Preview

Why Software Systems Fail

Better Essays
Open Document
Open Document
4462 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Why Software Systems Fail
<b>1.0 Introduction</b><br>In this report I will be concentrating on the failure of software systems. To understand why software systems fail we need to understand what are software systems. Software systems are a type of information system. This is because a software system is basically a means for hardware to process information. Flynn 's definition of an information system is:<br><br>"An information system provides procedures to record and make available information, concerning part of an organization, to assist organization-related activities."<br><br>Humans have been processing information manually for thousands of years, but with the vast increase of demand for knowledge this century has meant that a new method of information processing has been needed. Software systems have provided a new means that is much faster and efficient. As a result a huge number of organisations have become software dependent. Some of these systems are used to safeguard the lives of many people. This means that if these systems were to fail they could lead to devastating consequences. Here are some examples of where software systems are used heavily and could be very dangerous if they were to fail - aviation, hospitals, space exploration, nuclear power stations and communications. I will be looking at some examples of actual software failure in these fields to explain the reasons why systems fail.<br><br><b>2.0 Reasons for Systems Failure</b><br>If software systems failure can be so dangerous why can they not be completely eliminated? According to Parnas, "The main reason is that software can never be guaranteed to be 100% reliable. Software systems are discrete-state systems that do not have repetitive structures. The mathematical functions that describe the behaviour of software systems are not continuous, and traditional engineering mathematics do not help in their verification." In other words some software can be so large that thorough testing can be almost


Bibliography: /b><br><li>Flynn, Donal J.; "Information Systems Requirements: Determination and Analysis"; McGraw-Hill Book Company; 1992<br><li>Parnas; 1985; taken from: Sherer, Susan A.; "Software Failure Risk – Measurement and Management"; Plenum Press; 1992<br><li>Jones, Carpers; "Patterns of Software Systems Failure and Success"; Thomson computer press; 1996<br><li>Neumann, Peter G.; "Computer Related Risks"; Addison-Wesley publishing company; 1995<br><li>Petroski, Henry; "To Engineer is Human"; MacMillan Publishing; 1985<br><li>Flowers, Stephen; "Software failure: management failure"; Chichester: John Wiley and Sons; 1996.<br><li>Report of the Inquiry into the London Ambulance Service; February 1993. <br><li>Simpson, Moira (1994); "999!: My computers stopped breathing !"; The Computer Law and Security Report, 10; March – April; pp 76-81<br><li>Dr. Dobbs Journal; January 1997 edition<br><li><a href="http://catless.ncl.ac.uk/Risks">http://catless.ncl.ac.uk/Risks</a><br><li><a href="http://www.scit.wlv.ac.uk ">http://www.scit.wlv.ac.uk </a><br><li><a href="http://www.bbc.co.uk/news">http://www.bbc.co.uk/news</a><br><li><a href="http://abcnews.go.com/sections/travel">http://abcnews.go.com/sections/travel</a>

You May Also Find These Documents Helpful

  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    The <System Name> risk assessment was conducted in accordance with the methodology described in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-30, Risk Management Guide for Information Technology Systems. The methodology used to conduct this risk assessment is qualitative, and no attempt was made to determine any annual loss expectancies, asset…

    • 5647 Words
    • 25 Pages
    Powerful Essays
  • Good Essays

    The use of a software risk management will identify and analyze threats for success (i.e., risks) and reduce the chance of failure of a project (Schmidt, 2011). The process to select and acquire an information system for…

    • 763 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Today we continue to rely on computers and technology more and more throughout our daily lives. Computers are also becoming increasingly powerful and more intelligent. However as computers continue take on more and more of our jobs they are also becoming increasingly vulnerable for errors. “All the troubles of the world” by Isaac Asimov and “Minority Report” were both about computers that are very different. However they both had major flaws in their systems.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Kizza Chapter *

    • 528 Words
    • 3 Pages

    1. Briefly state the main idea of this chapter. Since software in one form or another controls every computer or computer component, it becomes a more important and fundamental part of our life. Even though we may not understand the languages that make up the software, we must be aware of the elements of software that affect its use. Verification and Validation, reliability, security, safety, and quality are some of the major points examined and brought to light. It delves into the various reasons of why software fails and who is responsible. More importantly, it covers what consumer protection exists and the rights of software buyer's.…

    • 528 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    Farahmand, & F., Navathe, & S., Sharp, G., & Enslow, P., Assessing Damages of Information Security Incidents and Selecting Control Measures, a Case Study Approach, Retrieved March 11, 2012, from http://infosecon.net/workshop/pdf/39.pdf…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    FISMA Analysis Paper

    • 1671 Words
    • 7 Pages

    Agencies must produce a total, accurate, and complete assessment of all information and systems including security status, risk, and remediation (IBM, 2007). However, this can be very taxing when systems are “spread across many organizations and geographies” (IBM, 2007, 4.)…

    • 1671 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Week 7 Research Paper Sun

    • 1241 Words
    • 4 Pages

    “Hardware is the physical embodiment of an information system. It is one of the main elements which creates the information system cycle” (n. d.). Operational of business information systems depends on the particular hardware environment, such as various types of databases and web servers, LAN, INTERNET, bank POS terminals, etc. These environments rely on a large number of hardware devices that have a failure rate. When failure occurs, it will inevitably affect the normal operation of information systems. Failure often occurs mainly in electrical machinery and other aspects of hard faults. These failures of hardware are more frequent.…

    • 1241 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Software errors pose a constant threat to information systems, causing untold losses in productivity. Growing complexity and size of software programs, coupled with demands for timely delivery to markets, have contributed to an increase in software flaws or vulnerabilities. A major problem with software is the presence of hidden bugs or program code defects. Studies have shown that it is virtually impossible to eliminate all bugs from large programs. Flaws in commercial software not only impede performance but also create security vulnerabilities that open networks to intruders. To correct software flaws once they are identified, the software vendor creates small pieces of software called patches to repair the flaws without disturbing the proper operation of the software. Organizations must maintain best efforts to both make sure purchased software is up to date and make sure their own software and programming is as bug-free as possible by employing software…

    • 890 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A rather common and enormous issue that can come up is budgeting more often than not a project that is undertaken will be exceptionally underestimated. So when resources begin to run out the project is brought to a standstill and…

    • 666 Words
    • 3 Pages
    Good Essays
  • Best Essays

    London Ambulance Service’s 1992 computer aided dispatch (CAD) software system failure demonstrated the damaging effect that a small error in software can have on a large scale project l. However, a closer investigation of events surrounding the system failure indicates that there was more to the failure than an error in software. The aim of this report is to highlight the errors encountered in this project.…

    • 3083 Words
    • 13 Pages
    Best Essays
  • Better Essays

    PAYOFF DIAGRAM

    • 5766 Words
    • 24 Pages

    To be useful, the information system must possess the characteristic of reliability, relevance, understandability, complete, accurate and comparability. However, in order for Encik Khalid to detect problems occur with the current or new system are based on the characteristics of bad system which are unreliable, irrelevance, not understandable, incomplete, inaccurate, and incomparable.…

    • 5766 Words
    • 24 Pages
    Better Essays
  • Good Essays

    The software crisis can be defined as the delivery of the software after the schedule date or a software product with bugs or more errors can cause large financial losses to the software. The major cause of software crisis is the problems associated with poor quality software such as malfunctioning of software systems, inefficient development of software, and dissatisfaction amongst the users of the software. It is the growing problem in 21st century as the complexity of the system and the users of the computer systems have increased the programmers are struggling to satisfy all the needs of the users to create a software without no bugs and in time. As mentioned in the survey conducted by Standish Group on 365 IT managers it revealed that 31% of the projects are canceled before completion. Though the 53% of the projects have been completed but they have over budget and could not been delivered in time. These projects also could not meet original specifications. The successful projects which are completed in time are only 16.2% in medium company size and 9% in high and 28% in small company size where all the features and functionalities which were specified are met.…

    • 1926 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    I.T PPT

    • 256 Words
    • 2 Pages

    Safety is an emergent property of whole systems; software may play only a small part.…

    • 256 Words
    • 2 Pages
    Satisfactory Essays