


default search action
Journal of Systems and Software (JSS), Volume 17
Volume 17, Number 1, January 1992
- Raymond A. Paul:
Readers' corner. 1-3 - Donald Gotterbarn
:
Editor's corner : Professional computer ethics. 5-6 - Batya Friedman, Peter H. Kahn Jr.:
Human agency and responsible computing: Implications for computer system design. 7-14 - Göran Collste:
Expert systems in medicine and moral responsibility. 15-22 - W. Robert Collins, Keith W. Miller:
Paramedic ethics for computer professionals. 23-38 - Michael C. McFarland:
Broadening the basis for ethical analysis. 39-40 - Eugene H. Spafford:
Are computer hacker break-ins ethical? 41-47 - Laura M. Leventhal, Keith Instone, David W. Chilson:
Another view of computer science ethics: Patterns of responses among computer scientists. 49-60 - Heinz C. Luegenbiehl:
Computer professionals: Moral autonomy and a code of ethics. 61-68 - Ernest A. Kallman:
Developing a code for ethical computer use. 69-74 - Donald Gotterbarn
:
The use and abuse of computer ethics. 75-80 - Riva Wenig Bickel, María M. Larrondo-Petrie
, David F. Bush:
EDICT for computer ethics education. 81-89 - Craig Summers, Eric Markusen:
Computers, ethics, and collective violence. 91-103
Volume 17, Number 2, February 1992
- Robert L. Glass:
Editor's corner The best and worst of software in the 1980s. 109-110 - John C. Kelly, Joseph S. Sherif, Jonathan M. Hops:
An analysis of defect densities found during software inspections. 111-117 - Srinivasarao Damerla, Sol M. Shatz:
Software complexity and ada rendezvous: Metrics based on nondeterminism. 119-127 - James M. Purtilo, Elizabeth L. White:
A flexible program adaptation system: Case studies in Ada. 129-143 - William G. Bulgren, Victor Frost, ChiShih Chang:
A model for interconnected LANs with general arrivals. 145-153 - Prabha Gopinath, Rajiv Ramnath, Karsten Schwan:
Data base design for real-time adaptations. 155-167 - K. P. Ventouris, Panayiotis E. Pintelas:
A practical assessment of formal specification approaches for data abstractions. 169-188 - Robert L. Glass, Iris Vessey:
Toward a taxonomy of software application domains: History. 189-199
Volume 17, Number 3, March 1992
- Robert L. Glass:
Editor's corner : The importance of software quality in the 1990s. 203-204 - Guus P. A. J. Delen, Daan B. B. Rijsenbrij:
The specification, engineering, and measurement of information systems quality. 205-217 - David N. Card:
Designing software for producibility. 219-225 - C. Samuel Hsieh, Elizabeth A. Unger, Ramón A. Mata-Toledo:
Using program dependence graphs for information flow control. 227-232 - Yiu-Wing Leung:
Optimum software release time with a given cost budget. 233-242 - Frank G. F. Davis, Rex E. Gantenbein:
Responding to catastrophic errors: A design technique for fault-tolerant software. 243-251 - Jianhui Tian, Marvin V. Zelkowitz:
A formal program complexity model and its application. 253-266 - Ramón A. Mata-Toledo, David A. Gustafson:
A factor analysis of software complexity measures. 267-273 - Beth McColl, James C. McKim:
Evaluating and extending npath as a software complexity measure. 275-279 - Robert N. Britcher:
Controversy corner : Cards, couriers, and the race to correctness. 281-284

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.