Information Technology as a Target, Shield, and Weapon in the Post-9/11 Environment

Information Technology as a Target, Shield, and Weapon in the Post-9/11 Environment

Laura Lally
Copyright: © 2007 |Pages: 19
DOI: 10.4018/978-1-59904-286-2.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter draws upon normal accident theory and the theory of high reliability organizations to examine the potential impacts of information technology being used as a target in terrorist and other malicious attacks. The chapter also argues that information technology can be used as a shield to prevent further attacks and mitigate their impact if they should occur. A target and shield model is developed, which extends normal accident theory to encompass secondary effects, change, and feedback loops to prevent future accidents. The target and shield model is applied to the Y2K problem and the emerging threats and initiatives in the post-9/11 environment. The model is then extended to encompass the use of IT as a weapon against terrorism.

Complete Chapter List

Search this Book:
Reset