Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-m6dg7 Total loading time: 0 Render date: 2024-11-03T02:51:12.402Z Has data issue: false hasContentIssue false

19 - Engineering Ethics When Lives Are on the Line: When Does Bad Engineering Become Bad Ethics?

from Part III - Engineering

Published online by Cambridge University Press:  18 October 2019

Ali E. Abbas
Affiliation:
University of Southern California
Get access

Summary

Numerous engineering projects create products and services that are important to society; many have explicit safety implications; some are distinguished by explicitly supporting national security.  Failures and deficiencies that might be considered “routine” in some settings can in these cases directly cause injuries and lost lives, in addition to harming national security.  In such a setting, decisions regarding quality, testing, reliability, and other “engineering” matters can become ethical decisions, where balancing cost and delivery schedule, for example, against marginal risks and qualities is not a sufficient basis for a decision.  When operating in the context of an engineering project with such important societal implications, established engineering processes must therefore be supplemented with additional considerations and decision factors. In this chapter, long-time defense contractor executive and US National Academy of Engineering member Neil Siegel discusses specific examples of ways in which these ethical considerations manifest themselves. The chapter starts with his thesis, asserting that bad engineering risks transitioning into bad ethics under certain circumstances, which are described in the chapter. It then uses a story from the NASA manned space program to illustrate the thesis; unlike some stories, this one has a “happy ending.” The author then moves to the main aspects of the chapter, starting by explaining the behavioral, evolutional, and situational factors that can tempt engineers into unethical behavior: how do engineers get into situations of ethical lapse? No one enters a career in engineering intended to put lives and missions at risk through ethical lapses; at the very least, this is not the path to promotion and positive career recognition. With the basis for such behavior established, the author then defines what he calls the characteristics of modern systems that create risk of ethical lapse; he identifies five specific traits of modern societal systems – systems of the sort that today’s engineers are likely to be engaged in building – as being those that can allow people to slip from bad engineering into bad ethics. These characteristics are then illustrated with examples, from everyday engineering situations, such as working to ensure the reliability of the electric power grid, and designing today’s automobiles. The very complexities and richness of features that distinguish many of today’s products and critical societal systems are shown to become a channel through which bad engineering can transition into bad ethics. Lastly, the chapter discusses some of the author’s ideas about how to correct these situations, and guard against these temptations.

Type
Chapter
Information
Next-Generation Ethics
Engineering a Better Society
, pp. 271 - 290
Publisher: Cambridge University Press
Print publication year: 2019

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

CAN in Automation Group (retrieved 2018). History of CAN technology. Retrieved from www.can-cia.org/can-knowledge/can/can-history/Google Scholar
EIS Council (2017). EPROTM Black Sky Event Simulation Project. Some of the key results of this simulation scenario are reported at the website. Retrieved from EIS Council http://eiscouncil.org/Epro/SimulationProjectGoogle Scholar
Foster, J. et al. (2008). Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse Attack. A commission chartered by United States public law 106-398, Title XIV.Google Scholar
Greenberg, A. (2015). Hackers Remotely Kill a Jeep on the Highway – with Me in it. Retrieved from www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/Google Scholar
Koscher, K. et al. (2010). Experimental Security Analysis of a Modern Automobile. IEEE 2010 Symposium on Security and Privacy.Google Scholar
Judson, N. (2013). Interdependence of the Electricity Generation System and the Natural Gas System and Implications for Energy Security, MIT Lincoln Laboratory Technical Report 1173.Google Scholar
Kilpatrick, J., Swafford, J., a7 Findell, B. (Eds.) (2001). Adding it up: Helping children learn mathematics. Washington, DC: National Academies Press.Google Scholar
Kleinrock, L. (2013). Personal communication. Kleinrock, still a professor at UCLA and who made important contributions to the design of the Internet (e.g., hierarchical routing), often says this in his lectures and speeches.Google Scholar
Kushner, D. (2013). The real story of Stuxnet. Retrieved from http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnetGoogle Scholar
Ricardo, D. (1817). On the principles of political economy and taxation. London, UK: John Murray.Google Scholar
Schneier, B. (2007). Staged attack causes generator to self-destruct. Retrieved from www.schneier.com/blog/archives/2007/10/staged_attack_c.htmlGoogle Scholar
Siegel, N., & Ferren, B. (2016). The figure is from “Emergency Communications System (ECOM), A technical report for the electric Infrastructure Security Council. Retrieved from www.eiscouncil.orgGoogle Scholar
Siegel, N. (2011). Organizing projects around the mitigation of risks arising from system dynamic behavior. International Journal of Software Informatics 5(3), 7899.Google Scholar
Taleb, N. N. (2004). Fooled by randomness. New York, NY: Random House.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×