-
2
-
-
0035408394
-
A system approach to the reduction of medication error on the hospital ward
-
1
-
Anderson, D. J., & Webster, C. S. (2001). A system approach to the reduction of medication error on the hospital ward. Journal of Advanced Nursing, 35(1), 34-41.
-
(2001)
Journal of Advanced Nursing
, vol.35
, pp. 34-41
-
-
Anderson, D.J.1
Webster, C.S.2
-
3
-
-
0034681861
-
Reporting and preventing medical mishaps: Lessons from nonmedical near miss reporting systems
-
Barach, P., & Small, S. D. (2000). Reporting and preventing medical mishaps: Lessons from nonmedical near miss reporting systems. British Medical Journal, 320, 759-763.
-
(2000)
British Medical Journal
, vol.320
, pp. 759-763
-
-
Barach, P.1
Small, S.D.2
-
4
-
-
0024962452
-
Multiple tests for validation of system dynamics type of simulation models
-
Barlas, Y. (1989). Multiple tests for validation of system dynamics type of simulation models. European Journal of Operations Research, 42, 59-87.
-
(1989)
European Journal of Operations Research
, vol.42
, pp. 59-87
-
-
Barlas, Y.1
-
5
-
-
0001022016
-
Formal aspects of model validity and validation in system dynamics
-
3
-
Barlas, Y. (1996). Formal aspects of model validity and validation in system dynamics. System Dynamics Review, 12(3), 183-210.
-
(1996)
System Dynamics Review
, vol.12
, pp. 183-210
-
-
Barlas, Y.1
-
6
-
-
84986099457
-
Knowledge management in organizations: Examining the interaction between technologies, techniques, and people
-
1
-
Bhatt, G. D. (2001). Knowledge management in organizations: Examining the interaction between technologies, techniques, and people. Journal of Knowledge Management, 5(1), 68-75.
-
(2001)
Journal of Knowledge Management
, vol.5
, pp. 68-75
-
-
Bhatt, G.D.1
-
7
-
-
33745183747
-
How to think about security failures
-
1
-
Campbell, S. (2006).How to think about security failures. Communications of the ACM, 49(1), 37-39 (01).
-
(2006)
Communications of the ACM
, vol.49
, pp. 37-39
-
-
Campbell, S.1
-
8
-
-
33845327850
-
Learning from incidents: From normal accidents to high reliability
-
3
-
Cooke, D. L., & Rohleder, T. R. (2006). Learning from incidents: From normal accidents to high reliability. System Dynamics Review, 22(3), 213-239.
-
(2006)
System Dynamics Review
, vol.22
, pp. 213-239
-
-
Cooke, D.L.1
Rohleder, T.R.2
-
9
-
-
0034334828
-
Barriers and facilitators to the use of knowledge management systems
-
6
-
Damodaran, L., & Olphert, W. (2000). Barriers and facilitators to the use of knowledge management systems. Behaviour & Information Technology, 19(6), 405-413.
-
(2000)
Behaviour & Information Technology
, vol.19
, pp. 405-413
-
-
Damodaran, L.1
Olphert, W.2
-
12
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
3
-
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.
-
(1989)
MIS Quarterly
, vol.13
, pp. 319-340
-
-
Davis, F.D.1
-
13
-
-
35548944839
-
Intrusion detection: Introduction to intrusion detection and security information management
-
Springer Berlin Heidelberg
-
Debar, H., & Viinikka, J. (2005). Intrusion detection: Introduction to intrusion detection and security information management. In A. Aldini, R. Gorrieri, & F. Martinelli (Eds.), Foundations of security analysis and design III (pp. 207-236). Heidelberg: Springer Berlin.
-
(2005)
Foundations of Security Analysis and Design III
, pp. 207-236
-
-
Debar, H.1
Viinikka, J.2
Aldini, A.3
Gorrieri, R.4
Martinelli, F.5
-
16
-
-
0003018239
-
Policies, decisions, and information sources for modeling
-
Productivity Press Portland, OR
-
Forrester, J. W. (1994). Policies, decisions, and information sources for modeling. In J. D. W. Morecroft, J. D. Sterman (Eds.), Modeling for learning organizations (pp. 51-84). Portland, OR: Productivity Press.
-
(1994)
Modeling for Learning Organizations
, pp. 51-84
-
-
Forrester, J.W.1
Morecroft, J.D.W.2
Sterman, J.D.3
-
18
-
-
30344462995
-
The economic incentives for sharing security information
-
2
-
Gal-Or, E., & Ghose, A. (2005). The economic incentives for sharing security information. Information Systems Research, 16(2), 186-208.
-
(2005)
Information Systems Research
, vol.16
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
19
-
-
0034906005
-
Knowledge management: An organizational capabilities perspective
-
1
-
Gold, A. H., Malhotra, A., & Segars, A. H. (2001). Knowledge management: An organizational capabilities perspective. Journal of Management Information Systems, 18(1), 185-214.
-
(2001)
Journal of Management Information Systems
, vol.18
, pp. 185-214
-
-
Gold, A.H.1
Malhotra, A.2
Segars, A.H.3
-
20
-
-
34948816818
-
Towards a cyber security reporting system-a quality improvement process
-
Springer Heidelberg
-
Gonzalez, J. J. (2005). Towards a cyber security reporting system-a quality improvement process. In B. A. G. Rune Winther, & G. Dahll (Eds.), Computer safety, reliability, and security. Heidelberg: Springer.
-
(2005)
Computer Safety, Reliability, and Security
-
-
Gonzalez, J.J.1
Rune Winther, B.A.G.2
Dahll, G.3
-
22
-
-
0344899914
-
Sharing information on computer systems security: An economic analysis
-
6
-
Gordon, L. A., Loeb, M., & Lucyshyn, W. (2003). Sharing information on computer systems security: An economic analysis. Journal of Accounting Public Policy, 22(6), 461-485.
-
(2003)
Journal of Accounting Public Policy
, vol.22
, pp. 461-485
-
-
Gordon, L.A.1
Loeb, M.2
Lucyshyn, W.3
-
23
-
-
3242808612
-
-
Technical Report: Computer Security Institute
-
Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Richardson, R. (2004). CSI/FBI Computer Crime and Security Survey. Technical Report: Computer Security Institute.
-
(2004)
CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
24
-
-
36849064867
-
The myth of user education
-
2006 11-13 October, Montréal, Canada
-
Görling, S. (2006). The myth of user education. Virus Bulletin Conference; 2006 11-13 October; Montréal, Canada.
-
(2006)
Virus Bulletin Conference
-
-
Görling, S.1
-
25
-
-
0003855888
-
-
Jossey-Bass Publishers San Francisco
-
Halal, G. (1998). The infinite resource. San Francisco: Jossey-Bass Publishers.
-
(1998)
The Infinite Resource
-
-
Halal, G.1
-
26
-
-
35549000061
-
A framework for security requirements engineering
-
Haley C. B., Moffett J. D., Laney, R., & Nuseibeh, B. (Eds.) Shanghai, China IEEE
-
Haley, C. B., Moffett, J. D., Laney, R., & Nuseibeh, B. (Eds.) (2005). A framework for security requirements engineering. The 2006 International Workshop on Software Engineering for Secure Systems; Shanghai, China IEEE.
-
(2005)
The 2006 International Workshop on Software Engineering for Secure Systems
-
-
-
27
-
-
2342533168
-
A formal knowledge management ontology: Conduct, activities, resources and influences
-
7
-
Holzapple, C. W., & Joshi, K. D. (2004). A formal knowledge management ontology: Conduct, activities, resources and influences. Journal of the American Society for Information Science and Technology, 55(7), 593-612 (May).
-
(2004)
Journal of the American Society for Information Science and Technology
, vol.55
, pp. 593-612
-
-
Holzapple, C.W.1
Joshi, K.D.2
-
29
-
-
0041825291
-
1000 anaesthetic incidents: Experience to date
-
James, R. H. (2003). 1000 anaesthetic incidents: Experience to date. Anaesthesia, 58, 856-863.
-
(2003)
Anaesthesia
, vol.58
, pp. 856-863
-
-
James, R.H.1
-
31
-
-
0038764221
-
The importance of near miss reporting to further improve safety performance
-
1
-
Jones, S., Kirchsteiger, C., & Bjerke, W. (1999). The importance of near miss reporting to further improve safety performance. Journal of Loss Prevention in the Process Industries, 12(1), 59-67.
-
(1999)
Journal of Loss Prevention in the Process Industries
, vol.12
, pp. 59-67
-
-
Jones, S.1
Kirchsteiger, C.2
Bjerke, W.3
-
32
-
-
0003422547
-
-
Prentice-Hall Englewood Cliffs, NJ
-
Kahneman, D. (1973). Attention and effort. Englewood Cliffs, NJ: Prentice-Hall.
-
(1973)
Attention and Effort
-
-
Kahneman, D.1
-
33
-
-
0013094981
-
Prospect theory: An analysis of decision under risk
-
Cambridge University Press Cambridge, UK
-
Kahneman, D., & Tversky, A. (2000). Prospect theory: An analysis of decision under risk. In D. Kahneman & A. Tversky (Eds.), Choices, values, and frames. Cambridge, UK: Cambridge University Press.
-
(2000)
Choices, Values, and Frames
-
-
Kahneman, D.1
Tversky, A.2
Kahneman, D.3
Tversky, A.4
-
35
-
-
34948866915
-
Air carrier safety and culture: An investigation of Taiwan's adaptation to western incident reporting programs
-
1
-
Lee, P. I., & Weitzel, T. R. (2005). Air carrier safety and culture: An investigation of Taiwan's adaptation to western incident reporting programs. Journal of Air Transportation, 10(1), 20-37.
-
(2005)
Journal of Air Transportation
, vol.10
, pp. 20-37
-
-
Lee, P.I.1
Weitzel, T.R.2
-
37
-
-
33746593166
-
Effective reward systems for knowledge sharing
-
Moon, H. K., & Park, M. S. (2002). Effective reward systems for knowledge sharing. Knowledge Management Review, 22-25.
-
(2002)
Knowledge Management Review
, pp. 22-25
-
-
Moon, H.K.1
Park, M.S.2
-
38
-
-
35549004859
-
-
National Institute of Standards and Technology Special Publication 800-12: US Department of Commerce; July.
-
National Institute of Standards and Technology. (2000). An introduction to computer security: The NIST handbook. Special Publication 800-12: US Department of Commerce; July.
-
(2000)
An Introduction to Computer Security: The NIST Handbook
-
-
-
39
-
-
35048897235
-
-
National Institute of Standards and Technology. Special Publication 800-27. Gaithersburg, MD: US Department of Commerce; 2001 June
-
National Institute of Standards and Technology. (2001). Engineering principles for information technology security (A baseline for achieving security). Special Publication 800-27. Gaithersburg, MD: US Department of Commerce; 2001 June.
-
(2001)
Engineering Principles for Information Technology Security (A Baseline for Achieving Security)
-
-
-
40
-
-
33845243602
-
The prevention of occupational injuries in two industrial plants using an incident reporting scheme
-
Nielsen, K. J., Carstensen, O., & Rasmussen, K. (2006). The prevention of occupational injuries in two industrial plants using an incident reporting scheme. Journal of Safety Research, 37(5), 479-486.
-
(2006)
Journal of Safety Research
, vol.37
, Issue.5
, pp. 479-486
-
-
Nielsen, K.J.1
Carstensen, O.2
Rasmussen, K.3
-
41
-
-
14244249412
-
Reporting systems in healthcare from a case-by-case experience to a general framework: An example in anaesthesia
-
21
-
Nyssen, A. S., Aunac, S., Faymonville, M. E., & Lutte, I. (2004). Reporting systems in healthcare from a case-by-case experience to a general framework: An example in anaesthesia. European Journal of Anaesthesiology, 10(21), 757-765.
-
(2004)
European Journal of Anaesthesiology
, vol.10
, pp. 757-765
-
-
Nyssen, A.S.1
Aunac, S.2
Faymonville, M.E.3
Lutte, I.4
-
43
-
-
0037976903
-
Near-miss incident management in the chemical process industry
-
3
-
Phimister, J. R., Oktem, U., Kleindorfer, P. R., & Kunreuther, H. (2003). Near-miss incident management in the chemical process industry. Risk Analysis, 23(3), 445-459.
-
(2003)
Risk Analysis
, vol.23
, pp. 445-459
-
-
Phimister, J.R.1
Oktem, U.2
Kleindorfer, P.R.3
Kunreuther, H.4
-
44
-
-
32644465248
-
-
Technical Report. Pittsburgh, PA: U.S. Secret Service and CERT Coordination Center / Software Engineering Institute; 2004 August
-
Randazzo, M. R., Keeney, M. M., Kowalski, E. F., Cappelli, D. M., & Moore, A. P. (2004). Insider threat study: Illicit cyber activity in the banking and finance sector. Technical Report. Pittsburgh, PA: U.S. Secret Service and CERT Coordination Center / Software Engineering Institute; 2004 August.
-
(2004)
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
-
-
Randazzo, M.R.1
Keeney, M.M.2
Kowalski, E.F.3
Cappelli, D.M.4
Moore, A.P.5
-
45
-
-
0034681819
-
Human error models and management
-
Reason, J. (2000). Human error models and management. British Medical Journal, (320), 768-770.
-
(2000)
British Medical Journal
, Issue.320
, pp. 768-770
-
-
Reason, J.1
-
46
-
-
0035623034
-
Nobody ever gets credit for fixing defects that didn't happen: Creating and sustaining process improvement
-
4
-
Repenning, N., & Sterman, J. (2001). Nobody ever gets credit for fixing defects that didn't happen: Creating and sustaining process improvement. California Management Review, 43(4), 64-88.
-
(2001)
California Management Review
, vol.43
, pp. 64-88
-
-
Repenning, N.1
Sterman, J.2
-
49
-
-
0032962272
-
An evaluation of adverse incident reporting
-
1
-
Stanhope, N., Crowley-Murphy, M., Vincent, C., O'Connor, A. M., & Taylor-Adams, S. E. (1999). An evaluation of adverse incident reporting. Journal of Evaluation in Clinical Practice, 5(1), 5-12.
-
(1999)
Journal of Evaluation in Clinical Practice
, vol.5
, pp. 5-12
-
-
Stanhope, N.1
Crowley-Murphy, M.2
Vincent, C.3
O'Connor, A.M.4
Taylor-Adams, S.E.5
-
53
-
-
33748075456
-
Toward a unified security/safety model
-
8
-
Stoneburner, G. (2006). Toward a unified security/safety model. Computer, 39(8), 96-97.
-
(2006)
Computer
, vol.39
, pp. 96-97
-
-
Stoneburner, G.1
-
55
-
-
0033872521
-
A theoretical extension of the technology acceptance model: Four longitudinal field studies
-
2
-
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186-204.
-
(2000)
Management Science
, vol.46
, pp. 186-204
-
-
Venkatesh, V.1
Davis, F.D.2
-
57
-
-
0032119072
-
Towards a theory of continuous improvement and the learning curve
-
7
-
Zangwill, W. I., & Kantor, P. B. (1998). Towards a theory of continuous improvement and the learning curve. Management Science, 44(7), 910-920.
-
(1998)
Management Science
, vol.44
, pp. 910-920
-
-
Zangwill, W.I.1
Kantor, P.B.2
|