{"id":"https:\/\/openalex.org\/W1997622473","doi":"https:\/\/doi.org\/10.1109\/52.841605","title":"Some strategic Y2K blessings","display_name":"Some strategic Y2K blessings","publication_year":2000,"publication_date":"2000-01-01","ids":{"openalex":"https:\/\/openalex.org\/W1997622473","doi":"https:\/\/doi.org\/10.1109\/52.841605","mag":"1997622473"},"language":"en","primary_location":{"id":"doi:10.1109\/52.841605","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1109\/52.841605","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S6725529","display_name":"IEEE Software","issn_l":"0740-7459","issn":["0740-7459","1937-4194"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https:\/\/openalex.org\/P4310320439","https:\/\/openalex.org\/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Software","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5025411265","display_name":"Leon A. Kappelman","orcid":"https:\/\/orcid.org\/0000-0002-3542-022X"},"institutions":[{"id":"https:\/\/openalex.org\/I123534392","display_name":"University of North Texas","ror":"https:\/\/ror.org\/00v97ad02","country_code":"US","type":"education","lineage":["https:\/\/openalex.org\/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"L.A. Kappelman","raw_affiliation_strings":["University of North Texas, USA","North Texas Univ., Denton, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of North Texas, USA","institution_ids":["https:\/\/openalex.org\/I123534392"]},{"raw_affiliation_string":"North Texas Univ., Denton, TX, USA","institution_ids":["https:\/\/openalex.org\/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https:\/\/openalex.org\/A5025411265"],"corresponding_institution_ids":["https:\/\/openalex.org\/I123534392"],"apc_list":null,"apc_paid":null,"fwci":0.4001,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.66554659,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"17","issue":"2","first_page":"42","last_page":"46"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994999766349792,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994999766349792,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9890999794006348,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1711","display_name":"Signal Processing"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T12034","display_name":"Digital and Cyber Forensics","score":0.9605000019073486,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1710","display_name":"Information Systems"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/exploit","display_name":"Exploit","score":0.655644416809082},{"id":"https:\/\/openalex.org\/keywords\/flexibility","display_name":"Flexibility (engineering)","score":0.6484963297843933},{"id":"https:\/\/openalex.org\/keywords\/profitability-index","display_name":"Profitability index","score":0.5358703136444092},{"id":"https:\/\/openalex.org\/keywords\/software-quality-management","display_name":"Software quality management","score":0.5076149702072144},{"id":"https:\/\/openalex.org\/keywords\/software-quality","display_name":"Software quality","score":0.496542751789093},{"id":"https:\/\/openalex.org\/keywords\/software","display_name":"Software","score":0.4855651557445526},{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.47511371970176697},{"id":"https:\/\/openalex.org\/keywords\/table","display_name":"Table (database)","score":0.4724367558956146},{"id":"https:\/\/openalex.org\/keywords\/enterprise-software","display_name":"Enterprise software","score":0.4647352695465088},{"id":"https:\/\/openalex.org\/keywords\/engineering-management","display_name":"Engineering management","score":0.45300379395484924},{"id":"https:\/\/openalex.org\/keywords\/process-management","display_name":"Process management","score":0.4438866674900055},{"id":"https:\/\/openalex.org\/keywords\/quality","display_name":"Quality (philosophy)","score":0.4351920485496521},{"id":"https:\/\/openalex.org\/keywords\/software-engineering","display_name":"Software engineering","score":0.4197606146335602},{"id":"https:\/\/openalex.org\/keywords\/software-development","display_name":"Software development","score":0.41245388984680176},{"id":"https:\/\/openalex.org\/keywords\/knowledge-management","display_name":"Knowledge management","score":0.4111568331718445},{"id":"https:\/\/openalex.org\/keywords\/business","display_name":"Business","score":0.3462265133857727},{"id":"https:\/\/openalex.org\/keywords\/engineering","display_name":"Engineering","score":0.32212311029434204},{"id":"https:\/\/openalex.org\/keywords\/management","display_name":"Management","score":0.16876864433288574},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.1309053599834442},{"id":"https:\/\/openalex.org\/keywords\/operating-system","display_name":"Operating system","score":0.098766028881073}],"concepts":[{"id":"https:\/\/openalex.org\/C165696696","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11287","display_name":"Exploit","level":2,"score":0.655644416809082},{"id":"https:\/\/openalex.org\/C2780598303","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6484963297843933},{"id":"https:\/\/openalex.org\/C129361004","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2470236","display_name":"Profitability index","level":2,"score":0.5358703136444092},{"id":"https:\/\/openalex.org\/C48306297","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7554352","display_name":"Software quality management","level":5,"score":0.5076149702072144},{"id":"https:\/\/openalex.org\/C117447612","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1412670","display_name":"Software quality","level":4,"score":0.496542751789093},{"id":"https:\/\/openalex.org\/C2777904410","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7397","display_name":"Software","level":2,"score":0.4855651557445526},{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.47511371970176697},{"id":"https:\/\/openalex.org\/C45235069","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q278425","display_name":"Table (database)","level":2,"score":0.4724367558956146},{"id":"https:\/\/openalex.org\/C185765463","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1318054","display_name":"Enterprise software","level":2,"score":0.4647352695465088},{"id":"https:\/\/openalex.org\/C110354214","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q6314146","display_name":"Engineering management","level":1,"score":0.45300379395484924},{"id":"https:\/\/openalex.org\/C195094911","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q14167904","display_name":"Process management","level":1,"score":0.4438866674900055},{"id":"https:\/\/openalex.org\/C2779530757","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.4351920485496521},{"id":"https:\/\/openalex.org\/C115903868","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q80993","display_name":"Software engineering","level":1,"score":0.4197606146335602},{"id":"https:\/\/openalex.org\/C529173508","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q638608","display_name":"Software development","level":3,"score":0.41245388984680176},{"id":"https:\/\/openalex.org\/C56739046","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q192060","display_name":"Knowledge management","level":1,"score":0.4111568331718445},{"id":"https:\/\/openalex.org\/C144133560","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q4830453","display_name":"Business","level":0,"score":0.3462265133857727},{"id":"https:\/\/openalex.org\/C127413603","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11023","display_name":"Engineering","level":0,"score":0.32212311029434204},{"id":"https:\/\/openalex.org\/C187736073","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2920921","display_name":"Management","level":1,"score":0.16876864433288574},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.1309053599834442},{"id":"https:\/\/openalex.org\/C111919701","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q9135","display_name":"Operating system","level":1,"score":0.098766028881073},{"id":"https:\/\/openalex.org\/C124101348","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q172491","display_name":"Data mining","level":1,"score":0},{"id":"https:\/\/openalex.org\/C10138342","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q43015","display_name":"Finance","level":1,"score":0},{"id":"https:\/\/openalex.org\/C138885662","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q5891","display_name":"Philosophy","level":0,"score":0},{"id":"https:\/\/openalex.org\/C111472728","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q9471","display_name":"Epistemology","level":1,"score":0},{"id":"https:\/\/openalex.org\/C162324750","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8134","display_name":"Economics","level":0,"score":0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109\/52.841605","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1109\/52.841605","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S6725529","display_name":"IEEE Software","issn_l":"0740-7459","issn":["0740-7459","1937-4194"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https:\/\/openalex.org\/P4310320439","https:\/\/openalex.org\/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Software","raw_type":"journal-article"},{"id":"pmh:oai:bibcyt.ucla.edu.ve:T070300009700\/6","is_oa":false,"landing_page_url":"http:\/\/bibcyt.ucla.edu.ve\/cgi-win\/be_alex.exe?Acceso=T070300009700\/6&Nombrebd=Bciucla","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https:\/\/metadata.un.org\/sdg\/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https:\/\/openalex.org\/W2089854793"],"related_works":["https:\/\/openalex.org\/W2549211027","https:\/\/openalex.org\/W2070902631","https:\/\/openalex.org\/W2116082492","https:\/\/openalex.org\/W2212955619","https:\/\/openalex.org\/W3124296310","https:\/\/openalex.org\/W190029226","https:\/\/openalex.org\/W4385933939","https:\/\/openalex.org\/W1580492598","https:\/\/openalex.org\/W2990419466","https:\/\/openalex.org\/W2156326464"],"abstract_inverted_index":{"Y2K":[0,31],"showed":[1],"everyone":[2],"the":[3,22,34,55,74],"importance":[4],"of":[5,77],"systems":[6,45],"and":[7,12,32,40,46,66,85],"software":[8,14,44,67],"in":[9],"enterprise":[10,43],"success":[11],"gave":[13],"professionals":[15,50],"valuable":[16],"lessons.":[17],"The":[18],"author":[19],"explains":[20],"that":[21],"IT":[23,49,63],"industry":[24],"needs":[25,76],"to":[26,60],"pick":[27],"itself":[28],"up":[29],"from":[30,38],"exploit":[33],"knowledge":[35],"it":[36],"gained":[37],"upgrading":[39],"redesigning":[41],"its":[42],"practices.":[47],"If":[48],"want":[51],"a":[52],"seat":[53],"at":[54],"strategy-setting":[56],"table,":[57],"they":[58],"need":[59],"sustain":[61],"Y2K-initiated":[62],"house":[64],"cleaning":[65],"practice":[68],"improvements":[69],"as":[70,72],"well":[71],"learn":[73],"real":[75],"their":[78],"users:":[79],"quality,":[80],"simplicity,":[81],"reliability,":[82],"security,":[83],"flexibility,":[84],"profitability.":[86]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}