What Is Quality Web-Based CAD (Computer Aided Design) Training?

AUTHOR
Richard Cozzens

ABSTRACT

Research Background

At ETHICOMP08, I presented a paper titled “Effectiveness of Web-Based Training.” The paper was based on research I conducted while developing the CATIA V5 Workbook .com website. In this paper, I discussed the various advantages of web-based training such as the flexibility and convenience option to work at one’s own pace, and discussed the question “Why aren’t there more web-based CAD (Computer Aided Design) courses available?” (For details, see Cozzens, 2008). Methodology was Action Research where data collection included qualitative approaches which included semi-structured interviews with instructors, students and practitioners. It also included questionnaires.

Current Situation

A closer review of the overall status of the CAD industry particularly CATIA V5 revealed that the change in the economy did impact the quality of CAD web-based training in many ways. Not only this, the overall philosophy now uses “Parametric” based approach to design, which defines relationships between different entities in CAD. This outlook changed how CAD designs were created, analyzed, modified, and stored. Both the software and philosophy changes created a huge training requirement almost overnight for the entire industry.

Since 2008, I have examined the data with the aim of understanding reasons for such a change. Based on the data gathered I hope to further improve the effectiveness and quality of web-based CAD training. The main motivation for this paper came from 2009 COE Conference in Seattle, Washington. At the conference I was able to attend a meeting where training and curriculum were discussed in detail. I was able to attend and participate in this meeting because I was a Board Member of HEAT (Higher Education and Training). I was also able to interview other experts in the field, including both college and university professors as well as industry professionals. In addition, because of my CAD publications, I frequently receive feedback from users. With this feedback, I was able to sample the existing CAD web-based training sites (including hybrid training sites). I viewed and tested curriculum from numerous web-based (or hybrid) CAD training courses. As I tested these training courses, I documented both effective and ineffective methodology. In this paper, I continue to use Action Research as a method to collect data as it:

“…Aims to contribute both to the practical concerns of people in an immediate problematic situation and to further the goals of social science simultaneously. Thus, there is a dual commitment in action research to study a system and concurrently to collaborate with members of the system in changing it in what is together regarded as a desirable direction. Accomplishing this twin goal requires the active collaboration of researcher and client, and thus it stresses the importance of co-learning as a primary aspect of the research process.”

In addition to the methods for data collection mentioned earlier, surveys and more interviews will be conducted. The main advantages of using action research with qualitative approach included:

  • Obtaining a more flexible and realistic feel of the world that cannot be experienced in the numerical data and statistical analysis used in quantitative research;
  • Experiencing a more hands-on feel of the hidden factors that could poss
  • ibly be affecting the effectiveness and quality of CAD web based training;
  • Providing a holistic view of the phenomena under investigation (Patton, 1980);
  • Interacting with the research subjects in their own language and on their own terms (Kirk & Miller, 1986).

Research Question addressed in this paper are:

  • What does quality CAD web-based training involve?
  • Is quality being comprised due to the change in the CAD industries?

The above research questions will be addressed to three different sets of people: instructors, students and industry professionals. The findings of this research will contribute to the overall quality and effectiveness of CAD web-based training. In general the market has shrunk from previous years, but CAD web-based training is more viable today than ever before. Due to the present economy, companies and individuals have limited financial resources to pay for face-to-face training. Thus, the advanced web-based curriculum and technology has become a viable substitute for traditional training (Cozzens 2008). Given the recent changes in market, the need for web-based training has increased. Furthermore the competition brought up many ethical issues regarding web-based training mostly dealing with quality versus price.
Conclusion

I believe the shrinking market has put most of the low quality web-based CAD training sites out of business. By sampling some of the web-based CAD training sites, I was able to experience firsthand the quality of the content. The technology used in the courses has been advanced enabling more users to access the content with improved streaming options for videos, graphics, and more interactive activities. I would also assert that CAD web-based training has become a mature market which has helped to make web-based training more effective. However, my research aims to address whether the quality of such training is being compromised. If it is, what are the factors that lead to such a compromise? A closer look at the market and the existing CAD web-based training companies available to instructors, students and industry professionals will help provide the feedback to the companies how are responsible for development of the training sites.

In conclusion this research will significantly contribute to CAD web-based training by providing new insight to what factors contribute to the quality and effectiveness of this type of training.

REFERENCES

Cozzens, Richard. “Effectiveness of Web-based Training”. Proceedings of ETHICOMP 2008, Pavia Matua, Italy.

Kirk, J., & Miller, M.L. (1986). Reliability and validity in qualitative research.

Qualitative Research Methods Series, 1. Beverly Hills, CA: Sage Publications

Patton, M.Q. (1980). Qualitative evaluation methods. Newbury Park, CA: Sage.

ENDNOTES

i. http://www.CATIAV5workbook.com

ii. CATIA Operators Exchange http://www.coe.org

iii. See Thomas Gilmore, Jim Krantz and Rafael Ramirez, “Action Based Modes of Inquiry and the Host-Researcher Relationship,” Consultation 5.3 (Fall 1986): 161.

“Network Tourism: A Fallacy of Location Privacy!”

AUTHOR
Gonçalo Jorge Morais da Costa, Nuno Sotero Alves da Silva and Piotr Pawlak

ABSTRACT

Tourism is a global trend which engages a key role in economics, which in 2007 represented over 745 billion dollars (World Trade Organization, 2007). Still, in accordance to the same institution tourism can be defined as: “the activities of persons travelling to and staying in places outside their usual environment for not more than one consecutive year for leisure, business and other purposes” (World Tourism Organization, 1994: 5). However, the research question of this contribution is not to debate extensively the economic performance of tourism, but if it is possible to state that “locational” privacy in tourism is a fallacy?

The Oxford English Dictionary (2008) acknowledges that the word “tour” is originally Greek, and it means a tool for describing a circle. The word “tour”, in a tourism sense entails a French origin, for the verb: “tourner”. In fact, the first time that “tourism” was used was in 1811, and in the early 19th century “tourist” was predominantly used in an English context, referring to those who went to England!

Today the concept “tourist” refers to everyone that travels for leisure, business and other purposes, and due to ICT (mobile phones, wireless networks, gps, location-based services, etc.) can be always “wired” to the surrounding world (network tourism). In fact, some authors plead the concept of virtual tourist. According to Carlvik and Jonsson (2001: 273) “it is a group of people between 14 to 35 years old that “travels without travelling”, and that uses systematically ICT”. Therefore, it is possible to locate them 24 hours a day through equipment and software (Heikkila and Silven, 2004), leading to serious ethical issues relating to personal privacy.

Due to several threats that global society imposes to national security, societies tend to create legislation to control informational fluxes of personal data. An example of this reality is for instance the Patriot Act in United States. After 9/11 the American Congress adopted this legislation, pursuant to which all Internet and ICT operators must oversee communication in the Internet. Furthermore, the federal agencies have access to connections and private accounts (the authorities can inspect e-mails, control telephone calls and record them, etc.) (Bierzanek and Symonides, 2005).

Although data protection is the top priority of digital solutions, the truth is that is all about information mobility and data saving, reading and processing through multiple technological platforms. At the same time, particular countries (acting jointly or separately) seek to oversee data as much as possible, which leads to contradictory result concerning these three trends. Yet, they all stem from specific moral, social and political values, which in turn are expressed in the acts of (international and national) law, such as: Resolution 45/95 of December 14, 1990 adopted by the UN General Assembly or Convention 108 of the Council of Europe of 1981. The protection of personal data, and consequently the right to privacy are human rights (Sokolowski, 2004).

Moreover, in spite of the World Travel & Tourism Council’s (WTTC) (2007) policy for personal data follow the EU Data Protection Act 1998; it seems to exist several policy vacuums: who controls the liability of this process? Who controls the personal data gathered by the several tourism agents (agencies, hotels, car rental, etc.)? And, which institutions have access to this array of personal data?

Following the etymological roots of control, it is possible to acknowledge that is a “power” that directly determines a situation; a relation of constraint of one entity (thing or person or group) by another, or, the state that exists when one person or group has power over another (Online Etymological Dictionary, 2001). So, we may claim that the aim of control is to promote a perception of security, and following Stahl (2007) privacy and security are intrinsically bounded.

In an explanatory meaning, security as a concept is complement in diverse languages, reproducing the affairs between object (subject) and its environment. Nevertheless it is imperative that security is a normative, an emotionally loaded idea (Mesjasz, 2004). Typically security is categorized in:

  • a traditional meaning- security as an attribute of state, absence of military conflict (Kaldor, 2007);
  • a broader sense- referring directly to a phenomena occurring in international relations, or directly/indirectly caused by inter-state relations security as a public good (Deudney, 2004);
  • a universal sense (of a unit and of a social entity)- human security (Nickel, 2007).

Therefore, we claim that location privacy clearly demonstrates the trade-off concerning personal privacy of tourists and societal control.

REFERENCES

Bierzanek, R. and Symonides, J. (2005). Public international law. Warsaw: LexisNexis Publisher.

Carlvik, O. and Jonsson, I.-M. (2001). Virtual tourist based on PeerRing- communicating with people you have never met. In C. Stephanidis (Ed.). Universal Access in Human Computer Interaction- Towards an Information Society for All (Vol. 3) (pp. 271-275). Norwood: Ablex Publishing Corp.

Deudney, D. (2004). Publius before Kant: Federal-Republican security and democratic peace. European Journal of International Relations, 10, 3, 315-356.

Heikkila, J. and Silven, O. (2004). A real-time system for monitoring of cyclists and pedestrians, Image and Vision Computing, 22, 7, 563-570.

Kaldor, M. (2007). Human security: reflections on globalization and intervention. Polity Press: Cambridge.

Mesjasz C. (2004). Security as a property of social systems. Online at: http://www.allacademic.com/meta/p72561_index.html (accessed at 25 February 2009).

Nickel, J. W. (2007). Making sense of human rights. Blackwell Publishers: Malden.

Online Etymology Dictionary. (2001). Control. Online at: http://www.etymonline.com/index.php?search=control&searchmode=none (accessed at 14 April 2009).

Oxford Dictionary. (2008). Oxford english dictionary. Oxford: Oxford University Press.

Sokolowski, M. (2004). Faces of the internet. The State Higher School of Vocational Education: Elblag

Stahl, B. C. (2007). Privacy and security as ideology. IEEE Technology and Society Magazine, 26, 1, 35-45.

World Tourism Organization (1994) Recommendations on Tourism Statistics. New York: United Nations.

World Trade Organization (2008). International trade statistics 2008. Online at: (accessed at 01 July 2009).

World Travel & Tourism Council (2007). Terms and conditions of use and legal disclaimer. Online at: http://www.wttc.org/eng/Contact_WTTC/Privacy_Statement/ (accessed 20 May 2009).

Why Link Knowledge Management, Organizational Culture and Ethics: Analysing Empirical Inquiry

AUTHOR
Gonçalo Jorge Morais da Costa, Mary Prior and Simon Rogerson

ABSTRACT

Alvin Toffler argued years ago that the knowledge based society represents the acme of the human society development, when knowledge become the core resource of the economy, as the last and the ultimate source of power (Toffler, 1995). Moreover, knowledge society is a conception that has often appeared in the literature worldwide in recent years (Savage, 2000).

It is unquestionable that organisations need to manage knowledge resources in order to survive, but how can be described knowledge management? For Brelade and Harman (2003), is the acquisition and use of resources to create an environment in which information is accessible to individuals and in which individuals acquire, share and use that information to develop their own knowledge and are encouraged and enabled to apply their knowledge for the benefit of the organization.

From the above definition we may conclude that the knowledge continuum process (creation, retention and sharing) entails three different analytical levels:

  • an individual- where relies the personal mental states, which literature pleads as personal knowledge management (PKM) (Wright, 2005);
  • an organizational- which can be described differently in accordance to the different geographical and historical contexts (Cardoso, Gomes and Rebelo, 2003);
  • an societal- recognized throughout the arguments stated previously.

However, managers should realize that knowledge is bounded to people (human resources) and therefore, implicating a considerable amount of ethical and moral dilemmas through the “knowledge continuum process” (Costa, Prior and Rogerson, 2008a; 2008b; 2009). In order to solve this paradigm, knowledge management academics and practitioners are approaching the following dimensions: organizational culture, knowledge management technology and ethics.

Culture acknowledges multiple definitions however some key properties seem to be essential to explain this concept: heredity (Linton, 1936); social learning (Galef, 1992); behavioural patterns (Jablonka and Lamb, 2005); belief (Strauss and Quinn, 1997); information (Richerson and Boyd, 2005); biological environment (Odling-Smee, Laland and Feldman, 2003). Despite these perceptions we adopted a synthesizer definition produced by Okunoye (2003, pp. 37): “set of basic assumptions formed from a collective programming of mind, resulting from social interaction of people in groups and society.”

Knowledge management systems are technologies that support knowledge generation, modification and transfer in organizations (Marwick, 2001), being widely recognized and expected to be an important component of organizational practices (Gartner Group, 2002).

From the academic point of view, ethics is one of the main sub-fields of Philosophy. As a field of academic inquiry, ethics seeks to distinguish between what is good and what is bad, and what is right and what is wrong in more or less abstract terms. A formal distinction is possible to achieve:

  • theoretical- acknowledges the major philosophical debates (including meta-ethics), as well as ethical theories;
  • applied ethics- since the mid 1990s an increasing number of academics and professionals in different fields: economics, public policy and corporate practice, have felt the need to introduce ethics into their respective fields. As a consequence, engagement with ethics is becoming less and less a sole occupation for philosophers.

Given the previous arguments, the generic intention of this paper is to discuss the dilemmas that arise when these knowledge management dimensions are linked. In addition, the empirical results obtained so far in the early stages of data collection (pre-tests and pilot studies), as well as the response of the existing ongoing frameworks will be introduced.

The empirical data collection process is a combination of interviews and questionnaires which present some risks. Furthermore, Yin (1994) claims that one or two pilot studies should be performed to fine-tune the interview protocol or questionnaires. However, pilot studies are not pre-test, because pre-test studies do not act as a part of the research protocol, but to improve the level of confidence (Yin, 1994). This is applied in consistency with the sensitive nature of managers’ and employees’ behaviours and values, as discussed by Waldström (2003).

REFERENCES

Brelade, S. and Harman, C. (2003). A practical guide to knowledge management. [S.l.]: Thorogood.

Cardoso, L., Gomes, A. and Rebelo, T. (2003). Gestão do conhecimento: dos dados à informação e ao conhecimento, Comportamento Organizacional e Gestão, 1, 9, 55-84.

Costa, G., Prior, M. and Rogerson, S. (2008a). Individual ethics and knowledge management: arising conflicts. In T. W. Bynum et al. (Eds.). ETHICOMP 2008 (pp. 117-129). Mantua: University of Pavia.

Costa, G., Prior, M. and Rogerson, S. (2008b). Free ride in knowledge management? Ethical and moral dilemmas! ETHICOMP 2008 (only presentation). Mantua: University of Pavia.

Costa, Gonçalo, Prior, Mary and Rogerson, Simon (2009c). Trustworthy and ethical environment in Knowledge Management: a dilemma to solve! In Network Ethics 2009 (only presentation). Lisbon. Portugal.

Galef, B. G. (1992). The question of animal culture. Human Nature, 3, 2, 157-178.

Gartner Group (2002). The 2002 knowledge management hype cycle. Stamford: Gartner Group.

Jablonka, E. and Lamb, M (2005). Evolution in four dimensions- genetic, epigenetic, behavioural, and symbolic variation in the history of life. Cambridge: MIT Press.

Linton, R. (1936). The study of man. New York: Appelton-Century Crofts.

Marwick, A. D. (2001). Knowledge management technology. IBM Systems Journal, 40, 4, 814-830.

Odling-Smee, F. J., Laland, K. N. and Feldman, M. W. (2003). Niche construction: the neglected process in evolution. Princeton: Princeton University Press.

Okunoye, A. O. (2003). Knowledge management and global diversity: a framework to support organizations in developing countries. Turku: University of Turku.

Richerson, P. J. and Boyd, R. (2005) Not by genes alone: how culture transformed human evolution. Chicago: The University of Chicago Press.

Savage, C. (2000). The dawn of the knowledge era. Online at: http://www.kee-inc.com/dawn (accessed 20 May 2009).

Strauss, C. and Quinn, N. (1997). A cognitive theory of cultural meaning. Cambridge: Cambridge University Press.

Toffler, A. (1995). A terceira onda. 15ª ed. Rio de Janeiro: Record.

Waldström, C. (2003). Understanding intra-organizational relations through social network analysis. Aarhus: Aarhus University.

Wright, K. (2005). Personal knowledge management: supporting individual knowledge worker performance. Knowledge Management, Research and Practice, 3, 3, 156-165.

Yin, R. K. (1994). Case study research: Design and methods. 3rd ed. Thousand Oaks: Sage.

Ethics Of Enhancement: A Debate Of “Western” Philosophy

AUTHOR
Gonçalo Jorge Morais da Costa, Tiago Filipe Rodrigues da Fonseca and Nuno Sotero Alves da Silva

ABSTRACT

Already massive change is happening due to emerging technologies. In fact, some of this convergence is happening organically, as the evolution of interdisciplinary science, a systems-approach and the necessity of sharing tools and knowledge is bringing separate disciplines together (Canton, 2002).

The dictatorship of reductionist perception, too long the unwritten law of modern science, is changing dramatically. An example of this fast innovation, inter-science coordination and action is through the deployment of convergent technologies that allow human enhancement.

However, an important question arises: which are the technologies that allow human enhancement? Nanotechnology, Biotechnology, Information Technologies and Cognitive Science (NBIC) represent a truly interdisciplinary environment to allow human enhancement (Roco and Bainbridge, 2002), being an example implantable microchips which due to nano know how, can communicate with the body’s cells and transmit data on to a computer. So, transhumanism can be considered an international intellectual and cultural movement supporting the use of science and technology, which imposes the following levels of discussion: the concept of enhancement and, the ethics of enhancement.

Enhancement is in its essence improving or adds new capacities to the human body. In spite of its concise definition, it is defined as an ambiguous concept which can mean better and more, but also something that most people may think to be less desirable and that should be avoided (Bood, 2003). The negative evaluation of enhancement appears in the first half of last century due to the appearance of eugenics. However, the difference seems to rely on the “old” eugenics versus the “new” eugenics on free choice and autonomy (liberal eugenics) (Agar 2004). Nonetheless, the basic idea is the same, namely the wielding out of undesirable physical and psychological traits.

So, enhancement dimensions can be understood in terms of four distinctions or tensions, namely (Bruce, 2007):

  • enhancement as a change of state or a change of degree;
  • permanent or reversible enhancements;
  • external or internal enhancement technologies;
  • enhancement as opposed to therapy.

In order to get a better understanding of the moral value of enhancement, we need to discuss also the concept of therapy. Therapy concerning enhancement technology is often seen as something “good”, while enhancement is frequently something negative. Such answer is related to the medical paradigm, and even if drawing a sharp line between therapy and enhancement was possible, we would still face the problem of knowing what counts as an enhancement. In order to diminish the lack of uncertainty, we plead three arguments that describe an enhancement in spite of the potential critics that possibly will arise due to the individual notion of human limits or limitations (see for example, Nordmann, 2007):

  • certainty- the pyshical, psychological and cognitive characteristics of the human body are enhanced;
  • consistency- the outcome of such “biological manipulation” is similar to an “environmental manipulation”. There is no relevant moral difference between them;
  • similarity- if we accept treatment and disease prevention, we should accept enhancement. The goodness of health is what drives a moral obligation to treat or prevent disease.

Moreover, a transhumanist discussion must take off from where religion stops, because it is only an axiom (Nooteboom, 2009). Transhumanism should facilitate, rather than disintegrate, the deeper meanings of religion and spirituality. In that sense, to promote a debate concerning the ethics of enhancement we need to focus our attention into two levels of arguing:

  • western and eastern religious systems (Lustig, 2008; Zoloth, 2008; LaFluer, 2008; Kirkland, 2008);
  • and, western and eastern philosophical systems (Leon and Kass, 2001; Sandel, 2002; Fukayama, 2002; Habermas, 2003).

In conclusion, the answers to obtain in this manuscript are: what is NBIC? Which are its applications in human enhancement and ethical dilemmas that arise? And, if is possible to achieve a global or “weastern” spiritual/ethics concerning transhumanist society?

REFERENCES

Agar, N. (2004). Liberal eugenics: In defence of human enhancement. Oxford, Oxfordshire: Blackwell.

Bood, A. (2003). Human enhancement. The Hague: Health Council of the Netherlands.

Bruce, D. (2007). Human enhancement? Ethical reflections on emerging nanobio-technologies. Edinburgh: Edinethics, Ltd.

Canton, J. (2002). The impact of convergent technologies and the future of business and the economy. In M. C. Rocco and W. S. Bainbridge (Eds). Converging Technologies for Improving Human Performance: Nanotechnology, Biotechnology, Information Technology and Cognitive Science (pp. 71-78). Arlington: National Science Foundation.

Fukuyama, Y. F. (2002). Our post-human future: consequences of the biotechnology. New York: Picador.

Habermas, J. (2003). The future of human nature. Cambridge: Polity Press.

Kirkland, R. (2008). Enhancing life? Perspectives from traditional Chinese value-systems, Journal of Law, Medicine & Ethics, 36, 1, 26-40.

LaFluer, W. R. (2008). Enhancement and desire: Japanese qualms about where biotechnology is taking us, Journal of Law, Medicine & Ethics, 36, 1, 26-40.

Leon, R., & Kass, L. R. (2001). Why we should ban human cloning now: preventing a brave new world, The New Republic, 224, 21, 30-39.

Lustig, A. (2008). Enhancement technologies and the person: Christian perspectives, Journal of Law, Medicine & Ethics, 36, 1, 41-50.

Nooteboom, B. (2009). Transhumanism: how to affirm life and be a good person without help from God: a reply to Nietzsche. Online at: http://www.bartnooteboom.nl/site/index_en.cfm?act=nieuws.detail&varnieuws=712 (accessed 20 May 2009).

Nordmann, A. (2007). If and then: A critique of speculative nanoethics, Nanoethics, 1, 1, 31-46.

Rocco, M. C. and Bainbridge, W. S. (Eds). Converging technologies for improving human performance: nanotechnology, biotechnology, information technology and cognitive science. Arlington: National Science Foundation.

Sandel, M. (2002). What’s wrong with enhancement. Online at: http://www.bioethics.gov/background/sandelpaper.html (accessed 01 May 2009).

Zoloth, L. (2008). Go and tend the earth: a Jewish view on an enhanced world, Journal of Law, Medicine & Ethics, 36, 1, 10-25.

Embedding Ethics in European Information and Communication Technology Curricula

AUTHOR
Penny Duquenoy, Bern Martens and Norberto Patrignani

ABSTRACT

Introduction

In Europe, and most industrialised countries, ICT competences are a prerequisite for the majority of jobs, and even for life as a fully functioning member of society in general. In recognising this, universities, colleges, high schools, careers developers, train-the-trainers organizations, etc. have introduced ICT courses and programmes. But, ICT also introduces many, often quite new, ethical dilemmas for its developers and users (both professional and otherwise). Almost all of the above mentioned courses and programmes, however, focus exclusively on technical-instrumentalist competences, while neglecting ethics. This paper aims at analysing this gap in various ICT curricula and proposes content as well as methodology to fill it.
We do this by focussing successively on various contexts of ICT education.
Professional ICT education at universities and colleges (and equivalent)

Whether at academic or professional level, introducing ethical issues of ICT in higher education ICT curricula often constitutes a real challenge. Teachers are faced with students who have followed years of courses, all of them concentrated only on the technical side. A suggestion for introducing ethics in these situations is to start from real case analysis with a bottom-up approach. One example of a fruitful methodology was tested “in-field” at Politecnico di Torino in Italy for teaching computer ethics to PhD students in engineering (computer science, etc.). It is composed of four steps: describe a real controversial case, identify all stakeholders and their interconnections (“stakeholders’ network”), identify the ethical issues that arise from the scenario and finally, try to define possible alternative scenario(s). With this approach the students’ reaction is usually quite positive since they start from a familiar, technical context (e.g. a “national DNA database”) and then, with the support of the teacher, they “climb” the path towards non-technical issues like the social and ethical consequences of their projects.

In a verbal answer to the UK House of Lords Constitution Committee (February 2008) meeting to discuss “Surveillance: Citizens and the State”, and in response to a question regarding the training of IT professionals in privacy considerations, the reply was “… it is included in the exams and the courses but I have to say that most of the students skip that section because there are not enough marks on it and it is worthy but boring.”

In the Dutch speaking part of Belgium (Flanders), Leuven University College is currently the only institute of higher education where a course on IT ethics features on the IT programme (professional bachelor level). Not unlike the above mentioned Italian course, it focuses on specific cases, student projects, discussion and debate. In so doing, it proves fruitful not only to get future professionals thinking about the ethical aspects of their trade but also promotes several more general “soft skills” (arguing, presenting, debating, etc.). The course is an optional one, offered in the third (and final) year of the programme, and tends to be chosen by about 25% of the students. So, there definitely is an audience for such courses among even the most technically oriented of students. It must be noted however that this particular course is taught by a lecturer whose specialisation is in system management, network security and computer forensics. This probably contributes significantly to technical students taking an ethics course seriously (and voluntarily)…

Secondary (and primary) education

There has been a tendency in European schooling to focus on teaching pupils how to use ICT for their school work, and of course as part of a wider educational approach aimed at improving “digital literacy” and students’ employment opportunities. The substantive issues of “computer ethics” typical in conferences such as ETHICOMP, are not generally addressed other than aspects of computer misuse, and the dangers posed to school children. These latter issues appear to be brought in under a category of “eSafety” and serve to (a) educate children in the use (or rather mis-use) of mobile phones used as cameras, and the dangers of chatting online and (b) meet school policy and risk-reduction exercises. For example, the UK National Education Network states: “All schools have a responsibility to ensure that all pupils and staff access the internet safely and responsibly. Failure to do this could result in disciplinary or legal action taken against individuals, head teachers and governing bodies.”

The Rose Review (a report on the use of ICT in UK schools) published in March 2009 promotes the use of ICT in schools, and encourages greater use at primary level. Two points are worth mentioning here:

  1. pupils use ICT effectively to communicate their ideas and to present their work, but they are less skilled in collecting and handling data and in controlling events using ICT;
  2. teachers tend to give more attention to those aspects of ICT where they themselves feel confident.

And there are strong indications that the situation in most other European countries is similar.

The Flemish government recently published ICT learning objectives for children of age 12 and 14 respectively. The safe and responsible use of ICT features prominently among them, but if you look at the available teaching materials as well as current educational practice, the stress is almost exclusively on “utilitarian” features. The explanation for this state of affairs may well be the one given above: both teachers as well as textbook authors lack competence in ICT ethics.

Teacher training

We argue that, to meet the education needs identified above, ICT ethics must be treated in teacher training (at all levels, with the possible exception of kindergarten). In the Leuven University College teacher training programme, a course on ICT ethics has been compulsory for (future) ICT teachers since 10 years. In the fall of 2009, the course will for the first time also be offered as an option to students in other topics.

REFERENCES

http://www.publications.parliament.uk/pa/ld200809/ldselect/ldconst/18/8022002.htm

http://www.nen.gov.uk/

From a report on the Rose Review (Essex Primary ICT curriculum Newsletter):
http://www.e-pic.org.uk/news/newsletter_summer_2009.pdf

Bern Martens, IT, Ethics and Education: Teaching the Teachers (and their Pupils), in Goujon, P. et al. (eds.), IFIP International Federation for Information Processing, Vol. 233, The Information Society: Innovations, Legitimacy, Ethics and Democracy, Springer, Boston, 2007, pp. 181-194

Methods In Applied Ethics

AUTHOR
Göran Collste

ABSTRACT

Within applied ethics moral problems in different spheres of society like medicine, politics and technology are analysed. Applied ethics transcends disciplinary borders. Its point of departure is either ethics or the sphere of application. Thus, one way to do applied ethics is that ethicists use their theories and methods for analysing moral problems in, for example, medicine, politics or technology. Another way is that researchers or professionals confront ethical problems within their sphere or research or practice. Applied ethics is relevant both for ethicists and for researchers in different societal spheres and it has become more and more common that ethicists cooperate with researchers from other disciplines in multi-disciplinary projects.

There are some established methods in ethics. Among them are conceptual analysis to achieve clarity, argumentation analysis to structure and assess arguments and theory construction to develop and justify normative views. These methods are familiar and we can recognise them from the works of Rawls, Dworkin, Kymlicka etc. However, for applied ethics these methods are not sufficient. When the applied ethicist is analysing moral issues in a specific sphere, for example medicine, for the sake of relevance he or she needs empirical knowledge about the sphere in question. The applied ethicist has to acquire empirical knowledge and/or cooperate with researchers within the sphere of application. Hence, it is necessary with multi-disciplinary work in applied ethics. But, when a multi-disciplinary project develops, due to the different disciplinary outlooks of the researchers involved there are many possible misunderstandings and confusions.

Recently, a new multi-disciplinary project titled Personal Health Monitoring – Ethics financed within the European FP 7-program started. Personal health monitoring comprises all technical systems that are collecting, processing and storing data linked to a person, that allows monitoring the parameters of the person and that leads to health-monitoring about the person. Examples of the new technology are sensors in patient’s clothes or implanted in a patient’s body, home facility management systems etc. The aim of the research project is to develop multidisciplinary tools for ethical assessment of emergent technologies for personal health monitoring in order to both achieve new knowledge about the ethical aspects of the technology and to influence the direction of the emergent technologies towards realisation of health care values. Disciplines involved are besides applied ethics, psychology, informatics, and organisation theory. In this paper, the new research project will be used as a case for discussing problems and benefits with multi-disciplinary applied ethics.

From the beginning the researchers involved in the new project had to overcome some terminological misunderstandings and diversities. For example, a first step was to develop “taxonomy”. But what does that mean in this context? Another task was to construct a “dependency map”. What is that? These are just two examples of terms that were foreign to some project disciplines but established within others and hence created some initial misunderstandings. A first aim of the paper is to discuss how terminological differences can be overcome.

What methods in ethics are useful in this kind of projects? Which other disciplinary methods could be used? How can methods in ethics and other disciplines, for example psychology and informatics be combined? These are some question that will be discussed in the paper.

The purpose of the paper is to contribute to the methodological discussion within applied ethics and broader, to the methodology of multi-disciplinary research.