Trust, Safety & Reliability INTRODUCTION TO COMPUTER ERRORS TEXTBOOK: BRINKMAN’S ETHICS IN A COMPUTING CULTURE READING: CHAPTER 5, PAGES 150-155, 160-163.

Slides:



Advertisements
Similar presentations
Electronic Voting Systems
Advertisements

A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers.
Overview of IS Controls, Auditing, and Security Fall 2005.
TGDC Meeting, Jan 2011 Evaluating risk within the context of the voting process Ann McGeehan Director of Elections Office of the Texas Secretary of State.
Computer Errors, Failures, and Risks Dr. Kapatamoyo 9/9/14.
System Safety Concepts Dave Balderston Office of System Safety March 26, 2003.
Ethics in a Computing Culture
Starting Out with C++, 3 rd Edition 1 Chapter 1. Introduction to Computers and Programming.
Slides prepared by Cyndi Chie and Sarah Frye. Fourth edition revisions by Sharon Gray. A Gift of Fire Fourth edition Sara Baase Chapter 8: Errors, Failures,
Reliability and Safety Lessons Learned. Ways to Prevent Problems Good computer systems Good computer systems Good training Good training Accountability.
Ronald L. Rivest MIT Laboratory for Computer Science
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #18-1 Chapter 18: Introduction to Assurance Overview Why assurance? Trust and.
A Gift of Fire Third edition Sara Baase
©TheMcGraw-Hill Companies, Inc. Permission required for reproduction or display. COMPSCI 125 Introduction to Computer Science I.
Reliability in Embedded Software Joseph Lucas. Requirements Real time/reactive operation Real time/reactive operation Small size, low weight Small size,
Trust, Safety and Reliability
Voting and You A presentation of the National Youth Leadership Network.
Voting System Qualification How it happens and why.
Checking Accounts 101 How much do you know about the most common form of bank account?
The Ariane 5 Launcher Failure
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 9 Slide 1 Critical Systems Specification 2.
Data Data is collection of facts and figures which are not in directly usable form. It is also termed as Input about an item, a person or a place. It.
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 7: Computer Reliability Ethics for the Information Age Forth Edition by.
The Computer vote ! The Way of the Future ?. The old-fashioned way is the way! The mind set of most people. (it was good enough for dad, it’s good enough.
Lecture 13: Broader Engineering Perspectives EEN 112: Introduction to Electrical and Computer Engineering Professor Eric Rozier, 4/8/13.
Liability for Computer Errors Not covered in textbook.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 8: Errors, Failures, and Risks.
How does a Bill become a Law? Look at earlier Notes and think about what was said in the Mr. Smith Movie about the Process. Journal.
E-Voting Dissent Sara Wilson, Katie Noto, John Massie, Will Sutherland, Molly Cooper.
Electronic Voting Ronald L. Rivest MIT Laboratory for Computer Science.
 CS 5380 Software Engineering Chapter 8 Testing.
INVARIANTS EEN 417 Fall When is a Design of a System “Correct”? A design is correct when it meets its specification (requirements) in its operating.
Slide No. 1 Course: Logic Design Dr. Ali Elkateeb Topic: Introduction Course Number: COMP 1213 Course Title: Logic Design Instructor: Dr. Ali Elkateeb.
Polling Places -Polling Places -precinct based -Usually in schools, town halls, public places -open early and close late 7-7 or 8-8.
INFORMATION TECHNOLOGY The implications of IT. The general effect of IT on our lives There have been a number of general trends in it:  computers have.
The Electoral Process Chapter 7.
Chapter 18: Introduction to Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Software Testing and Quality Assurance Software Quality Assurance 1.
TEKS 8C: Calculate percent composition and empirical and molecular formulas. Jackson and Van Buren Essential Question: How did old issues take new shape.
HOW A BILL BECOMES A LAW.  Schoolhouse Rock- How a Bill Becomes a Law - YouTube Schoolhouse Rock- How a Bill Becomes a Law - YouTube SCHOOLHOUSE ROCK.
How and what to observe in e-enabled elections Presentation by Mats Lindberg, Election Adviser, Organisation for Security and Co-operation in Europe (OSCE)
Introduction to Measurement. According to Lord Kelvin “When you can measure what you are speaking about and express it in numbers, you know something.
APA – Fundamentals of Payroll Chapter 2 – Payroll Systems March 10, 2012.
Computers in Society Electronic Voting. Team Projects What is your name? Application? Presentation? Copyright The software industry The open source business.
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
Higher Computing Science 2016 Prelim Revision. Topics to revise Computational Constructs parameter passing (value and reference, formal and actual) sub-programs/routines,
Chapter 8 Errors, Failures, & Risks. Real Headlines Navigation system directs car into river Data entry typo mutes millions of U.S. pagers Flaws found.
Strand 1: Social and ethical significance SL/HL core Social and ethical considerations linked to specified IT developments. Students must study the following.
Topic: Reliability and Integrity. Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence.
Chapter 8: Errors, Failures, and Risk Zach Archer Daniel O’Hara Eric Strittmatter.
Safety Critical Systems
Computer Systems Salihu Ibrahim Dasuki (PhD) CSC102 INTRODUCTION TO COMPUTER SCIENCE.
Can We Trust the Computer? FIRE, Chapter 4. What Can Go Wrong? What are the risks and reasons for computer failures? How much risk must or should we accept?
E-voting …and why it’s good..
Embedded Systems Introduction
Con Electronic Voting Preston Pope, Zach White, Ankit Shrivastava, Max Alexander.
Ronald L. Rivest MIT Laboratory for Computer Science
Chapter 18 Software Testing Strategies
Improving Reliability of Direct Recording Electronic Voting Systems
A Gift of Fire Third edition Sara Baase
Chapter 7: Computer Reliability
Week 13: Errors, Failures, and Risks
Errors, Failures, & Risks
Essential Question What are the procedures for voting?
Jackson and Van Buren.
Reliability and Safety
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
A Gift of Fire Third edition Sara Baase
Qualifications and Procedures for Voting
Presentation transcript:

Trust, Safety & Reliability INTRODUCTION TO COMPUTER ERRORS TEXTBOOK: BRINKMAN’S ETHICS IN A COMPUTING CULTURE READING: CHAPTER 5, PAGES ,

Computer errors A range of possible consequences – Seconds lost, other inconvenience – Data lost – $ - $$$ – Injuries and deaths Examples: – Disfranchised voters – False arrests – Price & billing errors – Air traffic control, airplane control

The Apocalypses That Might Have Been

Apocolypse cont’d

Hardware Errors Failure of the physical components of the computer system

Software Errors o “Bugs” o Bug v. mistake debate ◦Ariane 5 ◦ariane 5 explosion – YouTubeariane 5 explosion – YouTube ◦Floating point number storage ◦Arithmetic overflow

Computer Solves the Wrong Problem Complexity of programming: garbage in, garbage out Gemini 5, 105 miles off landing target: Earth’s rotation is not 360° in 24 hr but ° Friendship 7, 40 miles off landing target: Failure to take into account weight loss in aircraft due to use of consumables

Misuse The Hernandez situation: ◦Roberto Hernandez was pulled over running a stop sign ◦When the officer ran his license the officer was convinced that he was dealing with a wanted man, Roberto Hernandez Same birthday, similar height, weight, tattoo. Officer was convinced that the name difference was a mistake in the system. It was not.

Communication Failure Misunderstandings ◦Of what the system is capable of or how it works ◦See example of airliner running out of fuel ◦

Special Topic: Electronic Voting Electronic voting machines: ◦After the "hanging chad" controversy of the 2000 election, Congress passed a federal law that gave states funding to replace their punch card and lever voting systems with electronic voting machines

Implementation of electronic voting North Carolina 2004 ◦Voting machine manufacturer said the electronic voting machine could handle 10,500 votes each ◦Reality – could only hold 3,005 votes ◦Result – lost 4,530 votes Many voting machines do not create a paper trail ◦Voting machines used by as many as a quarter of American voters in 2012 can be hacked with just $26 in parts and an 8th grade science education ◦Vulnerability Assessment Team at Argonne National Laboratory ◦The experts say the hack could change voting results while leaving absolutely no trace of the manipulation behind

System testing ◦Flaws in modeling real events ◦Verification: does the computer program correctly implement program? ◦Not understanding all relevant issues ◦Validation: does the model accurately represent the real system?