{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:52:53Z","timestamp":1754157173188,"version":"3.41.2"},"reference-count":27,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2000,3,1]],"date-time":"2000-03-01T00:00:00Z","timestamp":951868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000,3,1]]},"abstract":"<jats:p>The year 2000 (Y2K) remedy process is an ongoing business to be continued even after the rollover of the century. This is especially true for the organizations that fail to cope with the crisis properly. In this paper, major problems associated with the crisis are identified and key remedy issues such as effective remedy methods, a systematic implementation model, compliance testing, and resource management issues are identified and presented. Post\u2010millennium remedy guidelines are also suggested, as the Y2K crisis will be an ongoing business for many organizations for an extended period of time after the rollover of the millennium.<\/jats:p>","DOI":"10.1108\/02635570010286113","type":"journal-article","created":{"date-parts":[[2002,7,28]],"date-time":"2002-07-28T18:46:58Z","timestamp":1027882018000},"page":"67-75","source":"Crossref","is-referenced-by-count":1,"title":["The Year 2000 crisis: the ongoing business"],"prefix":"10.1108","volume":"100","author":[{"given":"Seokha","family":"Koh","sequence":"first","affiliation":[]},{"given":"Sooun","family":"Lee","sequence":"additional","affiliation":[]},{"given":"David C.","family":"Yen","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012820052405000_B1","unstructured":"(The) Bank Administration Institute (1998), \u201cEvent plan handbook: introduction\u201d, http:\/\/www.bai.org\/y2k\/y2k\u2010business\u2010resumption\/introduction.htm (reference date), 15 December."},{"key":"key2022012820052405000_B2","unstructured":"British Standards Institution (1998), A Definition of Year 2000 Conformity Requirements [DISC PD2000\u20101:1998], http:\/\/www.bsi.org.uk\/disc\/year2000\/2000.html"},{"key":"key2022012820052405000_B3","unstructured":"Dejesus, E.X. (1998), \u201cYear 2000 survival guide\u201d, Bite, July, pp. 52\u201062."},{"key":"key2022012820052405000_B4","unstructured":"Feiler, J. and Butler, B. (1998), \u201cRisk assessment: four types of damage\u201d, http:\/\/www.itpolicy.gsa.gov\/mks\/yr2000\/y2kconf\/paper47fp.htm 10 November, p. 98."},{"key":"key2022012820052405000_B5","unstructured":"GAO (The United States General Accounting Office, Accounting and Information Management Division) (1997), Year 2000 Computing Crisis: An Assessment Guide [PDF: GAO\/AIMD\u201010.1.14], http:\/\/www.gao.gov\/y2kr.htm September."},{"key":"key2022012820052405000_B6","unstructured":"GAO (1998), Year 2000 Computing Crisis: A Testing Guide [PDF: GAO\/AIMD\u201010.1.21], http:\/\/www.gao.gov\/y2kr.htm November."},{"key":"key2022012820052405000_B7","unstructured":"Gartner Group, Inc. (1999), http:\/\/gartner5.gartnerweb.com\/public\/solutionseries\/year2000\/ (reference date) 13 January."},{"key":"key2022012820052405000_B8","unstructured":"GTE Technology and System (1996), \u201cProposed criteria for \u2018century compliance\u201d\u2019, http:\/\/www.mitre.org\/technology\/cots\/GTE_CRITERIA.html 19 June."},{"key":"key2022012820052405000_B9","unstructured":"Hall, C.L. (1998), \u201cBeyond 2000\u201d, SWEE\u201998 Conference: Information Technology, http;\/\/www.mitre.org\/support\/swee\/agenda.html"},{"key":"key2022012820052405000_B10","unstructured":"Huffaker, J., Nicholson, R. and Tankersley, S. (1998), \u201cReadiness of Boeing Airplanes for Year 2000 operations\u201d, http:\/\/www.boeing.com\/commercial\/aeromagazine\/aero_03\/textonly\/sy01txt.html"},{"key":"key2022012820052405000_B11","unstructured":"(The) Information Technology Association of America (1998), \u201cITAA Y2K Survey Finds Failures Already Starting to Occur\u201d, http:\/\/www.itaa.org\/softpr7.htm 25 March."},{"key":"key2022012820052405000_B12","unstructured":"(The) Institution of Electrical Engineers (1998), http:\/\/www.iee.org.uk\/2000risk\/w\u201043.htm 25 September."},{"key":"key2022012820052405000_B13","unstructured":"Jones, C. (1997), Applied Software Measurement, 2nd ed., McGraw\u2010Hill, New York, NY."},{"key":"key2022012820052405000_B14","unstructured":"Jones, C. (1998), \u201cPossibility of Year 2000 damages\u201d, http:\/\/www.itpolicy.gsa.gov\/mks\/yr2000\/y2kconf\/paper65fp.htm 27 February."},{"key":"key2022012820052405000_B15","doi-asserted-by":"crossref","unstructured":"Kappleman, L. (1999), \u201cRisk, reality, and readiness\u201d, Communications of the ACM,  Vol. 42 No. 12, December, pp. 93\u20104.","DOI":"10.1145\/322796.322816"},{"key":"key2022012820052405000_B16","doi-asserted-by":"crossref","unstructured":"Kappleman, L.A., Fent, D., Keeling, K.B. and Prybutok, V. (1998), \u201cCalculating the cost of Year\u20102000 compliance\u201d, Communications of the ACM, Vol. 41 No. 2, February, pp. 30\u20109.","DOI":"10.1145\/269012.269018"},{"key":"key2022012820052405000_B17","unstructured":"MacMaster, G. (1999), \u201cNine things we should learn from the Y2K crisis\u201d, http:\/\/www.year2000.com\/archive\/9things.html, 24 November."},{"key":"key2022012820052405000_B18","doi-asserted-by":"crossref","unstructured":"Martin, R.A. (1997), \u201cDealing with dates: solutions for the Year 2000\u201d, Crosstalk, October, pp. 18\u201025.","DOI":"10.1109\/2.573656"},{"key":"key2022012820052405000_B19","unstructured":"MITRE (The MITRE Corporation) (1998), Year 2000, http:\/\/www.mitre.org\/technology\/y2k, (reference date) 15 December."},{"key":"key2022012820052405000_B20","unstructured":"MITRE, Y2K (1999), http:\/\/www.mitre.org\/technology\/cots (reference date) 4 January."},{"key":"key2022012820052405000_B21","unstructured":"Nocholson, N. (1998), \u201cHow hardwired is human behavior?\u201d, HBR, July\u2010August, pp. 135\u201047."},{"key":"key2022012820052405000_B22","unstructured":"PCY2KC (The President\u2019s Council on Year 2000 Conversion) (1999), Fourth Summary of Assessment Information, http:\/\/www.y2k.gov\/new\/FINAL2.html 10 November."},{"key":"key2022012820052405000_B23","unstructured":"Ratcliffe, M. (1998), \u201cConsumer FAQ: oil and gasoline\u201d, http:\/\/www.zdnet.com\/zdy2k\/1998\/09\/4723.html 18 September."},{"key":"key2022012820052405000_B24","unstructured":"Seymour, J. (1998), \u201cWhat to do about the Year 2000\u201d, PC Magazine, 6 October, pp. 100\u201021."},{"key":"key2022012820052405000_B25","unstructured":"Tom, J., Cogswell, C. and McPherson, D.A. (1997), \u201cNew Gartner Group study links Year 2000 compliance success to \u2018rethinking\u2019 Year 2000 crisis\u201d, http:\/\/gartner5.gartnerweb.com\/public\/static\/aboutgg\/pressrel\/2000 crisispr.html 24 September."},{"key":"key2022012820052405000_B26","unstructured":"Wallace, C. (1998), \u201cSenate hosts Gartner Group to advise on how to mitigate US effects of Year 2000\u201d, http:\/\/gartner5.gartnerwew.com\/public\/static\/aboutgg\/presrel\/100798year2000.html 7 October."},{"key":"key2022012820052405000_B27","unstructured":"ZDNet (1998), What do You Say about Y2K \u2013 ZDNN\/Harris Poll Y2K Survey, http:\/\/www.zdnet.com\/zdnn\/special\/Y2Ksurvey.html (reference date) 15 December."}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635570010286113","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570010286113\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570010286113\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:36:51Z","timestamp":1753400211000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/100\/2\/67-75\/177145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,3,1]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2000,3,1]]}},"alternative-id":["10.1108\/02635570010286113"],"URL":"https:\/\/doi.org\/10.1108\/02635570010286113","relation":{},"ISSN":["0263-5577"],"issn-type":[{"type":"print","value":"0263-5577"}],"subject":[],"published":{"date-parts":[[2000,3,1]]}}}