Enumerating the risks of reengineered processes
CSC '96 Proceedings of the 1996 ACM 24th annual conference on Computer science
Byte Wars: The Impact of September 11 on Information Technology
Byte Wars: The Impact of September 11 on Information Technology
A year after 9/11: where are we now?
Communications of the ACM
Research Report: Modeling the Incidence of Postrelease Errors in Software
Information Systems Research
The Effects of Time Pressure on Quality in Software Development: An Agency Model
Information Systems Research
Normal accidents: Data quality problems in ERP-enabled manufacturing
Journal of Data and Information Quality (JDIQ)
Hi-index | 0.00 |
This paper draws upon Normal Accident Theory and the Theory of High Reliability Organizations to examine the potential impacts of Information Technology being used as a target in terrorist and other malicious attacks. The paper also argues that Information Technology can also be used as a shield to prevent further attacks and mitigate their impact if they should occur. A Target and Shield model is developed, which extends Normal Accident Theory to encompass secondary effects, change and feedback loops to prevent future accidents. The Target and Shield model is applied to the Y2K problem and the emerging threats and initiatives in the Post 9/11 environment.