skip to main content
article
Free Access

How good is good enough?: an ethical analysis of software construction and use

Published:02 January 1994Publication History
First page image

References

  1. 1 Cobb., R,H Mills, H.D. Engineering software under staistical quality control. IEEE Softw. 7,6 (Nov. 1990) 44-54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 Communications of the ACM Newstrack: ..And N.J, too. Communi. ACM 34 10 (Oct. 1991), 11.Google ScholarGoogle Scholar
  3. 3 Computer Professionals for Social Rcspcmsibility, The, CPSR Newsetter 1-8,. Palo Alto, Calif,Google ScholarGoogle Scholar
  4. 4 Data Processisng Services, Inc, vs. L.H. Smith Oil Corp. 492 N.E. 2d 314.Google ScholarGoogle Scholar
  5. 5 Daughtrey. Z, Software quality in regulated industries. Internationa software Quality conference (Dayton, OPhio, Oct. 7-9, 1991), pp. 140-142.Google ScholarGoogle Scholar
  6. 6 DeMillo, R.A . Liptot,, RJ,, and Saw-. yer F.G. Hires on test data seiectio, Help for the practicin g programmer. IEEE Comput. 11 4 (Apr.1978), 34- 41.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 Hall, A. Seven muyths of formal methods. IEEE Softw. 7, 5 (Sept. 19890). 11-19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 Huskey, V.R. and Huskey,H.D. Lady lovelace and Charles Babbage. An nals of the History of computoing 2, 4 (Jan. 1990). 299-329.Google ScholarGoogle Scholar
  9. 9 International Talent Group. Inc. us Copyright management, Inc., 769 S.W.2D 217.Google ScholarGoogle Scholar
  10. 10 Joh, F. Enabling software quality through total quality managemant. process improvement, and trchnology insertion, International Software Quality Conference (Dayton, Ohio, Oct. 7-9 1991), pp. 152- 157.Google ScholarGoogle Scholar
  11. 11 Latham and associate, Inc. vs.William Ravis real Estate, Inc., 589 A 2d 37.Google ScholarGoogle Scholar
  12. 12 Leveson, N.G. Safety as a software quality. Ieee Softw, 6,3 (May 1989), 88-89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13 Leveson, N,G, Formal methods in software engineefing IEEE Trans. softw. Eng. SE-16, 9 (Sept. 1990), 929-931. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14 Leveson, N.G. Software safety in embedded computer systems. Commun. ACM 34,2 (Feb. 1991), 34-46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15 Levy, I., B. and Bell, W.Y. Softwre product liability: Understandibng and minimizing the risks. High Tech. Law J. 8. Im(1990), 1-28.Google ScholarGoogle Scholar
  16. 16 Maths vs. Uondata corporation,480 N.Y.S. 2D 173.Google ScholarGoogle Scholar
  17. 17 McFarland, M.C. Ethics nd thre safety of computer systems,IEEE Softw. 24, 2 (Feb. 1991), 72-75. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18 Moor. J. What is computer ethics? metaphbilosophy 16, 4 (Oct 85), 266- 275.Google ScholarGoogle Scholar
  19. 19 Musa, J.D. Quantifyinfg software validation: when to stop testing. IEEE Softw. 6, 3 ( 1989), 19-27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20 Neilson Business Eqyuonebt cebterm Inc. Vs.Italo Monteleone, 524 A 2d 1172.Google ScholarGoogle Scholar
  21. 21 Neumann, P.G. Illustrative risks to the public in the use of cojmputer systems and related technology. Softw. Eng. Notes 14m i (jan. 1989) 22-26.Google ScholarGoogle Scholar
  22. 22 Neumann, P.G. Inside RISKS: Some reflections on a telephone switching proble,, Commun. ACM 33, 7 (July 1990), 154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23 Neumann, P.G. Ed. Subsection on certification of professionals, Softw. Eng. Notes 16, 1 (Jan. 1991), 24-32.Google ScholarGoogle Scholar
  24. 24 Neumann, P.G. Certifying Professionals. Commun. ACM 34, 2 ( Feb. 1991), 130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25 Parnas, D.I., van Schouwen, A.J., and Kwan, S.P. Evaluation of safetycritical sofrware. Commun. ACM 33, 6 (June 1990, 636-648. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26 Rawls, J. A Theory of Justice. Harvard University Press. Cambridge, Mass. 1971.Google ScholarGoogle Scholar
  27. 27 Rev. Rul. 85-189. 185-2 C.B. 341.Google ScholarGoogle Scholar
  28. 28 Riv Grande Jewelers supply Inc, vs. Data General corporation. 689 p.2d 1269.Google ScholarGoogle Scholar
  29. 29 W.R. Weaver company vs. Burroughs c corporation, 580 S.W. 2d 76.Google ScholarGoogle Scholar

Index Terms

  1. How good is good enough?: an ethical analysis of software construction and use

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Communications of the ACM
            Communications of the ACM  Volume 37, Issue 1
            Jan. 1994
            95 pages
            ISSN:0001-0782
            EISSN:1557-7317
            DOI:10.1145/175222
            Issue’s Table of Contents

            Copyright © 1994 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 2 January 1994

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader