Abstract
What does it mean for a profession to be considered mature? How valid is the claim that software faults may be excused due to the immaturity of the field? In giving that claim serious consideration, one might assume that there are stages to maturity, that maturity doesn't arrive in the world fully formed. If so, an understanding of maturity may be found from the viewing of the differences across various professions in terms of stages of maturity, perhaps signaled by how a profession detects and handles faults. The question thus becomes more refined, "Are software professionals more or less mature than their counterparts in respective fields in regards to the detection and handling of faults?" Which raises the previously begged but now follow-up question: "To whom should software professionals be compared?" The down-select for professions to choose for this comparison was straightforward. First, to disregard a comparison with the physical sciences as one could make a strong case that programming is nothing more than data and rules. Ones and zeros may represent any object, on, off, true, not true, apples, oranges, aelopiles and zeppelins, and that rules on objects are infinitely mutable, literally valid now and invalid one-half a tenth of a millisecond later. Software is distinctively arbitrary where the physical sciences are not (well, except perhaps for the quantum and the astro).
In joining software with the soft sciences, the likeliest candidates for comparison were identified as the fields of economics and law. Economics at first glance appears to be a combination of mathematics and logic applied to finance, and law appears to be a combination of philosophy and logic applied to rules of conduct. There also appears a commonality with these particular soft sciences and software in the attributes of design. Professionals in the field of economics design models of the world in terms of money. Professionals in the field of law design models of the world in terms of behavioral control, and software professionals design models for any purpose in any terms that one may choose to take. Software may be used to model both economics and law, so why not compare software professionals to their counterparts in economics and law.
On further investigation in development of this text, the rationale for this investigation hurt the premise, for if one considered that software is applied logic, then software has no reason to be considered an immature field. Logic and philosophy go back at least to the ancient Greeks, to Aristotle! If software is immature in the light of history, then what would that say about the maturity of logic and philosophy? (Hush, you cynics!) This author began to have severe doubts, that perhaps this whole line of investigation was naively misguided. Further investigation yielded additional insights, that although maturity may be an interesting topic in its own right, perhaps it wasn't key to understanding software faults, that perhaps instead, it was the art of design, design being a common feature across software, economics and law. With this new direction in mind, and then taking one step back for perspective, perhaps the common feature across the professions could be the design of design? And so this author meandered on, down paths less traveled and more shadowed (note the subtitle), observing and describing all of interest, and taking off yet again in directions oblique, the instinct of authorial self-restraint placed in competition with curiosity, all tugged and pulled and fretted at this author. The conflict of design choice reflected in an investigation of design choice! Oh, how self-similar! Deja vu all over again! The themes of this paper that continued beyond the initial investigation of maturity are as follows:
A study of games versus competition in design.
The limits of competition and the implications of these limits.
A revisit of standing philosophical problems in computer science, in particular: Chess, Searle's Chinese Room and the Turing Test, studied as competitions.
An exploration of the meta in design.
Conclusions, which were in the first draft imagined to be most unlikely given the initial premise but in revision became necessary and unavoidable.
- Scott Adams, "Dilbert", August 5, 2005 http://www.dilbert.com/strips/comic/2005-08-05/ ("so fast it will make your head spin.").Google Scholar
- Scott Adams, "Dilbert", March 30, 2008 www.dilbert.com/strips/comic/2008-03-30/ ("It is what it is." Also see {130}).Google Scholar
- Scott Adams, "Dilbert", July 27, 2008 http://www.dilbert.com/strips/comic/2008-07-27/ ("My choices are failure or insubordination.").Google Scholar
- Scott Adams, "Dilbert", Aug 23, 2008 http://www.dilbert.com/strips/comic/2008-08-23/ ("I believe you call it your 'business plan'.")Google Scholar
- Scott Adams, "Dilbert", Oct. 25, 2008 http://www.dilbert.com/strips/comic/2008-10-25/ ("my business plan").Google Scholar
- Sherry R. Arnstein, "A Ladder of Citizen Participation," JAIP, Vol. 35, No. 4, July 1969, pp. 216--224, http://lithgow-schmidt.dk/sherry-arnstein/ladder-of-citizen-participation.htmlGoogle Scholar
- J. B. A. Bailey, "'Over by Christmas': Campaigning, Delusions and Force Requirements", The Institute of Land Warfare, No. 51W, Sept. 2005 http://www.ausa.org/pdfdocs/LWP_51WBailey.pdfGoogle Scholar
- David Baltimore, "On Doing Science in the Modern World", The Tanner Lectures on Human Values, Delivered at Clare Hall, Cambridge University, March 9, 1992 http://www.tannerlectures.utah.edu/lectures/documents/Baltimore93.pdf (The bigger picture perspective from a Nobel Prize winner. "{S}cientists are often the worst judges of moral issues because they are too ready to believe in their own rationality and generally out of touch with the thinking of the community." {8}).Google Scholar
- John D. Barrow, Pi in the Sky, Oxford, 1992.Google Scholar
- Min Basadur, Conklin, Jeff, VanPatter, GK, "Rethinking Wicked Problems ("Part 2"), NextD Journal, Issue 10, Conversation 10.3, 2007 http://www.nextd.org/02/10/3/index.html (Not as good as part 1, B-school noise overwhelms the signal at about halfway in.).Google Scholar
- Peter Bebergal, "Q&A: Robert Arp and Mark D. White: What Batman Teaches Us About Philosophy", Boston Sunday Globe, July 13, 2008 p C2. http://www.boston.com/bostonglobe/ideas/articles/2008/07/13/a_talk_with_robert_arp_and_mark_d_white/Google Scholar
- Victor A. Beker, "Is Economics a Science?: A discussion of some methodological issues", July 2005 http://papers.ssrn.com/sol3/papers.cfm?abstract_id=839307Google Scholar
- Drake Bennett, "The Culture of Corruption", The Boston Sunday Globe", July 27, 2008 p. K1 http://www.boston.com/bostonglobe/ideas/articles/2008/07/27/the_culture_of_corruption/Google Scholar
- Blumenthal, David R., "The Banality of Good and Evil: Antisocial Behavior, Prosocial Behavior, and Jewish Religious Teaching," Good and Evil After Auschwitz: Ethical Implications for Today, ed. J. Bemporad., et al, 2000, pp. 285--299 http://www.js.emory.edu/BLUMENTHAL/Banality1.htmlGoogle Scholar
- Peter J. Boyer, "Reporter at Large: The Bribe", The New Yorker, May 19, 2008 http://www.newyorker.com/reporting/2008/05/19/080519fa_fact_boyer/Google Scholar
- T. Coraghessan Boyle, "Top of the Food Chain", Harper's Magazine, April 1993, pp 72--74 http://harpers.org/archive/1993/04/0001237 http://www.hwscience.com/APES/units/2006%20web%20stuff/Ecological%20Concepts/TOP%20OF%20THE%20FOOD%20CHAIN.pdf (See {54})Google Scholar
- Robert Caro, The Power Broker: Robert Moses and the Fall of New York, Knopf, 1974.Google Scholar
- Achin Chakraborty "The Irrelevance of methodology and the Art of the Possible: Reading Sen and Hirschman", Centre for Development Studies, Trivendrum, India, Centre for Development Studies, Trivendrum Working Papers. http://www.cds.edu/download_files/wp286.pdfGoogle Scholar
- Robert N. Charette, "Are We Developers Liars or Just Fools?", IEEE Software, Vol. 12, No. 4, Jul 1995 July 1995, pp: 90--92 http://ieeexplore.ieee.org/Xplore/login.jsp?url=/iel1/52/8878/00391841.pdf?arnumber=391841 (Charette gets his answer: Yes. Both. {41}). Google ScholarDigital Library
- Robert N. Charette, "The Risks with Risk Identification", Undated http://www.itmpi.org/assets/base/images/itmpi/privaterooms/robertcharette/RISK_ID.pdfGoogle Scholar
- David D. Clark, Sollins, Karen, Wroclawski, John, Faber, Ted, "Addressing Reality: An Architectural Response to Real-World Demands on the Evolving Internet", ACM SIGCOMM 2003 Workshops, August 25&27, 2003, Karlsruhe, Germany http://www.isi.edu/newarch/DOCUMENTS/Principles.FDNA03.pdf Google ScholarDigital Library
- I. Glenn Cohen, "Note: The Price of Everything, The Value of Nothing: Reframing the Commodification Debate", Harvard Law Review, Vol. 117, No. 689, 2003 http://papers.ssrn.com/sol3/papers.cfm?abstract_id=479321 (This paper is representative of the type.)Google Scholar
- David Cole, "The Chinese Room Argument", in Zalta, Edward N., The Stanford Encyclopedia of Philosophy, Fall 2004 http://plato.stanford.edu/archives/fall2004/entries/chinese-room/ (See {121})Google Scholar
- E. Jeffry Conklin, Weil, William, "Wicked Problems: Naming the Pain in Organization", 3M Meeting Network, October 14, 1998 http://www.leanconstruction.org/pdf/wicked.pdfGoogle Scholar
- Jeff Conklin, Basadur, Min, VanPatter, GK, "Rethinking Wicked Problems", NextD Journal, Issue 10, Conversation 10.1, 2007, quoting from Klaus Krippendorf, The Semantic Turn, A New Foundation for Design, CRC Press, 2006 http://www.nextd.org/02/10/1/index.htmlGoogle Scholar
- Michael Crichton, "This Essay Breaks the Law", New York Times, Mar. 19, 2006 http://www.nytimes.com/2006/03/19/opinion/19crichton.htmlGoogle Scholar
- Bill Curtis, Herb Krasner, Vincent Shen, Neil Iscoe, "On Building Software Process Models Under the Lamppost", Proceedings of the 9th International conference on Software Engineering, Monterey, California, 1987 pp. 96--103. Google ScholarDigital Library
- Robert Darnton, "The Library in the New Age", The New York Review of Books, Volume 55, Number 10 -- June 12, 2008 http://www.nybooks.com/articles/21514Google Scholar
- Fiona Darroch, "ACM Fellow Profile -- Bob Glass", ACM SIGSOFT Software Engineering Notes, Vol. 31, No. 4, July 2006. Google ScholarDigital Library
- Peter J. Denning, "Is Computer Science Science?", Communications of the ACM, Vo. 48, No. 4. April 2005, pp. 27--31 (See {122}) Google ScholarDigital Library
- Bradley Dowden, "Fallacies", The Internet Encyclopedia of Philosophy, 2008 http://www.iep.utm.edu/f/fallacy.htmGoogle Scholar
- Nicholas Dujmovic, "Oral History: Reflections of DCIs Colby and Helms on the CIA's 'Time of Troubles'", Studies in Intelligence, Vol. 51, No. 3, 2007 http://www.foia.cia.gov/helms/pdf/reflections.pdf (The ultimate insiders view of security.)Google Scholar
- Richard P. Feynman, "Cargo Cult Science: Some remarks on science, pseudoscience, and learning how not to fool yourself", The 1974 Caltech Commencement Address, Engineering and Science, Volume 37, Number 7, June 1974 http://calteches.library.caltech.edu/51/02/CargoCult.pdfGoogle Scholar
- Anthony Finkelstein, "A Software Process Immaturity Model", ACM SIGSOFT Software Engineering Notes, Vol. 17, No. 4, Oct. 1992, pp. 22--23 http://portal.acm.org/citation.cfm?coll=GUIDE&dl=GUIDE&id=141878 Google ScholarDigital Library
- T.A. Frank, "Confessions of a Sweatshop Inspector", Washington Monthly, April 2008 http://www.washingtonmonthly.com/features/2008/0804.frank.htmlGoogle Scholar
- Thomas Frank, "Fliers without ID placed on TSA list", USA Today, Aug. 12, 2008 http://www.usatoday.com/tech/news/surveillance/2008-08-12-tsa_N.htmGoogle Scholar
- John Kenneth Galbraith, The Economics of Innocent Fraud, Houghton Mifflin, 2004.Google Scholar
- Garet Garrett, Ouroboros or The Mechanical Extension of Mankind, E.F. Hutton, 1926 ("The machine does not abolish the curse of toil..it does create a preferred task.") http://mises.org/books/ouroboros.pdfGoogle Scholar
- Jennifer L. Geddes, "An Interview with Margaret Jane Radin", The Hedgehog Review, Summer 2003 http://www.virginia.edu/iasc/HHR_Archives/Commodification/5.2IRadin.pdfGoogle Scholar
- Edward Gibbon, Decline and Fall of the Roman Empire, Tess Press, 2005.Google Scholar
- Robert L. Glass, Rost, Johann, Matook, Matthias, "Lying on Software Projects -- A Survey", Preprint to be published in IEEE Software, Vol. 26, No. 6, Nov. 2008 Google ScholarDigital Library
- Steven D. Gribble, "Robustness in Complex Systems", Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, 2001. May 2001, pp: 21--26 http://citeseer.ist.psu.edu/gribble01robustness.html Google ScholarDigital Library
- David Halberstam, The Best and the Brightest, Ballantine Books, 1993.Google Scholar
- Daniel Halperin, Heydt-Benjamin, T. S., Ransford, B., Clark, S. S., Defend, B., Morgan, W., Fu, K., Kohno, T., and Maisel, W. H., "Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses", Proceedings of the IEEE Symposium on security and Privacy, 2008 http://www.secure-medicine.org/icd-study/icd-study.pdf Google ScholarDigital Library
- T.X. Hammes, "War Isn't a Rational Business", Proceedings of the US Naval Institute, Volume 124, No. 7, July 1998, pp 22--25 smallwarsjournal.com/documents/rationalwar.pdfGoogle Scholar
- Blaine Harden, "S. Korean Tourist Is Shot Dead In North", Washington Post Foreign Service, July 12, 2008; Page A09 http://www.washingtonpost.com/wp-dyn/content/article/2008/07/11/AR2008071100314.htmlGoogle Scholar
- Garrett Hardin, "The Tragedy of the Commons", Science, December 13, 1968 http://www.garretthardinsociety.org/articles/art_tragedy_of_the_commons.htmlGoogle Scholar
- Garrett Hardin, "Rewards of Pejoristic Thinking", in Managing the Commons, by Garrett Hardin and John Baden (Editors), W. H. Freeman, 1977 http://www.garretthardinsociety.org/articles/art_rewards_perjoristic_thinking.htmlGoogle Scholar
- Garrett Hardin, "The Cybernetics of Competition", Perspectives in Biology and Medicine, 7:58--84, 1963, Reprinted as Chapter 21. in Stalking the Wild Taboo, Kaufmann, 1978.Google ScholarCross Ref
- Friedrich August von Hayek, "The Pretence of Knowledge", Nobel Prize Lecture, December 11, 1974 http://nobelprize.org/nobel_prizes/economics/laureates/1974/hayek-lecture.htmlGoogle Scholar
- Albert O. Hirschman, "Two Hundred Years of Reactionary Rhetoric", the Tanner Lectures on Human Values, University of Michigan, April 8, 1988 http://www.tannerlectures.utah.edu/lectures/documents/hirschman89.pdfGoogle Scholar
- Albert O. Hirschman, "Against Parsimony: Three Easy Ways of Complicating Some Categories of Economic Discourse", Bulletin of the American Academy of Arts and Sciences, Vol. 37, No. 8, May, 1984, pp. 11--28 www.regulationbodyofknowledge.org/documents/027.pdf (Interesting website in a creepy sort of way.)Google ScholarCross Ref
- Leah Hoffman, "In Search of Dependable Design", CACM, Vol. 51, No. 7, July 2008, pp 14--16 (Daniel Jackson appears to be walking in his father's footsteps in this article. See {56}) Google ScholarDigital Library
- C.S. Holling, Goldbert, M. A., "Ecology and Planning", Journal of the American Institute of Planners, Volume XXXVII, Number 4, July 1971, pp 221--230 http://www.csun.edu/~vasishth/Holling+Ecology_and_Planning.pdf (See {15})Google ScholarCross Ref
- Keith N. Hylton, Khanna, Vikramaditya S., "Political Economy of Criminal Procedure", Boston University School of Law, Working Paper Series, Law and Economics Working Paper No. 08-06 http://ssrn.com/abstract ID=1121441 (This paper is representative of the type. Note the "existence theorem" issues.)Google Scholar
- Michael C. Jackson, "The Youthful Immaturity of Software Engineering", Proceedings of Convencio Informatica Llatina, Boixareu Editores 1985, pp. 47--51; http://mcs.open.ac.uk/mj665/CIL1985.pdfGoogle Scholar
- Tony Judt, Postwar: A History of Europe Since 1945, Penguin, 2005.Google Scholar
- Paul Kennedy, "The Rise and Fall of the Great Powers", Vintage, 1989.Google Scholar
- Daniel B. Klein, "A plea to economists who favor liberty: Assist the everyman", Eastern Economic Journal, Spring 2001 http://findarticles.com/p/articles/mi_qa3620/is_200104/ai_n8940844Google Scholar
- Claudia Koonz, The Nazi Conscience, Belknap, 2003Google Scholar
- Jo Anne Lane, Boehm, Barry, "System of Systems Lead System Integrators: Where Do They Spend Their Time and What Makes Them More or Less Efficient?", Systems Engineering, Vol. 11, No. 1, Feb. 2008, pp. 81--91 http://www3.interscience.wiley.com/journal/116840094/abstract Google ScholarDigital Library
- Timothy B. Lee, "Circumventing Competition: The Perverse Consequences of the Digital Millennium Copyright Act", Cato Institute, Policy analysis No. 564, March 21, 2006 http://www.cato.org/pub_display.php?pub_id=6025Google Scholar
- Michael Levenson, "T hacking exposes a deeper clash", Boston Globe, Aug. 18, 2008, p A1,A6 http://www.boston.com/news/local/massachusetts/articles/2008/08/18/t_hacking_exposes_a_deeper_clash/Google Scholar
- Nancy G. Leveson, "High Pressure Steam Engines and Computer Software", International Conference on software Engineering, Melbourne, Australia, May 1992 http://sunnyday.mit.edu/steam.pdf Google ScholarDigital Library
- J. R. Lucas, "Minds, Machines and Gödel", Philosophy, XXXVI, 1961, pp. 112--127; Reprinted in The Modeling of Mind, Kenneth M.Sayre and Frederick J.Crosson, eds., Notre Dame Press, 1963, pp.269--270 http://users.ox.ac.uk/~jrlucas/mmg.htmlGoogle ScholarCross Ref
- Deirdre N. McCloskey, "Cassandra's open letter to her economist colleagues", Eastern Economic Journal, Summer 1999 http://findarticles.com/p/articles/mi_qa3620/is_199907/ai_n8842882Google Scholar
- Deirdre N. McCloskey, "Why Economics is on the Wrong Track", 2006/2007 http://deirdremccloskey.org/pubs/drafts/why.phpGoogle Scholar
- Erin McKean, "Chillax: If it works like a word, just use it.", The Boston Globe, Aug. 28, 2008 www.boston.com/bostonglobe/ideas/articles/2008/08/03/chillax/Google Scholar
- Donella H. Meadows, "Places to Intervene in a System", Whole Earth Review, winter 1997 http://www.wholeearthmag.com/ArticleBin/109.htmlGoogle Scholar
- John W. Meyer, Rowan, Brian, "Institutionalized Organizations: Formal Structure as Myth and Ceremony", The American Journal of Sociology, Vol. 83, No. 2, Sep. 1977, pp. 340--363 http://links.jstor.org/sici?sici=0002-9602 (197709)83%3A2%3C340%3AIOFSAM%3E2.0.CO%3B2-3Google ScholarCross Ref
- Mezmer, "Mezmer's Logical Defect Checklist, Undated http://flowstate.homestead.com/logical.htmlGoogle Scholar
- Jeremy Miller, "Tyranny of the test", Harper's Magazine, Sept. 2008 harpers.org/archive/2008/09Google Scholar
- Jeffrey C. Mogul, "Emergent (Mis)behavior vs. Complex Software Systems", ACM SIGOPS Operating Systems Review, Vol. 40, No. 4, Oct. 2006, Proceedings of the 2006 EuroSys conference, pp. 293--304 http://www.cs.kuleuven.be/conference/EuroSys2006/papers/p293-mogul.pdf Google ScholarDigital Library
- Anna Mundow, "A warning about 'false science'", The Boston Sunday Globe, July 27, 2006 p. K12 http://www.boston.com/ae/books/articles/2008/07/27/a_warning_about_false_science/Google Scholar
- C. Northcote Parkinson, Parkinson's Laws, Buccaneer Books, 1957.Google Scholar
- David Parnas, Software Aspects of Strategic Defense Systems, ACM SIGSOFT Software Engineering Notes, Vol 73. No 5., October 1985 http://portal.acm.org/citation.cfm?id=214961 Google ScholarDigital Library
- David Lorge Parnas, "Stop the Numbers Game", Communications Of The ACM, Vol. 50, No. 11, Nov. 2007, pp. 19--21 http://portal.acm.org/citation.cfm?id=1297797.1297815 (Where light may be a competition those who only see a game will curse the darkness.) Google ScholarDigital Library
- Mark Peplow, "Science secret of grand masters revealed", Nature, online edition, Aug. 6, 2004 http://www.nature.com/news/2004/040802/full/040802-19.html http://www.freerepublic.com/focus/f-chat/1187541/postsGoogle Scholar
- David Pescovitz, "Sons and Daughters of HAL Go on Line", New York Times, March 18, 1999 http://query.nytimes.com/gst/ fullpage.html?res=9B04E3DD1631F93BA25750C0A96F958260&sec=&spon=&pagewanted=3 http://loebner.net/Prizef/loebner-prize.htmlGoogle Scholar
- Charles P. Pierce, "Rules What Rules?", The Boston Sunday Globe Magazine, December 30, 2007 pp. 31--32 http://www.boston.com/bostonglobe/magazine/articles/2007/12/30/rules_what_rules/Google Scholar
- Bill Pollak, Ed., "Ultra-Large-Scale systems: The Software Challenge of the Future", Software Engineering Institute, Carnegie Mellon, June 2006 http://www.sei.cmu.edu/uls/report.html (Parnas may be referenced in {80}, but not the essay most relevant, for this see {75}. Also see {8} and {106}.)Google Scholar
- Vassilis Prevekalis, "The Athens Affair", IEEE Spectrum, Vol. 44, No. 7, July 2007. Google ScholarDigital Library
- Munir Quddus, "The overuse of mathematics in economics: Nobel resistance", Eastern Economic Journal, Summer 1994 http://findarticles.com/p/articles/mi_qa3620/is_199407/ai_n8727805Google Scholar
- Rick Rashid, "Image Crisis: Inspiring a New Generation of Computer Scientists", CACM, Vol. 51, No. 7, July 2008, pp 33--34 (A Microsoft VP previously employed by the organization that crafted {81}) Google ScholarDigital Library
- Chanpory Rith, Dubberly, Hugh, "Why Horst W.J. Rittel Matters", Design Issues, Vol. 22, No. 4, Autumn 2006 http://www.dubberly.com/wp-content/uploads/2008/06/ddo_article_rittel.pdfGoogle Scholar
- Horst Rittel, "Some Principles for the Design of an Educational System for Design", Journal of Archtectural Education (1947-1974), Vol. 25, No 1/2, Research as an Aspect of Architectural Education, (Winter- Spring, 1971) pp.16--27, Blackwell, Originally, Education for Architectural Technology. Ed. Passonneau, J. St. Louis: Washington University and the AIA Educational Research Projects, 1966. pp. 103--151 http://www.jstor.org/stable/1423929Google Scholar
- Horst Rittel, "On the Planning Crisis: Systems Analysis of the 'First and Second Generations'." Bedrifts Økonomen. 8 (1972): 390--396. http://www.csun.edu/~vasishth/Rittel-Planning_Crisis.pdf (The second generation appears to have been strangled in its crib.)Google Scholar
- Horst Rittel, and M. Webber, "Dilemmas in a General Theory of Planning", pp 155--169, Policy Sciences, Vol. 4. 1973, Elsevier http://www.uctc.net/mwebber/Rittel+Webber+Dilemmas+General_Theory_of_Planning.pdf (The source of wickedness).Google Scholar
- Nancy Roberts, "Coping with Wicked Problems" Third Bi-Annual Research conference of the International Public Management Network, Sydney, Australia, March 4-6, 2000 http://www.inpuma.net/research/papers/sydney/nancyroberts.htmlGoogle Scholar
- Dexter Roberts, Bernstein, Aaron, "Inside a Chinese Sweatshop: A Life of Fines and Beating", business week, Oct. 2, 2000 http://www.businessweek.com/2000/00_40/b3701119.htm (The U.S. isn't immune to its own Potemkin villages {92} {108}).Google Scholar
- Fred Rodell, Woe Unto You Lawyers!, New York, Pageant Press, Inc, 2d ed. 1957 http://www.constitution.org/lrev/rodell/woe_unto_you_lawyers.htmGoogle Scholar
- Jonathan Rowe, "Our Phony Economy", Harper's Magazine, June 2008, pp 17--18 http://harpers.org/archive/2008/06/0082042Google Scholar
- Edward W. Said, "Intellectual Exile: Expatriates and Marginals", Grand Street, Issue 47, Fall 1993 http://www.grandstreet.com/gsissues/gs47/gs47a.htmlGoogle Scholar
- J.H. Saltzer, Reed, D.P., Clark, D.D., "End-to-end Arguments in System Design", ACM Transactions on Computer Systems (TOCS), Vol. 2, No. 4, November 1984, pp. 277--288 http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf Google ScholarDigital Library
- Michael J. Sandel, "What Money Can't Buy: The Moral Limits of Markets", The Tanner Lectures on Human Values, Brasenose College, Oxford, May 11, 1998 http://www.tannerlectures.utah.edu/lectures/documents/sandel00.pdfGoogle Scholar
- Robert Schaefer, "Deeper Questions: The Meta-problem of Large Organizations Developing Complex Systems and the Limits of Process", ACM SIGSOFT Software Engineering Notes, July 2005, Volume 30, Number 4. Google ScholarDigital Library
- Robert Schaefer, "A Critical Programmer Searches for Professionalism", ACM SIGSOFT Software Engineering Notes, Volume 31, Number 4, 2006. Google ScholarDigital Library
- Robert Schaefer, "The Grand Theory of Everything: What Man-Made Systems Are, and Why They Fail", ACM SIGSOFT Software Engineering Notes, Volume 32, Number 4, July 2007. Google ScholarDigital Library
- Robert Schaefer, "A Systems Analysis of Systems Integration", ACM SIGSOFT Software Engineering Notes, Volume 33, Number 1, Jan. 2008 Google ScholarDigital Library
- Robert Schaefer, "Debugging Debugged, a Metaphysical Manifesto of Systems Integration", ACM SIGSOFT Software Engineering Notes, Volume 33, Number 3, May 2008. Google ScholarDigital Library
- Bruce Schneier, "I've Seen the Future, and It Has a Kill Switch", Wired, June 26, 2006 http://www.wired.com/politics/security/commentary/securitymatters/2008/06/securitymatters_0626 (For a fatal kill switch, see {44}.)Google Scholar
- Bruce Schneier, "Inside the Twisted Mind of the Security Professional", Wired, March 20, 08 http://www.wired.com/politics/security/commentary/securitymatters/2008/03/securitymatters_0320 (To teach security is to teach the dark arts. See {44}.)Google Scholar
- Bruce Schneier, Ranum, Marcus, "Face-Off: Is vulnerability research ethical?", Information Security, May 2008 http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1313268,00.html# (Outsiders discuss security. For insiders, see {32}).Google Scholar
- Bruce Schneier, "Opinion: The TSA's useless photo ID rules", Los Angeles Times, August 28, 2008 http://www.latimes.com/news/opinion/la-oe-schneier28-2008aug28,0,3099808.storyGoogle Scholar
- Tom Schorsch, "The Capability Im-Maturity Model (CIMM)", CrossTalk, The Journal of Defense Software Engineering, November 1996 www.stsc.hill.af.mil/crosstalk/1996/11/xt96d11h.aspGoogle Scholar
- Scott, James C., Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed, Yale University Press, 1999 (Systems delusions of megalomaniacs.)Google Scholar
- Gene Sharp, "Disregarded History", Fellowship, March 1976 www.fragmentsweb.org/fourtx/dishist.pdfGoogle Scholar
- Monique Doyle Spencer, "America's faux government", The Boston Globe, May 25, 2008, p D9 http://www.boston.com/bostonglobe/editorial_opinion/oped/articles/2008/05/25/americas_faux_government/Google Scholar
- Staff, "From the Hartford Courant", The New York Times, November 11, 1909 http://query.nytimes.com/mem/archive-free/pdf?res=9D03E7D6123EE733A25752C1A9679D946897D6CFGoogle Scholar
- Staff, "Charlemagne: Europe's Marxist dilemma", The Economist, Apr. 26, 2008 http://www.economist.com/world/europe/displaystory.cfm?story_id=11089474Google Scholar
- Staff, "Olympic games: The ghosts of Mexico 1968", The Economist, April 26, 2008 http://www.economist.com/world/international/displaystory.cfm?story_id=11090825Google Scholar
- David Stove, "What is Wrong with Our Thoughts?", The Plato Cult and Other Philosophical Follies, Chapt. 7, Blackwell, 1991 http://web.maths.unsw.edu.au/~jim/wrongthoughts.html (The irony is that if Stove, a philosopher, truly understood logic, he would have recognized the fallacy of the excluded middle and would have been able to answer his own question. Or perhaps, this was his joke on us?)Google Scholar
- Christine Sypnowich, "Law and Ideology", Stanford Encyclopedia of Philosphy, (Winter 2001), edited by Edward N. Zalta., Oct. 22, 2001 http://plato.stanford.edu/entries/law-ideology/ (Representative of its type).Google Scholar
- Barbara W. Tuchman, The March of Folly: From Troy to Vietnam, Ballantine Books, 1985.Google Scholar
- Louis Uchitelle, "Robert Heilbroner: An Economic Pioneer Decries the Modern Field's Narrow Focus", New York Times, January 23, 1999.Google Scholar
- Unknown, "25 Tactics for Truth Suppression", Alaska Free Press, Undated http://www.alaskafreepress.com/msgboard/disinfo/index.htmlGoogle Scholar
- G. K. VanPatter, "Double Consciousness: Back to the Future with John Chris Jones", NextD Journal, Issue 9, Conversation 9.2, 2006 www.nextd.org/02/09/02/contents.htmGoogle Scholar
- Bruce Weber, "It's Man Over Machine as Chess Champion Beats Computer He Calls Tough Opponent", The New York Times, Feb. 18, 1996 http://query.nytimes.com/gst/fullpage.html? res=9507E3DB1339F93BA25751C0A960958260&n=Top%2FReference%2FTimes%20Topics%2FPeople%2FK%2FKasparov%2C%20GarryGoogle Scholar
- Wikipedia Contributors, "CAPTCHA", Wikipedia, The Free Encyclopedia, June 14, 2008 http://en.wikipedia.org/wiki/CaptchasGoogle Scholar
- Wikipedia Contributors, "Chatterbot", Wikipedia, The Free Encyclopedia, June 24, 2008 http://en.wikipedia.org/wiki/ChatterbotGoogle Scholar
- Wikipedia Contributors, "Chinese room", Wikipedia, The Free Encyclopedia, June 18, 2008 http://en.wikipedia.org/wiki/Chinese_Room (Also see {23}).Google Scholar
- Wikipedia Contributors, "Peter J. Denning", Wikipedia, The Free Encyclopedia, June 24, 2008 http://en.wikipedia.org/wiki/Peter_J_DenningGoogle Scholar
- Wikipedia Contributors, "Design methods", Wikipedia, The Free Encyclopedia, June 9, 2008 http://en.wikipedia.org/wiki/Design_methods (See also - http://www.softopia.demon.co.uk)Google Scholar
- Wikipedia Contributors, "ELIZA", Wikipedia, The Free Encyclopedia, June 24, 2008 http://en.wikipedia.org/wiki/ELIZAGoogle Scholar
- Wikipedia Contributors, "Kobyayshi Maru", Wikipedia, The Free Encyclopedia, July 15, 2008 http://en.wikipedia.org/wiki/Kobyayshi_MaruGoogle Scholar
- Wikipedia Contributors, "Deirdre McCloskey", Wikipedia, The Free Encyclopedia, May 11, 2008 http://en.wikipedia.org/wiki/Deirdre_McCloskeyGoogle Scholar
- Wikipedia Contributors, "Mechanism Design", Wikipedia, The Free Encyclopedia, July 14, 2008 http://en.wikipedia.org/wiki/Mechanism_design (Mechanism Design looks like social engineering from above by those who think they know best. Isn't this communism? Also see {106}).Google Scholar
- Wikipedia Contributors, "Quasi-rent", Wikipedia, The Free Encyclopedia, Oct. 11, 2007 http://en.wikipedia.org/wiki/Quasi-rentGoogle Scholar
- Wikipedia Contributors, "The Structure of Scientific Revolutions", Wikipedia, The Free Encyclopedia, July 1, 2008 http://en.wikipedia.org/wiki/The_Structure_of_Scientific_RevolutionsGoogle Scholar
- Wikipedia Contributors, "Turing Test", Wikipedia, The Free Encyclopedia, June 30, 2008 http://en.wikipedia.org/wiki/Turing_Test (Also see {2})Google Scholar
- Edmund Wilson, To the Finland Station, NYRB Classics, 2003.Google Scholar
Index Terms
- Software maturity: design as dark art
Recommendations
A justification for software rights
Special print issue of ACM SIGCAS Computers and Society: selection of best papers 2004-2006It has been debated whether unauthorized copying of computer software is morally justified and whether developers or software companies can own software and require users to pay for its use. Four views in favour of unauthorized copying of software can ...
Comments