Enhancing Software Secureness in Public ICT Applications

related to security and privacy of information under processing have been topics of great public interest. A perception of existence of an insecure channel of communication is usually created, which needed attention by experts. Most discussions also assume, among other issues, neutrality of the operating environment under which the principles of security or control for privacy are applied. Additionally, a standard image of a sender and receiver is posited to convey neutrality of the human agency involved in trans-reception of secure information. This article purports to view contradictions in the theme of security, when neutrality of software environment is contested or when the interests of human agency involved in trans-reception of information are in conflict. A shift of this nature is necessary because a proprietary software environment may be completely transparent to its developer community, even while remaining opaque or insecure to its user community.

[1]  Nancy R. Mead,et al.  Software Security Engineering: A Guide for Project Managers , 2004 .

[2]  K. G. Rajalekshmi E-governance services through telecenters: The role of human intermediary and issues of trust , 2007 .

[3]  CRISPIN COWAN,et al.  Software Security for Open-Source Systems , 2003, IEEE Secur. Priv..

[4]  Chiara Francalanci,et al.  An Empirical Study on the Relationship among Software Design Quality , Development Effort , and Governance in Open Source Projects , 2008 .

[5]  Frederic T. Chong,et al.  Secure information flow analysis for hardware design: using the right abstraction for the job , 2010, PLAS '10.

[6]  C. Jones,et al.  Software metrics: good, bad and missing , 1994, Computer.

[7]  Gary Mcgraw Software security , 2004, IEEE Security & Privacy Magazine.

[8]  Eric S. Raymond,et al.  The cathedral and the bazaar - musings on Linux and Open Source by an accidental revolutionary , 2001 .

[9]  Michael Tiemann,et al.  An objective definition of open standards , 2006, Comput. Stand. Interfaces.

[10]  R. Dromey,et al.  A Model for Software Product Quality , 1995, IEEE Trans. Software Eng..

[11]  Taghi M. Khoshgoftaar,et al.  A multiobjective module-order model for software quality enhancement , 2004, IEEE Transactions on Evolutionary Computation.

[12]  C. K. Raju,et al.  Software Secureness for Users: Significance in Public ICT Applications , 2011, ACC.

[13]  Barry W. Boehm,et al.  Quantitative evaluation of software quality , 1976, ICSE '76.