IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Information Technology as a Target, Shield, and Weapon in the Post-9/11 Environment

Information Technology as a Target, Shield, and Weapon in the Post-9/11 Environment
View Sample PDF
Author(s): Laura Lally (Hofstra University, USA)
Copyright: 2007
Pages: 19
Source title: Emerging Information Resources Management and Technologies
Source Author(s)/Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59904-286-2.ch007

Purchase

View Information Technology as a Target, Shield, and Weapon in the Post-9/11 Environment on the publisher's website for pricing and purchasing information.

Abstract

This chapter draws upon normal accident theory and the theory of high reliability organizations to examine the potential impacts of information technology being used as a target in terrorist and other malicious attacks. The chapter also argues that information technology can be used as a shield to prevent further attacks and mitigate their impact if they should occur. A target and shield model is developed, which extends normal accident theory to encompass secondary effects, change, and feedback loops to prevent future accidents. The target and shield model is applied to the Y2K problem and the emerging threats and initiatives in the post-9/11 environment. The model is then extended to encompass the use of IT as a weapon against terrorism.

Related Content

Christine Kosmopoulos. © 2022. 22 pages.
Melkamu Beyene, Solomon Mekonnen Tekle, Daniel Gelaw Alemneh. © 2022. 21 pages.
Rajkumari Sofia Devi, Ch. Ibohal Singh. © 2022. 21 pages.
Ida Fajar Priyanto. © 2022. 16 pages.
Murtala Ismail Adakawa. © 2022. 27 pages.
Shimelis Getu Assefa. © 2022. 17 pages.
Angela Y. Ford, Daniel Gelaw Alemneh. © 2022. 22 pages.
Body Bottom