skip to main content
article
Free Access

The ethics of safety-critical systems

Published:01 April 2000Publication History
First page image

References

  1. 1 Aristotle. Ethics. Penguin Books, London, 1976.Google ScholarGoogle Scholar
  2. 2 Bowen, J.P. and Hinchey, M.G. High-Integrity Systems Specification and Design. FACIT series. Springer-Verlag, London, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Bowen, J.P. and Stavridou, V. Safety-critical systems, formal methods and standards. IEE/BCS Sofiw. Eng. f 8, 4 (Jul. 1993), 189-209.Google ScholarGoogle Scholar
  4. 4 Gotterbarn, D., Miller, K. and Rogerson, S. Software engineering code of ethics is approved. Commun. ACM 42, 10 (Oct. 1999), 102-107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 Hall, J.A. Seven myths of formal methods. IEEE Sofiw. 7, 5 (Sept. 1990), 11-19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 The Hazards Forum. Safety-related systems: Guidance for engineers. The Hazards Forum (1995). London, U.K.; www.iee.org.uk/PAB/ SCS/hazpub.htm.Google ScholarGoogle Scholar
  7. 7 Leveson, N.G. Safeware: System Safety and Computers. Addison-Wesley, Reading, PA, 1995. Google ScholarGoogle Scholar
  8. 8 Leveson, N.G. and Turner, C.S. An investigation of the Therac-25 accidents. IEEE Computer 26, 7 (Jul. 1993), 18-41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 Lyons, J. L. ARIANE 5: Flight 501 failure. Report by the Inquiry Board, European Space Agency. (July 19, 1996); www.esrin.esa.it/ htdocs/tidc/Press/Press96/ariane5rep.htmlGoogle ScholarGoogle Scholar
  10. 10 Neumann, P.G. Computer Related Risks. Addison-Wesley, Reading, PA, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 Thomas, M. Formal methods and their role in developing safe systems. High Integrity Syst. 1, 5 (1996), 447-451; www.iee.org.uk/PAB/SCS/ wrkshop 1 .htm.Google ScholarGoogle Scholar
  12. 12 The University of York. Safety critical systems engineering, system safety engineering: Modular MSc, diploma, certificate, short courses. 1999. The University of York, Heslington, U.K.; www.cs. york.ac.uk/MSc/SCSE/Google ScholarGoogle Scholar

Index Terms

  1. The ethics of safety-critical systems

            Recommendations

            Reviews

            James Edward Miller

            While the typos (I assume not the authors) in two out of the first three sentences might make one nervous the paper is in fact well written and contains valuable information for anyone who produces software. Following a brief introduction, the author introduces "Seven Deadly Sins". Under the headings of Epideictic, Hyperbole, Pistic, Oligarchy, Ephemeral, Epexegesis, and Maiandros (and their respective explanatory subheadings) is an excellent, but brief, discussion of problems and considerations associated with selecting an appropriate technique to apply in the development of safety-critical systems. While the focus is on the development of safety-critical systems it is clearly applicable to a much wider range of projects. The ethics portion of the paper points the reader to the codes of conduct supported by the various professional organizations and in particular presents the code of practice developed in the U.K. for engineers and managers working on safety-related systems. The background and expertise of the team developing safety-critical systems is an essential factor in the success or failure of a project. A set of guidelines is presented which should help assure that both managers and engineers have the right training and skills for the task. "Ultimately, it is unethical to develop software for safety-related systems without following the best practice available." A related paper that I would have liked to have seen referenced is: Collins, Robert W., Keith W. Miller, Bethany J. Spielman, and Phillip Wherry. How good is good enough__?__ An Ethical analysis of software construction and use. Commun. ACM 37, 1(Jan.1994), 81-91.

            Access critical reviews of Computing literature here

            Become a reviewer for Computing Reviews.

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 43, Issue 4
              April 2000
              105 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/332051
              Issue’s Table of Contents

              Copyright © 2000 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 April 2000

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format