TY - BOOK AU - Rost,Johann AU - Glass,Robert L. TI - The dark side of software engineering: evil on computing projects SN - 9780470909959 AV - QA76.758 .R67 2011 U1 - 174.90051 22 PY - 2011///] CY - Los Alamitos, CA, Hoboken, New Jersey PB - IEEE Computer Society, John Wiley & Sons, Inc. KW - Software engineering KW - Moral and ethical aspects KW - Computer software industry KW - G�enie logiciel KW - Aspect moral KW - Logiciels KW - Industrie KW - BUSINESS & ECONOMICS KW - Business Ethics KW - bisacsh KW - fast KW - Ethics KW - Misserfolg KW - gnd KW - Projekt KW - Software Engineering KW - Sabotage N1 - Includes bibliographical references and index; FOREWORD; Linda Rising --; INTRODUCTION; I.1; What's the Dark Side? --; PART 1; DARK SIDE ISSUES --; CHAPTER 1; SUBVERSION; 1.1; Introductory Case Studies and Anecdotes; 1.2; The Survey: Impact of Subversive Stakeholders On Software Projects; 1.3; Selected Responses 37; 1.4; A Follow-Up to the Survey: Some Hypotheses and Related Survey Findings --; CHAPTER 2; LYING; 2.1; Introductory Case Studies and Anecdotes; 2.2; Incidents of Lying: The Survey; 2.3; Qualitative Survey Responses on Lying; 2.4; What Can Be Done About Lying?; 2.5; The Questionnaire Used in the Survey --; CHAPTER 3; HACKING; 3.1; Case Studies of Attacks and Biographies of Hackers; 3.2; Cyber Terrorism and Government-Sponsored Hacking; 3.3; The Hacker Subculture; 3.4; How a Hacker Is Identified; 3.5; Time Line of a Typical Malware Attack; 3.6; Hacker Economy: How Does a Hacker Make Money?; 3.7; Social Engineering; 3.8; A Lingering Question; 3.9; Late-Breaking News --; CHAPTER 4; THEFT OF INFORMATION; 4.1; Introduction; 4.2; Case Studies; 4.3; How Do the Victims Find Out That Their Secrets Are Stolen?; 4.4; Intellectual Property Protection; 4.5; Open Versus Closed Source --; CHAPTER 5; ESPIONAGE; 5.1; Introduction; 5.2; What Is Espionage?; 5.3; Case Studies; 5.4; Cyber Warfare --; CHAPTER 6; DISGRUNTLED EMPLOYEES AND SABOTAGE; 6.1; Introduction and Background; 6.2; Disgruntled Employee Data Issues; 6.3; Disgruntled Employee Software Issues; 6.4; Disgruntled Employee System Issues; 6.5; What to Do About Disgruntled Employee Acts; 6.6; Sabotage --; CHAPTER 7; WHISTLE-BLOWING; 7.1; A Hypothetical Scenario; 7.2; Whistle-Blowing and Software Engineering; 7.3; More Case Studies and Anecdotes; APPENDIX TO CHAPTER 7; PRACTICAL IMPLICATIONS OF THE RESEARCH INTO WHISTLE-BLOWING --; PART 2; VIEWPOINTS ON DARK SIDE ISSUES --; Introduction --; CHAPTER 8; OPINIONS, PREDICTIONS, AND BELIEFS; 8.1; Automated Crime 246 Donn B. Parker Information Sources; 8.2; Let's Play Make Believe; Karl E. Wiegers; 8.3; Dark, Light, or Just Another Shade of Grey?; Les Hatton; 8.4; Rational Software Developers as Pathological Code Hackers; Norman Fenton --; CHAPTER 9; PERSONAL ANECDOTES; 9.1; An Officer and a Gentleman Confronts the Dark Side; Grady Booch; 9.2; Less Carrot and More Stick; June Verner; 9.3; "Them and Us": Dispatches from the Virtual Software Team Trenches; Valentine Casey; 9.4; What is it to Lie on a Software Project?; Robert N. Britcher; 9.5; "Merciless Control Instrument" and the Mysterious Missing Fax; A.H. (anonymous); 9.6; Forest of Arden; David Alan Grier; 9.7; Hard-Headed Hardware Hit Man; Will Tracz; 9.8; A Lighthearted Anecdote; Eugene Farmer --; CONCLUSIONS N2 - In the increasingly conscience-focused marketplaces of the 21st century, the demand for more ethical business processes is increasing. Based on substantive research, this is an expos�e on the prevalence of subversion, lying, hacking and espionage on every level of the management of software projects UR - https://onlinelibrary.wiley.com/doi/book/10.1002/9780470909959 ER -