Title: Technology-based security threats: taxonomy of sources, targets and a process model of alleviation

Authors: Christopher Conca, B. Dawn Medlin, Dinesh S. Dave

Addresses: School of Business, Mount Olive College, Mount Olive, NC 28365, USA. ' Department of Information Technology and Operations Management, John A. Walker College of Business, Appalachian State University, Boone, NC 28608, USA. ' Department of Information Technology and Operations Management, John A. Walker College of Business, Appalachian State University, Boone, North Carolina 28608, USA

Abstract: Development and innovative application of technology, as well as the integration of available technology, can provide an organisation with a unique opportunity to remain competitive in a global business environment. Although technology plays an important role in gaining competitive advantage for organisations worldwide, information technology professionals are becoming increasingly aware of the potentially harmful impact of misuse of information technologies. This paper provides a review of various technology-based threats and how they affect organisations. The paper further provides a taxonomy that depicts sources and targets of these threats and a process model to assist organisations in alleviating these threats. In addition to the five-stage threat alleviation model, a cause-and-effect diagram has been incorporated as a tool to help identify the sources of these threats as well as the potential outcomes of successful attacks. Organisations worldwide can use the taxonomy developed in this paper and the process to prevent these threats.

Keywords: computer security; technology-based threats; process models; security threats; information technology; taxonomy; threat prevention; problem solving; cause-and-effect diagram.

DOI: 10.1504/IJITM.2005.006765

International Journal of Information Technology and Management, 2005 Vol.4 No.2, pp.166 - 177

Published online: 05 Apr 2005 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article