Essays on Trouble With The Terrorist Watch List Database Case Study

Download full paperFile format: .doc, available for editing

ManagementIn this case study, the Information Systems (IS) concepts being illustrated is in relation to security issues in the United States and also, the relationship between business ethics and information systems. In this case, the information systems concepts have been used by various agencies in providing them with relevant information on terrorists and thus, it has been helpful in maintaining law and order in the country. The systems aim at controlling the increasing numbers of terrorist attacks by sharing helpful information with other organization fighting the same menace of terrorists in the United States of America.

Data administration is also another IS concept illustrated in the case as it is responsible for portraying specific procedures and policies of data management and organization resource. The development of information policies, data planning, and logical administration of database designs are some of the responsibilities associated to this information systems. Organization’s rules for acquiring, sharing, classifying, disseminating, information inventory and standardizing are specific policies of the organization. This is important because it specifies procedures and accountability records displayed by different agencies by identifying the organizational units and users who can share retrieved or gathered information. The consolidated FBI’s Terrorist Screening Center (TSC) watch list database for terrorists was established in order to standardize and systematize suspected terrorist information into a single list and therefore, enhance communication between the multiple government agencies.

The TSC watch list database records provided by two sources that provide information identifying individuals with ties to both international and domestic terrorism also communicated and share information. The agencies use the list in collecting and maintaining terrorist information and thereafter, nominating individuals for the inclusion in the consolidated watch list.

The communication between different government agencies have been useful in deterring and detecting movements of both known and or suspected terrorists in the country. For example, the U. S. Customs and Border Protection system body has been able to use its systems in helping to screen those travelling into the United States. Law enforcement agencies have however helped the FBI in arresting, detaining, and performing other criminal justice activities through collaborating with government agencies (CIA, NSA, and TSA). The list enables government agencies to monitor suspected terrorist activities and in turn, provide security intelligence in order to determine the level of threat of terrorism in the country.

If the level of threat is high, the citizens are then warned to be alert and security agencies collaborate to alleviate the threat. Unification of different terrorism watch lists has been able to streamline the process of locating and apprehending terrorists, but the project has been slow and painstaking resulting in some weaknesses. In order to optimize the usefulness of this list’s more work has to be done to the integrated agencies in the country.

The Government Accountability Office (GAO) and the Office of the Inspector General have confirmed that one of the managerial weaknesses of the list is the inaccuracy of information gathered. Also, the removal and nomination policies from the lists are not uniform among different departments of government. The size of the growing list has also been a public outcry concern bringing about fear and insecurity in the state. The organizational ineffectiveness of the list against terrorists is due to not protecting processed inclusion information by concerned government agencies.

Download full paperFile format: .doc, available for editing
Contact Us