IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Information Technology as a Target, Shield, and Weapon in the Post-9/11 Environment

Information Technology as a Target, Shield, and Weapon in the Post-9/11 Environment
View Sample PDF
Author(s): Laura Lally (Hofstra University, USA)
Copyright: 2007
Pages: 19
Source title: Emerging Information Resources Management and Technologies
Source Author(s)/Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59904-286-2.ch007

Purchase

View Information Technology as a Target, Shield, and Weapon in the Post-9/11 Environment on the publisher's website for pricing and purchasing information.

Abstract

This chapter draws upon normal accident theory and the theory of high reliability organizations to examine the potential impacts of information technology being used as a target in terrorist and other malicious attacks. The chapter also argues that information technology can be used as a shield to prevent further attacks and mitigate their impact if they should occur. A target and shield model is developed, which extends normal accident theory to encompass secondary effects, change, and feedback loops to prevent future accidents. The target and shield model is applied to the Y2K problem and the emerging threats and initiatives in the post-9/11 environment. The model is then extended to encompass the use of IT as a weapon against terrorism.

Related Content

Tereza Raquel Merlo, Nayana Madali M. Pampapura, Jason M. Merlo. © 2024. 14 pages.
Kris Swen Helge. © 2024. 9 pages.
Ahmad Tasnim Siddiqui, Gulshaira Banu Jahangeer, Amjath Fareeth Basha. © 2024. 12 pages.
Jennie Lee Khun. © 2024. 19 pages.
Tereza Raquel Merlo. © 2024. 19 pages.
Akash Bag, Paridhi Sharma, Pranjal Khare, Souvik Roy. © 2024. 31 pages.
Akash Bag, Upasana Khattri, Aditya Agrawal, Souvik Roy. © 2024. 28 pages.
Body Bottom