Chapter 8: Errors, Failures, and Risk Zach Archer Daniel O’Hara Eric Strittmatter.

Slides:



Advertisements
Similar presentations
Risk Management and Types of Risks By Tony Collins Edited by Memory Reed Georgia CTAE Resource Network 2010.
Advertisements

The Therac-25: A Software Fatal Failure
A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers.
Social Implications of a Computerized Society Computer Errors Instructor: Oliver Schulte Simon Fraser University.
1. Software in our lives, then and now  Medical (processing and analysis, Computer Aided Surgery, other various equipment)  Financial and business (banking,
Therac-25 Lawsuit for Victims Against the AECL
Chapter 18 Torts.
Can We Trust the Computer?
Syllabus Case Histories WW III Almost Medical Killing Machine
Software Engineering Disasters
Ethics in a Computing Culture
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues.
Slides prepared by Cyndi Chie and Sarah Frye. Fourth edition revisions by Sharon Gray. A Gift of Fire Fourth edition Sara Baase Chapter 8: Errors, Failures,
Reliability and Safety Lessons Learned. Ways to Prevent Problems Good computer systems Good computer systems Good training Good training Accountability.
Motivation Why study Software Engineering ?. What is Engineering ? 2 Engineering (Webster) – The application of scientific and mathematical principles.
Software Engineering Modern Approaches Eric Braude and Michael Bernstein 1.
A Gift of Fire Third edition Sara Baase
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
A Gift of Fire Third edition Sara Baase
Errors, Failures and Risks CS4020 Overview Failures and Errors in Computer Systems Case Study: The Therac-25 Increasing Reliability and Safety Dependence,
Toward A Reasonable Programmer Standard Responsibility and Negligence in Software Design.
DJ Wattam, Han Junyi, C Mongin1 COMP60611 Directed Reading 1: Therac-25 Background – Therac-25 was a new design dual mode machine developed from previous.
Ethical and Social...J.M.Kizza 1 Module 8: Software Issues: Risks and Liabilities Definitions Causes of Software Failures Risks Consumer Protection Improving.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 8: Errors, Failures, and Risks Version modified by Cheryl.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Therac 25 Nancy Leveson: Medical Devices: The Therac-25 (updated version of IEEE Computer article)
ITGS Software Reliability. ITGS All IT systems are a combination of: –Hardware –Software –People –Data Problems with any of these parts, or a combination.
Chapter 8: Errors, Failures, and Risk
1 Can We Trust the Computer? What Can Go Wrong? Case Study: The Therac-25 Increasing Reliability and Safety Perspectives on Failures, Dependence, Risk,
Liability for Computer Errors Not covered in textbook.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 8: Errors, Failures, and Risks.
Security and Reliability THERAC CASE STUDY TEXTBOOK: BRINKMAN’S ETHICS IN A COMPUTING CULTURE READING: CHAPTER 5, PAGES
 CS 5380 Software Engineering Chapter 8 Testing.
Therac-25 Case Family vs. Programmer. People Suffered From Different Type of Bad Programming Database accuracy problems. Many people could not vote in.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Dimitrios Christias Robert Lyon Andreas Petrou Dimitrios Christias Robert Lyon Andreas Petrou.
CS 4001Mary Jean Harrold 1 Can We Trust the Computer?
©2001 Southern Illinois University, Edwardsville All rights reserved. Today Fun with Icons Thursday Presentation Lottery Q & A on Final Exam Course Evaluations.
CptS 401 Adam Carter. Announcement  Executive decision: no class Thursday! (CH and exam review will take place tomorrow instead)  Be sure that.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Trust, Safety & Reliability INTRODUCTION TO COMPUTER ERRORS TEXTBOOK: BRINKMAN’S ETHICS IN A COMPUTING CULTURE READING: CHAPTER 5, PAGES ,
Telerik Software Academy Software Quality Assurance.
A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 Can We Trust the Computer?
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
Tim Walden Section: 004 NO!  Consumers have no legal alternative over defective software they buy off the shelf because of restrictions on liabilities.
Computing is Socio-Technical or: Why Stakeholder Listing is Inadequate for Thoughtful Ethical Analysis Chuck Huff St. Olaf College For NSF Computer Ethics.
Therac-25 CS4001 Kristin Marsicano. Therac-25 Overview  What was the Therac-25?  How did it relate to previous models? In what ways was it similar/different?
Software Defects.
CptS 401 Adam Carter. Final Review  Similar structure to the midterm: Multiple choice Matching (probably quotes from Daemon) Essay  Most questions will.
CS 4001Mary Jean Harrold1 Class 20 ŸSoftware safety ŸRest of semester Ÿ11/1 (Thursday) Term paper approach due Ÿ11/13 (Tuesday) Assignment 8 on software.
©2001 Southern Illinois University, Edwardsville All rights reserved. Today Finish Ethics Next Week Research Topics in HCI CS 321 Human-Computer Interaction.
Professional Ethics and Responsibilities
Chapter 8 Errors, Failures, & Risks. Real Headlines Navigation system directs car into river Data entry typo mutes millions of U.S. pagers Flaws found.
ERRORS, FAILURES, AND RISK By: Majed Ainaldin Olalekan Alabi.
Randy Modowski Adam Reimel Max Varner COSC 380 May 23, 2011 Accountability.
CHAPTER 9: PROFESSIONAL ETHICS AND RESPONSIBILITIES BY: MATT JENNINGS SHANE CRAKER KYLER RHOADES.
Can We Trust the Computer? FIRE, Chapter 4. What Can Go Wrong? What are the risks and reasons for computer failures? How much risk must or should we accept?
Why study Software Design/Engineering ?
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
Reliability and Safety
Reliability and Safety
Week 13: Errors, Failures, and Risks
Errors, Failures, & Risks
Reliability and Safety
Computer in Safety-Critical Systems
A Gift of Fire Third edition Sara Baase
Software Engineering Disasters
Presentation transcript:

Chapter 8: Errors, Failures, and Risk Zach Archer Daniel O’Hara Eric Strittmatter

Overview Errors and Failures – Problems for Individuals – Failures that Affect Populations – Problems in Safety – Critical Applications Therac – 25: A Case Study Increasing Reliability and Safety – Reuse of Software – Failure to Update – Professional Techniques – Law, Regulation, and Markets Discussion

Errors and Failures Many factors – Faulty Interface – Sloppy Implementation – Careless/Insufficiently Trained Users – Poor User Interface

Categorization Problems for Individuals – Generally as consumers Failures that Affect Populations – Costs large amounts of money Problems in Safety – Critical Applications – May injure or kill

Problems for Individuals Billing Errors – Programming based Limits Variable representation Database Inaccuracy – Management based Updating data Poor data consistency

Failures that Affect Populations Communications – Software Updates – Device Dependency Business – Data Loss – Inverse Affects – Marketing Dishonesty “The honest computing professional will not make deliberately false or deceptive claims about a system or system design”

Failures that Affect Populations (cont’d) Voting Systems – Data Leaks – Verification – System Hacking Airports – Large Complexity – Overconfidence

Abandoned and Legacy Systems Abandoned Systems – Costs ~40 million – 4 billion – “Hopelessly Inadequate” – 5% – 15% per 1 Trillion dollars Legacy Systems – Old Software and Hardware on New Systems – Generally Creates Problems Original Programmers Gone Documentation Lost Obscure variable names Extinct Language

Problems in Safety – Critical Applications Air Traffic Control – Automated Airplanes Unexpected behavior Pilots vs. system

Trust and Acceptance Computers Do Help… – Ground-Proximity Warning System – Traffic Collision Avoidance System Drawing the Line – Error Ratio Computer creates 10,000 incorrect checks per day – Higher When Dealing with Human Life? – “Well-intended actions, including those that accomplish assigned duties, may lead to harm unexpectedly. In such an event the responsible person or persons are obligated to undo or mitigate the negative consequences as much as possible.”

Therac-25 Case Study

Therac-25 Classic case study – Deadly software failure – Radiation treatment machine Software controlled Cancer treatment

Therac-25 Manufacturer – Atomic Energy of Canada Limited (AECL) Government corporation

Therac – 4 different medical centers – Massive overdose of radiation to 6 patients 13,000 to 25,000 rads given 100 to 200 intended Multiple doses due to display error 3 dead

Therac-25 Factors – Safety design – Insufficient testing – Bugs – Inadequate reporting and investigating

Therac-25 Design Flaws – Manufacture oversight -Malfunctioned frequently -Generally under doses -Operators were used to errors -Overlooked -Operator Interface -Number of issues

Therac-25 Design Flaws – Earlier versions (Therac-6, 20) Hardware safety mechanisms – Independent of computer – First fully computer controlled Used same software as the earlier models – Assumed to be safe Frequent shutdowns, blown fuses – Some bugs

Therac-25 Why Study? – Avoid repeating History Panama (2000) – Different machine similar issue – 28 overdoses, several deaths – Risk Assessment and Ethical Questions

Therac-25 Stakeholders?

Therac-25 Manufacturer Government Agencies Hospitals/Physicians Patients Family

Therac-25 Responsibility?

Therac-25 Software Developers System Engineers Physicians AECL Government Agencies

Therac-25 Risk?

8.3 Increasing Reliability and Safety What Goes Wrong – Two General reasons Job is to difficult Job is done poorly – Now interact with the real world Complex communications Unpredictable humans Numerous features

Overconfidence Developers and users need to appreciate the risk Backing up files A320 airplane Two programming teams Unrealistic reliability or safety estimates Carelessness

The Reuse of software Ariane 5 rocket – Veered off course – Rocket and satellites destroyed – 500 million dollars “No Fly” list

Failure to Update Failure to update information in databases – FBI database Dose not indicate whether a suspect was convicted – Foreign visitors databases Screening for terrorist Visitors stay longer than legally permitted No way for visitors to check out

User interface and human factors Good interfaces help avoid common problems Word processor User interfaces need clear instructions and error messages American Airlines Flight 965 Autopilot interface – Feedback needed – Behave like the user – Low workload is dangerous

Testing Well-planned testing of software is the most important thing Challenger space shuttle NASA called for independent Beta testing

Law, Regulation, and Markets Criminal and Civil penalties – Therac-25 Victims sued and settled out of court “catastrophic” financial system Credit reports – Limited to the money paid for the software – Many liability laws and criminal laws Help to produce good systems

Warranties for consumer software “shrink-wrap” or “click-on” Take software as-is No guarantee

Taking Responsibility Many companies pay customers for problems United Airlines Consumers can protect themselves Reviews

What are your thoughts Are we too dependent on computers Should there be mandatory licensing of software developers Should software have warranties

References Baase, S. (2008), A Gift of Fire, 3 rd Edition, Pearson Education Inc. ACM (1992), ACM Code of Ethics and Professional Conduct, Accessed: 4/16/2012. Coker, R. (2012), Google Chrome and SE Linux, chrome-and-se-linux/, Accessed: 4/16/2012.

Thank You Any Questions?