Agents of responsibility in software vulnerability processes

作者: Ari Takanen , Petri Vuorij�rvi , Marko Laakso , Juha R�ning

DOI: 10.1007/S10676-004-1266-3

关键词:

摘要: Modern software is infested with flaws having information security aspects. Pervasive computing has made us and our society vulnerable. However, software developers do not fully comprehend what is at stake when faulty software is produced and flaws causing security vulnerabilites are discovered. To address this problem, the main actors involved with software vulnerability processes and the relevant roles inside these groups are identified. This categorisation is illustrated through a fictional case study, which is scrutinised …

参考文章(11)
Cem Kaner, Software Engineering and UCITA, 18 J. Marshall J. Computer & Info. L. 435 (2000) The John Marshall Journal of Information Technology & Privacy Law. ,vol. 18, pp. 6- ,(1999)
John Ladd, Computers and moral responsibility: a framework for an ethical analysis Computerization and controversy. pp. 664- 675 ,(1991)
Peter G. Neumann, Computer-Related Risks ,(1994)
J. McHugh, W.L. Fithen, W.A. Arbaugh, Windows of vulnerability: a case study analysis IEEE Computer. ,vol. 33, pp. 52- 59 ,(2000) , 10.1109/2.889093
W. Robert Collins, Keith W. Miller, Bethany J. Spielman, Phillip Wherry, How good is good enough?: an ethical analysis of software construction and use Communications of The ACM. ,vol. 37, pp. 81- 91 ,(1994) , 10.1145/175222.175229
JAMES H. MOOR, WHAT IS COMPUTER ETHICS? Metaphilosophy. ,vol. 16, pp. 266- 275 ,(1985) , 10.1111/J.1467-9973.1985.TB00173.X
D. Gotterbarn, K. Miller, S. Rogerson, Computer society and ACM approve software engineering code of ethics IEEE Computer. ,vol. 32, pp. 84- 88 ,(1999) , 10.1109/MC.1999.796142
Anton Vedder, Accountability of Internet access and service providers – strictliability entering ethicsq Ethics and Information Technology. ,vol. 3, pp. 67- 74 ,(2001) , 10.1023/A:1011492109277