Y2K all over again: How groupthink permeates IS and compromises security
暂无分享,去创建一个
[1] B. Robertson,et al. Six steps to an effective denials management program. , 2005, Healthcare financial management : journal of the Healthcare Financial Management Association.
[2] John Glaser. More on management's role in IT project failures. , 2005, Healthcare financial management : journal of the Healthcare Financial Management Association.
[3] Rebecca T. Mercuri. Standards insecurity , 2003, CACM.
[4] Andrea H. Tapia,et al. Technomillennialism: A Subcultural Response to the Technological Threat of Y2K , 2003 .
[5] Robert D Austin,et al. The myth of secure computing. , 2003, Harvard business review.
[6] Steven A. Hofmeyr. Why Today's Security Technologies Are So Inadequate: History, Implications, and New Approaches , 2003, Inf. Secur. J. A Glob. Perspect..
[7] Luiz Fernando Capretz. Personality types in software engineering , 2003, Int. J. Hum. Comput. Stud..
[8] Amitava Dutta,et al. Management's Role in Information Security in a Cyber Economy , 2002 .
[9] L. Paulson. Post 9-11 security, few changes, business as usual rules , 2002 .
[10] R. S. Pressman,et al. What a tangled Web we weave [Web engineering] , 2000 .
[11] Rob Thomsett. The Year 2000 Bug: A Forgotten Lesson , 1998, IEEE Softw..
[12] James Sanders. Y2K: Don't Play It Again, Sam , 1998, IEEE Softw..
[13] E. Schein. Three Cultures of Management: The Key to Organizational Learning , 1996 .
[14] RICHAFID BASKERVILLE,et al. Information systems security design methods: implications for information systems development , 1993, CSUR.
[15] P. J. Cherico,et al. How much security is enough , 1976 .