Slides prepared by Cyndi Chie and Sarah Frye. Fourth edition revisions by Sharon Gray. A Gift of Fire Fourth edition Sara Baase Chapter 8: Errors, Failures,

Slides:



Advertisements
Similar presentations
Accident and Incident Investigation
Advertisements

The Therac-25: A Software Fatal Failure
A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers.
Social Implications of a Computerized Society Computer Errors Instructor: Oliver Schulte Simon Fraser University.
An Investigation of the Therac-25 Accidents Nancy G. Leveson Clark S. Turner IEEE, 1993 Presented by Jack Kustanowitz April 26, 2005 University of Maryland.
Therac-25 Lawsuit for Victims Against the AECL
Can We Trust the Computer?
These slides are designed to accompany Software Engineering: A Practitioner’s Approach, 6/e (McGraw-Hill 2005). Slides copyright 2005 by Roger Pressman.1.
1 Independent Verification and Validation Current Status, Challenges, and Research Opportunities Dan McCaugherty IV&V Program Manager Titan Systems Corporation.
Reliability and Safety Lessons Learned. Ways to Prevent Problems Good computer systems Good computer systems Good training Good training Accountability.
Social Implications of a Computerized Society Lecture 8 Professional Ethics Instructor: Oliver Schulte Simon Fraser University.
A Gift of Fire Third edition Sara Baase
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
A Gift of Fire Third edition Sara Baase
Errors, Failures and Risks CS4020 Overview Failures and Errors in Computer Systems Case Study: The Therac-25 Increasing Reliability and Safety Dependence,
A Gift of Fire Third edition Sara Baase
Notion of a Project Notes from OOSE Slides - modified.
Jacky: “Safety-Critical Computing …” ► Therac-25 illustrated that comp controlled equipment could be less safe. ► Why use computers at all, if satisfactory.
DJ Wattam, Han Junyi, C Mongin1 COMP60611 Directed Reading 1: Therac-25 Background – Therac-25 was a new design dual mode machine developed from previous.
Ethical and Social...J.M.Kizza 1 Module 8: Software Issues: Risks and Liabilities Definitions Causes of Software Failures Risks Consumer Protection Improving.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 8: Errors, Failures, and Risks Version modified by Cheryl.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
CS 501: Software Engineering Fall 1999 Lecture 16 Verification and Validation.
Therac 25 Nancy Leveson: Medical Devices: The Therac-25 (updated version of IEEE Computer article)
Information System Security and Control
ITGS Software Reliability. ITGS All IT systems are a combination of: –Hardware –Software –People –Data Problems with any of these parts, or a combination.
Chapter 8: Errors, Failures, and Risk
1 Can We Trust the Computer? What Can Go Wrong? Case Study: The Therac-25 Increasing Reliability and Safety Perspectives on Failures, Dependence, Risk,
Liability for Computer Errors Not covered in textbook.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 8: Errors, Failures, and Risks.
Can We Trust Computers? CS 301 (Spring 2007) Mark Luntzel, Niel Ngyuen, and James Cheng.
Security and Reliability THERAC CASE STUDY TEXTBOOK: BRINKMAN’S ETHICS IN A COMPUTING CULTURE READING: CHAPTER 5, PAGES
Engineering Safety in Design Bo Hu John Nieber. Safety Damage from an unsafe process or product – A defective automobile brake system: Collision: driver,
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Dimitrios Christias Robert Lyon Andreas Petrou Dimitrios Christias Robert Lyon Andreas Petrou.
CS 4001Mary Jean Harrold 1 Can We Trust the Computer?
CptS 401 Adam Carter. Announcement  Executive decision: no class Thursday! (CH and exam review will take place tomorrow instead)  Be sure that.
10/23/2015CPSC , CPSC , Lecture 141 Software Engineering, CPSC , CPSC , Lecture 14.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 Can We Trust the Computer?
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
Therac-25 CS4001 Kristin Marsicano. Therac-25 Overview  What was the Therac-25?  How did it relate to previous models? In what ways was it similar/different?
Chapter 1: Fundamental of Testing Systems Testing & Evaluation (MNN1063)
CptS 401 Adam Carter. Final Review  Similar structure to the midterm: Multiple choice Matching (probably quotes from Daemon) Essay  Most questions will.
CS 4001Mary Jean Harrold1 Class 20 ŸSoftware safety ŸRest of semester Ÿ11/1 (Thursday) Term paper approach due Ÿ11/13 (Tuesday) Assignment 8 on software.
©2001 Southern Illinois University, Edwardsville All rights reserved. Today Finish Ethics Next Week Research Topics in HCI CS 321 Human-Computer Interaction.
Legal Safe Guards For The Nurse. 1- Contracts Exchange of promises between two parties. Usually contains: Real consent of the two parties. Real consent.
Chapter 8 Errors, Failures, & Risks. Real Headlines Navigation system directs car into river Data entry typo mutes millions of U.S. pagers Flaws found.
8 Medication Errors and Prevention.
ERRORS, FAILURES, AND RISK By: Majed Ainaldin Olalekan Alabi.
Randy Modowski Adam Reimel Max Varner COSC 380 May 23, 2011 Accountability.
Chapter 8: Errors, Failures, and Risk Zach Archer Daniel O’Hara Eric Strittmatter.
CHAPTER 9: PROFESSIONAL ETHICS AND RESPONSIBILITIES BY: MATT JENNINGS SHANE CRAKER KYLER RHOADES.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Program Performance Criteria.
1 Advanced Computer Programming Project Management: Basics Copyright © Texas Education Agency, 2013.
Can We Trust the Computer? FIRE, Chapter 4. What Can Go Wrong? What are the risks and reasons for computer failures? How much risk must or should we accept?
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
Reliability and Safety
Reliability and Safety
Baisc Of Software Testing
Week 13: Errors, Failures, and Risks
A Gift of Fire Third edition Sara Baase
Errors, Failures, & Risks
Reliability and Safety
8 Medication Errors and Prevention.
Computer in Safety-Critical Systems
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Slides prepared by Cyndi Chie and Sarah Frye. Fourth edition revisions by Sharon Gray. A Gift of Fire Fourth edition Sara Baase Chapter 8: Errors, Failures, and Risks

Corresponding page number:  Failures and Errors in Computer Systems  Case Study: The Therac-25  Increasing Reliability and Safety  Dependence, Risk, and Progress What We Will Cover 361

Corresponding page number:  Most computer applications are so complex it is virtually impossible to produce programs with no errors  The cause of failure is often more than one factor  Computer professionals must study failures to learn how to avoid them  Computer professionals must study failures to understand the impacts of poor work Failures and Errors in Computer Systems

Corresponding page number: Problems for Individuals  Billing errors  Inaccurate and misinterpreted data in databases  Large population where people may share names  Automated processing may not be able to recognize special cases  Overconfidence in the accuracy of data  Errors in data entry  Lack of accountability for errors Failures and Errors in Computer Systems

Corresponding page number: System Failures  Galaxy IV  Amtrak Failures and Errors in Computer Systems

Corresponding page number: System Failures  Voting systems  Technical failures  Programmers or hackers rigging software to produce inaccurate results.  Vulnerability to viruses Failures and Errors in Computer Systems

Corresponding page number: System Failures  Denver Airport  Baggage system failed due to real world problems, problems in other systems and software errors  Main causes:  Time allowed for development was insufficient  Denver made significant changes in specifications after the project began Failures and Errors in Computer Systems

Corresponding page number: System Failures  Airports in Hong Kong and Kuala Lumpur  Comprehensive systems failed because designers did not adequately consider potential for user input error. 373 Failures and Errors in Computer Systems

Corresponding page number: System Failures  Abandoned systems  Some flaws in systems are so extreme that the systems are discarded after wasting millions, or even billions, of dollars Failures and Errors in Computer Systems

Corresponding page number: System Failures  Lack of clear, well-thought-out goals and specifications  Poor management and poor communication among customers, designers, programmers, etc.  Institutional and political pressures that encourage unrealistically low bids, low budget requests, and underestimates of time requirements  Use of very new technology, with unknown reliability and problems  Refusal to recognize or admit a project is in trouble 374 Failures and Errors in Computer Systems

Corresponding page number: System Failures  Legacy systems  Reliable but inflexible  Expensive to replace  Little or no documentation Failures and Errors in Computer Systems

Corresponding page number: What Goes Wrong?  The job they are doing is inherently difficult.  Sometimes the job is done poorly Failures and Errors in Computer Systems

Corresponding page number: What Goes Wrong?  Design and development problems Inadequate attention to potential safety risks Interaction with physical devices that do not work as expected Incompatibility of software and hardware, or of application software and the operating system Not planning and designing for unexpected inputs or circumstances Confusing user interfaces Insufficient testing Reuse of software from another system without adequate checking Overconfidence in software Carelessness 376 Failures and Errors in Computer Systems

Corresponding page number: What Goes Wrong? (cont.)  Management and use problems Data-entry errors Inadequate training of users Errors in interpreting results or output Failure to keep information in databases up to date Overconfidence in software by users 376 Failures and Errors in Computer Systems

Corresponding page number: What Goes Wrong? (cont.)  Misrepresentation, hiding problems and inadequate response to reported problems  Insufficient market or legal incentives to do a better job 376 Failures and Errors in Computer Systems

Corresponding page number: What Goes Wrong?  Reuse of software: the Ariane 5 rocket and “No Fly” lists  It is essential to reexamine the specifications and design of the software, consider implications and risks for the new environment, and retest the software for the new use. 377 Failures and Errors in Computer Systems

Corresponding page number: Therac-25 Radiation Overdoses  Massive overdoses of radiation were given; the machine said no dose had been administered at all  Caused severe and painful injuries and the death of three patients  Important to study to avoid repeating errors  Manufacturer, computer programmer, and hospitals/clinics all have some responsibility Case Study: The Therac

Corresponding page number: Software and Design problems  Re-used software from older systems, unaware of bugs in previous software  Weaknesses in design of operator interface  Inadequate test plan  Bugs in software  Allowed beam to deploy when table not in proper position  Ignored changes and corrections operators made at console Case Study: The Therac-25

Corresponding page number: Why So Many Incidents?  Hospitals had never seen such massive overdoses before, were unsure of the cause  Manufacturer said the machine could not have caused the overdoses and no other incidents had been reported (which was untrue)  The manufacturer made changes to the turntable and claimed they had improved safety after the second accident. The changes did not correct any of the causes identified later Case Study: The Therac-25

Corresponding page number: Why So Many Incidents? (cont.)  Recommendations were made for further changes to enhance safety; the manufacturer did not implement them.  The FDA declared the machine defective after the fifth accident.  The sixth accident occurred while the FDA was negotiating with the manufacturer on what changes were needed Case Study: The Therac-25

Corresponding page number: Observations and Perspective  Minor design and implementation errors usually occur in complex systems; they are to be expected  The problems in the Therac-25 case were not minor and suggest irresponsibility  Accidents occurred on other radiation treatment equipment without computer controls when the technicians:  Left a patient after treatment started to attend a party  Did not properly measure the radioactive drugs  Confused micro-curies and milli-curies Case Study: The Therac-25

Corresponding page number: Discussion Question  If you were a judge who had to assign responsibility in this case, how much responsibility would you assign to the programmer, the manufacturer, and the hospital or clinic using the machine? Case Study: The Therac-25

Corresponding page number: Professional techniques  Importance of good software engineering and professional responsibility  User interfaces and human factors  Redundancy and self-checking  Testing  Include real world testing with real users Increasing Reliability and Safety 383

Corresponding page number: Professional techniques  Management and communication  High reliability organization principles  preoccupation with failure  loose structure Increasing Reliability and Safety

Corresponding page number: Safety-critical applications  Identify risks and protect against them  Convincing case for safety  Avoid complacency Increasing Reliability and Safety 384

Corresponding page number: Specifications  Learn the needs of the client  Understand how the client will use the system Increasing Reliability and Safety 385

Corresponding page number: User interfaces and human factors  User interfaces should:  provide clear instructions and error messages  be consistent  include appropriate checking of input to reduce major system failures caused by typos or other errors a person will likely make Increasing Reliability and Safety 385

Corresponding page number: User interfaces and human factors  The user needs feedback to understand what the system is doing at any time.  The system should behave as an experienced user expects.  A workload that is too low can be dangerous. Increasing Reliability and Safety 3856

Corresponding page number: Redundancy and self-checking  Multiple computers capable of same task; if one fails, another can do the job.  Voting redundancy Increasing Reliability and Safety

Corresponding page number: Testing  Even small changes need thorough testing  Independent verification and validation (IV&V)  Beta testing Increasing Reliability and Safety 387

Corresponding page number:  Traffic Collision Avoidance System (TCAS)  Computers in some airplanes prevent certain pilot actions Trust the Human or the Computer System? 388

Corresponding page number:  Criminal and civil penalties  Provide incentives to produce good systems, but shouldn't inhibit innovation  Regulation for safety-critical applications  Professional licensing  Arguments for and against  Taking responsibility Law, Regulation, and Markets

Corresponding page number:  Are We Too Dependent on Computers?  Computers are tools  They are not the only dependence  Electricity  Risk and Progress  Many new technologies were not very safe when they were first developed  We develop and improve new technologies in response to accidents and disasters  We should compare the risks of using computers with the risks of other methods and the benefits to be gained Dependence, Risk, and Progress

Corresponding page number: Discussion Questions  Do you believe we are too dependent on computers? Why or why not?  In what ways are we safer due to new technologies? Dependence, Risk, and Progress