메뉴 건너뛰기




Volumn 6, Issue 2, 2004, Pages 93-110

Agents of responsibility in software vulnerability processes

Author keywords

Information security; Professional ethics; Security evaluation; Software development; Software vulnerability; Softwaretesting

Indexed keywords

PHILOSOPHICAL ASPECTS; SECURITY OF DATA; SOFTWARE DESIGN; SOFTWARE ENGINEERING; SOFTWARE TESTING; UBIQUITOUS COMPUTING;

EID: 33947398937     PISSN: 13881957     EISSN: 15728439     Source Type: Journal    
DOI: 10.1007/s10676-004-1266-3     Document Type: Article
Times cited : (16)

References (15)
  • 2
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • December
    • W.A. Arbaugh, W.L. Fithen and J. McHugh. Windows of Vulnerability: A Case Study Analysis. Computer, pp. 52-59, December 2000.
    • (2000) Computer , pp. 52-59
    • Arbaugh, W.A.1    Fithen, W.L.2    McHugh., J.3
  • 4
    • 23044502843 scopus 로고    scopus 로고
    • Method in computer ethics: Towards a multilevel interdisciplinary approach
    • P. Brey. Method in Computer Ethics: Towards a Multilevel Interdisciplinary Approach. Ethics and Information Technology, 2(2): 125-129, 2000.
    • (2000) Ethics and Information Technology , vol.2 , Issue.2 , pp. 125-129
    • Brey, P.1
  • 6
    • 0004743417 scopus 로고    scopus 로고
    • Computer society and ACM approve software engineering code of ethics
    • D. Gotterbarn, K. Miller and S. Rogerson. Computer Society and ACM Approve Software Engineering Code of Ethics. Computer, 32(10): 84-88, 1999.
    • (1999) Computer , vol.32 , Issue.10 , pp. 84-88
    • Gotterbarn, D.1    Miller, K.2    Rogerson, S.3
  • 7
    • 7244228567 scopus 로고    scopus 로고
    • Ethical issues: In whose best interest
    • T. F. Johnson, editor, Greenwood Press, Westport, Connecticut London
    • T.F. Johnson. Ethical Issues: In Whose Best Interest. In T. F. Johnson, editor, Handbook on Ethical Issues in Aging, pp. 17-18, Greenwood Press, Westport, Connecticut London, 1999.
    • (1999) Handbook on Ethical Issues in Aging , pp. 17-18
    • Johnson, T.F.1
  • 8
    • 34250803315 scopus 로고    scopus 로고
    • Software engineering and UCITA
    • C. Kaner. Software Engineering and UCITA. Computer &Information Law, 18(2), 1999.
    • (1999) Computer & Information Law , vol.18 , Issue.2
    • Kaner, C.1
  • 10
    • 85078212189 scopus 로고
    • Computers and moral responsibility: A framework for an ethical analysis
    • C. Gould, editor, Westview Press, Boulder, Colorado
    • J. Ladd. Computers and Moral Responsibility: A Framework for an Ethical Analysis. In C. Gould, editor, The Information Web: Ethical and Social Implications of Computer Networking, pp. 207-227, Westview Press, Boulder, Colorado, 1989.
    • (1989) The Information Web: Ethical and Social Implications of Computer Networking , pp. 207-227
    • Ladd, J.1
  • 12
    • 84981430537 scopus 로고
    • What is computer ethics
    • J. Moor. What is Computer Ethics. Metaphilosophy, 16(4): 266-275, 1985.
    • (1985) Metaphilosophy , vol.16 , Issue.4 , pp. 266-275
    • Moor, J.1
  • 13
    • 0004131498 scopus 로고
    • ACM Press/ Addison-Wesley Publishing Company
    • P.G. Neumann. Computer-Related Risks. ACM Press/ Addison-Wesley Publishing Company, 1995.
    • (1995) Computer-related Risks
    • Neumann, P.G.1
  • 15
    • 0005508420 scopus 로고    scopus 로고
    • Accountability of internet access and service providersstrict liability entering ethics?
    • A. Vedder. Accountability of Internet Access and Service ProvidersStrict Liability Entering Ethics? Ethics and Information Technology, 3(1): 67-74, 2001.
    • (2001) Ethics and Information Technology , vol.3 , Issue.1 , pp. 67-74
    • Vedder, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.