skip to main content
10.1145/228329.228330acmconferencesArticle/Chapter ViewAbstractPublication PagescscConference Proceedingsconference-collections
Article
Free Access

Enumerating the risks of reengineered processes

Authors Info & Claims
Published:20 February 1996Publication History
First page image

References

  1. 1.Caron, J. Raymond, Sirkka L. Javenpaa, and Donna B. Stoddard,"Business Reengineering at CIGNA Corporation: Experiences and Lessons Learned from the First Five Years," MIS Quarterly, September, 1994, p. 233-250. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.Champy, James, Reengineering Management: The Mandate for New Leadership, HarperCollins: New York, 1995.Google ScholarGoogle Scholar
  3. 3.Collins, W. Robert, Keith W. Miller, Bethany J. Spielman, and Philip Wherry, "How Good is Good Enough?" Communications of the ACM, 37(1), January, 1994. p. 81-91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.Costello, Scott H., "Software Engineering Under Deadline Pressure," ACM SIGSOFT Software Engineering Notes, 9(5), October, ! 984, p. 15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.Davenport, Thomas, H., Nitin Nohria, "Case Management and the Integration of Labor," Sloan Management Review, 35(2) Winter 1994, p. I 1-23.Google ScholarGoogle Scholar
  6. 6.DeBoever, Larry, "Reengineering Your I/S Architecture," The Computer Conference Analysis Newsletter, 349. p. I-3.Google ScholarGoogle Scholar
  7. 7.Gibbs, W. Wayt, "Software's Chronic Crisis," Scientific American, September, 1994, p. 86-95.Google ScholarGoogle ScholarCross RefCross Ref
  8. 8.Hammer, Michael, "Reengincedng Work: Don't Automate, Obliterate," Harvard Business Review, 90(4), July- August, 1990, p. 104-112.Google ScholarGoogle Scholar
  9. 9.Hammer, Michael, and James Champy, Reengineering the Corporation, HarpcrCollins Publishers, New York, 1993.Google ScholarGoogle Scholar
  10. 10.Hammer, Michael, and Steven A. Stanton, The Reengineering Revolution: A Handbook, HarperCollins Publishers, New York, 1995.Google ScholarGoogle Scholar
  11. 11.Lewis, Peter, "A Rise in Intcrnet Break-lns Sets off a Security Alarm," New York Times, February, 5, 1994, p. bl, b48.Google ScholarGoogle Scholar
  12. 12.Littlewood, Bey, and Lorenzo Strigini, "The Risks of Software," Scientific American, November, 1992, p. 62-75.Google ScholarGoogle ScholarCross RefCross Ref
  13. 13.Longo, Susan C., "After Reengincering- 'Dcjobbing'" CPA Journal, 65(3), March 1995, p. 69.Google ScholarGoogle Scholar
  14. 14.Morris, Joe, "Another Computer Taken Hostage," Software Engineering Notes, 12(3), July 1987, p. 13.Google ScholarGoogle Scholar
  15. 15.Neumann, Peter, "Inside Risks: Some Reflections on a Telephone Switching Problem," Communications of the ACM, 33(7), July, 1990, p. 154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.Neumann, Peter, "Inside Risks: Certifying Professionals," Communications of the ACM, 34(2), February, 1991, p. 130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.Neumann, Peter, "Inside Risks: Leap-Year Problems," Communications of the ACM, 35(6), June, 1992b, p. 162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.Neumann, Peter, "Inside Risks: Fraud by Computer," Communications of the ACM, 35(8), August, 1992c, p. 154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.Neumann, Peter, Computer Related Risks, Addison Wesley, New York, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.Nissenbaum, Helen, "Computing andAccountability," Communications of the ACM, 37(1), January, 1994, p. 73-80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.Norman, Donald, "Commentary: Human Error and the Design of Computer Systems," Communications of the ACM, 33(i), p. 4-7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.Pamas, David L., John van Schouwen, and Shu Po Kwan, "Evaluation of Safety-Critical Software," Communications of the ACM, 33(6), June, 1990, p. 636-648. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.Perrow, Charles, Normal Accidents: Living with High Risk Technologies, Basic Books: New York, 1984.Google ScholarGoogle Scholar
  24. 24.Sagan, Scott, The Limits of Safety, Princeton University Press: Princeton, New Jersey, 1993.Google ScholarGoogle Scholar
  25. 25.Schwartau, Winn, Information Warfare, Thunder's Mouth Press: New York, 1995.Google ScholarGoogle Scholar
  26. 26.Scott-Morgan, Peter, "Why Change Fails to Motivate the Workers," Computer Weekly, January, 5, 1995, p. 14.Google ScholarGoogle Scholar
  27. 27.Sears, Woody, Roy Trotter, "Reengineering Readiness Test: What's Your Infrastructure IQ?" Industrial Engineering, 27(I), January 1995, p. 16-17.Google ScholarGoogle Scholar
  28. 28.Wiener, Lauren, Digitial Woes: Why We Should Not Depend on Software, Addison-Wesley: Reading Massachusetts, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Enumerating the risks of reengineered processes

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CSC '96: Proceedings of the 1996 ACM 24th annual conference on Computer science
        February 1996
        162 pages
        ISBN:0897918282
        DOI:10.1145/228329

        Copyright © 1996 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 February 1996

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article
      • Article Metrics

        • Downloads (Last 12 months)14
        • Downloads (Last 6 weeks)5

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader