+612 9045 4394
The Dark Side of Software Engineering : Evil on Computing Projects - Johann Rost

The Dark Side of Software Engineering

Evil on Computing Projects

Paperback Published: 22nd February 2011
ISBN: 9780470597170
Number Of Pages: 305

Other Formats

Share This Book:


Ships in 5 to 9 business days

This is not a book about software project failure, or about prescriptive thinking about how to build software better. This is a book about the evil things that happen on computing and software projects---what the kinds of evil are, how they manifest themselves, and what the good guys can do about them.

In this timely report on vice at every level of software project management, industry experts Johann Rost and Robert Glass explore the seamy underbelly of software engineering. Based on the authors' original research and augmented by frank insights from other well-respected figures, The Dark Side of Software Engineering consists of anecdotes about occurrences of the practices, an analysis of research findings in the context of the anecdotes, and some suggestions on what to do about the dark side. Discussions draw from the software and information technology literature and from the management literature specific to these topics.

Written in a quick-reading journalistic style, The Dark Side of Software Engineering goes where other management studies fear to tread---a corporate environment where schedules are fabricated, trust is betrayed, millions of dollars are lost, and there is a serious need for the kind of corrective action that this book ultimately proposes.

Forewordp. ix
Introductionp. 1
What's the Dark Side?p. 1
Why the Dark Side?p. 2
Who Cares About the Dark Side?p. 3
How Dark is the Dark Side?p. 5
What Else is on the Dark Side?p. 7
Ethics and the Dark Sidep. 8
Personal Anecdotes About the Dark Sidep. 11
Referencep. 14
Dark Side Issuesp. 15
Subversionp. 17
Introductory Case Studies and Anecdotesp. 17
A Faculty Feedback Systemp. 18
An Unusual Cooperative Effortp. 21
Lack of Cooperation due to Self Interestp. 22
An Evil Teammatep. 22
Thwarting the Evil Unionp. 24
The Survey: Impact of Subversive Stakeholders On Software Projectsp. 24
Introductionp. 25
The Surveyp. 26
The Survey Findingsp. 27
Conclusionsp. 34
Impact on Practicep. 35
Impact on Researchp. 35
Limitationsp. 35
Challengesp. 36
Acknowledgmentsp. 37
Selected Responsesp. 37
Sample Answers to the Question: ôWhat Were the Motivations and Goals of the Subversive Stakeholders?öp. 37
Sample Answers to the Question ôHow Were the Subversive Attacks Discovered?öp. 45
Sample Answers to the Question ôHow Can Projects be Defended Against Subversive Stakeholders?öp. 49
A Follow-Up to the Survey: Some Hypotheses and Related Survey Findingsp. 56
Referencesp. 80
Lyingp. 81
Introductory Case Studies and Anecdotesp. 81
Incidents of Lying: The Surveyp. 86
The Survey Resultsp. 87
General Scopep. 87
An Overview of the Problemp. 88
Clarification of Termsp. 89
Discussionp. 93
Conclusionsp. 93
Limitationsp. 94
Qualitative Survey Responses on Lyingp. 95
What Can Be Done About Lying?p. 96
The Questionnaire Used in the Surveyp. 107
Referencesp. 112
Hackingp. 113
Case Studies of Attacks and Biographies of Hackersp. 113
Cyber Terrorism and Government-Sponsored Hackingp. 118
The Hacker Subculturep. 121
Why They Are Called ôHackersöp. 121
Motivation of Hackersp. 121
Hacker Slangp. 122
Hacker Ethicsp. 123
Public Opinion about Hackersp. 130
How a Hacker Is Identifiedp. 132
Time Line of a Typical Malware Attackp. 135
Hacker Economy: How Does a Hacker Make Money?p. 136
Social Engineeringp. 142
Social Engineering Examples and Case Studiesp. 143
Tactics of Social Engineeringp. 151
A Lingering Questionp. 153
Late-Breaking Newsp. 154
Theft of Informationp. 157
Introductionp. 157
Case Studiesp. 158
Data Theftp. 158
Source Code Theftp. 161
How Do the Victims Find Out That Their Secrets Are Stolen?p. 164
Intellectual Property Protectionp. 166
Trade Secret Protectionp. 167
Copyright Protectionp. 169
Patent Protectionp. 169
Steganographyp. 170
Open Versus Closed Sourcep. 170
Espionagep. 175
Introductionp. 175
What Is Espionage?p. 176
Case Studiesp. 177
Sweden Versus Russiap. 178
Shekhar Vermap. 178
Lineage IIIp. 179
GM versus VW: Jose Ignacio Lopezp. 179
British Midland Toolsp. 179
Solid Oak Softwarep. 180
Proctor & Gamble versus Unileverp. 181
News Corp Versus Vivendip. 181
Spying: Was A TI Chip Really Stolen by a French Spy?p. 181
Confickerp. 183
Cyber Warfarep. 185
Referencep. 187
Disgruntled Employees and Sabotagep. 189
Introduction and Backgroundp. 189
Disgruntled Employee Data Issuesp. 192
Data Tamperingp. 192
Data Destructionp. 194
Data Made Publicp. 196
Theft Via Datap. 199
Disgruntled Employee Software Issuesp. 199
Software Destructionp. 199
Disgruntled Employee System Issuesp. 200
What to Do About Disgruntled Employee Actsp. 203
Sabotagep. 206
Referencesp. 212
Whistle-Blowingp. 213
A Hypothetical Scenariop. 215
Whistle-Blowing and Software Engineeringp. 217
More Case Studies and Anecdotesp. 220
Jeffrey Wigand and Brown and Williamson Tobaccop. 220
A Longitudinal Study of Whistle-Blowingp. 221
An Even More Pessimistic Viewp. 222
Academic Whistle-Blowingp. 223
The Sum Total of Whistle-Blowingp. 224
Referencesp. 225
Appendix to Chapter 7 Practical Implications of the Research into whistle-Blowingp. 227
Referencesp. 240
Viewpoints on Dark Side Issuesp. 243
Introductionp. 243
Opinions, Predictions, and Beliefsp. 245
Automated Crimep. 246
Information Sourcesp. 237
Let's Play Make Believep. 258
Referencep. 260
Dark, Light, or Just Another Shade of Grey?p. 261
Rational Software Developers as Pathological Code Hackersp. 264
Personal Anecdotesp. 269
An Officer and a Gentleman Confronts the Dark Sidep. 270
Less Carrot and More Stickp. 273
Referencesp. 275
ôThem and Usö: Dispatches from the Virtual Software Team Trenchesp. 276
What is it to Lie on a Software Project?p. 281
ôMerciless Control Instrumentö and the Mysterious Missing Faxp. 284
Forest of Ardenp. 289
Hard-Headed Hardware Hit Manp. 292
A Lighthearted Anecdotep. 294
Conclusionsp. 299
Indexp. 303
Table of Contents provided by Ingram. All Rights Reserved.

ISBN: 9780470597170
ISBN-10: 0470597178
Audience: General
Format: Paperback
Language: English
Number Of Pages: 305
Published: 22nd February 2011
Publisher: John Wiley and Sons Ltd
Country of Publication: US
Dimensions (cm): 23.11 x 15.49  x 2.03
Weight (kg): 0.48