Ethics in Software Development

Slides:



Advertisements
Similar presentations
The Second System Effect and Self Discipline “Add little to little and there will be a big pile.” - Ovid.
Advertisements

Using Your Knowledge – Security Threats
Feature Driven Development
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Ethical Hacking by Shivam.
Project activities and experiences in an Albanian software company Luan Jubica Zagreb 2004.
0-1 Team # Status Report (1 of 4) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team #: Team Name.
0-1 Team # Status Report (1 of 4) Client Contact –Status Point 1 –Status Point 2 Team Meetings –Status Point 1 –Status Point 2 Team Organization –Description.
ETHICS IN THE WORKPLACE
Problem with Software Requirements are complex The client does not know the functional requirements in advance Requirements may be changing Technology.
Maintaining Information Systems Class 27. SDLC Project Identification & Selection Project Initiation & Planning Analysis Logical Design Physical Design.
ABIGAIL BARRIOS ISAIAS CASTILLO ANA VARGAS Intellectual Property Rights and Software Piracy.
Possible WebQuest type links  
Chapter 15 Systems Development
Computer Ethics.
Presentation Handout EDBA – Module 8 Information Technology 7 th December 2014 By K.M.Prashanthan.
(ISC)2 SecureLondon 2009, London, United Kingdom This information is not intended, and should not be construed, as an offer to sell, or as a solicitation.
Managing IT/IS Projects Across Borders: Opportunities and Challenges for Hong Kong Joseph Lee.
Chapter 16 Alternative Avenues for Systems Acquisitions
Unethical use of Computers and Networks
6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.
SOFTWARE ARCHITECT – DESIGN.  Introduction  Architecture Drivers  POS System Architecture  Mapping Between Perspective  Evaluate Architecture  Project.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
System Security and Problems Martin Coleman 10F. Problems with Security and performance There are many problems that can cause your system to perform.
1 ISA&D29-Oct ISA&D29-Oct-13 Systems Analyst: problem solver IT and Strategic Planning.
CSCE 548 SDLC. CSCE Farkas2 Reading This lecture – The Software Development Life Cycle (SDLC),
Project Review. I.What Has Been Accomplished II. The future for SPAM III. Project plans Outline.
Final Class Diagram for C++ Implementation Clickermatic Software Clicker.
Institutional affiliation Date.  Security is very important as it keeps your secret from other know.  An insecure network exposes a business to various.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 4 Slide 1 Slide 1 Use Case Packets.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Borders Business Programme IT and Marketing Functions of Web-based Systems Russell Taylor Lecturer in Computing Borders Business Programme.
Definition of Internet Piracy Definition of Internet Piracy Internet Piracy The unlawful reproduction and/or distribution of any copyrighted digital file.
GROUP SYSTEMS & QUALIFY A JOURNEY THROUGH CHANGE DAN EVE OLD MUTUAL 1.
Becoming a Business Analyst An industry perspective.
Workflows Eighth Edition, WCB/McGraw-Hill, 2011 Stephen R. Schach.
WATERFALL METHOD Robbie Campbell WHAT IS IT  Considered the classic approach to the SDLC.  It is a linear method with goals for each development phase.
Cyber Law And Ethics And Ethics.
Information System Analysis Implementation & Security.
 Has computer technology knowledge and programming expertise  Understands business problems  Uses logical methods for solving problems  Has fundamental.
Nine Elements of Digital Citizenship Isabella Freijah.
PRJ566 : Project Planning and Management Project Initiation Document: Scope, Constraints, Legal, Moral and Ethical Issues, Risk Management.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Copyright Computer crime and cyber security.
Legal and ethical issues
Cyber crime and security issues
Business Threats What could it mean for you?
Systems Analysis and Design in a Changing World, Fifth Edition
Hackers and Crackers iJacsn.
Software: Piracy.
Introduction to Computers
ICT meeting Business needs
Norm What society has determined to be proper behaviour.
Five Unethical Uses of Computers
AJS 554 Competitive Success-- snaptutorial.com
Piracy Protection Software by CustomSoft
AJS 554 Education for Service-- snaptutorial.com
AJS 554 Teaching Effectively-- snaptutorial.com
آداب برای حرفه ای های فاوا و کاربران آن :
مسئولیتهای پزشکی درانجام اقدامات تشخیصی و درمانی (رابطه حقوقی پزشک و بیمار)
دکتر سعید غلامزاده مدیرکل پزشکی قانونی استان فارس
Top Five Computer Related Crimes
Encryption and Hacking
Computers Tools for an Information Age
System Analysis and Design
System Analysis and Design
Computers Tools for an Information Age
Computers Tools for an Information Age
Chapter 1 Key Security Terms.
SDLC (Software Development Life Cycle) Role Play
Presentation transcript:

Ethics in Software Development Keith Neer

Software Development The Software Crisis began in the 1960s Taking too long to implement Costing too much Complacency was becoming an issue People were losing their lives

Cause of the Software Crisis Not enough qualified programmers Poor architect development Security threats

SDLC Clients constantly changing requirements Short time hacks Insufficient time Poor Documentation

Open Source Is it stealing? What is the point of having Open Source Software?

Piracy Cheap alternative Severe punishment It’s illegal

QUESTIONS?