteria of social justice. According to this, such a card should be agreed by all participating countries and as an expression of global justice it should be embedded in international rules and regulations that will allow African academics the same basic rights of freedom of movement, freedom of expression and freedom to privacy as their counterparts in Europe and North America. We deliberate also on the different rights and responsibilities of both the nation-states as well as African scholars regarding the use of the proposed travel card.

Structure of the paper

The paper is structured in the following manner: first, we emphasize the importance of the exchange of knowledge that contributes to human development. As indicated we base our discussion on Sen’s capability approach. Following from this, we elaborate specifically on the problems that African scholars experience in this regard whilst at the same time seeking to strike a fair balance between rights of nation-state and the rights of individuals to freedom of movement. We make use of both empirical evidence as well as statistical data in support of our argument. In the third part of the paper we analyze the abovementioned issues from a social justice perspective and in the final part of the paper we developed a set of moral guidelines and propose an ‘academic travel card’ for African scholars that should meet the requirements of social justice as argued in the previous part.

REFERENCES

Summary Report. 2009. Academic Freedom In West African Universities, University Of Ghana, Legon, 15-16 April 2009 [online]. Available: http://scholarsatrisk.nyu.edu/Documents/Ghana_report.pdf (accessed July 24, 2007)

Britz, J.J. 2007. Critical analysis of information poverty from a social justice perspective. D.Phil thesis, University of Pretoria.

Renewing the African University [online]. 2005. Available: http://www.aau.org/gc11/adocs/pdf/eng/aau-acu-sauvcaprog.pdf (accessed July 23, 2009).

Sen, A. 1993. Capability and well-being. In: The quality of life, edited by M. Nussbaum and A. Sen. Oxford: Clarendon Press.

Unesco Academic Freedom Conference. 2006. Problems and Challenges in Arab and African Countries, Alexandria, Egypt, 10-11 September, 2005.

Consent in Medical Research and DNA Databanks: Ethical Implications and Challenges

AUTHOR
M. C. Bottis and H. T. Tavani

ABSTRACT

The principle of informed consent is a standard feature in medical research, including international documents, statutes, protocols, guidelines and other “hard” or “soft” law texts. This principle is ethically significant for participants (i.e., human subjects) in research in that provides both: (a) respect for the person, and (b) protection of the person’s autonomy. So, there are good reasons for defending and preserving the principle of informed consent in medical research involving human subjects. However, research in population genomics, which depends on DNA databanks and data mining technology, has introduced some serious challenges for the informed-consent process.

1. Background

The principle of informed consent originates from a strict, two-part relationship: the physician-patient relationship. Informed consent in the setting of medical research has usually involved patients who are required to take a drug (or placebo). In this context, the subject must know the nature and purpose of the research, as well as its consequences and risks. Consent must be expressed (or explicit), specific, and documented. International documents such as the Oviedo Biomedicine Convention also require that some additional information be given to the research subject – viz., information about:

  • any foreseen potential future uses, including commercial uses of the research results, data or biological materials;
  • the source of funding of the research project;
  • access to the research results in the future.

Undue “influence concerns,” such as misuse of a position of trust, have also led to additional safeguards for human subjects who voluntarily participate in research.

2. DNA Databanks

We argue that the donation of tissue, blood samples, etc. by human subjects to DNA databanks used for population-wide research purposes has introduced some challenges for the informed-consent process. Initially, one might assume that that an individual’s donating some blood or tissue carries no risk of immediate harm to that consenting individual. Indeed, the act of giving a sample of one’s blood, hair, or body tissue for research would seem harmless; in fact, refusing to do so might be interpreted as an “antisocial” act that also violates the principle of “solidarity” underlying DNA research. Consider that without these research “materials,” there can be no DNA research at all.

However, donating one’s blood, etc., for research in a DNA databank presents some new challenges for the informed-consent process because of the special nature of population-wide genomic research projects and because of the kinds of technologies involved (e.g., data mining). For one thing, the familiar two-part relationship involving researcher and patient is seriously threatened in these kinds of projects. It also raises an important question: What is the nature of a “population’s consent”? And this question, in turn, raises two additional questions: (i) What is it that a whole population needs to know before consenting? (ii) How can we ensure “fair consent” from everybody involved? Consider that any harm resulting from “unconsented” and unprincipled research in this area is directed not only against a person, but against an entire population.

Another challenge has to do with the so-called DNA/gene factor; we are not yet sure what it is that we are providing when we donate our DNA for research. For example, is it information about our “entire self” – i.e., our past, present and future? Is it information about who we are now, at the moment of donation, or is it also a “future diary”?

An additional challenge for the consent process in this area of research has to do with Onora O’Neill (2002) calls the “opacity of consent.” The consent process in DNA research involving databanks and data mining is “opaque” or nontransparent because of the secondary uses of that information made possible by data mining. Suppose a person, A, consents to procedure B. Further imagine that B entails C (and that A is unaware of C). Does it follow that A consented to C? This problem arises in DNA research because of the kinds of subsequent uses of information made possible by data-mining technology.

The solutions put forth thus far to the challenges affecting informed consent in population-based genomic research include aspects of three traditional models:

  • presumed consent (the researcher takes the tissues, presuming that the person from whom they originate wouldn’t disagree);
  • informed consent (documented by signing pre-drafted forms);
  • community consent (the ‘leader’ of a community consents for every member and the members consent, also, for themselves).

We argue that these models are inadequate. Our proposed solution examines some alternative schemes, including the “charitable trust” model for informed consent.

REFERENCES

Andersen B. & Anrason E., Iceland’s database is ethically questionable, BMJ 1999, Jun 5;318(7197):1565

Austin M.A., Hardin C. & McElroy, Genebanks: a comparison of eight proposed international genetic databases, Community Genet. Vol. 6, no 1, 2004, 37-45

Bottis, M., deCode Iceland and Genetic Databanks: Where ‘Consent’ to Generic Research Means Patenting a Nation’s Genes. In Proceedings of the Ethicomp2005 Conference: Looking Back to the Future, Linkoeping, Sweeden, 2005

Gertz R., Withdrawing from Participating in a Biobank – a Comparative Study”, European Journal of Health Law, vol. 15, no. 4, pp. 381-390, 2008

Hansson M.G.G., Building on relationships of trust in biobank research, JMed Ethics vol. 31, no 7, 2005, 415-418

Harper P.S., Research samples from families with genetic diseases: a proposed code of conduct, BMJ 306, no 6889, 1993, 1391-1394

O’Neill, O., Autonomy and Trust in Bioethics. Cambridge: Cambridge University Press, 2002

Rothstein M.A., Expanding the ethical analysis of biobanks, J Law Med Ethics vol. 33, no 1, 2005, 89-101

Santosuosso A., The right to genetic disobedience: the Iceland case, in Ethics and Law in Biological Research, ed. Mazzoni C.M., Kluwer Law International, 2002, pp. 163-172

Tavani, H.T., Genomic Research and Data-Mining Technology: Implications for Personal Privacy and Informed Consent, Ethics and Information Technology, Vol. 6, No. 1, 2004, 15-28

Winickoff, D. & Winickoff R., The Charitable Trust as a Model for Genomic Biobanks, 349 New England Journal of Medicine 12: 1180-1184, 2003

Zoega T. & Anderson B., The Icelandic health sector database: decode and the “new” ethics for genetic research, 1999

An Exploration of the Loss of Context on Questions of Ethics Around Privacy and its Consequences

AUTHOR
William T. Bonner

ABSTRACT

In this paper I argue that, with respect to privacy, actions taken with new ICTs have taken us backwards. Each time questions of privacy emerge around uses made of new ICTs attention tends to be reactive, focusing on the specific context in which the question arose and with that focus a very limited conception of privacy is considered. Cycles of reactions to uses made of new ICTs compounds this further, relegating privacy as a broad concept to the sidelines as actors jockey for position on the actual substance of rules created for the narrow conception of privacy defined in each specific context. With rules created the focus shifts to interpreting the rules with two consequences. First, experts around those rules emerge, those that speak for the rules, and as their voices increase the question of privacy broadly and ethics specifically are displaced. Second and related, the rules originally set out as minimal expectations for behavior become the maximum target for experts interpreting the rules. In this paper I focus on fair information principles (FIP) as one instance where rules displace ethics and that rules, once created, are minimally interpreted to further narrow the concept of privacy.

These observations have emerged from ongoing research, starting with a puzzle around how privacy was so easily defeated in a specific instance involving the sale of citizen information by the government of Alberta, Canada. The argument in favour of the continued sale of this personal information was examined in depth employing Actor-Network Theory (ANT) and found to lack substance but it carried the day anyway (Bonner, Chiasson, Gopal, 2009). This finding led to parallel another ANT investigation into the substance of privacy’s representative in this enactment of balance, fair information principles (FIP). FIP were created as a reaction to concerns about the modern computer that arose in the 1970s and 1980s and they focus on the thing that computers process, data (Bonner, Chiasson 2007). With FIP in place the focus in this balancing act shifted to interpreting the rules. Since FIP did not prohibit the sale of this personal information it was interpreted to be permissible. In effect, the minimum requirements of the rules become the maximum action taken. Questions of ethics and propriety had no place in this world view.

Subsequent research on the sale of student information by the Calgary Board of Education (CBE) in Alberta, to a company in California in exchange for hosted email services, revealed another instance where rules become the focus and expert interpretation of those rules resulted in the minimum becoming the maximum. The Office of the Information and Privacy Commissioner (OIPC) of Alberta ruled that the exchange of student information for services and potential revenue was unacceptable and must cease (Office of the Information and Privacy Commissioner of Alberta, 2002). On the question of whether the CBE should disclose personal student information to outside organizations at all the OIPC ruled that if the CBE decided that the use of the information was necessary to carry out its educational mission, then the CBE was free to disclose this information and no parental permission was necessary. In interpreting this ruling the CBE has decided that since parental permission is not required it is not necessary for the CBE to advise parents that personal student information is being released to outsiders at all.

That is now CBE policy (Bonner 2007). Nothing prohibits the CBE from letting students and parents know what information is being released to outsiders, but the official rule is that it is not necessary and the minimum necessary has become the maximum done. It could have been otherwise but it is not.

It is this notion that it could have been otherwise and is not that bears examination as my own ongoing research is making it clear that it is not the innovation that limits the concept of privacy employed but rather a focus on the context in which it is employed. This is reflected in the field of MIS as we tend to focus on the artefact of our field, the computer and that which it processes – data. An assumption arising from that focus on context is that FIP can be employed as privacy’s representative (Smith, Milberg and Burke 1996, Liu, Marchewka, Lu and Yu 2005). At times FIP are granted the status of an ethical standard (Culnan, 1993, Culnan and Armstrong 1999). This something FIP cannot be. FIP are a narrow set of principles focused on data that have to be interpreted and enacted in specific settings. In the two examples provided (government sale of citizen information and the CBE sale of student information) it was FIP in practice that produced those results; an interpretation of rules that were created based on FIP.

I see this pattern of a focus on context within MIS research repeating with what I see as an emerging branch of “privacy” research that focuses exclusively on online activities as though privacy online is separable from privacy offline (Awad and Krishnan 2006; Liu, Marchewka, Lu and Yu 2005; Malhotra, Kim and Agarwal (2004). My concern here is reflected in a comment by Hinduja (2004), “What is appropriate in business ethics offline should be seamlessly transferred to the online milieu, and persons should not need to reassess their perceptions of the practice of corporations simply because of the change of context” (Hinduja 2004). What makes this statement stand out is that it starts from the premise that privacy and ethics transcend context; it is the concept and not the context that is important.

We in the field of MIS/CIS are implicated in this focus on context, as noted. This focus defines the concept of privacy ahistorically and so narrowly that questions of ethics have no place to appear. If we want to keep the question of ethics visible we have to critique the narrow constitution of rules that have emerged, the narrow conception of privacy embedded in them and show how it could have been and still could be otherwise.

REFERENCES

Awad, N.F., & Krishnan, M.S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization, MIS Quarterly, 30(1), 13-18.

Bonner, W.T. (2007) Locating a Space for Ethics to Appear in Decision-making: Privacy as an Exemplar, Journal of Business Ethics, 70(3), 221-234.

Bonner, W.T., Chiasson, M. (2005). If fair information principles are the answer, what was the question? An actor-network theory investigation of the modern constitution of privacy, Information and Organization, 15(4), 267-293.

Bonner, B., Chiasson, M., Gopal, A, (2009). Restoring balance: How history tilts the scales against privacy. An Actor-Network Theory investigation, Information and Organization, (19, 2), 84-102

Culnan, M. J. (1993). ‘How did they get my name?’ An exploratory investigation of consumer attitudes toward secondary information use, MIS Quarterly, 17(3), 341-363.

Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation, Organization Science, 10(1), 104-115.

Hinduja, S. (2004). Theory and policy in online privacy, Knowledge, Technology and Policy, 17(1), 38-58

Liu, C., Marchewka, J.T., Lu, J., & Yu, Chun-Sheng, (2005). Beyond concern – a privacy-trust-behavioral intention model of electronic commerce, Information & Management, 42(2), 289-304.

Malhorta, N.K., Kim. S.S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model, Information Systems Research, 15(4), 336-355.

Office of the Information and Privacy Commissioner of Alberta: 2002, ‘Order 2001–038’, Edmonton Alberta, September 23, 2002.

Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individual concerns about organizational practices, MIS Quarterly, 20(2), 167-196.

Conrad, Kant and Computers: Looking to the Past for the Future of Professional Duty

AUTHOR
Andy Bissett and Kai K. Kimppa

ABSTRACT

When considering the development, operation and maintenance of IT systems, we would really like a guarantee that ‘wise, experienced, knowledgeable professionals will conscientiously perform their duties’ (Shibl et al, 2008: 61). Accountability mechanisms (such as quality management systems) can help to a degree, but a paradox of such ‘technical’ strategies is that without strong guiding ethical values, these measures alone cannot guarantee the successful employment of information systems (ibid.).

An idea of professional duty is examined and elaborated using three seafaring fictions by Joseph Conrad – Youth, written in 1898, The End of the Tether appearing in 1902, and The Shadow Line published in 1917. The use of fiction as a source for research poses some interesting questions about the ‘evidence status’ of such material. However, sufficient support is available from the literature to provide reassurance that this procedure can be valid, provided that it is carefully used (Banks & Banks, 1998). For example, Strom (2007) demonstrates the use of fictive scenarios in industrial software development, and Bolton (1994: 56) argues the general case that fiction can be used to drive the exploration of complex or ambiguous issues, although ‘A fictional text does not present a complete picture any more than it offers a set of facts’. Fictional material can be employed to shed light upon important matters in the realm of less accessible – subjective – issues, such as identity. Of particular relevance is the use of fictional material to explore professional development (Bolton, 1994; 2000).

Whilst important criticism has been levelled at some of Conrad’s work (Achebe, 2001), the seafaring fictions provide a vivid and compelling account of the dedication that those working in the field of ICT might recognise as part of ‘professionalism’. Most IT projects do not contain the life-or-death, high drama of these seafaring tales, but important features and trends can be discerned and some lessons drawn out. The seafarer’s duties from the age of sailing ships – to the crew, to the owner, to the vision of their vocation – can enliven and enrich the conception of professional duty today. Especially relevant is the issue of professional identity, which is often at the heart of these stories. Conrad’s protagonists frequently function on the subjective terrain of professional identity in a fashion that (later in the Twentieth Century) might be called existentialist, although this vision of vocation can also be related to Wenger’s ‘communities of practice’ (1999). Professional duty and professional identity are closely bound together here. The capacity for personal self-regulation often appears in these stories via identification with an ideal professional model, not simply through an unthinking respect for the law, and certainly not by reward, which Conrad labels ‘distasteful’. In this respect there is an echo of Kant’s conception of duty and the need to think, and voluntarily follow the categorical imperative in any given moral situation (Kant, 1785).

Conrad’s conception of duty rests in large part on his essentialist conception of ‘human nature’. His view is the traditional (and much-criticised) one that civilisation is a thin veneer keeping humanity away from chaos and bestiality. Duty becomes a critical guiding factor when circumstances (and other people) conspire to threaten chaos. Duty becomes a critical test of vocational dedication in these stories. In difficult circumstances a key strength in Conrad’s conception of professional duty is provided by the idea that an individual professional forms part of a continuous ‘dynasty’, formed by experience, training, tradition, and a self-conscious acceptance of duty. This may represent a difference with the modern IT industry, wherein a mobile, fast-changing aspect is evident. The relative lack of tradition in the IT industry may limit the formation of a professional identity, or at least give it a particular character as discussed by Sennett (2006).

Nonetheless, Conrad’s conception of duty is worth exploring. Questions of probity, integrity, and the conscientious performance of duty under difficult circumstances resonate throughout these stories, which have been read and studied for around one hundred years. Although fictional, their meaningfulness for millions of people is hard to dispute. We highlight the current day implications. We argue that these stories can provide a stimulating and entertaining resource for developing concepts of professionalism that are relevant to IT practitioners today and in the future.

REFERENCES

Achebe, C. (2001) An Image of Africa: racism in Conrad’s ‘Heart of Darkness’, in The Norton Anthology of Theory and Criticism, New York: Norton

Banks, S.P. and Banks, A. (1998) Fiction and Social Research: by ice or fire, Lanham MD: AltaMira Press

Bolton, G. (1994) Stories at Work: fictional-critical writing as a means of professional development, British Educational Research Journal, 20 (1), 55-68

Bolton, G. (2000) Reflective Practice: writing and professional development, London: Sage

Kant, Immanuel (1785) Originally Grundlegung zur Metaphysik der Sitten, several translations used, most commonly translated as Groundwork of the Metaphysics of Morals as in http://www.swan.ac.uk/poli/texts/kant/kantc.htm, last checked 4.11.2004, but e.g. Brendan E. A. Liddell’s translation is called Kant on the Foundation of Morality

Sennett, R. (2006) The Culture of the New Capitalism, London: Yale University Press

Shibl, R., Fielden, K., Pain, D., Bissett, A. (2008) Trust and Clinical Information Systems, in P. Duquenoy, C. George, K. Kimppa (editors) Ethical, Legal & Social Aspects of Medical Informatics, Hershey, PA: Medical Information Science Reference (IGI Global). 48-64

Strom, G. (2007) Stories with emotions and conflicts drive development of better interactions in industrial software projects, Proceedings of the 19th Australasian Conference on Computer-Human Interaction (OZCHI), (251), 115-121

Wenger, E. (1999) Communities of Practice, Cambridge University Press

Enhancing Risk Management in a Software Process to Cover Risks Referred to Software Users

AUTHOR
Barbara Begier

ABSTRACT

Considered ethical dimension refers to the risk that the developed software products may bring negative impacts on software users, including an entire society. The problem is how to manage that risk.

Risk management process has become the routine subprocess in software development. Its main goal is to prevent software team from the risk that the product under development fails because the term and budget are exhausted. This process is started from the very beginning of software product development. The risk management process will be described briefly in the paper. Its aim is to identify risks and risk factors (elements) that may cause the particular risk is materialized. Probability of each risk element and its possible impact on a product development are assessed. Then plan of mitigating or even avoiding the identified risk is work out. The risk management process is established and the required methods and infrastructure are provided.

There are developed several solutions also in agile methodologies how to manage risk. The problem is what kind of risk and its factors are concerned and managed and what is the aim of such activities. Another approach says how to incorporate ethics in the software process, like SoDIS, for example.

The problem is how to extend the risk management to consider the threats referred to direct and, especially, indirect software users. Indirect software users are affected by a software product, possibly also an expert system, developed for public or business organization. If threats and inconveniences caused by informatization are to be reduced or eliminated, it is necessary to raise the awareness of these threats and to emphasize them in the developers’ community and in the entire society. Some practices introduced by informatization of the public sector seem initially advantageous but they may bring completely undesired side effects.

The experimental risk management system has been developed. The category of guests has been introduced among that system users. They are allowed to introduce the risk factors from their point of view and to extend this way the initially developed list of risk sources. In general, there is a risk that users may be unsatisfied with the product under development. But this statement is too general. Examples of risk elements will be described in the paper. Software developers should be early informed what kind of wasted efforts may result from the developed software system for indirect users. For example, there is a risk that indirect users may complain the software system because they are forced to fulfil a lot of documents or to visit the organisation several times to have their affairs fixed.

One more although indirect source of risk identification is a software product assessment. Software users may be allowed to indicate weak points of the assessed software version and to formulate software improvements from their point of view.

Then all risk factors are analysed and managed. As usually, not all categories of risk sources are available to the guests.

REFERENCES

[Agile Manifesto, 2001] Manifesto for Agile Software Development, coauthors: K. Beck, A. Cocburn, M. Fowler, J. Highsmith, R. C. Martin, and others, http://agilemanifesto.org/, Agile Alliance February 2001.

[Ambler, from 2003] Ambler S.: Active Stakeholder Participation, http://www.agilemodeling.com/essays/.

[Begier, 2002a] Begier B., Quality of Goals – A Key to the Human-Oriented Technology, Australian Journal of Information Systems, vol. 9, Number 2, May 2002, pp. 148-154.

[Begier, 2002b] Begier B., Evaluating software quality to regard public interest, Proceedings of the Sixth International Conference “The Transformation of Organisations in the Information Age: Social and Ethical Implications” ETHICOMP 2002, November 13-15, 2002, ISBN 972-8397-44-5, Lisbon (Portugal), pp. 39-52.

[Begier, 2007] Begier B., Involving Users to Improve the Level of Their Satisfaction from a Software Product Designed for Public Organization. In: Technologies for Business Information Systems, Springer Verlag, Dordrecht (Netherlands) 2007, ISBN 978-1-4020-5633-8, s. 365-377.

[Begier, 2009] Begier B., Users’ Involvement May Help Respect Social and Ethical Values and Improve Software Quality, Information Systems Frontiers, Springer US, 2009.

[Friedman, 1997] Friedman B., Human Values and the Design of Computer Technology, Cambridge, Cambridge University Press 1997.

[Gotterbarn, 1999] Gotterbarn D., How the New Software Engineering Code of Ethics Affects You, IEEE Software, November/December 1999, pp. 58-64.

[Gotterbarn, 2001] Gotterbarn D., Enhancing Risks Analysis Using Software Development Impact Statements. In: 26th Annual NASA Goddard Software Engineering Workshop, Greenbelt MD (USA) 2001, pp. 43.

[Highsmith, 2004], Highsmith J., Agile Project Management, Boston, Addison-Wesley 2004.

[Kujala, 2008] Kujala S., Effective user involvement in product development by improving the analysis of user needs, Behaviour & Information Technology, vol. 27, 2008, No. 6, pp. 457-473.

[Martin & Martin, 2007] Martin R. C., Martin M.: Agile Principles, Patterns, and Practices in C#, Indianapolis: Pearson Education and Prentice Hall, 2007.

[Rogerson & Gotterbarn, 1998] Rogerson S., Gotterbarn D., The Ethics of Software Project Management. In: Ethics and information technology, ed. G. Collste, Delhi, India, New Academic Publishers 1998, pp. 137-154.

[Rogerson, 2003] Rogerson S., The ethics of software development project management. In: Computing Ethics and Professional Responsibility (eds. T. W. Bynum & S. Rogerson), London, Blackwell 2003, pp. 94-101.

[SoEnCode] Software Engineering Code of Ethics and Professional Practice, v. 5.2, IEEE & CS/ACM, 1999, http://www.acm.org/serving/se/code.htm (access: 2000-2006).

[Szejko, 2002] Szejko St., Incorporating Ethics into the Software Process, Proceedings of the Sixth International Conference “The Transformation of Organisations in the Information Age: Social and Ethical Implications” ETHICOMP 2002, 13-15 November 2002, Lisbon, Portugal, pp. 271-279.

[Tiwana i Keil, 2006] Tiwana A., Keil M., Functionality Risk In Information Systems Development: An Empirical Investigation, IEEE Transactions on Engineering Management, vol. 53 (2006), No. 3, pp. 412-425.