Technological Choice Module Socio-technical systems as constraining organizational environments Dr. William Frey ADMI 4016.

Slides:



Advertisements
Similar presentations
Disaster Risk Reduction and Governance. Ron Cadribo.
Advertisements

Project L.O.F.T. Report May 2007 through October 2007 Creating a design to meet stakeholder desires and dissolve our current set of interacting problems.
IBM Corporate Environmental Affairs and Product Safety
EMS Checklist (ISO model)
Risk Management Awareness Presentation
Effectively applying ISO9001:2000 clauses 6 and 7.
Restaurant and Foodservice Operations Are Labor-Intensive
M & E for K to 12 BEP in Schools
Decision Making Manual: A Toolkit for Making Moral Decisions William J. Frey (UPRM) José A. Cruz-Cruz (UPRM) Chuck Huff (St. Olaf)
HRD as a Tool for Good Governance in Cooperatives
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
2-1 The Organizational Context: Strategy, Structure, and Culture Chapter 2 © 2007 Pearson Education.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 2-1 The Organizational Context: Strategy, Structure, and Culture Chapter 2.
Jubail Industrial College is pleased to announce short courses in Management For more information, please contact: Special Programs Industrial Relations.
Decision Making Manual: A Toolkit for Making Moral Decisions William J. Frey (UPRM) José A. Cruz-Cruz (UPRM) Chuck Huff (St. Olaf)
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Values-Based Decision Making Manual: A Toolkit for Moral Decisions Problem-Solving William J. Frey ADEM / UPRM.
Operations and Supply Chain Strategies
Science and Engineering Practices
FINDING OUR PLACE AND PURPOSES IN HUMAN RIGHTS EDUCATION.
Workplace Violence Research has identified factors that may increase the risk of violence at worksites. Such factors include working with the public or.
IT:Network:Microsoft Applications
Meeting SB 290 District Evaluation Requirements
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
Decision Making Manual: A Toolkit for Making Moral Decisions William J. Frey (UPRM) José A. Cruz-Cruz (UPRM) Chuck Huff (St. Olaf)
Overview of Sales Management and the Selling Environment
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
1 CREATING A LEARNING ORGANIZATION AND AN ETHICAL ORGANIZATION STRATEGIC MANAGEMENT BUAD 4980.
© 2010 The McGraw-Hill Companies, Inc. Managerial Accounting and the Business Environment Chapter 1.
Monitoring through Walk-Throughs Participants are expected to purpose the book: The Three-Minute Classroom Walk-Through: Changing School Supervisory.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The Changing Business Environment: A Manager’s Perspective 18.
Software Engineering Management Lecture 1 The Software Process.
Decision Making Manual: A Toolkit for Making Moral Decisions William J. Frey (UPRM) José A. Cruz-Cruz (UPRM) Chuck Huff (St. Olaf)
Hosted by Dr. William J. Frey Responsible Dissent
Center for cei Entrepreneurship & Innovation Technology Venture Sequence 9/6/05.
DEOMI Diversity Competencies
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Hosted by Dr. William J. Frey PrivacyPropertyInformed Consent Toysmart
Job Analysis - Competency Modeling MANA 5322 Dr. Jeanne Michalski
Policies and Procedures for Civil Society Participation in GEF Programme and Projects presented by GEF NGO Network ECW.
Preparing for negotiation  Understand client’s business intention and goals  Measure positioning of your client and the opposite party: the purpose.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Socially Sustainable Development, May 2002 Responsive, Reliable, Resilient Social Aspects of Sustainable Development Steen Lau Jørgensen Social Development.
DEVELOPING THE WORK PLAN
Hosted by Dr. William J. Frey Ethics TestsProblem Solving Feasibility Test Toysmart
Hosted by Dr. William J. Frey One Laptop Per Child Amish Tech Choice Airplane Cockpits Uchangi Dam
Principle #4 – Ethical Staff Behavior This presentation is made possible by the Smart Campaign
Reflections on debate. Good on STS Groups discussed hardware fixes – Installing features to prevent the turntable from misaligning Procedures – Slowing.
Foundations of Information Systems in Business
Corporate Ethics Compliance Officer Report William J. Frey ADEM UPRM CSR Challenge Executive Summary STS Table Code of Ethics Intellectual merit and pedagogic.
Underlying Causes of Poverty Over- population Governance Patrilineal Culture upholding Gender Inequity Conflict AnalysisProgram PracticeLearning and Impact.
Unit 9/Week 9 – PP 101 Instructor Flentroy-Parker.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Table 2. Role of social responsibility in preservation of the vital values of sociotechnical system [10] Liliya Korchevska et al. Social Responsibility.
 In Ned law are a company that provides strategic consulting and management, composed of a team of high academic and social esteem, focused on optimization,
Instructor Materials Chapter 13: The IT Professional
Software Engineering Management
The Organizational Context: Strategy, Structure, and Culture
Preparing for Negotiation & Drafting Business Contracts
The Organizational Context
Hosted by Dr. William J. Frey
ISO 9000 Dr. S. Thomas Foster, Jr..
The Organizational Context: Strategy, Structure, and Culture
The Organizational Context: Strategy, Structure, and Culture
The Organizational Context: Strategy, Structure, and Culture
CEng progression through the IOM3
Presentation transcript:

Technological Choice Module Socio-technical systems as constraining organizational environments Dr. William Frey ADMI 4016

Prepare a Socio-Technical System (STS) table an intellectual tool to help us recognize patterns in the way technology is used and produced – Components: Hardware, Software, Physical Surroundings, Stakeholders (people, groups, & roles), Procedures, Laws (Criminal Law, Civil Law, Statutes & Regulations), Information Systems (collecting, storing, transferring) – Other Components: Financial Markets, Rate Structure (Power Systems), Environment, Technological Context, Supply Chain A STS is a system. The components are related and interact. STSs embody values – Moral: Justice, Respect, Responsibility, Trust, Integrity – Non-Moral: Financial, Efficiency, Sustainability STSs exhibit trajectories i.e., coordinated paths of change

1. Identify key components of the STS HardwareSoftwarePhysical Surround- ings Stakeholders (People, Groups, and Roles) ProceduresLawsInformation Collection and Storage Structures

Steps to a STS analysis 1. Describe the software and hardware components of the socio-technical system. 2. Describe the physical environment(s) in the socio- technical system. 3. Who are the key stakeholders in the STS? What are their stakes? What are their roles? 4. Outline important procedures in the STS? Describe them step-by-step. 5. Describe the legal environment of the STS including general branches of the law, key laws, important regulations, and statutes. 6. How is information collected, stored, and disseminated in the STS?

More Steps Are there any value conflicts in the STS? – What are the values? – Where are they located? (Under which components?) – Moral versus Moral? Moral versus Non-Moral? Non-moral versus Non-moral? Are there any value vulnerabilities in the STS – What values are under threat? – Where are they located? (Under which components?) Are there any harms latent or potential in the STS? – What is their magnitude? (Catastrophic or trivial?) – What is their likelihood or probability What is the trajectory or path of change in the STS? – Is it positive or negative?

Technology: Hardware and Software Technology includes hardware, software, designs, prototypes, products, or services. – Hardware in classroom 236 includes computer, data display projector, smart board. – Software would include PowerPoint, Word (Microsoft features) as well as software that runs smart board. Technologies enable and constrain action – PowerPoint allows for picturing ideas – But it tempts us to read off the slides instead of talking with our audience 1. Describe the software and hardware components of the socio-technical system

Physical Surroundings Describe the physical environment in a given STS – Geography, weather, landscape, flora, fauna, cities, forests, etc. Physical surroundings embed values. – Fixed tables in 236 constrain group work while enabling listening. – 236 clearly separates presenting (active) area from listening (passive) area. – Doors, by their weight, strength, material, size, and attachments (such as locks) can promote values such as security. – Physical surroundings promote, maintain, or diminish other values in that they can permit or deny access, facilitate or hinder speech, promote privacy or transparency, isolate or disseminate property, and promote equality or privilege. Think about how the mountains in the center of Puerto Rico have shaped the community life of the pueblos located there 2. Describe the physical environment(s) in the socio-technical system

People, Groups, and Roles These are often characterized as constituyentes or stakeholders – Any group or person with an essential interest at risk (at stake) in the situation at hand Teachers, administrators, technical staff, and, of course, students are stakeholders of 236 – What are their interests? – What are their roles? – How does these interest and role sets interact? 3. Who are the key stakeholders in the STS? What are their stakes? What are their roles?

Procedures Relevant procedures to room 236 – Setting up the class (turning on the equipment, setting the lights, positioning the podium, etc.) – Lecturing, discussing, taking exams, reading, are all pedagogical procedures that take place in room 236 Procedures can promote values or they can display value vulnerabilities – Recording grades online may place privacy in jeopardy if the storage place is not protected by encryption. – A grievance procedure may undermine due process rights if there are unreasonable time delays between steps in the procedure 4. Outline important procedures in the STS? Describe them step-by-step.

Laws, Statutes, and Regulations Class attendance is required in the Universitys Reglemento; faculty are required to hold a certain number of office hours per credit hour of teaching Business (such as restaurants) are subject to safety regulations (OSHA), food preparation regulations (FDA), and legal regulations governing employee treatment (overtime requirements, minimum wage, maximum hours of work per week, minimum age requirements) – How these differ from one nation to another creates many problems for multinational corporations Corporations are considered legal persons and have certain legal rights such as free commercial and non-commercial speech Bankruptcy laws and legally mandated procedures – Legal requirement to form a bankruptcy committee composed of representative of creditors 5. Describe the legal environment of the STS including general branches of the law, key laws, important regulations, and statutes.

Information gathering, storage, and dissemination Key issue in businesses that rely on computer technology How does a company gather information on market conditions, suppliers, customers, competitors? How does it store this information (In file cabinets behind locked doors?) How does it transfer this information, to whom, and on what occasions? – Toysmart guaranteed that it would not transfer customer financial information to third parties. This promise aided it in collecting this information. They promised secure (say encrypted) methods for storing this information 6. How is information collected, stored, and disseminated in the STS?

STS and Problem Specification Having a good STS description, highlighting its key values, and locating these values in components of the STS provide set the stage for problem specification Identifying value conflicts, potential or latent harms, and negative trajectories in STS document and validate problem specification In many cases, specifying the problem in reference to the STS also outlines potential solutions – A security vulnerability can be addressed by holistically adjusting elements of the STS; strengthening physical barriers, securing data, refining procedures and lobbying for new laws could represent adjustments to strengthen the security of a STS

Classify the problem: Disagreement on Facts – Did the supervisor sexually harass the employee? (What happenedthere are two different versions) Disagreement on Concepts – Has the supervisor created a hostile environment? (Meaning of hostile environment?) Conflicts – Conflict between moral values (Toysmart either honors property claims of creditors or privacy rights of customers) – Conflicts between moral and non-moral values (In order to get the chips to clients on time, LaRue has told the quality control team to skip environmental tests and falsify results) A key value becomes vulnerable – Online activity has magnified the potential harms of cyberslander against companies like Biomatrix Immediate, Midterm, or Remote Harms – Is it the case that Therac-25 patients are receiving radiation overdoses?

Table summarizing problem classification (With Generic Solutions) Problem / Solution Strategy DisagreementValue Conflict Value Vulnerability Impending harm Situational Constraints FactualConceptualValues exclusive A value is vulnerable Harm is possible Limits Collect information Weigh competing witness accounts Perform controlled experiments (Use Authority such as law or regulation) Conceptual analysis (criticize competing definitions) Draw analogies with past cases Fully integrate conflicting values? Partially realize and integrate conflicting values? Keep one value, drop others (Tradeoff)? Strengthen value in its current location Adjust STS so that different parts comple- ment one another Take action to prevent harm Notify potential victims Make sure risk is acceptable to all parties involved Resource? Technical? Interest?

3. Responsible Technological Choice Students learn about Socio-Technical Systems – Developing cognitive skill of techno-social relevance Students assigned cases of technological choice – For case studies on technological choice, see: Johnson and Wetmore, Technology and Society: Building Our Sociotechnical Future, MIT Press, 2009

Redesigning airplane cockpits to remove gender bias Restoring interpretive flexibility on a widely accepted and used Design (=transpectivity) Empowering participation of citizens interest groups in technological design (=participatory standpoint) Responsive Technological Choice: Case 1 Manufacturing Gender in Commercial and Military Cockpit Design Rachel N. Weber Science, Technology, & Human Values, Vol. 22, No. 2. (Spring, 1997), pp Tue Jan 2 16:14:

Jamison Wetmore. Amish Technology: Reinforcing Values and Building Community in Technology and Society, eds. Johnson and Wetmore. 2009, MIT Press: How the Amish adopt and adapt technology Using technological choice to build a communitys identity Assessing how a technology would impact a communitys core values Modifying existing technology to minimize negative impact on a communitys values Responsive Technological Choice: Case 2

Roopali Phadke. Peoples Science in Action: The Politics of Protest and Knowledge Brokering in India. In Tecnology and Society, Johnson and Wetmore eds. MIT Press, 2009, Responsive Technological Choice: Case 3 Bridging the gap between government and local communities in the Uchangi Dam Project How engineers and other professionals with NGOs can serve as mediators or honest brokers in disputes on technological choice Professionals work with local communities to give them voice.

CaseRelevance (technological) Response (technological) Amish Choice of Technology Impact on community core values, solidarity, and identity Rejecting technologies that violate community standards; Modifying technologies to resonate with community standards Redesigning airplane cockpits for women Discovery of gender bias embedded in cockpit design (questioning assumptions to restore interpretive flexibility) Organizing lobbying efforts to convince stakeholders to redo cockpit design to resonate with womens capabilities Reconfiguration of Uchangi irrigation project Uchangi dam as posed by government requires relocating two villages (restoring interpretive flexibility via transperspectivity) NGO engineers create opportunity for local communities to build values into credible, competing irrigation project designs