IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Information Technology as a Target and Shield in the Post 9/11 Environment

Information Technology as a Target and Shield in the Post 9/11 Environment
View Sample PDF
Author(s): Laura Lally (Hofstra University, USA)
Copyright: 2005
Volume: 18
Issue: 1
Pages: 15
Source title: Information Resources Management Journal (IRMJ)
Editor(s)-in-Chief: George Kelley (University of Massachusetts, USA)
DOI: 10.4018/irmj.2005010102

Purchase

View Information Technology as a Target and Shield in the Post 9/11 Environment on the publisher's website for pricing and purchasing information.

Abstract

This paper draws upon Normal Accident Theory and the Theory of High Reliability Organizations to examine the potential impacts of Information Technology being used as a target in terrorist and other malicious attacks. The paper also argues that Information Technology can also be used as a shield to prevent further attacks and mitigate their impact if they should occur. A Target and Shield model is developed, which extends Normal Accident Theory to encompass secondary effects, change and feedback loops to prevent future accidents. The Target and Shield model is applied to the Y2K problem and the emerging threats and initiatives in the Post 9/11 environment.

Related Content

Zhi Chen, Jie Liu, Ying Wang. © 2024. 19 pages.
Ping Zhang, Changrong Lv, Qingying Li, Bori Cong, Jian Liu. © 2024. 19 pages.
Lai Xin, Liang Chang Sheng, Jiayu Feng, Hengyan Zhang. © 2024. 17 pages.
Abida Ellahi, Yasir Javed, Mohammad Farooq Jan, Zaid Sultan. © 2024. 20 pages.
Tongyue Feng, Jiexiang Xu, Zehan Zhou, Yilang Luo. © 2024. 21 pages.
Toby Chau, Helen Lv Zhang, Yuyue Gui, Man Fai Lau. © 2024. 13 pages.
Andrew J. Setterstrom, Jack T. Marchewka. © 2024. 22 pages.
Body Bottom