skip to main content
research-article
Free Access

Assuring software quality by preventing neglect

Published:23 August 2017Publication History
Skip Abstract Section

Abstract

The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.

twitter

Follow us on Twitter at http://twitter.com/blogCACM

http://cacm.acm.org/blogs/blog-cacm

Robin K. Hill suggests software neglect is a failure of the coder to pay enough attention and take enough trouble to ensure software quality.

References

  1. Association for Computing Machinery. Code 2018 Project. https://ethics.acm.org/.Google ScholarGoogle Scholar
  2. Burton, B.K., and Dunn, C.P. Ethics of Care. Encyclopædia Britannica, https://www.britannica.com/topic/ethics-of-care.Google ScholarGoogle Scholar
  3. Hill, R.K. Ethical Theories Spotted in Silicon Valley. Blog@CACM, March 16, 2017, https://cacm.acm.org/blogs/blog-cacm/214615-ethical-theories-spotted-in-silicon-valley/fulltext.Google ScholarGoogle Scholar
  4. Sander-Staudt, M. Care Ethics. The Internet Encyclopedia of Philosophy, 2017. http://www.iep.utm.edu/care-eth/.Google ScholarGoogle Scholar
  5. Franssen, M., Lokhorst, G., and van de Poel, I. Philosophy of Technology. The Stanford Encyclopedia of Philosophy (Fall 2015 Edition), Edward N. Zalta (ed.). https://plato.stanford.edu/archives/fall2015/entries/technology/.Google ScholarGoogle Scholar

Index Terms

  1. Assuring software quality by preventing neglect

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Communications of the ACM
      Communications of the ACM  Volume 60, Issue 9
      September 2017
      94 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/3134526
      Issue’s Table of Contents

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 August 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Popular
      • Pre-selected
    • Article Metrics

      • Downloads (Last 12 months)98
      • Downloads (Last 6 weeks)18

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format