Dimitrios Christias Robert Lyon Andreas Petrou Dimitrios Christias Robert Lyon Andreas Petrou.

Slides:



Advertisements
Similar presentations
National e-Science Institute and National e-Science Centre Review Welcome Prof. Malcolm Atkinson Director 11 th October 2004.
Advertisements

ES050 – Introductory Engineering Design and Innovation Studio Prof. Ken McIsaac One last word…
FDA Human Factors of Medical Devices
CSCI 5230: Project Management Software Reuse Disasters: Therac-25 and Ariane 5 Flight 501 David Sumpter 12/4/2001.
“An Investigation of the Therac-25 Accidents” by Nancy G. Leveson and Clark S. Turner Catherine Schell CSC 508 October 13, 2004.
The Therac-25: A Software Fatal Failure
A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers.
Background Increasing use of automated systems Hardware and software technology are improving rapidly User interface technology is lagging Critical bottleneck.
An Investigation of the Therac-25 Accidents Nancy G. Leveson Clark S. Turner IEEE, 1993 Presented by Jack Kustanowitz April 26, 2005 University of Maryland.
Can We Trust the Computer? Case Study: The Therac-25 Based on Article in IEEE-Computer, July 1993.
Therac-25 Lawsuit for Victims Against the AECL
+ THE THERAC-25 - A SOFTWARE FATAL FAILURE Kpea, Aagbara Saturday SYSM 6309 Spring ’12 UT-Dallas.
Week 5 - Wednesday.  What did we talk about last time?  Attacks on hash functions.
Reliability and Safety Lessons Learned. Ways to Prevent Problems Good computer systems Good computer systems Good training Good training Accountability.
Motivation Why study Software Engineering ?. What is Engineering ? 2 Engineering (Webster) – The application of scientific and mathematical principles.
Software Engineering Modern Approaches Eric Braude and Michael Bernstein 1.
P09004 Eye Tracking. Engineering Analysis Reviewing manuals for Single Board Computer Looking at various mounting methods for cameras Preliminary.
Chapter 2 Health Care Information Systems: A Practical Approach for Health Care Management 2nd Edition Wager ~ Lee ~ Glaser.
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Errors, Failures and Risks CS4020 Overview Failures and Errors in Computer Systems Case Study: The Therac-25 Increasing Reliability and Safety Dependence,
Jacky: “Safety-Critical Computing …” ► Therac-25 illustrated that comp controlled equipment could be less safe. ► Why use computers at all, if satisfactory.
Chapter 1 - Introduction Lecture 1. Way back when... “The name ‘software engineering’ was proposed in 1969 at a NATO conference to discuss software development.
Software Failures Ron Gilmore, CMC Edmonton April 2006.
Lecture 7, part 2: Software Reliability
Dr Andy Brooks1 Lecture 4 Therac-25, computer controlled radiation therapy machine, that killed people. FOR0383 Software Quality Assurance.
DJ Wattam, Han Junyi, C Mongin1 COMP60611 Directed Reading 1: Therac-25 Background – Therac-25 was a new design dual mode machine developed from previous.
Therac-25 : Summary Malfunction Complacency Race condition (turntable / energy mismatch) Data overflow (turntable not positioned) time‘85‘86‘88 ‘87 Micro-switch.
Therac 25 Nancy Leveson: Medical Devices: The Therac-25 (updated version of IEEE Computer article)
Chapter 8: Errors, Failures, and Risk
1 Can We Trust the Computer? What Can Go Wrong? Case Study: The Therac-25 Increasing Reliability and Safety Perspectives on Failures, Dependence, Risk,
Software Software is omnipresent in the lives of billions of human beings. Software is an important component of the emerging knowledge based service.
Security and Reliability THERAC CASE STUDY TEXTBOOK: BRINKMAN’S ETHICS IN A COMPUTING CULTURE READING: CHAPTER 5, PAGES
Therac-25 Case Family vs. Programmer. People Suffered From Different Type of Bad Programming Database accuracy problems. Many people could not vote in.
CSc161 Software Quality Pete Sawyer & Alan Dix
Intent Specification Intent Specification is used in SpecTRM
An Introduction to Software Engineering. What is Software?
Towards total systems human factors Dr Beverley Norris Human Factors Lead National Patient Safety Agency Dr Ken Catchpole Senior Post Doctoral Scientist.
What you know… You work at the East Texas Cancer Center in Tyler, Texas as a physicist who “maintains and checks the machine regularly.” (Huff 2005) Patient.
The Electrical Testing of Laparoscopic Instruments WORKSHOP Testing of Medical Devices Mr John Robson Director, Biomedical Engineering Flinders Medical.
IAEA International Atomic Energy Agency Safety Reports Series No. 7 Lessons Learned from Accidents in Industrial Radiography Practical Radiation Safety.
UNIT 27: UNDERSTANDING HEALTH AND SAFETY IN THE BUSINESS WORKPLACE
Computing is Socio-Technical or: Why Stakeholder Listing is Inadequate for Thoughtful Ethical Analysis Chuck Huff St. Olaf College For NSF Computer Ethics.
Therac-25 CS4001 Kristin Marsicano. Therac-25 Overview  What was the Therac-25?  How did it relate to previous models? In what ways was it similar/different?
CSE 403, Software Engineering Lecture 6
©2001 Southern Illinois University, Edwardsville All rights reserved. Today Finish Ethics Next Week Research Topics in HCI CS 321 Human-Computer Interaction.
4.00 Explain the organization and structure of a hospitality business Explain the role safety plays in the workplace.
Chapter 8 Errors, Failures, & Risks. Real Headlines Navigation system directs car into river Data entry typo mutes millions of U.S. pagers Flaws found.
Directed Reading 1 Girish Ramesh – Andres Martin-Lopez – Bamdad Dashtban –
Randy Modowski Adam Reimel Max Varner COSC 380 May 23, 2011 Accountability.
Text box Workplace Safety and Health Management System New Worker Safety Orientation and Review Online Training Module.
DEVELOPING A PERSONALLY CONTROLLED HEALTH RECORD (PCHR) USING MICROSOFT VISUAL C# SESSION 9 SUMMARY.
Chapter 8: Errors, Failures, and Risk Zach Archer Daniel O’Hara Eric Strittmatter.
CHAPTER 9: PROFESSIONAL ETHICS AND RESPONSIBILITIES BY: MATT JENNINGS SHANE CRAKER KYLER RHOADES.
Occupational Radiation Protection during High Exposure Operations
Increasing use of automated systems
Software Quality and Testing (CSC 4133)
Why study Software Design/Engineering ?
Understanding of Health and Safety
EE 585 : FAULT TOLERANT COMPUTING SYSTEMS B.RAM MOHAN
Frequently asked questions about software engineering
Software Quality Assurance Lecture 1
Therac-25 Accidents What was Therac-25? Who developed it?
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
Reliability and Safety
Therac-25.
Week 13: Errors, Failures, and Risks
Computer in Safety-Critical Systems
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Dimitrios Christias Robert Lyon Andreas Petrou Dimitrios Christias Robert Lyon Andreas Petrou

 Therac-25 is a computer-controlled radiation therapy machine that was designed by Atomic Energy of Canada Limited (AECL).  It was used in medical institutions to destroy tumors.  Operates in a dual-mode.  Depends more on software routines to ensure safety.  Evolution of Software  Several accidents of radiation overdose happened between 1985 and 1987 using the Therac-25 due to software issues. Therac-6 Therac-25 Therac-20

 Concurrency problems - Therac-25 has a software system that allows concurrent access to shared memory. - The fundamental design of the system was flawed, as it lacked synchronization  Lack of safety - Therac-25 relied only on its software to ensure safety measures and handling errors  Lack of documentation - The system has been developed to display cryptic error messages - The user manuals did not indicate the danger of those malfunctions for the patient health.  Lack of testing - Limited and poor test coverage  The user centred design - User centred design concerns seemed to override patient safety  The role of Government - No information of the development, management and quality control procedures is available  Ignorance of the incidents - system users were unconcerned about the fact that Therac-25 was causing harm through its use

Adhere to basic principles of software engineering Proper testing Extensive documentation Re-using code Arrogance in the assumption that the software is safe Unrealistic risk assessment Interface design that focused on usability rather than safety

 Bozdag, E., Therac-25 and the security of the computer controlled equipment. [online], Ethics of Science and Technology. Available at [Accessed 01 October 2011].  Leveson, N., Medical Devices: The Therac-25. [online], University of Washington. Available at [Accessed 01 October 2011].  Lim, J., An Engineering Disaster: Therac-25. [online], Available at [Accessed 01 October 2011].