How good is good enough?: an ethical analysis of software construction and use
Communications of the ACM
Safeware: system safety and computers
Safeware: system safety and computers
Computer related risks
A gift of fire: social, legal, and ethical issues in computing
A gift of fire: social, legal, and ethical issues in computing
Method in computer ethics: Towards amulti-level interdisciplinary approach
Ethics and Information Technology
Accountability of Internet access and service providers – strictliability entering ethics?
Ethics and Information Technology
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge
IEEE Transactions on Software Engineering
Software vulnerability due to practical drift
Ethics and Information Technology
Agents of responsibility--freelance web developers in web applications development
Information Systems Frontiers
Hi-index | 0.00 |
Modern software is infested with flaws having information security aspects. Pervasive computing has made us and our society vulnerable. However, software developers do not fully comprehend what is at stake when faulty software is produced and flaws causing security vulnerabilites are discovered. To address this problem, the main actors involved with software vulnerability processes and the relevant roles inside these groups are identified. This categorisation is illustrated through a fictional case study, which is scrutinised in the light of ethical codes of professional software engineers and common principles of responsibility attribution. The focus of our analysis is on the acute handling of discovered vulnerabilities in software, including reporting, correcting and disclosing these vulnerabilities. We recognise a need for guidelines and mechanisms to facilitate further improvement in resolving processes leading to and in handling software vulnerabilities. In the spirit of disclosive ethics we call for further studies of the complex issues involved.