ABSTRACT
New opportunities for software-intensive system configurations are arriving on the market; these include cyber-physical, cyber-social, and cloud structures. Because of the convenience and cost-savings opportunities they offer, these capabilities and configurations will be adopted, most likely quickly and at large scale. Some of these configurations, however, have the potential to create (or already are creating) significant unintended problems and vulnerabilities. The author identifies a range of such unintended problems and vulnerabilities, and indicates the types of research and new insights that will be needed so as to allow society to obtain the benefits promised by these emerging opportunities.
- President’s information technology advisory committee, report to the president. http://www.nitrd.gov/pitac/report/, 1999.Google Scholar
- Controller area network. http://standards.sae.org/j2411_200002/, 2000.Google Scholar
- Intel to phase out controversial processor serial numbers. http://www.networkworld.com/news/2000/ 0428intelnumber.html, 2000.Google Scholar
- Processor serial number questions & answers. http://www.intel.com/support/processors/ pentiumiii/sb/cs-007579.htm, 2003.Google Scholar
- Boeing aircraft company: Statistical summary of commercial jet airplane accidents. http://www. boeing.com/news/techissues/pdf/statsum.pdf, 2011.Google Scholar
- F-35 program continues to struggle with software. http://spectrum.ieee.org/riskfactor/aerospace/ military/ f35-program-continues-to-struggle-with-software, 2012.Google Scholar
- Fun facts about the f-35 fighter. http://www.publicintegrity.org/2012/03/27/ 8510/fun-facts-about-f-35-fighter, 2012.Google Scholar
- K. Ashton. That “internet of things” thing. RFiD Journal, 22:97–114, 2009.Google Scholar
- E. V. Bernstam and T. R. Johnson. Why Health Information Technology Doesn’t Work. The Bridge, 2009.Google Scholar
- B. Boehm. Some future trends and implications for systems and software engineering processes. Systems Engineering, 9(1):1–19, 2006. Google ScholarDigital Library
- B. Boehm and J. Lane. 21st century processes for acquiring 21st century software-intensive systems of systems. CrossTalk, 19(5):4–9, 2006.Google Scholar
- B. W. Boehm. A spiral model of software development and enhancement. Computer, 21(5):61–72, 1988. Google ScholarDigital Library
- B. W. Boehm and R. Ross. Theory-w software project management principles and examples. Software Engineering, IEEE Transactions on, 15(7):902–916, 1989. Google ScholarDigital Library
- F. Brooks. The Design of Design: Essays from a Computer Scientist. Pearson Education, 2010. Google ScholarDigital Library
- J. den Haan. 8 reasons why model-driven development is dangerous. Pobrano, 8(23):2011, 8.Google Scholar
- E. W. Dijkstra et al. On the cruelty of really teaching computing science. Communications of the ACM, 32(12):1398–1404, 1989.Google Scholar
- A. Y. Gagarinskii. Blue ribbon commission on america’s nuclear future. Atomic Energy, pages 1–3, 2012.Google ScholarCross Ref
- L. Gold and N. Siegel. Proteomics-based individualized health-care. To appear.Google Scholar
- C. Jones, O. Bonsignour, and J. Subramanyam. The Economics of Software Quality. Addison-Wesley Professional, 2011. Google ScholarDigital Library
- A. Kay, D. Ingalls, Y. Ohshima, I. Piumarta, and A. Raab. Steps toward the reinvention of programming. Technical report, Technical report, National Science Foundation, 2006.Google Scholar
- L. Kleinrock. personal communication, 2009.Google Scholar
- J. G. Koomey. Worldwide electricity used in data centers. Environmental Research Letters, 3(3):034008, 2008.Google ScholarCross Ref
- K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, et al. Experimental security analysis of a modern automobile. In Security and Privacy (SP), 2010 IEEE Symposium on, pages 447–462. IEEE, 2010. Google ScholarDigital Library
- P. Mell and T. Grance. The nist definition of cloud computing — recommendations of the national institute of standards and technology. special publication 800-145, national institute of standards and technology, gaithersburg, 2011. csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf, 2011.Google Scholar
- D. Metlay and D. Sarewitz. Decision Strategies for Addressing Complex, “Messy” Problems. The Bridge, 2012.Google Scholar
- S. Nixon. Wicked problems — the challenge of our ag. TTI Conference, 2011.Google Scholar
- C. Perrow. The Next Catastrophe: Reducing Our Vulnerabilities to Natural, Industrial, and Terrorist Disasters (New in Paper). Princeton University Press, 2011.Google Scholar
- E. Rechtin. Systems Architecting: creating and building complex systems, volume 199. Prentice Hall Upper Saddle River, NJ, 1991.Google Scholar
- K. Scarfone, M. Souppaya, and M. Sexton. Guide to storage encryption technologies for end user devices. NIST Special Publication, 800:111, 2007.Google Scholar
- B. Schatz, A. Pretschner, F. Huber, and J. Philipps. Model-based development. Technical report, Technical Report TUM-I0204, Institut fur Informatik, Technische Universitat Munchen, 2002.Google Scholar
- N. G. Siegel. Organizing complex projects around critical skills, and the mitigation of risks arising from system dynamic behavior. PhD thesis, University of Southern California, 2011. Google ScholarDigital Library
- J. Wetmore. The value of the social sciences for maximizing the public benefits of engineering. Bridge, 42(3):40–45, 2012.Google Scholar
- D. J. Wheeler. Understanding variation. SPC press Knoxville, TN, 1993.Google Scholar
Index Terms
- The challenges of emerging software eco-systems (keynote)
Recommendations
Software Engineering for Systems-of-Systems and Software Ecosystems
AbstractSoftware Engineering has faced several challenges in the last decade, especially those related to aspects beyond the technical side. As such, technological, organizational and social aspects should be considered altogether in research and ...
Software ecosystems architectural health: challenges x practices
ECSAW '16: Proccedings of the 10th European Conference on Software Architecture WorkshopsOver time many software ecosystems have achieved success. Several organizations are opening their software projects for external businesses, creating an multi-organizational government to development their software platform The software architecture has ...
Analyzing Software Safety
With the increased use of software controls in critical realtime applications, a new dimension has been introduced into software reliability-the "cost" of errors. The problems of safety have become critical as these applcations have increasingly ...
Comments