<< Chapter < Page | Chapter >> Page > |
In this section, you will learn about this module’s exercises. The required links above provide information on the frameworks used in each section. For example, the Socio-Technical System module provides background information on socio-technical analysis. The "Three Frameworks" module provides a further description of the ethics tests, their pitfalls, and the feasibility test. These exercises will provide step by step instructions on how to work through the decision points presented above.
In this exercise, you will specify the problem using socio-technical analysis. The STS section of the Toysmart Case narrative (found at Computing Cases) provides a good starting point. In the first table, enter the information from the Toysmart case materials pertinent to the general components of a STS, its hardware, software, physical surroundings, people/groups/roles, procedures, laws, data. Some examples taken from the STS description at Computing Cases are provided to get you started. Then, using the second table, identify the values that are embedded in the different components of the STS. For example, PICS (platforms for internet content selection) embody the values of security and privacy. Finally, using the data from your socio-technical analysis, formulate a concise problem statement.
Hardware | Software | Physical Surroundings | People/Groups/Roles | Procedures | Laws, Codes, Regulations | Data and Data Structures |
Holt Education Outlet | Platforms for Internet Content Selection | Cyber Space | Toysmart the corporation | Buying Toys Online | COPPA | Toysmart Customer Data Base |
Software / Value Embedded | PICS (Platforms for Internet Content Selection) | (Platforms for Privacy Preferences) | SSLs (Secured Socket Layers) that encrypt pages asking for SS numbers |
Security | Embodies privacy and security by filtering objectionable data. Security selected over free speech. | Integrates property with security and privacy by converting information into property. | Realizes / supports security by sealing off domains of information. |
Privacy | Embodies privacy and security by filtering objectionable data. Security selected over free speech. | Integrates property and security by filtering objectionable data. Security selected over free speech. | Realizes and supports privacy by sealing off domains of information. |
Property | Integrates property with security and privacy by converting information into property | Realizes and supports property by restricting access (intellectual property protected by excluding non-authorized access. | |
Free Speech | Interferes with free speech by filtering content. Content can be filtered with recipient's awareness. | Facilitates by permitting information exchange on model of property exchange. But this limits exchange by assigning it a price. | Restricts access. |
Justice (Equity and Access) | Could be used to restrict access to ideas by filtering ideas. Thus it could cut off flow of information into the intellectual commons. | Facilitates by permitting information exchange on model of property exchange. But this limits exchange by assigning it a price. | Because it restricts access to a domain, it can be used to reduce or cut off flow of information into the intellectual commons. |
Notification Switch
Would you like to follow the 'Modules linking to computing cases' conversation and receive update notifications?