-
1
-
-
10444262333
-
Intrusion detection systems are evolving
-
Andress, M. (2002). Intrusion detection systems are evolving. Computerworld, (July 15).
-
(2002)
Computerworld
, Issue.JULY 15
-
-
Andress, M.1
-
2
-
-
33750877929
-
-
12.31.99
-
Anson, R.S. (1999). 12.31.99. Vanity Fair, (January), 80-84.
-
(1999)
Vanity Fair
, Issue.JANUARY
, pp. 80-84
-
-
Anson, R.S.1
-
3
-
-
0035626767
-
The effects of time pressure on quality in software development
-
Austin, R. (2001). The effects of time pressure on quality in software development. Information Systems Research, (June), 195-207.
-
(2001)
Information Systems Research
, Issue.JUNE
, pp. 195-207
-
-
Austin, R.1
-
4
-
-
10444277673
-
Feds learn from corporate IT
-
Bacheldor, B. (2002). Feds learn from corporate IT. Information Week, (February 27).
-
(2002)
Information Week
, Issue.FEBRUARY 27
-
-
Bacheldor, B.1
-
5
-
-
10444244463
-
The Great Blackout of 2003
-
Ballman, J. (2003). The Great Blackout of 2003. Disaster Recovery Journal, (Fall), 16-18.
-
(2003)
Disaster Recovery Journal
, Issue.FALL
, pp. 16-18
-
-
Ballman, J.1
-
6
-
-
10444259340
-
Trusted traveler' aims to streamline security
-
Berger, M. (2002). 'Trusted Traveler' aims to streamline security. Computerworld, (March 18).
-
(2002)
Computerworld
, Issue.MARCH 18
-
-
Berger, M.1
-
7
-
-
10444278828
-
-
Retrieved June 6, 2004 from: News. news, com
-
Bowman, L. (2002). FBI digs deeper into the Web. Retrieved June 6, 2004 from: News. news, com
-
(2002)
FBI Digs Deeper into the Web
-
-
Bowman, L.1
-
8
-
-
10444224236
-
Watch out for wireless rogues
-
Brewin, B. (2002). Watch out for wireless rogues. Computerworld, (July 15).
-
(2002)
Computerworld
, Issue.JULY 15
-
-
Brewin, B.1
-
9
-
-
85039484946
-
-
Retrieved September 25, 2004 from: Cnn.com
-
Cavallaro, M. (2001). Private eyes. Retrieved September 25, 2004 from: Cnn.com
-
(2001)
Private Eyes
-
-
Cavallaro, M.1
-
10
-
-
10444285681
-
Put your IT eggs in different baskets
-
Cope, J. (2002). Put your IT eggs in different baskets. Computerworld, (July 15).
-
(2002)
Computerworld
, Issue.JULY 15
-
-
Cope, J.1
-
11
-
-
10444220551
-
Gates e-mail edict: How it marks the end of innocence
-
Coursey, D. (2002). Gates e-mail edict: How it marks the end of innocence. ZDNet, (January), 18.
-
(2002)
ZDNet
, Issue.JANUARY
, pp. 18
-
-
Coursey, D.1
-
12
-
-
0042884232
-
A year after 9/11: Where are we now?
-
Davies, S. (2002). A year after 9/11: Where are we now? Communications of the ACM, (September), 35-39.
-
(2002)
Communications of the ACM
, Issue.SEPTEMBER
, pp. 35-39
-
-
Davies, S.1
-
13
-
-
10444232331
-
Internet messaging keeps businesses, employees, in touch
-
Disabatino, J. (2001). Internet messaging keeps businesses, employees, in touch. Computerworld, (September 17).
-
(2001)
Computerworld
, Issue.SEPTEMBER 17
-
-
Disabatino, J.1
-
14
-
-
10444243712
-
Radio problem could last years
-
Dwyer, J. (2002). Radio problem could last years. New York Times, (September 18).
-
(2002)
New York Times
, Issue.SEPTEMBER 18
-
-
Dwyer, J.1
-
15
-
-
10444267689
-
Go on, watch me
-
Economist. (2002). Go on, watch me. (August 17), 12.
-
(2002)
Economist
, Issue.AUGUST 17
, pp. 12
-
-
-
17
-
-
10444287226
-
Security beyond your borders
-
Gilbert, A. (2001). Security beyond your borders. Information Week, (November 5).
-
(2001)
Information Week
, Issue.NOVEMBER 5
-
-
Gilbert, A.1
-
19
-
-
0031512352
-
Risk mitigation in large scale systems: Lessons from high reliability organizations
-
Grabowski, M., & Roberts, K. (1997). Risk mitigation in large scale systems: Lessons from high reliability organizations. California Management Review, (Summer), 152-162.
-
(1997)
California Management Review
, Issue.SUMMER
, pp. 152-162
-
-
Grabowski, M.1
Roberts, K.2
-
20
-
-
84862042767
-
-
Retrieved from BYTE
-
Halfhill, T. (1998) Crash-proof computing. Retrieved from BYTE: www.byte.com/ art/9804/sec5/artl.html
-
(1998)
Crash-proof Computing
-
-
Halfhill, T.1
-
21
-
-
0012133705
-
Antiterrorism law targets hackers around the world
-
Hulme, G. (2001). Antiterrorism law targets hackers around the world. Information Week, (December 3).
-
(2001)
Information Week
, Issue.DECEMBER 3
-
-
Hulme, G.1
-
22
-
-
10444283793
-
Help to combat the next big blended threat
-
Hulme, G. (2002). Help to combat the next big blended threat. Information Week, (April 1).
-
(2002)
Information Week
, Issue.APRIL 1
-
-
Hulme, G.1
-
25
-
-
85039476790
-
-
Kirsner, S. (1998). The ripple effect. Retrieved from: www.cio.archive/y2k_ ripple_content. html
-
(1998)
The Ripple Effect
-
-
Kirsner, S.1
-
26
-
-
84973701637
-
Organizational culture in high reliability organizations
-
Klein, R.L., Bigley, G.A., & Roberts, K.H. (1995). Organizational culture in high reliability organizations. Human Relations, 48(7), 771-792.
-
(1995)
Human Relations
, vol.48
, Issue.7
, pp. 771-792
-
-
Klein, R.L.1
Bigley, G.A.2
Roberts, K.H.3
-
27
-
-
10444259339
-
Embedded code is the future: Get ready to reboot
-
Koerner, B. (2002). Embedded code is the future: Get ready to reboot. WIRED, (August), 27-28.
-
(2002)
Wired
, Issue.AUGUST
, pp. 27-28
-
-
Koerner, B.1
-
28
-
-
10444256822
-
With phone lines bottlenecked, internet messaging became lifeline
-
Kontzer, T. (2001). With phone lines bottlenecked, internet messaging became lifeline. Information Week, (September 12).
-
(2001)
Information Week
, Issue.SEPTEMBER 12
-
-
Kontzer, T.1
-
32
-
-
0011137862
-
Working in practice but not in theory: Theoretical challenges of high reliability organizations
-
LaPorte, T.R., & Consolini. P. (1991). Working in practice but not in theory: Theoretical challenges of high reliability organizations. Journal of Public Administration, 1, 19-47.
-
(1991)
Journal of Public Administration
, vol.1
, pp. 19-47
-
-
Laporte, T.R.1
Consolini, P.2
-
33
-
-
10444272094
-
Web site defacement hit all-time high in September
-
Legard, D. (2002). Web site defacement hit all-time high in September. Computerworld, (September 30).
-
(2002)
Computerworld
, Issue.SEPTEMBER 30
-
-
Legard, D.1
-
34
-
-
10444290993
-
Report: Internet attacks on the rise
-
Lemos, R. (2001). Report: Internet attacks on the rise. ZDNet, (October 15).
-
(2001)
ZDNet
, Issue.OCTOBER 15
-
-
Lemos, R.1
-
36
-
-
10444272093
-
Security: The enemy within
-
Levitt, J. (2001). Security: The enemy within. Information Week, (April 23).
-
(2001)
Information Week
, Issue.APRIL 23
-
-
Levitt, J.1
-
37
-
-
10444238901
-
Data expert is cautious about misuse of information
-
Lohr, S. (2003). Data expert is cautious about misuse of information. New York Times, (March 25).
-
(2003)
New York Times
, Issue.MARCH 25
-
-
Lohr, S.1
-
38
-
-
10444274567
-
Homeland security CIO pushes collaboration
-
Meehan, M. (2002). Homeland security CIO pushes collaboration. Computerworld, (July 29).
-
(2002)
Computerworld
, Issue.JULY 29
-
-
Meehan, M.1
-
39
-
-
10444259338
-
Y2K plans aided in recovery, but more planning needed
-
Merian, L. (2001). Y2K plans aided in recovery, but more planning needed. Computerworld, (September 19).
-
(2001)
Computerworld
, Issue.SEPTEMBER 19
-
-
Merian, L.1
-
40
-
-
10444232332
-
Wall street aims to thwart criminals with database
-
Merian, L. (2002). Wall street aims to thwart criminals with database. Computerworld, (June 10).
-
(2002)
Computerworld
, Issue.JUNE 10
-
-
Merian, L.1
-
41
-
-
10444278829
-
Wall street seeks cyberterror defenses
-
Merian, L. (2002a). Wall street seeks cyberterror defenses. Computerworld, (March 4).
-
(2002)
Computerworld
, Issue.MARCH 4
-
-
Merian, L.1
-
45
-
-
10444254276
-
Recovered data in NY could explain preatttack financial dealings
-
Perera, R. (2001). Recovered data in NY could explain preatttack financial dealings. Computerworld, (December 19).
-
(2001)
Computerworld
, Issue.DECEMBER 19
-
-
Perera, R.1
-
48
-
-
4243104287
-
Total information overload
-
Popp, R. (2003). Total information overload. MIT Technology Review, (July/ August), 68-71.
-
(2003)
MIT Technology Review
, Issue.JULY- AUGUST
, pp. 68-71
-
-
Popp, R.1
-
49
-
-
85039472201
-
-
Robb, D. (2003). Robbing the (Data) bank. Retrieved from: http.V/itmanagement. earthweb.com/secu/article.php/ 2217441
-
(2003)
Robbing the (Data) Bank
-
-
Robb, D.1
-
50
-
-
0003726032
-
-
rinceton: Princeton University Press
-
Sagan, S. (1993). The limits of safety. rinceton: Princeton University Press.
-
(1993)
The Limits of Safety
-
-
Sagan, S.1
-
51
-
-
10444272092
-
Averting disaster
-
Scheier, R. (2001). Averting disaster. Computerworld, (January 15).
-
(2001)
Computerworld
, Issue.JANUARY 15
-
-
Scheier, R.1
-
52
-
-
10444273598
-
Top 10 vulnerabilities in today's Wi-Fi Networks
-
Singhai, S. (2002). Top 10 vulnerabilities in today's Wi-Fi Networks. Computerworld, (July 15).
-
(2002)
Computerworld
, Issue.JULY 15
-
-
Singhai, S.1
-
53
-
-
10444271340
-
Next terror target: The Internet
-
Snyder, J. (2002). Next terror target: The Internet. Computerworld, (June 10).
-
(2002)
Computerworld
, Issue.JUNE 10
-
-
Snyder, J.1
-
54
-
-
10444252964
-
Experts divided over use of CRM to prevent terrorism
-
Sullivan, B. (2002). Experts divided over use of CRM to prevent terrorism. Computerworld, (February 28).
-
(2002)
Computerworld
, Issue.FEBRUARY 28
-
-
Sullivan, B.1
-
55
-
-
10444252965
-
The myth of order
-
Ullman, E. (1999). The myth of order. Wired. Retrieved from: http:// wired, com/archive/7.04/y2k_pr.html
-
(1999)
Wired
-
-
Ullman, E.1
-
56
-
-
10444269750
-
Online profiling
-
Thibodeau, P. (2000). Online profiling. Computerworld, (September 18).
-
(2000)
Computerworld
, Issue.SEPTEMBER 18
-
-
Thibodeau, P.1
-
57
-
-
10444271341
-
Businesses eye Y2K effort as model for terrorism fight
-
Thibodeau, P. (2001). Businesses eye Y2K effort as model for terrorism fight. Computerworld, (October 2).
-
(2001)
Computerworld
, Issue.OCTOBER 2
-
-
Thibodeau, P.1
-
58
-
-
10444253516
-
Terrorism taxes IT planning
-
Thibodeau, P., & Merian, L. (2001). Terrorism taxes IT planning. Computerworld, (November 5).
-
(2001)
Computerworld
, Issue.NOVEMBER 5
-
-
Thibodeau, P.1
Merian, L.2
-
59
-
-
84855943482
-
The organizational and interorganizational development of disasters
-
Turner, B.M. (1976). The organizational and interorganizational development of disasters. Administrative Science Quarterly, 21, 378-397.
-
(1976)
Administrative Science Quarterly
, vol.21
, pp. 378-397
-
-
Turner, B.M.1
-
60
-
-
84969554769
-
Black Ice scenario sheds light on future threats to critical systems
-
Verton, D. (2001). Black Ice scenario sheds light on future threats to critical systems. Computerworld, (October 18).
-
(2001)
Computerworld
, Issue.OCTOBER 18
-
-
Verton, D.1
-
62
-
-
10444233890
-
IT key to antiterror defenses at nation's sea ports
-
Verton, D. (2002). IT key to antiterror defenses at nation's sea ports. Computerworld, (January 12).
-
(2002)
Computerworld
, Issue.JANUARY 12
-
-
Verton, D.1
-
63
-
-
10444226880
-
INS looks to IT to revamp lax student visa system
-
Verton, D. (2002). INS looks to IT to revamp lax student visa system. Computerworld, (March 25).
-
(2002)
Computerworld
, Issue.MARCH 25
-
-
Verton, D.1
-
64
-
-
79960898387
-
Denial-of-Service attacks still a threat
-
Vijayan, J. (2002). Denial-of-Service attacks still a threat. Computerworld, (April 8).
-
(2002)
Computerworld
, Issue.APRIL 8
-
-
Vijayan, J.1
-
65
-
-
33749432884
-
Can sensemaking keep us safe?
-
Waldrop, M. (2003). Can sensemaking keep us safe? MIT Technology Review, (March), 41-52.
-
(2003)
MIT Technology Review
, Issue.MARCH
, pp. 41-52
-
-
Waldrop, M.1
-
66
-
-
85047875702
-
Collective mind in organizations: Heedful interrelating on flight decks
-
Weick, K.E., & Roberts, K. (1993). Collective mind in organizations: Heedful interrelating on flight decks. Administrative Science Quarterly, 38, 357-381.
-
(1993)
Administrative Science Quarterly
, vol.38
, pp. 357-381
-
-
Weick, K.E.1
Roberts, K.2
-
67
-
-
0034550212
-
Modeling the incidence of postrelease errors in software
-
Westland, J.C. (2000). Modeling the incidence of postrelease errors in software. Information Systems Research, (September), 320-324.
-
(2000)
Information Systems Research
, Issue.SEPTEMBER
, pp. 320-324
-
-
Westland, J.C.1
-
68
-
-
10444265535
-
Post 9/11 drills aid club fire rescue
-
Wielawski, I. (2003). Post 9/11 drills aid club fire rescue. New York Times, (March 23).
-
(2003)
New York Times
, Issue.MARCH 23
-
-
Wielawski, I.1
|