Subject: RISKS DIGEST 14.78
REPLY-TO: [email protected]

RISKS-LIST: RISKS-FORUM Digest  Tuesday 27 July 1993  Volume 14 : Issue 78

       FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS
  ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

 Contents:
Computer-aided tax fraud (Mich Kabay)
Industrial Espionage (Mich Kabay)
Stingers (Bob Frankston)
Chinese Airline Crashed a British Aerospace-made 146 "Whisperjet" (Li Gong)
Biz Card Machine -- New Risk! (Dan Hartung)
Re: Earthquake "early warning" systems (Lauren Weinstein, Brian Herzog)
Re: Credit Cards on the Internet (Blake Sobiloff, Nandakumar Sankaran,
   Matt Crawford)
Re: Seecof's reading ability (Mark Seecof)
Dependability conference; call for participants (Jeremy Jacob)
High-assurance software courses (Nancy Leveson)
Centre for Software Reliability Workshop 1993 (Pete Mellor)

The RISKS Forum is a moderated digest discussing risks; comp.risks is its
Usenet counterpart.  Undigestifiers are available throughout the Internet,
but not from RISKS.  Contributions should be relevant, sound, in good taste,
objective, cogent, coherent, concise, and nonrepetitious.  Diversity is
welcome.  CONTRIBUTIONS to [email protected], with appropriate, substantive
"Subject:" line.  Others may be ignored!  Contributions will not be ACKed.
The load is too great.  **PLEASE** INCLUDE YOUR NAME & INTERNET FROM: ADDRESS,
especially .UUCP folks.  REQUESTS please to [email protected].

Vol i issue j, type "FTP CRVAX.SRI.COM<CR>login anonymous<CR>AnyNonNullPW<CR>
CD RISKS:<CR>GET RISKS-i.j<CR>" (where i=1 to 14, j always TWO digits).  Vol i
summaries in j=00; "dir risks-*.*<CR>" gives directory; "bye<CR>" logs out.
The COLON in "CD RISKS:" is essential.  "CRVAX.SRI.COM" = "128.18.10.1".
<CR>=CarriageReturn; FTPs may differ; UNIX prompts for username, password.

For information regarding delivery of RISKS by FAX, phone 310-455-9300
(or send FAX to RISKS at 310-455-2364, or EMail to [email protected]).

ALL CONTRIBUTIONS CONSIDERED AS PERSONAL COMMENTS; USUAL DISCLAIMERS APPLY.
Relevant contributions may appear in the RISKS section of regular issues
of ACM SIGSOFT's SOFTWARE ENGINEERING NOTES, unless you state otherwise.

----------------------------------------------------------------------

Date: 27 Jul 93 11:16:20 EDT
From: "Mich Kabay / JINBU Corp." <[email protected]>
Subject: Computer-aided tax fraud

 By Denise Lavoie, Associated Press Writer (from the AP)

 Norwalk, Conn. (AP) -- A day after its owner admitted cheating the
 government out of $6.7 million in taxes, Stew Leonard's dairy and produce
 store was accused Friday of mislabeling weights on hundreds of items.

It seems that almost half of 2,658 tested products were short-weighted or had
no weight listed on the label.  As for the tax fraud, the criminals apparently
removed records of $17.1 million in sales figures "in a computer-aided tax
fraud scheme."  The data diddling meant they failed to pay $6.7 million in
taxes. The penalty is that they must pay $15 million in back taxes and fines.

Would someone from that area of the country please post additional details
on how the computer scam operated?

Michel E. Kabay, Ph.D., Director of Education, National Computer Security Assn

------------------------------

Date: 27 Jul 93 11:16:36 EDT
From: "Mich Kabay / JINBU Corp." <[email protected]>
Subject: Industrial Espionage

Lopez Said To Order GM Papers; Volkswagen Denies Receiving Documents
Washington Post, 23 July 1993
By Frank Swoboda and Rick Atkinson, Washington Post Staff Writers

 Secret General Motors documents seized recently at a Wiesbaden apartment
 by German investigators were prepared at the request of former GM executive
 Jose Ignacio Lopez de Arriortua before he joined rival Volkswagen, German
 prosecutors said yesterday.

The article goes on to explain that the documents included information about
Opel (General Motors in Europe) new Vectra car and about a top-secret "O" car.
Both Lopez and VW deny any impropriety and denounced the prosecutor's public
announcement.  An intensive search of VW's computer systems is apparently
going on to see if GM proprietary data have been stored there.

Michel E. Kabay, Ph.D., Director of Education, National Computer Security Assn

------------------------------

Date: Tue, 27 Jul 1993 11:53 -0400
From: [email protected]
Subject: Stingers

There was a recent article about the US trying to buy back Stinger
antiaircraft missiles before they got sold to others.

This sounds like another version of the stories about government
installations being rather lax about complying with pollution control
requirements. Similarly, security considerations should include a time limit
on small powerful weapons. I presume that worry about the future is not a
checklist item. Does anyone on this list know more about the issues involved?

------------------------------

Date: Mon, 26 Jul 93 11:32:31 -0700
From: Li Gong <[email protected]>
Subject: Chinese Airline Crashed a British Aerospace-made 146 "Whisperjet"

BEIJING (UPI, July 23, 1993) -- [PGN Excerpting Service]

A Chinese Northwest Airlines flight carrying 113 people bounced off the runway
and plunged into a lake in Yinchuan, the capital of Ningxia province, in a
remote part of west China, on 23 Jul 1993, killing 59 people.  The airliner
attempted two takeoffs.  The first was aborted.  On the second, it ran off the
runway, dropped into a lake, and broke apart.  Flight 2119, a British
Aerospace 146, was on a scheduled flight to Beijing.  Ian Watson, director of
regional operations for British Aerospace, said that "In the 10 years since it
came into service, the BA-146 has compiled one of the finest safety records in
the world."

The last major airline disaster in China occurred in November when a China
Southern Airlines Boeing 737 crashed into a mountain in the south China
tourist city of Guilin, killing all 141 aboard.  China has halted the
establishment of new airline companies to improve air safety and tighten
control over expansion in civil aviation.  About 35 airline companies have
sprouted up in China since CAAC relinquished control over the industry in
1988, faster growth than in any other country.

China has only 109 airports, a fraction of those in developed countries, but
passenger volume rose more than 24 percent in the first half of this year over
last year.

------------------------------

Date: Mon, 26 Jul 93 12:55 CDT
From: [email protected] (Dan Hartung)
Subject: Biz Card Machine -- New Risk!

An unusual (and probably unexpected) risk has appeared -- business card
vending machines.  I saw my first one at a service plaza on the Indiana Toll
Road (I-80/90).  Basically, it's a simplified desktop publisher that will
print out a variety of business card formats; you just enter your information.
The prices were, of course, outrageous -- whereas I paid something less than 2
cents/card last time I had some printed professionally, this was at least 10
times that, even in quantity.  Well, I suppose that a traveling salesman in an
emergency ....

Anyway, the risk comes in here: the instructions suggest that you first
purchase a small number of cards to be sure they print correctly; you can
later put in more money and print out a larger quantity if you like what you
see.  Then this: "The machine stores your information for several minutes."

So, presumably, one could walk away from one of these machines with your cards
reading "John Smith, Computer Consultant, 10 Takeita Way, Suckerstown, MD" and
return from your business trip to find your house burgled of everything
resembling a computer ... simply because someone went up to the machine after
you left and printed out a set of their own.  Or a woman could give away,
unwittingly, her otherwise unlisted home phone number to a deep breather.  And
so on.

Again, as with so many of the risks discussed here, there is a debatable
amount of privacy invasion on what is basically public information ...  but
information that is given to people you would otherwise NOT want to have it.

Postscript: another risk was illustrated here -- a sample "business card"
inscribed with a semiliterate harangue along the lines of "You shouldn't park
here, your license plate has been recorded by an anal-retentive mentally
unstable person, and if you park here again a pickup truck with no insurance
will wipe it back and forth along that nearby concrete wall."  More or less
identical in demeanor to the mail one gets for mis-posting.  Three times as
long, of course, and partly CAPITALIZED in TIME-HONORED Usenet NEWBIE style.
Yet I believe that such a card, slipped under someone's wiper, would
constitute legal assault.  (IANAL.)  And these people are *advocating* this?
Yikes.

------------------------------

Date: Wed, 21 Jul 93 21:17 PDT
From: [email protected] (Lauren Weinstein)
Subject: Re: Earthquake "early warning" systems

Living here in the L.A. area, where earthquakes are certainly more than an
academic concern, I can't help but question the usefulness of a warning system
that gives, perhaps, 15 to 30 seconds of panic time.  And I do mean panic
time--because that's what most people would do.  Primarily, most folks would
probably try to rush out of buildings (just like they do when quakes start,
even though they should know better).  Lots of them will get out the door just
in time to get hit by falling debris when the quake hits, which they could
have avoided if they had just stayed inside.

That's all assuming that the quake *does* hit.  If the alarm is false, you
can bet that the *next* time the alarm fires it will be generally
ignored--for better or worse.

One can certainly argue that the solution is education and training
and such--but human nature being what it is, you can bet that if people
believe the alarm, most of them are going to do pretty much the wrong
thing in response, especially when the duration in which to act
is very short.  The real effort should go into upgrading of older
buildings that predate modern earthquake area construction standards--
it's with those buildings that most injuries and deaths are likely
to occur.

I'm reminded of an old "Saturday Night Live" skit.  It was a fake
commercial for a device passengers could carry on planes that would give
them 10 seconds warning (or some such) of midair collisions.  The guy
is sitting calmly in his seat when the box starts beeping.  He grabs
it and stares at its display.  He yells:

"We're going to be hit by a 747!  (SCREAM!)"

--Lauren--

------------------------------

Date: Sun, 25 Jul 1993 13:45:40 +0800
From: [email protected] (Brian Herzog - SunSoft Product Engineering)
Subject: Re: Earthquake `early' warning system (Stead, RISKS-14.77)

>The most damaging waves will arrive no earlier than an average
>velocity of 4.5 km/s.  This would appear to give 45 seconds warning at 100 km.

Er, my calculator says this would give 22 seconds warning at 100 km,
which makes the economic feasibility of an early warning system even
worse than stated.  I do hope the quote above is a typical email typo,
and not an accurate extraction from the California study!

Brian Herzog  <[email protected]>

------------------------------

Date: Thu, 22 Jul 1993 13:47:26 -0500
From: [email protected] (Blake Sobiloff)
Subject: Re: Credit Cards on the Internet

(I hope this doesn't sound too much like an advertisement...) Reiter's
Scientific & Professional Books, a great bookstore in Washington, D.C., is now
on the Internet and is accepting credit card orders over the Internet for book
orders. Orders and inquiries can be sent to "[email protected]" while comments
can be sent to "[email protected]".

I enquired about exactly how they wanted me to give them my credit card
number, and they replied that they actually prefer to set up an account over
the phone with the pertinent information, and then give you an account number.
You then transmit the account number to them via email to place an order. They
did not, however, reject the possibility of conducting business via email
without voice verification.

My suggestion to look into public key encryption went unanswered...

Blake Sobiloff, Laboratory for Automation Psychology, Department of Psychology
University of Maryland, College Park, MD  20742-4411  <[email protected]>

------------------------------

Date: Thu, 22 Jul 93 12:56:26 EDT
From: [email protected]
Subject: Credit Cards on the Internet

This is further to the ongoing discussion on using credit cards over the
internet. To ensure security and escape the (possibly) prying eyes of
administrators at the sites through which a mail (ordering a product to
be paid through a credit card) passes, the sender could encrypt his/her
request. The key used for encryption could be a special INTERNET PIN that
the credit card company assigns while issuing the card, just like the one
assigned for ATM transactions through the card.

at the receiving end, the dealer simply forwards the mail to the credit
card company and waits for authorization from them. the dealer does not
know the card number since the mail is encrypted.

the credit card company could decrypt the mail, since they know the sender's
name and maybe the ZIP code (of course when the mail is encrypted, this
information should not be) and hence can find out the card number and the
special INTERNET PIN. once they decrypt the mail, they can verify if the
original sender listed the correct card number in his/her mail. once verified,
they can authorize the dealer to accept the request depending on the cost of
the product and the balance on the customer's account.

Nandakumar Sankaran, G34, Jordan Hall, Clemson University, Clemson, SC 29634
(803) 656 6979  [email protected]

------------------------------

Date: Thu, 22 Jul 93 20:17:46 CDT
From: [email protected] (Matt Crawford)
Subject: Re: Credit Cards on the Internet (Robinson, RISKS-14.77)

> (1) Soliciting CC transactions might violate the Acceptable Use
>     Provisions (doesn't apply if your feed is from a commercial
>     internet connection.)

I believe the parenthetical remark is quite incorrect.  Traffic on sponsored
networks must conform to the AUPs, even if it originates on a commercial net.
I know I received a couple of solicitations out of the blue from people who
didn't understand this, and who now know better.

Matt Crawford

------------------------------

Date: Wed, 21 Jul 93 16:26:48 -0700
From: Mark Seecof <[email protected]>
Subject: Seecof's reading ability

Despite Bidzos' attempt to bolster his DSS royalty defense by attacking my
literacy (he's wrong, BTW) and by weaseling that a "royalty" is not a "tax" (I
only said an unavoidable royalty "amounted to" a tax) I think he fails to show
that my comparison of NIST/PKP's proposal to a tax is invalid.  Bidzos could
have argued that it was overdrawn, less apt than another analogy, or even
wrong on some concrete grounds.  But his complaints are weak if strident.  And
talk about charging for DSS implementations rather than uses (at least for the
nonce) draws a distinction without a difference.  The U.S. taxes bottles of
liquor, not individual drinks poured at home, but economists will agree that
you pay every time you swallow.  Whether a tax is mills per ton or dollars per
ounce is not the point, anyway.  As for that $1 per certificate... Bidzos says
users won't pay it--I think he's wrong.  Users pay for everything in the end.

Also, the stuff about "free for government use" is smokescreen.  It's private
use that matters, including, especially, private use to communicate with the
government.  I cannot find, even by the closest scrutiny of the NIST/PKP
announcement, any promise to relieve users of royalties on products they use
to communicate with the government.  (Possible loophole: gov't could supply
DSS implementations to users royalty free; but that would depart from custom.)

Mark Seecof

------------------------------

Date: Tue, 27 Jul 93 08:59:08 BST
From: [email protected]
Subject: Dependability conference; call for participants

       Institute of Mathematics and Its Applications
       Conference on THE MATHEMATICS OF DEPENDABLE SYSTEMS
       1--3 September 1993
       Royal Hollway, University of London, Egham, Surrey, England

Invited speakers:
       Prof. David Parnas (McMaster University)
       Dr. Charles Pfleeger (Trusted Information Systems (UK))
       Dr. John Rushby (SRI International)
       Mr. Martyn Thomas (PRAXIS)

Conference  fees (pounds sterling), includes lectures, abstracts, coffee,
lunch and tea:
       IMA members             #185.00
       Non-members             #245.00
       IMA student members     #145.00
       Student non-members     #185.00

Residential fees (pounds sterling), includes bed,  breakfast  and  dinner
for 3 nights:
       #110, #130 or #150 depending on accommodation booked.

Further details are available from:
       Mrs Pamela Irving, Conference Officer
       The IMA, 16 Nelson Street, SOUTHEND-ON-SEA
       Essex  SS1 1EF  England
       Telephone: +44 702 354020       Facsimile:  +44 702 354111

------------------------------

Date: Mon, 26 Jul 93 08:13:27 -0700
From: [email protected] (Nancy Leveson)
Subject: High-assurance software courses

Announcing two courses in high assurance Software:

  An Introduction to Software System Safety, Oct. 25-27
       Nancy Leveson

  A Tutorial on Software Testing, Oct. 28-29
       Debra Richardson

Location: University of California, Irvine, CA

AN INTRODUCTION TO SOFTWARE SYSTEM SAFETY, Oct. 25-27

 In order to ensure and certify that software will execute without resulting
 in unacceptable risk, changes to normal software development practices are
 necessary.  This tutorial will focus on the unique problems involved in
 building safety-critical software and describe some techniques that can be
 used to enhance the safety of software-controlled systems.  Emphasis will
 be on procedures and techniques that are practical enough to be applied to
 projects today. Real-project experiences with these techniques in different
 application areas will be described.

Topics:

Basic Principles of Risk
   Basic concepts in risk
   Why technological fixes may not reduce risk
   Using past experience to prevent future accidents
   How safe is safe enough?
   Do computers reduce or increase risk?
System Safety Engineering and other Approaches to Engineering Safety
   What is system safety
   The system safety process and tasks
   Software system safety
   Application-specific approaches
   Standards
Management Issues for Safety-Critical Projects
   Instituting a safety culture into the organization
   How management contributes to accidents
   Role of safety management (including software)
   Place in the organizational structure
   General process (for small and large organizations)
   Documentation
   Cost and resource requirements
Models of Accidents and Hazard Analysis
   General types of analysis techniques
   Limitations and sources of uncertainty
   Software Hazard Analysis
   Software Requirements Analysis
   Qualitative vs. quantitative analysis
Principles of Safe Design
   The design process
   Issues in safe design
   The relationship between software design and safe system design
   System safety design techniques and their application to software design
   Software safety design analysis
Verification and Validation of Safety
   Testing for safety
   Static software analysis including Software Fault Tree Analysis
Design of Human/Machine Interaction for Safety
   The role of humans in accidents
   The role of the HMI in accidents
   The need for and role of human operators in automated systems
   Human error models
   General design principles and approaches
   Software design issues


A TUTORIAL ON SOFTWARE TESTING, Oct. 28-29

The intent of this tutorial is to equip managers, software engineers, and
test engineers with an understanding of testing technology to enable them to
promote software testing in their organizations from an ad hoc, labor
intensive, error-prone activity to a disciplined, technology-supported
process.  Emphasis is on techniques that are practical today.  Some underlying
testing theory will be presented to provide a foundation for evaluating
testing technology, and several new approaches will be discussed.  Issues
of selecting complementary techniques and integrating them to achieve a
comprehensive testing process are also addressed.

Topics:
 Software Testing Principles
   Definitions and basic principles
   Testing concepts
   Psychological factors
   Economic impacts
 Managerial Considerations
   Views of software testing
   Contributions to quality
   Testing phases and activities
 Test Planning
   Goals and objectives
   Developing a test strategy
   Test specifications and procedures
   Evaluating and reporting results
   Test process improvement
 Proactive Software Testing
   Technical Reviews
   Rapid Prototyping
 Software Testing Techniques
   Functional testing
   Structural testing
   Error-Oriented testing
   Integration testing
   Software system testing
   Evolution testing
   Developing test oracles
 Tools and Environments
   Static/dynamic analysis tools
   Test generation tools
   Test Management tools
 Methodology and Process
   Hybrid testing techniques
   Technique integration
   Formalized process
 Test Set Adequacy and Metrics
   A theoretical view
   Software metrics in testing
 Process Assessment/Improvement
   Process performance measures
   Test process assessment
   Improving the testing process

[For bios of Leveson and Richardson, and registration information,
send E-Mail to [email protected] (Nancy Leveson).]

------------------------------

Date: Sat, 24 Jul 93 17:02:26 BST
From: Pete Mellor <[email protected]>
Subject: CSR Workshop 1993

                     CSR (Centre for Software Reliability)
                            TENTH ANNUAL WORKSHOP
                             CO-HOSTED WITH JUSE
                   Japanese Union of Scientists and Engineers

                    APPLICATION OF SOFTWARE METRICS AND
                       QUALITY ASSURANCE IN INDUSTRY

                           PROVISIONAL PROGRAMME

   Supported by the CEC under the Human Capital and Mobility Programme
The Grand Hotel, Oudezijds Voorburgwal 197, 1001 EX Amsterdam, The Netherlands
                   29th September - 1st October, 1993

CENTRE FOR SOFTWARE RELIABILITY

Tenth Annual Workshop

Application of Software Metrics and Quality Assurance in Industry

WEDNESDAY 29TH SEPTEMBER

08.30-0930       REGISTRATION AND REFRESHMENTS

Chair:  Norman Fenton, City University, UK

09.30-10.30     Keynote Address:  "Applying the Goal/Question/Metric
                                  Paradigm in the Experience Factory"
       Vic Basili, University of Maryland, USA

11.00-13.00     Tutorial:  "Management Aspects of Software Reuse"
       Sadahiro Isoda, Nippon Telegraph and Telephone Corp., Japan

13.00-14.15     LUNCH

Chair:  Bev Littlewood, City University, UK

14.15-15.15     Keynote Address:  "Now it's the turning point
                                  for the Japanese Software Industry"
       Yoshinori Iizuka, The University of Tokyo, Japan

15.45-17.45     Tutorial: "Setting up a Software Metrics Programme in Industry"
       Shari Lawrence-Pfleeger, Systems/Software, USA
       and City University, UK

THURSDAY 30TH SEPTEMBER

Chair:  Robin Whitty, South Bank University, UK

09.00-09.30     "The Role of Quality Staff in Software Development"
        Masanobu Hattori, Fujitsu Ltd, Japan

09.30-10.00     "Making Software Metrics and QA happen:  practical
                experiences in Italy"
       Gualtiera Bazzano, ETNOTEAM, Italy

10.00-10.30     "Product Development and Quality Assurance
                in the Software Factory"
       Katsuyuki Yasuda, Hitachi Ltd., Japan

11.00-11.30     "Industrial Experience - Working with AMI"
       Richard Espley, GEC-Marconi Avionics Ltd., UK

11.30-12.00     "Software Measurements - an Evolutionary Approach"
       Norbert Fuchs, Alcatel, Austria

12.00-12.30     Title to be announced
       Karl-Heinrich Mueller, Siemens, Germany

12.30-14.00     LUNCH

Chair:  Yoshinori Iizuka, University of Tokyo, Japan

14.00-14.30     "Using Function Points for Software Cost
                Estimation - Some Empirical Results"
       Barbara Kitchenham, NCC, UK

14.30-15.00     "Evaluating Effort Prediction Systems"
       Claude Stricker, University of Lausanne, Switzerland

15.00-15.30     "Use of Function Points for Estimation and Contracts"
       Jolyn Onvlee, Onvlee Opleidingen, The Netherlands

16.00-16.30     "Quality Practice in the Industry"
       Roberto Ciampoli, O. Group SpA, Italy

16.30-17.00     "Beyond SEI's CMM - the BOOTSTRAP Approach for
                Profiling and Measuring Software Engineering Processes"
       Gunter Koch, 2i Industrial Informatics
       GmbH, Germany

17.00   PANEL DISCUSSION:  "Do Quality Assurance Procedures
                           Lead to Measurable Quality Improvements?"

       Tom Anderson, Bev Littlewood (CSR, UK) Vic Basili
       (Maryland, USA) Bill Hetzel (SQE, USA) Sinclair Stockman
       (British Telecom, UK) Yoshinori Iizuka (University of Tokyo,
       Japan) Toshiro Ohno (Toshiba, Japan) Mitsuru.Ohba (IBM,
       Japan), Ayatomo Kanno (Science University, Tokyo, Japan)

19.30   WORKSHOP BANQUET

FRIDAY 1ST OCTOBER

                       PARALLEL SESSIONS

Chairs:   Norman Fenton,                      Tom Anderson, Univ. of
         City University, UK                 Newcastle upon Tyne, UK

09.30-10.00
       "Complexity Traces: an Instrument     "Introducing Metrics into
         for Software Project Management"     Industry:a Perspective on GQM"
       Christof Ebert, University of         Richard Bache, Infometrix,
       Stuttgart, Germany                    UK, & Martin Neal, Lloyd's
                                             Register, UK

10.00-10.30
      "Measurement through the Software      "Practical Implementation
       Life-cycle: a Comparative Case         of Process Improvement
       Study"                                 Initiatives"
      Bob Cole and Derek Woods,              Paul Goodman, Brameur, UK
      Glasgow Caledonian University

10.30-11.00
      "Integrating Software Quality          "A Case History of Automated
       Assurance into the Teaching of         Incremental Improvement of
       Programming"                           Software Product Quality"
      Edmund Burke, University of            Les Hatton, Programming
      Nottingham, UK                         Research Ltd., UK

11.30-12.00
      "QUANTUM - A Measurement-based         "Experience of Introducing
       Framework for Software                 Quality and Measurement in
       Quality Assurance"                     Telecommunication Software
                                              Development"
      Chris Miller, Praxis, UK               Sinclair Stockman,
                                             British Telecom, UK

12.00-12.30
       Title to be announced                  Title to be announced
       Francois de Nazelle,                   Yannis Kliafis, Greece
       Q-Sys, France

12.30-13.45     LUNCH

Chair:  Barbara Kitchenham, NCC, UK

13.45-14.45     "Measuring the Measurements:  the Technology for
                Measuring Software Practice"
       Bill Hetzel, Software Quality Engineering, USA

14.45-15.15     "A Framework for System Development Activities and
                Responsibilities - Quality Improvement by filling up the
                Communication Gap"
       Minoru Itakura, Fujitsu Ltd., Japan

15.45-16.15     "Situational Measurement"
       Hans van Vliet, Vrije Universiteit, The Netherlands

16.15-16.45     "The Behavioural Analysis makes the Company Mature"
       Ryuzo Kaneko, NEC Corp., Japan

16.45-17.15     "Function Points" (exact title to be announced)
       Martin Hooft van Huysduynen, Ing Bank,
       The Netherlands

[The full registration materials were too long for RISKS, and have been pared
down.  Request on-line registration information and other information by
E-Mail from [email protected] , or contact Ms. Carol Allen, Centre
Manager, Centre for Software Reliability, The City University, Northampton
Square, London EC1V OHB UK, Tel: +44 71 477 8421, Fax: +44 71 477 8585]

------------------------------

End of RISKS-FORUM Digest 14.78
************************