The University of SydneyPage 13Double Loop Security Design ProcessGeneralizationof consequences into an organizational match.
Generationof new actionsBring into congruence, inventing new governing variablesDiscovery of espoused and theory-in-useDouble loop security designing cycleGeneralizationof consequences into an organizational match.
Generationof new actionsBring into congruence, inventing new governing variablesDiscovery of espoused and theory-in-useDouble loop security designing cycle