No abstract available.
Cited By
- Ionescu T (2019). Simulation, Epistemic Opacity, and `Envirotechnical Ignorance' in Nuclear Crisis, Minds and Machines, 29:1, (61-86), Online publication date: 1-Mar-2019.
- Bellovin S and Neumann P (2018). The big picture, Communications of the ACM, 61:11, (24-26), Online publication date: 26-Oct-2018.
- Spinellis D (2018). Modern debugging, Communications of the ACM, 61:11, (124-134), Online publication date: 26-Oct-2018.
- Alharbi R, Stump T, Vafaie N, Pfammatter A, Spring B and Alshurafa N (2018). I Can't Be Myself, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2:3, (1-40), Online publication date: 18-Sep-2018.
- Yu C, Chu C and Lu P (2018). Applying a Security Management Mechanism to a System Development Lifecycle, International Journal of E-Adoption, 10:1, (1-17), Online publication date: 1-Jan-2018.
- Neumann P (2016). Risks of automation, Communications of the ACM, 59:10, (26-30), Online publication date: 22-Sep-2016.
- Duncan B and Whittington M Compliance with standards, assurance and audit Proceedings of the 7th International Conference on Security of Information and Networks, (77-84)
- Cao L and Zhu H (2013). Normal accidents, Journal of Data and Information Quality, 4:3, (1-26), Online publication date: 1-May-2013.
- Spinellis D, Karakoidas V and Louridas P Comparative language fuzz testing Proceedings of the ACM 4th annual workshop on Evaluation and usability of programming languages and tools, (25-34)
- Andrade J, Ares J, García R, Martínez M, Rodríguez S and Suárez S About theory in software development Proceedings of the 11th WSEAS international conference on Signal processing, computational geometry and artificial vision, and Proceedings of the 11th WSEAS international conference on Systems theory and scientific computation, (256-261)
- Gössler G, Le Métayer D and Raclet J Causality analysis in contract violation Proceedings of the First international conference on Runtime verification, (270-284)
- Junqueira F, Marzullo K, Herlihy M and Penso L (2010). Threshold protocols in survivor set systems, Distributed Computing, 23:2, (135-149), Online publication date: 1-Oct-2010.
- Dolev S and Yagel R (2010). Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of byzantine guests, ACM SIGOPS Operating Systems Review, 44:3, (65-74), Online publication date: 17-Aug-2010.
- Gupta M, Banerjee S, Agrawal M and Rao H (2008). Security analysis of Internet technology components enabling globally distributed workplaces—a framework, ACM Transactions on Internet Technology, 8:4, (1-38), Online publication date: 1-Sep-2008.
- Park S and Maurer F The benefits and challenges of executable acceptance testing Proceedings of the 2008 international workshop on Scrutinizing agile practices or shoot-out at the agile corral, (19-22)
- Schaefer R (2008). Debugging debugged, a metaphysical manifesto of systems integration, ACM SIGSOFT Software Engineering Notes, 33:3, (1-20), Online publication date: 1-May-2008.
- Dolev S and Yagel R Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of Byzantine guests Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems, (266-280)
- Dolev S and Yagel R Stabilizing Trust and Reputation for Self-Stabilizing Efficient Hosts in Spite of Byzantine Guests (Extended Abstract) Stabilization, Safety, and Security of Distributed Systems, (266-280)
- Kopec D and Tamang S (2007). Failures in complex systems, ACM SIGCSE Bulletin, 39:2, (180-184), Online publication date: 1-Jun-2007.
- Medley M A qualitative analysis of an "ethical election project" in an ethics class Proceedings of the 45th annual southeast regional conference, (347-349)
- Menzies T, Owen D and Richardson J (2007). The Strangest Thing About Software, Computer, 40:1, (54-60), Online publication date: 1-Jan-2007.
- Brukman O and Dolev S Recovery oriented programming Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems, (152-168)
- Neumann P System and network trustworthiness in perspective Proceedings of the 13th ACM conference on Computer and communications security, (1-5)
- Alonso D, Sánchez P, Álvarez B and Pastor J A systematic approach to developing safe tele-operated robots Proceedings of the 11th Ada-Europe international conference on Reliable Software Technologies, (119-130)
- Grunske L, Lindsay P, Yatapanage N and Winter K An automated failure mode and effect analysis based on high-level design specification with behavior trees Proceedings of the 5th international conference on Integrated Formal Methods, (129-149)
- Im G and Baskerville R (2005). A longitudinal study of information system threat categories, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 36:4, (68-79), Online publication date: 7-Oct-2005.
- Schaefer R (2005). The risks of large organizations in developing complex systems, ACM SIGSOFT Software Engineering Notes, 30:5, (1-3), Online publication date: 1-Sep-2005.
- Schaefer R (2005). Deeper questions, ACM SIGSOFT Software Engineering Notes, 30:4, (1-6), Online publication date: 1-Jul-2005.
- Lufei H and Shi W Fractal Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
- Kussmaul C (2005). Using agile development methods to improve student writing, Journal of Computing Sciences in Colleges, 20:3, (148-156), Online publication date: 1-Feb-2005.
- Vincent C and Camp J (2004). Looking to the Internet for models of governance, Ethics and Information Technology, 6:3, (161-173), Online publication date: 1-Sep-2004.
- Takanen A, Vuorijärvi P, Laakso M and Röning J (2019). Agents of responsibility in software vulnerability processes, Ethics and Information Technology, 6:2, (93-110), Online publication date: 9-Jun-2004.
- Kussmaul C (2004). Software product proposals in a computer science course for non-majors, Journal of Computing Sciences in Colleges, 19:5, (78-86), Online publication date: 1-May-2004.
- Byers S, Cranor L, Korman D, McDaniel P and Cronin E Analysis of security vulnerabilities in the movie production and distribution process Proceedings of the 3rd ACM workshop on Digital rights management, (1-12)
- Robinson W, Pawlowski S and Volkov V (2003). Requirements interaction management, ACM Computing Surveys (CSUR), 35:2, (132-190), Online publication date: 1-Jun-2003.
- Anderson J (2003). Feature, Computers and Security, 22:4, (308-313), Online publication date: 1-May-2003.
- Little J Using cases to increase interest in ICT and computing as a career Proceedings of the 3.1 and 3.3 working groups conference on International federation for information processing: ICT and the teacher of the future - Volume 23, (81-83)
- Clarke S and Drake P A social perspective on information security Socio-technical and human cognition elements of information systems, (249-265)
- Roberts E Society, computers in Encyclopedia of Computer Science, (1591-1599)
- London R and Craigen D Program verification Encyclopedia of Computer Science, (1458-1461)
- Knight J Safety critical systems Proceedings of the 24th International Conference on Software Engineering, (547-550)
- Besnard D and Lawrie A Lessons from industrial design for software engineering through constraints identification, solution space optimisation and reuse Proceedings of the 2002 ACM symposium on Applied computing, (732-738)
- Lally L Assessing the risks of IT-enabled jobs Managing the human side of information technology, (60-77)
- Friedman B and Kahn P Human values, ethics, and design The human-computer interaction handbook, (1177-1201)
- Bellotti V and Edwards K (2018). Intelligibility and accountability, Human-Computer Interaction, 16:2, (193-212), Online publication date: 1-Dec-2001.
- The Joint Task Force on Computing Curricula C (2001). Computing curricula 2001, Journal on Educational Resources in Computing (JERIC), 1:3es, (1-es), Online publication date: 1-Sep-2001.
- Mitev N Toward social constructivist understandings of IS success and failure Proceedings of the twenty first international conference on Information systems, (84-93)
- Gershenfeld N (2000). Everything the universe, and life, IBM Systems Journal, 39:3-4, (932-934), Online publication date: 1-Jul-2000.
- Lutz R Software engineering for safety Proceedings of the Conference on The Future of Software Engineering, (213-226)
- Bowen J (2000). The ethics of safety-critical systems, Communications of the ACM, 43:4, (91-97), Online publication date: 1-Apr-2000.
- Devanbu P and Stubblebine S (2000). Cryptographic Verification of Test Coverage Claims, IEEE Transactions on Software Engineering, 26:2, (178-192), Online publication date: 1-Feb-2000.
- Povey D Enforcing well-formed and partially-formed transactions for Unix Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (5-5)
- Jajodia S, Ammann P and McCollum C (2019). Surviving Information Warfare Attacks, Computer, 32:4, (57-63), Online publication date: 1-Apr-1999.
- Heckman C and Wobbrock J (1999). Liability for Autonomous Agent Design, Autonomous Agents and Multi-Agent Systems, 2:1, (87-103), Online publication date: 1-Mar-1999.
- Medley M, Rutherfoord R, Anderson G, Roth R and Varden S Ethical issues related to internet development and research Working Group reports of the 3rd annual SIGCSE/SIGCUE ITiCSE conference on Integrating technology into computer science education, (57-72)
- Pritchett W and Riley J (1998). An ASIS-based static analysis tool for high-integrity systems, ACM SIGAda Ada Letters, XVIII:6, (12-17), Online publication date: 1-Nov-1998.
- Michell S, Saaltink M and Wichmann B (2019). Looking into safety with the safety and security Rapporteur group, ACM SIGAda Ada Letters, XVIII:6, (7-11), Online publication date: 1-Nov-1998.
- Pritchett W and Riley J An ASIS-based static analysis tool for high-integrity systems Proceedings of the 1998 annual ACM SIGAda international conference on Ada, (12-17)
- Michell S, Saaltink M and Wichmann B Looking into safety with the safety and security Rapporteur group Proceedings of the 1998 annual ACM SIGAda international conference on Ada, (7-11)
- Medley M, Rutherfoord R, Anderson G, Roth R and Varden S (1998). Ethical issues related to internet development and research, ACM SIGCUE Outlook, 26:4, (57-72), Online publication date: 1-Oct-1998.
- McGrath G and Offen R Undergraduate students and the management-technology interface Proceedings of the 3rd Australasian conference on Computer science education, (2-8)
- Heckman C and Wobbrock J Liability for autonomous agent design Proceedings of the second international conference on Autonomous agents, (392-399)
- Lankewicz L (1998). Resources for teaching computer networks, ACM SIGCSE Bulletin, 30:1, (112-116), Online publication date: 1-Mar-1998.
- Lankewicz L Resources for teaching computer networks Proceedings of the twenty-ninth SIGCSE technical symposium on Computer science education, (112-116)
- Hatton L (1997). N-Version Design Versus One Good Version, IEEE Software, 14:6, (71-76), Online publication date: 1-Nov-1997.
- Gong L (1997). Java Security, IEEE Micro, 17:3, (14-19), Online publication date: 1-May-1997.
- Gersting J and Young F (1997). Content + experiences = curriculum, ACM SIGCSE Bulletin, 29:1, (325-329), Online publication date: 1-Mar-1997.
- Gersting J and Young F Content + experiences = curriculum Proceedings of the twenty-eighth SIGCSE technical symposium on Computer science education, (325-329)
- Blyth A (1997). Issues arising from medical system's failure, ACM SIGSOFT Software Engineering Notes, 22:2, (85-86), Online publication date: 1-Mar-1997.
- Blyth A (1996). What happens when a medical office information system fails, ACM SIGCAS Computers and Society, 26:4, (25-26), Online publication date: 1-Dec-1996.
- Pierce M and Henry J (2019). Computer ethics and social issues case analysis, ACM SIGCSE Bulletin, 28:4, (50-54), Online publication date: 1-Dec-1996.
- Tygar J and Whitten A WWW electronic commerce and java trojan horses Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2, (15-15)
- Neumann P (1996). Inside risks, Communications of the ACM, 39:4, (122), Online publication date: 1-Apr-1996.
- Lally L Enumerating the risks of reengineered processes Proceedings of the 1996 ACM 24th annual conference on Computer science, (18-23)
- Garg P and Sankar S (2019). Fifth California software symposium, ACM SIGSOFT Software Engineering Notes, 21:1, (68-70), Online publication date: 1-Jan-1996.
- Neumann P (1995). Reviewing the risks archives, Communications of the ACM, 38:12, (138), Online publication date: 1-Dec-1995.
- Neumann P (1995). Reassessing the crypto debate, Communications of the ACM, 38:3, (138), Online publication date: 1-Mar-1995.
- Neumann P (1994). Inside Risks: Inside “Inside Risks”, Communications of the ACM, 37:12, (154), Online publication date: 1-Dec-1994.
- Neumann P (1994). Illustrative risks to the public in the use of computer systems and related technology, ACM SIGSOFT Software Engineering Notes, 19:1, (16-29), Online publication date: 1-Jan-1994.
Index Terms
- Computer related risks
Recommendations
Asset Pricing with Downside Liquidity Risks
We develop a parsimonious liquidity-adjusted downside capital asset pricing model to investigate whether phenomena such as downward liquidity spirals and flights to liquidity impact expected asset returns. We find strong empirical support for the model. ...
Volatility Risks and Growth Options
We propose to measure growth opportunities by firms’ exposure to idiosyncratic volatility news. Theoretically, we show that the value of a growth option increases in idiosyncratic volatility but its response to volatility of aggregate shocks can be either ...
Managing Storable Commodity Risks: The Role of Inventory and Financial Hedge
We study how to manage commodity risks price and consumption volume via physical inventory and financial hedge in a multiperiod problem with an interperiod utility function for a risk-averse firm procuring a storable commodity from a spot market at a ...