This Article 
 Bibliographic References 
 Add to: 
The Metaphysics of Software Trust
March/April 2009 (vol. 11 no. 2)
pp. 52-55
Keith W. Miller, University of Illinois at Springfield
Jeffrey Voas, Science Applications International Corporation
This article focuses on the "trust" portion of the trust and dependability duet. Both concepts are important and delicately intertwined, but in this short discussion, the authors say they can only hope to explore one.

1. R. Turn, "Trusted Computer Systems: Needs and Incentives for Use in Government and Private Sector," tech. report AD#A103399 (R-28811-DR&E) RAND Corp., June 1981.
2. D. Latham, "Trusted Computer System Evaluation Criteria," tech. report 5200.28-STD, US Dept. Defense, 1983.
3. D. Pamas et al., "Evaluation of Safety-Critical Software," Comm. ACM, vol. 33, no. 6, 1990, pp. 636–648.
4. C. Kaner and S.J. Swenson, "Good Enough V&V for Simulations: Some Possibly Helpful Thoughts from the Law and Ethics of Commercial Software," Proc. Simulation Interoperability Workshop, 2008;
5. T.L. Friedman, The World Is Flat, Farrar, Straus, and Giroux, 2006.
6. M. Turner, D. Budgen, and P. Brereton, "Turning Software into a Service," Computer, vol. 36, no. 10, 2003, pp. 38–44.
7. K.W. Miller and J. Voas, "Information Integrity and IT Professionals' Integrity, Intertwined," IT Professional, vol. 10, no. 6, 2008, pp. 31–35.
8. K.W. Miller, "Software Informed Consent: Docete Emptorem, not Caveat Emptor," Science and Eng. Ethics, vol. 4, no. 3, 1998, pp. 357–362.

Index Terms:
IT professional, trust, trustworthiness, trustworthy computing
Keith W. Miller, Jeffrey Voas, "The Metaphysics of Software Trust," IT Professional, vol. 11, no. 2, pp. 52-55, March-April 2009, doi:10.1109/MITP.2009.41
Usage of this product signifies your acceptance of the Terms of Use.