As we enter an era where intelligent systems are omnipresent and where they also permeate Prognostics and Health Management ( PHM ), the discussion of moral machines or ethics in engineering will inevitably engulf PHM as well. This article explores the topic of ethics within the PHM domain: how it is relevant, and how it may be addressed in a conscientious way. The paper provides a historical perspective on ethics-related developments that resulted in the formulation of engineering ethics codes, regulations, and policies. By virtue of these developments, ethics has already been encapsulated in PHM systems. The specific areas that have traditionally driven ethics considerations include safety and security, and they increasingly include privacy, proprietary considerations ( protection of intellectual property ), and environmental protection. During the course of future technology development, innovations will increasingly impact all of these topics. It is argued here that consciously embracing these issues will increase the competitive advantage of a PHM technology solution. As a guideline, specific ethics attributes are derived from professional engineering ethics codes, and a path towards insertion into a requirements flow down is suggested.
ASME. (2015). Unwritten Laws of Ethics and Change in Engineering, ASME Press.
ASTM International (2018). Subcommittee E60.13 on Sustainable Manufacturing, E3012-16 Standard Guide for Characterizing Environmental Aspects of Manufacturing Processes.
Black, P., Scarfone, K., & Souppaya, M. (2008). Cyber Security Metrics and Measures, Wiley Handbook of Science and Technology for Homeland Security, (Ed.) John G. Voeller, Wiley, 2008.
Bryson, J., (2016). Patiency is not a Virtue: AI and the Design of Ethical Systems, AAAI Workshop Notes of 2016 Spring Symposium, pp. 202-207.
businessdictionary.com, (2018). http://www.businessdictionary.com/definition/safety.html, accessed 3/13/2018
California Air Resources Board (2018). On-Board Diagnostics (OBD) Program. Arb.ca.gov. https://www.arb.ca.gov/msprog/obdprog/obdprog.htm, Retrieved 10/17/2018.
Clifford, W., (1877) The Ethics of Belief, Originally published in Contemporary Review.
De Donno, M., Dragoni, N., Giaretta, A., & Spognardi, A. (2018). Security and Communication Networks, Vol. 2018, Article ID 7178164.
Evans, S., Mishra, P., Yan, W., & Bouqata, B. (2016). Security Prognostics: Cyber meets PHM”, Proceedings IEEE PHM Conference.
Flavell, E. (2013). The ASCE Code of Ethics: PRINCIPLES, STUDY, AND APPLICATION. ASCE. Archived from the original on 2013-12-03
Frank, L. (2016). Metaethics in Context of Engineering Ethical and Moral Systems, Workshop Notes, AIAA Spring Symposium, pp. 208 – 213.
French National Constituent Assembly. (1789). Déclaration des droits de l'homme et du citoyen de 1789.
Gates, D., (2018). Boeing hit by WannaCry virus, but says attack caused little damage, Seattle Times, https://www.seattletimes.com/business/boeing-aerospace/boeing-hit-by-wannacry-virus-fears-it-could-cripple-some-jet-production/, last accessed 4/10/2018.
Gibbs, S. (2017) Triton: hackers take out safety systems in 'watershed' attack on energy plant, The Guardian, https://www.theguardian.com/technology/2017/dec/15/triton-hackers-malware-attack-safety-systems-energy-plant, last accessed 4/10/2018
Great Britain Parliament (1689), Bill of Rights.
Holmes, R., (2007). Basic Moral Philosophy, Wadsworth.
ISO (1999). Common Criteria for Information Technology Security Evaluation, ISO/IEC 15408.
Johnson, D. (2006) Computer Systems: Moral Entities but not Moral Agents, Ethics and Information Technology, vol. 8, pp 195-204.
de Klerk, T. (2017). How to Measure Privacy: a Structured Overview of Analysis Methods for Privacy-Enhancing Technologies, Notes from Twente Student Conference on IT.
Koch, R., & Kuehn, T. (2017). Defending the Grid: Backfitting Non-Expandable Control Systems, Proceedings 9th International Conference on Cyber Conflict
Kwon, D., Hodkiewicz, M., Fan, J., Shibutani, T., & Pecht, M. (2016). IoT-Based Prognostics and Systems Health Management for Industrial Applications, Special Section on Trends and Advances for Ambient Intelligence with Internet of Things (IoT) Systems, IEEE Access.
Layton, E. (1986). The Revolt of the Engineers: Social Responsibility and the American Engineering Profession. Baltimore, Maryland, USA: The Johns Hopkins University Press.
Maggiore, J. & Kinney, D. (2009). “Monitoring Real-Time Environmental Performance”. Aeromagazine, Qtr_03 09
Meng, Weizhi, Li, Wenjuan, Xiang, Yang, Choo, Kim-Kwang Raymond, A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks, Journal of Network and Computer Applications, Volume 78, 15 January 2017, pp. 162-169.
Mizzoni, J. (2017). Ethics – the basics, J., Wiley Blackwell.
Murphy, C., Gardoni, P., Bashir, H., Harris, Jr., C.E., & Masad, E. (Eds.). (2015). Engineering Ethics for a Globalized World, Springer.
National Motor Vehicle Crash Causation Survey (2008). Report to Congress, DOT HS 811 059, July.
NSPE - National Society of Professional Engineers. (2007). Code of Ethics for Engineers, Publication #1102, revised July 2007.
NSPE Board of Ethical Review. (2008). Sustainable Development – Threatened Species, Case No. 07-6, http://ncees.org/wp-content/uploads/2014/08/NSPE-Board-of-Ethical-Review-Sustainable-Development-Threatened-Species.pdf, last accessed 4/10/2018.
NTSB (2011). Aviation Accident and Incident Data System, NTSB, online database http://www.ntsb.gov/aviationquery/index.aspx, last accessed 3/10/2011
Nui, G., (2017) Data-Driven Technology for Engineering Systems Health Management: Design Approach, Feature Construction, Fault Diagnosis, Prognosis, Fusion and Decisions, Chapter 2 - Design Approach for Systems Health Management,, ISBN: 978-981-10-2031-5
Payne, S. (2006). A Guide to Security Metrics. NIST 800-55 Rev 1, Sections 5.0-6.0 NIST 800-100, Section 7.0.
Peterson, S., Faramarzi, P. (2011). Iran hijacked US drone, says Iranian engineer”, Christian Science Monitor, https://www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer , last accessed 4/10/2018.
Roychoudhury, I., Daigle, M., Goebel, K., Spirkovska, L., Sankararaman, S., Ossenfort, J., Kulkarni, C., McDermott, W., & Poll, S. (2016). Initial Demonstration of the Real-Time Safety Monitoring Framework for the National Airspace System Using Flight Data, Proceedings of AIAA AVIATION 2016, AIAA-2016-4216.
Saha, B., Quach, P., & Goebel, K. (2012). Optimizing Battery Life for Electric UAVs using a Bayesian Framework”, Proceedings of 2012 IEEE Aerospace Conference.
Samrin, R., & Vasumati, D. (2017). Review on Anomaly based Network Intrusion Detection System, Proceedings of 2017 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT).
Tännsjö, T. (2013). Understanding Ethics, Edinburgh University Press, 3rd Ed.
Townsend, D., Knoefel, F., & Grouban, R. (2011). Privacy versus autonomy: A tradeoff model for smart home monitoring technologies, Proceedings Engineering in Medicine and Biology Society, EMBC, 2011 Annual International Conference of the IEEE.
United Nations. (1948). Universal Declaration of Human Rights.
US Congress (1791) United States Constitution.
Wallach, W., & Allen, C. (2010). Moral Machines: Teaching Robots Right from Wrong, Oxford University Press.
Wallach, W. (2015). A Dangerous Master: How to Keep Technology from Slipping Beyond Our Control, Basic Books.
Zetter, K. (2016). Everything we know about Ukraine’s Power Plant Hack, Wired, https://www.wired.com/2016/01/everything-we-know-about-ukraines-power-plant-hack/, last accessed 4/10/2018