Academic literature on the topic 'Y2K computer crisis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Y2K computer crisis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Y2K computer crisis"

1

NAWA, Kotaro. "Y2K Computer Crisis : Provision before or reimbursed later." Journal of Information Processing and Management 51, no. 5 (2008): 363–64. http://dx.doi.org/10.1241/johokanri.51.363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Y2K plans fail? Call the crisis network." Computer Fraud & Security 1999, no. 11 (1999): 3. http://dx.doi.org/10.1016/s1361-3723(99)90062-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Campanioni, Chris. "How Bizarre: The Glitch of the Nineties as a Fantasy of New Authorship." M/C Journal 21, no. 5 (2018). http://dx.doi.org/10.5204/mcj.1463.

Full text
Abstract:
As the ball dropped on 1999, is it any wonder that No Doubt played, “It’s the End of the World as We Know It” by R.E.M. live on MTV? Any discussion of the Nineties—and its pinnacle moment, Y2K—requires a discussion of both the cover and the glitch, two performative and technological enactments that fomented the collapse between author-reader and user-machine that has, twenty years later, become normalised in today’s Post Internet culture. By staging failure and inviting the audience to participate, the glitch and the cover call into question the original and the origin story. This breakdown of
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Y2K computer crisis"

1

Hassebroek, Pamela Burns. "Institutionalized Environments and Information Security Management: Learning from Y2K." Diss., Available online, Georgia Institute of Technology, 2007, 2007. http://etd.gatech.edu/theses/available/etd-06192007-111256/.

Full text
Abstract:
Thesis (Ph. D.)--Public Policy, Georgia Institute of Technology, 2008.<br>Rogers, Juan D., Committee Chair ; Klein, Hans K., Committee Member ; Bolter, Jay David, Committee Member ; Nelson-Palmer, Mike, Committee Member ; Kingsley, Gordon, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Y2K computer crisis"

1

Brasington, Leanne, and Peter Billac, eds. Y2K - A World in Crisis. Swan Publishing Company, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gauss, James F. Y2K, your essential Y2K manual: Crying wolf or world crisis? Bridge-Logos Publishers, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Congress. Senate. Special Committee on the Year 2000 Technology Problem. Y2K aftermath--crisis averted: Final Committee report. The Committee, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gauss, James F. Y2K-- crying wolf or world crisis? Bridge-Logos Publishers, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stauffer, Wayne, Leanne Brasington, and Scott Brasington, eds. Y2K: A World in Crisis: 2nd Edition. Swan Publishing Company, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Farrar, Steve. Spiritual survival during the Y2K crisis. T. Nelson, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Problem, United States Congress Senate Special Committee on the Year 2000 Technology. Y2K aftermath--crisis averted: Final committee report : summary of committee findings. U.S. G.P.O., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. Senate. Special Committee on the Year 2000 Technology Problem. Y2K aftermath--crisis averted: Final committee report : summary of committee findings. U.S. G.P.O., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Problem, United States Congress Senate Special Committee on the Year 2000 Technology. Y2K aftermath--crisis averted: Final committee report : summary of committee findings. U.S. G.P.O., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congress. Senate. Special Committee on the Year 2000 Technology Problem. Y2K aftermath--crisis averted: Final committee report : summary of committee findings. U.S. G.P.O., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Y2K computer crisis"

1

Baecker, Ronald M. "Safety." In Computers and Society. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198827085.003.0014.

Full text
Abstract:
Safety is often confused with security. A system or an environment may be secure, but if its normal operation does not achieve the intended goals, it may not be safe. Events will not progress as intended, and could go horribly wrong, even to the extent of grave injuries and loss of life. The more society relies upon digital technologies, the more we count on software to assure our safety. The issue of safety arises in a great variety of circumstances. Our discussion will start with dangers to the individual, then we will widen our focus to the organization, to society, and, finally, to the world. The digital divide that discourages internet use among older adults is due in part to threats posed to safe use of computers by ‘evil’ software such as programs that ‘phish’ for personal information, thereby gaining access to finances and committing identity theft, as we have discussed in the previous chapter. We shall enlarge upon this discussion by speaking of another risk—computer rage, which is caused by frustration when users cannot understand or manage the technology. Such instances are especially dangerous for senior citizens. We shall also discuss two ways in which the internet may not be safe for younger people: cyberbullying and revenge porn. We then examine a topic that arises in daily life: safety threats caused to pedestrians, bicyclists, and drivers by the continual use of distracting mobile devices. Our inability to control the costs of large-scale data processing implementations is a threat to the safety and health of organizations and governments, as is our inability to understand, modify, and fix large software systems that are no longer maintained by their creators. We shall describe several software disasters, both during their development and after they have been deployed and used. These include the software crisis at the turn of the century—the Y2K threat—which actually was averted, and several cases in which up to billions of dollars or pounds were wasted, including the decades-long saga of air traffic control in the USA.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!