Social Construction of Safety in UAS Technology in Concrete Settings: Some Military Cases Studied

Social Construction of Safety in UAS Technology in Concrete Settings: Some Military Cases Studied

G.C.H. Bakx J.M. Nyce 

Department of Military Behavioural Science & Philosophy, Netherlands Defence Academy, Breda, The Netherlands

Department of Anthropology, Ball State University, Muncie, Indiana, USA

Page: 
227-241
|
DOI: 
https://doi.org/10.2495/SAFE-V2-N3-227-241
Received: 
N/A
| |
Accepted: 
N/A
| | Citation

OPEN ACCESS

Abstract: 

Unmanned aerial systems (UASs) in general and UAS safety in particular have so far received little attention in the science, technology and society (STS) literature. This paper therefore reports on sev-eral (military) cases of this relatively new technology, focusing specifically on issues of safety. Quite often, safety of technology is considered the result of a rational process – one of a series of rational, often calculative, linear steps. The paper’s results suggest that establishing safety in military UASs is very much a social process. Approaching (military) UAS safety from this perspective could perhaps be complementary to more analytical and rational perspectives on safety of this type of technology. Further research is therefore suggested on the implications that social processes can have for safety in UASs. So far, it seems, such a position on safety in technology has been little explored in both the STS and safety literature explicitly.

Keywords: 

military, safety, social process, social science, STS, technology, UAS

  References

[1] Wise, L., Confusion blamed in drone strike killing 2 in Houston unit. Houston Chronicle, Available at http://www.chron.com/default/article/Confusion-blamed-in-drone-strike-killing-2-in-2219732.php#page-2, 15 October 2011 (accessed 14 January 2012).

[2] Rappert, B., Balmer, B. & Stone, J., Science, technology and the military: priorities, preoccupations and possibilities. The Handbook of Science and Technology Studies, MIT Press: London, 2008.

[3] McNeill, W.H., The Pursuit of Power: Technology, Armed Force, and Society since A.D. 1000, University of Chicago Press: 1982.

[4] Creveld, van, M. L., Technology and War. From 2000BC to Present, The Free Press: New York, 1991.

[5] Forman, P., Behind quantum electronics: national security as a basis for physical research in the United States, 1940-1960. Historical Studies in the Physical and Biological Sciences, 18(1), pp. 149-229, 1987.

[6] Sapolsky, H.M., Science, technology, and military policy. Science Policy Studies in Per-spective, eds. I. Spiegel-Rosing & D. De Solla Price, London: Sage Publications, 1977.

[7] MacKenzie, D. & Wajcman, J., The Social Shaping of Technology, 2nd edn. Open University Press: Berkshire, 1999.

[8] MacKenzie, D., Inventing Accuracy: A Historical Sociology of Nuclear Missile Guidance, MIT Press: Massachusetts, 1990.

[9] Bijker, W.E., Of Bicycles, Bakelites, and Bulbs. The MIT Press: Cambridge, 1997.

[10] Yin, R.K., Case Study Research. Design and Methods, 4th edn. SAGE Publications: Thousand Oaks, 2012.

[11] Geertz, C., The Interpretation of Cultures: Selected Essays, Basic Books: New York, 1973.

[12] Slovic, P., Trust, emotion, sex, politics, and science: surveying the risk-assessment battlefield. Risk Analysis, 19(4), pp. 689–701, 1999. doi: http://dx.doi. org/10.1111/j.1539-6924.1999.tb00439.x

[13] Ramalingam, K., Kalawsky, R. & Noonan, C., Integration of Unmanned Aircraft System (UAS) in non-segregated airspace: A complex systems of systems problem. Systems Con-ference, 2011 5th Annual IEEE, pp. 448–455, 2011.

[14] Mayer, J., The predator war. What are the risks of the C.I.A.’s covert drone program? NewYorker, available at http://www.newyorker.com/reporting/2009/10/26/091026fa_ fact_mayer, 26 October 2009 (accessed 14 January 2012).

[15] Salas, E., Human Factors of Remotely Operated Vehicles: Advances in Human Performance and Cognitive Engineering Research, Elsevier: Amsterdam, 2006.

[16] Bumiller, E., Air Force done operators report high levels of stress. New York Times, available at http://www.nytimes.com/2011/12/19/world/asia/air-force-drone-operators-show-high-levels-of-stress.html 18 December 2011 (accessed 26 December 2011)

[17] Cloud, D.S. & Zucchino, D., In focus: Drone on trial after marines killed. Safeguards are in place, but the fog of war is still a factor. Portland Press Herald, available at http://www. pressherald.com/news/nationworld/Drones-on-trial-after-Marines-killed_2011-11-09. html, 9 November 2011 (accessed 9 December 2011).

[18] Nevile, M. & Walker, M.B., A Context for Error. Using Conversation Analysis to Rep-resent and Analyse Recorded Voice Data (Rep. No. B2005/0108). Australian Transport Safety Bureau (ATSB), 2005.

[19] Zucchino, D. & Barnes, J.E., Iraqi insurgents intercept live video feeds from Predator drones. Los Angeles Times, available at http://articles.latimes.com/2009/dec/18/nation/ la-na-drones18-2009dec18, 18 December 2009 (accessed 10 December 2011).

[20] Air Force Space Command Public Affairs, Flying Operations of RremotelyPiloted Aircraft Unaffected by Malware, available at http://www.afspc.af.mil/news1/story. asp?id=123275647, 2011 (accessed 22 March 2012).

[21] BBC News Middle East, Iran shows film of captured US drone. BBC News, available at http://www.bbc.co.uk/news/world-middle-east-16098562, 8 December 2011 (accessed 22 March 2012).

[22] Perrow, C., Normal Accidents, Princeton University Press: Princeton, 1999.

[23] Simon, H.A., Rational Decision-Making in Business Organizations. Nobel Memorial Lecture, 1978.

[24] Gorman, S., Dreazen, Y.J. & Cole, A., Insurgents hack U.S. drones. $26 software is used to breach key weapons in Iraq; Iranian backing suspected. Wall Street Journal, available at http://online.wsj.com/article/SB126102247889095011.html, 17 December 2009 (accessed 10 December 2011).

[25] Schmitt, E. & Dao. J., Use of pinpoint air power comes of age in new war. New York Times, available at http://www.nytimes.com/2001/12/24/international/24WEAP. html?scp=1&sq=schmitt%20dao&st=cse, 24 December 2001 (accessed 30 January 2012).

[26] Nyce, J.M. & Dekker, S.W.A., IED casualties mask the real problem: It’s us. Small Wars & Insurgencies, 21(2), pp. 409–413, 2012. doi: http://dx.doi.org/10.1080/09592 318.2010.481493

[27] Dutch Minister of Defense, Defensie na de kredietcrisis: Een kleinere krijgsmacht in een onrustige wereld, Policy Letter, 8 April 2011.

[28] Hughes, J., British military updating war simulators to keep up with XBox games. Digital-trends, available at http://www.digitaltrends.com/gaming/british-military-updating-war-simulators-to-keep-up-with-xbox-games, 29 December 2011 (accessed 01 January 2012).

[29] Mathieu, J.E., Heffner, T.S., Goodwin, G.F., Salas, E. & Cannon-Bowers, J.A., The influence of shared mental models on team process and performance. Journal of Applied Psychology, 85(2), pp. 273–283, 2000. doi: http://dx.doi.org/10.1037/0021-9010.85.2.273

[30] Kuhn, T.S., The Structure of Scientifi c Revolutions. Chicago: The University of Chicago Press: Chicago, 1996[1962].

[31] Simon, H.A., A behavioral model of rational choice. The Quarterly Journal of Economics, 69(1), pp. 99–118, 1995. doi: http://dx.doi.org/10.2307/1884852

[32] Klein, G., Sources of Power, How People Make Decisions, Massachusetts Institute of Technology: Cambridge, 1999.

[33] Kahneman, D., Maps of bounded rationality: Psychology for behavioral economics. The American Economic Review, 93(5), pp. 1449–1475, 2003.

[34] Shapira, Z., (1997) as cited in Lipshitz, R., Klein, G., & Carroll, J.S., Introduction to the special issue. Naturalistic decision making and organizational decision making: Exploring the intersections. Organization Studies, 27(7), pp. 917–923, 2006.

[35] Moller, N., The concepts of safety and risk. Handbook of Risk Theory, eds. S. Roeser, R. Hillerbrans, P. Sandin & M. Peterson, Springer: Dordrecht, pp. 55–85, 2012. doi: http://dx.doi.org/10.1007/978-94-007-1433-5_3

[36] Cork, L., Clothier, R., Gonzales, L. F. & Walker, R., The future of UAS: standards, reg-ulations, and operational experiences. IEEE A&E Systems Magazine, pp. 29–44, 2007.

[37] Dalamagkidis, K., Valavanis, K.P. & Piegl, L.A., Current status and future perspectives for unmanned aircraft system operations in the US. Journal of Intelligent and Robotics Systems, 52(2), pp. 313–329, 2008. doi: http://dx.doi.org/10.1007/s10846-008-9213-x

[38] European Aviation Safety Agency (EASA), Policy Statement Airworthiness Certification of Unmanned Aircraft Systems (UAS) (Doc. No. E.Y0013-01), 2009.

[39] Hobbs, A., Unmanned aircraft systems. Human Factors in Aviation, eds E.Salas & D. Maurino, Elsevier Inc: Burlington, 2010.

[40] Eurocontrol, Unmanned Aircraft Systems - ATM Collision Avoidance Requirements (Rep. No. CND/CoE/CNS/09-156), 2010.

[41] United Sates Air Force Scientific Advisory Board, Operating Next-Generation Remotely Piloted Aircraft for Irregular Warfare (Rep. No. SAB-TR-10-03), 2011.

[42] United Sates Air Force Scientific Advisory Board, Operating Nex-Generation Remotely Piloted Aircraft for Irregular Warfare (Rep. No. SAB-TR-10-03), 2011.

[43] Eurocontrol, Eurocontrol Specifications for the Use of Military Unmanned Aerial Vehicles as Operational Air Traffic Outside Segregated Airspace, (Doc. No. EURONCONTROL-SPEC-0102), 2007.

[44] NATO Joint Capability Group on Unmanned Aerial Vehicle (JCGUAV), Sense and Avoid Requirements for Unmanned Aerial Vehicle Systems Operating in Non-Segregated Airspace (Rep. No. AC/141(JGCUAV)N(2012)0002). NATO Naval Armaments Group, 2012.

[45] Williams, K.W., Human Factors Implications of Unmanned Aircraft Accidents: Flight-Control Problems (Rep. No. DOT/FAA/AM-06/8). Federal Aviation Administration Office of Aerospace Medicine: Washington DC, 2006.

[46] Douglas, M. & Wildavsky, A., Risk and Culture: An Essay on the Selection of Technological and Environmental Dangers, University of California Press: Berkeley, 1982.

[47] Johnson, B.B. & Covello, V.T., The Social and Cultural Construction of Risk: Essays on Risk Selection and Perception, Reidel Publishing Company: Dordrecht, 1987.

[48] Turner, N. & Tennant, S.J., As far as is reasonably practicable: socially constructing risk, safety, and accidents in military operations. Journal of Business Ethics, 91(1), pp. 21–33, 2009. doi: http://dx.doi.org/10.1007/s10551-009-0065-5

[49] Turner, N. & Gray, G.C., Socially constructing safety. Human Relations, 62(9), pp. 1259–1266, 2009. doi: http://dx.doi.org/10.1177/0018726709339863