| Both sides previous revision Previous revision Next revision | Previous revision |
| report:eth [2026/04/12 21:53] – [Responsible behaviour design] team1 | report:eth [2026/04/12 22:04] (current) – [Introduction] team1 |
|---|
| |
| ==== Introduction ==== | ==== Introduction ==== |
| |
| This chapter examines the role of ethics in both moral philosophy and engineering practice. It begins by introducing deontological ethics, a duty-based approach to moral reasoning that focuses on following universal moral principles when deciding what is right or wrong. The discussion presents key ideas developed by Immanuel Kant, including moral obligation and the categorical imperative. It also briefly considers recent scientific perspectives on moral decision-making. | This chapter examines the role of ethics in both moral philosophy and engineering practice. It begins by introducing deontological ethics, a duty-based approach to moral reasoning that focuses on following universal moral principles when deciding what is right or wrong. The discussion presents key ideas developed by Immanuel Kant, including moral obligation and the categorical imperative. It also briefly considers recent scientific perspectives on moral decision-making. |
| |
| |
| === Understanding the Engineering Code of Ethics === | === Understanding the Engineering Code of Ethics === |
| A well-known example of engineering ethics is the code of ethics developed by the National Society of Professional Engineers. This code outlines the main responsibilities that engineers are expected to follow in their professional work. | A well-known example of engineering ethics is the code of ethics developed by the National Society of Professional Engineers (NSPE). This code outlines the main responsibilities that engineers are expected to follow in their professional work. |
| |
| According to the National Society of Professional Engineers, engineers should prioritize public safety, health, and welfare, and only carry out work in areas where they have the necessary knowledge and skills. They are also expected to communicate honestly, avoid deceptive actions, and act responsibly toward clients, employers, and the public. | According to the National Society of Professional Engineers (NSPE), engineers should prioritize public safety, health, and welfare, and only carry out work in areas where they have the necessary knowledge and skills. They are also expected to communicate honestly, avoid deceptive actions, and act responsibly toward clients, employers, and the public. |
| |
| In addition to these core principles, the code includes further professional obligations that help guide ethical decision-making in different situations. These standards are important because they help engineers maintain professional integrity and protect public trust in the engineering field [(vector2025)]. | In addition to these core principles, the code includes further professional obligations that help guide ethical decision-making in different situations. These standards are important because they help engineers maintain professional integrity and protect public trust in the engineering field [(vector2025)]. |
| Although most persuasive technology research focuses on users, designers also have a responsibility to consider the wider effects of the system. In this project, that means making sure that any interaction linked to the plant still allows it to grow in healthy and safe conditions. | Although most persuasive technology research focuses on users, designers also have a responsibility to consider the wider effects of the system. In this project, that means making sure that any interaction linked to the plant still allows it to grow in healthy and safe conditions. |
| === Data privacy === | === Data privacy === |
| | The system collects screen-time data through an associated application. Because this information is linked to users’ daily habits, ethical data management is an important part of the design. Users should clearly understand what data is being collected, how it will be stored, and how it will be used. Data collection should only begin after informed consent is given, and the system should avoid collecting sensitive personal information unless it is necessary for the system to work properly. |
| |
| The system collects information related to screen-time usage through an associated application. Ethical data management requires that users are informed about what data is collected, how it is stored, and how it is used. Users should provide informed consent before data collection begins, and the system should minimize data storage whenever possible. Sensitive personal information should not be collected unless strictly necessary for the system's functionality. | Even with these principles, privacy and security challenges can still arise when this type of system is used in a home smart farming environment. Many of these systems rely on low-cost Internet of Things (IoT) devices, which often have limited processing power and weaker built-in security. This can make them more vulnerable to cyber threats. |
| Despite these principles, security and privacy challenges can arise when such systems are implemented in home-based smart farming environments. These systems rely on low-cost Internet of Things (IoT) devices, which often have limited computational power and weak security features, making them vulnerable to cyber threats. | |
| |
| == Threats == | == Threats == |
| | One of the main concerns is the sensitivity of screen-time data. If this information is accessed without permission, it may reveal users’ routines, habits, and daily schedules. In addition, the system also collects environmental data such as soil moisture, temperature, humidity, and light levels to support plant growth. |
| |
| These vulnerabilities can be grouped into several key threat categories. Screen-time data is particularly sensitive because it reflects users’ daily routines. If accessed without authorization, it can reveal personal habits and schedules. In addition, home smart farming systems continuously collect environmental data such as soil moisture, temperature, humidity, and light levels to support plant growth. Although this data appears non-sensitive, it can indirectly reveal user presence and lifestyle patterns when analyzed over time. | Although this environmental data may seem less sensitive, it can still reveal patterns about user behaviour or home occupancy when collected over time. Because of this, the system may be exposed to risks such as unauthorized access, data interception, or manipulation of sensor readings. For example, false soil moisture data could cause incorrect irrigation, which may harm plant health and reduce system reliability [(rodrigo2013)],[(luis2019)]. |
| These systems are especially vulnerable to attacks such as unauthorized access, data interception, and manipulation of sensor data. For example, altering soil moisture readings can lead to incorrect irrigation, which may negatively affect plant health. Such risks are increased by the lack of strong encryption, secure authentication, and regular updates in many IoT devices [(rodrigo2013)],[(luis2019)]. | |
| However, applying strong encryption to all data transmissions is not always practical. In resource-constrained IoT devices, full encryption can significantly increase energy consumption and reduce system efficiency. This highlights the trade-off between security and energy efficiency, requiring a balanced approach [(jaewook2017)]. | At the same time, improving security in IoT systems is not always simple. Strong encryption can improve protection, but in low-power devices it may also increase energy use and reduce system efficiency. This creates an important trade-off between security and energy consumption, which needs to be considered carefully [(jaewook2017)]. |
| |
| == Strategies == | == Strategies == |
| | To reduce these risks, several practical strategies can be applied. |
| |
| To address these challenges, several strategies can be implemented. | First, lightweight encryption methods can help protect important data while keeping energy use low. A balanced approach should also be used for data protection. More sensitive information, such as screen-time data, should have stronger security, while less sensitive environmental data can use lighter protection methods. |
| - Lightweight cryptographic methods should be used to provide adequate security while minimizing energy usage. | |
| - Data prioritization should be applied: sensitive data such as screen-time information should receive stronger protection, while less sensitive environmental data can use lighter security mechanisms. | Second, edge computing can improve both privacy and efficiency by processing data locally instead of constantly sending it to external servers. Sending data in batches rather than continuously can also reduce communication frequency and save energy. |
| - Edge computing should be utilized to process data locally, reducing the need for constant data transmission and lowering both security risks and energy consumption. Additionally, batch data transmission can reduce the frequency of communication and further conserve energy. | |
| - Transparency is essential. Users should be able to clearly understand how their data is collected and used. This can be achieved through user dashboards, real-time notifications, and simplified privacy policies, which support informed consent and user control. | Finally, transparency and system maintenance are essential. Users should be able to easily understand how their data is collected and used through clear privacy settings, simple policies, and notifications. Regular software updates, strong authentication methods, and anomaly detection systems should also be included to improve overall security. For example, unusual soil moisture patterns could help detect possible cyberattacks or system faults before serious problems occur. |
| - Regular software updates, strong authentication mechanisms, and anomaly detection systems should be implemented to maintain system security. Detecting unusual patterns in sensor data, such as abnormal soil moisture levels, can help identify potential attacks or system failures. | |
| === Professional competence === | === Professional competence === |
| |
| Professional competence refers to the ability of engineers to carry out their work responsibly and effectively while adhering to established standards and ethical principles. Engineers are expected to follow professional standards and codes of ethics. This includes designing systems that prioritize user safety, privacy, and reliability. Following recognized engineering principles ensures that the system is developed in a responsible and systematic manner, and that potential risks are identified and mitigated during the design process. | Professional competence means that engineers have the knowledge and skills needed to carry out their work safely, responsibly, and effectively. In engineering projects, this also means following professional standards and ethical principles throughout the design process. |
| | |
| | For this system, professional competence is important because the design involves electronics, water, sensors, and user-related data. Engineers need to make sure that the system is safe, reliable, and suitable for its intended use. This includes considering user safety, protecting privacy, and reducing possible risks during both development and operation. |
| | |
| | Professional competence also means recognizing the limits of one’s own knowledge. If a problem goes beyond an engineer’s expertise, it is important to seek support, collaborate with others, or consult relevant technical standards. This helps reduce mistakes and improves the overall quality of the system. |
| |
| In addition, professional competence involves understanding the limits of one’s expertise and seeking appropriate support or collaboration when necessary. Engineers must engage in continuous learning to keep up with rapidly evolving technologies and ensure that their knowledge remains up to date. Furthermore, thorough testing and validation are required to confirm that the system operates correctly under various conditions. | In addition, engineers should continue updating their knowledge as technologies develop. Since systems like this depend on sensors, automated control, and digital applications, keeping up with new technologies is important for making informed design decisions. |
| |
| By maintaining professional competence, engineers can enhance the quality and performance of their systems while fulfilling their ethical responsibility to protect users and maintain public trust. | Finally, proper testing and validation are essential. The system should be tested under different conditions to make sure it works correctly and safely. By maintaining professional competence, engineers can improve system performance while also meeting their ethical responsibility to protect users and maintain public trust. |
| |
| ==== Sales and Marketing Ethics ==== | ==== Sales and Marketing Ethics ==== |