Foreword |
|
ix | |
|
Introduction |
|
1 | (14) |
|
I.1 What's the Dark Side? |
|
|
1 | (14) |
|
|
2 | (1) |
|
I.1.2 Who Cares About the Dark Side? |
|
|
3 | (2) |
|
I.1.3 How Dark is the Dark Side? |
|
|
5 | (2) |
|
I.1.4 What Else is on the Dark Side? |
|
|
7 | (1) |
|
I.1.5 Ethics and the Dark Side |
|
|
8 | (3) |
|
I.1.6 Personal Anecdotes About the Dark Side |
|
|
11 | (3) |
|
|
14 | (1) |
|
|
15 | (228) |
|
|
17 | (64) |
|
1.1 Introductory Case Studies and Anecdotes |
|
|
17 | (7) |
|
1.1.1 A Faculty Feedback System |
|
|
18 | (3) |
|
1.1.2 An Unusual Cooperative Effort |
|
|
21 | (1) |
|
1.1.3 Lack of Cooperation due to Self Interest |
|
|
22 | (1) |
|
|
22 | (2) |
|
1.1.5 Thwarting the Evil Union |
|
|
24 | (1) |
|
1.2 The Survey: Impact of Subversive Stakeholders On Software Projects |
|
|
24 | (13) |
|
|
25 | (1) |
|
|
26 | (1) |
|
1.2.3 The Survey Findings |
|
|
27 | (7) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (44) |
|
1.3.1 Sample Answers to the Question: "What Were the Motivations and Goals of the Subversive Stakeholders?" |
|
|
37 | (8) |
|
1.3.2 Sample Answers to the Question "How Were the Subversive Attacks Discovered?" |
|
|
45 | (4) |
|
1.3.3 Sample Answers to the Question "How Can Projects be Defended Against Subversive Stakeholders?" |
|
|
49 | (7) |
|
1.4 A Follow-Up to the Survey: Some Hypotheses and Related Survey Findings |
|
|
56 | (24) |
|
|
80 | (1) |
|
|
81 | (32) |
|
2.1 Introductory Case Studies and Anecdotes |
|
|
81 | (5) |
|
2.2 Incidents of Lying: The Survey |
|
|
86 | (9) |
|
|
87 | (1) |
|
|
87 | (1) |
|
2.2.3 An Overview of the Problem |
|
|
88 | (1) |
|
2.2.4 Clarification of Terms |
|
|
89 | (4) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
2.3 Qualitative Survey Responses on Lying |
|
|
95 | (1) |
|
2.4 What Can Be Done About Lying? |
|
|
96 | (11) |
|
2.5 The Questionnaire Used in the Survey |
|
|
107 | (6) |
|
|
112 | (1) |
|
|
113 | (44) |
|
3.1 Case Studies of Attacks and Biographies of Hackers |
|
|
113 | (5) |
|
3.2 Cyber Terrorism and Government-Sponsored Hacking |
|
|
118 | (3) |
|
3.3 The Hacker Subculture |
|
|
121 | (11) |
|
3.3.1 Why They Are Called "Hackers" |
|
|
121 | (1) |
|
3.3.2 Motivation of Hackers |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (7) |
|
3.3.5 Public Opinion about Hackers |
|
|
130 | (2) |
|
3.4 How a Hacker Is Identified |
|
|
132 | (3) |
|
3.5 Time Line of a Typical Malware Attack |
|
|
135 | (1) |
|
3.6 Hacker Economy: How Does a Hacker Make Money? |
|
|
136 | (6) |
|
|
142 | (11) |
|
3.7.1 Social Engineering Examples and Case Studies |
|
|
143 | (8) |
|
3.7.2 Tactics of Social Engineering |
|
|
151 | (2) |
|
|
153 | (1) |
|
|
154 | (3) |
|
Chapter 4 Theft Of Information |
|
|
157 | (18) |
|
|
157 | (1) |
|
|
158 | (6) |
|
|
158 | (3) |
|
|
161 | (3) |
|
4.3 How Do the Victims Find Out That Their Secrets Are Stolen? |
|
|
164 | (2) |
|
4.4 Intellectual Property Protection |
|
|
166 | (4) |
|
4.4.1 Trade Secret Protection |
|
|
167 | (2) |
|
4.4.2 Copyright Protection |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
4.5 Open Versus Closed Source |
|
|
170 | (5) |
|
|
175 | (14) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (8) |
|
5.3.1 Sweden Versus Russia |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
5.3.4 GM versus VW: Jose Ignacio Lopez |
|
|
179 | (1) |
|
5.3.5 British Midland Tools |
|
|
179 | (1) |
|
|
180 | (1) |
|
5.3.7 Proctor & Gamble versus Unilever |
|
|
181 | (1) |
|
5.3.8 News Corp Versus Vivendi |
|
|
181 | (1) |
|
5.3.9 Spying Was A TI Chip Really Stolen by a French Spy? |
|
|
181 | (2) |
|
|
183 | (2) |
|
|
185 | (4) |
|
|
187 | (2) |
|
Chapter 6 Disgruntled Employees And Sabotage |
|
|
189 | (24) |
|
6.1 Introduction and Background |
|
|
189 | (3) |
|
6.2 Disgruntled Employee Data Issues |
|
|
192 | (7) |
|
|
192 | (2) |
|
|
194 | (2) |
|
|
196 | (3) |
|
|
199 | (1) |
|
6.3 Disgruntled Employee Software Issues |
|
|
199 | (1) |
|
6.3.1 Software Destruction |
|
|
199 | (1) |
|
6.4 Disgruntled Employee System Issues |
|
|
200 | (6) |
|
6.5 What to Do About Disgruntled Employee Acts |
|
|
203 | (3) |
|
|
206 | (7) |
|
|
212 | (1) |
|
Chapter 7 Whistle-Blowing |
|
|
213 | (30) |
|
7.1 A Hypothetical Scenario |
|
|
215 | (2) |
|
7.2 Whistle-Blowing and Software Engineering |
|
|
217 | (3) |
|
7.3 More Case Studies and Anecdotes |
|
|
220 | (23) |
|
7.3.1 Jeffrey Wigand and Brown and Williamson Tobacco |
|
|
220 | (1) |
|
7.3.2 A Longitudinal Study of Whistle-Blowing |
|
|
221 | (1) |
|
7.3.3 An Even More Pessimistic View |
|
|
222 | (1) |
|
7.3.4 Academic Whistle-Blowing |
|
|
223 | (1) |
|
7.3.5 The Sum Total of Whistle-Blowing |
|
|
224 | (1) |
|
|
225 | (2) |
|
Appendix To Chapter 7 PRACTICAL IMPLICATIONS OF THE RESEARCH INTO WHISTLE-BLOWING |
|
|
227 | (13) |
|
|
240 | (3) |
|
PART 2 VIEWPOINTS ON DARK SIDE ISSUES |
|
|
243 | (56) |
|
|
243 | (2) |
|
Chapter 8 Opinions, Predictions, And Beliefs |
|
|
245 | (24) |
|
|
246 | (12) |
|
|
|
257 | (1) |
|
8.2 Let's Play Make Believe |
|
|
258 | (3) |
|
|
|
260 | (1) |
|
8.3 Dark, Light, or Just Another Shade of Grey? |
|
|
261 | (3) |
|
|
8.4 Rational Software Developers as Pathological Code Hackers |
|
|
264 | (5) |
|
|
Chapter 9 Personal Anecdotes |
|
|
269 | (30) |
|
9.1 An Officer and a Gentleman Confronts the Dark Side |
|
|
270 | (3) |
|
|
9.2 Less Carrot and More Stick |
|
|
273 | (3) |
|
|
|
275 | (1) |
|
9.3 "Them and Us": Dispatches from the Virtual Software Team Trenches |
|
|
276 | (5) |
|
|
9.4 What is it to Lie on a Software Project? |
|
|
281 | (3) |
|
|
9.5 "Merciless Control Instrument" and the Mysterious Missing Fax |
|
|
284 | (5) |
|
|
|
289 | (3) |
|
|
9.7 Hard-Headed Hardware Hit Man |
|
|
292 | (2) |
|
|
9.8 A Lighthearted Anecdote |
|
|
294 | (5) |
|
Conclusions |
|
299 | (4) |
Index |
|
303 | |