000 10870nam a2201453 i 4500
001 6381796
003 IEEE
005 20220712205841.0
006 m o d
007 cr |n|||||||||
008 151222s2010 nju ob 001 eng d
020 _a9780470909959
_qoBook
020 _z9780470597170
_qpaperback
020 _z0470597178
_qpaperback
020 _z9780470909942
_qePDF
020 _z0470909943
_qePDF
020 _z0470909951
_qoBook
024 7 _a10.1002/9780470909959
_2doi
035 _a(CaBNVSL)mat06381796
035 _a(IDAMS)0b00006481be9ff9
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aQA76.758
_b.R67 2011eb
082 0 4 _a174.90051
_222
100 1 _aRost, Johann,
_eauthor.
_928119
245 1 4 _aThe dark side of software engineering :
_bevil on computing projects /
_cJohann Rost and Robert L. Glass.
264 1 _a[Washington, DC] :
_bIEEE Computer Society,
_cc2011.
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2010]
300 _a1 PDF (x, 305 pages).
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aFOREWORD (Linda Rising) -- INTRODUCTION -- I.1 What's the Dark Side? -- I.1.1 Why the Dark Side? -- I.1.2 Who Cares About the Dark Side? -- I.1.3 How Dark is the Dark Side? -- I.1.4 What Else is on the Dark Side? -- I.1.5 Ethics and the Dark Side -- I.1.6 Personal Anecdotes About the Dark Side -- Reference -- PART 1: DARK SIDE ISSUES -- CHAPTER 1 SUBVERSION -- 1.1 Introductory Case Studies and Anecdotes -- 1.1.1 A Faculty Feedback System -- 1.1.2 An Unusual Cooperative Effort -- 1.1.3 Lack of Cooperation due to Self Interest -- 1.1.4 An Evil Teammate -- 1.1.5 Thwarting the Evil Union -- 1.2 The Survey: Impact of Subversive Stakeholders On Software Projects -- 1.2.1 Introduction -- 1.2.2 The Survey -- 1.2.3 The Survey Findings -- 1.2.4 Conclusions -- 1.2.5 Impact on Practice -- 1.2.6 Impact on Research -- 1.2.7 Limitations -- 1.2.8 Challenges -- 1.2.9 Acknowledgments -- 1.3 Selected Responses -- 1.3.1 Sample Answers to the Question: "What Were the Motivations and Goals of the Subversive Stakeholders?" -- 1.3.2 Sample Answers to the Question "How Were the Subversive Attacks Discovered?" -- 1.3.3 Sample Answers to the Question "How Can Projects be Defended Against Subversive Stakeholders?" -- 1.4 A Follow-Up to the Survey: Some Hypotheses and Related Survey Findings -- References -- CHAPTER 2 LYING -- 2.1 Introductory Case Studies and Anecdotes -- 2.2 Incidents of Lying: The Survey -- 2.2.1 The Survey Results -- 2.2.2 General Scope -- 2.2.3 An Overview of the Problem -- 2.2.4 Clarifi cation of Terms -- 2.2.5 Discussion -- 2.2.6 Conclusions -- 2.2.7 Limitations -- 2.3 Qualitative Survey Responses on Lying -- 2.4 What Can Be Done About Lying? -- 2.5 The Questionnaire Used in the Survey -- References -- CHAPTER 3 HACKING -- 3.1 Case Studies of Attacks and Biographies of Hackers -- 3.2 Cyber Terrorism and Government-Sponsored Hacking -- 3.3 The Hacker Subculture -- 3.3.1 Why They Are Called "Hackers" -- 3.3.2 Motivation of Hackers -- 3.3.3 Hacker Slang -- 3.3.4 Hacker Ethics.
505 8 _a3.3.5 Public Opinion about Hackers -- 3.4 How a Hacker Is Identified -- 3.5 Time Line of a Typical Malware Attack -- 3.6 Hacker Economy: How Does a Hacker Make Money? -- 3.7 Social Engineering -- 3.7.1 Social Engineering Examples and Case Studies -- 3.7.2 Tactics of Social Engineering -- 3.8 A Lingering Question -- 3.9 Late-Breaking News -- CHAPTER 4 THEFT OF INFORMATION -- 4.1 Introduction -- 4.2 Case Studies -- 4.2.1 Data Theft -- 4.2.2 Source Code Theft -- 4.3 How Do the Victims Find Out That Their Secrets Are Stolen? -- 4.4 Intellectual Property Protection -- 4.4.1 Trade Secret Protection -- 4.4.2 Copyright Protection -- 4.4.3 Patent Protection -- 4.4.4 Steganography -- 4.5 Open Versus Closed Source -- CHAPTER 5 ESPIONAGE -- 5.1 Introduction -- 5.2 What Is Espionage? -- 5.3 Case Studies -- 5.3.1 Sweden Versus Russia -- 5.3.2 Shekhar Verma -- 5.3.3 Lineage III -- 5.3.4 GM versus VW: Jose Ignacio Lopez -- 5.3.5 British Midland Tools -- 5.3.6 Solid Oak Software -- 5.3.7 Proctor & Gamble versus Unilever -- 5.3.8 News Corp Versus Vivendi -- 5.3.9 Spying: Was A TI Chip Really Stolen by a French Spy? -- 5.3.10 Confi cker -- 5.4 Cyber Warfare -- Reference -- CHAPTER 6 DISGRUNTLED EMPLOYEES AND SABOTAGE -- 6.1 Introduction and Background -- 6.2 Disgruntled Employee Data Issues -- 6.2.1 Data Tampering -- 6.2.2 Data Destruction -- 6.2.3 Data Made Public -- 6.2.4 Theft Via Data -- 6.3 Disgruntled Employee Software Issues -- 6.3.1 Software Destruction -- 6.4 Disgruntled Employee System Issues -- 6.5 What to Do About Disgruntled Employee Acts -- 6.6 Sabotage -- References -- CHAPTER 7 WHISTLE-BLOWING -- 7.1 A Hypothetical Scenario -- 7.2 Whistle-Blowing and Software Engineering -- 7.3 More Case Studies and Anecdotes -- 7.3.1 Jeffrey Wigand and Brown and Williamson Tobacco -- 7.3.2 A Longitudinal Study of Whistle-Blowing -- 7.3.3 An Even More Pessimistic View -- 7.3.4 Academic Whistle-Blowing -- 7.3.5 The Sum Total of Whistle-Blowing -- References -- APPENDIX TO CHAPTER 7 PRACTICAL IMPLICATIONS OF THE RESEARCH INTO WHISTLE-BLOWING.
505 8 _aReferences -- PART 2: VIEWPOINTS ON DARK SIDE ISSUES -- Introduction -- CHAPTER 8 OPINIONS, PREDICTIONS, AND BELIEFS -- 8.1 Automated Crime (Donn B. Parker) -- Information Sources -- 8.2 Let's Play Make Believe (Karl E. Wiegers) -- Reference -- 8.3 Dark, Light, or Just Another Shade of Grey? (Les Hatton) -- 8.4 Rational Software Developers as Pathological Code Hackers (Norman Fenton) -- CHAPTER 9 PERSONAL ANECDOTES -- 9.1 An Offi cer and a Gentleman Confronts the Dark Side (Grady Booch) -- 9.2 Less Carrot and More Stick (June Verner) -- References -- 9.3 "Them and Us": Dispatches from the Virtual Software Team Trenches (Valentine Casey) -- 9.4 What is it to Lie on a Software Project? (Robert N. Britcher) -- 9.5 "Merciless Control Instrument" and the Mysterious Missing Fax (A. H. (anonymous)) -- 9.6 Forest of Arden (David Alan Grier) -- 9.7 Hard-Headed Hardware Hit Man (Will Tracz) -- 9.8 A Lighthearted Anecdote (Eugene Farmer) -- CONCLUSIONS -- INDEX.
506 1 _aRestricted to subscribers or individual electronic text purchasers.
520 _aBetrayal! Corruption! Software Engineering?This is not a book about software project failure, or about prescriptive thinking about how to build software better. This is a book about the evil things that happen on computing and software projects-what the kinds of evil are, how they manifest themselves, and what the good guys can do about them.In this timely report on vice at every level of software project management, industry experts Johann Rost and Robert Glass explore the seamy underbelly of software engineering. Based on the authors' original research and augmented by frank insights from other well-respected figures, The Dark Side of Software Engineering consists of anecdotes about occurrences of the practices, an analysis of research findings in the context of the anecdotes, and some suggestions on what to do about the dark side. Discussions draw from the software and information technology literature and from the management literature specific to these topics.This is a book full of surprises-to be read by both software and computing practitioners and academics. It addresses seven "dark side matters" of software project work that involve dubious management and technologist practices, including:. Subversion. Espionage. Lying. Disgruntled employees and sabotage. Hacking. Whistleblowing. Theft of informationWritten in a quick-reading journalistic style, The Dark Side of Software Engineering goes where other management studies fear to tread-a corporate environment where schedules are fabricated, trust is betrayed, millions of dollars are lost, and there is a serious need for the kind of corrective action that this book ultimately proposes.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
588 _aDescription based on PDF viewed 12/22/2015.
650 0 _aSoftware engineering
_xMoral and ethical aspects.
_928120
650 0 _aComputer software industry
_xMoral and ethical aspects.
_928121
655 0 _aElectronic books.
_93294
695 _aHistory
695 _aHospitals
695 _aHumans
695 _aIEEE Computer Society
695 _aInformation systems
695 _aInstruments
695 _aInternet
695 _aMagnetic heads
695 _aMaintenance engineering
695 _aMaterials
695 _aMedia
695 _aMobile handsets
695 _aModems
695 _aMonitoring
695 _aMonopoly
695 _aNatural languages
695 _aNegative feedback
695 _aOperating systems
695 _aOrganizations
695 _aOutsourcing
695 _aPathology
695 _aProject management
695 _aPsychology
695 _aRabbits
695 _aSafety
695 _aSchedules
695 _aSections
695 _aSecurity
695 _aServers
695 _aSoftware
695 _aSoftware engineering
695 _aStandards
695 _aStock markets
695 _aSwitches
695 _aTime sharing computer systems
695 _aUnified modeling language
695 _aVegetation
695 _aVirtual groups
695 _aWiring
695 _aBooks
695 _aBusiness
695 _aCalendars
695 _aChapters
695 _aCompanies
695 _aComputer aided software engineering
695 _aComputer crime
695 _aComputer hacking
695 _aComputers
695 _aContext
695 _aContracts
695 _aCredit cards
695 _aDictionaries
695 _aDistance measurement
695 _aEducation
695 _aEducational institutions
695 _aElectronic mail
695 _aElectronic publishing
695 _aEncoding
695 _aEncyclopedias
695 _aEngineering profession
695 _aEthics
695 _aFacsimile
695 _aForensics
695 _aFuels
695 _aGeophysics
695 _aGlass
695 _aGovernment
695 _aGrammar
695 _aGraphical user interfaces
695 _aGreen products
695 _aGrippers
695 _aHardware
695 _aHead
695 _aHelium
700 1 _aGlass, Robert L.,
_d1932-
_928122
710 2 _aIEEE Xplore (Online Service),
_edistributor.
_928123
710 2 _aJohn Wiley & Sons,
_epublisher.
_96902
776 0 8 _iPrint version
_z9780470597170
856 4 2 _3Abstract with links to resource
_uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6381796
942 _cEBK
999 _c74279
_d74279