<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Teaching of Technology IS Teaching of Ethics. But How?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Short paper</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Norberto Patrignani</string-name>
          <email>1norberto.patrignani@polito.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Iordanis Kavathatzopoulos</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Politecnico of Torino</institution>
          ,
          <addr-line>Torino</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Uppsala University</institution>
          ,
          <addr-line>Uppsala</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <fpage>108</fpage>
      <lpage>114</lpage>
      <abstract>
        <p>Computer experts, or computer professionals, they know how a system is made and how it works: it's time to ask how to design it, who will use it, for what purposes? Up to the crucial question: whether to design it (or not). For reaching this awareness they need a strong ethical competence, but how can they reach this competence? Introducing an analysis of the stakeholders' network in computer ethics courses for future designers can be a useful starting point.</p>
      </abstract>
      <kwd-group>
        <kwd>Computer Ethics</kwd>
        <kwd>Teaching Ethics</kwd>
        <kwd>Slow Tech</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Information and Communication Technologies (ICT) are now strictly intertwined with
society and are critically impacting also the environment. In the last twenty years the
importance of improving the curriculum of computer science with an ethics component
has been growing and it is now largely recognized. The question still open is: while the
technical part of the curriculum is quite easy to delineate, what is the best way for the
introduction of the "computer ethics" part, where the social and ethical implications of
the design choices are inserted? This part has now to face the enormous challenges of
the entire ICT supply chain (from design to development, manufacturing, usage,
deployment, and disposal).</p>
      <p>
        The Slow Tech concept, an ICT that is good, clean and fair, could provide some
guidance in this direction
        <xref ref-type="bibr" rid="ref13">(Patrignani, 2020)</xref>
        . Also, computer professionals should be
able to "enlarge" their view by including the most important stakeholders involved in
the systems' design and deployment, being able to identify the relationships among
them and, most importantly the quality of these relationships: are they equal? Are they
based on reciprocity?
      </p>
      <p>
        Since technology is not neutral, and technology and society co-shape each other
        <xref ref-type="bibr" rid="ref7">(Johnson, 1985)</xref>
        , the designers of computer systems and digital services should enlarge
their view from the technical details to the social complexity around them.
      </p>
      <p>This is the background of the main claim of this short paper: teaching about
technology means teaching about ethics. In the XXI century, cultivating technical</p>
      <p>Copyright © 2021 for this paper by its authors.</p>
      <p>Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0)
competences, considering science and technology as neutral, it does not make sense
anymore.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Teaching of technology is teaching of ethics</title>
      <p>
        The refusal of the techno-determinism has been proposed since the beginning of the
XXth century
        <xref ref-type="bibr" rid="ref10 ref5">(Mumford, 1934; Ellul, 1954)</xref>
        . The dawn of computer age also was seen
as a starting point of a controversial relationship between technology and society
        <xref ref-type="bibr" rid="ref17">(Wiener, 1950)</xref>
        . It is with Weizenbaum, a computer science professor at MIT in the
'60s, that arose the critique about the use of computer in military applications and the
risks of their abuse in any field of society
        <xref ref-type="bibr" rid="ref16">(Weizenbaum, 1976)</xref>
        . Despite these early
warnings, ICT and the digital world have been seen as an "innovation", and society was
considered always late in this race. Even the very definition of computer ethics provided
by Moor defines it as an attempt to fill a "policy vacuum" about how computer
technology should be used
        <xref ref-type="bibr" rid="ref9">(Moor, 1985)</xref>
        , but technology in itself and how it is
designed, developed, and deployed, was never questioned.
      </p>
      <p>
        It is with the works of Johnson that the possibility of shaping technology by the
designers is introduced: technology is not neutral, technology and society co-shape each
other, and the systems should be defined as "socio-technical systems"
        <xref ref-type="bibr" rid="ref7">(Johnson, 1985)</xref>
        .
Then, an even more difficult question arises: if computer professionals can steer
sociotechnical systems, what is the "right" direction?
      </p>
      <p>
        Since then, several scholars proposed interesting approaches. Just to mention a few
of them: the "value-sensitive design"
        <xref ref-type="bibr" rid="ref11 ref6">(Friedman, 1996; Nissenbaum, 1998)</xref>
        where
human values are inserted in the design of tools and technology to support human
"flourishing"; the "participatory design" (
        <xref ref-type="bibr" rid="ref12">Nygaard, 1996</xref>
        ;
        <xref ref-type="bibr" rid="ref2">Bodker et al. 1987</xref>
        ), where
the users, who are going to use the systems under development, participate as
codesigners in the design process); the view of design as "ethics by other means"
        <xref ref-type="bibr" rid="ref14">(Verbeek, 2011; 2017)</xref>
        , where design is seen as an inherently moral activity and
designers are seen as technological "mediators". In line with these transparent and
cooperative view of design, the Slow Tech approach proposes to focus on the "process
of decision making" rather than on outcomes, a "philosophizing" approach to ethics.
Several studies are focused on the importance of the process of ethical decision making,
where the path that it takes to reach conclusions is more important than the conclusions
themselves
        <xref ref-type="bibr" rid="ref8">(Kavathatzopoulos, 2012)</xref>
        .
      </p>
      <p>It is a form of a "proactive ethics", where designers are suggested three fundamental
questions. The first one: is (the system under development) "good"? That is: is it
designed with a human-centered approach and for "desirable" goals? The second one:
is it "clean"? That is: is it "sustainable" by minimizing the environmental impact? The
third one: is it "fair"? That is: is "ethically acceptable" and taking into account the
working conditions of all people involved alongside the entire ICT supply chain (from
mines in Africa to manufacturing places in South Asia)?</p>
      <p>Alongside these three questions, the core question is: how can be improved the
ethical competences and skills of computer professionals and designers? The Slow
Tech approach suggests to design the stakeholders' network. This is an attempt to
enlarge the context of technology view and it is fruitful if used for facing a complex
case study or a real scenario. The design of the stakeholders' network means a graph
with nodes (the stakeholders) and connections (the relationships). The analysis of this
network, in particular the relationships, can be useful for the identification of potential
ethical issues, and for cultivating the "ars interrogandi" of students.</p>
    </sec>
    <sec id="sec-3">
      <title>Analysis of the stakeholders' network</title>
      <p>The ICT stakeholders' network related to a digital system is a complex one. Usually it
is a value-chain that is a global network of companies and stakeholders (see Fig.1). At
the center of the network there are always three nodes: the "technology developers"
(usually ICT vendors, the ones dedicated to developing ICT), the "users", and the
"policy makers".</p>
      <p>Then this "core" network can be enlarged by including all connected entities related
to the case under analysis or the system that is going to be developed. When there are
enough stakeholders and connections, a reflection time is required for looking at all
these relationships. The focus here is on the arcs or lines connecting the nodes (e.g. the
arc connecting the provider of an online service and the user of the service).</p>
      <p>
        The fundamental question here is: what kind of relationship is there? In order to
qualify this relationship, it is necessary to analyse it in depth: is it "symmetrical"? What
kind of meanings and values are embedded in this relationship in terms of power,
dimension, role, values, and desires? In this reflection time the students, the computer
professionals (or the future systems' designers) can identify possible conflicts and
ethical dilemmas. They can look at the relationship from many points of view, at least:
the developers, the users, and the policy makers point of view.
When comparing two entities, like the two stakeholders connected under analysis,
usually the first approach is to evaluate the "quantitative" side ("equal", "greater than",
or "minor then") but in this case can be more fruitful a "qualitative" approach. Since
the analysis of the two connected entities has the goal of identifying possible ethical
dilemmas, it is preferred to use the so called "comparative" approach used by humans'
mind when comparing two entities in general. This is also the suggested method by
psychologists and minds' researchers
        <xref ref-type="bibr" rid="ref1">(Baussano, 1985)</xref>
        .
      </p>
      <p>With this approach, the two entities can be seen as two sets (X and Y) that in general
can exist or not and can be overlapped in several ways. In order to identify all the
possible configurations and relationships, it can be helpful to see the three instrumental
subsets: α (alpha: the intersection of the two set X and Y), δX (delta X: the part of X
non intersecting Y) and δY (the part of Y non intersecting X). It is easy to see that all
the possible kind of relationships are eight, all the configurations of three binary entities
(see Fig.2).</p>
      <p>When alpha is zero (the four first configurations) the relationship is quite "different":
X and Y do not exist at all (000), only Y exists (001), only X exists (010), and X and Y
exist but have no relationship at all (011).</p>
      <p>When alpha is one (the four last configurations) the relationship become interesting:
alpha=X=Y (the two stakeholders melt into the same entity: 100), alpha is X (the set Y
"dominates" X: 101), alpha is Y (the set X "dominates" Y: 110), alpha is indeed part of
X and Y (the more "equilibrated" relationship: 111). Looking at real cases, it is easy to
see the related configuration.</p>
      <p>For example, when the two stakeholders have no relationship (011), even if they are
both present in the stakeholders' network, then this can be the case for a "remote"
connection, that is, there is not a direct relationship. For reaching one node from the
other there is the need to cross intermediary nodes (a user of an online service has no
direct relationship with the designer of the software, but the computer professional is
part of the company providing the service).</p>
      <p>Also interesting is the case of the two stakeholders melt into the same entity (100),
the simple real case could be a "merge and acquisition" among two companies, or a
"one man company" providing online services to users, etc.</p>
      <p>The two symmetrical cases where one stakeholder "dominates" the other (101, 110)
is a very common situation of a "power" relationship: one stakeholder is "stronger" than
the other and, if not regulated by some kind of "soft" or "hard" law, the relationship
risks to be unfair or with subtle ethical issues. A well-known situation like this is the
computer professional working for a large tech company.</p>
      <p>
        The last case, where the relationship looks "equilibrated" (111), is indeed the most
common. Often the intersection among the two stakeholders requires further
investigations: is the relationship based on a "fair" contract? Can the two stakeholders
really exercise the theoretical autonomy? What level of reciprocity is present in the
relationship? For example, a user and an online service provider have a clear
relationship but is it reciprocal? Has the user the possibility to check what kind of
personal data and information the online company is managing? Is the online service
wrapping the user with a kind of "information bubble"? Is it monitoring the user
behavior by means of artificial intelligence applications for pushing her toward
purchasing activities or some politically interested entities
        <xref ref-type="bibr" rid="ref3">(CHT, 2021)</xref>
        ? What kind of
autonomy has the user in front of one of the "titans" of the Web?
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Case study: the artificial retina stakeholders' network</title>
      <p>
        For many researchers, the main obstacle to a deep ethical reflection around their work
is the lack of time. Most of them are enforced to publish continuously and are just
concentrated on the narrow field of science and technology they are involved with. An
example is the recent area of research around the new material called graphene. It's a
two-dimensional material with unique properties. One of the many interesting potential
new applications of graphene is as an "artificial retina", a futuristic eye implant
        <xref ref-type="bibr" rid="ref4">(Choi
et al., 2017)</xref>
        . Many young researchers are excited to this future potential application for
people with visual impairments and start a deep dive into the physical properties of the
material losing the view of the application field, of the users, policy makers, in general
they devote very little time to the relationship with society. The stakeholders' network
gives them the opportunity to enlarge their view to the very large landscape of entities
involved in the artificial retina application (Fig.3).
      </p>
      <p>This simple exercise enables them to dedicate time for applying the comparative
approach proposed in this short paper to the collection of relationships identified. for
example: what kind of relationship is the one between graphene technology and users?
With graphene manufacturers? With the environment? With the National Healts
Systems? Are they "equilibrated" (of the kind "111" in the comparative approach
described above) relationships?
5</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>This short paper describes a simple approach for introducing tools for analysing the
ICT stakeholders' network. This analysis is useful for reflecting on the relationships
among the stakeholders and for identifying ethical issues. In a "computer ethics" course,
this methodology, together with the Slow Tech questions (is it good, clean, and fair?)
could be helpful for improving the ethical competences and skills of future computer
professionals.
114</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Baussano</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>1985</year>
          ).
          <article-title>Psicanalisi in fabbrica</article-title>
          .
          <source>Bollati Boringhieri.</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Bødker</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ehn</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kammersgaard</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kyng</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Sundblad</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>1987</year>
          ).
          <article-title>A utopian experience</article-title>
          . In G.Bjerknes,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ehn &amp; M.Kyng</surname>
          </string-name>
          (eds.),
          <article-title>Computers and democracy a Scandinavian challenge</article-title>
          (pp.
          <fpage>251</fpage>
          -
          <lpage>278</lpage>
          ), Gower Publishing.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>CHT</surname>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Center for Humane Technology</article-title>
          . https://www.humanetech.com
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Choi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Choi</surname>
            ,
            <given-names>M.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          et al. (
          <year>2017</year>
          ).
          <article-title>Human eyeinspired soft optoelectronic device usinghighdensity MoS2graphene curved image sensor array</article-title>
          .
          <source>Nature Communications</source>
          ,
          <volume>8</volume>
          ,
          <fpage>1664</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Ellul</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>1954</year>
          ).
          <article-title>La technique ou l'enjeu du siècle</article-title>
          .
          <source>Armand.</source>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Friedman</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>1996</year>
          ).
          <source>Value Sensitive Design. Interactions</source>
          ,
          <volume>3</volume>
          (
          <issue>6</issue>
          ). ACM Digital Library.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Johnson</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>1985</year>
          ). Computer Ethics. Pearson.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Kavathatzopoulos</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>Assessing and acquiring ethical leadership competence</article-title>
          . In G.P.
          <string-name>
            <surname>Prastacos</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Wang</surname>
          </string-name>
          &amp;
          <string-name>
            <surname>K.E. Soderquist</surname>
          </string-name>
          (eds.),
          <article-title>Leadership through the classics: leadership and management in a changing world lessons from ancient eastern and western</article-title>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Moor</surname>
            ,
            <given-names>J.H.</given-names>
          </string-name>
          (
          <year>1985</year>
          ). What is computer ethics? Metaphilosophy,
          <volume>16</volume>
          (
          <issue>4</issue>
          ),
          <fpage>266</fpage>
          -
          <lpage>275</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Mumford L.</surname>
          </string-name>
          (
          <year>1934</year>
          ).
          <article-title>Technics and civilization</article-title>
          . Harcourt.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Nissenbaum H.</surname>
          </string-name>
          (
          <year>1998</year>
          ).
          <article-title>Values in the design of computer systems</article-title>
          . Computers in Society,
          <volume>28</volume>
          (
          <issue>1</issue>
          ),
          <fpage>38</fpage>
          -
          <lpage>39</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Nygaard</surname>
            <given-names>K.</given-names>
          </string-name>
          (
          <year>1996</year>
          ).
          <article-title>Those were the days</article-title>
          .
          <source>Scandinavian Journal of Information Systems</source>
          ,
          <volume>8</volume>
          (
          <issue>2</issue>
          ),
          <fpage>91</fpage>
          -
          <lpage>108</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Patrignani</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Teaching Computer Ethics</article-title>
          .
          <article-title>Steps towards Slow Tech, a Good, Clean, and Fair ICT</article-title>
          .
          <article-title>Uppsala: Acta Universitatis Upsaliensis</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>Verbeek</surname>
            ,
            <given-names>P.P.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Moralizing technology: understanding and designing the morality of things</article-title>
          . University of Chicago Press.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Verbeek</surname>
            ,
            <given-names>P.P.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Designing the morality of things: the ethics of behaviour guiding technology</article-title>
          . In J. van den Hoven,
          <string-name>
            <given-names>S.</given-names>
            <surname>Miller</surname>
          </string-name>
          &amp; T. Pogge (eds.),
          <source>Designing in ethics (78- 94)</source>
          , Cambridge University Press.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>Weizenbaum</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>1976</year>
          ).
          <article-title>Computer power and human reason: from judgment to calculation</article-title>
          . Freeman.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Wiener</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>1950</year>
          ).
          <article-title>The human use of human beings</article-title>
          . The Riverside Press.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>