Page 352

The University of SydneyPage 13Double Loop Security Design ProcessGeneralizationof consequences into an organizational match.

Generationof new actionsBring into congruence, inventing new governing variablesDiscovery of espoused and theory-in-useDouble loop security designing cycleGeneralizationof consequences into an organizational match.

Generationof new actionsBring into congruence, inventing new governing variablesDiscovery of espoused and theory-in-useDouble loop security designing cycle