Sweet Dreams and Rude Awakening - Critical Infrastructure's Focal IT-Related Incidents

Page created by Tom Simon
 
CONTINUE READING
Sweet Dreams and Rude Awakening - Critical Infrastructure's Focal IT-Related Incidents
Proceedings of the 43rd Hawaii International Conference on System Sciences - 2010

                               Sweet Dreams and Rude Awakening –
                        Critical Infrastructure’s Focal IT-Related Incidents

                         Heli Tervo                                                         Timo Wiander
                     University of Oulu                                                    University of Oulu
                     heli.tervo@oulu.fi                                                  timo.wiander@oulu.fi

                           Abstract                                  fact, it is widely agreed in the literature that
    The proliferation of information technology has                  information systems failures cause huge economic
caused new challenging features for society. Modern                  losses [6, 7]. According to Laprie [8, 9], it has been
information systems communicate with each other and                  estimated that the cost of computer failures was over
create larger nets of systems. The focal systems in our              10 billion Fr in 1991 in France alone. That was five
society that maintain the core functions of a normal life            percent of the total income of the computer industry at
must be reliable and robust. However, even these                     that time. In the USA, accidental faults cost 4 billion
systems fail. Extensive studies about IT systems’                    dollars in 1991 [8, 9]. Furthermore, Laprie [8, p.6]
dependability usually concentrate either on technical                states that the mean revenue lost per hour of downtime
or on human-related issues. With this study we wanted                amounts to 78,000 USD based on the impact of
to give a wide-ranging and general prospect of IT-                   computer systems downtime on American businesses.
related problems in our society. We collected data                       Information systems in critical infrastructure need
from information system failures in society’s                        even more attention to the dependability as the stakes
infrastructure, and generated an overview of problems                are higher there than just financial costs. Critical
in our core systems. The outcome of our survey was the               infrastructure (CI) consists of all the structures and
fact that most failures with IT are not hostile attacks or
                                                                     functions that are necessary for the continuity of
system internal problems, but rather problems in
                                                                     society. This includes physical resources, services, and
surroundings with socio-economic and technical issues
in complex system-of-systems development, like a lack                information technology facilities, networks and
of large-scale, holistic risk analysis and collaboration.            infrastructure assets which, if disrupted or destroyed,
                                                                     would have a serious impact on the health, safety,
                                                                     security or economic well-being of citizens or on
                                                                     effective functioning of governments [10, 11, 12].
1. Introduction                                                      Many of these CI systems are maintained and operated
                                                                     by private sector actors as recent surveys reveal [13
    Our society is more and more dependent on                        p.6, 14 p. 10].
information technology and its applications. At the                      The focal systems in our society that keep up the
same time these systems have become interconnected                   core functions of a normal daily life, like energy and
and we meet even more challenges on systems’                         transportation systems, must be reliable and robust.
dependability1 issues, like reliability, availability and            These systems can have very widespread consequences
safety [1]. Unfortunately, information systems are still             if they are compromised or they fail otherwise. The
failing as recent studies show [2, 3, 4]. According to               consequences are not necessary isolated to that one
Bieman [5], there are methods for improving                          specific event. As an example, a serious problem
dependability, but these methods are not in common                   within an electricity network could harm the
use.                                                                 telecommunication networks and that in turn could
    Too often business and economics determine when                  have a serious negative impact on the banking and
to release a new system, what kind of technology to                  transportation sector etc. According to Hagelstam [12],
use or in what issues to concentrate on technology [5].              this kind of domino effect could be cross-national so a
This is done at the expense of dependability and not                 serious problem in one national electricity network
only dependability issues are affected. As a matter of               could cause serious safety and security problems and
                                                                     consequences to the neighboring countries’ networks.
1
 According to [1] dependability encompasses the following
                                                                     The above-mentioned problems could paralyze
attributes: availability, reliability, safety, integrity and         society’s vital functions when escalated from one
maintainability.

                                               978-0-7695-3869-3/10 $26.00 © 2010 IEEE                                          1
Proceedings of the 43rd Hawaii International Conference on System Sciences - 2010

system to another. Thus protection of the information       we chose not to carry out searches from electronic
security perimeters of different parts of a critical        databases; instead we chose to read valid newspapers.
infrastructure is an important aspect when building         It is impracticable to cover all words or phrases that
stability in society and trust towards the services it      journalists may have used when writing about issues
provides to its citizens.                                   that have something to do with IT, software or
    We wanted to find out what is the actual situation      information systems and thus the manual approach was
with the systems that have a significant meaning from       justified.
the societal point of view. So, our research question           The study included news from the seven biggest
asks: What kind of problems do IT systems in society’s      Finnish newspapers, which are published daily.
infrastructure have and on what scale? Such extensive       Circulations of these newspapers vary between 61,003
studies are scarce and usually they concentrate either      and 419,791, according to statistics for the year 2007
on technical issues or on human-related issues. With        [16], see Table 1. The news collection covered the year
this study we want to give a wide-ranging and general       2008. Altogether there were 530 pieces of news found.
prospect of IT-related problems in our society.             About four percent of newspapers of the study period
    This paper has been organized as follows: Section 2     were missed. The main reason for this was the loss of
deals with the research method and settings and in          newspapers in the library.
section 3 we present the findings of the study.
Discussion and conclusions finish this paper.                       Table 1. Newspapers and circulation
                                                                      Aamulehti                       139,165
                                                                      Etelä-Suomen Sanomat             61,003
2. Research method and settings                                       Helsingin Sanomat               419,791
                                                                      Kaleva                           81,593
    In our study we wanted to analyze IT system                       Keskisuomalainen                 74,945
failures in a critical infrastructure to see what kind of             Savon Sanomat                    64,789
problems arise. Furthermore, we wanted to investigate                 Turun Sanomat                   112,419
what the media tells us about incidents that have
occurred. Therefore we chose content analysis [15] as       2.2. Research method
the research method.
                                                                According to Neuendorf [17], "(Content analysis) is
2.1. Data collection                                        an in-depth analysis using quantitative or qualitative
                                                            techniques of messages using a scientific method
    Organizations do not want to publicly disclose their    (including attention to objectivity-intersubjectivity, a
systems’ failings. Therefore it might be hard to find out   priori design, reliability, validity, generalizability,
the real problems and issues within these failures. On      replicability, and hypothesis testing) and is not limited
the other hand, when the problem is severe enough,          as to the types of variables that may be measured or the
these failings become transparent to society. It is         context in which the messages are created or
virtually impossible to keep serious problems hidden        presented." Thus, in this paper we focused on the
when dealing with systems that affect large groups of       analysis of what the news texts talk about IT-related
people or have large economic effects. Examples of          problems and how the news dealt with these problems
those include the following scenarios collected from        in our society.
the research data:                                              We used an open analysis approach [18]. Open
         • The impact of the failure is too drastic to      analysis identifies the dominant messages and subject
             be hidden, like failures in public transport   matter within the text. News paper texts were
                                                            condensed while still preserving the core. Then the
         • The impact concerns a large amount of
                                                            texts were abstracted and grouped together under
             people or companies and cannot be
                                                            higher order headings. Abstraction included the
             hidden, like a bank’s IT system crash
                                                            creations of codes, categories and themes on varying
         • The problem causes legal dispute between
                                                            levels and content areas [19]. Our analysis involves an
             the vendor and the user organization, like
                                                            interpretation of the underlying meaning of the text,
             a cash register system malfunction causing
                                                            referred to as the latent content [20, p. 325]. The initial
             commercial losses
                                                            coding was done by one researcher and the final coding
         • Somebody leaks the information, like a           was done as a joint effort, in order to reach consensus
             customer using a system informing              over the subject.
             publicly about malfunction
    The intention in this study was to collect all news
concerning IT-related problems in Finland. Therefore,

                                                                                                                          2
Proceedings of the 43rd Hawaii International Conference on System Sciences - 2010

3. Findings                                                 well: accidental and deliberate problems. These
                                                            problems may be caused because of a system user or
    In the year 2008 there was one single case that         an outsider. Accidental problems are unintentional
dominated the news. A Finnish bank was merged with          misuse or damaging, like a cup of coffee falling on the
a bigger international bank (in this paper “the case        keyboard, pressing a wrong button or negligent use of
Bank” or “the Bank”). We decided to analyze the             systems or ignorance of security policies, for example.
situation in a two-fold manner, one analysis with all       Deliberate problems, on the contrary, are intentional
news data and one without the Bank’s merger-related         misuse or damaging, like data trespassing, denial of
news, in order to get a situational picture without one     service, malware and viruses.
dominant case.
                                                                3.1.3. Problems in surroundings with socio-
                                                            economic and technical issues. The third problem
3.1. Group of “Problems”
                                                            class includes troubles that arise because of
                                                            circumstances in the system’s surroundings and
    When trawling through the data, we found news
                                                            community. These problems include five subclasses: 1)
about single incidents or problems which were grouped
                                                            System incompatibility, or problem caused by another
together as “Problems”. These were pieces of news that
                                                            system; 2) Information flow problems (both technical
informed about realized problems, either system
                                                            and human) like data flow cut-off, delays in data flow,
incidents or other trouble followed by faulty systems,
                                                            or delays in system delivery; 3) Problems caused by
system misuse, problems using the system, or
                                                            updates and new system installations; 4) Problems
something causing trouble for the system. Thus,
                                                            arising with juridical and sentiment issues; and 5)
basically anything that was connected somehow to an
                                                            Troubles in physical circumstances, like weather, the
IT system and was having trouble was chosen for
                                                            location of the system affecting the system operation,
further investigation. This enabled us to take a more
                                                            or physically broken network connections.
holistic view of all surrounding problems with IT
                                                                The subclass 3, “Problems caused by updates and
systems, and not only to focus on problems with
                                                            new system installations”, may have actually turned
systems per se.
                                                            out to be a combination of some of subclasses 1, 2, 4
    We wanted to count the amount of individual
                                                            and 5 and a class “system inner technical problems”, if
problems, so we had to filter out all overlapping news
                                                            we had the first hand information of the incident. We
of the same case. It is noteworthy that incidents with IT
                                                            wanted, however, to highlight the visible view of
systems are usually the consequence of multiple
                                                            system renewing and the system’s complex
hazards and hardly ever caused only by one single
                                                            connections to its surroundings. Systems in critical
cause, but we wanted to find here the visible and
                                                            infrastructure are presumably well tested before
obvious or most influential causes and problems and
                                                            installation (in hospitals, for example), but for different
therefore simplify the news in one main problem.
                                                            social or other causes in the system’s surroundings or
    By filtering the news we found 206 problems. We
                                                            environment the update or new system installation
extracted the types of problems from the news and then
                                                            causes intricate problems. This is different from pure
sorted them. After that we derived four main classes of
                                                            technical malfunction and the news informed these
problem types: system inner technical problems,
                                                            problems pointing out the state of the system:
problems caused by people, problems in surroundings
                                                            update/system renewing.
with socio-economic and technical issues, and a class
of unspecified technological problems. These are
                                                                3.1.4. Undefined technological problems. The
discussed more closely in the next subsections. The
                                                            fourth class of problems is undefined technological
first three classes were furthermore divided into
                                                            problems. This class contains all news that informed
subclasses, as some news provided detailed
                                                            about some IT problem using general or vague terms,
information on the problem.
                                                            but did not however specify what the actual problem
                                                            was. Terms used in these news texts were, for example,
    3.1.1. System internal technical problems.
                                                            a technological or technical trouble/problem in a
System inner technical problems were divided further
                                                            system. Figures 1 and 2 present the problem shares
into two subclasses: faulty software, which included
                                                            between these four classes. The detailed classification
faults in program code as well as other situations where
                                                            of all problems is presented in Table 2.
the program or technical parts of the system were
operating wrongly, and unsatisfactory usability.

   3.1.2. Problems caused by people. Problems
caused by people were divided into two subclasses, as

                                                                                                                          3
Proceedings of the 43rd Hawaii International Conference on System Sciences - 2010

                                                                                   3.2. Group of “Reissued problems”

                                                                                       The other main group of news we found, in
                                                                                   addition to “Problems”, was “Reissued problems”.
                                                                                   This group contains pieces of news addressing the
                                               Internal technical
                                                                                   same problem later. These include causes,
                                               People
                                                                                   consequences, reflections, opinions and interviews, or
                                               Surroundings
                                                                                   how the same issue escalated harming other people or
                                               Unspecified
                                                                                   organizations later on, and how the initial issue has
                                                                                   proceeded over time.
                                                                                   We combined all pieces of news of “Problems” and
                                                                                   “Reissued problems”, without any filtering, in order to
                                                                                   see the amount and percentage value of these news
                                                                                   texts in each class. Figure 3 represents the news
      Figure 1. Problem shares between classes                                     distribution.

                                               Internal technical                                                        Internal technical
                                               People                                                                    People
                                               Surroundings                                                              Surroundings
  ‘                                                                                                                      Unspecified
                                               Unspecified

       Figure 2. Problem shares excluding the                                         Figure 3. Shares of pieces of news about
                    case Bank                                                             problems and reissued problems

                                       Table 2. The detailed classification of all problems
                  Internal technical

                                                                    Surroundings

the case Bank

                                                                                                                                              4
Proceedings of the 43rd Hawaii International Conference on System Sciences - 2010

Figure 4 represents the news distribution about             4.2. Main findings
problems and reissued problems excluding the case
Bank.                                                           The findings in our research revealed that the
                                                            biggest sources of problems in critical infrastructure
                                                            are issues in systems’ surroundings. According to our
                                                            study, 45 per cent of all problems were related to those
                                                            (Figure 1). System internal technical problems were 8
                                                            percent, problems caused by people 15 percent and
                                       Internal technical   unspecified problems 32 percent of all problems. The
                                      People                case of a bank merger emphasized the class of
                                      Surroundings          problems in surroundings, but even if it was not
                                      Unspecified           included in the results, the ratio would be quite similar:
                                                            surrounding aspects would have 35 percent, system
                                                            internal problems 10 percent, problems caused by
                                                            people 18 percent, and unspecified problems 37
                                                            percent.
                                                                The problem shares between the two data groups,
Figure 4. Shares of news about problems and                 individual problems (Figures 1 and 2) and all news
 reissued problems excluding the case Bank                  texts together (Figures 3 and 4) follow the same shape.
                                                            In news shares with the case of a bank merger (Figure
                                                            3), it is seen that the case affected news texts so that
4. Discussion                                               surrounding issues are emphasized even a little more
                                                            than in individual problems (Figure 1). However, news
    Systems are not as dependable as expected. Our          seems to follow the share of problems and informs
study revealed that problems in surroundings overrule       about incidents fairly.
system internal technical and people-related problems.          Next we analyze these findings in more detail.
One reason for this is that the systems and business
processes are increasingly interconnected and problems          4.2.1. Aspects in surroundings. Within
in systems are reflected in others.                         surrounding aspects, the most dominating reasons were
                                                            system updates and new system installations. This was
4.1. Limitations                                            62 percent of problems within the environment class
                                                            (43 excluding the case Bank). The second biggest
                                                            subclass was incompatibility issues with 20 (30
    Our study was based on published news so it lacks
                                                            excluding the case Bank) percent share. These two
first hand information about the problem cases. In this
                                                            subclasses form the majority of the problems in
kind of process of managing information and passing it
                                                            surroundings. This reflects that the system
on there are many opportunities for misunderstanding
                                                            development and update processes are not adequately
and distortion. This might partly explain the high
                                                            implemented in organizations. Compared to problems
proportion of news in the class of undefined technical
                                                            caused by people or system inner technical problems,
problems.
                                                            the amount of problems in system updates and new
    Nevertheless, the most influential failures become
                                                            system installations is disturbingly high.
public [21]. The media informs about problems that
                                                                To overcome these problems there might be a need
cannot be hidden. So, the media plays an important
                                                            in organizations to take the interfaces and
role when finding out general and severe problem
                                                            interdependencies with systems even more into
types in the societal infrastructure. From this data of
                                                            account through better alignment of risk analysis/risk
most severe IT failures we can generate an overview of
                                                            management and system development methods. As we
focal problems in our core systems.
                                                            deal with a critical infrastructure, also regulators
    The research data had one dominating incident, the
                                                            should emphasize interdependency issues more so that
case of a large bank merger, which was assumed to
                                                            they are more holistically implemented.
skew the results. To prevent this from happening, we
                                                                In this class the problems emphasize the fact that IT
divided the data and results into two different sets, to
                                                            systems are complex systems with multiple potential
see the effect of the dominant case. A larger data set
                                                            hazards, and to overcome problems with system’s
covering several years would have evened out the
                                                            surroundings we desperately need further studies and
differences.
                                                            new means for sketching and managing these troubles.

                                                                                                                         5
Proceedings of the 43rd Hawaii International Conference on System Sciences - 2010

    4.2.2. Problems caused by people. Surprisingly,         people who operate the technical systems.
human problems were causing only 15 percent (18             Furthermore, they state that information security
excluding the Bank) of problems. In the class people, it    should not simply be viewed as a means of protecting
is notable, that between deliberate and accidental          physical assets alone. By taking individuals and their
problems, there is not a huge difference. This means        social relationships into account, the protection level
that deliberate problems are not dominating the             should be expanded [23].
problems caused by people overwhelmingly. So,                   Based on our research, surrounding issues should
beside attacks or viruses, the “normal” users or other      be taken even more into account. The case Bank
people are causing quite a large problem in systems, by     reflected one example of how one system problems
accidentally harming the systems.                           escalated to other systems. A couple of weeks and
    The small amount of deliberate problems may be          months after the bank merger, the bank in Finland had
because of the good overall situation of system             lost thousands of customers and also employees were
security. Without doubt there is deliberate harming of      leaving, monetary transactions in other banks were late
systems, but the news seems to indicate a good level of     as well, and people’s salaries were delayed, for
security awareness.                                         example. The State’s railroad operator had problems in
                                                            selling tickets, and the corrupted invoice data from the
                                                            Bank crashed another State billing system. From the
    4.2.3. System internal problems. System inner
                                                            Bank’s point of view system problems were
problems were only about a tenth of problems. Based         destructive, but from society’s viewpoint malfunctions
on this research it seems that the system inner             in a banking system and how it escalated to other
problems are reasonably well taken care of within           systems were even worse.
organizations. The problems are not fully overcome yet          Our survey resulted in the fact that most failures in
but the systems are quite robust when they are taken        our society with IT are not hostile attacks or system
into use. Systems operate well independently, but the       internal problems, but rather a complicated mixture of,
biggest problem is the interdependencies of systems         for example, insufficient communication and a lack of
and that should be more taken care of, as we previously     large-scale, holistic risk analysis and collaboration.
stated.                                                     This is not only the case within the private sector but
                                                            also in society’s core systems, important infrastructure
    4.2.4. Undefined problems. A significant                systems, as well.
observance is that roughly one third of all problems (37        As our research revealed a lot of work still lies
percent excluding the case Bank) were undefined             ahead for regulators, organizations and researchers in
problems: this amount of the news does not represent        order to tackle the interdependency challenges within
problems adequately. This finding requires further          critical infrastructure’s information systems. By having
investigation of the phenomenon.                            more focus on proactive actions within system
    Some of the undefined problems might be purely          development the safety and usability of critical
technical problems and not related to information           infrastructure systems is improved in addition to the
technology. The news, however, indicated that most of       total cost savings.
these problems were somehow related to IT, and thus             This could be done, for example, by collecting and
may belong into any of the previous groups. But             publishing incidents and best practices within system
because the news did not clearly identify this, we were     development. It is especially important to raise the
forced to classify these problems to the class of           awareness of developers so that they fully understand
undefined problems.                                         the character of systems: they are not intended to work
                                                            in isolation – they are truly interconnected, and a chain
4.3. General discussion                                     is only as strong as its weakest link.

    In early studies of system dependability, technical     5. Conclusion
aspects were seen as a major source of problems. This
was not the case within this study as the results               Based on our research, systems are not as
showed. The biggest source of problems was                  dependable as expected. Our study revealed that
undoubtedly surrounding problems, not the problems          environmental problems overrule system internal
in systems per se.                                          technical and people-related problems. One reason for
    This is validated in the literature too. According to   this is that the systems and business processes are
Dhillon and Backhouse [22], information security in         increasingly interconnected and problems in systems
itself is not a technical problem alone. They argue that    are reflected more widely. Large systems and nets of
it has social and organizational dimensions that involve    systems become complicated combinations of

                                                                                                                        6
Proceedings of the 43rd Hawaii International Conference on System Sciences - 2010

exceedingly different systems. Global buyouts causing           [4] C Rettig, MIT Sloan Management Review
system integrations and migrations meet challenges,             “communitech-solutions.com: Trouble with enterprise
not only in techniques but also in cultural aspects and         software”, 2007.
laws. We need more collaboration to achieve a more
                                                                [5] J. Bieman, (Ed.), “Is Anyone Listening?”, Software
holistic view of systems and their use. Furthermore, by         Quality Control 13, 3, Sep. 2005, pp. 225-226.
having more focus on proactive actions within system
development the safety and usability of critical                [6] A. Arora, J. P. Caulkins, and R. Telang, “Sell First, Fix
infrastructure systems is improved along with the total         Later: Impact of Patching” on Software Quality, October
cost savings.                                                   2004. Available at SSRN: http://ssrn.com/abstract=670285.
    This research analyzed the vulnerabilities in the
Finnish infrastructure’s IT systems. The study covered          [7] M. Zhivich and R. K. Cunningham, "The Real Cost of
information system failings presented in the media. We          Software Errors," Security & Privacy, IEEE , vol.7, no.2,
found that present systems, also in critical                    March-April 2009, pp.87-90.
infrastructure, have considerable vulnerabilities that          [8] J. Laprie, “Dependability: The Challenge for the Future
are mostly based on complex interconnections in the             of Computing and Communication Technologies”, in
system’s surroundings. Within aspects in surroundings,          Proceedings of the First European Dependable Computing
the most dominant reasons were system updates and               Conference on Dependable Computing (October 04 - 06,
new system installations. Surprisingly, human                   1994). K. Echtle, D. K. Hammer, and D. Powell, Eds.
problems and system inner technical problems together           Lecture Notes In Computer Science, vol. 852. Springer-
caused less problems than problems in surroundings              Verlag, London, 407-408.
alone.
    Dependability, safety and security have a new               [9] J. Laprie, “Dependability of Computer Systems: from
                                                                Concepts to Limits”, in proceedings of IFIP International
scope with global and interacting systems. This is a            Workshop on Dependable Computing and its Applications
growing domain that has, to date, had too little                (DCIA'98), Johannesburg, South Africa, 12-14 January 1998,
attention but needs urgently visibility and solutions to        pp.108-126.
meet present-day requirements in information systems.
We rely on magnificent information technology, but              [10] Green paper on a European programme for Critical
the technology is evolving fast. In a society which is          Infrastructure    Protection.      Available   http://eur-
built on information technology there are parts and             lex.europa.eu/LexUriServ/site/en/com/2005/com2005_0576e
aspects that are not always as advanced and                     n01.pdf. Referenced 20.1.2009.
sophisticated in this fast moving time frame. We
                                                                [11] United States Congress. U.S.A. Patriot Act. Available
should keep moving all the time and not just sleep and          http://www.epic.org/privacy/terrorism/hr3162.html.
trust new innovations blindly.                                  Referenced 20.1.2009.

Acknowledgements                                                [12] A. Hagelstam, ”CIP – Kriittisen infrastruktuurin
                                                                turvaaminen. Käsiteanalyysi ja kansainvälinen vertailu”,
                                                                Huoltovarmuuskeskus, Julkaisuja 1/2005. (In Finnish: ”CIP –
The authors would like to thank the Finnish Funding             Critical Infrastructure Protection. Contextual Analysis and
Agency for Technology and Innovation/Safety and                 International Comparison”, National Emergency Supply
security program, University of Oulu and University of          Agency, Publications 1/2005.)
Kuopio, for funding this research.
                                                                [13] Queensland University of Technology, University of
                                                                Melbourne, Macquarie University, Edith Cowan University,
References                                                      Deakin University, Royal Melbourne Institute of
                                                                Technology, University of Woolongong, University of South
[1] Avizienis, A.; Laprie, J.-C.; Randell, B.; Landwehr, C.,    Australia, Attorney Generals Department, National Office of
"Basic concepts and taxonomy of dependable and secure           the Information Economy, CSIRO, Defense Signals
computing," Dependable and Secure Computing, IEEE               Directorate, Department of Defense, AusCERT, Freehills,
Transactions on, vol.1, no.1, pp. 11-33, Jan.-March 2004.       Biometrics Institute, Key Trust, Spyrus. “Building Trust in
                                                                Australia’s Infrastructure: dealing       with scientific,
[2] T.A.Longstaff, C. Chittister, R. Pethia, and Y.Y. Haimes,   technological, business, policy and legal issues in
“Are we forgetting the risks of information technology?”,       information security”. 2004.
Computer, vol.33, no.12, pp. 4351, Dec 2000.
                                                                [14] P. Pederson, D. Dudenhoeffer, S. Hartley, and M.
[3] C. Mann, “Why Software Is So Bad,” Technology               Permann, “Critical Infrastructure Interdependency Modeling:
Review (July-August 2002): 32-38.                               A Survey of U.S. and International Research” . Technical

                                                                                                                                7
Proceedings of the 43rd Hawaii International Conference on System Sciences - 2010

Support Working Group, Washington, DC, USA 2006.
Available:                                                        [20] E. Babbie, “The Practice of Social Research”, Belmont,
www.inl.gov/technicalpublications/Documents/3489532.pdf.          CA: Thomson/Wadsworth. 2007.
Referenced 20.1.2009.                                             [21] J.Bieman, Editorial: “What makes a software failure a
                                                                  pageone story?”, Software Quality Control 14, 2 (Jun. 2006),
[15] B. Berelson, ”Content analysis in communication              pp. 81-83.
research”, Glencoe, Ill.: Free Press. 1952.
                                                                  [22] G.Dhillon, and J..Backhouse, “Information system
[16] Web document.                                                security management in the new millennium”,
http://www.levikintarkastus.fi/levikintarkastus/tilastot/Levikk   Communications of the ACM, Volume 43, Issue 7, pp. 125-
itilasto2007.pdf (in Finnish: newspaper circulation statistics    128. 2000.
from year 2007) Referenced 20.1.2009.
                                                                  [23] G. Dhillon, and J. Backhouse, “Current directions in IS
[17] K. A. Neuendorf, "The Content Analysis Guidebook"            security      research:    towards     socio-organizational
SAGE, ISBN 0761919783. 2005.                                      perspectives.” in Information Systems Journal, Volume 11,
                                                                  Issue 2, pp. 127-153. 2001
[18] D. McKeone, “Measuring Your Media Profile”, Gower
Press, A general introduction to media analysis and PR
evaluation for the communications industry. 1995

[19] L.A Baxter, “Content analysis”, in: B.M., Montgomery,
S. Duck, (Eds.), Studying Interpersonal Interaction. The
Guilford Press, New York, London. 1991.

                                                                                                                                 8
You can also read