Skip to main content
Top

Hint

Swipe to navigate through the chapters of this book

2016 | OriginalPaper | Chapter

7. Software Issues: Risks and Liabilities

Author : Joseph Migga Kizza

Published in: Ethics in Computing

Publisher: Springer International Publishing

Abstract

In this chapter we focuses on the issues that arise out of the relationship between the developer and the buyer, including claims, user expectations, and the legal ramifications that may follow an unhealthy relationship. The discussion touches on standards, reliability, security, safety, quality of software, quality of service of software products, causes of software failures, developer and buyer protection, and techniques for improving software quality. Causes of software failures or poor performance of a software product are discussed attributing the causes to a variety of reasons but most notably human error, the nature of software itself, and the environment in which software is produced and used. Finally historic examples of software caused accidents are given including the Therac–25, the Space Shuttle Challenger, the Indian Bhopal chemical accident and the Chernobyl Nuclear Power accident. Both consumer protection and techniques for improving software quality are also discussed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hamlet R (1988) Special section on software testing. Commun ACM 31(6):662–667 CrossRef Hamlet R (1988) Special section on software testing. Commun ACM 31(6):662–667 CrossRef
2.
go back to reference Parnas D, van Schouwen J, Kwan S (1990) Evolution of safety-critical software. Commun ACM 33(6):636–648 CrossRef Parnas D, van Schouwen J, Kwan S (1990) Evolution of safety-critical software. Commun ACM 33(6):636–648 CrossRef
3.
go back to reference Taylor J (1994) America’s loneliest airport: Denver’s dreams can’t fly. Kansas City Star, 25 August, 1994. NewsBank, Transportation, fiche 43, grids D12–14 Taylor J (1994) America’s loneliest airport: Denver’s dreams can’t fly. Kansas City Star, 25 August, 1994. NewsBank, Transportation, fiche 43, grids D12–14
4.
go back to reference Neumann P (1995) Computer-related risks. ACM Press, New York Neumann P (1995) Computer-related risks. ACM Press, New York
5.
6.
go back to reference Ahl DL (1985) Employee computer crime on the rise. Creat Comput 11(6):6, Washington, DC Ahl DL (1985) Employee computer crime on the rise. Creat Comput 11(6):6, Washington, DC
7.
go back to reference Leveson N (1995) Safeware: system safety and computers. Addison-Wesley, Reading Leveson N (1995) Safeware: system safety and computers. Addison-Wesley, Reading
8.
go back to reference Littlewood B, Strigini L (1993) Validation of ultrahigh dependability for software-based systems. Commun ACM 36(11):69–80 CrossRef Littlewood B, Strigini L (1993) Validation of ultrahigh dependability for software-based systems. Commun ACM 36(11):69–80 CrossRef
9.
go back to reference Ritchie D (1984) Reflections on trusting trust. Commun ACM 27(8):761–763 CrossRef Ritchie D (1984) Reflections on trusting trust. Commun ACM 27(8):761–763 CrossRef
10.
go back to reference Haag S, Raju MK, Schkade LL (1996) Quality function deployment usage in software development. Commun ACM 39(1):41–49 CrossRef Haag S, Raju MK, Schkade LL (1996) Quality function deployment usage in software development. Commun ACM 39(1):41–49 CrossRef
11.
go back to reference Boehm BW (1989) Software risk management: principles and practices. IEEE Computer Society Press, New York CrossRef Boehm BW (1989) Software risk management: principles and practices. IEEE Computer Society Press, New York CrossRef
13.
go back to reference Fitzgerald K (1990) Whistle-blowing: not always a losing game. IEEE Spectr 26(6):49–52 CrossRef Fitzgerald K (1990) Whistle-blowing: not always a losing game. IEEE Spectr 26(6):49–52 CrossRef
16.
go back to reference Computer stock tumble over chip flow. New York Times, 4 December, 1994, section D Computer stock tumble over chip flow. New York Times, 4 December, 1994, section D
17.
go back to reference Johnson D (1994) Computer ethics, 2nd edn. Prentice Hall, Englewood Cliffs, p 134 Johnson D (1994) Computer ethics, 2nd edn. Prentice Hall, Englewood Cliffs, p 134
18.
go back to reference Prince J (1980) Negligence: liability for defective software. Okla Law Rev 33:848–855 Prince J (1980) Negligence: liability for defective software. Okla Law Rev 33:848–855
19.
go back to reference Neitzke F (1984) A software law primer. Reinhold, New York Neitzke F (1984) A software law primer. Reinhold, New York
20.
go back to reference Linger C, Mills HD, Witts B (1979) Structured programming: theory and practice. Addison-Wesley, Reading MATH Linger C, Mills HD, Witts B (1979) Structured programming: theory and practice. Addison-Wesley, Reading MATH
21.
go back to reference Knight J, Mayers A (1994) An improved inspection technique. Commun ACM 36(11):51–61 CrossRef Knight J, Mayers A (1994) An improved inspection technique. Commun ACM 36(11):51–61 CrossRef
go back to reference Banker R, Datar S, Kemerer C, Zeneig D (1993) Software complexity and maintenance costs. Commun ACM 36(11):81–94 CrossRef Banker R, Datar S, Kemerer C, Zeneig D (1993) Software complexity and maintenance costs. Commun ACM 36(11):81–94 CrossRef
go back to reference Fetzer J (1988) Program verification: the very idea. Commun ACM 31(9):1048–1063 CrossRef Fetzer J (1988) Program verification: the very idea. Commun ACM 31(9):1048–1063 CrossRef
go back to reference Gelperin D, Hetzel B (1988) The growth of software testing. Commun ACM 31(6):687–690 CrossRef Gelperin D, Hetzel B (1988) The growth of software testing. Commun ACM 31(6):687–690 CrossRef
go back to reference Grady R (1993) Practical results from measuring software quality. Commun ACM 36(11):50–61 CrossRef Grady R (1993) Practical results from measuring software quality. Commun ACM 36(11):50–61 CrossRef
go back to reference Laprie J-C, Littlewood B (1992) Probablistic assessment of safety-critical software: why and how? Commun ACM 35(2):13–21 CrossRef Laprie J-C, Littlewood B (1992) Probablistic assessment of safety-critical software: why and how? Commun ACM 35(2):13–21 CrossRef
go back to reference Leveson N (1991) Software safety in embedded computer systems. Commun ACM 34(2):34–46 CrossRef Leveson N (1991) Software safety in embedded computer systems. Commun ACM 34(2):34–46 CrossRef
Metadata
Title
Software Issues: Risks and Liabilities
Author
Joseph Migga Kizza
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-29106-2_7

Premium Partner