Skip to main content
Top

2010 | OriginalPaper | Chapter

8. Software Issues: Risks and Liabilities

Author : Prof. Joseph Migga Kizza

Published in: Ethical and Social Issues in the Information Age

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

After reading this chapter, the reader should be able to: 1. Explain the limitations of software testing as a means to ensure correctness. 2. Describe the differences between correctness, reliability, and safety. 3. Discuss the potential for hidden problems in reuse of existing software components. 4. Describe current approaches to manage risk and characterize the strengths and shortcomings of each. 5. Outline the role of risk management in software systems design and construction.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hamlet, Richard. “Special Section on Software Testing.” Communications of the ACM, 31(6), 1988, pp. 662-667.CrossRef Hamlet, Richard. “Special Section on Software Testing.” Communications of the ACM, 31(6), 1988, pp. 662-667.CrossRef
2.
go back to reference Parnas, David, John van Schouwen, and Shu Kwan. “Evolution of Safety-Critical Software.” Communications of the ACM, 33(6), 1990, pp. 636-648.CrossRef Parnas, David, John van Schouwen, and Shu Kwan. “Evolution of Safety-Critical Software.” Communications of the ACM, 33(6), 1990, pp. 636-648.CrossRef
3.
go back to reference Taylor, Jeff. “America’s Loneliest Airport: Denver’s Dreams Can’t Fly.” Kansas City Star, August 28, 1994. NewsBank, Transportation, 1994, fiche 43, grids D12-14. Taylor, Jeff. “America’s Loneliest Airport: Denver’s Dreams Can’t Fly.” Kansas City Star, August 28, 1994. NewsBank, Transportation, 1994, fiche 43, grids D12-14.
4.
go back to reference Neumann, Peter. Computer-Related Risks. New York: ACM Press, 1995. Neumann, Peter. Computer-Related Risks. New York: ACM Press, 1995.
5.
go back to reference Neumann, Peter. “The Role of Software Engineering.” Communications of the ACM, 36(5), 1993, p. 114.CrossRef Neumann, Peter. “The Role of Software Engineering.” Communications of the ACM, 36(5), 1993, p. 114.CrossRef
6.
go back to reference Davis, Ahl. “Employee Computer Crime on the Rise.” Creative Computing, June 1985, p. 6. Davis, Ahl. “Employee Computer Crime on the Rise.” Creative Computing, June 1985, p. 6.
7.
go back to reference Leveson, Nancy. Safeware: System Safety and Computers. Reading, MA: Addison-Wesley, 1995. Leveson, Nancy. Safeware: System Safety and Computers. Reading, MA: Addison-Wesley, 1995.
8.
go back to reference Littlewood, Bev, and Lorenzo Strigini. “Validation of Ultrahigh Dependability for Software-Based Systems.” Communications of the ACM, 36(11), 1993, pp. 69-80.CrossRef Littlewood, Bev, and Lorenzo Strigini. “Validation of Ultrahigh Dependability for Software-Based Systems.” Communications of the ACM, 36(11), 1993, pp. 69-80.CrossRef
9.
go back to reference Ritchie, Davis. “Reflections on Trusting Trust.” Communications of the ACM, 27(8), 1984, pp. 761-763.CrossRef Ritchie, Davis. “Reflections on Trusting Trust.” Communications of the ACM, 27(8), 1984, pp. 761-763.CrossRef
10.
go back to reference Haag, Stephen, M.K. Raju, and L.L. Schkade. “Quality Function Deployment Usage in Software Development.” Communications of the ACM, 39(1), 1996, pp. 41-49.CrossRef Haag, Stephen, M.K. Raju, and L.L. Schkade. “Quality Function Deployment Usage in Software Development.” Communications of the ACM, 39(1), 1996, pp. 41-49.CrossRef
11.
go back to reference Boehm, Barry W. Software Risk Management: Principles and Practices. New York: IEEE Computer Society Press, 1989. Boehm, Barry W. Software Risk Management: Principles and Practices. New York: IEEE Computer Society Press, 1989.
13.
go back to reference “Computer Stock Tumble Over Chip Flow.” New York Times, December 4, 1994, section D. “Computer Stock Tumble Over Chip Flow.” New York Times, December 4, 1994, section D.
14.
go back to reference Prince, Jim. “Negligence: Liability for Defective Software.” Oklahoma Law Review, 33, 1980, pp. 848-855. Prince, Jim. “Negligence: Liability for Defective Software.” Oklahoma Law Review, 33, 1980, pp. 848-855.
15.
go back to reference Johnson, Deborah. Computer Ethics (2nd ed.). Englewood Cliffs, NJ: Prentice Hall, 1994, p. 134. Johnson, Deborah. Computer Ethics (2nd ed.). Englewood Cliffs, NJ: Prentice Hall, 1994, p. 134.
16.
go back to reference Neitzke, Frederick. A Software Law Primer. New York: Reinhold, 1984. Neitzke, Frederick. A Software Law Primer. New York: Reinhold, 1984.
17.
go back to reference Linger, C., H.D. Mills, and B. Witts. Structured Programming: Theory and Practice. Reading, MA: Addison-Wesley, 1979.MATH Linger, C., H.D. Mills, and B. Witts. Structured Programming: Theory and Practice. Reading, MA: Addison-Wesley, 1979.MATH
18.
go back to reference Knight, Jack, and Ann Mayers. “An Improved Inspection Technique.” Communications of the ACM, 36(11), 1994, pp. 51-61.CrossRef Knight, Jack, and Ann Mayers. “An Improved Inspection Technique.” Communications of the ACM, 36(11), 1994, pp. 51-61.CrossRef
20.
go back to reference Karen Fitzgerald. “Whistle-blowing: Not Always a Losing Game.” IEEE Spectrum, 26(6), Dec. 1990, pp. 49-52.CrossRef Karen Fitzgerald. “Whistle-blowing: Not Always a Losing Game.” IEEE Spectrum, 26(6), Dec. 1990, pp. 49-52.CrossRef
go back to reference Banker, Rajiv, Srikant Datar, Chris Kemerer, and Dani Zeneig. “Software Complexity and Maintenance Costs.” Communications of the ACM, 36(11), 1993, pp. 81-94.CrossRef Banker, Rajiv, Srikant Datar, Chris Kemerer, and Dani Zeneig. “Software Complexity and Maintenance Costs.” Communications of the ACM, 36(11), 1993, pp. 81-94.CrossRef
go back to reference Fetzer, James. “Program Verification: The Very Idea.” Communications of the ACM, 31(9), 1988, pp. 1048-1063.CrossRef Fetzer, James. “Program Verification: The Very Idea.” Communications of the ACM, 31(9), 1988, pp. 1048-1063.CrossRef
go back to reference Gelperin, David, and Bill Hetzel. “The Growth of Software Testing.” Communications of the ACM, 31(6), 1988, pp. 687-690.CrossRef Gelperin, David, and Bill Hetzel. “The Growth of Software Testing.” Communications of the ACM, 31(6), 1988, pp. 687-690.CrossRef
go back to reference Grady, Roberts. “Practical Results from Measuring Software Quality.” Communications of the ACM, 36(11), 1993, pp. 50-61.CrossRef Grady, Roberts. “Practical Results from Measuring Software Quality.” Communications of the ACM, 36(11), 1993, pp. 50-61.CrossRef
go back to reference Laprie, Jean-Claude, and Bev Littlewood. “Probablistic Assessment of Safety-Critical Software: Why and How?” Communications of the ACM, 35(2), 1992, pp. 13-21.CrossRef Laprie, Jean-Claude, and Bev Littlewood. “Probablistic Assessment of Safety-Critical Software: Why and How?” Communications of the ACM, 35(2), 1992, pp. 13-21.CrossRef
go back to reference Leveson, Nancy. “Software Safety in Embedded Computer Systems.” Communications of the ACM, 34(2), 1991, pp. 34-46.CrossRef Leveson, Nancy. “Software Safety in Embedded Computer Systems.” Communications of the ACM, 34(2), 1991, pp. 34-46.CrossRef
Metadata
Title
Software Issues: Risks and Liabilities
Author
Prof. Joseph Migga Kizza
Copyright Year
2010
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-84996-038-0_8

Premium Partner