Skip to main content

2017 | OriginalPaper | Buchkapitel

8. Software Issues: Risks and Liabilities

verfasst von : Joseph Migga Kizza

Erschienen in: Ethical and Social Issues in the Information Age

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter focuses on the issues that arise out of the relationship between software developer and the buyer, including claims, user expectations, and the legal ramifications that may follow an unhealthy relationship. The discussion touches on standards, reliability, security, safety, quality of software, quality of service of software products, causes of software failures, developer and buyer protection, and techniques for improving software quality. Causes of software failures or poor performance of a software product are discussed attributing the causes to a variety of reasons but most notably human error, the nature of software itself, and the environment in which software is produced and used. Finally, historic examples of software-caused accidents are given including the Therac–25, the Space Shuttle Challenger, the Indian Bhopal chemical accident, and the Chernobyl nuclear power accident. Both consumer protection and techniques for improving software quality are also discussed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hamlet R (1988) Special section on software testing. Commun ACM 31(6):662–667CrossRef Hamlet R (1988) Special section on software testing. Commun ACM 31(6):662–667CrossRef
2.
Zurück zum Zitat Parnas D, van Schouwen J, Kwan S (1990) Evolution of safety–critical software. Commun ACM 33(6):636–648CrossRef Parnas D, van Schouwen J, Kwan S (1990) Evolution of safety–critical software. Commun ACM 33(6):636–648CrossRef
3.
Zurück zum Zitat Taylor J (1994) America’s loneliest airport: Denver’s dreams can’t fly. Kansas City Star, 25 Aug 1994. NewsBank, Transportation, fiche 43, grids D12–14 Taylor J (1994) America’s loneliest airport: Denver’s dreams can’t fly. Kansas City Star, 25 Aug 1994. NewsBank, Transportation, fiche 43, grids D12–14
4.
Zurück zum Zitat Neumann P (1995) Computer–related risks. ACM Press, New York Neumann P (1995) Computer–related risks. ACM Press, New York
5.
Zurück zum Zitat Neumann P (1993) The role of software engineering. Commun ACM 36(5):114CrossRef Neumann P (1993) The role of software engineering. Commun ACM 36(5):114CrossRef
6.
Zurück zum Zitat Davis A (1985) Employee computer crime on the rise. Creative Computing, June1985, p 6 Davis A (1985) Employee computer crime on the rise. Creative Computing, June1985, p 6
7.
Zurück zum Zitat Leveson N (1995) Safeware: system safety and computers. Addison–Wesley, Reading Leveson N (1995) Safeware: system safety and computers. Addison–Wesley, Reading
8.
Zurück zum Zitat Littlewood B, Strigini L (1993) Validation of ultrahigh dependability for software-based systems. Commun ACM 36(11):69–80CrossRef Littlewood B, Strigini L (1993) Validation of ultrahigh dependability for software-based systems. Commun ACM 36(11):69–80CrossRef
9.
Zurück zum Zitat Ritchie D (1984) Reflections on trusting trust. Commun ACM 27(8):761–763CrossRef Ritchie D (1984) Reflections on trusting trust. Commun ACM 27(8):761–763CrossRef
10.
Zurück zum Zitat Haag S, Raju MK, Schkade LL (1996) Quality function deployment usage in software development. Commun ACM 39(1):41–49CrossRef Haag S, Raju MK, Schkade LL (1996) Quality function deployment usage in software development. Commun ACM 39(1):41–49CrossRef
11.
Zurück zum Zitat Boehm BW (1989) Software risk management: principles and practices. IEEE Computer Society Press, New YorkCrossRef Boehm BW (1989) Software risk management: principles and practices. IEEE Computer Society Press, New YorkCrossRef
13.
Zurück zum Zitat Fitzgerald K (1990) Whistle-blowing: not always a losing game. IEEE Spectr 26(6):49–52CrossRef Fitzgerald K (1990) Whistle-blowing: not always a losing game. IEEE Spectr 26(6):49–52CrossRef
16.
Zurück zum Zitat Neitzke F (1984) A software law primer. Reinhold, New York Neitzke F (1984) A software law primer. Reinhold, New York
17.
Zurück zum Zitat Linger C, Mills HD, Witts B (1979) Structured programming: theory and practice. Addison–Wesley, Reading Linger C, Mills HD, Witts B (1979) Structured programming: theory and practice. Addison–Wesley, Reading
18.
Zurück zum Zitat Johnson D (1994) Computer ethics, 2nd edn. Prentice Hall, Englewood Cliffs, p 134 Johnson D (1994) Computer ethics, 2nd edn. Prentice Hall, Englewood Cliffs, p 134
19.
Zurück zum Zitat Knight JC, Mayers A (1994) An improved inspection technique. Commun ACM 36(11):51–61CrossRef Knight JC, Mayers A (1994) An improved inspection technique. Commun ACM 36(11):51–61CrossRef
Zurück zum Zitat Banker R, Datar S, Kemerer C, Zeneig D (1993) Software complexity and maintenance costs. Commun ACM 36(11):81–94CrossRef Banker R, Datar S, Kemerer C, Zeneig D (1993) Software complexity and maintenance costs. Commun ACM 36(11):81–94CrossRef
Zurück zum Zitat Fetzer J (1988) Program verification: the very idea. Commun ACM 31(9):1048–1063CrossRef Fetzer J (1988) Program verification: the very idea. Commun ACM 31(9):1048–1063CrossRef
Zurück zum Zitat Gelperin D, Hetzel B (1988) The growth of software testing. Commun ACM 31(6):687–690CrossRef Gelperin D, Hetzel B (1988) The growth of software testing. Commun ACM 31(6):687–690CrossRef
Zurück zum Zitat Grady R (1993) Practical results from measuring software quality. Commun ACM 36(11):50–61CrossRef Grady R (1993) Practical results from measuring software quality. Commun ACM 36(11):50–61CrossRef
Zurück zum Zitat Laprie J-C, Littlewood B (1992) Probabilistic assessment of safety–critical software: why and how? Commun ACM 35(2):13–21CrossRef Laprie J-C, Littlewood B (1992) Probabilistic assessment of safety–critical software: why and how? Commun ACM 35(2):13–21CrossRef
Zurück zum Zitat Leveson N (1991) Software safety in embedded computer systems. Commun ACM 34(2):34–46CrossRef Leveson N (1991) Software safety in embedded computer systems. Commun ACM 34(2):34–46CrossRef
Metadaten
Titel
Software Issues: Risks and Liabilities
verfasst von
Joseph Migga Kizza
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-70712-9_8