Information Technology as a Target and Shield in the Post 9/11 Environment

Information Technology as a Target and Shield in the Post 9/11 Environment

Laura Lally (Hofstra University, USA)
Copyright: © 2005 |Pages: 15
DOI: 10.4018/irmj.2005010102
OnDemand PDF Download:
$37.50

Abstract

This paper draws upon Normal Accident Theory and the Theory of High Reliability Organizations to examine the potential impacts of Information Technology being used as a target in terrorist and other malicious attacks. The paper also argues that Information Technology can also be used as a shield to prevent further attacks and mitigate their impact if they should occur. A Target and Shield model is developed, which extends Normal Accident Theory to encompass secondary effects, change and feedback loops to prevent future accidents. The Target and Shield model is applied to the Y2K problem and the emerging threats and initiatives in the Post 9/11 environment.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 30: 4 Issues (2017): Forthcoming, Available for Pre-Order
Volume 29: 4 Issues (2016)
Volume 28: 4 Issues (2015)
Volume 27: 4 Issues (2014)
Volume 26: 4 Issues (2013)
Volume 25: 4 Issues (2012)
Volume 24: 4 Issues (2011)
Volume 23: 4 Issues (2010)
Volume 22: 4 Issues (2009)
Volume 21: 4 Issues (2008)
Volume 20: 4 Issues (2007)
Volume 19: 4 Issues (2006)
Volume 18: 4 Issues (2005)
Volume 17: 4 Issues (2004)
Volume 16: 4 Issues (2003)
Volume 15: 4 Issues (2002)
Volume 14: 4 Issues (2001)
Volume 13: 4 Issues (2000)
Volume 12: 4 Issues (1999)
Volume 11: 4 Issues (1998)
Volume 10: 4 Issues (1997)
Volume 9: 4 Issues (1996)
Volume 8: 4 Issues (1995)
Volume 7: 4 Issues (1994)
Volume 6: 4 Issues (1993)
Volume 5: 4 Issues (1992)
Volume 4: 4 Issues (1991)
Volume 3: 4 Issues (1990)
Volume 2: 4 Issues (1989)
Volume 1: 1 Issue (1988)
View Complete Journal Contents Listing