skip to main content
research-article

Software maturity: design as dark art

Published:31 January 2009Publication History
Skip Abstract Section

Abstract

What does it mean for a profession to be considered mature? How valid is the claim that software faults may be excused due to the immaturity of the field? In giving that claim serious consideration, one might assume that there are stages to maturity, that maturity doesn't arrive in the world fully formed. If so, an understanding of maturity may be found from the viewing of the differences across various professions in terms of stages of maturity, perhaps signaled by how a profession detects and handles faults. The question thus becomes more refined, "Are software professionals more or less mature than their counterparts in respective fields in regards to the detection and handling of faults?" Which raises the previously begged but now follow-up question: "To whom should software professionals be compared?" The down-select for professions to choose for this comparison was straightforward. First, to disregard a comparison with the physical sciences as one could make a strong case that programming is nothing more than data and rules. Ones and zeros may represent any object, on, off, true, not true, apples, oranges, aelopiles and zeppelins, and that rules on objects are infinitely mutable, literally valid now and invalid one-half a tenth of a millisecond later. Software is distinctively arbitrary where the physical sciences are not (well, except perhaps for the quantum and the astro).

In joining software with the soft sciences, the likeliest candidates for comparison were identified as the fields of economics and law. Economics at first glance appears to be a combination of mathematics and logic applied to finance, and law appears to be a combination of philosophy and logic applied to rules of conduct. There also appears a commonality with these particular soft sciences and software in the attributes of design. Professionals in the field of economics design models of the world in terms of money. Professionals in the field of law design models of the world in terms of behavioral control, and software professionals design models for any purpose in any terms that one may choose to take. Software may be used to model both economics and law, so why not compare software professionals to their counterparts in economics and law.

On further investigation in development of this text, the rationale for this investigation hurt the premise, for if one considered that software is applied logic, then software has no reason to be considered an immature field. Logic and philosophy go back at least to the ancient Greeks, to Aristotle! If software is immature in the light of history, then what would that say about the maturity of logic and philosophy? (Hush, you cynics!) This author began to have severe doubts, that perhaps this whole line of investigation was naively misguided. Further investigation yielded additional insights, that although maturity may be an interesting topic in its own right, perhaps it wasn't key to understanding software faults, that perhaps instead, it was the art of design, design being a common feature across software, economics and law. With this new direction in mind, and then taking one step back for perspective, perhaps the common feature across the professions could be the design of design? And so this author meandered on, down paths less traveled and more shadowed (note the subtitle), observing and describing all of interest, and taking off yet again in directions oblique, the instinct of authorial self-restraint placed in competition with curiosity, all tugged and pulled and fretted at this author. The conflict of design choice reflected in an investigation of design choice! Oh, how self-similar! Deja vu all over again! The themes of this paper that continued beyond the initial investigation of maturity are as follows:

  • A study of games versus competition in design.

  • The limits of competition and the implications of these limits.

  • A revisit of standing philosophical problems in computer science, in particular: Chess, Searle's Chinese Room and the Turing Test, studied as competitions.

  • An exploration of the meta in design.

  • Conclusions, which were in the first draft imagined to be most unlikely given the initial premise but in revision became necessary and unavoidable.

.

References

  1. Scott Adams, "Dilbert", August 5, 2005 http://www.dilbert.com/strips/comic/2005-08-05/ ("so fast it will make your head spin.").Google ScholarGoogle Scholar
  2. Scott Adams, "Dilbert", March 30, 2008 www.dilbert.com/strips/comic/2008-03-30/ ("It is what it is." Also see {130}).Google ScholarGoogle Scholar
  3. Scott Adams, "Dilbert", July 27, 2008 http://www.dilbert.com/strips/comic/2008-07-27/ ("My choices are failure or insubordination.").Google ScholarGoogle Scholar
  4. Scott Adams, "Dilbert", Aug 23, 2008 http://www.dilbert.com/strips/comic/2008-08-23/ ("I believe you call it your 'business plan'.")Google ScholarGoogle Scholar
  5. Scott Adams, "Dilbert", Oct. 25, 2008 http://www.dilbert.com/strips/comic/2008-10-25/ ("my business plan").Google ScholarGoogle Scholar
  6. Sherry R. Arnstein, "A Ladder of Citizen Participation," JAIP, Vol. 35, No. 4, July 1969, pp. 216--224, http://lithgow-schmidt.dk/sherry-arnstein/ladder-of-citizen-participation.htmlGoogle ScholarGoogle Scholar
  7. J. B. A. Bailey, "'Over by Christmas': Campaigning, Delusions and Force Requirements", The Institute of Land Warfare, No. 51W, Sept. 2005 http://www.ausa.org/pdfdocs/LWP_51WBailey.pdfGoogle ScholarGoogle Scholar
  8. David Baltimore, "On Doing Science in the Modern World", The Tanner Lectures on Human Values, Delivered at Clare Hall, Cambridge University, March 9, 1992 http://www.tannerlectures.utah.edu/lectures/documents/Baltimore93.pdf (The bigger picture perspective from a Nobel Prize winner. "{S}cientists are often the worst judges of moral issues because they are too ready to believe in their own rationality and generally out of touch with the thinking of the community." {8}).Google ScholarGoogle Scholar
  9. John D. Barrow, Pi in the Sky, Oxford, 1992.Google ScholarGoogle Scholar
  10. Min Basadur, Conklin, Jeff, VanPatter, GK, "Rethinking Wicked Problems ("Part 2"), NextD Journal, Issue 10, Conversation 10.3, 2007 http://www.nextd.org/02/10/3/index.html (Not as good as part 1, B-school noise overwhelms the signal at about halfway in.).Google ScholarGoogle Scholar
  11. Peter Bebergal, "Q&A: Robert Arp and Mark D. White: What Batman Teaches Us About Philosophy", Boston Sunday Globe, July 13, 2008 p C2. http://www.boston.com/bostonglobe/ideas/articles/2008/07/13/a_talk_with_robert_arp_and_mark_d_white/Google ScholarGoogle Scholar
  12. Victor A. Beker, "Is Economics a Science?: A discussion of some methodological issues", July 2005 http://papers.ssrn.com/sol3/papers.cfm?abstract_id=839307Google ScholarGoogle Scholar
  13. Drake Bennett, "The Culture of Corruption", The Boston Sunday Globe", July 27, 2008 p. K1 http://www.boston.com/bostonglobe/ideas/articles/2008/07/27/the_culture_of_corruption/Google ScholarGoogle Scholar
  14. Blumenthal, David R., "The Banality of Good and Evil: Antisocial Behavior, Prosocial Behavior, and Jewish Religious Teaching," Good and Evil After Auschwitz: Ethical Implications for Today, ed. J. Bemporad., et al, 2000, pp. 285--299 http://www.js.emory.edu/BLUMENTHAL/Banality1.htmlGoogle ScholarGoogle Scholar
  15. Peter J. Boyer, "Reporter at Large: The Bribe", The New Yorker, May 19, 2008 http://www.newyorker.com/reporting/2008/05/19/080519fa_fact_boyer/Google ScholarGoogle Scholar
  16. T. Coraghessan Boyle, "Top of the Food Chain", Harper's Magazine, April 1993, pp 72--74 http://harpers.org/archive/1993/04/0001237 http://www.hwscience.com/APES/units/2006%20web%20stuff/Ecological%20Concepts/TOP%20OF%20THE%20FOOD%20CHAIN.pdf (See {54})Google ScholarGoogle Scholar
  17. Robert Caro, The Power Broker: Robert Moses and the Fall of New York, Knopf, 1974.Google ScholarGoogle Scholar
  18. Achin Chakraborty "The Irrelevance of methodology and the Art of the Possible: Reading Sen and Hirschman", Centre for Development Studies, Trivendrum, India, Centre for Development Studies, Trivendrum Working Papers. http://www.cds.edu/download_files/wp286.pdfGoogle ScholarGoogle Scholar
  19. Robert N. Charette, "Are We Developers Liars or Just Fools?", IEEE Software, Vol. 12, No. 4, Jul 1995 July 1995, pp: 90--92 http://ieeexplore.ieee.org/Xplore/login.jsp?url=/iel1/52/8878/00391841.pdf?arnumber=391841 (Charette gets his answer: Yes. Both. {41}). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Robert N. Charette, "The Risks with Risk Identification", Undated http://www.itmpi.org/assets/base/images/itmpi/privaterooms/robertcharette/RISK_ID.pdfGoogle ScholarGoogle Scholar
  21. David D. Clark, Sollins, Karen, Wroclawski, John, Faber, Ted, "Addressing Reality: An Architectural Response to Real-World Demands on the Evolving Internet", ACM SIGCOMM 2003 Workshops, August 25&27, 2003, Karlsruhe, Germany http://www.isi.edu/newarch/DOCUMENTS/Principles.FDNA03.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. I. Glenn Cohen, "Note: The Price of Everything, The Value of Nothing: Reframing the Commodification Debate", Harvard Law Review, Vol. 117, No. 689, 2003 http://papers.ssrn.com/sol3/papers.cfm?abstract_id=479321 (This paper is representative of the type.)Google ScholarGoogle Scholar
  23. David Cole, "The Chinese Room Argument", in Zalta, Edward N., The Stanford Encyclopedia of Philosophy, Fall 2004 http://plato.stanford.edu/archives/fall2004/entries/chinese-room/ (See {121})Google ScholarGoogle Scholar
  24. E. Jeffry Conklin, Weil, William, "Wicked Problems: Naming the Pain in Organization", 3M Meeting Network, October 14, 1998 http://www.leanconstruction.org/pdf/wicked.pdfGoogle ScholarGoogle Scholar
  25. Jeff Conklin, Basadur, Min, VanPatter, GK, "Rethinking Wicked Problems", NextD Journal, Issue 10, Conversation 10.1, 2007, quoting from Klaus Krippendorf, The Semantic Turn, A New Foundation for Design, CRC Press, 2006 http://www.nextd.org/02/10/1/index.htmlGoogle ScholarGoogle Scholar
  26. Michael Crichton, "This Essay Breaks the Law", New York Times, Mar. 19, 2006 http://www.nytimes.com/2006/03/19/opinion/19crichton.htmlGoogle ScholarGoogle Scholar
  27. Bill Curtis, Herb Krasner, Vincent Shen, Neil Iscoe, "On Building Software Process Models Under the Lamppost", Proceedings of the 9th International conference on Software Engineering, Monterey, California, 1987 pp. 96--103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Robert Darnton, "The Library in the New Age", The New York Review of Books, Volume 55, Number 10 -- June 12, 2008 http://www.nybooks.com/articles/21514Google ScholarGoogle Scholar
  29. Fiona Darroch, "ACM Fellow Profile -- Bob Glass", ACM SIGSOFT Software Engineering Notes, Vol. 31, No. 4, July 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Peter J. Denning, "Is Computer Science Science?", Communications of the ACM, Vo. 48, No. 4. April 2005, pp. 27--31 (See {122}) Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Bradley Dowden, "Fallacies", The Internet Encyclopedia of Philosophy, 2008 http://www.iep.utm.edu/f/fallacy.htmGoogle ScholarGoogle Scholar
  32. Nicholas Dujmovic, "Oral History: Reflections of DCIs Colby and Helms on the CIA's 'Time of Troubles'", Studies in Intelligence, Vol. 51, No. 3, 2007 http://www.foia.cia.gov/helms/pdf/reflections.pdf (The ultimate insiders view of security.)Google ScholarGoogle Scholar
  33. Richard P. Feynman, "Cargo Cult Science: Some remarks on science, pseudoscience, and learning how not to fool yourself", The 1974 Caltech Commencement Address, Engineering and Science, Volume 37, Number 7, June 1974 http://calteches.library.caltech.edu/51/02/CargoCult.pdfGoogle ScholarGoogle Scholar
  34. Anthony Finkelstein, "A Software Process Immaturity Model", ACM SIGSOFT Software Engineering Notes, Vol. 17, No. 4, Oct. 1992, pp. 22--23 http://portal.acm.org/citation.cfm?coll=GUIDE&dl=GUIDE&id=141878 Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. T.A. Frank, "Confessions of a Sweatshop Inspector", Washington Monthly, April 2008 http://www.washingtonmonthly.com/features/2008/0804.frank.htmlGoogle ScholarGoogle Scholar
  36. Thomas Frank, "Fliers without ID placed on TSA list", USA Today, Aug. 12, 2008 http://www.usatoday.com/tech/news/surveillance/2008-08-12-tsa_N.htmGoogle ScholarGoogle Scholar
  37. John Kenneth Galbraith, The Economics of Innocent Fraud, Houghton Mifflin, 2004.Google ScholarGoogle Scholar
  38. Garet Garrett, Ouroboros or The Mechanical Extension of Mankind, E.F. Hutton, 1926 ("The machine does not abolish the curse of toil..it does create a preferred task.") http://mises.org/books/ouroboros.pdfGoogle ScholarGoogle Scholar
  39. Jennifer L. Geddes, "An Interview with Margaret Jane Radin", The Hedgehog Review, Summer 2003 http://www.virginia.edu/iasc/HHR_Archives/Commodification/5.2IRadin.pdfGoogle ScholarGoogle Scholar
  40. Edward Gibbon, Decline and Fall of the Roman Empire, Tess Press, 2005.Google ScholarGoogle Scholar
  41. Robert L. Glass, Rost, Johann, Matook, Matthias, "Lying on Software Projects -- A Survey", Preprint to be published in IEEE Software, Vol. 26, No. 6, Nov. 2008 Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Steven D. Gribble, "Robustness in Complex Systems", Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, 2001. May 2001, pp: 21--26 http://citeseer.ist.psu.edu/gribble01robustness.html Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. David Halberstam, The Best and the Brightest, Ballantine Books, 1993.Google ScholarGoogle Scholar
  44. Daniel Halperin, Heydt-Benjamin, T. S., Ransford, B., Clark, S. S., Defend, B., Morgan, W., Fu, K., Kohno, T., and Maisel, W. H., "Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses", Proceedings of the IEEE Symposium on security and Privacy, 2008 http://www.secure-medicine.org/icd-study/icd-study.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. T.X. Hammes, "War Isn't a Rational Business", Proceedings of the US Naval Institute, Volume 124, No. 7, July 1998, pp 22--25 smallwarsjournal.com/documents/rationalwar.pdfGoogle ScholarGoogle Scholar
  46. Blaine Harden, "S. Korean Tourist Is Shot Dead In North", Washington Post Foreign Service, July 12, 2008; Page A09 http://www.washingtonpost.com/wp-dyn/content/article/2008/07/11/AR2008071100314.htmlGoogle ScholarGoogle Scholar
  47. Garrett Hardin, "The Tragedy of the Commons", Science, December 13, 1968 http://www.garretthardinsociety.org/articles/art_tragedy_of_the_commons.htmlGoogle ScholarGoogle Scholar
  48. Garrett Hardin, "Rewards of Pejoristic Thinking", in Managing the Commons, by Garrett Hardin and John Baden (Editors), W. H. Freeman, 1977 http://www.garretthardinsociety.org/articles/art_rewards_perjoristic_thinking.htmlGoogle ScholarGoogle Scholar
  49. Garrett Hardin, "The Cybernetics of Competition", Perspectives in Biology and Medicine, 7:58--84, 1963, Reprinted as Chapter 21. in Stalking the Wild Taboo, Kaufmann, 1978.Google ScholarGoogle ScholarCross RefCross Ref
  50. Friedrich August von Hayek, "The Pretence of Knowledge", Nobel Prize Lecture, December 11, 1974 http://nobelprize.org/nobel_prizes/economics/laureates/1974/hayek-lecture.htmlGoogle ScholarGoogle Scholar
  51. Albert O. Hirschman, "Two Hundred Years of Reactionary Rhetoric", the Tanner Lectures on Human Values, University of Michigan, April 8, 1988 http://www.tannerlectures.utah.edu/lectures/documents/hirschman89.pdfGoogle ScholarGoogle Scholar
  52. Albert O. Hirschman, "Against Parsimony: Three Easy Ways of Complicating Some Categories of Economic Discourse", Bulletin of the American Academy of Arts and Sciences, Vol. 37, No. 8, May, 1984, pp. 11--28 www.regulationbodyofknowledge.org/documents/027.pdf (Interesting website in a creepy sort of way.)Google ScholarGoogle ScholarCross RefCross Ref
  53. Leah Hoffman, "In Search of Dependable Design", CACM, Vol. 51, No. 7, July 2008, pp 14--16 (Daniel Jackson appears to be walking in his father's footsteps in this article. See {56}) Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. C.S. Holling, Goldbert, M. A., "Ecology and Planning", Journal of the American Institute of Planners, Volume XXXVII, Number 4, July 1971, pp 221--230 http://www.csun.edu/~vasishth/Holling+Ecology_and_Planning.pdf (See {15})Google ScholarGoogle ScholarCross RefCross Ref
  55. Keith N. Hylton, Khanna, Vikramaditya S., "Political Economy of Criminal Procedure", Boston University School of Law, Working Paper Series, Law and Economics Working Paper No. 08-06 http://ssrn.com/abstract ID=1121441 (This paper is representative of the type. Note the "existence theorem" issues.)Google ScholarGoogle Scholar
  56. Michael C. Jackson, "The Youthful Immaturity of Software Engineering", Proceedings of Convencio Informatica Llatina, Boixareu Editores 1985, pp. 47--51; http://mcs.open.ac.uk/mj665/CIL1985.pdfGoogle ScholarGoogle Scholar
  57. Tony Judt, Postwar: A History of Europe Since 1945, Penguin, 2005.Google ScholarGoogle Scholar
  58. Paul Kennedy, "The Rise and Fall of the Great Powers", Vintage, 1989.Google ScholarGoogle Scholar
  59. Daniel B. Klein, "A plea to economists who favor liberty: Assist the everyman", Eastern Economic Journal, Spring 2001 http://findarticles.com/p/articles/mi_qa3620/is_200104/ai_n8940844Google ScholarGoogle Scholar
  60. Claudia Koonz, The Nazi Conscience, Belknap, 2003Google ScholarGoogle Scholar
  61. Jo Anne Lane, Boehm, Barry, "System of Systems Lead System Integrators: Where Do They Spend Their Time and What Makes Them More or Less Efficient?", Systems Engineering, Vol. 11, No. 1, Feb. 2008, pp. 81--91 http://www3.interscience.wiley.com/journal/116840094/abstract Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Timothy B. Lee, "Circumventing Competition: The Perverse Consequences of the Digital Millennium Copyright Act", Cato Institute, Policy analysis No. 564, March 21, 2006 http://www.cato.org/pub_display.php?pub_id=6025Google ScholarGoogle Scholar
  63. Michael Levenson, "T hacking exposes a deeper clash", Boston Globe, Aug. 18, 2008, p A1,A6 http://www.boston.com/news/local/massachusetts/articles/2008/08/18/t_hacking_exposes_a_deeper_clash/Google ScholarGoogle Scholar
  64. Nancy G. Leveson, "High Pressure Steam Engines and Computer Software", International Conference on software Engineering, Melbourne, Australia, May 1992 http://sunnyday.mit.edu/steam.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. J. R. Lucas, "Minds, Machines and Gödel", Philosophy, XXXVI, 1961, pp. 112--127; Reprinted in The Modeling of Mind, Kenneth M.Sayre and Frederick J.Crosson, eds., Notre Dame Press, 1963, pp.269--270 http://users.ox.ac.uk/~jrlucas/mmg.htmlGoogle ScholarGoogle ScholarCross RefCross Ref
  66. Deirdre N. McCloskey, "Cassandra's open letter to her economist colleagues", Eastern Economic Journal, Summer 1999 http://findarticles.com/p/articles/mi_qa3620/is_199907/ai_n8842882Google ScholarGoogle Scholar
  67. Deirdre N. McCloskey, "Why Economics is on the Wrong Track", 2006/2007 http://deirdremccloskey.org/pubs/drafts/why.phpGoogle ScholarGoogle Scholar
  68. Erin McKean, "Chillax: If it works like a word, just use it.", The Boston Globe, Aug. 28, 2008 www.boston.com/bostonglobe/ideas/articles/2008/08/03/chillax/Google ScholarGoogle Scholar
  69. Donella H. Meadows, "Places to Intervene in a System", Whole Earth Review, winter 1997 http://www.wholeearthmag.com/ArticleBin/109.htmlGoogle ScholarGoogle Scholar
  70. John W. Meyer, Rowan, Brian, "Institutionalized Organizations: Formal Structure as Myth and Ceremony", The American Journal of Sociology, Vol. 83, No. 2, Sep. 1977, pp. 340--363 http://links.jstor.org/sici?sici=0002-9602 (197709)83%3A2%3C340%3AIOFSAM%3E2.0.CO%3B2-3Google ScholarGoogle ScholarCross RefCross Ref
  71. Mezmer, "Mezmer's Logical Defect Checklist, Undated http://flowstate.homestead.com/logical.htmlGoogle ScholarGoogle Scholar
  72. Jeremy Miller, "Tyranny of the test", Harper's Magazine, Sept. 2008 harpers.org/archive/2008/09Google ScholarGoogle Scholar
  73. Jeffrey C. Mogul, "Emergent (Mis)behavior vs. Complex Software Systems", ACM SIGOPS Operating Systems Review, Vol. 40, No. 4, Oct. 2006, Proceedings of the 2006 EuroSys conference, pp. 293--304 http://www.cs.kuleuven.be/conference/EuroSys2006/papers/p293-mogul.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Anna Mundow, "A warning about 'false science'", The Boston Sunday Globe, July 27, 2006 p. K12 http://www.boston.com/ae/books/articles/2008/07/27/a_warning_about_false_science/Google ScholarGoogle Scholar
  75. C. Northcote Parkinson, Parkinson's Laws, Buccaneer Books, 1957.Google ScholarGoogle Scholar
  76. David Parnas, Software Aspects of Strategic Defense Systems, ACM SIGSOFT Software Engineering Notes, Vol 73. No 5., October 1985 http://portal.acm.org/citation.cfm?id=214961 Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. David Lorge Parnas, "Stop the Numbers Game", Communications Of The ACM, Vol. 50, No. 11, Nov. 2007, pp. 19--21 http://portal.acm.org/citation.cfm?id=1297797.1297815 (Where light may be a competition those who only see a game will curse the darkness.) Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Mark Peplow, "Science secret of grand masters revealed", Nature, online edition, Aug. 6, 2004 http://www.nature.com/news/2004/040802/full/040802-19.html http://www.freerepublic.com/focus/f-chat/1187541/postsGoogle ScholarGoogle Scholar
  79. David Pescovitz, "Sons and Daughters of HAL Go on Line", New York Times, March 18, 1999 http://query.nytimes.com/gst/ fullpage.html?res=9B04E3DD1631F93BA25750C0A96F958260&sec=&spon=&pagewanted=3 http://loebner.net/Prizef/loebner-prize.htmlGoogle ScholarGoogle Scholar
  80. Charles P. Pierce, "Rules What Rules?", The Boston Sunday Globe Magazine, December 30, 2007 pp. 31--32 http://www.boston.com/bostonglobe/magazine/articles/2007/12/30/rules_what_rules/Google ScholarGoogle Scholar
  81. Bill Pollak, Ed., "Ultra-Large-Scale systems: The Software Challenge of the Future", Software Engineering Institute, Carnegie Mellon, June 2006 http://www.sei.cmu.edu/uls/report.html (Parnas may be referenced in {80}, but not the essay most relevant, for this see {75}. Also see {8} and {106}.)Google ScholarGoogle Scholar
  82. Vassilis Prevekalis, "The Athens Affair", IEEE Spectrum, Vol. 44, No. 7, July 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Munir Quddus, "The overuse of mathematics in economics: Nobel resistance", Eastern Economic Journal, Summer 1994 http://findarticles.com/p/articles/mi_qa3620/is_199407/ai_n8727805Google ScholarGoogle Scholar
  84. Rick Rashid, "Image Crisis: Inspiring a New Generation of Computer Scientists", CACM, Vol. 51, No. 7, July 2008, pp 33--34 (A Microsoft VP previously employed by the organization that crafted {81}) Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Chanpory Rith, Dubberly, Hugh, "Why Horst W.J. Rittel Matters", Design Issues, Vol. 22, No. 4, Autumn 2006 http://www.dubberly.com/wp-content/uploads/2008/06/ddo_article_rittel.pdfGoogle ScholarGoogle Scholar
  86. Horst Rittel, "Some Principles for the Design of an Educational System for Design", Journal of Archtectural Education (1947-1974), Vol. 25, No 1/2, Research as an Aspect of Architectural Education, (Winter- Spring, 1971) pp.16--27, Blackwell, Originally, Education for Architectural Technology. Ed. Passonneau, J. St. Louis: Washington University and the AIA Educational Research Projects, 1966. pp. 103--151 http://www.jstor.org/stable/1423929Google ScholarGoogle Scholar
  87. Horst Rittel, "On the Planning Crisis: Systems Analysis of the 'First and Second Generations'." Bedrifts Økonomen. 8 (1972): 390--396. http://www.csun.edu/~vasishth/Rittel-Planning_Crisis.pdf (The second generation appears to have been strangled in its crib.)Google ScholarGoogle Scholar
  88. Horst Rittel, and M. Webber, "Dilemmas in a General Theory of Planning", pp 155--169, Policy Sciences, Vol. 4. 1973, Elsevier http://www.uctc.net/mwebber/Rittel+Webber+Dilemmas+General_Theory_of_Planning.pdf (The source of wickedness).Google ScholarGoogle Scholar
  89. Nancy Roberts, "Coping with Wicked Problems" Third Bi-Annual Research conference of the International Public Management Network, Sydney, Australia, March 4-6, 2000 http://www.inpuma.net/research/papers/sydney/nancyroberts.htmlGoogle ScholarGoogle Scholar
  90. Dexter Roberts, Bernstein, Aaron, "Inside a Chinese Sweatshop: A Life of Fines and Beating", business week, Oct. 2, 2000 http://www.businessweek.com/2000/00_40/b3701119.htm (The U.S. isn't immune to its own Potemkin villages {92} {108}).Google ScholarGoogle Scholar
  91. Fred Rodell, Woe Unto You Lawyers!, New York, Pageant Press, Inc, 2d ed. 1957 http://www.constitution.org/lrev/rodell/woe_unto_you_lawyers.htmGoogle ScholarGoogle Scholar
  92. Jonathan Rowe, "Our Phony Economy", Harper's Magazine, June 2008, pp 17--18 http://harpers.org/archive/2008/06/0082042Google ScholarGoogle Scholar
  93. Edward W. Said, "Intellectual Exile: Expatriates and Marginals", Grand Street, Issue 47, Fall 1993 http://www.grandstreet.com/gsissues/gs47/gs47a.htmlGoogle ScholarGoogle Scholar
  94. J.H. Saltzer, Reed, D.P., Clark, D.D., "End-to-end Arguments in System Design", ACM Transactions on Computer Systems (TOCS), Vol. 2, No. 4, November 1984, pp. 277--288 http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Michael J. Sandel, "What Money Can't Buy: The Moral Limits of Markets", The Tanner Lectures on Human Values, Brasenose College, Oxford, May 11, 1998 http://www.tannerlectures.utah.edu/lectures/documents/sandel00.pdfGoogle ScholarGoogle Scholar
  96. Robert Schaefer, "Deeper Questions: The Meta-problem of Large Organizations Developing Complex Systems and the Limits of Process", ACM SIGSOFT Software Engineering Notes, July 2005, Volume 30, Number 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. Robert Schaefer, "A Critical Programmer Searches for Professionalism", ACM SIGSOFT Software Engineering Notes, Volume 31, Number 4, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Robert Schaefer, "The Grand Theory of Everything: What Man-Made Systems Are, and Why They Fail", ACM SIGSOFT Software Engineering Notes, Volume 32, Number 4, July 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Robert Schaefer, "A Systems Analysis of Systems Integration", ACM SIGSOFT Software Engineering Notes, Volume 33, Number 1, Jan. 2008 Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Robert Schaefer, "Debugging Debugged, a Metaphysical Manifesto of Systems Integration", ACM SIGSOFT Software Engineering Notes, Volume 33, Number 3, May 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. Bruce Schneier, "I've Seen the Future, and It Has a Kill Switch", Wired, June 26, 2006 http://www.wired.com/politics/security/commentary/securitymatters/2008/06/securitymatters_0626 (For a fatal kill switch, see {44}.)Google ScholarGoogle Scholar
  102. Bruce Schneier, "Inside the Twisted Mind of the Security Professional", Wired, March 20, 08 http://www.wired.com/politics/security/commentary/securitymatters/2008/03/securitymatters_0320 (To teach security is to teach the dark arts. See {44}.)Google ScholarGoogle Scholar
  103. Bruce Schneier, Ranum, Marcus, "Face-Off: Is vulnerability research ethical?", Information Security, May 2008 http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1313268,00.html# (Outsiders discuss security. For insiders, see {32}).Google ScholarGoogle Scholar
  104. Bruce Schneier, "Opinion: The TSA's useless photo ID rules", Los Angeles Times, August 28, 2008 http://www.latimes.com/news/opinion/la-oe-schneier28-2008aug28,0,3099808.storyGoogle ScholarGoogle Scholar
  105. Tom Schorsch, "The Capability Im-Maturity Model (CIMM)", CrossTalk, The Journal of Defense Software Engineering, November 1996 www.stsc.hill.af.mil/crosstalk/1996/11/xt96d11h.aspGoogle ScholarGoogle Scholar
  106. Scott, James C., Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed, Yale University Press, 1999 (Systems delusions of megalomaniacs.)Google ScholarGoogle Scholar
  107. Gene Sharp, "Disregarded History", Fellowship, March 1976 www.fragmentsweb.org/fourtx/dishist.pdfGoogle ScholarGoogle Scholar
  108. Monique Doyle Spencer, "America's faux government", The Boston Globe, May 25, 2008, p D9 http://www.boston.com/bostonglobe/editorial_opinion/oped/articles/2008/05/25/americas_faux_government/Google ScholarGoogle Scholar
  109. Staff, "From the Hartford Courant", The New York Times, November 11, 1909 http://query.nytimes.com/mem/archive-free/pdf?res=9D03E7D6123EE733A25752C1A9679D946897D6CFGoogle ScholarGoogle Scholar
  110. Staff, "Charlemagne: Europe's Marxist dilemma", The Economist, Apr. 26, 2008 http://www.economist.com/world/europe/displaystory.cfm?story_id=11089474Google ScholarGoogle Scholar
  111. Staff, "Olympic games: The ghosts of Mexico 1968", The Economist, April 26, 2008 http://www.economist.com/world/international/displaystory.cfm?story_id=11090825Google ScholarGoogle Scholar
  112. David Stove, "What is Wrong with Our Thoughts?", The Plato Cult and Other Philosophical Follies, Chapt. 7, Blackwell, 1991 http://web.maths.unsw.edu.au/~jim/wrongthoughts.html (The irony is that if Stove, a philosopher, truly understood logic, he would have recognized the fallacy of the excluded middle and would have been able to answer his own question. Or perhaps, this was his joke on us?)Google ScholarGoogle Scholar
  113. Christine Sypnowich, "Law and Ideology", Stanford Encyclopedia of Philosphy, (Winter 2001), edited by Edward N. Zalta., Oct. 22, 2001 http://plato.stanford.edu/entries/law-ideology/ (Representative of its type).Google ScholarGoogle Scholar
  114. Barbara W. Tuchman, The March of Folly: From Troy to Vietnam, Ballantine Books, 1985.Google ScholarGoogle Scholar
  115. Louis Uchitelle, "Robert Heilbroner: An Economic Pioneer Decries the Modern Field's Narrow Focus", New York Times, January 23, 1999.Google ScholarGoogle Scholar
  116. Unknown, "25 Tactics for Truth Suppression", Alaska Free Press, Undated http://www.alaskafreepress.com/msgboard/disinfo/index.htmlGoogle ScholarGoogle Scholar
  117. G. K. VanPatter, "Double Consciousness: Back to the Future with John Chris Jones", NextD Journal, Issue 9, Conversation 9.2, 2006 www.nextd.org/02/09/02/contents.htmGoogle ScholarGoogle Scholar
  118. Bruce Weber, "It's Man Over Machine as Chess Champion Beats Computer He Calls Tough Opponent", The New York Times, Feb. 18, 1996 http://query.nytimes.com/gst/fullpage.html? res=9507E3DB1339F93BA25751C0A960958260&n=Top%2FReference%2FTimes%20Topics%2FPeople%2FK%2FKasparov%2C%20GarryGoogle ScholarGoogle Scholar
  119. Wikipedia Contributors, "CAPTCHA", Wikipedia, The Free Encyclopedia, June 14, 2008 http://en.wikipedia.org/wiki/CaptchasGoogle ScholarGoogle Scholar
  120. Wikipedia Contributors, "Chatterbot", Wikipedia, The Free Encyclopedia, June 24, 2008 http://en.wikipedia.org/wiki/ChatterbotGoogle ScholarGoogle Scholar
  121. Wikipedia Contributors, "Chinese room", Wikipedia, The Free Encyclopedia, June 18, 2008 http://en.wikipedia.org/wiki/Chinese_Room (Also see {23}).Google ScholarGoogle Scholar
  122. Wikipedia Contributors, "Peter J. Denning", Wikipedia, The Free Encyclopedia, June 24, 2008 http://en.wikipedia.org/wiki/Peter_J_DenningGoogle ScholarGoogle Scholar
  123. Wikipedia Contributors, "Design methods", Wikipedia, The Free Encyclopedia, June 9, 2008 http://en.wikipedia.org/wiki/Design_methods (See also - http://www.softopia.demon.co.uk)Google ScholarGoogle Scholar
  124. Wikipedia Contributors, "ELIZA", Wikipedia, The Free Encyclopedia, June 24, 2008 http://en.wikipedia.org/wiki/ELIZAGoogle ScholarGoogle Scholar
  125. Wikipedia Contributors, "Kobyayshi Maru", Wikipedia, The Free Encyclopedia, July 15, 2008 http://en.wikipedia.org/wiki/Kobyayshi_MaruGoogle ScholarGoogle Scholar
  126. Wikipedia Contributors, "Deirdre McCloskey", Wikipedia, The Free Encyclopedia, May 11, 2008 http://en.wikipedia.org/wiki/Deirdre_McCloskeyGoogle ScholarGoogle Scholar
  127. Wikipedia Contributors, "Mechanism Design", Wikipedia, The Free Encyclopedia, July 14, 2008 http://en.wikipedia.org/wiki/Mechanism_design (Mechanism Design looks like social engineering from above by those who think they know best. Isn't this communism? Also see {106}).Google ScholarGoogle Scholar
  128. Wikipedia Contributors, "Quasi-rent", Wikipedia, The Free Encyclopedia, Oct. 11, 2007 http://en.wikipedia.org/wiki/Quasi-rentGoogle ScholarGoogle Scholar
  129. Wikipedia Contributors, "The Structure of Scientific Revolutions", Wikipedia, The Free Encyclopedia, July 1, 2008 http://en.wikipedia.org/wiki/The_Structure_of_Scientific_RevolutionsGoogle ScholarGoogle Scholar
  130. Wikipedia Contributors, "Turing Test", Wikipedia, The Free Encyclopedia, June 30, 2008 http://en.wikipedia.org/wiki/Turing_Test (Also see {2})Google ScholarGoogle Scholar
  131. Edmund Wilson, To the Finland Station, NYRB Classics, 2003.Google ScholarGoogle Scholar

Index Terms

  1. Software maturity: design as dark art

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGSOFT Software Engineering Notes
      ACM SIGSOFT Software Engineering Notes  Volume 34, Issue 1
      January 2009
      119 pages
      ISSN:0163-5948
      DOI:10.1145/1457516
      Issue’s Table of Contents

      Copyright © 2009 Author

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 31 January 2009

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader