Resumos
Muitos têm argumentado que as sociedades industriais estão se tornando cada vez mais dependentes da tecnologia e, conseqüentemente, mais vulneráveis às falhas tecnológicas. Não obstante a difusão da tecnologia computacional, pouco é conhecido a respeito das falhas do computador, exceto, talvez, as que são muito comuns. Este artigo analisa as fontes de insegurança do computador e revê a extensão e o custo dos computadores inconfiáveis. Ao contrário dos articulistas anteriores, os autores argumentam que os computadores digitais são inerentemente não confiáveis por duas razões: primeira, são mais propensos a falhas totais, ao invés de parciais; e segunda, sua enorme complexidade significa que jamais poderão ser completamente testados antes de serem colocados em uso. Os autores descrevem em seguida várias tentativas institucionais para melhorar a confiabilidade, bem como possíveis soluções propostas pelos cientistas da computação, mas concluem que até agora nenhuma foi adequada. Em conseqüência, recomendam que os computadores não devam ser utilizados em aplicações onde haja risco de vida.
Confiabilidade do computador; falhas do computador; riscos sociais do computador; engenharia de software
Many have argued that industrial societies are becoming more technology-dependent and are thus more vulnerable to technology failures. Despite the pervasiveness of computer technology, little is known about computer failures, except perhaps that they are all too common. This article analyses the sources of computer unreliability and reviews the extent and cost of unreliable computers. Unlike previous writers, the authors argue that digital computers are inherently unreliable for two reasons: first, they are prone to total rather than partial failure; and second, their enormous complexity means that they can never be thoroughly tested before use. The authors then describe various institutional attempts to improve reliability and possible solutions proposed by computer scientists, but they conclude that as yet none is adequate. Accordingly, they recommend that computers should not be used in life-critical applications.
Computer reliability; computer failures; computer-social risks; software engineering
COLABORAÇÃO INTERNACIONAL
A insegurança do computador e a vulnerabilidade social* * Texto publicado originalmente na Futures Journal in England, 22(5):462-74/ junho de 1990, sob o titulo "Computer unreliability and social vulnerability".
Tom ForesterI; Perry MorrisonII
IProfessor da Griffith University, Austrália
IIProfessor da University of New England, Austrália
RESUMO
Muitos têm argumentado que as sociedades industriais estão se tornando cada vez mais dependentes da tecnologia e, conseqüentemente, mais vulneráveis às falhas tecnológicas. Não obstante a difusão da tecnologia computacional, pouco é conhecido a respeito das falhas do computador, exceto, talvez, as que são muito comuns. Este artigo analisa as fontes de insegurança do computador e revê a extensão e o custo dos computadores inconfiáveis. Ao contrário dos articulistas anteriores, os autores argumentam que os computadores digitais são inerentemente não confiáveis por duas razões: primeira, são mais propensos a falhas totais, ao invés de parciais; e segunda, sua enorme complexidade significa que jamais poderão ser completamente testados antes de serem colocados em uso. Os autores descrevem em seguida várias tentativas institucionais para melhorar a confiabilidade, bem como possíveis soluções propostas pelos cientistas da computação, mas concluem que até agora nenhuma foi adequada. Em conseqüência, recomendam que os computadores não devam ser utilizados em aplicações onde haja risco de vida.
Palavras-chave: Confiabilidade do computador, falhas do computador, riscos sociais do computador, engenharia de software.
ABSTRACT
Many have argued that industrial societies are becoming more technology-dependent and are thus more vulnerable to technology failures. Despite the pervasiveness of computer technology, little is known about computer failures, except perhaps that they are all too common. This article analyses the sources of computer unreliability and reviews the extent and cost of unreliable computers. Unlike previous writers, the authors argue that digital computers are inherently unreliable for two reasons: first, they are prone to total rather than partial failure; and second, their enormous complexity means that they can never be thoroughly tested before use. The authors then describe various institutional attempts to improve reliability and possible solutions proposed by computer scientists, but they conclude that as yet none is adequate. Accordingly, they recommend that computers should not be used in life-critical applications.
Key words: Computer reliability, computer failures, computer-social risks, software engineering.
Texto completo disponível apenas em PDF.
Full text available only in PDF format.
BIBLIOGRAFIA
Tradução de Antonio Carlos Mattos
Professor do Departamento de Informática e Métodos Quantitativos da EAESP/FGV
- A CONSOLIDATED report of case study findings. Londres, Coopers and Lybrand, 1988.
- ADAMS, E. N. "Optimizing preventing service of software products". IBM Journal of Research and Development, 28(1):8, 1984.
- "AI IN medical diagnosis and aviation". Software Engineering Notes, 11(2):5, abr. 1986.
- "AIR Force misses target". Computing Australia, 21 ago. 1989.
- BASSEN, H. et alii. "Computerized medical devices: usage trends, problems and safety technology". In: Proceedings of the 7th Annual Conference of IEEE Engineering in Medicine and Biology Society. Chicago, IL, 27-30 set. 1985, pp. 180-5.
- BLACK, D. The Independent, 24 set. 1987.
- BORNING, Alan. "Computer system reliability and nuclear war". Communications of the ACM, 30(2):113, fev. 1987.
- BUBENKO, J. A. Information Systems Methodologies - A Research View, SYSLAB Report nş 40, Suécia, University of Stockholm, 1986.
- BUSINESS Week, 29 mai. 1989 e 17 jul. 1989.
- CANNING, R. G. "Getting the requirements right". EDP Analyzer, 15(7):1-14,1977.
- CHAYES, A. & WIESNER, J. Underestimates and Overexpectations in ABM. New York, Harper and Row, 1969, pp.122-3.
- COATES, James & KILIAN, Michael. Heavy Losses: the Dangerous Decline of American Defense. New York, Penguin, 1986.
- COMPUTER News, 22 out. 1987.
- COOPER, B. & NEWKIRK, D. Risks, nov. 1987.
- "DISPUTE over drug death". The Australian, 8 set. 1987.
- ELLUL, Jacques. The Technological Society. New York, Vintage Books, 1964.
- "EXXON man destroys oil spill documents". The Australian, 4 jul. 1989.
- "FEDERAL Information systems remain highly vulnerable to fraudulent, wasteful, abusive and illegal practices". A Report by the US General Accounting Office (GAO), Masad 82-28, 21 abr. 1982.
- FORESTER, Tom. "Death, injury and damage - the dire tale of systems failure". The Australian, 10 out. 1989.
- FORESTER, Tom. "Programming or chaos: a litany of great and grating software disasters". The Australian, 4 abr. 1989.
- FORESTER, Tom & MORRISON, Perry. Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing. Oxford, Basil Blackwell, 1990, e Cambridge, MA, MIT Press, 1990.
- GLADDEN, G. R. "Stop the lifecycle, I want to get off". Software Engineering Notes, 7(2):35-9, abr. 1982.
- HOFFMAN, Lance J. & MORAN, Lucy M. "Societal vulnerability to computer system failures". Computers and Security, 5:211-17, 1986.
- HOLVAST, Jan. "Vulnerability of information society". In: CLARKE, Roger & CAMERON, Julie (orgs.) Proceedings of SOST'89. Sidney, Austrália, Computer Society, 1989.
- HOPCRAFT, J. E. & KRAFT, D. B. "Toward better computer science". IEEE Spectrum, dez. 1987, pp.58-60.
- INCE, Darrel. "Problems of applied maths". The independent, 30 Jan. 1989.
- "INFORMATION system failures - a survey and classification of the empirical literature". Oxford Surveys in Information Technology, 4, 1987, pp.257-309.
- JACKY, Jonathan. "Programmed for disaster - software errors that imperil lives". The Sciences, set./out. 1989.
- "LAID-off worker sabotages encyclopedia" San ]ose Mercury News, 5 set. 1986.
- LAMB, John. "Computer crashes and the stranded traveller - air traffic control in Britain". New Scientist, 8 set. 1988, p.65.
- LIKEWISE, David Shepherd & WILSON, Greg. "Making chips that work". New Scientist, 13 mai. 1989, pp.39-42.
- MELLOR, Peter. "Can you count on computers". New Scientist, 11 fev. 1989.
- "MORE on proper British programs". Software Engineering Notes 14(1):9, jan. 1989.
- MORRISON, Perry. "An absence of malice: computers and armageddon". Prometheus, 2(2):190-200,1984.
- NEW Scientist, 3 mar. 1988.
- "OECD workshop stresses dependency on computers". Transnational Data Report, 4(5):3-4, mai. 1981.
- PARNAS, David L. 'The Parnas papers". Computers and Society, 14(9):27-36,1985.
- PERROW, Charles. Normal Accidents: Living with High-Risk Technologies. New York, Basic Books, 1984.
- RISKS, 30 jun., 6 e 12 jul. 1989
- ROTHFEDER, Jeffrey. "It's late, costly, incompetent - but try firing a computer system", e "Using the law to rein in computer runaways", Business Week, 7 nov. 1988 e 3 abr. 1989.
- "SABOTEUR tries to blank out Oz". The Australian, 23 nov. 1987, p.1.
- SIBLEY, E. "The evolution of approaches to information systems design methodologies". In: OLLE, T. W.; SOL, H. & VERRITN-STUART, A. (orgs.) Information Systems Design Methodologies: improving the practice, Amsterdam, Nort-Holland, 1986, pp.1-17.
- SOFTWARE Engineering Notes, 10(2):6, abr.1985, 10(5):10, out. 1985, 11(1):9, jan. 1986, 11(2), abr. 1986, 22(3):14, jul. 1986, 22(1), jan. 1987, 13(3):4, Jul. 1988, 13(4):3-5, out. 1988 e 14(2):5-6, abr. 1989.
- "SOFTWARE of strategic defense systems". American Scientist, 73(5):432-40, set./out. 1985.
- "STRAY rodent halts Nasdaq computers". The New York Times, 10 dez. 1987, p.33.
- TAKNASHI, Naruko; TANAKA, Atsushi; YOSHII, Hiraoki & WADA, Yuji. 'The Achilles heel of the Information Society: socioeconomic impacts of the telecommunications cable fire in the Setagaya telephone office, Tokyo". Technological Forecasting and Social Change, 34(1):27-52, 1988.
- THE AUSTRALIAN, 2 fev. 1988 e 21 fev. 1989.
- THE DAILY Telegraph, 3 nov. 1986.
- THE GUARDIAN, 10 nov. 1986.
- THE GUARDIAN Weekly, 17 jul. 1988.
- THE NEW York Times, Science Times Section, 29 jul. 1986, p.C1.
- THE SYDNEY Morning Herald, 4 ago. 1988, p.1-11
- THE VULNERABILITY of Computerized Society e "Considerations and Proposals". Stockholm, Suécia, SARK, (Sarbarhetskommitten), 1978 e 1979.
- THE VULNERABILITY of the information conscious society - European situation, Brussels, Commissions of the European Community, Information Task Force, 1984.
- US Government Accounting Office Report FGMSD-80-4 (1979), apud Software Engineering Notes, 20(5):6, out. 1985.
- "USAF software contractors score poorly". Aviation Week and Space Technology, 14 nov. 1988, p. 103, apud Software Engineering Notes, 14(1):11, jan. 1989.
- WATTS, Susan. "Software row dogs nuclear power plans" e "CEGB rebuffs critics of safety software". New Scientist, 1 abr. 1989 e 5 ago. 1989.
- WINNER, Langdon. Autonomous Technology. Cambridge, MA, MIT Press, 1977.
- WOOLNOUGH, Roger. "Britain scrutinizes software quality". Electronics Engineering Times, 13 jun. 1988, p. 19.
Datas de Publicação
-
Publicação nesta coleção
14 Jun 2013 -
Data do Fascículo
Dez 1991