ISIG References
Clay Shirky’s book Cognitive Surplus
Kevin Kelly’s Shirky Principle
John Gall’s book Systemantics
Itamar Shatz’s analysis of the Shirky principle
Cyber Insecurity: The Cost of Monopoly Geer, Pfleeger, Schneier, Quarterman, Metzger, Bace, and Gutmann
Stafford Beer’s “Diagnosing the system for organizations”
TR Paper 85.7 - Jim Gray, Why Computers Stop
Joel F. Bartlett, A Nonstop Kernel
Boyd Multerer, Kry10 Security under the BEAM
Boyd Multerer, Kry10 Kry10 Secure Platform
If you got this far you should probably read Kelly Shortridge if you aren’t already.
meta
by Chris EstherTags: cybersecurity, talk