Library Logo
Normal view MARC view ISBD view

The dark side of software engineering : evil on computing projects / [electronic resource]

by Rost, Johann [author.]; Glass, Robert L [author.].
Material type: materialTypeLabelBookPublisher: Los Alamitos, CA : IEEE Computer Society ; [2011]Description: 1 online resource (x, 305 pages).ISBN: 9780470909959; 0470909951; 9780470909942; 0470909943; 9780470922873; 0470922877.Subject(s): Software engineering -- Moral and ethical aspects | Computer software industry -- Moral and ethical aspects | Software engineering | Computer software industry | EthicsOnline resources: Wiley Online Library
Contents:
FOREWORD / Linda Rising -- INTRODUCTION. What's the Dark Side? -- DARK SIDE ISSUES -- SUBVERSION. Introductory Case Studies and Anecdotes. The Survey: Impact of Subversive Stakeholders On Software Projects. Selected Responses 37. A Follow-Up to the Survey: Some Hypotheses and Related Survey Findings -- LYING. Introductory Case Studies and Anecdotes. Incidents of Lying: The Survey. Qualitative Survey Responses on Lying. What Can Be Done About Lying?. The Questionnaire Used in the Survey -- HACKING. Case Studies of Attacks and Biographies of Hackers. Cyber Terrorism and Government-Sponsored Hacking. The Hacker Subculture. How a Hacker Is Identified. Time Line of a Typical Malware Attack. Hacker Economy: How Does a Hacker Make Money?. Social Engineering. A Lingering Question. Late-Breaking News -- THEFT OF INFORMATION. Introduction. Case Studies. How Do the Victims Find Out That Their Secrets Are Stolen?. Intellectual Property Protection. Open Versus Closed Source -- ESPIONAGE. Introduction. What Is Espionage?. Case Studies. Cyber Warfare -- DISGRUNTLED EMPLOYEES AND SABOTAGE. Introduction and Background. Disgruntled Employee Data Issues. Disgruntled Employee Software Issues. Disgruntled Employee System Issues. What to Do About Disgruntled Employee Acts. Sabotage -- WHISTLE-BLOWING. A Hypothetical Scenario. Whistle-Blowing and Software Engineering. More Case Studies and Anecdotes. PRACTICAL IMPLICATIONS OF THE RESEARCH INTO WHISTLE-BLOWING -- VIEWPOINTS ON DARK SIDE ISSUES -- Introduction -- OPINIONS, PREDICTIONS, AND BELIEFS. Automated Crime 246 Donn B. Parker Information Sources. Let's Play Make Believe / Karl E. Wiegers. Dark, Light, or Just Another Shade of Grey? / Les Hatton. Rational Software Developers as Pathological Code Hackers / Norman Fenton -- PERSONAL ANECDOTES. An Officer and a Gentleman Confronts the Dark Side / Grady Booch. Less Carrot and More Stick / June Verner. "Them and Us": Dispatches from the Virtual Software Team Trenches / Valentine Casey. What is it to Lie on a Software Project? / Robert N. Britcher. "Merciless Control Instrument" and the Mysterious Missing Fax / A. H. (anonymous). Forest of Arden / David Alan Grier. Hard-Headed Hardware Hit Man / Will Tracz. A Lighthearted Anecdote / Eugene Farmer -- CONCLUSIONS.
Summary: In the increasingly conscience-focused marketplaces of the 21st century, the demand for more ethical business processes is increasing. Based on substantive research, this is an exposé on the prevalence of subversion, lying, hacking and espionage on every level of the management of software projects.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references and index.

FOREWORD / Linda Rising -- INTRODUCTION. I.1. What's the Dark Side? -- PART 1. DARK SIDE ISSUES -- CHAPTER 1. SUBVERSION. 1.1. Introductory Case Studies and Anecdotes. 1.2. The Survey: Impact of Subversive Stakeholders On Software Projects. 1.3. Selected Responses 37. 1.4. A Follow-Up to the Survey: Some Hypotheses and Related Survey Findings -- CHAPTER 2. LYING. 2.1. Introductory Case Studies and Anecdotes. 2.2. Incidents of Lying: The Survey. 2.3. Qualitative Survey Responses on Lying. 2.4. What Can Be Done About Lying?. 2.5. The Questionnaire Used in the Survey -- CHAPTER 3. HACKING. 3.1. Case Studies of Attacks and Biographies of Hackers. 3.2. Cyber Terrorism and Government-Sponsored Hacking. 3.3. The Hacker Subculture. 3.4. How a Hacker Is Identified. 3.5. Time Line of a Typical Malware Attack. 3.6. Hacker Economy: How Does a Hacker Make Money?. 3.7. Social Engineering. 3.8. A Lingering Question. 3.9. Late-Breaking News -- CHAPTER 4. THEFT OF INFORMATION. 4.1. Introduction. 4.2. Case Studies. 4.3. How Do the Victims Find Out That Their Secrets Are Stolen?. 4.4. Intellectual Property Protection. 4.5. Open Versus Closed Source -- CHAPTER 5. ESPIONAGE. 5.1. Introduction. 5.2. What Is Espionage?. 5.3. Case Studies. 5.4. Cyber Warfare -- CHAPTER 6. DISGRUNTLED EMPLOYEES AND SABOTAGE. 6.1. Introduction and Background. 6.2. Disgruntled Employee Data Issues. 6.3. Disgruntled Employee Software Issues. 6.4. Disgruntled Employee System Issues. 6.5. What to Do About Disgruntled Employee Acts. 6.6. Sabotage -- CHAPTER 7. WHISTLE-BLOWING. 7.1. A Hypothetical Scenario. 7.2. Whistle-Blowing and Software Engineering. 7.3. More Case Studies and Anecdotes. APPENDIX TO CHAPTER 7. PRACTICAL IMPLICATIONS OF THE RESEARCH INTO WHISTLE-BLOWING -- PART 2. VIEWPOINTS ON DARK SIDE ISSUES -- Introduction -- CHAPTER 8. OPINIONS, PREDICTIONS, AND BELIEFS. 8.1. Automated Crime 246 Donn B. Parker Information Sources. 8.2. Let's Play Make Believe / Karl E. Wiegers. 8.3. Dark, Light, or Just Another Shade of Grey? / Les Hatton. 8.4. Rational Software Developers as Pathological Code Hackers / Norman Fenton -- CHAPTER 9. PERSONAL ANECDOTES. 9.1. An Officer and a Gentleman Confronts the Dark Side / Grady Booch. 9.2. Less Carrot and More Stick / June Verner. 9.3. "Them and Us": Dispatches from the Virtual Software Team Trenches / Valentine Casey. 9.4. What is it to Lie on a Software Project? / Robert N. Britcher. 9.5. "Merciless Control Instrument" and the Mysterious Missing Fax / A. H. (anonymous). 9.6. Forest of Arden / David Alan Grier. 9.7. Hard-Headed Hardware Hit Man / Will Tracz. 9.8. A Lighthearted Anecdote / Eugene Farmer -- CONCLUSIONS.

In the increasingly conscience-focused marketplaces of the 21st century, the demand for more ethical business processes is increasing. Based on substantive research, this is an exposé on the prevalence of subversion, lying, hacking and espionage on every level of the management of software projects.

Online resource and print version record.

There are no comments for this item.

Log in to your account to post a comment.
Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login