• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Who is responsible when software 'bugs' result in disaster?

Extracts from this document...

Introduction

Who is responsible when software 'bugs' result in disaster? Criterion A: Describing the issue A software bug is actually a mild word for defect, it is safe to say that almost every piece of software will have various defects in it and that everyone is affected by the bugs. The only reason why software companies get away with providing faulty software is because we, the consumer allow them to get away with it. The consequences of these bugs range from dire to mild and can be found in anything containing a form of software from expert systems to wristwatches. One such example is a simple attempt to produce and print out a document using Microsoft Word, Microsoft being a company renowned for software bugs. When typing up the document, the system may crash, its not possible to click in certain places, certain objects may break or the link may break to mention a few. Then when the document is sent to be printed, the printer may not acknowledge that it has been sent, the program may not be compatible with the printer, it may come out differently to how it appeared on the page, paper may run out and software wont support the pause and there are many more. ...read more.

Middle

There are few laws protecting us from software bugs and few standards groups, all we the consumers can do is return the product and demand better. Despite many efforts from various companies set up to deal with and identify bugs and faulty software, there has not been much improvement software bugs are as common as colds. The likely reason why these bugs are so common that they do not test the software appropriately. Because they know that they can get away with it and that most people are more interested in features than stability. It is not too much to ask for both, but until we the consumers do something about it nothing will happen. In the past, computer 'bugs' have resulted in dire consequences because the only computers being used where expert systems, due to the fact that they were so expensive, un-versatile and large, few people owned them. So obviously, if they were only used for large projects and things went wrong, the consequences were dire. This has been minimized and software companies should follow the same example with their common software. Criterion C: Analysing the impact of the issue Software bugs have not only commonly annoyed but ruined and ended the lives of millions. ...read more.

Conclusion

Another solution would be to have a standards group, like there is with many electronics and cars. The software will have to pass certain strict regulations and requirements and if they don't; they go back to the manufacturer to be repaired. This is another effective solution but the problem being seeking funds and implementing this standards group. Primarily, the radical "revolution" idea could be adopted, through protests, advertising and spreading the word because it is true that people don't really know that they can get better quality merchandise. But if this had little or no effect, then the standards group would be implemented, a tax could be required which the companies paid to have their own products tested or they could be sent the bill directly for each testing. Either solution is effective, but the 'revolution' idea would probably be cheaper and more easily implemented. Criterion E: Selecting and using sources - Mark Minasi: "The software conspiracy" 10/6/02 http://www.softwareconspiracy.com, (12/3/02) - Neil Gross, Marcia Stepanek, John Carey and Otis Port: "Software hell (int'l edition) 6/12/99 http://www.businessweek.com/1999/99_49/b6358015.html (5/2/02) - Mark Kuharich: "WHAT, ME WORRK2K?" http://www.softwareview.com/thesof37.htm (5/2/02) - Robert Lemos: "Group to set bug reporting standards" 22/2/02 http://news.zdnet.co.uk/story/0,,t269-s2104841,00.html (12/3/02) - Staff: "Software bugs leave Microsoft legally vulnerable" 1/7/02 http://macobserver.com/article/2002/07/01.8.shtml 4/10/02 [M1]Better in Crit B? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Marked by a teacher

    STELLA Science Simulation Software.

    Further, for small angles (less than 15°) the magnitude of perpendicular component is proportional to the displacement of the bob. Thus, small-displacement pendulum motion is an example of simple harmonic motion. The time for one complete cycle, a left swing and a right swing, is called the period.

  2. Analysis of market, environmental forces, competitors, marketing mix and consumer implementation.

    sales purely on the fact that new game releases will be launched compatible only with the PSX 2. As with Nintendo, Sony has no shortage of company's developing software titles for the PSX 2, by September 1999, some 90 companies had been signed up to develop games.

  1. Designing a booking system for an Estate Agent.

    will be addressed as the new system will able to do tasks such as booking a client by date and time stating which negotiator is responsible for them. The system will prevent double bookings because relationships between tables can be set up and linked through their primary keys.

  2. ICT coursework: Designing and implementing a book rental system

    Operating systems basically keep the smooth running of your computer and it also controls basic inputs and outputs like the movement of the mouse. Running many tasks at the same requires the processing power to split up and powering each task.

  1. ICT Security Report

    Rogue WLAN's - Whether the user has an officially sanctioned wireless network or not, wireless routers are relatively inexpensive, and ambitious users may plug unauthorized equipment into the network. These rogue wireless networks may be insecure or improperly secured and pose a risk to the network at large.

  2. hardware and software

    Access for producing a database that could suit these types of records as they require a report and a relationship between the cars and their service history. Actually there is one bad point using Microsoft Access which's if a mistake has been made then it would take some time to

  1. Part A of this report will aim to firstly define the Capability Maturity Model ...

    The Capability Maturity Model recognizes that there are tools and processes that, while not directly involved in the production of code, aid in the overall Software Quality Management process. (1) The CMM is now popular and has been effective in emphasizing the importance of process improvement.

  2. A relative of mine works for a corporate firm on CRM (Customer Relationship Management) ...

    The system provided fast data synchronization that gave agent's access to contacts and customer data without being limited to the Internet. Here Sorrells learned that the management must first decide on the results it wants from a CRM system before settling on one (S&MM, 2002).

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work