Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Applying the Target and Shield Model to Wireless Technologies

Applying the Target and Shield Model to Wireless Technologies
View Free PDF
Author(s): Laura Lally (Hofstra University, USA) and James J. Nolan (InterDigital Communications Corp, USA)
Copyright: 2005
Pages: 4
Source title: Managing Modern Organizations Through Information Technology
Source Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59140-822-2.ch106
ISBN13: 9781616921293
EISBN13: 9781466665354


This paper presents Lally’s Target and Shield model and its implications for Wireless Technologies. The Target and Shield model, which is grounded in Normal Accident Theory and the Theory of High Reliability Organizations provides a framework for examining how IT can be used both as a target of malicious attacks as well as how IT can be used as a shield against such attacks or to mitigate their impact should they occur. Wireless technologies, their vulnerabilities to attack, and their use in preventing further attacks are examined. Suggestions for designing more secure and resilient systems in the future conclude the paper.

Body Bottom