| |
| |
Preface | |
| |
| |
| |
Introduction | |
| |
| |
September 11, 2001 | |
| |
| |
The paradigm shift | |
| |
| |
IT will be one of the likely battlefields of the future | |
| |
| |
What Assumptions Does the Book Make About You? Who Is This Book Aimed At? Structure of the Book | |
| |
| |
| |
Strategic Implications Of 9/11 | |
| |
| |
Personal Consequences | |
| |
| |
Corporate Consequences | |
| |
| |
Recognition of the unpredictability of today's world | |
| |
| |
Developing early-warning systems of impending change | |
| |
| |
Learning to change and adapt much more quickly than ever before | |
| |
| |
Recognizing the importance and vulnerability of their "information assets" | |
| |
| |
National Consequences | |
| |
| |
"Guns and butter" vs | |
| |
| |
"guns or butter" | |
| |
| |
Recognition of national "critical infrastructure" issues | |
| |
| |
Coordination, improvement of existing systems. Impact on privacy | |
| |
| |
Conclusion | |
| |
| |
| |
Security | |
| |
| |
Basic Concepts | |
| |
| |
Techniques and Technologies | |
| |
| |
Identification of users | |
| |
| |
Authorization and access control | |
| |
| |
Protection of data in transit across "exposed" areas | |
| |
| |
Audit of activities and accesses to information | |
| |
| |
Monitoring of suspected security threats | |
| |
| |
Paradigm Shift | |
| |
| |
IT systems are part of the "critical Infrastructure" | |
| |
| |
Threats exist from various levels of players | |
| |
| |
Operational security vs | |
| |
| |
software development security | |
| |
| |
Physical security has changed because of miniaturization | |
| |
| |
Using the Internet as indirect weapon to support terrorism | |
| |
| |
The decade of security | |
| |
| |
Strategic Implications | |
| |
| |
Government and political leaders | |
| |
| |
Senior corporate executives | |
| |
| |
Mid-level IT managers | |
| |
| |
Technical IT professionals | |
| |
| |
Citizens | |
| |
| |
| |
Risk Management | |
| |
| |
Basic Concepts | |
| |
| |
Techniques and Technologies | |
| |
| |
Establishing a risk-aware culture | |
| |
| |
Realistic assessment of risks | |
| |
| |
Ensuring that risks are shared between stakeholders | |
| |
| |
Developing processes for risk management | |
| |
| |
Paradigm Shifts in Risk Management | |
| |
| |
High tech can be threatened by low tech | |
| |
| |
Kamikaze players | |
| |
| |
The rise of the "stateless" power | |
| |
| |
The rapid pace of change | |
| |
| |
Strategic Implications | |
| |
| |
Government officials | |
| |
| |
Senior corporate executives | |
| |
| |
Mid-level IT managers | |
| |
| |
IT professionals | |
| |
| |
Citizens | |
| |
| |
| |
Emergent Systems | |
| |
| |
Basic Concepts | |
| |
| |
Benefits of emergent systems and emergent organizations | |
| |
| |
Characteristics of the emergent organization | |
| |
| |
Techniques and Technologies | |
| |
| |
Peer-to-peer communication mechanisms | |
| |
| |
Tools for collaboration | |
| |
| |
Modeling and simulation tools | |
| |
| |
Paradigm Shifts | |
| |
| |
Strategic Implications | |
| |
| |
Government leaders | |
| |
| |
Senior corporate executives | |
| |
| |
Mid-level IT managers | |
| |
| |
IT professionals | |
| |
| |
Citizens | |
| |
| |
| |
Resilient Systems | |
| |
| |
Basic Concepts | |
| |
| |
Techniques and Technologies | |
| |
| |
Familiar techniques | |
| |
| |
Early warning systems | |
| |
| |
Mechanisms for rapid change | |
| |
| |
Paradigm Shifts | |
| |
| |
Strategic Implications | |
| |
| |
Government officials | |
| |
| |
Senior corporate executives | |
| |
| |
Mid-level IT managers | |
| |
| |
IT professionals | |
| |
| |
Citizens | |
| |
| |
| |
Good Enough Systems | |
| |
| |
Basic Concepts | |
| |
| |
Techniques and Technologies for Developing Good-Enough Software | |
| |
| |
A utilitarian strategy | |
| |
| |
An evolutionary strategy | |
| |
| |
Heroic teams | |
| |
| |
Dynamic infrastructure | |
| |
| |
Dynamic processes | |
| |
| |
Paradigm Shifts | |
| |
| |
Malevolent threats | |
| |
| |
Life and death circumstances | |
| |
| |
Strategic Implications | |
| |
| |
Government leaders | |
| |
| |
Senior corporate executives | |
| |
| |
Mid-level IT managers | |
| |
| |
IT professionals | |
| |
| |
Citizens | |
| |
| |
| |
Death-March Projects | |
| |
| |
Basic Concepts | |
| |
| |
What is a death-march project? Why do death-march projects exist? Why do people participate in death-march projects? Techniques and Technologies | |
| |
| |
Negotiations | |
| |
| |
Peopleware | |
| |
| |
Processes | |
| |
| |
Monitoring progress | |
| |
| |
Paradigm Shifts | |
| |
| |
The impact of September 11th | |
| |
| |
The impact of the recession | |
| |
| |
Strategic Implications | |
| |
| |
Government leaders | |
| |
| |
Senior corporate executives | |
| |
| |
Mid-level IT managers | |
| |
| |
IT professionals | |
| |
| |
Citizens | |
| |
| |
| |
Conclusio | |