Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Series page
Title page
Copyright page
FOREWORD
INTRODUCTION
I.1 WHAT’S THE DARK SIDE?
Part 1: DARK SIDE ISSUES
CHAPTER 1 SUBVERSION
1.1 INTRODUCTORY CASE STUDIES AND ANECDOTES
1.2 THE SURVEY: IMPACT OF SUBVERSIVE STAKEHOLDERS ON SOFTWARE PROJECTS
1.3 SELECTED RESPONSES
1.4 A FOLLOW-UP TO THE SURVEY: SOME HYPOTHESES AND RELATED SURVEY FINDINGS
CHAPTER 2 LYING
2.1 INTRODUCTORY CASE STUDIES AND ANECDOTES
2.2 INCIDENTS OF LYING: THE SURVEY
2.3 QUALITATIVE SURVEY RESPONSES ON LYING
2.4 WHAT CAN BE DONE ABOUT LYING?
2.5 THE QUESTIONNAIRE USED IN THE SURVEY
CHAPTER 3 HACKING
3.1 CASE STUDIES OF ATTACKS AND BIOGRAPHIES OF HACKERS
3.2 CYBER TERRORISM AND GOVERNMENT-SPONSORED HACKING
3.3 THE HACKER SUBCULTURE
3.4 HOW A HACKER IS IDENTIFIED
3.5 TIME LINE OF A TYPICAL MALWARE ATTACK
3.6 HACKER ECONOMY: HOW DOES A HACKER MAKE MONEY?
3.7 SOCIAL ENGINEERING
3.8 A LINGERING QUESTION
3.9 LATE-BREAKING NEWS
CHAPTER 4 THEFT OF INFORMATION
4.1 INTRODUCTION
4.2 CASE STUDIES
4.3 HOW DO THE VICTIMS FIND OUT THAT THEIR SECRETS ARE STOLEN?
4.4 INTELLECTUAL PROPERTY PROTECTION
4.5 OPEN VERSUS CLOSED SOURCE
CHAPTER 5 ESPIONAGE
5.1 INTRODUCTION
5.2 WHAT IS ESPIONAGE?
5.3 CASE STUDIES
5.4 CYBER WARFARE
CHAPTER 6 DISGRUNTLED EMPLOYEES AND SABOTAGE
6.1 INTRODUCTION AND BACKGROUND
6.2 DISGRUNTLED EMPLOYEE DATA ISSUES
6.3 DISGRUNTLED EMPLOYEE SOFTWARE ISSUES
6.4 DISGRUNTLED EMPLOYEE SYSTEM ISSUES
6.5 WHAT TO DO ABOUT DISGRUNTLED EMPLOYEE ACTS
6.6 SABOTAGE
CHAPTER 7 WHISTLE-BLOWING
7.1 A HYPOTHETICAL SCENARIO
7.2 WHISTLE-BLOWING AND SOFTWARE ENGINEERING
7.3 MORE CASE STUDIES AND ANECDOTES
Appendix to Chapter 7
PRACTICAL IMPLICATIONS OF THE RESEARCH INTO WHISTLE-BLOWING
Part 2: VIEWPOINTS ON DARK SIDE ISSUES
CHAPTER 8 OPINIONS, PREDICTIONS, AND BELIEFS
8.1 AUTOMATED CRIME
8.2 LET’S PLAY MAKE BELIEVE
8.3 DARK, LIGHT, OR JUST ANOTHER SHADE OF GREY?
8.4 RATIONAL SOFTWARE DEVELOPERS AS PATHOLOGICAL CODE HACKERS
CHAPTER 9 PERSONAL ANECDOTES
9.1 AN OFFICER AND A GENTLEMAN CONFRONTS THE DARK SIDE
9.2 LESS CARROT AND MORE STICK
9.3 “THEM AND US”: DISPATCHES FROM THE VIRTUAL SOFTWARE TEAM TRENCHES
9.4 WHAT IS IT TO LIE ON A SOFTWARE PROJECT?
9.5 “MERCILESS CONTROL INSTRUMENT” AND THE MYSTERIOUS MISSING FAX
9.6 FOREST OF ARDEN
9.7 HARD-HEADED HARDWARE HIT MAN
9.8 A LIGHTHEARTED ANECDOTE
CONCLUSIONS
Index
← Prev
Back
Next →
← Prev
Back
Next →