for Journals by Title or ISSN
for Articles by Keywords
help
  Subjects -> ENGINEERING (Total: 1964 journals)
    - CHEMICAL ENGINEERING (151 journals)
    - CIVIL ENGINEERING (148 journals)
    - ELECTRICAL ENGINEERING (81 journals)
    - ENGINEERING (1120 journals)
    - ENGINEERING MECHANICS AND MATERIALS (293 journals)
    - HYDRAULIC ENGINEERING (45 journals)
    - INDUSTRIAL ENGINEERING (52 journals)
    - MECHANICAL ENGINEERING (74 journals)

ENGINEERING (1120 journals)            First | 5 6 7 8 9 10 11 12 | Last

Matériaux & Techniques     Full-text available via subscription   (Followers: 1)
Mathematical Models and Methods in Applied Sciences     Hybrid Journal   (Followers: 2)
Mathematical Problems in Engineering     Open Access   (Followers: 3)
Mathematics of Control, Signals, and Systems (MCSS)     Hybrid Journal   (Followers: 3)
Mauerwerk     Hybrid Journal  
Measurement     Hybrid Journal   (Followers: 1)
Measurement Science Review     Open Access   (Followers: 1)
Meccanica     Hybrid Journal   (Followers: 1)
Mechatronics     Hybrid Journal   (Followers: 4)
Medical and Biological Engineering and Computing     Hybrid Journal   (Followers: 2)
Medical Engineering & Physics     Hybrid Journal   (Followers: 9)
Membrane Science and Technology     Full-text available via subscription   (Followers: 2)
Membrane Technology     Full-text available via subscription   (Followers: 1)
Memetic Computing     Hybrid Journal  
Metal Powder Report     Full-text available via subscription   (Followers: 2)
Metallurgist     Hybrid Journal   (Followers: 2)
Metaphysica     Hybrid Journal   (Followers: 1)
Metascience     Hybrid Journal   (Followers: 1)
Metrologia     Full-text available via subscription   (Followers: 1)
Microelectronic Engineering     Hybrid Journal   (Followers: 4)
Microelectronics International     Hybrid Journal  
Microelectronics Journal     Hybrid Journal   (Followers: 3)
Microelectronics Reliability     Hybrid Journal   (Followers: 6)
Microfluidics and Nanofluidics     Hybrid Journal   (Followers: 9)
Micromachines     Open Access   (Followers: 1)
MNASSA : Monthly Notes of the Astronomical Society of South Africa     Full-text available via subscription   (Followers: 1)
Modelling and Simulation in Engineering     Open Access   (Followers: 4)
Modern Applied Science     Open Access   (Followers: 1)
Molecular BioSystems     Full-text available via subscription   (Followers: 1)
Molecular Engineering     Hybrid Journal  
Molecular Pharmaceutics     Full-text available via subscription   (Followers: 8)
MRS Bulletin     Full-text available via subscription   (Followers: 5)
MRS Online Proceedings     Full-text available via subscription   (Followers: 1)
Multiagent and Grid Systems     Hybrid Journal  
Multidimensional Systems and Signal Processing     Hybrid Journal  
NANO     Hybrid Journal   (Followers: 6)
Nano Letters     Full-text available via subscription   (Followers: 40)
Nano Research     Hybrid Journal   (Followers: 3)
Nano Reviews     Open Access   (Followers: 15)
Nanopages     Full-text available via subscription   (Followers: 1)
Nanoscale and Microscale Thermophysical Engineering     Hybrid Journal   (Followers: 3)
Nanoscale Systems : Mathematical Modeling, Theory and Applications     Open Access  
Nanotechnologies in Russia     Hybrid Journal   (Followers: 1)
Nanotechnology     Hybrid Journal   (Followers: 9)
Nanotechnology Magazine, IEEE     Full-text available via subscription   (Followers: 12)
Nanotechnology Reviews     Full-text available via subscription   (Followers: 4)
Natural Hazards     Hybrid Journal   (Followers: 179)
Nature Nanotechnology     Full-text available via subscription   (Followers: 44)
Naval Engineers Journal     Hybrid Journal   (Followers: 3)
NDT & E International     Hybrid Journal   (Followers: 10)
Nexo Revista Científica     Open Access  
Nigerian Journal of Technological Research     Full-text available via subscription  
Nigerian Journal of Technology     Full-text available via subscription  
NIR news     Full-text available via subscription  
Nonlinear Dynamics     Hybrid Journal   (Followers: 5)
Nonlinear Engineering : Modeling and Application     Full-text available via subscription   (Followers: 1)
Nonlinearity     Full-text available via subscription   (Followers: 2)
Nova Scientia     Open Access  
NTM Zeitschrift für Geschichte der Wissenschaften, Technik und Medizin     Hybrid Journal   (Followers: 4)
Nuclear Engineering and Design     Hybrid Journal   (Followers: 11)
Numerical Algorithms     Hybrid Journal   (Followers: 2)
Numerical Heat Transfer, Part A: Applications: An International Journal of Computation and Methodology     Hybrid Journal   (Followers: 5)
Numerical Heat Transfer, Part B: Fundamentals: An International Journal of Computation and Methodology     Hybrid Journal   (Followers: 7)
Ocean Science Journal     Hybrid Journal   (Followers: 3)
Oil and Gas Journal     Full-text available via subscription   (Followers: 10)
Online Journal for Global Engineering Education     Open Access  
Open Journal of Fluid Dynamics     Open Access   (Followers: 3)
Open Journal of Safety Science and Technology     Open Access   (Followers: 2)
Operations Research Letters     Hybrid Journal   (Followers: 4)
Optical Communications and Networking, IEEE/OSA Journal of     Hybrid Journal   (Followers: 3)
Optimization and Engineering     Hybrid Journal   (Followers: 2)
Opto-Electronics Review     Hybrid Journal   (Followers: 1)
OR Spectrum     Hybrid Journal  
Organic Electronics     Hybrid Journal   (Followers: 3)
Ozone Science & Engineering     Hybrid Journal   (Followers: 1)
Papers In Regional Science     Hybrid Journal   (Followers: 6)
Particle & Particle Systems Characterization     Hybrid Journal  
Particulate Science and Technology: An International Journal     Hybrid Journal   (Followers: 1)
Perspectives on Science     Hybrid Journal   (Followers: 4)
Pesquisa Operacional     Open Access  
Pest Management Science     Hybrid Journal   (Followers: 4)
Petroleum Science     Full-text available via subscription   (Followers: 2)
Phase Transitions: A Multinational Journal     Hybrid Journal  
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences     Full-text available via subscription   (Followers: 5)
Physica B: Condensed Matter     Hybrid Journal   (Followers: 4)
Physica C: Superconductivity     Hybrid Journal  
Physica D: Nonlinear Phenomena     Hybrid Journal   (Followers: 3)
Physics of Fluids     Hybrid Journal   (Followers: 22)
Planning News     Full-text available via subscription   (Followers: 3)
Plasma Devices and Operations     Hybrid Journal   (Followers: 3)
Plasma Science and Technology     Full-text available via subscription   (Followers: 2)
Plasmonics     Hybrid Journal  
Platinum Metals Review     Open Access   (Followers: 2)
Polar Research     Open Access   (Followers: 1)
Polar Science     Hybrid Journal   (Followers: 3)
Polímeros: Ciência e Tecnologia     Open Access   (Followers: 1)
Polish Maritime Research     Open Access  
Polymer Engineering & Science     Hybrid Journal   (Followers: 13)
Polymer International     Hybrid Journal   (Followers: 2)
Polymer Science Series A     Hybrid Journal   (Followers: 3)

  First | 5 6 7 8 9 10 11 12 | Last

Journal Cover Science and Engineering Ethics
   [7 followers]  Follow    
   Hybrid Journal Hybrid journal (It can contain Open Access articles)
     ISSN (Print) 1471-5546 - ISSN (Online) 1353-3452
     Published by Springer-Verlag Homepage  [2208 journals]   [SJR: 0.269]   [H-I: 22]
  • Considering the Human Implications of New and Emerging Technologies in the
           Area of Human Security
    • PubDate: 2014-09-01
       
  • Critical Theory as an Approach to the Ethics of Information Security
    • Abstract: Abstract Information security can be of high moral value. It can equally be used for immoral purposes and have undesirable consequences. In this paper we suggest that critical theory can facilitate a better understanding of possible ethical issues and can provide support when finding ways of addressing them. The paper argues that critical theory has intrinsic links to ethics and that it is possible to identify concepts frequently used in critical theory to pinpoint ethical concerns. Using the example of UK electronic medical records the paper demonstrates that a critical lens can highlight issues that traditional ethical theories tend to overlook. These are often linked to collective issues such as social and organisational structures, which philosophical ethics with its typical focus on the individual does not tend to emphasise. The paper suggests that this insight can help in developing ways of researching and innovating responsibly in the area of information security.
      PubDate: 2014-09-01
       
  • Evolution of Different Dual-use Concepts in International and National Law
           and Its Implications on Research Ethics and Governance
    • Abstract: Abstract This paper provides an overview of the various dual-use concepts applied in national and international non-proliferation and anti-terrorism legislation, such as the Biological and Toxin Weapons Convention, the Chemical Weapons Convention and United Nations Security Council Resolution 1540, and national export control legislation and in relevant codes of conduct. While there is a vast literature covering dual-use concepts in particular with regard to life sciences, this is the first paper that incorporates into such discussion the United Nations Security Council Resolution 1540. In addition, recent developments such as the extension of dual-use export control legislation in the area of human rights protection are also identified and reviewed. The discussion of dual-use concepts is hereby undertaken in the context of human- and/or national-security-based approaches to security. This paper discusses four main concepts of dual use as applied today in international and national law: civilian versus military, peaceful versus non-peaceful, legitimate versus illegitimate and benevolent versus malevolent. In addition, the usage of the term to describe positive technology spin-offs between civilian and military applications is also briefly addressed. Attention is also given to the roles civil society and research ethics may play in the governance of dual-use sciences and technologies.
      PubDate: 2014-09-01
       
  • Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing
           Vulnerabilities
    • Abstract: Abstract Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.
      PubDate: 2014-09-01
       
  • Assessing Security Technology’s Impact: Old Tools for New Problems
    • Abstract: Abstract The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.
      PubDate: 2014-09-01
       
  • From Sniffer Dogs to Emerging Sniffer Devices for Airport Security: An
           Opportunity to Rethink Privacy Implications'
    • Abstract: Abstract Dogs are known for their incredible ability to detect odours, extracting them from a “complex” environment and recognising them. This makes sniffer dogs precious assets in a broad variety of security applications. However, their use is subject to some intrinsic restrictions. Dogs can only be trained to a limited set of applications, get tired after a relatively short period, and thus require a high turnover. This has sparked a drive over the past decade to develop artificial sniffer devices—generally known as “chemical sniffers” or “electronic noses”—able to complement and possibly replace dogs for some security applications. Such devices have been already deployed, or are intended to be deployed, at borders, airports and other critical installation security checkpoints. Similarly to dogs, they are adopted for detecting residual traces that indicate either the presence of, or recent contact with, substances like drugs and explosives. It goes without saying that, as with sniffer dogs, the use of artificial sniffer devices raises many sensitive issues. Adopting an ethical and legal perspective, the present paper discusses the privacy and data protection implications of the possible deployment of a hand-held body scanning sniffer for screening passengers at EU airport security checkpoints.
      PubDate: 2014-09-01
       
  • Chemical and Biological Weapons in the ‘New Wars’
    • Abstract: Abstract The strategic use of disease and poison in warfare has been subject to a longstanding and cross-cultural taboo that condemns the hostile exploitation of poisons and disease as the act of a pariah. In short, biological and chemical weapons are simply not fair game. The normative opprobrium is, however, not fixed, but context dependent and, as a social phenomenon, remains subject to erosion by social (or more specifically, antisocial) actors. The cross cultural understanding that fighting with poisons and disease is reprehensible, that they are taboo, is codified through a web of interconnected measures, principal amongst these are the 1925 Geneva Protocol; the Biological Weapons Convention; and the Chemical Weapons Convention. Whilst these treaties have weathered the storm of international events reasonably well, their continued health is premised on their being ‘tended to’ in the face of contextual changes, particularly facing changes in science and technology, as well as the changed nature and character of conflict. This article looks at the potential for normative erosion of the norm against chemical and biological weapons in the face of these contextual changes and the creeping legitimization of chemical and biological weapons.
      PubDate: 2014-09-01
       
  • Protecting Human Health and Security in Digital Europe: How to Deal with
           the “Privacy Paradox”'
    • Abstract: Abstract This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to shed light on the tension between secrecy and transparency in the digital era. A special focus is put from the perspectives of psychology, medical ethics and European law on the contradiction between individuals’ motivations for consented processing of personal data and their fears about unknown disclosure, transferal and sharing of personal data via information and communication technologies (named the “privacy paradox”). Potential benefits and harms for the individual and society resulting from the use of computers, mobile phones, the Internet and social media are being discussed. Furthermore, the authors point out the ethical and legal limitations inherent to the processing of personal data in a democratic society governed by the rule of law. Finally, they seek to demonstrate that the impact of information and communication technology use on the individuals’ well-being, the latter being closely correlated with a high level of fundamental rights protection in Europe, is a promising feature of the socalled “e-democracy” as a new way to collectively attribute meaning to large-scale online actions, motivations and ideas.
      PubDate: 2014-09-01
       
  • On the Spot Ethical Decision-Making in CBRN (Chemical, Biological,
           Radiological or Nuclear Event) Response
    • Abstract: Abstract First responders to chemical, biological, radiological, or nuclear (CBRN) events face decisions having significant human consequences. Some operational decisions are supported by standard operating procedures, yet these may not suffice for ethical decisions. Responders will be forced to weigh their options, factoring-in contextual peculiarities; they will require guidance on how they can approach novel (indeed unique) ethical problems: they need strategies for “on the spot” ethical decision making. The primary aim of this paper is to examine how first responders should approach on the spot ethical decision-making amid the stress and uncertainty of a CBRN event. Drawing on the long-term professional CBRN experience of one of the authors, this paper sets out a series of practical ethical dilemmas potentially arising in the context of a large-scale chemical incident. We propose a broadly consequentialist approach to on the spot ethical decision-making, but one which incorporates ethical values and rights as “side-constraints”.
      PubDate: 2014-09-01
       
  • Social Media in Disaster Risk Reduction and Crisis Management
    • Abstract: Abstract This paper reviews the actual and potential use of social media in emergency, disaster and crisis situations. This is a field that has generated intense interest. It is characterised by a burgeoning but small and very recent literature. In the emergencies field, social media (blogs, messaging, sites such as Facebook, wikis and so on) are used in seven different ways: listening to public debate, monitoring situations, extending emergency response and management, crowd-sourcing and collaborative development, creating social cohesion, furthering causes (including charitable donation) and enhancing research. Appreciation of the positive side of social media is balanced by their potential for negative developments, such as disseminating rumours, undermining authority and promoting terrorist acts. This leads to an examination of the ethics of social media usage in crisis situations. Despite some clearly identifiable risks, for example regarding the violation of privacy, it appears that public consensus on ethics will tend to override unscrupulous attempts to subvert the media. Moreover, social media are a robust means of exposing corruption and malpractice. In synthesis, the widespread adoption and use of social media by members of the public throughout the world heralds a new age in which it is imperative that emergency managers adapt their working practices to the challenge and potential of this development. At the same time, they must heed the ethical warnings and ensure that social media are not abused or misused when crises and emergencies occur.
      PubDate: 2014-09-01
       
  • Responsibility Practices and Unmanned Military Technologies
    • Abstract: Abstract The prospect of increasingly autonomous military robots has raised concerns about the obfuscation of human responsibility. This papers argues that whether or not and to what extent human actors are and will be considered to be responsible for the behavior of robotic systems is and will be the outcome of ongoing negotiations between the various human actors involved. These negotiations are about what technologies should do and mean, but they are also about how responsibility should be interpreted and how it can be best assigned or ascribed. The notion of responsibility practices, as the paper shows, provides a conceptual tool to examine these negotiations as well as the interplay between technological development and the ascription of responsibility. To illustrate the dynamics of responsibility practices the paper explores how the introduction of unmanned aerial vehicles has led to (re)negotiations about responsibility practices, focusing particularly on negotiations within the US Armed Forces.
      PubDate: 2014-09-01
       
  • Foundations for Value Education in Engineering: The Indian Experience
    • Abstract: Abstract The objective of this paper is to discuss some of the foundational issues centering around the question of integrating education in human values with professional engineering education: its necessity and justification. The paper looks at the efforts in ‘tuning’ the technical education system in India to the national goals in the various phases of curriculum development. The contribution of the engineering profession in national development and India’s self-sufficiency is crucially linked with the institutionalization of expertise and the role of morality and responsibility. This linkage can be created through a proper understanding of the social role of the profession—what motivates the professionals and what makes professional life meaningful. Value education facilitates the process of moral maturity and the development of a ‘holistic’ mindset. This paper deals with the need to create such a mindset, the human values associated with it and gives examples of efforts to impart such education through ‘action-oriented’ programmes introduced in some institutes of engineering in India.
      PubDate: 2014-07-29
       
  • The Influence of Disclosure and Ethics Education on Perceptions of
           Financial Conflicts of Interest
    • Abstract: Abstract This study explored how disclosure of financial conflicts of interest (FCOI) influences naïve or “lay” individuals’ perceptions of the ethicality of researcher conduct. On a between-subjects basis, participants read ten scenarios in which researchers disclosed or failed to disclose relevant financial conflicts of interest. Participants evaluated the extent to which each vignette represented a FCOI, its possible influence on researcher objectivity, and the ethics of the financial relationship. Participants were then asked if they had completed a college-level ethics course. Results indicated that FCOI disclosure significantly influenced participants’ perceptions of the ethicality of the situation, but only marginally affected perceptions of researcher objectivity and had no significant influence on perceptions of the existence of FCOIs. Participants who had previously completed a college-level ethics course appeared more sensitive to the importance of FCOI disclosure than those who lacked such background. This result suggests that formal ethical training may help individuals become more critical consumers of scientific research.
      PubDate: 2014-07-10
       
  • Software Piracy in Research: A Moral Analysis
    • Abstract: Abstract Researchers in virtually every discipline rely on sophisticated proprietary software for their work. However, some researchers are unable to afford the licenses and instead procure the software illegally. We discuss the prohibition of software piracy by intellectual property laws, and argue that the moral basis for the copyright law offers the possibility of cases where software piracy may be morally justified. The ethics codes that scientific institutions abide by are informed by a rule-consequentialist logic: by preserving personal rights to authored works, people able to do so will be incentivized to create. By showing that the law has this rule-consequentialist grounding, we suggest that scientists who blindly adopt their institutional ethics codes will commit themselves to accepting that software piracy could be morally justified, in some cases. We hope that this conclusion will spark debate over important tensions between ethics codes, copyright law, and the underlying moral basis for these regulations. We conclude by offering practical solutions (other than piracy) for researchers.
      PubDate: 2014-07-09
       
  • Engineers and Active Responsibility
    • Abstract: Abstract Knowing that technologies are inherently value-laden and systemically interwoven with society, the question is how individual engineers can take up the challenge of accepting the responsibility for their work' This paper will argue that engineers have no institutional structure at the level of society that allows them to recognize, reflect upon, and actively integrate the value-laden character of their designs. Instead, engineers have to tap on the different institutional realms of market, science, and state, making their work a ‘hybrid’ activity combining elements from the different institutional realms. To deal with this institutional hybridity, engineers develop routines and heuristics in their professional network, which do not allow societal values to be expressed in a satisfactory manner. To allow forms of ‘active’ responsibility, there have to be so-called ‘accountability forums’ that guide moral reflections of individual actors. The paper will subsequently look at the methodologies of value-sensitive design (VSD) and constructive technology assessment (CTA) and explore whether and how these methodologies allow engineers to integrate societal values into the design technological artifacts and systems. As VSD and CTA are methodologies that look at the process of technological design, whereas the focus of this paper is on the designer, they can only be used indirectly, namely as frameworks which help to identify the contours of a framework for active responsibility of engineers.
      PubDate: 2014-07-09
       
  • Is the Non-rivalrousness of Intellectual Objects a Problem for the Moral
           Justification of Economic Rights to Intellectual Property'
    • Abstract: Abstract It is often argued that the fact that intellectual objects—objects like ideas, inventions, concepts, and melodies—can be used by several people simultaneously makes intellectual property rights impossible or particularly difficult to morally justify. In this article, I assess the line of criticism of intellectual ownership in connection with a central category of intellectual property rights, economic rights to intellectual property. I maintain that it is unconvincing.
      PubDate: 2014-07-05
       
  • A Review of Contemporary Work on the Ethics of Ambient Assisted Living
           Technologies for People with Dementia
    • Abstract: Abstract Ambient assisted living (AAL) technologies can provide assistance and support to persons with dementia. They might allow them the possibility of living at home for longer whilst maintaining their comfort and security as well as offering a way towards reducing the huge economic and personal costs forecast as the incidence of dementia increases worldwide over coming decades. However, the development, introduction and use of AAL technologies also trigger serious ethical issues. This paper is a systematic literature review of the on-going scholarly debate about these issues. More specifically, we look at the ethical issues involved in research and development, clinical experimentation, and clinical application of AAL technologies for people with dementia and related stakeholders. In the discussion we focus on: (1) the value of the goals of AAL technologies, (2) the special vulnerability of persons with dementia in their private homes, (3) the complex question of informed consent for the usage of AAL technologies.
      PubDate: 2014-06-19
       
  • Human Participants in Engineering Research: Notes from a Fledgling Ethics
           Committee
    • Abstract: Abstract For the past half-century, issues relating to the ethical conduct of human research have focused largely on the domain of medical, and more recently social–psychological research. The modern regime of applied ethics, emerging as it has from the Nuremberg trials and certain other historical antecedents, applies the key principles of: autonomy, respect for persons, beneficence, non-maleficence, and justice to human beings who enter trials of experimental drugs and devices (Martensen in J Hist Med Allied Sci 56(2):168–175, 2001). Institutions such as Institutional Review Boards (in the U.S.) and Ethics Committees (in Europe and elsewhere) oversee most governmentally-funded medical research around the world, in more than a hundred nations that are signers of the Declaration of Helsinki (World Medical Association 2008). Increasingly, research outside of medicine has been recognized to pose potential risks to human subjects of experiments. Ethics committees now operate in the US, Canada, the U.K. and Australia to oversee all governmental-funded research, and in other jurisdictions, the range of research covered by such committees is expanding. Social science, anthropology, and other fields are falling under more clear directives to conduct a formal ethical review for basic research involving human participants (Federman et al. in Responsible research: a systems approach to protecting research participants. National Academies Press, Washington, 2003, p. 36). The legal and institutional response for protecting human subjects in the course of developing non-medical technologies, engineering, and design is currently vague, but some universities are establishing ethics committees to oversee their human subjects research even where the experiments involved are non-medical and not technically covered by the Declaration of Helsinki. In The Netherlands, as in most of Europe, Asia, Latin America, or Africa, no laws mandate an ethical review of non-medical research. Yet, nearly 2 years ago we launched a pilot ethics committee at our technical university and began soliciting our colleagues to submit their studies for review. In the past year, we have become officially recognized as a human subjects ethics committee for our university and we are beginning the process of requiring all studies using human subjects to apply for our approval. In this article, we consider some of the special problems relating to protecting human participants in a technology context, and discuss some of our experiences and insights about reviewing human subjects research at a technical university, concluding: that not less than in medical studies, human participants used in technology research benefit from ethical committees’ reviews, practical requirements for publications, grants, and avoiding legal liability are also served by such committees, and ethics committees in such contexts have many similarities to, but certain other special foci than medical ethics committees. We believe that this experience, and these observations, are helpful for those seeking to establish such committees in technology research contexts, and for framing the particular issues that may arise in such contexts for the benefit of researchers, and nascent committees seeking to establish their own procedures.
      PubDate: 2014-06-18
       
  • No One Likes a Snitch
    • Abstract: Abstract Whistleblowers remain essential as complainants in allegations of research misconduct. Frequently internal to the research team, they are poorly protected from acts of retribution, which may deter the reporting of misconduct. In order to perform their important role, whistleblowers must be treated fairly. Draft regulations for whistleblower protection were published for public comment almost a decade ago but never issued (Dahlberg 2013). In the face of the growing challenge of research fraud, we suggest vigorous steps, to include: organizational responsibility to certify the accuracy of research including audit, required whistleblower action in the face of imminent or grave harm to subjects, strengthened legal protections against retaliation including prompt enactment of Federal whistleblower protections and consideration of criminalizing the most egregious cases of research misconduct.
      PubDate: 2014-06-17
       
  • Corruption: Engineers are Victims, Perpetrators or Both'
    • Abstract: Abstract This study was conducted in Serbian companies on licensed engineers and in its first part included a total of 336 licensed engineers who voluntarily completed the questionnaires about their ethical orientation and attitudes toward corruption and in the second part 214 engineers who participated in the first survey, who voluntarily evaluated their company’s business operations characteristics. This study has clearly shown that there is a direct significant influence of the engineer’s ethical orientations and attitudes toward corruption on their evaluation of the characteristics of their respective companies regarding business operations. This research also clearly shows that only engineers with a strong deontological orientation, low ethical subjectivity, and strong readiness to fight corruption, low corruption acceptance and high awareness of corruption can successfully fight corruption, improve the business operations of their companies and make beneficial changes to society. Otherwise, they should be considered as corruption perpetrators, not just as its victims.
      PubDate: 2014-06-17
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2014