메뉴 건너뛰기




Volumn 18, Issue 1, 2005, Pages 14-28

Information Technology as a target and shield in the Post 9/11 environment

Author keywords

Computer privacy; Computer security; Normal accident theory; Post 9 11; Target and shield model; Terrorism; Theory of high reliability organizations; Y2K

Indexed keywords

AUTOMATION; COMPUTER NETWORKS; COMPUTER PRIVACY; DATABASE SYSTEMS; PROBLEM SOLVING; SECURITY OF DATA; SOCIETIES AND INSTITUTIONS;

EID: 10444263001     PISSN: 10401628     EISSN: None     Source Type: Journal    
DOI: 10.4018/irmj.2005010102     Document Type: Article
Times cited : (5)

References (69)
  • 1
    • 10444262333 scopus 로고    scopus 로고
    • Intrusion detection systems are evolving
    • Andress, M. (2002). Intrusion detection systems are evolving. Computerworld, (July 15).
    • (2002) Computerworld , Issue.JULY 15
    • Andress, M.1
  • 2
    • 33750877929 scopus 로고    scopus 로고
    • 12.31.99
    • Anson, R.S. (1999). 12.31.99. Vanity Fair, (January), 80-84.
    • (1999) Vanity Fair , Issue.JANUARY , pp. 80-84
    • Anson, R.S.1
  • 3
    • 0035626767 scopus 로고    scopus 로고
    • The effects of time pressure on quality in software development
    • Austin, R. (2001). The effects of time pressure on quality in software development. Information Systems Research, (June), 195-207.
    • (2001) Information Systems Research , Issue.JUNE , pp. 195-207
    • Austin, R.1
  • 4
    • 10444277673 scopus 로고    scopus 로고
    • Feds learn from corporate IT
    • Bacheldor, B. (2002). Feds learn from corporate IT. Information Week, (February 27).
    • (2002) Information Week , Issue.FEBRUARY 27
    • Bacheldor, B.1
  • 5
    • 10444244463 scopus 로고    scopus 로고
    • The Great Blackout of 2003
    • Ballman, J. (2003). The Great Blackout of 2003. Disaster Recovery Journal, (Fall), 16-18.
    • (2003) Disaster Recovery Journal , Issue.FALL , pp. 16-18
    • Ballman, J.1
  • 6
    • 10444259340 scopus 로고    scopus 로고
    • Trusted traveler' aims to streamline security
    • Berger, M. (2002). 'Trusted Traveler' aims to streamline security. Computerworld, (March 18).
    • (2002) Computerworld , Issue.MARCH 18
    • Berger, M.1
  • 7
    • 10444278828 scopus 로고    scopus 로고
    • Retrieved June 6, 2004 from: News. news, com
    • Bowman, L. (2002). FBI digs deeper into the Web. Retrieved June 6, 2004 from: News. news, com
    • (2002) FBI Digs Deeper into the Web
    • Bowman, L.1
  • 8
    • 10444224236 scopus 로고    scopus 로고
    • Watch out for wireless rogues
    • Brewin, B. (2002). Watch out for wireless rogues. Computerworld, (July 15).
    • (2002) Computerworld , Issue.JULY 15
    • Brewin, B.1
  • 9
    • 85039484946 scopus 로고    scopus 로고
    • Retrieved September 25, 2004 from: Cnn.com
    • Cavallaro, M. (2001). Private eyes. Retrieved September 25, 2004 from: Cnn.com
    • (2001) Private Eyes
    • Cavallaro, M.1
  • 10
    • 10444285681 scopus 로고    scopus 로고
    • Put your IT eggs in different baskets
    • Cope, J. (2002). Put your IT eggs in different baskets. Computerworld, (July 15).
    • (2002) Computerworld , Issue.JULY 15
    • Cope, J.1
  • 11
    • 10444220551 scopus 로고    scopus 로고
    • Gates e-mail edict: How it marks the end of innocence
    • Coursey, D. (2002). Gates e-mail edict: How it marks the end of innocence. ZDNet, (January), 18.
    • (2002) ZDNet , Issue.JANUARY , pp. 18
    • Coursey, D.1
  • 12
    • 0042884232 scopus 로고    scopus 로고
    • A year after 9/11: Where are we now?
    • Davies, S. (2002). A year after 9/11: Where are we now? Communications of the ACM, (September), 35-39.
    • (2002) Communications of the ACM , Issue.SEPTEMBER , pp. 35-39
    • Davies, S.1
  • 13
    • 10444232331 scopus 로고    scopus 로고
    • Internet messaging keeps businesses, employees, in touch
    • Disabatino, J. (2001). Internet messaging keeps businesses, employees, in touch. Computerworld, (September 17).
    • (2001) Computerworld , Issue.SEPTEMBER 17
    • Disabatino, J.1
  • 14
    • 10444243712 scopus 로고    scopus 로고
    • Radio problem could last years
    • Dwyer, J. (2002). Radio problem could last years. New York Times, (September 18).
    • (2002) New York Times , Issue.SEPTEMBER 18
    • Dwyer, J.1
  • 15
    • 10444267689 scopus 로고    scopus 로고
    • Go on, watch me
    • Economist. (2002). Go on, watch me. (August 17), 12.
    • (2002) Economist , Issue.AUGUST 17 , pp. 12
  • 17
    • 10444287226 scopus 로고    scopus 로고
    • Security beyond your borders
    • Gilbert, A. (2001). Security beyond your borders. Information Week, (November 5).
    • (2001) Information Week , Issue.NOVEMBER 5
    • Gilbert, A.1
  • 19
    • 0031512352 scopus 로고    scopus 로고
    • Risk mitigation in large scale systems: Lessons from high reliability organizations
    • Grabowski, M., & Roberts, K. (1997). Risk mitigation in large scale systems: Lessons from high reliability organizations. California Management Review, (Summer), 152-162.
    • (1997) California Management Review , Issue.SUMMER , pp. 152-162
    • Grabowski, M.1    Roberts, K.2
  • 20
    • 84862042767 scopus 로고    scopus 로고
    • Retrieved from BYTE
    • Halfhill, T. (1998) Crash-proof computing. Retrieved from BYTE: www.byte.com/ art/9804/sec5/artl.html
    • (1998) Crash-proof Computing
    • Halfhill, T.1
  • 21
    • 0012133705 scopus 로고    scopus 로고
    • Antiterrorism law targets hackers around the world
    • Hulme, G. (2001). Antiterrorism law targets hackers around the world. Information Week, (December 3).
    • (2001) Information Week , Issue.DECEMBER 3
    • Hulme, G.1
  • 22
    • 10444283793 scopus 로고    scopus 로고
    • Help to combat the next big blended threat
    • Hulme, G. (2002). Help to combat the next big blended threat. Information Week, (April 1).
    • (2002) Information Week , Issue.APRIL 1
    • Hulme, G.1
  • 25
  • 26
    • 84973701637 scopus 로고
    • Organizational culture in high reliability organizations
    • Klein, R.L., Bigley, G.A., & Roberts, K.H. (1995). Organizational culture in high reliability organizations. Human Relations, 48(7), 771-792.
    • (1995) Human Relations , vol.48 , Issue.7 , pp. 771-792
    • Klein, R.L.1    Bigley, G.A.2    Roberts, K.H.3
  • 27
    • 10444259339 scopus 로고    scopus 로고
    • Embedded code is the future: Get ready to reboot
    • Koerner, B. (2002). Embedded code is the future: Get ready to reboot. WIRED, (August), 27-28.
    • (2002) Wired , Issue.AUGUST , pp. 27-28
    • Koerner, B.1
  • 28
    • 10444256822 scopus 로고    scopus 로고
    • With phone lines bottlenecked, internet messaging became lifeline
    • Kontzer, T. (2001). With phone lines bottlenecked, internet messaging became lifeline. Information Week, (September 12).
    • (2001) Information Week , Issue.SEPTEMBER 12
    • Kontzer, T.1
  • 32
    • 0011137862 scopus 로고
    • Working in practice but not in theory: Theoretical challenges of high reliability organizations
    • LaPorte, T.R., & Consolini. P. (1991). Working in practice but not in theory: Theoretical challenges of high reliability organizations. Journal of Public Administration, 1, 19-47.
    • (1991) Journal of Public Administration , vol.1 , pp. 19-47
    • Laporte, T.R.1    Consolini, P.2
  • 33
    • 10444272094 scopus 로고    scopus 로고
    • Web site defacement hit all-time high in September
    • Legard, D. (2002). Web site defacement hit all-time high in September. Computerworld, (September 30).
    • (2002) Computerworld , Issue.SEPTEMBER 30
    • Legard, D.1
  • 34
    • 10444290993 scopus 로고    scopus 로고
    • Report: Internet attacks on the rise
    • Lemos, R. (2001). Report: Internet attacks on the rise. ZDNet, (October 15).
    • (2001) ZDNet , Issue.OCTOBER 15
    • Lemos, R.1
  • 36
    • 10444272093 scopus 로고    scopus 로고
    • Security: The enemy within
    • Levitt, J. (2001). Security: The enemy within. Information Week, (April 23).
    • (2001) Information Week , Issue.APRIL 23
    • Levitt, J.1
  • 37
    • 10444238901 scopus 로고    scopus 로고
    • Data expert is cautious about misuse of information
    • Lohr, S. (2003). Data expert is cautious about misuse of information. New York Times, (March 25).
    • (2003) New York Times , Issue.MARCH 25
    • Lohr, S.1
  • 38
    • 10444274567 scopus 로고    scopus 로고
    • Homeland security CIO pushes collaboration
    • Meehan, M. (2002). Homeland security CIO pushes collaboration. Computerworld, (July 29).
    • (2002) Computerworld , Issue.JULY 29
    • Meehan, M.1
  • 39
    • 10444259338 scopus 로고    scopus 로고
    • Y2K plans aided in recovery, but more planning needed
    • Merian, L. (2001). Y2K plans aided in recovery, but more planning needed. Computerworld, (September 19).
    • (2001) Computerworld , Issue.SEPTEMBER 19
    • Merian, L.1
  • 40
    • 10444232332 scopus 로고    scopus 로고
    • Wall street aims to thwart criminals with database
    • Merian, L. (2002). Wall street aims to thwart criminals with database. Computerworld, (June 10).
    • (2002) Computerworld , Issue.JUNE 10
    • Merian, L.1
  • 41
    • 10444278829 scopus 로고    scopus 로고
    • Wall street seeks cyberterror defenses
    • Merian, L. (2002a). Wall street seeks cyberterror defenses. Computerworld, (March 4).
    • (2002) Computerworld , Issue.MARCH 4
    • Merian, L.1
  • 44
  • 45
    • 10444254276 scopus 로고    scopus 로고
    • Recovered data in NY could explain preatttack financial dealings
    • Perera, R. (2001). Recovered data in NY could explain preatttack financial dealings. Computerworld, (December 19).
    • (2001) Computerworld , Issue.DECEMBER 19
    • Perera, R.1
  • 48
    • 4243104287 scopus 로고    scopus 로고
    • Total information overload
    • Popp, R. (2003). Total information overload. MIT Technology Review, (July/ August), 68-71.
    • (2003) MIT Technology Review , Issue.JULY- AUGUST , pp. 68-71
    • Popp, R.1
  • 49
    • 85039472201 scopus 로고    scopus 로고
    • Robb, D. (2003). Robbing the (Data) bank. Retrieved from: http.V/itmanagement. earthweb.com/secu/article.php/ 2217441
    • (2003) Robbing the (Data) Bank
    • Robb, D.1
  • 50
    • 0003726032 scopus 로고
    • rinceton: Princeton University Press
    • Sagan, S. (1993). The limits of safety. rinceton: Princeton University Press.
    • (1993) The Limits of Safety
    • Sagan, S.1
  • 51
    • 10444272092 scopus 로고    scopus 로고
    • Averting disaster
    • Scheier, R. (2001). Averting disaster. Computerworld, (January 15).
    • (2001) Computerworld , Issue.JANUARY 15
    • Scheier, R.1
  • 52
    • 10444273598 scopus 로고    scopus 로고
    • Top 10 vulnerabilities in today's Wi-Fi Networks
    • Singhai, S. (2002). Top 10 vulnerabilities in today's Wi-Fi Networks. Computerworld, (July 15).
    • (2002) Computerworld , Issue.JULY 15
    • Singhai, S.1
  • 53
    • 10444271340 scopus 로고    scopus 로고
    • Next terror target: The Internet
    • Snyder, J. (2002). Next terror target: The Internet. Computerworld, (June 10).
    • (2002) Computerworld , Issue.JUNE 10
    • Snyder, J.1
  • 54
    • 10444252964 scopus 로고    scopus 로고
    • Experts divided over use of CRM to prevent terrorism
    • Sullivan, B. (2002). Experts divided over use of CRM to prevent terrorism. Computerworld, (February 28).
    • (2002) Computerworld , Issue.FEBRUARY 28
    • Sullivan, B.1
  • 55
    • 10444252965 scopus 로고    scopus 로고
    • The myth of order
    • Ullman, E. (1999). The myth of order. Wired. Retrieved from: http:// wired, com/archive/7.04/y2k_pr.html
    • (1999) Wired
    • Ullman, E.1
  • 56
    • 10444269750 scopus 로고    scopus 로고
    • Online profiling
    • Thibodeau, P. (2000). Online profiling. Computerworld, (September 18).
    • (2000) Computerworld , Issue.SEPTEMBER 18
    • Thibodeau, P.1
  • 57
    • 10444271341 scopus 로고    scopus 로고
    • Businesses eye Y2K effort as model for terrorism fight
    • Thibodeau, P. (2001). Businesses eye Y2K effort as model for terrorism fight. Computerworld, (October 2).
    • (2001) Computerworld , Issue.OCTOBER 2
    • Thibodeau, P.1
  • 58
    • 10444253516 scopus 로고    scopus 로고
    • Terrorism taxes IT planning
    • Thibodeau, P., & Merian, L. (2001). Terrorism taxes IT planning. Computerworld, (November 5).
    • (2001) Computerworld , Issue.NOVEMBER 5
    • Thibodeau, P.1    Merian, L.2
  • 59
    • 84855943482 scopus 로고
    • The organizational and interorganizational development of disasters
    • Turner, B.M. (1976). The organizational and interorganizational development of disasters. Administrative Science Quarterly, 21, 378-397.
    • (1976) Administrative Science Quarterly , vol.21 , pp. 378-397
    • Turner, B.M.1
  • 60
    • 84969554769 scopus 로고    scopus 로고
    • Black Ice scenario sheds light on future threats to critical systems
    • Verton, D. (2001). Black Ice scenario sheds light on future threats to critical systems. Computerworld, (October 18).
    • (2001) Computerworld , Issue.OCTOBER 18
    • Verton, D.1
  • 62
    • 10444233890 scopus 로고    scopus 로고
    • IT key to antiterror defenses at nation's sea ports
    • Verton, D. (2002). IT key to antiterror defenses at nation's sea ports. Computerworld, (January 12).
    • (2002) Computerworld , Issue.JANUARY 12
    • Verton, D.1
  • 63
    • 10444226880 scopus 로고    scopus 로고
    • INS looks to IT to revamp lax student visa system
    • Verton, D. (2002). INS looks to IT to revamp lax student visa system. Computerworld, (March 25).
    • (2002) Computerworld , Issue.MARCH 25
    • Verton, D.1
  • 64
    • 79960898387 scopus 로고    scopus 로고
    • Denial-of-Service attacks still a threat
    • Vijayan, J. (2002). Denial-of-Service attacks still a threat. Computerworld, (April 8).
    • (2002) Computerworld , Issue.APRIL 8
    • Vijayan, J.1
  • 65
    • 33749432884 scopus 로고    scopus 로고
    • Can sensemaking keep us safe?
    • Waldrop, M. (2003). Can sensemaking keep us safe? MIT Technology Review, (March), 41-52.
    • (2003) MIT Technology Review , Issue.MARCH , pp. 41-52
    • Waldrop, M.1
  • 66
    • 85047875702 scopus 로고
    • Collective mind in organizations: Heedful interrelating on flight decks
    • Weick, K.E., & Roberts, K. (1993). Collective mind in organizations: Heedful interrelating on flight decks. Administrative Science Quarterly, 38, 357-381.
    • (1993) Administrative Science Quarterly , vol.38 , pp. 357-381
    • Weick, K.E.1    Roberts, K.2
  • 67
    • 0034550212 scopus 로고    scopus 로고
    • Modeling the incidence of postrelease errors in software
    • Westland, J.C. (2000). Modeling the incidence of postrelease errors in software. Information Systems Research, (September), 320-324.
    • (2000) Information Systems Research , Issue.SEPTEMBER , pp. 320-324
    • Westland, J.C.1
  • 68
    • 10444265535 scopus 로고    scopus 로고
    • Post 9/11 drills aid club fire rescue
    • Wielawski, I. (2003). Post 9/11 drills aid club fire rescue. New York Times, (March 23).
    • (2003) New York Times , Issue.MARCH 23
    • Wielawski, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.