Negative Impacts of using Software Engineering to Implement New Technology :

advertisement
Negative Impacts of using Software
Engineering to Implement New
Technology
:
•
•
•
•
•
•
Unemployment.
Alienation.
Poor Customer Service.
Crime.
Loss of Privacy.
Errors.
1
Benefits of Computer Application
Development
•
•
•
•
•
•
Development of better peripheral devices.
Time-saving.
Cost-saving.
Less effort than older technologies.
Development of better sound quality.
Creation of computer-generated art and special
effects.
• Improved accuracy.
• Improved customer service/satisfaction.
• Entertainment/fun.
2
Some Important Issues
Privacy
Intellectual Property
Computer Crime
Security
Workplace Issues
3
Privacy and Personal Information
The Impact of Computer Technology
“Big Brother is Watching You”
Consumer Information
More Privacy Risks
Protecting Privacy: Education, Technology, and Markets
Protecting Privacy: Law and Regulation
4
Invisible Information Gathering
Examples:
• Satellite surveillance.
• Caller ID.
• 800- or 900-number calls.
• Loyalty cards.
• Web-tracking data; cookies.
• Peer-to-peer monitoring.
• Others…
5
Secondary Use
and Computer Matching
Using information for a purpose other than the one for which it
was obtained. A few examples:
• Sale (or trade) of consumer information to other
businesses.
• Credit check by a prospective employer.
• Government agency use of consumer database
.
Combining and comparing information from more than one
database. Some examples:
• Sharing of government agencies’ databases to detect fraud by
recipients of government programs.
• Creating consumer dossiers from various business databases.
6
Consumer Databases
Gathering Information:
•
•
•
•
•
•
Warranty cards.
Purchasing records.
Membership lists.
Web activity.
Change-of-address forms.
Much more…
Limiting Collection, Use, Sharing, and Sale of Personal Data:
• Consumers can take measures to restrict the use of their personal
information.
• Some information sharing is prohibited by law.
• Some information sharing is prohibited by published, privacy policies.
7
Marketing: Using Consumer Information
•
•
•
•
•
•
Trading/buying customer lists.
Telemarketing.
Data Mining.
Mass-marketing.
Web ads.
Spam (unsolicited e-mail).
8
Credit Bureaus
Uses of consumer information:
• Evaluate credit risk of applicant.
• Marketing.
Regulation:
• FCRA (Fair Credit Reporting Act)
• Self-regulated by privacy principles.
9
More Privacy Risks
Social Security Numbers (SSNs)
Appear in:
•
•
•
•
•
•
Employer records.
Government databases.
School records.
Credit reports.
Consumer applications.
Many other databases.
10
More Privacy Risks
National ID Card System
If implemented, the card could contain your:
•
•
•
•
•
Name.
Address.
Telephone number(s).
Photo.
SSN.
11
More Privacy Risks
National ID Card System
If implemented, the system could allow access to your:
•
•
•
•
•
Medical information.
Tax records.
Citizenship.
Credit history.
Much more…
12
More Privacy Risks
Personal Health and Medical Information
Data can include:
•
•
•
•
•
•
•
History of substance abuse.
Treatment for sexually transmitted disease.
Extent of psychiatric help received.
Any suicide attempt(s).
Diagnosis of diseases (diabetes, angina, cancer, etc.).
Use of prescribed medicines.
Much more…
13
More Privacy Risks
Public Records
Available in paper form and/or online:
•
•
•
•
•
•
•
•
Bankruptcy.
Arrest.
Marriage-license application.
Divorce proceedings.
Property ownership.
Salary (if employed by state or federal government).
Wills and Trusts.
Much more…
14
Can we TRUST the Computer?
What Can Go Wrong?
Case Study: The Therac-25
Increasing Reliability and Safety
Perspectives on Failures, Dependence, Risk, and Progress
Computer Models
15
What Can Go Wrong?
Facts About Computer Errors
• Error-free software is not possible.
• Errors are often caused by more than one
factor.
• Errors can be reduced by following good
procedures and professional practices.
16
What Can Go Wrong?
The Roles of People in Computer-related
Problems:
Computer User
• At home or work, users should understand the limitations of computers
and the need for proper training and responsible use.
Computer Professional
• Understanding the source and consequences of computer failures is
valuable when buying, developing, or managing a complex system.
Educated Member of Society
• Personal decisions and political, social, and ethical decisions depend
on understanding computer risks.
17
What Can Go Wrong?
Categories of Computer Errors and Failures
Problems for Individuals:
• usually in their role as consumers.
• who are incorrectly identified by inaccurate law
enforcement databases.
System Failures:
• affecting large numbers of people and/or costing large
amounts of money.
Safety-Critical Applications:
• where people may be injured or killed.
18
What Can Go Wrong?
Problems for Individuals
Billing Errors
• Lack of tests for inconsistencies and inappropriate
amounts.
Database Accuracy Problems
• Incorrect information resulting in wrongful treatment or
acts.
19
What Can Go Wrong?
Problems for Individuals (cont’d)
Causes:
•
•
•
•
•
•
Large population.
Human common sense not part of automated processing.
Overconfidence in the accuracy of data from a computer.
Errors in data entry.
Information not updated or corrected.
Lack of accountability for errors.
20
What Can Go Wrong?
System Failures
Communications:
• Telephone, online, and broadcast services.
Business:
• Inventory and management software.
Financial:
• Stock exchange, brokerages, banks, etc..
Transportation:
• Reservations, ticketing, and baggage handling.
21
What Can Go Wrong?
System Failures (cont’d)
Causes:
•
•
•
•
Insufficient testing and debugging time.
Significant changes in specifications (during and after project begun).
Overconfidence in system.
Mismanagement of the project.
22
What Can Go Wrong?
Safety-Critical Applications
Military
Power Plants
Aircraft
Trains
Automated Factories
Medicine
…others.
23
What Can Go Wrong?
Safety-Critical Applications
Causes:
•
•
•
•
•
Overconfidence.
Lack of override features.
Insufficient testing.
Sheer complexity of system.
Mismanagement.
24
Case Study: The Therac-25
The Therac-25 was a software-controlled
radiation-therapy machine used to treat
people with cancer.
Overdoses of radiation
• Normal dosage is 100–200 rads.
• It is estimated that 13,000 and 25,000 rads were given to six people.
• Three of the six people died.
25
Case Study: The Therac-25
Therac-25 Radiation Overdose
Multiple Causes:
•
•
•
•
•
•
Poor safety design.
Insufficient testing and debugging.
Software errors.
Lack of safety interlocks.
Overconfidence.
Inadequate reporting and investigation of accidents.
26
Increasing Reliability and Safety
What Goes Wrong?
Computer Systems Fail Because:
• The job they are doing is inherently difficult, and
• The job is done poorly.
Compounding the Reliability Issue:
• Developers and users exhibit overconfidence in the system.
• Reused system software may not work in different environments.
27
Increasing Reliability and Safety
Professional Techniques
•
•
•
•
•
•
•
Follow good software practices.
Exhibit professional responsibility at all levels of development and use.
Construct well-designed user interfaces.
Take human factors into account.
Include built-in redundancy.
Incorporate self-checking where appropriate.
Follow good testing principals and techniques.
28
Perspectives on Failures,
Dependence, Risk, and Progress
Failures
• What are acceptable rates of failures?
• How accurate should software be?
Dependence
• How dependent on computer systems are our ordinary activities?
• How useful are computer systems to our ordinary activities?
Risk and Progress
• How do new technologies become safer?
• Can progress in software safety keep up with the pace of change in
computer technology?
29
Intellectual Property and
Software Engineering
Intellectual Property Is:
• Intangible creative work—not necessarily the physical form on
which it is stored or delivered.
• Given legal protection in the form of copyright, patent,
trademark, and trade secret laws.
30
Copyrights
Copyrights are granted for a limited, but long,
time.
With some exceptions, copyright owners have
the exclusive right to:
•
•
•
•
•
Make copies of the work,
Produce derivative works,
Distribute copies,
Perform the work in public, and
Display the work in public.
31
Software
Improved digital technologies contribute to unauthorized
(commercial and non-commercial) copying of software.
Individuals and whole businesses, here and overseas, continue
to produce, transport, and sell (or give away) copies of
software, manuals and supporting material.
Software Information Industry Association (SIIA) as well as
other software industry organizations and companies battle
software piracy in the U.S. and abroad.
32
Solutions (Good and Bad)
Technology, Markets and Management, and
Regulations and Enforcement
Technological Solutions:
•
•
•
•
•
Expiration date encoded.
Hardware dongle required.
Copy-protection schemes.
“Activation” features.
Encryption schemes; digital-rights management (DRM).
33
Solutions (Good and Bad)
Technology, Markets and Management, and
Regulations and Enforcement (cont’d)
Markets and Management:
•
•
•
•
•
Subscribe to services.
Collect fees from users and large organizations.
Meter usage of intellectual property on a network.
Offer discounts to educational users.
Educate the public about the value of intellectual property belonging to
creators and publishers.
34
Solutions (Good and Bad)
Technology, Markets and Management, and
Regulations and Enforcement (cont’d)
Regulations and Enforcement:
•
•
•
•
The Digital Millennium Copyright Act (DMCA) and other laws.
Identify abusers and shut them down in high-publicity raids.
Monitor abuses.
Enforce current laws and punish abusers.
35
Solutions (Good and Bad)
Restrictions and Bans on Technology
In the past, lawsuits have delayed, restricted, or banned the
release of new technologies, including:
•
•
•
•
•
CD-recording devices.
Digital Audio Tape (DAT) systems.
DVD recorders.
DVD players.
MP3 players.
36
Solutions (Good and Bad)
Restrictions and Bans on Technology (cont’d)
In an attempt to reduce or prevent unauthorized copying and
distribution of intellectual property, some governments have
levied taxes on:
•
•
•
•
•
Audio tapes.
CD recorders.
Personal computers.
Printers.
Scanners.
37
Solutions (Good and Bad)
Restrictions and Bans on Technology (cont’d)
Digital rights management (DRM), combined with laws such as the
DMCA, can result in heavy fines and imprisonment for violators.
The legal and monetary consequences can be applied to both pirates
of intellectual works as well as to scientists and researchers of
technology.
38
Solutions (Good and Bad)
The Future of Copyright
Challenges to the principles of copyright:
• Methods to circumvent copy-protection schemes.
• Peer-to-peer (P2P) file transfer.
• The view among some people that if copying is easy, or if cheap online
access is absent, then it is okay to copy.
Challenges to Fair Use:
• Technological (DRM) and legal (the DMCA) restrictions.
• Conflicting outcomes (e.g. reverse engineering) in the courts.
• Non-traditional uses (e.g. online teaching materials) or blurring of the
guidelines associated with Fair Use.
39
Free Software
Free Software (or Open Source) Means Free
From Copyright Restrictions
The notion of free software was created by Richard Stallman.
Examples:
•
•
•
•
•
GNU project.
Emacs.
“Free” compilers and utilities.
Linux.
Many others.
40
Issues For Software Developers
Should You Copyright or Patent Software?
Copyrights:
• Protect the expression of an idea in a fixed and tangible form.
• Are cheap, easy to obtain, and last a long time.
• Allow fair-use of the intellectual property.
Patents:
• Protect new, non-obvious, and useful processes.
• Are expensive, difficult to obtain, and last for short periods of time.
• Allow licensing to other developers.
41
Computer Crime
Introduction
Hacking
Online Scams
Fraud, Embezzlement, Sabotage, Information Theft, and Forgery
Crime Fighting Versus Privacy and Civil Liberties
42
Introduction
Computers Are Tools
Computers assist us in our work, expand our thinking, and
provide entertainment.
Computers Are Used to Commit Crimes
Preventing, detecting, and prosecuting computer crime is a
challenge.
43
Hacking
The Phases of Hacking
Phase One: The early years
• 1960s and 1970s.
• Originally, hacker referred to a creative programmer wrote clever code.
• The first operating systems and computer games were written by
hackers.
• The term hacking was a positive term.
• Hackers were usually high-school and college students.
44
Hacking
The Phases of Hacking (cont’d)
Phase Two: Hacking takes on a more negative meaning.
• 1970s through 1990s.
• Authors and the media used the term hacker to describe someone who
used computers, without authorization, sometimes to commit crimes.
• Early computer crimes were launched against business and
government computers.
• Adult criminals began using computers to commit their crimes.
45
Hacking
The Phases of Hacking
Phase Three: The Web Era
• Beginning in the mid-1990s.
• The increased use of the Internet for school, work, business
transactions, and recreation makes it attractive to criminals with basic
computer skills.
• Crimes include the release of malicious code (viruses and worms).
• Unprotected computers can be used, unsuspectingly, to accomplish
network disruption or commit fraud.
• Hackers with minimal computer skills can create havoc by using
malicious code written by others.
46
Hacking
Hactivism
…is the use of hacking expertise to promote a political cause.
• This kind of hacking can range from mild to destructive activities.
• Some consider hactivism as modern-age civil disobedience.
• Others believe hactivism denies others their freedom of speech and
violates property rights.
47
Hacking
The Law
Computer Fraud and Abuse Act (CFAA, 1986)
• It is a crime to access, alter, damage, or destroy information on a
computer without authorization.
• Computers protected under this law include:
– government computers,
– financial systems,
– medical systems,
– interstate commerce, and
– any computer on the Internet.
48
Hacking
The Law (cont’d)
USA Patriot Act (USAPA, 2001)
• Amends the CFAA.
• Allows for recovery of losses due to responding to a hacker attack,
assessing damages, and restoring systems.
• Higher penalties can be levied against anyone hacking into computers
belonging to criminal justice system or the military.
• The government can monitor online activity without a court order.
49
Hacking
Security
Security weaknesses can be found in the computer systems
used by:
• businesses,
• government (classified and unclassified), and
• personal computers.
Causes of security weakness:
• characteristics of the Internet and Web,
• human nature,
• inherent complexity of computer systems.
50
Hacking
Security can be improved by:
•
•
•
•
•
Ongoing education and training to recognize the risks.
Better system design.
Use of security tools and systems.
Challenging “others” to find flaws in systems.
Writing and enforcing laws that don’t stymie research and
advancement.
51
Fraud, Embezzlement, Sabotage,
Identity Theft, and Forgery
Some Causes of Fraud
Credit-Card
• Stolen receipts, mailed notices, and cards.
• Interception of online transaction or weak e-commerce security.
• Careless handling by card-owner.
ATM
• Stolen account numbers and PINs.
• Insider knowledge.
• A counterfeit ATM.
Telecommunications
• Stolen long-distance PINs.
• Cloned phones.
52
Fraud, Embezzlement, Sabotage,
Identity Theft, and Forgery
Some Defenses Against Fraud
Credit-Card
•
•
•
•
Instant credit-card check.
Analysis of buying patterns.
Analysis of credit card applications (to detect identity theft).
Verify user with Caller ID.
ATM
• Redesigned ATMs.
• Limited withdrawal.
Telecommunications
• match phone “signature” with serial number.
• identify phone without broadcasting serial number.
53
Fraud, Embezzlement, Sabotage,
Identity Theft, and Forgery
Embezzlement and Sabotage
Some Causes
•
•
•
•
Insider information.
Poor security.
Complex financial transactions.
Anonymity of computer users.
Some Defenses
•
•
•
•
Rotate employee responsibility.
Require use of employee ID and password .
Implement audit trails.
Careful screening and background checks of employees.
54
Fraud, Embezzlement, Sabotage,
Identity Theft, and Forgery
Identity Theft
Some Causes of Identity Theft
•
•
•
•
Insecure and inappropriate use of Social Security numbers.
Careless handling of personally identifiable information.
Weak security of stored records.
Insufficient assistance to identity theft victims.
Some Defenses for Identity Theft
• Limit use of personally identifiable information.
• Increase security of information stored by businesses and government
agencies.
• Improve methods to accurately identify a person.
• Educate consumers.
55
Fraud, Embezzlement, Sabotage,
Identity Theft, and Forgery
Forgery
Some Causes
• Powerful computers and digital manipulation software.
• High-quality printers, copiers, and scanners.
Some Defenses
•
•
•
•
Educate consumers and employees.
Use anti-counterfeiting techniques during production.
Use counterfeit detection methods.
Create legal and procedural incentives to improve security.
56
The Changing Nature of Work
Impact of Computers on Work:
Some jobs have been eliminated.
Other jobs have been created.
Repetitious or boring jobs are now done with computers.
There is more time for creativity.
Some workers “telecommute.”
Employers can better monitor their workers.
Health issues have been associated with computer usage.
57
The Impact on Employment
Job Destruction and Creation
Computers and Unemployment:
• Automation leads to loss of jobs.
• Computerization eliminates some jobs.
• Computer efficiency means fewer jobs.
Computers and Employment:
• The need for computer designers, builders, and programmers creates
jobs.
• Growing computer networks creates jobs for administrators.
• The need for training, sales and technical support creates jobs.
• In general, computers make many products affordable to more people .
Thus, more jobs are created to make those products.
58
The Impact on Employment
Job Destruction and Creation (cont’d)
Technology, Economic Factors, and Employment:
• Technology is often blamed for massive unemployment.
• The Luddites feared weaving looms would take away jobs—they did
not.
• Likewise, Neo-Luddites fear technology will eliminate jobs.
• The Great Depression was not caused by technology taking away jobs.
• Instead, complicated economic and political factors contribute to job
destruction.
59
The Impact on Employment
Job Destruction and Creation (cont’d)
How Have Computer Technology and Other Technologies
Affected:
•
•
•
•
•
•
•
Hourly wages?
Fringe benefits?
Spending on leisurely activities?
The number of working hours?
The percentage of taxes we owe?
Our productivity?
Employer productivity?
60
The Impact on Employment
Job Destruction and Creation (cont’d)
A Global Workforce
• Some jobs moved from wealthy countries to less wealthy ones.
• Pay rates are lower in less wealthy countries.
• The Internet and Web reduce the need for transportation of people (e.g.
teleconferencing) and paper (e.g. e-mail and attachments).
• The Internet and Web make it easier for information technology (e.g.
software updates) and some service jobs (e.g. technical support) to be
far from customers or employers.
61
The Impact of Employment
Changing Skills and Jobs
Optimistic Outlook:
• The educational system adapts rapidly to create newly trained workers.
• Technology can be used to retrain displaced workers.
Pessimistic Outlook:
• Advanced software will eliminate many jobs requiring high skills.
• Automation and the Web will lead to mass unemployment.
62
The Work Environment
Changing Business Structures
Trends That May Impact the Size and Structure of Business:
•
•
•
•
•
•
•
•
Smaller businesses.
More independent consultants and contractors.
More self-employment.
Small businesses operating globally.
Multi-national corporations and mergers.
Decline in number of employees per firm.
Flattened hierarchies.
Empowered workers.
63
Employee Monitoring
Background
Categories of Employee Monitoring:
• Data entry, phone work, and retail.
• Location.
• E-mail, Web surfing, and voice mail.
64
Employee Monitoring
Data entry, Phone Work, and Retail
Types of Monitoring:
• Keystroke: to determine if quotas are met or employee is on task.
• Phone: to determine customer satisfaction and proper use of phone
resources.
• Transactions: to reduce theft.
65
Employee Monitoring
Location
Types of Monitoring:
• Badges: to replace worker keys or track down workers.
• GPS tracking systems: to locate vehicles; employee driving speed and
driving habits.
66
Employee Monitoring
E-mail, Web Surfing, and Voice Mail
Some Reasons Employees Are Monitored:
•
•
•
•
•
•
•
Find needed business information when employee is not available.
Protect proprietary information.
Prevent or investigate possible criminal activities.
Prevent personal use of employer’s facilities.
Check for violations of company policy.
Investigate complaints of harassment.
Check for illegal software.
67
Download