Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Target, Shield and Weapon: A Taxonomy of IT Security Initiatives

Target, Shield and Weapon: A Taxonomy of IT Security Initiatives
View Free PDF
Author(s): Laura Lally (Hofstra University, USA)
Copyright: 2006
Pages: 3
Source title: Emerging Trends and Challenges in Information Technology Management
Source Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59904-019-6.ch006
ISBN13: 9781616921286
EISBN13: 9781466665361


With IT Security becoming an issue of growing importance, many new IT based technologies and applications are emerging to confront this challenge. This paper presents a theoretically based model for classifying these emerging technologies, the “Target, Shield and Weapon” model. The goal of this research is to create a meaningful taxonomy for emerging initiatives that will: 1) ensure interoperability with existing, and other emerging systems, 2) identify areas of basic research needed to support the full operability of these initiatives and 3) identify applications, developed for military scenarios that can be modified for use in civilian environment .Two case studies will be outlined for the application of the model: 1) the London terrorist bombings, and 2) the New Orleans flood.

Body Bottom