Cleaning up polluted tertiary wastewater from the agri-food industry with floating wetlands

In 2018, IMT Atlantique researchers launched the FloWAT project, based on a hydroponic system of floating wetlands. It aims to reduce polluting emissions from treated wastewater into the discharge site.

Claire Gérente, researcher at IMT Atlantique, has been coordinating the FloWat1 decontamination project, funded by the French National Agency for Research (ANR), since its creation. The main aim of the initiative is to provide complementary treatment for tertiary wastewater from the agri-food industry, using floating wetlands. Tertiary wastewater is effluent that undergoes a final phase in the water treatment process to eliminate residual pollutants. It is then drained into the discharge site, an aquatic ecosystem where treated wastewater is released.

These wetlands act as filters for particle and dissolved pollutants. They can easily be added to existing waste stabilization pond systems in order to further treat this water. One of this project’s objectives is to improve on conventional floating wetlands to increase phosphorus removal, or even collect it for reuse, thereby reducing the pressure on this non-renewable resource.

In this context, research is being conducted around the use of a particular material, cellular concrete, to allow phosphorus to be recovered. “Phosphorus removal is of great environmental interest, particularly as it reduces the eutrophication of natural water sources that are discharge sites for treated effluent,” states Gérente. Eutrophication is a process characterized by an increase in nitrogen and phosphorus concentration in water, leading to ecosystem disruption.

Floating wetlands: a nature-based solution

The floating wetland system involves covering an area of water, typically a pond, with plants placed on a floating bed, specifically sedges. The submerged roots act as filters, retaining the pollutants found in the water via various physical, chemical and biological processes. This mechanism is called phytopurification.

Floating wetlands are part of an approach known as nature-based solutions, whereby natural systems, less costly than conventional technologies, are implemented to respond to ecological challenges. To function efficiently, the most important thing is to “monitor that the plants are growing well, as they are the site of decontamination,” emphasizes Gérente.

In order to meet the project objectives, a pilot study was set up on an industrial abattoir and meat processing site. After being biologically treated, real agri-food effluent is discharged into four pilot ponds, three of which that are covered with floating wetlands of various sizes, and one that is uncovered, as a control. The experimental site is entirely automated and can be controlled remotely to facilitate supervision.

Performance monitoring is undertaken for the treatment of organic matter, nitrogen, phosphorus and suspended matter. As well as data on the incoming and outgoing water quality, physico-chemical parameters and climate data are constantly monitored. The outcome for pollutants in the different components of the treatment system will be identified by sampling and analysis of plants, sediment and phosphorus removal material.

These floating wetlands will be the first to be easy to dismantle and recycle, improved for phosphorus removal and even collection, as well as able to treat suspended matter, carbon pollution and nutrients.

L’attribut alt de cette image est vide, son nom de fichier est MF-2.jpg.
Photograph of the experimental system

Improving compliance with regulation

In 1991, the French government established a limit on phosphorus levels to reduce water pollution, in order to preserve biodiversity and prevent algal bloom, which is when one or several algae species grow rapidly in an aquatic system.

The floating wetlands developed by IMT Atlantique researchers could allow these thresholds to be better respected, by improving capacities for water treatment. Furthermore, they are part of a circular economy approach, as beyond collecting phosphorus for reuse, the cellular concrete and polymers used as plant supports are recyclable or reusable.

Further reading on I’MTech: Circular economy, environmental assessment and environmental budgeting

To create these wetlands, you simply have to place the plants on the discharge ponds. This makes this technique cheap and easy to implement. However, while such systems integrate rather well into the landscape, they are not suitable for all environments. The climate in northern countries, for example, may slow down or impair how the plants function. Furthermore, results take longer to obtain with natural methods like floating wetlands than with conventional methods. Nearly 7000 French agri-food companies have been identified as potential users for these floating wetlands. Nevertheless, the FloWAT coordinator reminds us that “this project is a feasability study, our role is to evaluate the effectiveness of floating wetlands as a filtering system. We will have to wait until the project finishes in 2023 to find out if this promising treatment system is effective.

Rémy Fauvel

Antoine Fécant

Antoine Fécant, winner of the 2021 IMT-Académie des Sciences Young Scientist Prize

Antoine Fécant, new energy materials researcher at IFP Energies Nouvelles, has worked on many projects relating to solar and biosourced fuel production and petrol refining. His work has relevance for the energy transition and, this year, was recognized by the IMT-Académie des Science Young Scientist Prize.

Energy is a central part of our lifestyles,” affirms Antoine Fécant, new energy materials researcher at IFP Energies Nouvelles. “When I was younger, I wanted to work in this area and my interest in chemistry convinced me to pursue this field. I have always been attracted by the beauty of science, and I find even greater satisfaction in directing my work so that it is concretely useful for our society.” His research since 2004 has mainly focused on materials that speed up chemical processes, known as catalysts.

Antoine Fécant’s initial research was based on a class of catalysts called zeolites. Zeolites are materials mainly made of silicon, aluminum and oxygen. They are found naturally, but it is also possible and often preferable to synthesize them. These minerals contain networks of porosity that can be used to limit the quantity of by-products generated. Zeolites are useful for optimizing the yield of chemical reactions and energy consumption, and thus limiting the CO2 and waste produced.

The main idea of Antoine Fécant’s thesis, undertaken between 2004 and 2007, was to develop a unique methodology to generate new zeolites. For this, he used a multidisciplinary approach and chose to pair combinatorial chemistry with molecular modeling to “identify ways to synthesize zeolites depending on the kind of porous structure desired,” he describes. This methodology allowed us to define streamlining criteria and therefore very significantly speed up research and development work in this area,” Antoine Fécant continues.

15 years ago, this approach was completely innovative and won him the “Yves Chauvin” thesis prize in 2008. Now, however, it is widespread in the fields of chemistry, biochemistry and genomics, showing the trailblazing nature of the researcher’s approach.

Improving solar energy production and recycling CO2

After completing his PhD, Antoine Fécant took the post of research engineer at IFP Énergies Nouvelles. Continuing to pursue his goal of offering technical solutions to contain greenhouse gas emissions, in 2011, the researcher began a project aiming to develop materials and processes to recycle CO2 using solar energy. This work won him the 2012 Young Researcher Award from the City of Lyon. The initiative stems from the intermittent nature of solar power. It is based on the idea that a phase directly converting/storing this energy flow as an easily usable energy source would allow it to be better exploited.

Further reading on I’MTech: What is renewable energy storage?

To get around this disadvantage, we wanted to find a way to store solar energy as a fuel,” states Antoine Fécant. “This would make it possible to create energy reserves in a form that is already known and usable in various common applications, such as heating, vehicles or in the industrial and transport sectors,” he adds. To achieve this goal, the researcher based his research work on the principle of natural photosynthesis: capturing light energy to convert CO2 and water to more complex carbon molecules that can be used as energy.

In order to artificially transform solar energy into chemical energy, Antoine Fécant and his team, in collaboration with academic actors, developed several families of specific materials. Known as photocatalysts, these materials have been optimized by researchers in terms of their characteristics and structures on a nanometric scale. One of the compounds developed is a family of monolithic materials made from silicon and titanium dioxide, allowing for better use of incident photons through a “nano-mirror” effect. Other families of materials with composite architecture are able to reproduce the energetic processes in multiple complex phases of natural photosynthesis. Lastly, entirely new crystalline structures give greater mobility to the electrical charges needed to convert CO2.

According to Antoine Fécant, “these materials are interesting, but at present, they only allow us to overcome a single obstacle at a time, out of many. Now, we have to work on creating synergy between these new catalyst systems to efficiently perform CO2 photoconversion and reach an energy yield threshold of at least 10% for this means of energy production to be considered viable.” The researcher believes it will still be several decades before this process can be deployed on an industrial scale.

Catalyzing the production of biosourced and fossil fuels

Antoine Fécant has also undertaken research to reduce the environmental impact of the use of conventional fuels and their manufacturing processes. For this, he designed higher-performing catalysts that help to improve the energy efficiency of processes and thereby limit related CO2 emissions. The researcher has also participated in discovering catalysts that increase yields in the Fischer-Tropsch process, a key phase in transforming lignocellulosic biomass to produce advanced biofuels. Furthermore, these fuels could contribute to limiting the aviation sector’s carbon footprint.

By winning the IMT-Académie des Sciences Young Scientist Award, Antoine Fécant hopes to shine a light on research into solar fuel and hopes that “this area will be more highly valued”. Such fuels could truly represent a promising avenue to make better use of solar energy, by controlling its intermittent nature. “Research into these topics needs to be supported in the long term in order to contribute to the paradigm shifts needed for our energy consumption,” concludes the prizewinner.

Rémy Fauvel

[box type=”shadow” align=”” class=”” width=””]

From energy to tires

During his career, Antoine Fécant has also participated in a collaborative project on the production of biosourced compounds. The aim of this project was to design a process to manufacture butadiene, a key molecule in the composition of tires, using non-food plant resources. It is commonly produced using fossil fuels, but researchers have found a way to generate it using lignocellulosic compounds. Project teams have managed to refine a process and associated catalysts, making it possible to transform ethanol into butadiene using condensation. This 10-year-old project is now in its final phases.

[/box]

David Gesbert, winner of the 2021 IMT-Académie des Sciences Grand Prix

EURECOM researcher David Gesbert is one of the pioneers of Multiple-Input Multiple-Output (MIMO) technology, used nowadays in many wireless communication systems. He contributed to the boom in WiFi, 3G, 4G and 5G technology, and is now exploring what could be the 6G of the future. In recognition of his body of work, Gesbert has received the IMT-Académie des Sciences Grand Prix.

I’ve always been interested by research in the field of telecommunications. I was fascinated by the fact that mathematical models could be converted into algorithms used to make everyday objects work,” declares David Gesbert, researcher and specialist in wireless telecommunications systems at EURECOM. Since he completed his studies in 1997, Gesbert has been working on MIMO, a telecommunications system that was created in the 1990s. This technology makes it possible to transfer data streams at high speeds, using multiple transmitters and receivers (such as telephones) in conjunction. Instead of using a single channel to send information, a transmitter can use multiple spatial streams at the same time. Data is therefore transferred more quickly to the receiver. This spatialized system represents a breaking point with previous modes of telecommunication, like the Global System for Mobile Communications (GSM).

It has proven to be an important innovation, as MIMO is now broadly used in WiFi systems and several generations of mobile telephone networks, such as 4G and 5G. After receiving his PhD from École Nationale Supérieure des Télécommunications in 1997, Gesbert completed two years of postdoctoral research at Stanford University. He joined the telecommunications laboratory directed by Professor Emeritus Arogyaswami Paulraj, an engineer who worked on the creation of MIMO. In the early 2000s, the two scientists, accompanied by two students, launched the start-up Iospan Wireless. This was where they developed the first high-speed wireless modem using MIMO-OFDM technology.

OFDM: Orthogonal Frequency-Division Multiplexing

OFDM is a process that improves communication quality by dividing a high-debit data stream into many low-debit data streams. By combining this mechanism with MIMO, it is possible to transfer data at high speeds while making the information generated by MIMO more robust against radio distortion. “These features make it great for use in deploying telecommunications systems like 4G or 5G,” adds the researcher.  

In 2001, Gesbert moved to Norway, where he taught for two years as adjunct professor in the IT department at the University of Oslo. One year later, he published an article in which he described that complex propagation environments favor the functioning of MIMO. “This means that the more obstacles there are in a place, the more the waves generated by the antennas are reflected. The waves therefore travel different paths and interference is reduced, which leads to more efficient data transfer. In this way, an urban environment in which there are many buildings, cars, and other objects will be more favorable to MIMO than a deserted area,” explains the telecommunications expert.  

In 2003, he joined EURECOM, where he became a professor and five years later, head of the Mobile Communications department. There, he has continued his work aiming to improve MIMO. His research has shown him that base stations — also known as relay antennas — could be useful to improve the performance of this mechanism. By using antennas from multiple relay stations far apart from each other, it would be possible to make them work together and produce a giant MIMO system. This would help to eliminate interference problems and optimize the circulation of data streams. Research is still being performed at present to make this mechanism usable.

MIMO and robots

In 2015, Gesbert obtained an ERC Advanced Grant for his PERFUME project. The initiative, which takes its name from high PERfomance FUture Mobile nEtworking, is based on the observation that “the number of receivers used by humans and machines is currently rising. Over the next few years, these receivers will be increasingly connected to the network,” emphasizes the researcher. The aim of PERFUME is to exploit the information resources of receivers so that they work in cooperation, to improve their performance. The MIMO principle is at the heart of this project: spatializing information and using multiple channels to transmit data. To achieve this objective, Gesbert and his team developed base stations attached to drones. These prototypes use artificial intelligence systems to communicate between one another, in order to determine which bandwidth to use or where to place themselves to give a user optimal network access. Relay drones can also be used to extend radio range. This could be useful, for example, if someone is lost on a mountain, far from relay antennas, or in areas where a natural disaster has occurred and the network infrastructure has been destroyed.

As part of this project, the EURECOM professor and his team have performed research into decision-making algorithms. This has led them to develop artificial neuron networks to improve decision-making processes performed by the receivers or base stations desired to cooperate together. With these neuron networks, the devices are capable of quantifying and exploiting the information held by each of themAccording to Gesbert, “this will allow receivers or stations with more information to correct flaws in receivers with less. This idea is a key takeaway from the PERFUME project, which finished at the end of 2020. It indicates that to cooperate, agents like radio receivers or relay stations make decisions based on sound data, which sometimes has to be rejected to let themselves be guided by decisions from agents with access to better information than them. It is a surprising result, and a little counterintuitive.”

Towards the 6th generation of mobile telecommunications technology

“Nowadays, two major areas are being studied concerning the development of 6G,” announces Gesbert. The first relates to ways of making networks more energy efficient by reducing the number of times that transmissions take place, by restricting the amount of radio waves emitted and reducing interference. One solution to achieve these objectives is to use artificial intelligence. “This would make it possible to optimize resource allocation and use radio waves in the best way possible,” adds the expert.

The second concerns applications of radio waves for purposes other than communicating information. One possible use for the waves would be to produce images. Given that when a wave is transmitted, it reflects off a large number of obstacles, artificial intelligence could analyze its trajectory to identify the position of obstacles and establish a map of the receiver’s physical environment. This could, for example, help self-driving cars determine their environment in a more detailed way. With 5G, the target precision for locating a position is around a meter, but 6G could make it possible to establish centimeter-level precision, which is why these radio imaging techniques could be useful. While this 6th-generation mobile telecommunications network will have to tackle new challenges, such as the energy economy and high-accuracy positioning, it seems clear that communication spatialization and MIMO will continue to play a fundamental role.

Rémy Fauvel

cybersécurité, attaques informatiques, attacks

Governments, banks, and hospitals: all victims of cyber-attacks

Hervé Debar, Télécom SudParis – Institut Mines-Télécom

Cyber-attacks are not a new phenomenon. The first computer worm distributed via the Internet, known as the “Morris worm” after its creator, infected 10% of the 60,000 computers connected to the Internet at the time.

Published back in 1989, the novel The Cuckoo’s Egg was based on a true story of computer espionage. Since then, there have been any number of malicious events, whose multiple causes have evolved over time. The initial motivation of many hackers was their curiosity about this new technology that was largely out of the reach of ordinary people at the time. This curiosity was replaced by the lure of financial reward, leading firstly to messaging campaigns encouraging people to buy products online, and subsequently followed by denial-of-service attacks.

Over the past few years, there have been three main motivations:

  • Direct financial gain, most notably through the use of ransomware, which has claimed many victims.
  • Espionage and information-gathering, mostly state-sponsored, but also in the private sphere.
  • Data collection and manipulation (normally personal data) for propaganda or control purposes.

These motivations have been associated with two types of attack: targeted attacks, where hackers select their targets and find ways to penetrate their systems, and large-scale attacks, where the attacker’s aim is to claim as many victims as possible over an extended period of time, as their gains are directly proportional to their number of victims.

The era of ransomware

Ransomware is a type of malware which gains access to a victim’s computer through a back door before encrypting their files. A message is then displayed demanding a ransom in exchange for decrypting these files.

Kaseya cash register software

In July 2021, an attack was launched against Kaseya cash register software, which is used by several store chains. It affected the Cloud part of the service and shut down the payment systems of several retail chains.

The Colonial Pipeline attack

One recent example is the attack on the Colonial Pipeline, an oil pipeline which supplies the eastern United States. The attack took down the software used to control the flow of oil through the pipeline, leading to fuel shortages at petrol stations and airports.

This is a striking example because it affected a visible infrastructure and had a significant economic impact. However, other infrastructure – in banks, factories, and hospitals – regularly fall victim to this phenomenon. It should also be noted that these attacks are very often destructive, and that paying the ransom is not always sufficient to guarantee the recovery of one’s files.

Unfortunately, such attacks look set to continue, at least in the short-term, given the financial rewards for the perpetrators: some victims pay the ransom despite the legal and ethical questions this raises. Insurance mechanisms protecting against cyber-crime may have a detrimental effect, as the payment of ransoms only encourages hackers to continue. Governments have also introduced controls on cryptocurrencies, which are often used to pay these ransoms, in order to make payments more difficult. Paradoxically, however, payments made using cryptocurrency can be traced in a way that would be impossible with traditional methods of payment. We can therefore hope that this type of attack will become less profitable and riskier for hackers, leading to a reduction in this type of phenomenon.

Targeted, state-sponsored attacks

Infrastructure, including sovereign infrastructure (economy, finance, justice, etc.), is frequently controlled by digital systems. As a result, we have seen the development of new practices, sponsored either by governments or extremely powerful players, which implement sophisticated methods over an extended time frame in order to attain their objectives. Documented examples include the Stuxnet/Flame attack on Iran’s nuclear program, and the SolarWinds software hack.

SolarWinds

The attack targeting Orion and its SolarWinds software is a textbook example of the degree of complexity that can be employed by certain perpetrators during an attack. As a network management tool, SolarWinds plays a pivotal role in the running of computer systems and is used by many major companies as well as the American government.

The initial attack took place between January and September of 2019, targeting the SolarWinds compilation environment. Between the fall of 2019 and February 2020, the attacker interacted with this environment, embedding additional features. In February 2020, this interaction enabled the introduction of a Trojan horse called “Sunburst”, which was subsequently incorporated into SolarWinds’ updates. In this way, it became embedded in all of Orion’s clients’ systems, infecting as many as 18,000 organizations. The exploitation phase began in late 2020 when further malicious codes downloaded by Sunburst were injected, and the hacker eventually managed to breach the Office365 cloud used by the compromised companies. Malicious activity was first detected in December 2020, with the theft of software tools from the company FireEye.

This has continued throughout 2021 and has had significant impacts, underlining both the complexity and the longevity of certain types of attack. American intelligence agencies believe this attack to be the work of SVR, Russia’s foreign intelligence service, which has denied this accusation. It is likely that the strategic importance of certain targets will lead to future developments of this type of deep, targeted attack. The vital role played by digital tools in the running of our critical infrastructure will doubtless encourage states to develop cyber weapons, a phenomenon that is likely to increase in the coming years.

Social control

Revelations surrounding the Pegasus software developed by NSO have shown that certain countries can benefit significantly from compromising their adversaries’ IT equipment (including smartphones).

The example of Tetris

Tetris is the name given to a tool used (potentially by the Chinese government) to infiltrate online chat rooms and reveal the identities of possible opponents. This tool has been used on 58 sites and uses relatively complex methods to steal visitors’ identities.

“Zero-click” attacks

The Pegasus revelations shed light on what are known as “zero-click” attacks. Many attacks on messaging clients or browsers assume that an attacker will click a link, and that this click will then cause the victim to be infected. With zero-click attacks, targets are infected without any activity on their part. One ongoing example of this hack is the ForcedEntry or CVE-2021-30860 vulnerability, which has affected the iMessage app on iPhones.

Like many others, this application accepts data in a wide range of formats and must carry out a range of complex operations in order to present it to users in an elegant way, despite its reduced display format. This complexity has extended the opportunities for attacks. An attacker who knows a victim’s phone number can send them a malicious message, which will trigger an infection as it is processed by the phone. Certain vulnerabilities even make it possible to delete any traces (at least visible traces) that the message was received, in order to avoid alerting the target.

Despite the efforts to make IT platforms harder to hack, it is likely that certain states and private companies will remain capable of hacking into IT systems and connected objects, either directly (via smartphones, for example) or via the cloud services to which they are connected (e.g. voice assistants). This takes us into the world of politics, and indeed geopolitics.

The biggest problem with cyber-attacks remains identifying the origin of the attack and who was behind it. This is made even more difficult by attackers trying to cover their tracks, which the Internet gives them multiple opportunities to do.

How can you prevent an attack?

The best way of preventing an attack is to install the latest updates for systems and applications, and perhaps ensure that they are installed automatically. The majority of computers, phones and tablets can be updated on a monthly basis, or perhaps even more frequently. Another way is to activate existing means of protection such as firewalls or anti-virus software, which will eliminate most threats.

Saving your work on a regular basis is essential, whether onto a hard drive or in the Cloud, as is disconnecting from these back-ups once they have been completed. Back-up copies are only useful if they are kept separate from your computer, otherwise ransomware will attack your back-up drive as well as your main drive. Backing up twice, or saving key information such as the passwords to your main applications (messenger accounts, online banking, etc.) in paper form, is another must.

Digital tools should also be used with caution. Follow this simple rule of thumb: if it seems too good to be true in the real world, then there is every chance that it is also the case in the virtual world. By paying attention to any messages that appear on our screens and looking out for spelling mistakes or odd turns of phrase, we can often identify unusual behavior on the part of our computers and tablets and check their status.

Lastly, users must be aware that certain activities are risky. Unofficial app stores or downloads of executables in order to obtain software without a license often contain malware. VPNs, which are widely used to watch channels from other regions, are also popular attack vectors.

What should you do if your data is compromised?

Being compromised or hacked is highly stressful, and hackers constantly try to make their victims feel even more stressed by putting pressure on them or by sending them alarming messages. It is crucial to keep a cool head and find a second device, such as a computer or a phone, which you can use to find a tool that will enable you to work on the compromised machine.

It is essential to return to a situation in which the compromised machine is healthy again. This means a full system recovery, without trying to retrieve anything from the previous installation in order to prevent the risk of reinfection. Before recovery, you must analyze your back-up to make that sure no malicious code has been transferred to it. This makes it useful to know where the infection came from in the first place.

Unfortunately, the loss of a few hours of work has to be accepted, and you simply have to find the quickest and safest way of getting up and running again. Paying a ransom is often pointless, given that many ransomware programs are incapable of decrypting files. When decryption is possible, you can often find a free program to do it, provided by security software developers. This teaches us to back up our work more frequently and more extensively.

Finally, if you lack in-house cybersecurity expertise, it is highly beneficial to obtain assistance with the development of an approach that includes risk analyses, the implementation of protective mechanisms, the exclusive use of certified cloud services, and the performance of regular audits carried out by certified professionals capable of detecting and handling cybersecurity incidents.

Hervé Debar, Director of Research and PhDs, Deputy Director of Télécom SudParis.

This article has been republished from The Conversation under a Creative Commons licence. Read the original article (in French).

Technologie positive, stress

Can technology combat chronic stress?

Stressors in individuals can occur on a regular basis, especially in uncertain contexts such as the current health situation. To prevent a state of stress from becoming chronic and causing mental health problems, approaches involving positive technologies could help people to improve their resilience. Anuragini Shirish, a researcher at Institut Mines-Télécom Business School, describes her work on this subject.

Why is it important to reduce stress in people in general?

Anuragini Shirish: According to the latest estimates in 2017, 792 million people worldwide are diagnosed with mental health problems, 284 million and 264 million of whom reportedly suffer from anxiety and depression respectively. The physiological state of chronic stress is a major risk factor for the development of these diseases. Avoiding – or at least limiting – this state of chronic stress in individuals could therefore significantly reduce the risk of developing these diseases and improve their living conditions in general.

How do people develop a state of chronic stress?

AS: We have made great strides in our understanding of the mechanisms that induce stress. Stress was formerly thought to be caused by repeated exposure to stressors, but now – especially in light of evolutionary neurobiology theories – stress is generally considered to be a default response to dangerous situations, which is inhibited by the prefrontal cortex when people perceive a sense of security. The recent “Generalized Uncertainty Theory of Stress” states that stress originates from a feeling of permanent insecurity in individuals.

How has the COVID-19 pandemic influenced individual and collective situations of chronic stress?

AS: The COVID-19 pandemic has triggered a general feeling of insecurity in many aspects, including one’s own health and that of one’s loved ones, financial stability and job security. Many people have been affected by situations of chronic stress, which has led to a significant increase in mental illnesses. Uncertainty and stress drive people to seek out responses. However, the information they find is sometimes inadequate and may even be dangerous at individual and collective levels. It is therefore important to consider how to guide these responses, especially in the context of the pandemic.

Are you suggesting the use of technology to reduce stress in a holistic way?

AS: “Positive” technology sets out to improve individual and collective living conditions. In this case, such technology can be designed to improve people’s mental states. There are several types of positive technology, many of which now consist of mobile applications, which means that they can be made available to a large portion of the population.

In concrete terms, what technological tools could help to reduce stress?

AS: This is precisely the purpose of the analysis we are seeking to provide. We have defined three types of stress-response behaviors. Certain behaviors may be favored, depending on the individuals concerned and the context.

“Hedonic” behavior seeks to reduce stress through an immediate distraction. The aim is to enjoy a brief moment of pleasure. Positive hedonic technologies provide a very rapid response to stress. Examples include video games and television series. However, their stress-reducing effects are generally short-lived. Such solutions are of fleeting benefit and generally teach people very little about how to limit their future stress.

“Social” behavior reduces stress through social interaction. Its effects last longer than hedonic behavior because people can share their emotions, help and advise each other with regard to common goals. However, the benefits remain temporary. During lockdowns, meetings of friends or family by videoconference were examples of how social positive technology facilitated responses to individual and group stress.

“Eudaimonic” behavior is related to the search for meaning and purpose. It is based on the principle of personal growth and development and helps to develop a better response to stress over time. This type of behavior is also the most difficult to master, as it requires a more substantial investment in terms of time and energy, and we would like to see positive technology increasingly used in this area. Facilitating access to eudaimonic behaviors could promote better ways to combat stress and mental health problems on the societal level.

How does a positive eudaimonic technology work?

AS: Positive eudaimonic technologies may be based on different approaches. For example, many current applications provide support for meditation, whose mental health benefits are now widely accepted. Applications related to a learning process involving personal achievement can be considered as eudaimonic technologies. We can also develop technologies for initially hedonic or social purposes, in order to facilitate access to them, which may then be used for eudaimonic purposes in a subsequent phase. The recent Heartintune application is an example of this type of approach.

What are the prospects for the development of positive technologies at the societal level?

AS: Various types of positive technologies already exist, and our next challenge is to promote their development and widespread use in order to boost resilience. We believe that the best way to do this is to use technology to promote more eudaimonic behaviors.

This could be a particularly important issue to raise at the World Health Summit in Berlin at the end of October 2021, which will focus on issues including the potential contributions of innovations and technology to the resolution of health problems.

Antonin Counillon

composites

Technology for improving the recycling of plastics and composites

Plastics and composites aren’t recycled as often as we might wish, as a result of a lack of facilities, the right technologies not yet existing or not being profitable, or hazardous waste deposits. IMT Nord Europe have been working in partnership with manufacturers to develop and improve the available technologies.

Plastics and composites get a lot of bad press, but it is hard to do without them for many objects we use every day, including our cars. In order to minimise their polluting effect, they must be recycled, but this is complicated from both a technological and an economic perspective. Two researchers from IMT Nord Europe are seeking to improve processes with a view towards industrialisation.

In order to recycle plastic, outlets have to be found for these recycled materials. One of the main stumbling blocks is the presence of pollutants, including volatile organic compounds (VOCs), which can produce unpleasant and even toxic odours. There are also very strict standards governing the emission of VOCs and odours in vehicle passenger compartments. Marie-France Lacrampe, a researcher at IMT Nord Europe, is working on a solution which is striking in its simplicity: water-assisted extrusion.

Eliminating odours

Extrusion is a process traditionally used to manufacture objects made from plastic, involving pushing a doughy material through a die of the desired cross-section. Water is injected into the extruder and the steam washes the plastic, extracting the majority of any VOCs. “A few changes need to be made to the extruder”, explains Marie-France Lacrampe. Professor Lacrampe is working alongside three industrial partners and another laboratory, with the industrial pilot expected to be operational within two years.

In order to further improve this process, the researcher intends to combine water with supercritical CO2 – pressurised CO2 which becomes a highly effective solvent. The advantage is that it removes different molecules from those removed using water.

Process organisation and eco-design

Efficient recycling normally starts with designing materials which are easy to recycle. This is particularly true when it comes to food packaging, which is often made using several different materials (cartons, thermoformed tubs or re-heatable pouches, for example). “The ideal solution is to mix compatible polymers which can then be integrated into existing recycling processes”, explains Marie-France Lacrampe.

When it comes to recycling, it’s not just a question of the technology used, but how the whole process is organised. Waste must be used as locally as possible in order to cut transport and logistics costs, requiring intelligent analysis and handling of flows.

“If we want to boost recycling rates then we have to tackle what we don’t know how to do. This is particularly true for small quantities (hazardous waste deposits) and materials which we are unable to recycle or aren’t very good at recycling such as opaque PET (the plastic used to make milk bottles, for example). We are working on recycling small quantities through additive manufacturing, the industrial version of 3D printing, extruding them again with additives so that they be reused.” 

Composites – rarely recycled

If recycling plastics isn’t always easy, just imagine what it must be like for composites, materials which are generally comprised of glass or carbon fibre and a polymer matrix. A modern aircraft such as the Airbus A350 is half-made of composites, which are used in whole sectors of industry, from transport (not just aircraft, but also cars, boats and bikes) to electronics, leisure and wind power.

Once they have reached the end of their life, composites are primarily burned in order to produce energy, which isn’t ideal from either an environmental or an economic point of view. “Solutions are being developed in the aeronautics sector to recover carbon fibres”, points out Mylène Lagardère, who is also a researcher at IMT Nord Europe. “It is mostly carbon-based composites which are used in aeronautics, which are more “noble”, making them easier to recycle.” Technology for recycling fibreglass composite does exist, but it is not yet profitable.

Developing more affordable methods

There are two possible processes for recovering fibres: a chemical process in which the matrix is dissolved in a solvent (allowing the matrix to be reused) and a thermal process in which the matrix is damaged. Matrices themselves are either thermoplastic, meaning they can be melted, or thermosetting, meaning they are damaged when heated. As a result, as Mylène Lagardère explains, “each fibre-matrix combination is processed differently,  with a different process for each product.” This is what makes recycling composites so complicated. The purer the material, the easier it is to recycle.

As we can see, improving recycling is essential, and research into this subject is rightly being prioritised. “Our aim is to develop methods which are both simple and affordable”, explains Mylène Lagardère. “Our basis is the industrial problem: if we have a deposit of materials with certain properties, then we can recover a recycled material with such properties.” The issue is that, during recycling, the properties of the material always deteriorate, as the fibres are shortened.

The recycling of composites is still very much in its infancy, but a few processes are starting to emerge,  whether in water sports, where the association APER – funded by an eco-tax on new crafts – dismantles abandoned boats, or in the wind power industry. The automobile industry is also having to adapt, with legislation requiring recycled materials to be used in the production of new vehicles.

Cécile Michaut

Large quantities of composites for recycling on the horizon?

10 million tonnes of composites are produced each year worldwide, and the market is continuing to grow at a rate of 5% year on year. But recycling is set to really accelerate: composites whihe arrived on the market 20 to 30 years ago are now reaching the end of their lives. 50,000 tonnes of wind turbine rotors will need to be recycled between 2021 and 2022. In 2023, 25,000 boats, three-quarters made from composites, are to be dismantled. 4,000 railway carriages are also awaiting dismantling. Although resources remain limited (15,000 tonnes of production waste and 7,000 tonnes of materials at end of life in 2017), significant growth is anticipated. Processes mut develop and organise in order to become sustainable.

Also read on I’MTech

zero-click attacks

Zero-click attacks: spying in the smartphone era

Zero-click attacks exploit security breaches in smartphones in order to hack into a target’s device without the target having to do anything. They are now a threat to everyone, from governments to medium-sized companies.

“Zero-click attacks are not a new phenomenon”, says Hervé Debar, a researcher in cybersecurity at Télécom SudParis. “In 1988 the first computer worm, named the “Morris worm” after its creator, infected 6,000 computers in the USA (10% of the internet at the time) without any human intervention, causing damage estimated at several million dollars.” By connecting to messenger servers which were open access by necessity, this program exploited weaknesses in server software, infecting it. It could be argued that this was one of the very first zero-click attacks, a type of attack which exploits security breaches in target devices without the victim having to do anything.

There are two reasons why this type of attack is now so easy to carry out on smartphones. Firstly, the protective mechanisms for these devices are not as effective as those on computers. Secondly, more complex processes are required in order to present videos and images, meaning that the codes enabling such content to be displayed are often more complex than those on computers. This makes it easier for attackers to hack in and exploit security breaches in order to spread malware. As Hervé Debar explains, “attackers must, however, know certain information about their target – such as their mobile number or their IP address – in order to identify their phone. This is a targeted type of attack which is difficult to deploy on a larger scale as this would require collecting data on many users.”

Zero-click attacks tend to follow the same pattern: the attacker sends a message to their target containing specific content which is received in an app. This may be a sound file, an image, a video, a gif or a pdf file containing malware. Once the message has been received, the recipient’s phone processes it using apps to display the content without the user having to click on it. While these applications are running, the attacker exploits breaches in their code in order to run programs resulting in spy software being installed on the target device, without the victim knowing.

Zero-days: vulnerabilities with economic and political impact

Breaches exploited in zero-click attacks are known as “zero-days”, vulnerabilities which are unknown to the manufacturer or which have yet to be corrected. There is now a global market for the detection of these vulnerabilities: the zero-day market, which is made up of companies looking for hackers to identify these breaches. Once the breach has been identified, the hacker will produce a document explaining it in detail, with the company who commissioned the document often paying several thousand dollars to get their hands on it. In some cases the manufacturer themselves might buy such a document in an attempt to rectify the breach. But it may also be bought by another company looking to sell the breach to their clients – often governments – for espionage purposes. According to Hervé Debar, between 100 and 1,000 vulnerabilities are detected on devices each year. 

Zero-click attacks are regularly carried out for theft or espionage purposes. For theft, the aim may be to validate a payment made by the victim in order to divert their money. For espionage, the goal might be to recover sensitive data about a specific individual. The most recent example was the Pegasus affair, which affected around 50,000 potential victims, including politicians and media figures. “These attacks may be a way of uncovering secret information about industrial, economic or political projects. Whoever is responsible is able to conceal themselves and to make it difficult to identify the origin of the attack, which is why they’re so dangerous”, stresses Hervé Debar. But it is not only governments and multinationals who are affected by this sort of attack – small and medium-sized companies are too. They are particularly vulnerable in that, owing to a lack of financial resources, they don’t have IT professionals running their systems, unlike major organisations.

Also read on I’MTech Cybersecurity: high costs for companies

More secure computer languages

But there are things that can be done to limit the risk of such attacks affecting you. According to Hervé Debar, “the first thing to do is use your common sense. Too many people fall into the trap of opening suspicious messages.” Personal phones should also be kept separate from work phones, as this prevents attackers from gaining access to all of a victim’s data. Another handy tip is to back up your files onto an external hard drive. “By transferring your data onto an external hard drive, it won’t only be available on the network. In the event of an attack, you will safely be able to recover your data, provided you disconnected the disc after backing up.” To protect against attacks, organisations may also choose to set up intrusion detection systems (IDS) or intrusion prevention systems (IPS) in order to monitor flows of data and access to information.

In the fight against cyber-attacks, researchers have developed alternative computing languages. Ada, a programming language which dates back to the 1980s, is now used in the aeronautic industry, in railways and in aviation safety. For the past ten years or so the computing language Rust has been used to solve problems linked to the management of buffer memory which were often encountered with C and C++, languages widely used in the development of operating systems. “These new languages are better controlled than traditional programming languages. They feature automatic protective mechanisms to prevent errors committed by programmers, eliminating certain breaches and certain types of attack.” However, “writing programs takes time, requiring significant financial investment on the part of companies, which they aren’t always willing to provide. This can result in programming errors leading to breaches which can be exploited by malicious individuals or organisations.”

Rémy Fauvel

livreurs de plateformes

Delivery riders seeking social protection

Cynthia Srnec, Sciences Po and Cédric Gossart, Institut Mines-Télécom Business School

“In the ideal world of the delivery platforms, we would say nothing, just smile politely, “Hello, sir”, “Goodbye”, get on our bikes, make our deliveries, never fall, never have an accident, never make a complaint […]. We used to pay you €5, now it’s €2.60, what are you going to do about it? On you go, chop chop! Make sure the food stays hot, ignore red lights, and don’t die please!”

This testimony from a young delivery rider illustrates the subordination that is central to an ecosystem in which algorithms call all the shots.

What needs to be done for these workers, exposed to various different risks? What do they need in terms of social protection?

These questions are very much central to the debate around the planned finance law for social security for 2022. First proposed back in September, its aim is to improve social protection for self-employed workers, but the improvements put forward don’t seem to factor in the mishaps which can befall delivery riders.

We asked them about their needs and the difficulties they face via an online questionnaire. 219 delivery drivers active in France during the pandemic responded, 15 of whom were interviewed.

The delivery riders who responded to our questionnaire are young (3 out of 4 are under 30 years of age) and don’t earn very much: half of them make less than €900/month before tax. Although half are logged on between 20 and 40 hours a week, they don’t get paid for time spent waiting on orders, which prevents many of them from taking on another job (for 60% of them, this is their only source of work). Before working as delivery riders, 37% were unemployed, this group most likely to have done this work for more than 3 years.

Their preferred mode of transport is push bike (37%) followed by electric bike (26%). Riders on push bikes earn less than the others (22% earn less than €900/month), while the majority of delivery riders who use another mode of transport earn slightly more.

The risks of the job

“I was hit by a pedestrian and broke my hand. I didn’t realise I had broken anything, and so I kept working. […] there are a lot of delivery riders […] who keep working with broken bones because they have to for financial reasons, or because they don’t have any social security allowing them to take time off to recover.” (Interview n°3)

This account illustrates the physical and financial vulnerability which affects many delivery riders. Only 31% of them have never experienced health difficulties as a result of their work. 70% have issues with traffic and parking, 61% have significant issues because of time spent waiting to be allocated a route, and 68% have significant issues because of time spent waiting for orders to be prepared. We don’t know exactly how many accidents have befallen riders or how many have died, but the delivery rider community is starting to come together to take action.

Are delivery riders treated properly?

The vulnerability of delivery riders depends on the risks they are exposed to and what protections they have in place (e.g. a salary, family health insurance, etc.).

According to our survey, the most vulnerable delivery riders (V4) are the most exposed and have the least protection (the unemployed, illegal immigrants, long-term delivery riders, etc.). These highly vulnerable delivery riders are part of the 32% who told us they did not have any social security coverage, and aren’t aware of all of their rights (25% of delivery riders who responded to our questionnaire didn’t know if they had any social security coverage). They generally don’t inform their employer if they have any issues (57% didn’t make the company aware about accident or illness). Among those who did, 61% were given no assistance, and what was on offer didn’t compensate for the lack of income as a result of them being off work:

“There’s no point. I knew full well that the self-employment benefits would cover nothing or practically nothing. I knew that the top-up health coverage policies with the platforms are very low-cost contracts, even extremely low-cost, and I knew there would be no point making a claim.” (Interview n°2)

A “dirty job”

The variable geometry of the vulnerability of workers doing this “dirty job” have to face is down in no small part to the “paltry” social protection they get.

This legal and institutional void benefits platforms, some of whom have been taken to court for off-the-books work.

In Spain the law was changed in August 2021 to make it that every delivery rider is considered an employee. This resolution to the precarity brought about through the gig-economy, a pressing social issue of our times, has support in France from unions and collectives of delivery riders, but also from the EU Parliament:

“The coverage, suitability and formal and effective transparency of social protection must apply to all workers, including the self-employed.”

Bear in mind that 97% of the delivery riders who responded to our questionnaire were registered self-employed.

Morgane Le Guern from the MGEN Corporate Foundation for Public Health contributed to this article.

Cynthia Srnec, postdoctoral researcher, Sciences Po and Cédric Gossart, Professor (permanent, full-time), Institut Mines-Télécom Business School

This article has been republished from The Conversation under a Creative Commons licence. Read the original article.

Facebook

Facebook: a small update causes major disruption

Hervé Debar, Télécom SudParis – Institut Mines-Télécom

Late on October 4, many users of Facebook, Instagram and WhatsApp were unable to access their accounts. All of these platforms belong to the company Facebook and were all affected by the same type of error: an accidental and erroneous update to the routing information for Facebook’s servers.

The internet employs various different types of technology, two of which were involved in yesterday’s incident: BGP (border gateway protocol) and DNS (domain name system).

In order to communicate, each machine must have an IP address. Online communication involves linking two IP addresses together. The contents of each communication are broken down into packets, which are exchanged by the network between a source and a destination.

How BGP (border gateway protocol) works

The internet is comprised of dozens of “autonomous systems”, or AS, some very large, and others very small. Some AS are interconnected via exchange points, enabling them to exchange data. Each of these systems is comprised of a network of routers, which are connected using either optical or electrical communication links. Communication online circulates using these links, with routers responsible for transferring communications between links in accordance with routing rules. Each AS is connected to at least one other AS, and often several at once.

When a user connects their machine to the internet, they generally do so via an internet service provider or ISP. These ISPs are themselves “autonomous systems”, with address ranges which they allocate to each of their clients’ machines. Each router receiving a packet will analyse both the source and the destination address before deciding to transfer the packet to the next link, following their routing rules.

In order to populate these routing rules, each autonomous system shares information with other autonomous systems describing how to associate a range of addresses in their possession with an autonomous system path. This is done step by step through the use of the BGP or border gateway protocol, ensuring each router has the information it needs to transfer a packet.

DNS (domain name system)

The domain name system was devised in response to concerns surrounding the lack of transparency with IP addresses for end users. For available servers on the internet, this links “facebook.com” with the IP address “157.240.196.35”.

Each holder of a domain name sets up (or delegates) a DNS server, which links domain names to IP addresses. They are considered to be the most reliable source (or authority) for DNS information, but are also often the first cause of an outage – if the machine is unable to resolve a name (i.e. to connect the name requested by the user to an address), then the end user will be sent an error message.

Each major internet operator – not just Facebook, but also Google, Netflix, Orange, OVH, etc. – has one or more autonomous systems and coordinates the respective BGP in conjunction with their peers. They also each have one or more DNS servers, which act as an authority over their domains.

The outage

Towards the end of the morning of October 4, Facebook made a modification to its BGP configuration which it then shared with the autonomous systems it is connected to. This modification resulted in all of the routes leading to Facebook disappearing, across the entire internet.

Ongoing communications with Facebook’s servers were interrupted as a result, as the deletion of the routes spread from one autonomous system to the next, since the routers were no longer able to transfer packets.

The most visible consequence for users was an interruption to the DNS and an error message, followed by the DNS servers of ISPs no longer being able to contact the Facebook authoritative server as a result of the BGP error.

This outage also caused major disruption on Facebook’s end as it rendered remote access and, therefore, teleworking, impossible. Because they had been using the same tools for communication, Facebook employees found themselves unable to communicate with each other, and so repairs had to be carried out at their data centres. With building security also online, access proved more complex than first thought.

Finally, with the domain name “facebook.com” no longer referenced, it was identified as free by a number of specialist sites for the duration of the outage, and was even put up for auction.

Impact on users

Facebook users were unable to access any information for the duration of the outage. Facebook has become vitally important for many communities of users, with both professionals and students using it to communicate via private groups. During the outage, these users were unable to continue working as normal.

Facebook is also an identity provider for many online services, enabling “single sign-on”, which involves users reusing their Facebook accounts in order to access services offered by other platforms. Unable to access Facebook, users were forced to use other login details (which they may have forgotten) in order to gain access.

Throughout the outage, users continued to request access to Facebook, leading to an increase in the number of DNS requests made online and a temporary but very much visible overload of DNS activity worldwide.

This outage demonstrated the critical role played by online services in our daily lives, while also illustrating just how fragile these services still are and how difficult it can be to control them. As a consequence, we must now look for these services to be operated with the same level of professionalism and care as other critical services.

Banking, for example, now takes place almost entirely online. A breakdown like the one that affected Facebook is less likely to happen to a bank given the standards and regulations in place for banking, such as the Directive On Network And Service Securitythe General Data Protection Regulation or PCI-DSS.

In contrast, Facebook writes its own rules and is partially able to evade regulations such as the GDPR. Introducing service obligations for these major platforms could improve service quality. It is worth pointing out that no bank operates a network as impressive as Facebook’s infrastructure, the size of which exacerbates any operating errors.

More generally, after several years of research and standardisation, safety mechanisms for BGP and DNS are now being deployed, the aim being to prevent attacks which could have a similar impact. The deployment of these security mechanisms will need to be accelerated in order to make the internet more reliable.

Hervé Debar, Director of Research and PhDs, Deputy director, Télécom SudParis – Institut Mines-Télécom

This article has been republished from The Conversation under a Creative Commons licence. Read the original article.

Pharmaceutical industry

Caring for the population or one’s earnings? A dilemma for marketers in the pharmaceutical industry

Loréa Baïada-Hirèche, Institut Mines-Télécom Business School ; Anne Sachet-Milliat, ISC Paris Business School et Bénédicte Bourcier-Béquaert, ESSCA École de Management

The pharmaceutical industry is rocked by scandals on a regular basis. Oxycodon, for example, has been massively distributed in the United States despite being a highly addictive opioid analgesic, and has been implicated in some 200,000 deaths by overdose in the United States since 1999.

Closer to home, it took more than 15 years for Servier Laboratories’ Mediator to be withdrawn from the market, even though its prescription as an appetite suppressant, outside its initial therapeutic indication, caused numerous victims, including 2,000 recorded deaths. The outcome of the trial in March 2021 highlighted not only the responsibility of doctors, but also that of the laboratories producing these drugs, as was also the case for Levothyrox, manufactured by Merck.

These different scandals are merely the visible manifestation of the constant tension generated in this sector between the pursuit of profit and its fundamental health mission. The marketing professionals who are responsible for promoting medicines to patients and doctors seem particularly concerned by this ethical conflict which can cause them to question their real mission: is it treating or selling?

In the course of our research, we set out to discover how marketers in the pharmaceutical sector perceive this quandary and how they deal with it.

Economic interest but a health mission

The ethical conflicts encountered can lead marketers into situations of “moral dissonance”. This refers to occasions when people’s behaviors or decisions conflict with their moral values. Because it brings into play elements which are central to people’s identity such as their values, moral dissonance can generate significant psychological discomfort, giving rise to guilt and affecting self-esteem.

The people affected will then engage in strategies designed to reduce this state of dissonance, which are mainly based on the use of self-justification mechanisms but may also include changing their behavior or seeking social support.

To understand the attitudes of pharmaceutical marketing professionals, we conducted in-depth interviews with 18 of them, which revealed that these individuals are beset by ethical conflicts of varying severity, most of which relate to decisions that are of economic interest but lead to their failure to fulfill their health mission. This may involve potential harm to patients, infringements of regulations or breaches of professional ethics. Conflicts seem to affect people more intensely when the choices have major impacts on patients’ health.

The Servier affair – a turning point

Our series of interviews revealed that three strategies are employed in an effort to resolve this conflict. The first strategy is to minimize the ethically sensitive nature of the issue, which means burying one’s head in the sand, ignoring the conflict or forgetting about it as quickly as possible.

For example, one respondent explains:

“I wouldn’t say that pharmaceutical industry is whiter than white, either. There have been cases like Servier, of people who were dishonest. But that’s not the case for most people who work in the industry. They are happy to work in an industry that has made a positive contribution to society.”

According to these professionals, there is no conflict between the health and economic missions: making a profit is a way to finance medical research. This perspective makes pharmaceutical companies out to be “the main investors in health”.

In addition, they point out that their practices are very tightly regulated by law. Several respondents point out that Mediator was a landmark case:

“There is no longer a problem because everything has been regulated. Problems caused by conflicts of interest such as the Servier case are over, they can’t happen anymore. There truly was a before and after Mediator, it really changed things.”

Unable to ignore the media-driven attacks on the pharmaceutical industry, they defend themselves by denouncing the media’s role in stirring up controversy, the headlines that seek to “create a buzz” and the “journalists who don’t have anything better to write about”.

In contrast, other respondents are well aware of the risks that the marketed product poses to patients. However, they claim to be taking these risks precisely for patient’s sake. This is how the rationale for doubling the doses recommended under the regulations for children with serious pathologies is justified:

Like heroes

“Even if it’s a product that is dangerous, potentially dangerous, and on which you don’t have too much hindsight, you tell yourself that you can decide, with the chief scientist, to support the doctors doubling the doses because there’s a therapeutic benefit.”

The emphasis on acting in the patient’s interest is disturbing because it leads marketers to conceal the economic dimension of their activity and to present it as a secondary concern. However, doubling the doses does indeed increase the sales of the product.

Paradoxically, referring to the patient’s well-being in this way can actually serve to endorse unethical acts, while sometimes enabling the marketers to present themselves as heroes who work miracles for their patients. One of them justifies his actions in this way:

“Our product was very beneficial to patients; everyone was grateful to us… First there were the health professionals who told us ‘Our patients are delighted, their cholesterol levels are really low, it’s great’ and then there were the patients who testified that ‘My doctor had been forcing me to take cholesterol-lowering drugs for the past three years and I was always in pain everywhere… I’ve been taking your products for two months now and not only is my cholesterol level low, but above all, I’m no longer in any pain whatsoever.’”

Their way of presenting their profession sometimes even makes them out to be acting as caregivers.

In the final strategy, some respondents note that the notion of profitability takes precedence over the health mission, and express their mistrust of the discourse developed by other sales professionals:

“Money has become so important these days, and I get the impression there is hardly any concern for ethics in the organizations and people marketing the products.”

The disillusionment of these marketers is such that, in contrast to the cases mentioned above, they can no longer find arguments to justify their marketing actions and reduce their malaise.

“I was not very comfortable because I felt like I was selling something that could possibly hurt people or even be fatal in certain cases. I was feeling a little guilty actually… I was thinking that I would have preferred to have been marketing clothes, or at least untainted products.”

The only way out of their dissonance seems to be to avoid problematic practices by changing jobs, companies, or even leaving the pharmaceutical industry altogether.

Training and regulatory affairs

What is the solution? It seems difficult to make recommendations to pharmaceutical manufacturers in light of the doubts about the real willingness of top management to prevent unethical behavior by their employees when such behavior is adopted in their economic interest.

However, highlighting the existence of moral dissonance and the psychological suffering it inflicts upon workers should cause them concern. Studies show that these phenomena have negative consequences such as loss of commitment to work and increased staff turnover.

This is especially true in the pharmaceutical industry, which is involved in a noble cause – health – to which the respondents generally remain strongly attached.

Externally, an ethical dimension should be more systematically integrated into marketing training, especially in specialized health marketing courses.

Moreover, although the law has been tightened up, particularly after the Mediator affair, this has not prevented the emergence of new scandals, particularly in new markets such as implants. To protect citizens, the public authorities should therefore be paying more attention to para-medical products, which are currently subject to less restrictive regulations.

Loréa Baïada-Hirèche, Senior Lecturer in Human Resources Management, Institut Mines-Télécom Business School; Anne Sachet-Milliat, Lecturer and Researcher in Business Ethics, ISC Paris Business School and Bénédicte Bourcier-Béquaert, Lecturer and Researcher in Marketing, ESSCA École de Management

This article has been republished from The Conversation under a Creative Commons license. Read the original article (in French).