Access the full text.
Sign up today, get DeepDyve free for 14 days.
B. Zerega
Y2K bites the supply chain
B. Ragland (1996)
The Year 2000 Problem Solver: A Five-Step Disaster Prevention Plan
Minda Zetlin (1997)
The Computer Time-Bomb: How to Keep the Century Date Change from Killing Your Organization
J. Gigch, J. Gigch (1991)
System Design Modeling and Metamodeling
L. Byars (1984)
Strategic management: Planning and implementation : concepts and cases
B. Naik, A. Chakravarty (1992)
Strategic acquisition of new manufacturing technology: a review and research frameworkInternational Journal of Production Research, 30
T. Farris
Ounce of prevention for Y2K: protecting against barbarians at the gate
C. Jones
The Year 2000 Software Problem: Quantifying the Costs and Assessing the Consequences
F. David (1986)
Strategic management
R. Mayer, Michael Painter, P. Witte (1994)
IDEF Family of Methods for Concurrent Engineering and Business Re-engineering Applications
D.C. Fogg
Team‐based Strategic Planning
L. Digman (1989)
Strategic Management: Concepts, Decisions, Cases
D.R. Underdown, D.H. Liles
Transformation issues in small manufacturers
Patrick Below, George Morrissey, Betty Acomb, D. Nei (1987)
The Executive Guide to Strategic Planning
J.C. Collins, J.I. Porras
Building your company’s vision
D.R. Underdown
Transform Enterprise Methodology
J. Keogh (1997)
Solving the year 2000 problem
J. Murray, M. Murray (1984)
Computers in crisis : how to avert the coming worldwide computer systems collapse
F. David (2001)
Strategic management : concepts
V. Kraeling
The year 2000 ‐ big threat to small firms
R.J. Mayer
IDEF0 Function Modeling ‐ a Reconstruction of the Original Air Force Wright Aeronautical Laboratory Technical Report ‐ AFWAL‐TR‐81‐4023 (the IDEF0 Yellow Book)
The end of the millennium may hold significant difficulties for any system dependent on computer dates. Computers which misinterpret the year 2000 and other significant dates may require considerable repair. There have been many methodologies developed to assist companies with the process of Y2K repair. These methodologies and additional considerations for approaching Y2K solutions are presented. Specific measures to avoid logistics difficulties are discussed. The success of these measures can be considerably enhanced through the application of a transformation methodology. A proven transformation methodology for facilitating change is presented as applied to mitigating the Y2K risk.
Logistics Information Management – Emerald Publishing
Published: Jun 1, 1999
Keywords: Computer management; Contingency planning; Information technology; Logistics; Risk management
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.