Handout 5.
Handout 5.
Handout 5.
(HS-219)
Handout 5
Something will seem less risky if the bad effects are ultimately
reversible. This concept is similar to the short-term vs. long-
term risk question discussed previously.
Imagine you and your friends are discussing different risks in life, like trying out a new job or investing in something. If the bad outcomes
of taking a risk can be fixed later on, it won't seem as scary or risky. This is similar to how some risks might seem worse in the short term
but not as bad in the long term. So, if you know you can reverse the negative effects, you might feel more comfortable taking the risk.
Threshold Levels for Risk
something doing more than 2 time is risky
something doing 1 to 2 time is not risky
1. Define the problem. This step includes determining the needs and
requirements and often involves determining the constraints.
2. Generate several solutions. Multiple alternative designs are created.
3. Analyze each solution to determine the pros and cons of each. This step
involves determining the consequences of each design solution and determining
whether it solves the problem.
4. Test the solutions.
5. Select the best solution.
6. Implement the chosen solution.
Cont..
In step 1, it is appropriate to include issues of safety in the
product definition and specification. During steps 2 through 5,
engineers typically consider issues of how well the solution
meets the specifications, how easy it will be to build, and how
costly it will be. Safety and risk should also be criteria
considered during each of these steps. Safety is especially
important in step 5, where the engineer attempts to assess all of
the trade-offs required to obtain a successful final design. In
assessing these trade-offs, it is important to remember that safety
considerations should be paramount and should have relatively
higher weight than other issues.
Cont..
Minimizing risk is often easier said than done. There are many things
that make this a difficult task for the engineer. For example, the
design engineer often must deal in uncertainties. Many of the risks
can only be expressed as probabilities and often are no more than
educated guesses. Sometimes, there are synergistic effects between
probabilities, especially in a new and innovative design for which the
interaction of risks will be unknown. Risk is also increased by the
rapid pace at which engineering designs must be carried out. The
prudent approach to minimizing risk in a design is a “go slow”
approach, in which care is taken to ensure that all possibilities have
been adequately explored and that testing has been sufficiently
thorough. However, this approach isn’t always possible in the real
world.
Cont..
Are minimizing risks and designing for safety always the more
expensive alternatives? Spending a long time engineering a safer
product may seem like a very expensive alternative, especially
early in the design cycle before the product has been built or is on
the market. This, however, is a very short-term view. A more long-
term view looks at the possible consequences of not minimizing
the risk. There is a great deal of guesswork involved here, but it is
clear that any unsafe product on the market ultimately leads to
lawsuits that are expensive to defend even if you don’t lose and are
very costly if you do lose. The prudent and ethical thing to do is to
spend as much time and expense as possible up front to engineer
the design correctly so as to minimize future risk of injury and
subsequent criminal or civil actions against you.
Risk Benefit Analysis
One method that engineers sometimes use to help analyze risk and
to determine whether a project should proceed is called risk–benefit
analysis. This technique is similar to cost–benefit analysis. In risk–
benefit analysis, the risks and benefits of a project are assigned
dollar amounts, and the most favorable ratio between risks and
benefits is sought. Cost–benefit analysis is tricky because it is
frequently difficult to assign realistic dollar amounts to alternatives.
This task is especially difficult in risk– benefit analysis because risks
are much harder to quantify and more difficult to put a realistic price
tag on. Still, this can be a useful technique if used as part of a
broader analysis, but only if used objectively.
Cont..
In doing a risk–benefit analysis, one must consider who takes the
risks and who reaps the benefits. It is important to be sure that those
who are taking the risks are also those who are benefiting. This
consideration is fundamental to issues of economic justice in our
society and can be illustrated by the concept of “environmental
racism,” which is the placing of hazardous-waste sites, factories with
unpleasant or noxious emissions, etc. near the least economically
advantaged neighborhoods. This practice is sometimes thought of as
racism because in the United States, these types of neighborhoods are
generally disproportionately occupied by minority groups. The only
ethical way to implement risk–benefit analysis is for the engineer to
ensure to the greatest extent possible that the risks as well as the
benefits of her design are shared equally in society.
Key Ethical Concerns And
Concepts
1. Confidentiality
2. Risk and Safety
3. Computer Ethics
4. Whistleblowing
5. Bribes vs Gifts
6. And Sexual Harassment
Confidentiality
What Type of Information
Must or Should Be Protected?
Employee Information
Management Information
Business Information
What Steps Can Be Taken To
Better Protect Confidential Information?
Develop Written Confidentiality Policies and Procedures
1. Separate folders should be kept for employees and their medical information.
2. All confidential documents should be stored in locked file cabinets or rooms
accessible only to those who have a business “need-to-know.”
3. All electronic confidential information should be protected via firewalls, encryption
and passwords.
4. Employees should clear their desks of any confidential information before going
home at the end of the day.
5. Employees should refrain from leaving confidential information visible on their
computer monitors when they leave their work stations.
6. All confidential information, whether contained on written documents or
electronically, should be marked as “confidential.”
What Steps Can Be Taken To
Better Protect Confidential Information?
7. All confidential information should be disposed of properly (e.g., employees
should not print out a confidential document and then throw it away without
shredding it first.)
8. Employees should refrain from discussing confidential information in public
places.
9. Employees should avoid using e-mail to transmit certain sensitive or controversial
information.
10. Limit the acquisition of confidential client data (e.g., social security numbers, bank
accounts, or driver’s license numbers) unless it is integral to the business
transaction and restrict access on a “need-to-know’ basis.
11. Before disposing of an old computer, use software programs to wipe out the data
contained on the computer or have the hard drive destroyed.
12. A confidentiality policy should also describe the level of privacy employees can
expect relating to their own personal property and personal information.
Train Management and
Employees on Confidentiality Policy
1. During a sales visit, a sales representative offers you a coffee mug with
his company’s name and logo on it. The value of the mug is five dollars.
Can you accept this item?
2. Does the answer to this question change if this item is a $350 crystal
bowl with the name of the company engraved on it? How about if there is
no engraving on it?
3. Your meeting with a sales representative is running into the lunch hour.
He invites you to go out for lunch. You go to a fast-food restaurant and
pay for your own lunch. Is this practice acceptable?
1. INTERNAL WHISTLE-BLOWING
Internal whistle-blowing occurs when an employee goes over the head of an immediate
supervisor to report a problem to a higher level of management. Or, all levels of
management are bypassed, and the employee goes directly to the president of the
company or the board of directors. However it is done, the whistle-blowing is kept within
the company or the organization.
2. EXTERNAL WHISTLE-BLOWING
External whistle-blowing occurs when the employee goes outside the company and
reports wrongdoing to newspapers or law-enforcement authorities. Either type of
whistle-blowing is likely to be perceived as disloyalty. However, keeping it within the
company is often seen as less serious than going outside of the company.
Conditions/Criteria of
Whistleblowing
Whistle-blowing should only be attempted if the following four conditions are met [Harris,
Pritchard, and Rabins, 2000]:
1. NEED:
There must be a clear and important harm that can be avoided by blowing the whistle. In
deciding whether to go public, the employee needs to have a sense of proportion. You
don’t need to blow the whistle about everything, just the important things. Of course, if
there is a pattern of many small things that are going on, this can add up to a major and
important matter requiring that the whistle be blown. For example, if an accident occurs
at your company, resulting in a spill of a small quantity of a toxic compound into a
nearby waterway that is immediately cleaned up, this incident probably does not merit
notifying outside authorities. However, if this type of event happens repeatedly and no
action is taken to rectify the problem despite repeated attempts by employees to get the
problem fixed, then perhaps this situation is serious enough to warrant the extreme
measure of whistle-blowing.
Conditions/Criteria of
Whistleblowing
2. PROXIMITY:
The whistle-blower must be in a very clear position to report on the problem. Hearsay is
not adequate. Firsthand knowledge is essential to making an effective case about
wrongdoing. This point also implies that the whistleblower must have enough expertise
in the area to make a realistic assessment of the situation. This condition stems from the
clauses in several codes of ethics which mandate that an engineer not undertake work
in areas outside her expertise. This principle applies equally well to making assessments
about whether wrongdoing is taking place.
3. CAPABILITY:
The whistle-blower must have a reasonable chance of success in stopping the harmful
activity. You are not obligated to risk your career and the financial security of your family
if you can’t see the case through to completion or you don’t feel that you have access to
the proper channels to ensure that the situation is resolved.
Conditions/Criteria of
Whistleblowing
4. LAST RESORT:
Whistle-blowing should be attempted only if there is no one else more capable or more
proximate to blow the whistle and if you feel that all other lines of action within the context
of the organization have been explored and shut off.
These four conditions tell us when whistle-blowing is morally acceptable. But when is an
engineer morally obligated to blow the whistle? There may be situations in which you are
aware of wrongdoing and the four conditions discussed above have been met. In this case,
the whistle may be blown if you feel that the matter is sufficiently important. You are only
obligated to blow the whistle when there is great imminent danger of harm to someone if
the activity continues and the four conditions have been met. A great deal of introspection
and reflection is required before whistle-blowing is undertaken.
Preventing Whistle-Blowing
There are four ways in which to solve the whistle-blowing problem within a corporation.
1. First, there must be a strong corporate ethics culture. This should include a clear commitment to
ethical behavior, starting at the highest levels of management, and mandatory ethics training for all
employees. All managers must set the tone for the ethical behavior of their employees.
2. Second, there should be clear lines of communication within the corporation. This openness gives
an employee who feels that there is something that must be fixed a clear path to air his concerns.
3. Third, all employees must have meaningful access to high-level managers in order to bring their
concerns forward. This access must come with a guarantee that there will be no retaliation. Rather,
employees willing to come forward should be rewarded for their commitment to fostering the ethical
behavior of the company.
4. Finally, there should be willingness on the part of management to admit mistakes, publicly if
necessary. This attitude will set the stage for ethical behavior by all employees.
Computer Ethics
3. Plagiarism: This involves passing off someone else's work or ideas as one's
own without proper credit or acknowledgement.
2. Trust: Engineers must be trustworthy and maintain the trust of their clients,
employers, and the public.
4. Accuracy: Engineers must ensure the accuracy of their work, reports, and
statements, avoiding any misrepresentation or falsification of facts.
1. Cost-Oblivious Approach
2. Cost–Benefit Analysis
Approaches to Resolve
Environmental Problems
1. The first approach is sometimes referred to as the “cost-oblivious approach” [Martin
and Schinzinger, 2000]. In this approach, cost is not taken into account, but rather the
environment is made as clean as possible. No level of environmental degradation is seen
as acceptable. This approach bears a striking resemblance to rights and duty ethics.
There are obvious problems with this approach. It is difficult to uphold, especially in a
modern urbanized society. It is also very difficult to enforce, since the definition of “as
clean as possible” is hard to agree on, and being oblivious to cost isn’t practical in any
realistic situation in which there are not infinite resources to apply to a problem.