EconPapers    
Economics at your fingertips  
 

Technology-based security threats: taxonomy of sources, targets and a process model of alleviation

Christopher Conca, B. Dawn Medlin and Dinesh S. Dave

International Journal of Information Technology and Management, 2005, vol. 4, issue 2, 166-177

Abstract: Development and innovative application of technology, as well as the integration of available technology, can provide an organisation with a unique opportunity to remain competitive in a global business environment. Although technology plays an important role in gaining competitive advantage for organisations worldwide, information technology professionals are becoming increasingly aware of the potentially harmful impact of misuse of information technologies. This paper provides a review of various technology-based threats and how they affect organisations. The paper further provides a taxonomy that depicts sources and targets of these threats and a process model to assist organisations in alleviating these threats. In addition to the five-stage threat alleviation model, a cause-and-effect diagram has been incorporated as a tool to help identify the sources of these threats as well as the potential outcomes of successful attacks. Organisations worldwide can use the taxonomy developed in this paper and the process to prevent these threats.

Keywords: computer security; technology-based threats; process models; security threats; information technology; taxonomy; threat prevention; problem solving; cause-and-effect diagram. (search for similar items in EconPapers)
Date: 2005
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.inderscience.com/link.php?id=6765 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ids:ijitma:v:4:y:2005:i:2:p:166-177

Access Statistics for this article

More articles in International Journal of Information Technology and Management from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().

 
Page updated 2025-03-19
Handle: RePEc:ids:ijitma:v:4:y:2005:i:2:p:166-177