522 research outputs found
Quality Assurance in Requirement Engineering
Requirement engineering is the most important process in software development life cycle. Quality assurance in requirement engineering has a great impact on the product quality. It checks whether the requirements meet the desired quality attributes i.e. adequacy, completeness, consistency etc. Quality Assurance of the requirement is important because the cost of requirements failure is very high. The proposed research is based on the survey of the quality assurance in requirement engineering. The major focus of this research paper is to analyze the quality parameters which assure the overcome of the issues related to the requirements. The research papers include brief overview of those parameters
The First Hundred Years of the Bureau of Labor Statistics
[Excerpt] This volume reports on the first century of a government agency whose founders hoped that, by publishing facts about economic conditions, the agency would help end strife between capital and labor. The Bureau\u27s early work included studies of depressions, tariffs, immigrants, and alcoholism and many assignments to investigate and mediate disputes between labor and management. Most of these functions- especially those involving formulation of policy- passed on to other agencies. The Bureau today remains one of the Nation\u27s principal economic factfinders.
In writing the book, Drs. Goldberg and Moye had full freedom to interpret events in accordance with their judgments as historians, without conformance to an official view of institutional history. Given the perspective made possible by passing years, the authors offer broader evaluations of the Bureau\u27s early history than of contemporary events
Crashworthy Code
Code crashes. Yet for decades, software failures have escaped scrutiny for tort liability. Those halcyon days are numbered: self-driving cars, delivery drones, networked medical devices, and other cyber-physical systems have rekindled interest in understanding how tort law will apply when software errors lead to loss of life or limb. Even after all this time, however, no consensus has emerged. Many feel strongly that victims should not bear financial responsibility for decisions that are entirely automated, while others fear that cyber-physical manufacturers must be shielded from crushing legal costs if we want such companies to exist at all. Some insist the existing liability regime needs no modernist cure, and that the answer for all new technologies is patience. This Article observes that no consensus is imminent as long as liability is pegged to a standard of “crashproof” code. The added prospect of cyber-physical injury has not changed the underlying complexities of software development. Imposing damages based on failure to prevent code crashes will not improve software quality, but will impede the rollout of cyber-physical systems. This Article offers two lessons from the “crashworthy” doctrine, a novel tort theory pioneered in the late 1960s in response to a rising epidemic of automobile accidents, which held automakers accountable for unsafe designs that injured occupants during car crashes. The first is that tort liability can be metered on the basis of mitigation, not just prevention. When code crashes are statistically inevitable, cyber-physical manufacturers may be held to have a duty to provide for safer code crashes, rather than no code crashes at all. Second, the crashworthy framework teaches courts to segment their evaluation of code, and make narrower findings of liability based solely on whether cyber-physical manufacturers have incorporated adequate software fault tolerance into their designs. Requiring all code to be perfect is impossible, but expecting code to be crashworthy is reasonable
Ethical and Unethical Hacking
The goal of this chapter is to provide a conceptual analysis of ethical, comprising history, common usage and the attempt to provide a systematic classification that is both compatible with common usage and normatively adequate. Subsequently, the article identifies a tension between common usage and a normativelyadequate nomenclature. ‘Ethical hackers’ are often identified with hackers that abide to a code of ethics privileging business-friendly values. However, there is no guarantee that respecting such values is always compatible with the all-things-considered morally best act. It is recognised, however, that in terms of assessment, it may be quite difficult to determine who is an ethical hacker in the ‘all things considered’ sense, while society may agree more easily on the determination of who is one in the ‘business-friendly’ limited sense. The article concludes by suggesting a pragmatic best-practice approach for characterising ethical hacking, which reaches beyond business-friendly values and helps in the taking of decisions that are respectful of the hackers’ individual ethics in morally debatable, grey zones
Best Practices and Recommendations for Cybersecurity Service Providers
This chapter outlines some concrete best practices and recommendations for cybersecurity service providers, with a focus on data sharing, data protection and penetration testing. Based on a brief outline of dilemmas that cybersecurity service providers may experience in their daily operations, it discusses data handling policies and practices of cybersecurity vendors along the following five topics: customer data handling; information about breaches; threat intelligence; vulnerability-related information; and data involved when collaborating with peers, CERTs, cybersecurity research groups, etc. There is, furthermore, a discussion of specific issues of penetration testing such as customer recruitment and execution as well as the supervision and governance of penetration testing. The chapter closes with some general recommendations regarding improving the ethical decision-making procedures of private cybersecurity service providers
Recommended from our members
AI and blockchain adoption in corporate governance
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonPurpose
The purpose of this doctoral thesis sets out to explore and elaborate on the impact of
artificial intelligence (AI) and blockchain adoption in corporate governance from ethical
perspectives. Positioned within the corporate governance domain, this study adopts
an explicit business perspective to study corporate governance change with emerging
AI and blockchain technological tools in general and focuses on the ethical use of
technologies specifically. As such, this empirical investigation aims to help
organizations understand the ethical benefits and ethical dilemmas of using AI and
blockchain in businesses and draw plans on how to govern these technologies
ethically for the benefit of the business and society.
Design/Methodology/Approach:
This study adopts specific techniques and a pragmatic, step-by-step netnography
approach to investigate online traces from social media sites and extends these online
explorations with online semi-structured interviews. The research design of this
investigation follows step-by-step procedures that are methodologically sound to
ensure rigor in this investigation to enhance the trustworthiness of this study. In total,
this research collects an abundance of data: 34 LinkedIn Posts with Comments; 12
Webinars; 22 YouTube Videos; 19 Videos; 10 Podcasts, and 17 semi-structured
interview videos. The video, audio, and interview data have been transcribed into
textual data total of 453065 words for thematic analysis using NVivo software. Enough
time has been allocated to the iterative process of data collection and data analysis.
The analysis moves back and forth to the point when theoretical saturation is achieved.
The data structure extracts from data in this study illustrate the analytic claims that
match the analysis and data together, to ensure a good fit between described method
and reported analysis are consistent.
Findings:
This study develops a thematic framework that constitutes the corporate governance
transformation with the ethical use of AI and blockchain technology. This framework
provides a holistic understanding of why corporate governance needs to change,
especially with the emergence of blockchain and AI technologies, what changes will
corporate governance encounter, and how corporate governance can imperatively
respond to the ethical use of these technologies. Specifically, it explicitly provides
comprehensive understanding of the ethical benefits and ethical concerns of using AI
and blockchain technologies in corporate governance, and reveals how companies
can govern the use of these technologies ethically.
In general terms, the findings of this study support the notion of corporate governance
change to transform business models and processes to leverage the new capabilities
of AI and blockchain technologies, to priories creativity, speed, and accountability, to
replace the old business model, to foster agile or collaborative governance to deal with
uncertainty, agility, adaptiveness, and cooperation in the digital world, to foster a network and platform strategies to drive success. This study goes beyond the extant
corporate governance scholarship to assess the technological impact to capture
values for companies in ethical ways to sustain future growth.
Additionally, the notion of corporate governance is further specified and significantly
expanded by this study to assess the adoption of AI and blockchain as new corporate
governance tools or mechanisms, to enhance ethical benefits when used properly,
and mitigate ethical dilemmas with proper checks and balances, safeguards in place,
to help organizations stay relevant in this digital transformation and be ethical and
sustainable.
This study empirically corroborates that in theory, the use of blockchain and AI can
enhance ethical practice by detecting fraud and anomaly activities, due to the unique
capabilities of blockchain and AI technologies. Further, this research adds depth and
specificity by identifying the ethical concerns of using blockchain and AI in corporate
governance. The study empirically reveals the ethical concerns of privacy issues,
unethical use of data, job transformation and replacement, and algorithm bias that
companies will encounter when they use these technologies. In addition, the findings
of this study suggest how companies can ethically govern the use of these
technologies in socially responsible ways as they transform digitally.
Originality/Value:
The emergent thematic framework is constructed from the empirical and analytical
procedures specifically and purposely designed for this study. This study makes
theoretical contributions to knowledge and enriches the extant works of literature, and
also provides practical contributions to the ethical use of disruptive technologies, future
workforce, and regulations. However, the study was conducted within certain
theoretical, methodological, empirical, and pragmatic conditions, which might
constitute particular limitations and constraints. Therefore, the last section of this
thesis elucidates and suggests the directions for future research
- …