安全

R. Baecker
{"title":"安全","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0014","DOIUrl":null,"url":null,"abstract":"Safety is often confused with security. A system or an environment may be secure, but if its normal operation does not achieve the intended goals, it may not be safe. Events will not progress as intended, and could go horribly wrong, even to the extent of grave injuries and loss of life. The more society relies upon digital technologies, the more we count on software to assure our safety. The issue of safety arises in a great variety of circumstances. Our discussion will start with dangers to the individual, then we will widen our focus to the organization, to society, and, finally, to the world. The digital divide that discourages internet use among older adults is due in part to threats posed to safe use of computers by ‘evil’ software such as programs that ‘phish’ for personal information, thereby gaining access to finances and committing identity theft, as we have discussed in the previous chapter. We shall enlarge upon this discussion by speaking of another risk—computer rage, which is caused by frustration when users cannot understand or manage the technology. Such instances are especially dangerous for senior citizens. We shall also discuss two ways in which the internet may not be safe for younger people: cyberbullying and revenge porn. We then examine a topic that arises in daily life: safety threats caused to pedestrians, bicyclists, and drivers by the continual use of distracting mobile devices. Our inability to control the costs of large-scale data processing implementations is a threat to the safety and health of organizations and governments, as is our inability to understand, modify, and fix large software systems that are no longer maintained by their creators. We shall describe several software disasters, both during their development and after they have been deployed and used. These include the software crisis at the turn of the century—the Y2K threat—which actually was averted, and several cases in which up to billions of dollars or pounds were wasted, including the decades-long saga of air traffic control in the USA.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Safety\",\"authors\":\"R. Baecker\",\"doi\":\"10.1093/oso/9780198827085.003.0014\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Safety is often confused with security. A system or an environment may be secure, but if its normal operation does not achieve the intended goals, it may not be safe. Events will not progress as intended, and could go horribly wrong, even to the extent of grave injuries and loss of life. The more society relies upon digital technologies, the more we count on software to assure our safety. The issue of safety arises in a great variety of circumstances. Our discussion will start with dangers to the individual, then we will widen our focus to the organization, to society, and, finally, to the world. The digital divide that discourages internet use among older adults is due in part to threats posed to safe use of computers by ‘evil’ software such as programs that ‘phish’ for personal information, thereby gaining access to finances and committing identity theft, as we have discussed in the previous chapter. We shall enlarge upon this discussion by speaking of another risk—computer rage, which is caused by frustration when users cannot understand or manage the technology. Such instances are especially dangerous for senior citizens. We shall also discuss two ways in which the internet may not be safe for younger people: cyberbullying and revenge porn. We then examine a topic that arises in daily life: safety threats caused to pedestrians, bicyclists, and drivers by the continual use of distracting mobile devices. Our inability to control the costs of large-scale data processing implementations is a threat to the safety and health of organizations and governments, as is our inability to understand, modify, and fix large software systems that are no longer maintained by their creators. We shall describe several software disasters, both during their development and after they have been deployed and used. These include the software crisis at the turn of the century—the Y2K threat—which actually was averted, and several cases in which up to billions of dollars or pounds were wasted, including the decades-long saga of air traffic control in the USA.\",\"PeriodicalId\":111342,\"journal\":{\"name\":\"Computers and Society\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers and Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1093/oso/9780198827085.003.0014\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers and Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oso/9780198827085.003.0014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

安全常常与保安混淆。系统或环境可能是安全的,但如果其正常运行不能达到预期目标,则可能不安全。事件不会如预期的那样发展,可能会出现可怕的错误,甚至造成严重的伤害和生命损失。社会对数字技术的依赖程度越高,我们就越依赖软件来确保我们的安全。安全问题在各种各样的情况下都会出现。我们的讨论将从个人面临的危险开始,然后我们将把焦点扩大到组织、社会,最后是世界。数字鸿沟阻碍了老年人使用互联网,部分原因是由于“邪恶”软件对安全使用计算机构成了威胁,例如“网络钓鱼”获取个人信息的程序,从而获得财务和身份盗窃,正如我们在前一章所讨论的那样。我们将在此基础上进一步讨论另一种风险——计算机愤怒,即当用户无法理解或管理技术时产生的挫败感。这种情况对老年人尤其危险。我们还将讨论互联网对年轻人可能不安全的两种方式:网络欺凌和报复性色情。然后我们研究了一个在日常生活中出现的话题:持续使用分散注意力的移动设备对行人、骑自行车的人和司机造成的安全威胁。我们无法控制大规模数据处理实现的成本,这对组织和政府的安全和健康构成了威胁,就像我们无法理解、修改和修复那些不再由其创建者维护的大型软件系统一样。我们将描述几个软件灾难,包括在开发过程中以及部署和使用之后。其中包括世纪之交的软件危机——千年虫威胁——实际上得到了避免,还有几个浪费了数十亿美元或英镑的案例,包括美国长达数十年的空中交通管制传奇。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Safety
Safety is often confused with security. A system or an environment may be secure, but if its normal operation does not achieve the intended goals, it may not be safe. Events will not progress as intended, and could go horribly wrong, even to the extent of grave injuries and loss of life. The more society relies upon digital technologies, the more we count on software to assure our safety. The issue of safety arises in a great variety of circumstances. Our discussion will start with dangers to the individual, then we will widen our focus to the organization, to society, and, finally, to the world. The digital divide that discourages internet use among older adults is due in part to threats posed to safe use of computers by ‘evil’ software such as programs that ‘phish’ for personal information, thereby gaining access to finances and committing identity theft, as we have discussed in the previous chapter. We shall enlarge upon this discussion by speaking of another risk—computer rage, which is caused by frustration when users cannot understand or manage the technology. Such instances are especially dangerous for senior citizens. We shall also discuss two ways in which the internet may not be safe for younger people: cyberbullying and revenge porn. We then examine a topic that arises in daily life: safety threats caused to pedestrians, bicyclists, and drivers by the continual use of distracting mobile devices. Our inability to control the costs of large-scale data processing implementations is a threat to the safety and health of organizations and governments, as is our inability to understand, modify, and fix large software systems that are no longer maintained by their creators. We shall describe several software disasters, both during their development and after they have been deployed and used. These include the software crisis at the turn of the century—the Y2K threat—which actually was averted, and several cases in which up to billions of dollars or pounds were wasted, including the decades-long saga of air traffic control in the USA.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信