메뉴 건너뛰기




Volumn 49, Issue 2, 2006, Pages 115-125

Y2K all over again: How groupthink permeates IS and compromises security

Author keywords

Groupthink; Information systems; Security; Software

Indexed keywords


EID: 31644435932     PISSN: 00076813     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.bushor.2005.07.002     Document Type: Article
Times cited : (6)

References (35)
  • 1
    • 0035995871 scopus 로고    scopus 로고
    • Security in the information systems curriculum: Identification and status of relevant issues
    • J.E. Anderson P.H. Schwager Security in the information systems curriculum: Identification and status of relevant issues Journal of Computer Information Systems 42 3 2002 16
    • (2002) Journal of Computer Information Systems , vol.42 , Issue.3 , pp. 16
    • Anderson, J.E.1    Schwager, P.H.2
  • 3
    • 31644437675 scopus 로고    scopus 로고
    • Projected 2004 IT spending growth: Inching upward
    • Cambridge, MA: Forrester Research
    • A. Bartels Projected 2004 IT spending growth: Inching upward 2004 Forrester Research Cambridge, MA
    • (2004)
    • Bartels, A.1
  • 4
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • R. Baskerville Information systems security design methods: Implications for information systems development ACM Computing Surveys 25 4 1993 375-414
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 5
    • 34848836808 scopus 로고    scopus 로고
    • The state of information security 2003
    • S. Berinato L.C. Ware The state of information security 2003 CIO 17 2 2003 1
    • (2003) CIO , vol.17 , Issue.2 , pp. 1
    • Berinato, S.1    Ware, L.C.2
  • 6
    • 77956536069 scopus 로고    scopus 로고
    • Global security survey '04
    • S. Berinato L.C. Ware Global security survey '04 CIO 17 23 2004 1
    • (2004) CIO , vol.17 , Issue.23 , pp. 1
    • Berinato, S.1    Ware, L.C.2
  • 8
    • 31644440907 scopus 로고    scopus 로고
    • The year 2000 problem (No. 111)
    • CSC Index Research and Advisory Services CSC Index Research and Advisory Services London
    • CSC Index Research and Advisory Services The year 2000 problem (No. 111) 1997 CSC Index Research and Advisory Services London
    • (1997)
  • 9
    • 31644446432 scopus 로고    scopus 로고
    • For e-projects, do it right and deliver on time
    • Cutter Consortium (2001, May 17) Retrieved May 31 from
    • Cutter Consortium For e-projects, do it right and deliver on time (2001, May 17) Retrieved May 31, 2002, from http://www.cutter.com/press/ 010517.html.
    • (2002)
  • 10
    • 31644443525 scopus 로고    scopus 로고
    • 2004 global security survey 2004
    • Deloitte Global Financial Services Industry Retrieved from
    • Deloitte Global Financial Services Industry 2004 global security survey 2004 Retrieved from http://www.deloitte.com/dtt/cda/doc/content/ dtt_financialservices_SecuritySurvey2004_051704.pdf
  • 11
    • 0036765493 scopus 로고    scopus 로고
    • Management's role in information security in a cyber economy
    • A. Dutta K. McCrohan Management's role in information security in a cyber economy California Management Review 45 1 2002 67-87
    • (2002) California Management Review , vol.45 , Issue.1 , pp. 67-87
    • Dutta, A.1    McCrohan, K.2
  • 12
    • 31644450571 scopus 로고    scopus 로고
    • Ernst Young Global information security survey 2004 Retrieved from
    • Ernst Young Global information security survey 2004 2004 Retrieved from http://www.ey.com/global/download.nsf/International/ 2004_Global_Information_Security_Survey/$file/ 2004_Global_Information_Security_Survey_2004.pdf
    • (2004)
  • 13
    • 13844320608 scopus 로고    scopus 로고
    • More on management's role in IT project failures
    • J. Glaser More on management's role in IT project failures Healthcare Financial Management 59 1 2005 82-84
    • (2005) Healthcare Financial Management , vol.59 , Issue.1 , pp. 82-84
    • Glaser, J.1
  • 14
    • 4944232725 scopus 로고    scopus 로고
    • 2004 CSI/FBI computer crime and security survey
    • Computer security institute
    • L.A. Gordon M.P. Loeb W. Lucyshyn R. Richardson 2004 CSI/FBI computer crime and security survey. Computer security institute 2004 Retrieved from http://www.reddshell.com/docs/csi_fbi_2004.pdf
    • (2004)
    • Gordon, L.A.1    Loeb, M.P.2    Lucyshyn, W.3    Richardson, R.4
  • 15
    • 10244240442 scopus 로고    scopus 로고
    • Why today's security technologies are so inadequate: History, implications and new approaches
    • S. Hofmeyr Why today's security technologies are so inadequate: History, implications and new approaches Information Systems Security 12 1 2003 17-21
    • (2003) Information Systems Security , vol.12 , Issue.1 , pp. 17-21
    • Hofmeyr, S.1
  • 16
    • 14644398319 scopus 로고    scopus 로고
    • Report of the ITAA blue ribbon panel on IT diversity
    • Information Technology Association of America Information Technology Association of America Arlington, VA
    • Information Technology Association of America Report of the ITAA blue ribbon panel on IT diversity 2003 Information Technology Association of America Arlington, VA
    • (2003)
  • 17
    • 0003750229 scopus 로고
    • 2nd ed. Boston: Houghton Mifflin Company
    • I.L. Janis Groupthink 2nd ed. 1983 Houghton Mifflin Company Boston
    • (1983) Groupthink
    • Janis, I.L.1
  • 19
    • 13544258973 scopus 로고    scopus 로고
    • Computing time for the crime
    • February 14
    • J. Krause Computing time for the crime ABA Journal 91 2005, February 14
    • (2005) ABA Journal , pp. 91
    • Krause, J.1
  • 21
    • 15744399299 scopus 로고    scopus 로고
    • Security and risk management: A fundamental business issue
    • A.C. McAdams Security and risk management: A fundamental business issue Information Management Journal 38 4 2004 36-44
    • (2004) Information Management Journal , vol.38 , Issue.4 , pp. 36-44
    • McAdams, A.C.1
  • 23
    • 0242706108 scopus 로고    scopus 로고
    • OECD guidelines for the security of information systems and networks: Towards a culture of security
    • OECD Organisation for Economic Co-Operation and Development Paris
    • OECD OECD guidelines for the security of information systems and networks: Towards a culture of security 2002 Organisation for Economic Co-Operation and Development Paris
    • (2002)
  • 24
    • 0036648651 scopus 로고    scopus 로고
    • Post 9-11 security: Few changes, business as usual rules
    • L.D. Paulson Post 9-11 security: Few changes, business as usual rules IT Professional 4 4 2002 10-13
    • (2002) IT Professional , vol.4 , Issue.4 , pp. 10-13
    • Paulson, L.D.1
  • 25
    • 31644440909 scopus 로고    scopus 로고
    • An evolving job description
    • October 13
    • W.G. Peck An evolving job description Journal of Commerce 2003, October 13 1
    • (2003) Journal of Commerce , pp. 1
    • Peck, W.G.1
  • 26
    • 31644451145 scopus 로고    scopus 로고
    • IT spending continues to focus on security
    • Cambridge, MA: Forrester Research
    • J. Penn IT spending continues to focus on security 2004 Forrester Research Cambridge, MA
    • (2004)
    • Penn, J.1
  • 27
    • 15744398163 scopus 로고    scopus 로고
    • 2003 global security survey
    • New York: Deloitte Touche Tohmatsu
    • R. Power 2003 global security survey 2003 Deloitte Touche Tohmatsu New York
    • (2003)
    • Power, R.1
  • 28
    • 85008054222 scopus 로고    scopus 로고
    • What a tangled Web we weave
    • R.S. Pressman What a tangled Web we weave IEEE Software 17 1 2000 18-21
    • (2000) IEEE Software , vol.17 , Issue.1 , pp. 18-21
    • Pressman, R.S.1
  • 29
    • 85008033766 scopus 로고    scopus 로고
    • Y2K: Don't play it again, Sam
    • J. Sanders Y2K: Don't play it again, Sam IEEE Software 15 3 1998 100-102
    • (1998) IEEE Software , vol.15 , Issue.3 , pp. 100-102
    • Sanders, J.1
  • 30
    • 0002513132 scopus 로고    scopus 로고
    • Three cultures of management: The key to organizational learning
    • E.H. Schein Three cultures of management: The key to organizational learning Sloan Management Review 38 1 1996 9-20
    • (1996) Sloan Management Review , vol.38 , Issue.1 , pp. 9-20
    • Schein, E.H.1
  • 31
    • 31644449443 scopus 로고    scopus 로고
    • Test of loyalty
    • CIO March 16 Retrieved from
    • J. Surmacz Test of loyalty. CIO 2004, March 16 Retrieved from http://www2.cio.com/metrics/2004/metric673.html
    • (2004)
    • Surmacz, J.1
  • 32
    • 0141863310 scopus 로고    scopus 로고
    • Technomillennialism: A subcultural response to the technological threat of Y2K
    • A.H. Tapia Technomillennialism: A subcultural response to the technological threat of Y2K Science, Technology, and Human Values 28 4 2003 483-512
    • (2003) Science, Technology, and Human Values , vol.28 , Issue.4 , pp. 483-512
    • Tapia, A.H.1
  • 33
    • 85008044245 scopus 로고    scopus 로고
    • The year 2000 bug: A forgotten lesson
    • R. Thomsett The year 2000 bug: A forgotten lesson IEEE Software 15 4 1998 91-95
    • (1998) IEEE Software , vol.15 , Issue.4 , pp. 91-95
    • Thomsett, R.1
  • 34
    • 31644451144 scopus 로고    scopus 로고
    • Historical development of the Y2K problem: Challenging the conventional wisdom, part III of III
    • R.D. Williams B.T. Smyth Historical development of the Y2K problem: Challenging the conventional wisdom, part III of III Computer and Internet Lawyer 16 4 1999 10-20
    • (1999) Computer and Internet Lawyer , vol.16 , Issue.4 , pp. 10-20
    • Williams, R.D.1    Smyth, B.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.