This paper explores how the relationship between ethics and engineering has been and could be framed. Specifically, two distinct framings will be conceptualized and explored: ethics in engineering and engineering in ethics. As with other disciplines, engineering typically subsumes ethics, appropriating it as its own unique subfield. As a framing, ethics in engineering produces specialized standards, codes, values, perspectives, and problems distinct to engineering thought and practice. These form an engineering education discourse with which engineers engage. It is epistemological in its focus, meaning that this framing constructs knowledge of proper disciplinary conduct. On the other hand, engineering in ethics as a framing device insists that engineering become a specialized articulation of ethical thought and action. Here, “engineer” and “engineering” are not nouns but verbs, referring to particular processes and technologies for transformation. One is not an “engineer;” rather, one “engineers.” One is first an ethical subject – an historical aggregate of continuous experiences/becomings – concerned with the pursuit of “the good” in the present; then, when contextually relevant, such a subject’s engineering knowledge and skills may be employed as powerful means for the becoming-good of shared worlds. In this paper, engineering in ethics is further conceptualized through a playful intermingling of an ethic of care, via the scholarship of Joan Tronto, and a Deweyian approach to ethical inquiry. Tronto’s four elements of care – attentiveness, responsibility, competence, and responsiveness – are joined with what are arguably four key components of Dewey’s process of ethical inquiry: awareness, judgment, experimentation, and iteration. This paper argues that 1) being attentive is required to achieve awareness of a given need or problem, 2) taking responsibility is a necessary practice for making and acting on one’s judgements related to the need at hand, 3) competence in a relevant skill is needed to experiment with one’s judgements, and 4) careful consideration of how others respond to how one has addressed a need is essential for the purposes of iteration. While all four contribute to the notion of engineering in ethics, the relationship between competence and experimentation is where engineering is most evidently seized as an ethical expression. How one competently wields engineering knowledge and skillfully performs disciplinary techniques is, here, foremost about actively inquiring into how to provide care for a specific need and, in doing so, creating a world aligned with one’s vision of “the good.” This paper will close with a brief consideration of the educational implications of engineering in ethics.
more »
« less
This content will become publicly available on March 10, 2026
Getting started with culture change in science: Lessons in retooling.
This practice brief offers a guide to organizations and projects that want to better align their cultures with values of diversity, equity, and inclusion. Rooted in the intuitive, theoretically grounded view of culture as a tool kit that people use to solve various problems, the authors offer examples of cultural change work emerging from the National Science Foundation-funded Inclusive Graduate Education Network. We present lessons learned that may be instructive for other efforts, as well as recommended actions and specific questions for collective reflection and discussion. (PsycInfo Database Record (c) 2025 APA, all rights reserved)
more »
« less
- Award ID(s):
- 1834540
- PAR ID:
- 10617243
- Publisher / Repository:
- Educational Publishing Foundation
- Date Published:
- Journal Name:
- Journal of Diversity in Higher Education
- ISSN:
- 1938-8926
- Subject(s) / Keyword(s):
- Culture Change Graduate Education Science Education STEM Cultural Attitudes
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Emerging domains, such as sensor-driven smart spaces and social media analytics, require incoming data to be enriched prior to its use. Enrichment often consists of machine learning (ML) functions that are too expensive/infeasible to execute at ingestion. We develop a strategy entitled Just-in-time ENrichmeNt in quERy Processing (JENNER) to support interactive analytics over data as soon as it arrives for such application context. JENNER exploits the inherent tradeoffs of cost and quality often displayed by the ML functions to progressively improve query answers during query execution. We describe how JENNER works for a large class of SPJ and aggregation queries that form the bulk of data analytics workload. Our experimental results on real datasets (IoT and Tweet) show that JENNER achieves progressive answers performing significantly better than the naive strategies of achieving progressive computation.more » « less
-
AbstractA diversity of defence colourations that shift over time provides protection against natural enemies. Adaptations for camouflage depend on an organism’s interactions with the natural environment (predators, habitat), which can change ontogenetically. Wallace’s flying frogs (Rhacophorus nigropalmatus) are cryptic emerald green in their adult life stage, but juveniles are bright red and develop white spots on their back 1 month after metamorphosis. This latter conspicuous visual appearance might function as antipredator strategy, where frogs masquerade as bird or bat droppings so that predators misidentified them as inedible objects. To test this idea, we created different paraffin wax frog models—red with white spots, red without white spots, green, and unpainted—and placed them in equal numbers within a > 800 m2rainforest house at the Vienna Zoo. This environment closely resembles the Bornean rainforest and includes several free-living avian predators of frogs. We observed an overall hit rate of 15.5%. A visual model showed that the contrast of red, green and control models against the background colouration could be discriminated by avian predators, whereas green models had less chromatic difference than red morphs. The attack rate was significantly greater for red but was reduced by half when red models had white spots. The data therefore supports the hypothesis that the juvenile colouration likely acts as a masquerade strategy, disguising frogs as animal droppings which provides similar protection as the cryptic green adult colour. We discuss the ontogenetic colour change as a possible antipredator strategy in relation to the different habitats used at different life stages. Significance statementPredation pressure and the evolution of antipredator strategies site at the cornerstone of animal-behaviour research. Effective antipredator strategies can change in response to different habitats that animals use during different life stages. We study ontogenetic shifts in colour change as dynamic antipredator strategy in juvenile and adult Wallace’s flying frogs. We show that the unusual colour pattern of juveniles (bright red with small white spots) likely functions as a masquerade of animal droppings. Specifically, we show that white dotting, which can be associated with animal faeces, acts as the main visual feature that turns an otherwise highly conspicuous individual into a surprisingly camouflaged one. To our knowledge, this is the first experimental exploration of a vertebrate masquerading as animal droppings.more » « less
-
Seagroves, Scott; Barnes, Austin; Metevier, Anne; Porter, Jason; Hunter, Lisa (Ed.)The role of facilitator, and facilitation strategies, are components that sometimes get overlooked as important in promoting collaborative interactions, such as with group work. Being able to work effectively in a group is a required skill for most disciplines, in particular for those in the Science, Technology, Engineering and Mathematics (STEM) fields. It is also central throughout the Professional Development Program (PDP) developed and run by the Institute of Scientist and Engineer Educators (ISEE), starting with group formation and leading all the way up to the final culminating activity. As such, PDP teams are taught facilitation strategies. Keeping in mind a group’s goals and what their measures for accountability are, the facilitator should be able to give constructive feedback and actively assess the team’s progress on the go. In this process, the facilitator can identify early on issues that can then be addressed before they become pathological. In this paper, we discuss from our experience as PDP participants and facilitators, what are different spaces we have applied facilitation strategies, what are some of the strategies that have worked throughout the years to improve group work, and what observations from the group help us make the best possible assessment.more » « less
-
We survey elliptic curve implementations from several vantage points. We perform internet-wide scans for TLS on a large number of ports, as well as SSH and IPsec to measure elliptic curve support and implementation behaviors, and collect passive measurements of client curve support for TLS. We also perform active measurements to estimate server vulnerability to known attacks against elliptic curve implementations, including support for weak curves, invalid curve attacks, and curve twist attacks. We estimate that 0.77% of HTTPS hosts, 0.04% of SSH hosts, and 4.04% of IKEv2 hosts that support elliptic curves do not perform curve validity checks as specified in elliptic curve standards. We describe how such vulnerabilities could be used to construct an elliptic curve parameter downgrade attack called CurveSwap for TLS, and observe that there do not appear to be combinations of weak behaviors we examined enabling a feasible CurveSwap attack in the wild. We also analyze source code for elliptic curve implementations, and find that a number of libraries fail to perform point validation for JSON Web Encryption, and find a flaw in the Java and NSS multiplication algorithms.more » « less
An official website of the United States government
