skip to main content
Skip header Section
Computer related risksJanuary 1995
Publisher:
  • ACM Press/Addison-Wesley Publishing Co.
  • 1515 Broadway, 17th Floor New York, NY
  • United States
ISBN:978-0-201-55805-0
Published:01 January 1995
Pages:
367
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Ionescu T (2019). Simulation, Epistemic Opacity, and `Envirotechnical Ignorance' in Nuclear Crisis, Minds and Machines, 29:1, (61-86), Online publication date: 1-Mar-2019.
  2. ACM
    Bellovin S and Neumann P (2018). The big picture, Communications of the ACM, 61:11, (24-26), Online publication date: 26-Oct-2018.
  3. ACM
    Spinellis D (2018). Modern debugging, Communications of the ACM, 61:11, (124-134), Online publication date: 26-Oct-2018.
  4. ACM
    Alharbi R, Stump T, Vafaie N, Pfammatter A, Spring B and Alshurafa N (2018). I Can't Be Myself, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2:3, (1-40), Online publication date: 18-Sep-2018.
  5. Yu C, Chu C and Lu P (2018). Applying a Security Management Mechanism to a System Development Lifecycle, International Journal of E-Adoption, 10:1, (1-17), Online publication date: 1-Jan-2018.
  6. ACM
    Neumann P (2016). Risks of automation, Communications of the ACM, 59:10, (26-30), Online publication date: 22-Sep-2016.
  7. ACM
    Duncan B and Whittington M Compliance with standards, assurance and audit Proceedings of the 7th International Conference on Security of Information and Networks, (77-84)
  8. ACM
    Cao L and Zhu H (2013). Normal accidents, Journal of Data and Information Quality, 4:3, (1-26), Online publication date: 1-May-2013.
  9. ACM
    Spinellis D, Karakoidas V and Louridas P Comparative language fuzz testing Proceedings of the ACM 4th annual workshop on Evaluation and usability of programming languages and tools, (25-34)
  10. Andrade J, Ares J, García R, Martínez M, Rodríguez S and Suárez S About theory in software development Proceedings of the 11th WSEAS international conference on Signal processing, computational geometry and artificial vision, and Proceedings of the 11th WSEAS international conference on Systems theory and scientific computation, (256-261)
  11. Gössler G, Le Métayer D and Raclet J Causality analysis in contract violation Proceedings of the First international conference on Runtime verification, (270-284)
  12. Junqueira F, Marzullo K, Herlihy M and Penso L (2010). Threshold protocols in survivor set systems, Distributed Computing, 23:2, (135-149), Online publication date: 1-Oct-2010.
  13. ACM
    Dolev S and Yagel R (2010). Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of byzantine guests, ACM SIGOPS Operating Systems Review, 44:3, (65-74), Online publication date: 17-Aug-2010.
  14. ACM
    Gupta M, Banerjee S, Agrawal M and Rao H (2008). Security analysis of Internet technology components enabling globally distributed workplaces—a framework, ACM Transactions on Internet Technology, 8:4, (1-38), Online publication date: 1-Sep-2008.
  15. ACM
    Park S and Maurer F The benefits and challenges of executable acceptance testing Proceedings of the 2008 international workshop on Scrutinizing agile practices or shoot-out at the agile corral, (19-22)
  16. ACM
    Schaefer R (2008). Debugging debugged, a metaphysical manifesto of systems integration, ACM SIGSOFT Software Engineering Notes, 33:3, (1-20), Online publication date: 1-May-2008.
  17. Dolev S and Yagel R Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of Byzantine guests Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems, (266-280)
  18. Dolev S and Yagel R Stabilizing Trust and Reputation for Self-Stabilizing Efficient Hosts in Spite of Byzantine Guests (Extended Abstract) Stabilization, Safety, and Security of Distributed Systems, (266-280)
  19. ACM
    Kopec D and Tamang S (2007). Failures in complex systems, ACM SIGCSE Bulletin, 39:2, (180-184), Online publication date: 1-Jun-2007.
  20. ACM
    Medley M A qualitative analysis of an "ethical election project" in an ethics class Proceedings of the 45th annual southeast regional conference, (347-349)
  21. Menzies T, Owen D and Richardson J (2007). The Strangest Thing About Software, Computer, 40:1, (54-60), Online publication date: 1-Jan-2007.
  22. Brukman O and Dolev S Recovery oriented programming Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems, (152-168)
  23. ACM
    Neumann P System and network trustworthiness in perspective Proceedings of the 13th ACM conference on Computer and communications security, (1-5)
  24. Alonso D, Sánchez P, Álvarez B and Pastor J A systematic approach to developing safe tele-operated robots Proceedings of the 11th Ada-Europe international conference on Reliable Software Technologies, (119-130)
  25. Grunske L, Lindsay P, Yatapanage N and Winter K An automated failure mode and effect analysis based on high-level design specification with behavior trees Proceedings of the 5th international conference on Integrated Formal Methods, (129-149)
  26. ACM
    Im G and Baskerville R (2005). A longitudinal study of information system threat categories, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 36:4, (68-79), Online publication date: 7-Oct-2005.
  27. ACM
    Schaefer R (2005). The risks of large organizations in developing complex systems, ACM SIGSOFT Software Engineering Notes, 30:5, (1-3), Online publication date: 1-Sep-2005.
  28. ACM
    Schaefer R (2005). Deeper questions, ACM SIGSOFT Software Engineering Notes, 30:4, (1-6), Online publication date: 1-Jul-2005.
  29. Lufei H and Shi W Fractal Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
  30. Kussmaul C (2005). Using agile development methods to improve student writing, Journal of Computing Sciences in Colleges, 20:3, (148-156), Online publication date: 1-Feb-2005.
  31. Vincent C and Camp J (2004). Looking to the Internet for models of governance, Ethics and Information Technology, 6:3, (161-173), Online publication date: 1-Sep-2004.
  32. Takanen A, Vuorijärvi P, Laakso M and Röning J (2019). Agents of responsibility in software vulnerability processes, Ethics and Information Technology, 6:2, (93-110), Online publication date: 9-Jun-2004.
  33. Kussmaul C (2004). Software product proposals in a computer science course for non-majors, Journal of Computing Sciences in Colleges, 19:5, (78-86), Online publication date: 1-May-2004.
  34. ACM
    Byers S, Cranor L, Korman D, McDaniel P and Cronin E Analysis of security vulnerabilities in the movie production and distribution process Proceedings of the 3rd ACM workshop on Digital rights management, (1-12)
  35. ACM
    Robinson W, Pawlowski S and Volkov V (2003). Requirements interaction management, ACM Computing Surveys (CSUR), 35:2, (132-190), Online publication date: 1-Jun-2003.
  36. Anderson J (2003). Feature, Computers and Security, 22:4, (308-313), Online publication date: 1-May-2003.
  37. Little J Using cases to increase interest in ICT and computing as a career Proceedings of the 3.1 and 3.3 working groups conference on International federation for information processing: ICT and the teacher of the future - Volume 23, (81-83)
  38. Clarke S and Drake P A social perspective on information security Socio-technical and human cognition elements of information systems, (249-265)
  39. Roberts E Society, computers in Encyclopedia of Computer Science, (1591-1599)
  40. London R and Craigen D Program verification Encyclopedia of Computer Science, (1458-1461)
  41. ACM
    Knight J Safety critical systems Proceedings of the 24th International Conference on Software Engineering, (547-550)
  42. ACM
    Besnard D and Lawrie A Lessons from industrial design for software engineering through constraints identification, solution space optimisation and reuse Proceedings of the 2002 ACM symposium on Applied computing, (732-738)
  43. Lally L Assessing the risks of IT-enabled jobs Managing the human side of information technology, (60-77)
  44. Friedman B and Kahn P Human values, ethics, and design The human-computer interaction handbook, (1177-1201)
  45. Bellotti V and Edwards K (2018). Intelligibility and accountability, Human-Computer Interaction, 16:2, (193-212), Online publication date: 1-Dec-2001.
  46. ACM
    The Joint Task Force on Computing Curricula C (2001). Computing curricula 2001, Journal on Educational Resources in Computing (JERIC), 1:3es, (1-es), Online publication date: 1-Sep-2001.
  47. Mitev N Toward social constructivist understandings of IS success and failure Proceedings of the twenty first international conference on Information systems, (84-93)
  48. Gershenfeld N (2000). Everything the universe, and life, IBM Systems Journal, 39:3-4, (932-934), Online publication date: 1-Jul-2000.
  49. ACM
    Lutz R Software engineering for safety Proceedings of the Conference on The Future of Software Engineering, (213-226)
  50. ACM
    Bowen J (2000). The ethics of safety-critical systems, Communications of the ACM, 43:4, (91-97), Online publication date: 1-Apr-2000.
  51. Devanbu P and Stubblebine S (2000). Cryptographic Verification of Test Coverage Claims, IEEE Transactions on Software Engineering, 26:2, (178-192), Online publication date: 1-Feb-2000.
  52. Povey D Enforcing well-formed and partially-formed transactions for Unix Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (5-5)
  53. Jajodia S, Ammann P and McCollum C (2019). Surviving Information Warfare Attacks, Computer, 32:4, (57-63), Online publication date: 1-Apr-1999.
  54. Heckman C and Wobbrock J (1999). Liability for Autonomous Agent Design, Autonomous Agents and Multi-Agent Systems, 2:1, (87-103), Online publication date: 1-Mar-1999.
  55. ACM
    Medley M, Rutherfoord R, Anderson G, Roth R and Varden S Ethical issues related to internet development and research Working Group reports of the 3rd annual SIGCSE/SIGCUE ITiCSE conference on Integrating technology into computer science education, (57-72)
  56. ACM
    Pritchett W and Riley J (1998). An ASIS-based static analysis tool for high-integrity systems, ACM SIGAda Ada Letters, XVIII:6, (12-17), Online publication date: 1-Nov-1998.
  57. ACM
    Michell S, Saaltink M and Wichmann B (2019). Looking into safety with the safety and security Rapporteur group, ACM SIGAda Ada Letters, XVIII:6, (7-11), Online publication date: 1-Nov-1998.
  58. ACM
    Pritchett W and Riley J An ASIS-based static analysis tool for high-integrity systems Proceedings of the 1998 annual ACM SIGAda international conference on Ada, (12-17)
  59. ACM
    Michell S, Saaltink M and Wichmann B Looking into safety with the safety and security Rapporteur group Proceedings of the 1998 annual ACM SIGAda international conference on Ada, (7-11)
  60. ACM
    Medley M, Rutherfoord R, Anderson G, Roth R and Varden S (1998). Ethical issues related to internet development and research, ACM SIGCUE Outlook, 26:4, (57-72), Online publication date: 1-Oct-1998.
  61. ACM
    McGrath G and Offen R Undergraduate students and the management-technology interface Proceedings of the 3rd Australasian conference on Computer science education, (2-8)
  62. ACM
    Heckman C and Wobbrock J Liability for autonomous agent design Proceedings of the second international conference on Autonomous agents, (392-399)
  63. ACM
    Lankewicz L (1998). Resources for teaching computer networks, ACM SIGCSE Bulletin, 30:1, (112-116), Online publication date: 1-Mar-1998.
  64. ACM
    Lankewicz L Resources for teaching computer networks Proceedings of the twenty-ninth SIGCSE technical symposium on Computer science education, (112-116)
  65. Hatton L (1997). N-Version Design Versus One Good Version, IEEE Software, 14:6, (71-76), Online publication date: 1-Nov-1997.
  66. Gong L (1997). Java Security, IEEE Micro, 17:3, (14-19), Online publication date: 1-May-1997.
  67. ACM
    Gersting J and Young F (1997). Content + experiences = curriculum, ACM SIGCSE Bulletin, 29:1, (325-329), Online publication date: 1-Mar-1997.
  68. ACM
    Gersting J and Young F Content + experiences = curriculum Proceedings of the twenty-eighth SIGCSE technical symposium on Computer science education, (325-329)
  69. ACM
    Blyth A (1997). Issues arising from medical system's failure, ACM SIGSOFT Software Engineering Notes, 22:2, (85-86), Online publication date: 1-Mar-1997.
  70. ACM
    Blyth A (1996). What happens when a medical office information system fails, ACM SIGCAS Computers and Society, 26:4, (25-26), Online publication date: 1-Dec-1996.
  71. ACM
    Pierce M and Henry J (2019). Computer ethics and social issues case analysis, ACM SIGCSE Bulletin, 28:4, (50-54), Online publication date: 1-Dec-1996.
  72. Tygar J and Whitten A WWW electronic commerce and java trojan horses Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2, (15-15)
  73. ACM
    Neumann P (1996). Inside risks, Communications of the ACM, 39:4, (122), Online publication date: 1-Apr-1996.
  74. ACM
    Lally L Enumerating the risks of reengineered processes Proceedings of the 1996 ACM 24th annual conference on Computer science, (18-23)
  75. ACM
    Garg P and Sankar S (2019). Fifth California software symposium, ACM SIGSOFT Software Engineering Notes, 21:1, (68-70), Online publication date: 1-Jan-1996.
  76. ACM
    Neumann P (1995). Reviewing the risks archives, Communications of the ACM, 38:12, (138), Online publication date: 1-Dec-1995.
  77. ACM
    Neumann P (1995). Reassessing the crypto debate, Communications of the ACM, 38:3, (138), Online publication date: 1-Mar-1995.
  78. ACM
    Neumann P (1994). Inside Risks: Inside “Inside Risks”, Communications of the ACM, 37:12, (154), Online publication date: 1-Dec-1994.
  79. ACM
    Neumann P (1994). Illustrative risks to the public in the use of computer systems and related technology, ACM SIGSOFT Software Engineering Notes, 19:1, (16-29), Online publication date: 1-Jan-1994.
Contributors
  • SRI International

Index Terms

  1. Computer related risks

      Recommendations