A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 Can We Trust the Computer?

Slides:



Advertisements
Similar presentations
A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers.
Advertisements

Social Implications of a Computerized Society Computer Errors Instructor: Oliver Schulte Simon Fraser University.
Introduction to Risk Management 26 September 2014 Peter Fowler CPPD.
Can We Trust the Computer?
Slides prepared by Cyndi Chie and Sarah Frye. Fourth edition revisions by Sharon Gray. A Gift of Fire Fourth edition Sara Baase Chapter 8: Errors, Failures,
Reliability and Safety Lessons Learned. Ways to Prevent Problems Good computer systems Good computer systems Good training Good training Accountability.
A Gift of Fire Third edition Sara Baase
1 Introduction to Software Engineering Lecture 39 – Software Development.
A Gift of Fire Third edition Sara Baase
4-1 McGraw-Hill/Irwin ©2002 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Materiality and Risk.
Errors, Failures and Risks CS4020 Overview Failures and Errors in Computer Systems Case Study: The Therac-25 Increasing Reliability and Safety Dependence,
Human resources management systems Human Resource Management Systems: Strategies, Tactics, and Techniques Ceriello, V.R. & Freeman, M.C. (1991) New York:
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
1 Chapter 3 Critical Systems (cont.). 2 Safety Safety is a property of a system that reflects the system’s ability to operate, normally or abnormally,
Ch. 12. Money and Financial Institutions
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 8: Errors, Failures, and Risks Version modified by Cheryl.
Evaluation of Safety Critical Software -- David L. Parnas, -- A. John van Schouwen, -- Shu Po Kwan -- June 1990 Presented By Zhuojing Li.
PROJECT RESOURCES AND RISKS By Catherine Cowper. AVAILABLE RESOURCES When doing a project there are various resources that need to be made available for.
Transaction Processing System  Business Transactions are certain events that occur routinely in a business firm.  A transaction is a set of activities.
Data Data is collection of facts and figures which are not in directly usable form. It is also termed as Input about an item, a person or a place. It.
Chapter 8: Errors, Failures, and Risk
1 Can We Trust the Computer? What Can Go Wrong? Case Study: The Therac-25 Increasing Reliability and Safety Perspectives on Failures, Dependence, Risk,
An Overview of Transaction Processing Systems
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 8: Errors, Failures, and Risks.
Can We Trust Computers? CS 301 (Spring 2007) Mark Luntzel, Niel Ngyuen, and James Cheng.
Security and Reliability THERAC CASE STUDY TEXTBOOK: BRINKMAN’S ETHICS IN A COMPUTING CULTURE READING: CHAPTER 5, PAGES
Protecting the Public, Astronauts and Pilots, the NASA Workforce, and High-Value Equipment and Property Mission Success Starts With Safety Believe it or.
1 Chapter 3 Critical Systems. 2 Objectives To explain what is meant by a critical system where system failure can have severe human or economic consequence.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 3 Slide 1 Critical Systems 1.
Introduction to Business © Thomson South-Western ChapterChapter Production and Business Operations Types of Production Production Planning.
A Gift of Fire, 2edChapter 1: Unwrapping the Gift1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and.
CS 4001Mary Jean Harrold 1 Can We Trust the Computer?
Capabilities & Limitations of Information and Communication Technology
CptS 401 Adam Carter. Announcement  Executive decision: no class Thursday! (CH and exam review will take place tomorrow instead)  Be sure that.
Database What is a database? A database is a collection of information that is typically organized so that it can easily be storing, managing and retrieving.
© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart1 of 43 Every transaction cycle: –Relates to other cycles.
“You have a duty of care for your own health and safety”
1 CS 501 Spring 2002 CS 501: Software Engineering Lecture 24 Delivering the System.
What is Software Engineering? The discipline of designing, creating, and maintaining software by applying technologies and practices from computer science,
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 Professional Ethics and Responsibilities.
The Relational Model1 Transaction Processing Units of Work.
LESSON 3. Properties of Well-Engineered Software The attributes or properties of a software product are characteristics displayed by the product once.
© Oklahoma State Department of Education, All rights reserved. 1 Standard 3. Finding Financial Services.
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
Budgeting Techniques Key Terms --Budget --Fixed Expenses --Allowance --Budget Variance.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
What is a HRIS? A human resource information system is an integrated system providing information used by HR management in decision making. It allows a.
CS 4001Mary Jean Harrold1 Class 20 ŸSoftware safety ŸRest of semester Ÿ11/1 (Thursday) Term paper approach due Ÿ11/13 (Tuesday) Assignment 8 on software.
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
Thepul Ginige Lecture-7 Implementation of Information System Thepul Ginige.
Topic: Reliability and Integrity. Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence.
Thepul Ginige Lecture-5 Implementation of Information System Part - I Thepul Ginige.
ERRORS, FAILURES, AND RISK By: Majed Ainaldin Olalekan Alabi.
Chapter 8: Errors, Failures, and Risk Zach Archer Daniel O’Hara Eric Strittmatter.
1. 2 Engineering Economics (2+0) Fundamentals of Engineering Economics-2 And Time value of Money Instructor: Prof. Dr. Attaullah Shah Lecture # 2 Department.
MAJOR SOFTWARE FAILURES, WHY THEY FAILED AND LESSONS LEARNED BY AKPABIO UWANA.
HOW TO CHOOSE A CREDIT CARD. CHARGE IT! Using credit cards to pay for goods and services is a fact of life for most consumers. Yet, many consumers do.
Safety Critical Systems
Can We Trust the Computer? FIRE, Chapter 4. What Can Go Wrong? What are the risks and reasons for computer failures? How much risk must or should we accept?
5 Techniques for a Proper Website Security Testing.
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
Week 13: Errors, Failures, and Risks
Demand Management, Order Management, and Customer Service
Reliability and Safety
Computer in Safety-Critical Systems
A Gift of Fire Third edition Sara Baase
Well Come To Our Presentation Accounting Information System Topic: Report on Revenue Cycle.
Presentation transcript:

A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 Can We Trust the Computer?

A Gift of Fire, 2edChapter 4: Can We Trust the Computer?2 What Can Go Wrong? Facts About Computer Errors Error-free software is almost impossible. Errors are often caused by more than one factor. Errors can be reduced by following good procedures and professional practices.

A Gift of Fire, 2edChapter 4: Can We Trust the Computer?3 What Can Go Wrong? The Roles of People in Computer-related Problems: Computer User At home or work, users should understand the limitations of computers and the need for proper training and responsible use. Computer Professional Understand the source and consequences of computer failures

A Gift of Fire, 2edChapter 4: Can We Trust the Computer?4 What Can Go Wrong? Categories of Computer Errors and Failures Problems for Individuals: usually in their role as consumers. System Failures: affecting large numbers of people and/or costing large amounts of money. Safety-Critical Applications: where people may be injured or killed.

A Gift of Fire, 2edChapter 4: Can We Trust the Computer?5 What Can Go Wrong? Problems for Individuals Billing Errors Lack of tests for inconsistencies and inappropriate amounts. Database Accuracy Problems Incorrect information resulting in wrongful treatment or acts.

A Gift of Fire, 2edChapter 4: Can We Trust the Computer?6 What Can Go Wrong? System Failures Communications: Telephone, online, and broadcast services. Business: Inventory and management software. Financial: Stock exchange, brokerages, banks, etc.. Transportation: Reservations, ticketing, and baggage handling.

A Gift of Fire, 2edChapter 4: Can We Trust the Computer?7 What Can Go Wrong? Safety-Critical Applications Military Power Plants Aircraft Trains Automated Factories Medicine …others.

A Gift of Fire, 2edChapter 4: Can We Trust the Computer?8 Increasing Reliability and Safety What Goes Wrong? Computer Systems Fail Because: The job they are doing is inherently difficult, and The job is done poorly. Compounding the Reliability Issue: Developers and users exhibit overconfidence in the system. Reused system software may not work in different environments.

A Gift of Fire, 2edChapter 4: Can We Trust the Computer?9 Increasing Reliability and Safety Professional Techniques Follow good software practices. Exhibit professional responsibility at all levels of development and use. Construct well-designed user interfaces. Take human factors into account. Incorporate self-checking where appropriate. Follow good testing principals and techniques.