The proliferation of information and communication technologies (icts) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we want to make clear the ethical aspects of producing potentially flawed software. This paper outlines some of the vulnerabilities associated with software systems and identifies a number of social and organisational fact...
Unauthorized access to online information costs billions of dollars per year. Software vulnerabiliti...
Software vulnerabilities are the root cause of many computer system security failures. This disserta...
The pressure on software developers to produce secure software has never been greater. But what does...
The proliferation of information and communication technologies (icts) into all aspects of life pose...
Modern, Western post-industrial societies and our complex technological systems are subject to risks...
A narrow approach to risk analysis and understanding the scope of a software project has contributed...
According to the Jericho forum, security in information technology can no longer be achieved by buil...
The ultimate aim of software engineering methods and tools is to reduce risks associated with the de...
We are becoming increasingly dependent on software systems also for highly critical tasks in society...
Harmful software has resulted in loss of life, societal and environmental damage alongside economic ...
Vulnerabilities persist despite existing software security initiatives and best practices. This pape...
A narrow approach to risk analysis and understanding the scope of a software project has contributed...
A narrow approach to risk analysis and understanding the scope of a software project has contributed...
Despite the availability of various methods and tools to facilitate secure coding, developers contin...
A narrow approach to risk analysis and understanding the scope of a software project has contributed...
Unauthorized access to online information costs billions of dollars per year. Software vulnerabiliti...
Software vulnerabilities are the root cause of many computer system security failures. This disserta...
The pressure on software developers to produce secure software has never been greater. But what does...
The proliferation of information and communication technologies (icts) into all aspects of life pose...
Modern, Western post-industrial societies and our complex technological systems are subject to risks...
A narrow approach to risk analysis and understanding the scope of a software project has contributed...
According to the Jericho forum, security in information technology can no longer be achieved by buil...
The ultimate aim of software engineering methods and tools is to reduce risks associated with the de...
We are becoming increasingly dependent on software systems also for highly critical tasks in society...
Harmful software has resulted in loss of life, societal and environmental damage alongside economic ...
Vulnerabilities persist despite existing software security initiatives and best practices. This pape...
A narrow approach to risk analysis and understanding the scope of a software project has contributed...
A narrow approach to risk analysis and understanding the scope of a software project has contributed...
Despite the availability of various methods and tools to facilitate secure coding, developers contin...
A narrow approach to risk analysis and understanding the scope of a software project has contributed...
Unauthorized access to online information costs billions of dollars per year. Software vulnerabiliti...
Software vulnerabilities are the root cause of many computer system security failures. This disserta...
The pressure on software developers to produce secure software has never been greater. But what does...