TY - BOOK AU - Rost,Johann AU - Glass,Robert L. TI - The dark side of software engineering: evil on computing projects SN - 9780470909959 AV - QA76.758 .R67 2011 U1 - 174.90051 22 PY - 2011///] CY - Los Alamitos, CA, Hoboken, New Jersey PB - IEEE Computer Society, John Wiley & Sons, Inc. KW - Software engineering KW - Moral and ethical aspects KW - Computer software industry KW - fast KW - Ethics N1 - Includes bibliographical references and index; FOREWORD; Linda Rising --; INTRODUCTION; I.1; What's the Dark Side? --; PART 1; DARK SIDE ISSUES --; CHAPTER 1; SUBVERSION; 1.1; Introductory Case Studies and Anecdotes; 1.2; The Survey: Impact of Subversive Stakeholders On Software Projects; 1.3; Selected Responses 37; 1.4; A Follow-Up to the Survey: Some Hypotheses and Related Survey Findings --; CHAPTER 2; LYING; 2.1; Introductory Case Studies and Anecdotes; 2.2; Incidents of Lying: The Survey; 2.3; Qualitative Survey Responses on Lying; 2.4; What Can Be Done About Lying?; 2.5; The Questionnaire Used in the Survey --; CHAPTER 3; HACKING; 3.1; Case Studies of Attacks and Biographies of Hackers; 3.2; Cyber Terrorism and Government-Sponsored Hacking; 3.3; The Hacker Subculture; 3.4; How a Hacker Is Identified; 3.5; Time Line of a Typical Malware Attack; 3.6; Hacker Economy: How Does a Hacker Make Money?; 3.7; Social Engineering; 3.8; A Lingering Question; 3.9; Late-Breaking News --; CHAPTER 4; THEFT OF INFORMATION; 4.1; Introduction; 4.2; Case Studies; 4.3; How Do the Victims Find Out That Their Secrets Are Stolen?; 4.4; Intellectual Property Protection; 4.5; Open Versus Closed Source --; CHAPTER 5; ESPIONAGE; 5.1; Introduction; 5.2; What Is Espionage?; 5.3; Case Studies; 5.4; Cyber Warfare --; CHAPTER 6; DISGRUNTLED EMPLOYEES AND SABOTAGE; 6.1; Introduction and Background; 6.2; Disgruntled Employee Data Issues; 6.3; Disgruntled Employee Software Issues; 6.4; Disgruntled Employee System Issues; 6.5; What to Do About Disgruntled Employee Acts; 6.6; Sabotage --; CHAPTER 7; WHISTLE-BLOWING; 7.1; A Hypothetical Scenario; 7.2; Whistle-Blowing and Software Engineering; 7.3; More Case Studies and Anecdotes; APPENDIX TO CHAPTER 7; PRACTICAL IMPLICATIONS OF THE RESEARCH INTO WHISTLE-BLOWING --; PART 2; VIEWPOINTS ON DARK SIDE ISSUES --; Introduction --; CHAPTER 8; OPINIONS, PREDICTIONS, AND BELIEFS; 8.1; Automated Crime 246 Donn B. Parker Information Sources; 8.2; Let's Play Make Believe; Karl E. Wiegers; 8.3; Dark, Light, or Just Another Shade of Grey?; Les Hatton; 8.4; Rational Software Developers as Pathological Code Hackers; Norman Fenton --; CHAPTER 9; PERSONAL ANECDOTES; 9.1; An Officer and a Gentleman Confronts the Dark Side; Grady Booch; 9.2; Less Carrot and More Stick; June Verner; 9.3; "Them and Us": Dispatches from the Virtual Software Team Trenches; Valentine Casey; 9.4; What is it to Lie on a Software Project?; Robert N. Britcher; 9.5; "Merciless Control Instrument" and the Mysterious Missing Fax; A. H. (anonymous); 9.6; Forest of Arden; David Alan Grier; 9.7; Hard-Headed Hardware Hit Man; Will Tracz; 9.8; A Lighthearted Anecdote; Eugene Farmer --; CONCLUSIONS; swe N2 - In the increasingly conscience-focused marketplaces of the 21st century, the demand for more ethical business processes is increasing. Based on substantive research, this is an exposé on the prevalence of subversion, lying, hacking and espionage on every level of the management of software projects UR - http://dx.doi.org/10.1002/9780470909959 ER -