
In this exercise, you will specify the problem using socio-technical analysis. The STS section of the Toysmart Case narrative (found at Computing Cases) provides a good starting point. In the first table, enter the information from the Toysmart case materials pertinent to the general components of a STS, its hardware, software, physical surroundings, people/groups/roles, procedures, laws, data. Some examples taken from the STS description at Computing Cases are provided to get you started. Then, using the second table, identify the values that are embedded in the different components of the STS. For example, PICS (platforms for internet content selection) embody the values of security and privacy. Finally, using the data from your socio-technical analysis, formulate a concise problem statement.
Exercise 1a:
Read the socio-technical system analysis of the Toysmart case here. Fill in the table below with elements from this analysis that pertain to your decision point.
Hard- |
Software |
Physical Surround- |
People/ |
Proce- |
Laws, Codes, Regulat- |
Data and |
Holt Educat- |
Platforms for Internet Content Selection |
Cyber Space |
Toysmart the corporat- |
Buying Toys Online |
COPPA |
Toy- |
Instructions for Table 1:
- Go to this link and review the STS description provided for the Toysmart case.
- Pull out the elements of the STS description that are relevant to your decision point. List them under the appropriate STS component in the above table.
- Think about possible ways in which these components of the Toysmart STS interact. For example, what kinds of legal restrictions govern the way data is collected, stored, and disseminated?
- Develop your STS table with an eye to documenting possible ethical conflicts that can arise and are relevant to your decision point.
Software / ValueEmbedded |
PICS (Platforms forInternet Content Selection) |
(Platforms for Privacy Preferences) |
SSLs (SecuredSocket Layers) thatencrypt pages askingfor SS numbers |
Security |
Embodies privacy and security by filtering objectionable data. Security selected over free speech. |
Integrates property with security and privacy by converting information into property. |
Realizes / supports security by sealing off domains of information. |
Privacy |
Embodies privacy and security by filtering objectionable data. Security selected over free speech. |
Integrates property and security by filtering objectionable data. Security selected over free speech. |
Realizes and supports privacy by sealing o_ domains of information. |
Property |
Integrates property with security and privacy by converting information into property |
Realizes and supports property by restricting access (intellectual property protected by excluding nonauthorized access. |
|
Free Speech |
Interferes with free speech by filtering content. Content can be filtered with recipient's awareness. |
Facilitates by permitting information exchange on model of property exchange. But this limits exchange by assigning it a price. |
Restricts access. |
Justice (Equity andAccess) |
Could be used to restrict access to ideas by filtering ideas. Thus it could cut off flow of information into the intellectual commons. |
Facilitates by permitting information exchange on model of property exchange. But this limits exchange by assigning it a price. |
Because it restricts access to a domain, it can be used to reduce or cut off flow of information into the intellectual commons. |
Exercise 1b
Examine the values embedded in the STS surrounding this decision point. Locate your values under the appropriate component in the Toysmart STS. For example, according to the STS description for Toysmart found at Computing Cases, the software programs prominent in this case embody certain values; SSLs embody security and privacy, P3P property, and PICS privacy. Next, look for areas where key values can come into conflict.
Hardware |
Soft- |
Physical |
People/ Groups |
Proce- |
Laws/ Codes |
Data and Data Struct- |
Security |
||||||
Privacy |
||||||
Property |
||||||
Justice (Equity/ Access) |
||||||
Free Speecy |
Instructions for Table 5.22:
- This module links to another Connexions module, Socio-Technical Systems in Professional Decision-Making. There you will find short profiles of the values listed in the above table: security, privacy, property, justice, and free speech. These profiles will help you to characterize the values listed in the above table.
- The second ethical reflection in the Toysmart case narrative (at Computing Cases) also contains a discussion of how property comes into conflict with privacy.
- Identify those components of the Toysmart STS that embody or embed value. For example, list the values realized and frustrated by the software components discussed in the Toysmart case in the STS description.
- Look for ways in which different elements of the STS that embed value can interact and produce value conflicts. These conflicts are likely sources for problems that you should discuss in your problem statement and address in your solution.
Exercise 1c:
Write out the requirements (ethical and practical) for a good solution. Identify the parts of the STS that need changing. Then, develop a concise summary statement of the central problem your decision point raises. As you design solutions to this problem, you may want to revise this problem statement. Be sure to experiment with different ways of framing this problem.
Harris, Pritchard, and Rabins provide a useful approach to problem specification. See references below.
- 瀏覽次數:1641