Breaking bad? In search of a (softer) systems view of security ergonomics

[1]  D. Feinstein,et al.  The Official Senate Report on CIA Torture: Committee Study of the Central Intelligence Agency?s Detention and Interrogation Program , 2015 .

[2]  Amitai Etzioni NSA: National Security vs. Individual Rights , 2015 .

[3]  J. Hagin,et al.  Executive Summary to Report from the United States Secret Service Protective Mission Panel to the Secretary of Homeland Security , 2014 .

[4]  D. Fischbacher‐Smith Organisational ineffectiveness: environmental shifts and the transition to crisis , 2014 .

[5]  Denis Fischbacher-Smith,et al.  The dark side of effectiveness – risk and crisis as the “destroyer of worlds” , 2014 .

[6]  P. Luisi,et al.  The Systems View of Life: A Unifying Vision , 2014 .

[7]  Stephen McCombie,et al.  Stuxnet: the emergence of a new cyber weapon and its implications , 2012 .

[8]  William H. Ross,et al.  Should human resource managers use social media to screen job applicants? Managerial and legal issues in the USA , 2012 .

[9]  E. Loftus Intelligence gathering post-9/11. , 2011, The American psychologist.

[10]  John F. Rockart,et al.  IMPLICATIONS OF CHANGES IN INFORMATION TECHNOLOGY FOR CORPORATE STRATEGY , 2022 .

[11]  J. Mittelman What drives global security and insecurity? , 2011 .

[12]  Rafal Rohozinski,et al.  Stuxnet and the Future of Cyber War , 2011 .

[13]  J. Mittelman Hyperconflict: Globalization and Insecurity , 2010 .

[14]  Benyamin Lichtenstein,et al.  The leadership of emergence: A complex systems leadership theory of emergence at successive organizational levels☆ , 2009 .

[15]  Justin R. Harber Unconventional Spies: The Counterintelligence Threat from Non-State Actors , 2009 .

[16]  J. Halpern,et al.  "Enhanced" interrogation of detainees: do psychologists and psychiatrists participate? , 2008, Philosophy, ethics, and humanities in medicine : PEHM.

[17]  Kim-Kwang Raymond Choo,et al.  Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .

[18]  M. Day Doctors held for bombing attempts, but NHS defends vetting procedures , 2007, BMJ : British Medical Journal.

[19]  Bob Hodge,et al.  Understanding change in organizations in a far-from-equilibrium world , 2007 .

[20]  Denis D. Smith,et al.  Terrorism and Critical Infrastructures: Implications for Public–Private Crisis Management , 2006 .

[21]  Pascale Carayon,et al.  Human factors of complex sociotechnical systems. , 2006, Applied ergonomics.

[22]  A. Guiora,et al.  The Unholy Trinity: Intelligence, Interrogation and Torture , 2005 .

[23]  W. Bowen Deterrence and asymmetry: non-state actors and mass casualty terrorism , 2004 .

[24]  Mark Rowe,et al.  You've got mail... and the boss knows: A survey by the Center for Business Ethics of companies' email and Internet monitoring , 2003 .

[25]  M. Goodman 9/11: The Failure of Strategic Intelligence , 2003 .

[26]  G. Posner Why America Slept: The Failure to Prevent 9/11 , 2003 .

[27]  Robert M. Clark,et al.  Intelligence Analysis: A Target-Centric Approach , 2003 .

[28]  Jay R. Galbraith Organizing to Deliver Solutions , 2002 .

[29]  C.J.H. Mann,et al.  Systems approaches to management , 2002 .

[30]  E. Hollnagel Extended cognition and the future of ergonomics , 2001 .

[31]  K. Weick Making Sense of the Organization , 2000 .

[32]  H. Tsoukas David and Goliath in the Risk Society: Making Sense of the Conflict between Shell and Greenpeace in the North Sea , 1999 .

[33]  David Okrent,et al.  Man-made disasters , 1998 .

[34]  Richard A. D'Aveni Waking up to the new era of hypercompetition , 1998 .

[35]  James T. Reason,et al.  Managing the risks of organizational accidents , 1997 .

[36]  Richard A. D'Aveni Coping with hypercompetition: Utilizing the new 7S's framework , 1995 .

[37]  Kristen Michal,et al.  Business counterintelligence and the role of the U.S. intelligence community , 1994 .

[38]  B. Turner Causes of Disaster: Sloppy Management , 1994 .

[39]  G. Hodgkinson,et al.  EXPLORING THE MENTAL MODELS OF COMPETITIVE STRATEGISTS: THE CASE FOR A PROCESSUAL APPROACH , 1994 .

[40]  A. Scheidegger Limitations of the system approach in geomorphology , 1992 .

[41]  Thierry C. Pauchant,et al.  Transforming the Crisis-Prone Organization: Preventing Individual, Organizational, and Environmental Tragedies , 1992 .

[42]  G. Johnson Managing strategic change--strategy, culture and action. , 1992, Long range planning.

[43]  Albert Cherns,et al.  Principles of Sociotechnical Design Revisted , 1987 .

[44]  Fritjof Capra,et al.  Criteria of systems thinking , 1985 .

[45]  Peter Checkland,et al.  From Optimizing to Learning: A Development of Systems Thinking for the 1990s , 1985 .

[46]  Peter Checkland,et al.  Achieving ‘Desirable and Feasible’ Change: An Application of Soft Systems Methodology , 1985 .

[47]  B. Turner The Organizational and Interorganizational Development of Disasters , 1976 .

[48]  Albert B. Cherns,et al.  The Principles of Sociotechnical Design , 1976 .

[49]  W. T. Singleton,et al.  Techniques for determining the causes of error , 1972 .

[50]  W T Singleton,et al.  Ergonomics in systems design. , 1967, Ergonomics.

[51]  W. T. Singleton,et al.  The Systems Prototype and His Design Problems , 1967 .

[52]  Andra Giurgiu,et al.  No Place to Hide – Edward Snowden, the NSA and the Surveillance State , 2015 .

[53]  John R Wilson,et al.  Fundamentals of systems ergonomics/human factors. , 2014, Applied ergonomics.

[54]  D. Fischbacher‐Smith,et al.  Where do we go from here? The evacuation of city centres and the communication of public health risks from extreme events , 2010 .

[55]  A. Bellamy No pain, no gain? Torture and ethics in the war on terror , 2006 .

[56]  Jesper Simonsen,et al.  Soft Systems Methodology , 2020, Systems Approaches to Making Change: A Practical Guide.

[57]  Edward Waltz,et al.  Knowledge Management in the Intelligence Enterprise , 2003 .

[58]  Mudge Insider Threat , 2003, login Usenix Mag..

[59]  Jeremy Rasmussen,et al.  Systems Design , 2002, Encyclopedia of Information Systems.

[60]  James T. Reason,et al.  A systems approach to organizational error , 1995 .

[61]  W. Ashby,et al.  Requisite Variety and Its Implications for the Control of Complex Systems , 1991 .

[62]  D. Mccormick Normal Accidents , 1991, Bio/Technology.