Ramifications Of Underhand Scientific Methods: The Challenger (Essay Sample)
Scientific ethics and integrity / Pseudoscience
The scientific approach has resulted in an explosion of technology and knowledge about our world. However, because of its success, the misapplication of the scientific method without high standards of ethics and integrity, or the use of the trappings of scientific study to lend credence to a spurious idea (“pseudoscience”), can be a dangerous thing.
In this paper, you will explore what happens when the process of scientific thought is either negligently or maliciously derailed.
Choose a contemporary (since 1875) phenomenon in which this happened. (It doesn't have to be specifically astronomical.) Discuss what happened (telling the story if it is not a familiar one), and describe in what way the principles of scientific integrity, ethics, and/or rigor were compromised.
Also describe what “warning signs” someone else might observe that would hint that something is wrong. What questions should a skeptical audience (whether fellow scientists or the general public) have asked that could point out the flaws in the argument being made?
Finally, if the issue resulted from negligence, rather than malice, describe what the researchers should have done instead to ensure that they didn't reach incorrect conclusions.
Ramifications of Underhand Scientific Methods: Analysis of the Challenger
Science has always pushed the limits of the possible, leading to great success and occasionally attracting the most expensive catastrophes. Astronomy is arguably one of those scientific fields that have challenged the sky as the limit cliché in underscoring the value of integrity in scientific research. Missions to space undeniably require money, but they are just as dependent on flawless scientific thought process as well. In the Space Shuttle Challenger, scientific thought process was negligently derailed, attracting far-reaching ramifications including loss of lives and money, in addition to tainted reputation.
On January 28, 1986, the world watched in horror as seven lives – the astronauts onboard – perished in midair. The Challenger's seal, O-ring, located in the right Solid Rocket Booster (SRB), failed at liftoff, leading to the leakage of hot, pressurized gas and an inevitable explosion. Pieces of the ship's hardware broke down above the Atlantic Ocean about 73 seconds into the flight. NASA was grounded for 2.5 years. In less than two minutes, years of research, billions of dollars, and seven lives were brought to a horrific end because someone ignored the need for ethics and integrity.
Examples abound of violation of the principles of scientific ethics and rigor in the Challenger case. First, while the engineers at Morton Thiokol recommended delaying the mission citing extremely low temperatures as a risk factor, researchers have hinted that the engineers' case was potentially flawed (Robinson 81), with others claiming that it was poorly designed, lacked dependable statistical backing, and pegged on misrepresentation of data (Bajorski and Tufte 22). Secondly, after Morton Thiokol management accepted and sent to NASA the engineers' recommendation that the Challenger was not flight ready, NASA shifted the burden of proof to them. Instead of involving the engineers to prove their claim, the managers at Morton Thiokol simply voted to approve the flight (Robinson 62). Scientific questions require integrity in formulating hypotheses and conduc
- Modern Methods Communications Have Led To Decline Of Landline PhonesDescription: The proliferation of cellular phones and the availability of mobile connectivity have meant that the landline phone is on its way out as a form of communication...2 pages/≈550 words| 2 Sources | MLA | Technology | Essay |
- Information TechnologyDescription: Lack of information technology skills costs most companies financially, socially, politically and socially...7 pages/≈1925 words| 4 Sources | MLA | Technology | Essay |
- Intrusion Detection Systems Description: Intrusion detection systems (IDS) are software application that inspects inbound and outbound network activity for suspicious activities that may show a security breach...2 pages/≈550 words| MLA | Technology | Essay |