CSC 379 SUM2008:Week 5, Group 2: Difference between revisions
(add of initial content) |
No edit summary |
||
Line 6: | Line 6: | ||
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html | * http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html | ||
==Introduction== | |||
==Proprietary Systems== | |||
===Advantages=== | |||
===Disadvantages=== | |||
==Open Source System== | |||
===Advantages=== | |||
===Disadvantages=== |
Revision as of 22:47, 6 August 2008
Open Non-Proprietary Technology vs. Closed Proprietary Technology
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology. On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code. On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them. What bearing does this discussion have on other types of software systems? Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll). What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications? Are there applications where one or the other should clearly be used? Are there applications for which neither is appropriate? Please explain your answers.