Legacy systems & Ethics & Closing Flashcards
(25 cards)
How do Brodie & Stonebraker define a legacy information system?
“Any information system that significantly resists modification and evolution.” :contentReference[oaicite:26]{index=26}
What developer-centric definition of legacy code does Michael Feathers give?
“Code without tests.” :contentReference[oaicite:27]{index=27}
List the four strategic responses to ageing systems covered in the lecture.
Maintenance, Wrapping, Migration, Redevelopment. :contentReference[oaicite:28]{index=28}
Which strategy often allocates up to 80 % of effort to testing?
Data migration. :contentReference[oaicite:29]{index=29}
What is the first step in Feathers’ “cover-and-modify” workflow?
Identify change points and test points, then break dependencies so tests can be inserted. :contentReference[oaicite:30]{index=30}
Name two risks of the “big-bang” redevelopment approach.
High upfront cost and high failure risk due to massive requirements elicitation. :contentReference[oaicite:31]{index=31}
Why are behaviour-preserving pilots or parallel runs important during migration?
They let teams validate that the new system matches legacy behaviour before cut-over. :contentReference[oaicite:32]{index=32}
Give one business reason organisations keep legacy systems alive.
Core data and business rules are embedded and difficult or risky to extract. :contentReference[oaicite:33]{index=33}
State one technical barrier that turns modern code into future legacy.
Obsolete third-party libraries that are no longer maintained. :contentReference[oaicite:34]{index=34}
Which three ethical principles are repeatedly challenged in software case studies?
User safety, privacy, and informed consent. :contentReference[oaicite:35]{index=35}
Summarise the Zoom COVID-19 ethics issue in one sentence.
Weak encryption and hidden servers undermined user privacy amid rapid user growth. :contentReference[oaicite:36]{index=36}
What data-privacy lesson comes from the Tinder 800-page data dump?
“Consent” can hide asymmetrical power; users seldom foresee long-term use of collected data. :contentReference[oaicite:37]{index=37}
Describe the key failure in the Danish ambulance record tablet pilot.
Realtime data entry clashed with patient care, forcing medics to choose between treatment and legal documentation—pilot was shut down. :contentReference[oaicite:38]{index=38}
How many principles make up the ACM Software Engineering Code of Ethics?
Eight: public, client, product, judgment, management, profession, colleagues, self. :contentReference[oaicite:39]{index=39}
Give one example of the “public” principle in action.
Refusing to ship a feature that puts user safety at known risk. :contentReference[oaicite:40]{index=40}
What organisational factor often blocks legacy modernisation?
Competing business priorities that underfund non-visible infrastructure work. :contentReference[oaicite:41]{index=41}
Explain “stewardship of the past” in one line.
Respecting the investment and tacit knowledge embodied in existing systems while changing them responsibly. :contentReference[oaicite:42]{index=42}
What are the two final duties the closing slide assigns to architects?
Stewardship of the past and stewardship of society. :contentReference[oaicite:43]{index=43}
Which ethics case involved an encryption firm pivoting to spyware?
The lecture’s “encryption-turned-spyware” cautionary tale—betrayed user trust for profit. :contentReference[oaicite:44]{index=44}
Why is formal ethics training still rare among engineers?
University curricula and company onboarding often prioritise technical skill over ethical reflection, despite societal impact. :contentReference[oaicite:45]{index=45}
List two red flags that a legacy system may soon become an operational risk.
Few remaining experts understand it (truck factor ≈ 1) and vendor hardware/support is nearing end-of-life. :contentReference[oaicite:46]{index=46}
How can wrapping a legacy system create new maintenance burdens?
It introduces a second technology stack—the wrapper—requiring its own updates and monitoring. :contentReference[oaicite:47]{index=47}
What KPI can indicate ethical health for data-heavy apps?
Number of user-requested data deletions successfully fulfilled per quarter (GDPR Right-to-Erase compliance). :contentReference[oaicite:48]{index=48}
Give a concise exam definition of a legacy system.
A software system that significantly resists modification and evolution, often due to obsolete technology, missing tests, or business entanglement. :contentReference[oaicite:49]{index=49}