2,821 research outputs found

    Software engineering ethics

    Get PDF
    Software engineering ethics is reviewed. The following subject areas are covered: lack of a system viewpoint; arrogance of PC DOS software vendors; violation od upward compatibility; internet worm; internet worm revisited; student cheating and company hiring interviews; computing practitioners and the commodity market; new projects and old programming languages; schedule and budget; and recent public domain comments

    It takes a pirate to know one: ethical hackers for healthcare cybersecurity

    Get PDF
    Healthcare cybersecurity is increasingly targeted by malicious hackers. This sector has many vulnerabilities and health data is very sensitive and valuable. Consequently, any damage caused by malicious intrusions is particularly alarming. The consequences of these attacks can be enormous and endanger patient care. Amongst the already-implemented cybersecurity measures and the ones that need to be further improved, this paper aims to demonstrate how penetra tion tests can greatly benefit healthcare cybersecurity. It is already proven that this approach has enforced cybersecu rity in other sectors. However, it is not popular in healthcare since many prejudices still surround the hacking practice and there is a lack of education on hackers' categories and their ethics. The present analysis aims to comprehend what hacker ethics is and who ethical hackers are. Currently, hacker ethics has the status of personal ethics; however, to employ penetration testers in healthcare, it is recommended to draft an official code of ethics, comprising principles, standards, expectations, and best practices. Additionally, it is important to distinguish between malicious hackers and ethical hackers. Amongst the latter, penetration testers are only a sub-category. Acknowledging the subtle differences between ethical hackers and penetration testers allows to better understand why and how the latter can offer their services to healthcare facilities

    A World That Counts: Mobilising The Data Revolution For Sustainable Development

    Get PDF
    This report sets out the main opportunities and risks presented by the data revolution for sustainable development. Seizing these opportunities and mitigating these risks requires active choices, especially by governments and international institutions. Without immediate action, gaps between developed and developing countries, between information-rich and information-poor people, and between the private and public sectors will widen, and risks of harm and abuses of human rights will grow

    Why open source software can succeed

    Get PDF
    The paper discusses three key economic problems raised by the emergence and diffusion of Open source software: motivation, coordination, and diffusion under a dominant standard. First, the movement took off through the activity of a software development community that deliberately did not follow profit motivations. Second, a hierarchical coordination emerged without the support of an organization with proprietary rights. Third, Linux and other open source systems diffused in an environment dominated by established proprietary standards, which benefited from significant increasing returns. The paper shows that recent developments in the theory of critical mass in the diffusion of technologies with network externality may help to explain these phenomena.Open Source, Diffusion, Network Externality.

    Cybercrime Pervasiveness, Consequences, and Sustainable Counter Strategies

    Get PDF
    As our connectivity and dependency on technology increases, so does our vulnerability. Technology has provided not only new tools, but also new opportunities for criminals in the digital world. The abuse of new technologies has been threatening economic and Jinancial security and actually devastating the lives of affected indivicluals. In Nigeria, cybercrime has recorded mostly foregin-based individuals and organizations as victims thereby getting Nigeria ranked among the nations with notorious pemasiveness of high-tech crimes. Indeed, adequately formulating a strategy to contain the menace of cybercrime presents aformidable challenge to law enforcement. This paper x-rays noted instances of cybercrime pervasiveness, its devastating consequences, and up-to-date countermeasures in Nigeria It develops an enforceable/sustainable framework to determine how critical infrastructures are put at risk snd how law enforcement should react in responding to the threats

    Using technology in service delivery to families, children and young people

    Get PDF
    This paper provides an overview of how the innovative use of technology can add value to service delivery in organisations working with families, children and young people.Key messages:Most Australians have access to the Internet and use mobile devices to connect from anywhere, at any time. Research suggests that even isolated and marginalised groups are using technology in their everyday lives.For some groups (e.g., young people), technology may be their preferred method of communication.There appears to be a difference between how people are using the Internet (regularly, from anywhere, connecting with social networks, investigating services) and how some organisations are engaging with it (infrequently, in one direction).Technology works best when used to augment or improve existing services for clients, or to offer innovative approaches to existing services.Technology can be used in diverse ways for organisational improvement (e.g., remote access, staff training, professional development) or client services (e.g., online counselling, SMS appointment reminders, access to resources).Using technology does not necessarily involve large monetary investments or reinventing the wheel in terms of policy and procedures. Often it is a matter of adapting and refining existing services and policies to better suit the online world.Incorporating technology into services takes time, and will need continued assessment and refinement to be successful

    Technical and Human Issues in Computer-Based Systems Security

    Get PDF
    Computer systems and internet are becoming pervasive in our everyday life. Being online brings the consequence that such systems are prone to malicious attack. This vulnerability, along with our reliance on these systems, implies that it is important for us to do our best in securing them to ensure their proper functioning. In this paper, we are trying to tackle the security issues from both technical and human perspectives. From this dual standpoint, we hope to obtain a better understanding on how computer attacks are performed, including how to gain illicit access, the types of attacks, as well as the potential damage that they can cause. We also uncover sociological and psychological traits of the attackers, including their community, taxonomy, motives and work ethics. This survey paper will not provide a concrete solution on how to secure computer systems, but it highlights the socio-technical approach that we must take in order to obtain that goal
    • …
    corecore