Introduction. What is the dark side?
Introductory case studies and anecdotes
The survey: impact of subversive stakeholders on software projects
A follow-up to the survey: some hypotheses and related survey findings
Introductory case studies and anecdotes
Incidents of lying: the survey
Qualitative survey responses on lying
What can be done abut lying?
The questionnaire used in the survey
Case studies of attacks and biographies of hackers
Cyber terrorism and government-sponsored hacking
How a hacker is identified
Time line of a typical malware attack
Hacker economy: how does a hacker make money?
How do the victims find out that their secrets are stolen?
Intellectual property protection
Open versus closed source
6. Disgruntled employees and sabotage
Introduction and background
Disgruntled employee data issues
Disgruntled employee software issues
Disgruntled employee system issues
What to do about disgruntled employee acts
Whistle-blowing and software engineering
More case studies and anecdotes
Appendix: Practical implications of the research into whistle-blowing
Part 2. Viewpoints on dark side issues
8. Opinions, predictions and beliefs
Automated crime / Donn B. Parker
Let's play make believe / Karl E Wiegers
Dark, light, or just another shade of grey? / Les Hatton
Rational software developers as pathological code hackers / Norman Fenton
An officer and a gentleman confronts the dark side / Grady Booch
Less carrot and more stick / June Verner
"Them and us": dispatches from the virtual software team trenches / Valentine Casey
What is it to lie on a software project? / Robert N. Britcher
"Merciless control instrument" and the mysterious missing fax / A. H. (anonymous)
Forest of Arden / David Alan Grier
Hard-headed hardware hit man / Will Tracz
A lighthearted anecdote / Eugene Farmer