The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Information Technology as a Target, Shield, and Weapon in the Post-9/11 Environment
Abstract
This chapter draws upon normal accident theory and the theory of high reliability organizations to examine the potential impacts of information technology being used as a target in terrorist and other malicious attacks. The chapter also argues that information technology can be used as a shield to prevent further attacks and mitigate their impact if they should occur. A target and shield model is developed, which extends normal accident theory to encompass secondary effects, change, and feedback loops to prevent future accidents. The target and shield model is applied to the Y2K problem and the emerging threats and initiatives in the post-9/11 environment. The model is then extended to encompass the use of IT as a weapon against terrorism.
Related Content
Christine Kosmopoulos.
© 2022.
22 pages.
|
Melkamu Beyene, Solomon Mekonnen Tekle, Daniel Gelaw Alemneh.
© 2022.
21 pages.
|
Rajkumari Sofia Devi, Ch. Ibohal Singh.
© 2022.
21 pages.
|
Ida Fajar Priyanto.
© 2022.
16 pages.
|
Murtala Ismail Adakawa.
© 2022.
27 pages.
|
Shimelis Getu Assefa.
© 2022.
17 pages.
|
Angela Y. Ford, Daniel Gelaw Alemneh.
© 2022.
22 pages.
|
|
|