• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Who is responsible when software 'bugs' result in disaster?

Extracts from this document...

Introduction

Who is responsible when software 'bugs' result in disaster? Criterion A: Describing the issue A software bug is actually a mild word for defect, it is safe to say that almost every piece of software will have various defects in it and that everyone is affected by the bugs. The only reason why software companies get away with providing faulty software is because we, the consumer allow them to get away with it. The consequences of these bugs range from dire to mild and can be found in anything containing a form of software from expert systems to wristwatches. One such example is a simple attempt to produce and print out a document using Microsoft Word, Microsoft being a company renowned for software bugs. When typing up the document, the system may crash, its not possible to click in certain places, certain objects may break or the link may break to mention a few. Then when the document is sent to be printed, the printer may not acknowledge that it has been sent, the program may not be compatible with the printer, it may come out differently to how it appeared on the page, paper may run out and software wont support the pause and there are many more. ...read more.

Middle

There are few laws protecting us from software bugs and few standards groups, all we the consumers can do is return the product and demand better. Despite many efforts from various companies set up to deal with and identify bugs and faulty software, there has not been much improvement software bugs are as common as colds. The likely reason why these bugs are so common that they do not test the software appropriately. Because they know that they can get away with it and that most people are more interested in features than stability. It is not too much to ask for both, but until we the consumers do something about it nothing will happen. In the past, computer 'bugs' have resulted in dire consequences because the only computers being used where expert systems, due to the fact that they were so expensive, un-versatile and large, few people owned them. So obviously, if they were only used for large projects and things went wrong, the consequences were dire. This has been minimized and software companies should follow the same example with their common software. Criterion C: Analysing the impact of the issue Software bugs have not only commonly annoyed but ruined and ended the lives of millions. ...read more.

Conclusion

Another solution would be to have a standards group, like there is with many electronics and cars. The software will have to pass certain strict regulations and requirements and if they don't; they go back to the manufacturer to be repaired. This is another effective solution but the problem being seeking funds and implementing this standards group. Primarily, the radical "revolution" idea could be adopted, through protests, advertising and spreading the word because it is true that people don't really know that they can get better quality merchandise. But if this had little or no effect, then the standards group would be implemented, a tax could be required which the companies paid to have their own products tested or they could be sent the bill directly for each testing. Either solution is effective, but the 'revolution' idea would probably be cheaper and more easily implemented. Criterion E: Selecting and using sources - Mark Minasi: "The software conspiracy" 10/6/02 http://www.softwareconspiracy.com, (12/3/02) - Neil Gross, Marcia Stepanek, John Carey and Otis Port: "Software hell (int'l edition) 6/12/99 http://www.businessweek.com/1999/99_49/b6358015.html (5/2/02) - Mark Kuharich: "WHAT, ME WORRK2K?" http://www.softwareview.com/thesof37.htm (5/2/02) - Robert Lemos: "Group to set bug reporting standards" 22/2/02 http://news.zdnet.co.uk/story/0,,t269-s2104841,00.html (12/3/02) - Staff: "Software bugs leave Microsoft legally vulnerable" 1/7/02 http://macobserver.com/article/2002/07/01.8.shtml 4/10/02 [M1]Better in Crit B? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Marked by a teacher

    STELLA Science Simulation Software.

    A simple pendulum consists of an object suspended by a string of length l. The bob swings back and force. The gravitational force, the weight (W), is resolved into two components. The parallel component is along the direction of the spring.

  2. Analysis of market, environmental forces, competitors, marketing mix and consumer implementation.

    sales purely on the fact that new game releases will be launched compatible only with the PSX 2. As with Nintendo, Sony has no shortage of company's developing software titles for the PSX 2, by September 1999, some 90 companies had been signed up to develop games.

  1. ICT coursework: Designing and implementing a book rental system

    Operating systems basically keep the smooth running of your computer and it also controls basic inputs and outputs like the movement of the mouse. Running many tasks at the same requires the processing power to split up and powering each task.

  2. Designing a booking system for an Estate Agent.

    It would also be useful if there is an option to select the negotiators names to book for a particular booking. That would be the key requirements that we are looking for but any extra function/option would be useful to keep the booking more organise and efficient to use.

  1. ICT Security Report

    DoS attacks are a registered computer crime that violates the Internet proper use policy as indicated by the Internet Architecture Board (IAB). They are said to have two general forms: * Force the victim computer(s) to reset or consume its resources such that it can no longer provide its intended service.

  2. hardware and software

    It is better using Access when creating a key that would connect the drivers records with their availability which could make it easier and clearer for the user. Records of cars including their service history: I think that the best way of creating the cars records is by using Microsoft

  1. Part A of this report will aim to firstly define the Capability Maturity Model ...

    CMM model (2) 3. Important of the model in relation to the SQM A lot of attention has been given to improving the process of designing, developing, and delivering software applications. The Software Engineering Institute's CMM Model is designed to help us evaluate the maturity of our Software development processes.

  2. A relative of mine works for a corporate firm on CRM (Customer Relationship Management) ...

    This raises research questions like "Which is the best software vendor to rely on?" and "What are the different issues concerned with failure in different software products?" Following are the problems faced by different corporate executives in the corporate world in implementing CRM and by going through these will give

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work