SlideShare uma empresa Scribd logo
1 de 4
THERAC – 25 MEDICAL ACCELERATOR



Six people massively overdose between 1985 and 1987 as the results of the Therac-25 accidents were
three of them death and the others got a severe injury. This machine was a computer-based radiation
therapy machine manufactured by Atomic Energy of Canada Limited (AECL). For 35-year history of
medical accelerators, this serial accident has famous as the worst incident [1].




                                        Figure 1. The Therac-25




The first accident occurred in Kennestone Regional Oncology Center, June 3, 1985. According to
Leveson (1995), the details are insufficient. Kennestone facility has operating a Therac-25 about six
months when they handled treatment for a 61-year-old woman in Marietta, Georgia. The therapy was a
follow up medication after removed a malignant breast tumor. She got an overdose when later,
Kennestone physicist estimated it about one or two doses of radiation in the 15,000 to 20,000 rad
(radiation-absorbed dose) range. Due to the incident, the manufacturer and machine operator still
refused to believe that it cause by the Therac-25.
Following that, the second accidents happened in Hamilton, Ontario (Canada) on July 26, 1985. A
forty-year-old patient doing the carcinoma of the cervix therapy when the Therac-25 shut down by it
self with H-TILT error message and no dose displayed. The machine paused and the operator pressing
the proceed command. This activity repeated for four times where the machine shut down again and on
the fifth pause the therapy suspend.



The patient told the operator that she felt burning sensation during that time. On the next treatment, she
still complained and on November 3, 1985, she died with an extremely virulent cancer condition. Later,
the AECL technician estimated that she received between 13,000 and 17,000 rads. On the report,
AECL claimed a hardware failure (microswitch) as the caused and modified the machine.



Next accidents involved a woman who has treated during December 1985 (after the Therac-25
modified, in response to Hamilton accident) at Yakima Valley Memorial Hospital, Washington. Her
skin become excessive reddening after the treatment and by the time the reaction become abnormal.
Response for this case when the hospital staff sent a letter to AECL they replay that was impossible it
caused by the Therac-25 by attach two pages of technical reasons to support.



On March 21, 1986, the fourth incident occurred in Tyler, Texas (East Texas Cancer Center). An
oilfield worker, Ray Cox, felt he had a jolt of searing heat during doing the treatment. In other side, the
machine operator got a “Malfunction 54” message displayed on the Therac-25 computer terminal [2].
Cox’s condition become worst over the weeks of the accident and died from complications of the
overdose in Dallas Hospital, September 1986. After simulation, revealed that the patient got a massive
overdose (16,500 to 25,000 rads in less than 1 second over an area of about 1 cm).



About a month later, April 11, 1986, a 66-year-old bus driver has to treat his skin cancer in the same
place as Ray Cox, ETCC in Tyler, Texas. Another accident occurred, again “Malfunction 54” occurred
by the same technician as Tyler case before. Verdon Kidd, the patient moaning for help and on May 1,
1986 he died from the overdose. An autopsy showed an acute high-dose radiation injury to the right
temporal lobe of the brain and the brain stem.




The last serial accident for the Therac-25 was on January 17, 1987 in Yakima, Washington. A
carcinoma patient has to receive 86 rads total exposure for his treatment. During the activity, the
operator gets some unclear point of the message, displayed on the machine, and the unit shut down
with a pause. The operator proceed it again by pressing one key (proceed command) but after that she
heard the patient speak on the intercom. The patient died in April from complications related to the
overdose.



The Therac-25 developed by AECL since in the mid-1970s with fully computer controlled. Software in
the Therac-25 based from previous machine, the Therac-6 and the Therac-20. Different with the
Therac-25, both previous machines had hardware safety interlocks mechanism independent of the
computer [3]. “They assumed that the software of the previous version of the accelerator was free of
errors and that it would function properly without the previous design’s mechanical interlocks” [4].
However, this assumption was wrong where the Therac-20 also have problem with the machine but
hardware safety mechanism doing their job well.



Refer to the facts in the Leveson (1995) investigation that the Therac-25 works on the reusable
software where race condition has occurred when implement a multitasking played (concurrent
programming). This bug has been occurring since the Therac-20 where the protection devices do not
allow the beam to turn on and prevent the patient from overdose. In addition, there were a number of
weaknesses in the user interface such as just using one key for proceeds command where it made worst
condition during the machine operation.



Testing process and documentations also have to responsibility in this case. On the Therac-25 user’s
meeting, the manufacturer delegation clarified that they just doing the testing part for “2700 hours of
use”. For this process, they just have sketchy documentation that meant testing does not done well.



Overall, this case gives two main points as a lesson for the developer especially the software industry
where:

Place trust in people, process, systems, and tools without good cause.

       Because of success with the previous product, it does not mean can do so now with new
       technology without the need to re-assess the risks [5]. If another part of the development has
       done well such as testing or maintenance, these problems perhaps never happen.



Lack of documentation will lead to another problem.

       In the investigation report found that AECL just have very little documentation during the
       process such as software specification and test plan. However, a good documentation will
       helpful for monitoring, controlling and maintaining the software without create another problem
       such as the first Yakima incident.
References

[1] LEVESON, Nancy G. Safeware: System Safety and Computers. Addison-Wesley, 1995.

[2] KLING, Rob. (ed.) Computerization and Controversy. Academic Press, 1996.

[3] Baase, Sara. A Gift of Fire. Prentice Hall, 2003.

[4] POPOVIC, Dobrivoje & Ljubo Vlacic. (ed.) Mechatronics in Engineering Design and

Product Development. Marcel-Dekker Inc, 1999.

[5] Redmill, Felix & Tom Anderson. (ed.) Safety-critical Systems. Chapman & Hall, 1993.

Mais conteúdo relacionado

Mais procurados

12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
Casewise Corporate Modeler
Casewise Corporate ModelerCasewise Corporate Modeler
Casewise Corporate ModelerJesus Perez Cota
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurancebdemchak
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security pptGryffin EJ
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Nozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical CertificationNozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical CertificationGiacomoCocozziello
 
ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11Irsandi Hasan
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information securitySyaiful Ahdan
 
vulnerable and outdated components.pptx
vulnerable and outdated components.pptxvulnerable and outdated components.pptx
vulnerable and outdated components.pptxwaleejhaider1
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit processDivya Tiwari
 
Transformer Expert Overview Presentation v1.0.pptx
Transformer Expert Overview Presentation v1.0.pptxTransformer Expert Overview Presentation v1.0.pptx
Transformer Expert Overview Presentation v1.0.pptxJosueSannyMedina
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSplunk
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC FrameworkRishi Kant
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Security Assessment Plan (Template)
Security Assessment Plan (Template)Security Assessment Plan (Template)
Security Assessment Plan (Template)GovCloud Network
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 

Mais procurados (20)

12 security policies
12 security policies12 security policies
12 security policies
 
Casewise Corporate Modeler
Casewise Corporate ModelerCasewise Corporate Modeler
Casewise Corporate Modeler
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
DRP vs BCP
DRP vs BCPDRP vs BCP
DRP vs BCP
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Nozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical CertificationNozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical Certification
 
ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
vulnerable and outdated components.pptx
vulnerable and outdated components.pptxvulnerable and outdated components.pptx
vulnerable and outdated components.pptx
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Transformer Expert Overview Presentation v1.0.pptx
Transformer Expert Overview Presentation v1.0.pptxTransformer Expert Overview Presentation v1.0.pptx
Transformer Expert Overview Presentation v1.0.pptx
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Security Assessment Plan (Template)
Security Assessment Plan (Template)Security Assessment Plan (Template)
Security Assessment Plan (Template)
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 

Destaque

Developing a social media strategy for SAXO.com
Developing a social media strategy for SAXO.comDeveloping a social media strategy for SAXO.com
Developing a social media strategy for SAXO.comThink! Digital
 
Developing a social media strategy for a NSO
Developing a social media strategy for a NSODeveloping a social media strategy for a NSO
Developing a social media strategy for a NSOashton99
 
Introduction to the Module Menu in Blackboard Learn 9.1
Introduction to the Module Menu in Blackboard Learn 9.1Introduction to the Module Menu in Blackboard Learn 9.1
Introduction to the Module Menu in Blackboard Learn 9.1Kirsten Thompson
 
Introduction to Developing a Social Media Strategy for Cambridge Nonprofit Or...
Introduction to Developing a Social Media Strategy for Cambridge Nonprofit Or...Introduction to Developing a Social Media Strategy for Cambridge Nonprofit Or...
Introduction to Developing a Social Media Strategy for Cambridge Nonprofit Or...Cambridge Community Television
 
Developing a Social Media Strategy in 7 Steps
Developing a Social Media Strategy in 7 StepsDeveloping a Social Media Strategy in 7 Steps
Developing a Social Media Strategy in 7 StepsJay Baer
 
Creating Winning Social Media Strategies in 8 Steps
Creating Winning Social Media Strategies in 8 StepsCreating Winning Social Media Strategies in 8 Steps
Creating Winning Social Media Strategies in 8 StepsJay Baer
 
12 Small Businesses That Found Success on Social Media
12 Small Businesses That Found Success on Social Media12 Small Businesses That Found Success on Social Media
12 Small Businesses That Found Success on Social MediaHootsuite
 

Destaque (7)

Developing a social media strategy for SAXO.com
Developing a social media strategy for SAXO.comDeveloping a social media strategy for SAXO.com
Developing a social media strategy for SAXO.com
 
Developing a social media strategy for a NSO
Developing a social media strategy for a NSODeveloping a social media strategy for a NSO
Developing a social media strategy for a NSO
 
Introduction to the Module Menu in Blackboard Learn 9.1
Introduction to the Module Menu in Blackboard Learn 9.1Introduction to the Module Menu in Blackboard Learn 9.1
Introduction to the Module Menu in Blackboard Learn 9.1
 
Introduction to Developing a Social Media Strategy for Cambridge Nonprofit Or...
Introduction to Developing a Social Media Strategy for Cambridge Nonprofit Or...Introduction to Developing a Social Media Strategy for Cambridge Nonprofit Or...
Introduction to Developing a Social Media Strategy for Cambridge Nonprofit Or...
 
Developing a Social Media Strategy in 7 Steps
Developing a Social Media Strategy in 7 StepsDeveloping a Social Media Strategy in 7 Steps
Developing a Social Media Strategy in 7 Steps
 
Creating Winning Social Media Strategies in 8 Steps
Creating Winning Social Media Strategies in 8 StepsCreating Winning Social Media Strategies in 8 Steps
Creating Winning Social Media Strategies in 8 Steps
 
12 Small Businesses That Found Success on Social Media
12 Small Businesses That Found Success on Social Media12 Small Businesses That Found Success on Social Media
12 Small Businesses That Found Success on Social Media
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Último (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

THERAC

  • 1. THERAC – 25 MEDICAL ACCELERATOR Six people massively overdose between 1985 and 1987 as the results of the Therac-25 accidents were three of them death and the others got a severe injury. This machine was a computer-based radiation therapy machine manufactured by Atomic Energy of Canada Limited (AECL). For 35-year history of medical accelerators, this serial accident has famous as the worst incident [1]. Figure 1. The Therac-25 The first accident occurred in Kennestone Regional Oncology Center, June 3, 1985. According to Leveson (1995), the details are insufficient. Kennestone facility has operating a Therac-25 about six months when they handled treatment for a 61-year-old woman in Marietta, Georgia. The therapy was a follow up medication after removed a malignant breast tumor. She got an overdose when later, Kennestone physicist estimated it about one or two doses of radiation in the 15,000 to 20,000 rad (radiation-absorbed dose) range. Due to the incident, the manufacturer and machine operator still refused to believe that it cause by the Therac-25.
  • 2. Following that, the second accidents happened in Hamilton, Ontario (Canada) on July 26, 1985. A forty-year-old patient doing the carcinoma of the cervix therapy when the Therac-25 shut down by it self with H-TILT error message and no dose displayed. The machine paused and the operator pressing the proceed command. This activity repeated for four times where the machine shut down again and on the fifth pause the therapy suspend. The patient told the operator that she felt burning sensation during that time. On the next treatment, she still complained and on November 3, 1985, she died with an extremely virulent cancer condition. Later, the AECL technician estimated that she received between 13,000 and 17,000 rads. On the report, AECL claimed a hardware failure (microswitch) as the caused and modified the machine. Next accidents involved a woman who has treated during December 1985 (after the Therac-25 modified, in response to Hamilton accident) at Yakima Valley Memorial Hospital, Washington. Her skin become excessive reddening after the treatment and by the time the reaction become abnormal. Response for this case when the hospital staff sent a letter to AECL they replay that was impossible it caused by the Therac-25 by attach two pages of technical reasons to support. On March 21, 1986, the fourth incident occurred in Tyler, Texas (East Texas Cancer Center). An oilfield worker, Ray Cox, felt he had a jolt of searing heat during doing the treatment. In other side, the machine operator got a “Malfunction 54” message displayed on the Therac-25 computer terminal [2]. Cox’s condition become worst over the weeks of the accident and died from complications of the overdose in Dallas Hospital, September 1986. After simulation, revealed that the patient got a massive overdose (16,500 to 25,000 rads in less than 1 second over an area of about 1 cm). About a month later, April 11, 1986, a 66-year-old bus driver has to treat his skin cancer in the same place as Ray Cox, ETCC in Tyler, Texas. Another accident occurred, again “Malfunction 54” occurred by the same technician as Tyler case before. Verdon Kidd, the patient moaning for help and on May 1, 1986 he died from the overdose. An autopsy showed an acute high-dose radiation injury to the right temporal lobe of the brain and the brain stem. The last serial accident for the Therac-25 was on January 17, 1987 in Yakima, Washington. A carcinoma patient has to receive 86 rads total exposure for his treatment. During the activity, the operator gets some unclear point of the message, displayed on the machine, and the unit shut down with a pause. The operator proceed it again by pressing one key (proceed command) but after that she
  • 3. heard the patient speak on the intercom. The patient died in April from complications related to the overdose. The Therac-25 developed by AECL since in the mid-1970s with fully computer controlled. Software in the Therac-25 based from previous machine, the Therac-6 and the Therac-20. Different with the Therac-25, both previous machines had hardware safety interlocks mechanism independent of the computer [3]. “They assumed that the software of the previous version of the accelerator was free of errors and that it would function properly without the previous design’s mechanical interlocks” [4]. However, this assumption was wrong where the Therac-20 also have problem with the machine but hardware safety mechanism doing their job well. Refer to the facts in the Leveson (1995) investigation that the Therac-25 works on the reusable software where race condition has occurred when implement a multitasking played (concurrent programming). This bug has been occurring since the Therac-20 where the protection devices do not allow the beam to turn on and prevent the patient from overdose. In addition, there were a number of weaknesses in the user interface such as just using one key for proceeds command where it made worst condition during the machine operation. Testing process and documentations also have to responsibility in this case. On the Therac-25 user’s meeting, the manufacturer delegation clarified that they just doing the testing part for “2700 hours of use”. For this process, they just have sketchy documentation that meant testing does not done well. Overall, this case gives two main points as a lesson for the developer especially the software industry where: Place trust in people, process, systems, and tools without good cause. Because of success with the previous product, it does not mean can do so now with new technology without the need to re-assess the risks [5]. If another part of the development has done well such as testing or maintenance, these problems perhaps never happen. Lack of documentation will lead to another problem. In the investigation report found that AECL just have very little documentation during the process such as software specification and test plan. However, a good documentation will helpful for monitoring, controlling and maintaining the software without create another problem such as the first Yakima incident.
  • 4. References [1] LEVESON, Nancy G. Safeware: System Safety and Computers. Addison-Wesley, 1995. [2] KLING, Rob. (ed.) Computerization and Controversy. Academic Press, 1996. [3] Baase, Sara. A Gift of Fire. Prentice Hall, 2003. [4] POPOVIC, Dobrivoje & Ljubo Vlacic. (ed.) Mechatronics in Engineering Design and Product Development. Marcel-Dekker Inc, 1999. [5] Redmill, Felix & Tom Anderson. (ed.) Safety-critical Systems. Chapman & Hall, 1993.