Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.

Slides:



Advertisements
Similar presentations
DIRECCIÓN GENERAL DE ARMAMENTO Y MATERIAL MINISDEF Industrial Policy Focused to SMEs Conference Strengthening European Small and Medium sized Enterprises.
Advertisements

Good Samaritan Acts & Helping Out on Airplanes Legal and ethical aspects.
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Lessons from Katrina for Metropolitan Regions Louise K. Comfort Graduate School of Public & International Affairs University of Pittsburgh
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
OHT 2.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 Software Quality assurance (SQA) SWE 333 Dr Khalid Alnafjan
Can We Trust the Computer?
Three Ethical Case Studies
Chapter 7 - Software Development1 Chapter 7 Software Development A Textbook aimed at protecting consumers Software Quality Links Ian Foster and Grid Computing.
WHY THEY FAILED AND LESSONS TO BE DRAWN Samuel Franklin G53QAT: Quality Assurance and Testing Famous Software Failures.
Software Engineering Disasters
Chapter 8 Representing Information Digitally.
NFPA Standard 1710: Organization and Deployment of Fire Suppression Operations, EMS and Special Ops The Right Description.
Significant Work. Extraordinary People. SRA. Property Management Solutions for Unique Identification, AIT, and the Supply Chain March 30, 2011 Susan Pearson,
MAINTENANCE ERROR ACCIDENTS
FORESEC Academy FORESEC Academy Security Essentials (II)
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Abstract Earthquakes are hazardous to people and the economy. Potential loss impacts include lives, homes, office buildings, manufacturing plants, schools,
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
1 Software Development Prepared By Joseph Leung. 2Agenda 1.Discuss the need for quality software in business systems, industrial process control systems,
1 Financial Comparison Between The Boeing Company and Lockheed Martin Keith L. Hohl EMGT 452 Semester Project 14 December 1999.
1 Software Testing and Quality Assurance Lecture 37 – Software Quality Assurance.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
Lecture 11 Reliability and Security in IT infrastructure.
Engineering Ethics Learning through Case Studies By: Marta Gaska Binghamton High School.
Frequently Asked Questions (FAQ) prepared by some members of the ICH Q9 EWG for example only; not an official policy/guidance July 2006, slide 1 ICH Q9.
Toward A Reasonable Programmer Standard Responsibility and Negligence in Software Design.
The Industrial College of the Armed Forces Resourcing the National Strategy.
Week 4 Epi. 211 Organizational and Community-Level Factors in Healthcare Performance Week 4 Epi. 211 Laura Schmidt, Ph.D, MSW, MPH Philip R. Lee Institute.
© 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Insurance.
Computer Maintenance Entrepreneurship 1 Copyright © Texas Education Agency, All rights reserved.
ICPHSO: U.S. and Canadian Product Liability and Safety Regulatory Risks Kenneth Ross Bowman and Brooke LLP October 27, 2009.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Hazardous Software Development 郭哲岳. outline Case Studies Identifying Hazard Analyzing Hazard Safety system fail and take charge of problem conclusion.
1Copyright © 2014 Cengage Learning.  What is an Interest Group?  Members share common views and objectives  Seek to influence government officials.
Operation PPE – Developing a Safety First Culture for Iowa Environmental Public Health Cory Frank, BA, Iowa Department of Public Health Des.
CS 4001Mary Jean Harrold 1 Can We Trust the Computer?
Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010.
Lessons learned and not learned Enn Tyugu Leading research scientist NATO Cooperative Cyber Defense Center of Excellence.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Copyright © 2012 Pearson Education, Inc. All rights reserved. Chapter 4 The Ethics of Manufacturing and Marketing.
1 SWE 513: Software Engineering People II. 2 Future Experience What will you be doing one year from now? Ten years from now?
SEN 460 Software Quality Assurance. Bahria University Karachi Campus Waseem Akhtar Mufti B.E(UIT), M.S(S.E) AAU Denmark Assistant Professor Department.
1 Software Quality Assurance COMP 4004 Notes Adapted from S. Som é, A. Williams.
Risk Communication: What is your experience in communication about risk?
The Engineer’s Responsibility Towards Safety Brian McMinn, Robert Malby, Chris Boven, Matt Edwards, Justin Fierman, Brian Morgan.
Liability coverage – covers liability and expenses when you’re at fault in an accident Bodily Injury Liability (BIL) – pays for the medical expenses of.
CptS 401 Adam Carter. Final Review  Similar structure to the midterm: Multiple choice Matching (probably quotes from Daemon) Essay  Most questions will.
The Unintended Consequences of a career in Engineering Or How to end up a mass murderer without even trying.
Requesting Accountability. What is accountability? An entity (or individual) is accountable when its actions, practices and policies are open to inspection.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Statement of Auditing Standard No. 94 The Effect of Information Technology on the Auditor’s Consideration of Internal Control in a Financial Statement.
Professional Ethics and Responsibilities Part-II
Health and Safety Executive “Working in Great Britain from Overseas”. Nigel Chambers “Plymouth Public Health Exchange’s Training” – 18/06/2008.
Can We Trust the Computer? FIRE, Chapter 4. What Can Go Wrong? What are the risks and reasons for computer failures? How much risk must or should we accept?
Karen M. Sandler General Counsel July 23, 2010 OSCON Free Software on Medical Devices: Unchain My Heart!
Traffic Commissioners for Great Britain
Aerospace Engineering and Related Careers
Ethical issues related to food safety
Computer Maintenance Entrepreneurship Trade & Industrial Education
Reliability and Safety
LO1 - Know about aspects of cyber security
“Good Samaritan Acts” & Helping Out on Airplanes
The Industrial College of the Armed Forces
Computer in Safety-Critical Systems
Software Engineering Disasters
Presentation transcript:

Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES IN COMPUTING

TOPIC 1. ACCOUNTABILITY A.Special Responsibility 1. Expert’s special knowledge implies special responsibility as citizen Obligation to raise public awareness Clarify technical issues

ACCOUNTABILITY A.2. Counter the influence of special interests Tobacco lobby and health policy Oil interests and energy policy Defense contractors and defense policy Equipment makers and electronic voting Government officials may get inaccurate information from the bureaucracy, and are influenced by lobbies.

ACCOUNTABILITY A.3. Computer professional: vital link in technology chain Computer is essential to critical infrastructure such as missile delivery system [‘locksmith’] Some things should not be done [‘horror point’]

ACCOUNTABILITY A.3. Computer professional: vital link in technology chain Ethically weak positions – “If I don’t do it someone else will.” – “My part is so small as to be insignificant.” [Berkeley’s “argument of the beard”]

ACCOUNTABILITY QUESTIONS: What issues involving critical infrastructure confront computer professionals today? - CARNIVORE - ECHELON

ACCOUNTABILITY B. Responsibility for Computer Systems 1. Examples of malfunctions a.Aircraft and systems (i) December 2004: 1100 Comair (Delta subsidiary) flights cancelled (ii) August 2004: US Airways flights delayed several hours due to “keystroke error” (iii) July 2004: 120 Northwest flights cancelled (power failure knocked out computer)

ACCOUNTABILITY B.1.a. Aircraft and systems (iv) July 2002: Mid-air collision - Russian passenger plane (Tu 154) and DHL cargo jet (Boeing 757) - Lake Constance over Swiss-German border - 80 passengers & 13 crew killed - cause: faulty collision avoidance system

ACCOUNTABILITY B.1.b. Power Distribution August 2003: Widespread power failure from Ohio to East Coast affected 50 m. people - First Energy Corp. in Ohio failed to get real- time data for a few hours before the failure - workers unaware of a generator failure and lack of power on several lines - Malicious hacker, virus or worm could have been responsible

ACCOUNTABILITY B.1. Examples of Malfunctions c. Rocket launch March 2000: European Space Agency Zenit rocket crashed in Pacific ocean - cause: software error - payload: communications satellite d. Intelligence Summer 1999: US Intelligence unable to process images from spy satellites: “computer error”

ACCOUNTABILITY B.1. Examples of Malfunctions e. Medical devices (FDA data on safety incidents) : 4484 events in radiological depts deaths, 1039 serious injuries malfunctions (many computer) f. Election problems - numerous incidents with paper balloting systems - recent problems with electronic voting

ACCOUNTABILITY B.1. Examples of Malfunctions g. Military systems 1991 (during Gulf War): Patriot anti-missile system failed to intercept incoming scud missile - US barracks in Saudi Arabia hit - 28 killed, 98 wounded - cumulative timing fault in Patriot software - system designed to operate no more than few hours after which clock would be reset - time discrepancies accumulated with continuous operation

ACCOUNTABILITY C. Organizational Accountability 1. Fault-based approach: seller should pay for defective product/inadequate service (a) Simple definition of “defective”: “failure to meet specifications” - Problem: a product (program) that satisfies specifications might still malfunction (e.g., crash a hard disk)

ACCOUNTABILITY C.1. Fault-based approach - Law could define “defect” as any aspect of a program that makes it unfit for use but must then clarify: -- for whom? -- what use? -- when? -- what makes program unfit?

ACCOUNTABILITY C.1. Fault-based approach b. Definition of competence: - Not clear how to do it for software development - Licensing discussion underscores this problem c. Cannot assure software with 0 defects

ACCOUNTABILITY C. Organizational Accountability 2. Risk management approaches (a) Technological risk management - put burden on those in a position to manage risk - make companies responsible for fixing bugs - similar to current approach in automobile industry

ACCOUNTABILITY C. Organizational Accountability 2. Risk management approaches (b) Commercial risk management - apportion financial responsibility for defects - agree on who pays rather than on responsibility for reducing risk (as in p[roduct recalls) - works for relatively equal contracting parties (none can dominate the others)

ACCOUNTABILITY D. Individual Accountability SHOULD SOFTWARE ENGINEERS BE LICENSED?