The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2009 vol.11)
pp: 52-55
Keith W. Miller , University of Illinois at Springfield
Jeffrey Voas , Science Applications International Corporation
ABSTRACT
This article focuses on the "trust" portion of the trust and dependability duet. Both concepts are important and delicately intertwined, but in this short discussion, the authors say they can only hope to explore one.
INDEX TERMS
IT professional, trust, trustworthiness, trustworthy computing
CITATION
Keith W. Miller, Jeffrey Voas, "The Metaphysics of Software Trust", IT Professional, vol.11, no. 2, pp. 52-55, March/April 2009, doi:10.1109/MITP.2009.41
REFERENCES
1. R. Turn, "Trusted Computer Systems: Needs and Incentives for Use in Government and Private Sector," tech. report AD#A103399 (R-28811-DR&E) RAND Corp., June 1981.
2. D. Latham, "Trusted Computer System Evaluation Criteria," tech. report 5200.28-STD, US Dept. Defense, 1983.
3. D. Pamas et al., "Evaluation of Safety-Critical Software," Comm. ACM, vol. 33, no. 6, 1990, pp. 636–648.
4. C. Kaner and S.J. Swenson, "Good Enough V&V for Simulations: Some Possibly Helpful Thoughts from the Law and Ethics of Commercial Software," Proc. Simulation Interoperability Workshop, 2008; www.kaner.com/pdfsSIW2008KanerSwenson.pdf
5. T.L. Friedman, The World Is Flat, Farrar, Straus, and Giroux, 2006.
6. M. Turner, D. Budgen, and P. Brereton, "Turning Software into a Service," Computer, vol. 36, no. 10, 2003, pp. 38–44.
7. K.W. Miller and J. Voas, "Information Integrity and IT Professionals' Integrity, Intertwined," IT Professional, vol. 10, no. 6, 2008, pp. 31–35.
8. K.W. Miller, "Software Informed Consent: Docete Emptorem, not Caveat Emptor," Science and Eng. Ethics, vol. 4, no. 3, 1998, pp. 357–362.
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool