Ethics. Paul Jackson. School of Informatics University of Edinburgh

Similar documents
Professional and ethical responsibility

8.2.1 Therac-25 Radiation Overdoses

Safety in large technology systems. Technology Residential College October 13, 1999 Dan Little

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

Nancy G. Leveson and Clark S. Turner, An Investigation of the Therac-25 Accidents. Computer 26(7), pp , Jul Presented by Dror Feitelson

Name of Registrant: - Amanda Gauthier (referred August 8, 2013) Dates of Hearing: January 15 and 16, 2014; March 24, Decision and Reasons

LESSON 2. Opening Leads Against Suit Contracts. General Concepts. General Introduction. Group Activities. Sample Deals

LESSON 6. Finding Key Cards. General Concepts. General Introduction. Group Activities. Sample Deals

Participative Learning delivers Computer Ethics: how to prepare future computer professionals

Professional Ethics in Software Engineering Curricula

Additional Arduino Control & Ethics

integrity, honor and dignity knowledge and skill honest and impartial increase the competence professional and technical societies

Lesson 2: What is the Mary Kay Way?

A New Systems-Theoretic Approach to Safety. Dr. John Thomas

Your Partner Holds a Strong Balanced Hand Your Hand Is Balanced

Distributed Systems Programming (F21DS1) Formal Methods for Distributed Systems

Disclosing Self-Injury

BCS3323 Software Testing and Maintenance. Overview of Testing

Ethics in Materials Engineering

Behaviors That Revolve Around Working Effectively with Others Behaviors That Revolve Around Work Quality

NEW YORK STOCK EXCHANGE LLC OFFICE OF HEARING OFFICERS

Lecture 13: Requirements Analysis

Ethical and Legal Issues of Design ELEC 421

Claiming compensation after an accident at work. A guide to help you and your family get the most from your claim

Unhealthy Relationships: Top 7 Warning Signs By Dr. Deb Schwarz-Hirschhorn

Clear Your Path To Resolving Conflicts, #2

Tough Questions and Answers

Incident at Morales. Fred: Chemical Engineer hired by Phaust to design a new plant to manufacture a new paint remover

Risk and Implementing Innovative Research Solutions

Dependable Computer Systems

Detailed Instructions for Success

Anita Pizycki, Professional Development Coach Professional Coaching Company

The Finding Respect and Ending Stigma around HIV (FRESH) Study Intervention Post-Workshop Survey Community Participants

The Open Disclosure Meeting Sample Language to assist in Open Disclosure Discussions (including language to avoid when apologising)

Legal Compliance Education and Awareness. Coroners Act (South Australian)

Game Theory and Economics Prof. Dr. Debarshi Das Humanities and Social Sciences Indian Institute of Technology, Guwahati

PROFESSIONAL COMPETENCE IN CURRENT STRUCTURAL DESIGN

The Seven Deadly Sins of Sales

EE (3L-1.5P) Analog Electronics Department of Electrical and Computer Engineering Fall 2015

Masao Mukaidono Emeritus Professor, Meiji University

GE105: Introduction to Engineering Design The Engineering Profession

ABF Alerting Regulations

COMPONENT II CANDIDATE STUDY GUIDE PEDIATRIC DENTISTRY

LESSON 6. The Subsequent Auction. General Concepts. General Introduction. Group Activities. Sample Deals

H5ST 04 (SCDHSC0370) Support the Use of Technological Aids to Promote Independence 1

Motivation. Founding Sponsor. upskillsforwork.ca

TIPS FOR COMMUNICATING WITH CRIME VICTIMS

Lecture #4: Engineering as Social Experimentation

Primary IVF Conditions for Registration For Assisted Reproductive Treatment Providers under the Assisted Reproductive Treatment Act 2008

Candidate Interview Preparation

HOW TO APPLY FOR A TEAM

Ethics in Materials Engineering

This presentation is on Avoiding Plagiarism in your academic writing. It has been designed by the Robert

Dr. Abi-El-Mona/ClinPrac/Sp10

CEOCFO Magazine. Pat Patterson, CPT President and Founder. Agilis Consulting Group, LLC

Policies for the Commissioning of Health and Healthcare

JONAH A 28-DAY DEVOTIONAL

THE AHA MOMENT: HELPING CLIENTS DEVELOP INSIGHT INTO PROBLEMS. James F. Whittenberg, PhD, LPC-S, CSC Eunice Lerma, PhD, LPC-S, CSC

Comprehensive Rules Document v1.1

GRECT. Graham s Rules for Effective Courtroom Testimony

Week 2 Class Notes 1

COOPER POWER SERIES. Upgrade instructions for CL-6 series control firmware. Voltage Regulators MN225071EN

NEGOTIATING A NEW ARTISTS MANAGER BASIC AGREEMENT Separating Fact from Fiction. Deadline

DELEGATE WORKSHEET: ASKING PEOPLE TO JOIN OUR UNION

Personal Independence Payment (PIP) assessments. How to make suggestions, comments and complaints

38. Looking back to now from a year ahead, what will you wish you d have done now? 39. Who are you trying to please? 40. What assumptions or beliefs

CODE OF CONDUCT. STATUS : December 1, 2015 DES C R I P T I O N. Internal Document Date : 01/12/2015. Revision : 02

10 Ways To Be More Assertive In Your Relationships By Barrie Davenport

Date Started: Date Completed: VIRTUES EXERCISE: Instructions and Definitions

DIE EMPTY THE WORKBOOK

DISCIPLINE COMMITTEE OF THE COLLEGE OF NURSES OF ONTARIO. PANEL: April Plumton, RPN Chairperson Karen Laforet, RN Barbara Titley, RPN

Ignite the magic in your business. by Angella Johnson

The role of trade unions in promoting safer machinery

Human-Computer Interaction IS 4300

THIRD-HAND PLAY AGAINST NOTRUMP CONTRACTS

The Fear Eliminator. Special Report prepared by ThoughtElevators.com

CPS331 Lecture: Heuristic Search last revised 6/18/09

Week 7: Life of Tyler

Terms and Conditions

24 HOUR ANGER EMERGENCY PLAN

Terms and conditions APPROVED DOCUMENT. Clear design Simple language

Human Factors Points to Consider for IDE Devices

ALL YOU SHOULD KNOW ABOUT REVOKES

After putting your best work and thoughts and

Automated Software Engineering Writing Code to Help You Write Code. Gregory Gay CSCE Computing in the Modern World October 27, 2015

INFORMATION PACKAGE For CLIENTS

responsiveness. Report. Our sole Scope of work period; Activities outside the Statements of future Methodology site level); Newmont; 3.

16 Channel Semi Fiscal Distribution Board Smart Meter

SINAMICS drives SINAMICS DCM. DC converters from 6 kw to 2500 kw for variable-speed direct-current drives

S17Y1593. IN THE MATTER OF JOHN F. MEYERS. This disciplinary matter is before the Court on the report of the Review

Tips for Giving and Receiving Feedback

It Can Wait By Megan Lebowitz. Scene One. (The scene opens with Diana sitting on a chair at the table, texting. There are four chairs at the table.

Focusing Software Education on Engineering

Balancing Teaching and Research

Don t shoot until you see the whites of their eyes. Combat Policies for Unmanned Systems

Splendid Speaking Podcasts

Employment Application

ARGUING THE SAFETY OF MACHINE LEARNING FOR HIGHLY AUTOMATED DRIVING USING ASSURANCE CASES LYDIA GAUERHOF BOSCH CORPORATE RESEARCH

Major Judicial Precedents of Business Method-Related Inventions

Lesson 2. Overcalls and Advances

Transcription:

Ethics Paul Jackson School of Informatics University of Edinburgh

Required reading from Lecture 1 of this course was Compulsory: Read the ACM/IEEE Software Engineering Code of Ethics: https: //ethics.acm.org/code-of-ethics/software-engineering-code/ and think about cases where the principles might conflict. If you didn t do it then, or if you did and have forgotten it, consider this a reminder. The short version starts: Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers shall adhere to the following Eight Principles: 2 / 11

Principles from the short version of the Code: 1. PUBLIC - Software engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - Software engineers shall act in a manner that is in the best interests of their client and employer consistent with the public interest. 3. PRODUCT - Software engineers shall ensure that their products and related modifications meet the highest professional standards possible. 4. JUDGMENT - Software engineers shall maintain integrity and independence in their professional judgment. 5. MANAGEMENT - Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance. 6. PROFESSION - Software engineers shall advance the integrity and reputation of the profession consistent with the public interest. 7. COLLEAGUES - Software engineers shall be fair to and supportive of their colleagues. 8. SELF - Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession. 3 / 11

Why? Therac-25 Generally when software contributes to bad outcomes the situation is complex, and allocation of blame is difficult. E.g. something else also had to go wrong to cause the bad outcome (Ariane 5) or it isn t clear what role software played (Chinook FADEC). The Therac-25 incident is one of relatively few cases where it is clear that software errors failures of the software engineering process caused people s deaths. 4 / 11

What happened I Therac-25 was a medical linear accelerator it could produce beams of electrons or X-rays to treat tumours. Earlier versions used software as a convenience, on top of hardware that could stand alone. In particular, they had hardware safety controls. Key danger: the machine s raw electron beam is harmful. It must be treated to produce either a safe electron beam or a safe X-ray beam. This involves a turntable being correctly positioned. It wasn t. 5 / 11

What happened II 1. Original safety feature: the machine s settings were made manually, then reentered at a terminal. The computer checked for a match. Operators thought it inefficient to reenter the data. Replaced by a hitting return version. 2. 2.1 Reports of errors were frequent. 2.2 Operators were told in training that the machine was safe. 2.3 Error messages were cryptic. 2.4 It was possible to respond to an error with a proceed. So operators did ignore and override error reports. 3. Unprotected shared data race conditions. Result: malfunctions that appeared only on particular, fast editing sequences involving the up-arrow key. 6 / 11

The consequences Between 1985 and 1987 at least 6 people were seriously over-treated. At least 3 died. 7 / 11

Root causes Software was regarded as safe, compared to hardware. The manufacturer made unjustified and wildly optimistic claims about how unlikely errors were, which misled clinicians. Poor software specification. Lack of defensive design. Poor software testing. Incident reporting was not systematic 8 / 11

Improving practice Technical fixes, e.g.: there should have been an independent, simple, verifiable double-check of the safety of what the machine was about to do. Process fix, e.g.: software should have been regarded as risky, and specified and verified accordingly. 9 / 11

Ethical angle The ACM/IEEE code of ethics was violated, for example because: 1. PUBLIC - AECL employees failed 1.06. Be fair and avoid deception in all statements, particularly public ones, concerning software or related documents, methods and tools. e.g. by claiming it was impossible for Therac-25 to overdose patients. 3. PRODUCT - they failed 3.10. Ensure adequate testing, debugging, and review of software and related documents on which they work. ; testing was severely inadequate. 6. PROFESSION - they failed 6.07. Be accurate in stating the characteristics of software on which they work, avoiding not only false claims but also claims that might reasonably be supposed to be speculative, vacuous, deceptive, misleading, or doubtful. We could go on - exercise. 10 / 11

Reading Required: obvious, the ACM/IEEE Code of Ethics if you ve forgotten it - see Lecture 1. Suggested: Nancy Leveson s paper on the Therac-25 accidents. 11 / 11