Y2K all over again: How groupthink permeates IS and compromises security

[1]  B. Robertson,et al.  Six steps to an effective denials management program. , 2005, Healthcare financial management : journal of the Healthcare Financial Management Association.

[2]  John Glaser More on management's role in IT project failures. , 2005, Healthcare financial management : journal of the Healthcare Financial Management Association.

[3]  Rebecca T. Mercuri Standards insecurity , 2003, CACM.

[4]  Andrea H. Tapia,et al.  Technomillennialism: A Subcultural Response to the Technological Threat of Y2K , 2003 .

[5]  Robert D Austin,et al.  The myth of secure computing. , 2003, Harvard business review.

[6]  Steven A. Hofmeyr Why Today's Security Technologies Are So Inadequate: History, Implications, and New Approaches , 2003, Inf. Secur. J. A Glob. Perspect..

[7]  Luiz Fernando Capretz Personality types in software engineering , 2003, Int. J. Hum. Comput. Stud..

[8]  Amitava Dutta,et al.  Management's Role in Information Security in a Cyber Economy , 2002 .

[9]  L. Paulson Post 9-11 security, few changes, business as usual rules , 2002 .

[10]  R. S. Pressman,et al.  What a tangled Web we weave [Web engineering] , 2000 .

[11]  Rob Thomsett The Year 2000 Bug: A Forgotten Lesson , 1998, IEEE Softw..

[12]  James Sanders Y2K: Don't Play It Again, Sam , 1998, IEEE Softw..

[13]  E. Schein Three Cultures of Management: The Key to Organizational Learning , 1996 .

[14]  RICHAFID BASKERVILLE,et al.  Information systems security design methods: implications for information systems development , 1993, CSUR.

[15]  P. J. Cherico,et al.  How much security is enough , 1976 .