You are here

Exercise One: Problem Specification

26 July, 2019 - 12:01
Available under Creative Commons-ShareAlike 4.0 International License. Download for free at http://cnx.org/contents/3d8499e9-08c0-47dd-9482-7e8131ce99bc@11.15

In this exercise, you will specify the problem using socio-technical analysis. The STS section of the Toysmart Case narrative (found at Computing Cases) provides a good starting point. In the first table, enter the information from the Toysmart case materials pertinent to the general components of a STS, its hardware, software, physical surroundings, people/groups/roles, procedures, laws, data. Some examples taken from the STS description at Computing Cases are provided to get you started. Then, using the second table, identify the values that are embedded in the different components of the STS. For example, PICS (platforms for internet content selection) embody the values of security and privacy. Finally, using the data from your socio-technical analysis, formulate a concise problem statement.

Exercise 1a:

Read the socio-technical system analysis of the Toysmart case here. Fill in the table below with elements from this analysis that pertain to your decision point.

Table 5.20 Socio-Technical System Table

Hard-
ware

Software

Physical Surround-
ings

People/
Groups

Proce-
dures

Laws, Codes, Regulat-
ions

Data and
Data Struct-
ures

Holt Educat-
ion Outlet

Platforms for Internet Content Selection

Cyber Space

Toysmart the corporat-
ion

Buying Toys Online

COPPA

Toy-
smart Custom-
er Data Base

 

Instructions for Table 1:

  1. Go to this link and review the STS description provided for the Toysmart case.
  2. Pull out the elements of the STS description that are relevant to your decision point. List them under the appropriate STS component in the above table.
  3. Think about possible ways in which these components of the Toysmart STS interact. For example, what kinds of legal restrictions govern the way data is collected, stored, and disseminated?
  4. Develop your STS table with an eye to documenting possible ethical conflicts that can arise and are relevant to your decision point.
Table 5.21 Values Embedded by Relevant Software Values embedded in key software components in the Toysmart case. Emphasis on machine/software negotiation for privacy preferences in Internet transactions.

Software / ValueEmbedded

PICS (Platforms forInternet Content Selection)

(Platforms for Privacy Preferences)

SSLs (SecuredSocket Layers) thatencrypt pages askingfor SS numbers

Security

Embodies privacy and security by filtering objectionable data. Security

selected over free speech.

Integrates property with security and privacy by converting information into property.

Realizes / supports security by sealing off domains of information.

Privacy

Embodies privacy and security by filtering objectionable data. Security selected over free speech.

Integrates property and security by filtering objectionable data. Security selected over free speech.

Realizes and supports

privacy by sealing o_

domains of information.

Property

 

Integrates property with security and privacy by converting information into property

Realizes and supports property by restricting access (intellectual property protected by excluding nonauthorized access.

Free Speech

Interferes with free speech by filtering content. Content can be filtered with recipient's awareness.

Facilitates by permitting information exchange on model of property exchange. But this limits exchange by assigning it a price.

Restricts access.

Justice (Equity andAccess)

Could be used to restrict access to ideas by filtering ideas. Thus it could

cut off flow of information into the intellectual commons.

Facilitates by permitting information exchange on model of property exchange. But this limits exchange by assigning it a price.

Because it restricts access to a domain, it can be used to reduce or cut off flow of information into the intellectual commons.

 

Exercise 1b

Examine the values embedded in the STS surrounding this decision point. Locate your values under the appropriate component in the Toysmart STS. For example, according to the STS description for Toysmart found at Computing Cases, the software programs prominent in this case embody certain values; SSLs embody security and privacy, P3P property, and PICS privacy. Next, look for areas where key values can come into conflict.

Table 5.22 Value Table

Hardware

Soft-
ware

Physical
Surround-
ings

People/ Groups

Proce-
dures

Laws/ Codes

Data and Data Struct-
ures

Security

           

Privacy

           

Property

           

Justice (Equity/ Access)

           

Free Speecy

           
 

Instructions for Table 5.22:

  1. This module links to another Connexions module, Socio-Technical Systems in Professional Decision-Making. There you will find short profiles of the values listed in the above table: security, privacy, property, justice, and free speech. These profiles will help you to characterize the values listed in the above table.
  2. The second ethical reflection in the Toysmart case narrative (at Computing Cases) also contains a discussion of how property comes into conflict with privacy.
  3. Identify those components of the Toysmart STS that embody or embed value. For example, list the values realized and frustrated by the software components discussed in the Toysmart case in the STS description.
  4. Look for ways in which different elements of the STS that embed value can interact and produce value conflicts. These conflicts are likely sources for problems that you should discuss in your problem statement and address in your solution.

Exercise 1c:

Write out the requirements (ethical and practical) for a good solution. Identify the parts of the STS that need changing. Then, develop a concise summary statement of the central problem your decision point raises. As you design solutions to this problem, you may want to revise this problem statement. Be sure to experiment with different ways of framing this problem.

Harris, Pritchard, and Rabins provide a useful approach to problem specification. See references below.