CptS 401, Fall 2010 11/2/10 Chapter 8: Errors, Failures, and Risk See Dilbert cartoons about errors, failures, and risk:

Slides:



Advertisements
Similar presentations
Test process essentials Riitta Viitamäki,
Advertisements

A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers.
CptS 401, Spring /5/11 Chapter 7: Evaluating and Controlling Technology See Dilbert cartoons about evaluating and controlling technology:
MIS 2000 Class 20 System Development Process Updated 2014.
Social Implications of a Computerized Society Computer Errors Instructor: Oliver Schulte Simon Fraser University.
Can We Trust the Computer?
CptS 401, Spring2011 2/7/2011 Chapter : Privacy II See Dilbert cartoons about privacy:
Java.  Java is an object-oriented programming language.  Java is important to us because Android programming uses Java.  However, Java is much more.
Slides prepared by Cyndi Chie and Sarah Frye. Fourth edition revisions by Sharon Gray. A Gift of Fire Fourth edition Sara Baase Chapter 8: Errors, Failures,
Reliability and Safety Lessons Learned. Ways to Prevent Problems Good computer systems Good computer systems Good training Good training Accountability.
CptS 401, Spring /31/11 Chapter 7: Evaluating and Controlling Technology See Dilbert cartoons about evaluating and controlling technology:
Chapter 4.1 – 4.3.3: Intellectual Property I
CptS 401, Spring /15/2011 Chapter : Freedom of Speech I See Dilbert cartoons about freedom of speech:
1 / 24 CS 425/625 Software Engineering Software Evolution Based on Chapter 21 of the textbook [SE-8] Ian Sommerville, Software Engineering, 8 th Ed., Addison-Wesley,
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Errors, Failures and Risks CS4020 Overview Failures and Errors in Computer Systems Case Study: The Therac-25 Increasing Reliability and Safety Dependence,
Fundamental System Concepts Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica Updated: September 2014.
NEW DEMANDS ON OUTSOURCING: THE LONG-RUN PERSPECTIVE.
Systems Analysis and Design in a Changing World, 6th Edition
Xtreme Programming. Software Life Cycle The activities that take place between the time software program is first conceived and the time it is finally.
SDLC. Information Systems Development Terms SDLC - the development method used by most organizations today for large, complex systems Systems Analysts.
March 16, Calendar Next week: Thursday meeting instead of Tuesday (May 25) Web update later today.
Why Cryptosystems Fail Ross Anderson Presented by Su Zhang 1.
E.R.P.S University of Palestine. Risks in an ERP environment : The use of ERP systems clearly introduces additional risks into the system environment.
Database Environments Assignment Two By Benjamin Turner Assignment Two By Benjamin Turner 8/24/2015.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Therac 25 Nancy Leveson: Medical Devices: The Therac-25 (updated version of IEEE Computer article)
Information System Security and Control
ITGS Software Reliability. ITGS All IT systems are a combination of: –Hardware –Software –People –Data Problems with any of these parts, or a combination.
Chapter 8: Errors, Failures, and Risk
1 Can We Trust the Computer? What Can Go Wrong? Case Study: The Therac-25 Increasing Reliability and Safety Perspectives on Failures, Dependence, Risk,
CS 425/625 Software Engineering Legacy Systems
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 8: Errors, Failures, and Risks.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
CSCI 240: Computers in Society Week 12: Computer Technologies in the Workplace.
CS 4001Mary Jean Harrold 1 Can We Trust the Computer?
CptS 401 Adam Carter. Announcement  Executive decision: no class Thursday! (CH and exam review will take place tomorrow instead)  Be sure that.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Privacy Section 2.2 CptS 401 Adam Carter. Quiz Question 7 According to the book, the following is a provision of the Privacy Act of 1974: A.It requires.
SYSTEM TESTING AND DEPLOYMENT CHAPTER 8. Chapter 8: System Testing and Deployment 2 KNOWLEDGE CAPTURE (Creation) KNOWLEDGE TRANSFER KNOWLEDGE SHARING.
A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 Can We Trust the Computer?
Construction, Testing, Documentation, and Installation Chapters 15 and 16 Info 361: Systems Analysis and Design.
Managing Change 1. Why Do Requirements Change?  External Factors – those change agents over which the project team has little or no control.  Internal.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Systems Analysis and Design in a Changing World, 6th Edition
Fall 2015CISC/CMPE320 - Prof. McLeod1 CISC/CMPE320 Lecture Videos will no longer be posted. Assignment 3 is due Sunday, the 8 th, 7pm. Today: –System Design,
CptS 401 Adam Carter. Final Review  Similar structure to the midterm: Multiple choice Matching (probably quotes from Daemon) Essay  Most questions will.
CS 4001Mary Jean Harrold1 Class 20 ŸSoftware safety ŸRest of semester Ÿ11/1 (Thursday) Term paper approach due Ÿ11/13 (Tuesday) Assignment 8 on software.
Object-Oriented Software Engineering Chapter 1 Software and Software Engineering.
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
THE WHAT, WHY AND HOW OF OUTSOURCING INFORMATION SYSTEMS.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Chapter 8: Errors, Failures, and Risk Zach Archer Daniel O’Hara Eric Strittmatter.
MAJOR SOFTWARE FAILURES, WHY THEY FAILED AND LESSONS LEARNED BY AKPABIO UWANA.
Chapter 1 WHAT IS A COMPUTER Faculty of ICT & Business Management Tel : BCOMP0101 Introduction to Information Technology.
Level 2 Business Studies AS90844 Demonstrate understanding of the external operations of a large business.
Can We Trust the Computer? FIRE, Chapter 4. What Can Go Wrong? What are the risks and reasons for computer failures? How much risk must or should we accept?
Across the entire value chain
Effects of IT on Consideration of Internal Control in a Financial Statement Audit Dr. Donald McConnell Jr. 12/1/2018.
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
Reliability and Safety
Week 13: Errors, Failures, and Risks
Reliability and Safety
Computer in Safety-Critical Systems
A Gift of Fire Third edition Sara Baase
Presentation transcript:

CptS 401, Fall /2/10 Chapter 8: Errors, Failures, and Risk See Dilbert cartoons about errors, failures, and risk: 1

CptS 401, Fall /2/10 Reminders Video scene due tonight at 11:59 – Post to YouTube as “unlisted” – Submit.txt file to OSBLE with YouTube link Today’s reading quiz covers 8.1 and 8.2 2

CptS 401, Fall /2/10 Quiz Question 1 The cause of computer system failures can be attributed to A.faulty design B.sloppy implementation C.poor user interfaces D.All of the above E.None of the above 3

CptS 401, Fall /2/10 Answer : E (See p. 405) Computer software is inherently complex and will contain bugs – How much risk should we accept? – Are some risks just tradeoffs for the benefits that the software provides? Three useful perspectives – Computer users, who need to understand limitations of technology – Computer professionals, who need become better at what they do – Educated members of society, who make personal, social, legal and political decisions based on risks of computers 4

CptS 401, Fall /2/10 Quiz Question 2 The following is not a factor that contributes to the problems that computer databases cause for people: A.A large population B.Automated processing without human intervention C.Inaccurate biometric data D.Errors in data entry E.Lack of accountability for errors 5

CptS 401, Fall /2/10 Answer: C Several Factors Contribute to Database Problems A large population (many with similar names) Automated processing can’t always recognize special cases or doesn’t use common sense Overconfidence in accuracy of data Human errors in data entry Data are not updated or maintained Humans aren’t accountable for problems (blame it on computer!) 6

CptS 401, Fall /2/10 Quiz Question 3 In the context of Ch. 8, RSI stands for A.Redundant System Inputs B.Recalibrated System Integrity C.Repetitive Safety Isometrics D.Redundant Safety Information E.None of the above 7

CptS 401, Fall /2/10 Answer: RSI = Repetitive Strain Injuries (E) (see gray box on p. 411) Have you experienced pain from using a keyboard or mobile device for extended periods of time? A: Yes B: No What can you do to prevent this? 8

CptS 401, Fall /2/10 Quiz Question 4 A strategy mentioned by the book for making electronic voting machines less vulnerable to fraud and sabotage is A.requiring the machines to be housed in a locked cabinet B.requiring the software they use to be public C.keeping the software they use secret D.All of the above E.None of the above 9

CptS 401, Fall /2/10 Answer: B (see p. 416) Electronic Voting has Pros and Cons With your group discuss the pros and cons of electronic voting for about 90 seconds Can you cite recent elections in which it worked or didn’t work? 10

CptS 401, Fall /2/10 Quiz Question 5 The book discusses the failures of complex computer systems at three different airports. What was a common reason all three failed? A.They had not undergone sufficient testing B.They were unable to handle incorrect user input C.They were too complex to work properly D.None of the above 11

CptS 401, Fall /2/10 Answer: A See pp What were the three airports? There was immense political pressure to deploy these systems quickly Not enough time was allocated for thorough testing of the software, nor was adequate time allocated to properly train human workers in the use of the software Cite examples of abandoned computer systems in which millions or even billions of dollars were invested. 12

CptS 401, Fall /2/10 Quiz Question 6 systems are, thus requiring special adaptations to work with. A.Operating, difficult to program, antivirus software B.legacy, out-of-date, more modern systems C.safety-critical, highly complex, computer software D.Voting, proprietary, elections 13

CptS 401, Fall /2/10 Answer: B (see p. 420) Legacy Systems Have Caused Many Problems Large computer systems were originally used primarily in the banking and airline industries, and also by the government It is difficult for these systems to go “off-line” so that they can be replaced by new systems Hence, they often continue to be used, even though they are outdated, difficult to use, and difficult to maintain 14

CptS 401, Fall /2/10 Quiz Question 7 In the first decade of the 21 st century, there was one fatal accident per commercial flights. This was than the rate of the previous decade. A.10,000; higher B.100,000; lower C.1 million, higher D.4 million, lower E.None of the above 15

CptS 401, Fall /2/10 Answer: D Airline Travel is Astonishingly Safe! Several computer-based innovations have contributed to airline travel’s improving safety record (60% safer than a decade ago) – Name two mentioned in the book But: in times of crisis, should a pilot trust these systems or her own instincts? 16

CptS 401, Fall /2/10 Quiz Question 8 The following is true of the Therac-25 case: A.It’s a shining example of a device that was built with safety in mind. B.It teaches dramatic lessons about the negative impacts of poorly-designed software on human life. C.It shows that the known problems of a device can be avoided by competent operators of the device. D.None of the above 17

CptS 401, Fall /2/10 Question 8 Answer B. (See p. 425) 18

CptS 401, Fall /2/10 Quiz Question 9 Why did the Therac-6 and Therac-20, both predecessors to the Therac-25, not have the same safety problems as the Therac-25? A.They were generally used by operators with more skill. B.They didn’t have as strong an electron beam. C.They were controlled by better-designed software. D.They had a hardware interlock mechanism that prevented the beam from firing in unsafe conditions. E.Non of the above 19

CptS 401, Fall /2/10 Quiz Question 9 Answer D. See p

CptS 401, Fall /2/10 Quiz Question 10 One of the software errors that caused the Therac-25 malfunctions was due to A.A variable being incremented instead of set to a fixed value. B.A loop iterating one too many times C.An erroneous conditional check D.All of the above E.None of the above 21

CptS 401, Fall /2/10 Quiz Question 10 Answer A.(See p. 427) What was the other major software error? 22

CptS 401, Fall /2/10 Discussion Exercise Assignments 8.36: – Hospital that used machine Prosecuting attorney: Error 404, Discotech, Tier III, Pac4, Defense attorney: Breakfast Club, CAAK, Skynet, Prestige Worldwide – Company that made the machine Prosecuting attorney: FAM, Pangea, CADD, Thizzle Defense attorney: Brandon, Rock-It, Sponge Bob, SPAMD – Programmer who wrote the software Prosecuting attorney: Batman Symbol, Skillz that Killz, Hide ‘Yo Kids Defense attorney: Emoticons, Error 403 Forbidden, SkyBlue, iTeam 23