Essays on The Consolidated FBIs Terrorist Screening Center Case Study

Download full paperFile format: .doc, available for editing

The paper 'The Consolidated FBI’ s Terrorist Screening Center " is a good example of an information technology case study. In this case study, the Information Systems (IS) concepts being illustrated is in relation to security issues in the United States and also, the relationship between business ethics and information systems. In this case, the information systems concepts have been used by various agencies in providing them with relevant information on terrorists and thus, it has been helpful in maintaining law and order in the country. The systems aim at controlling the increasing numbers of terrorist attacks by sharing helpful information with other organizations fighting the same menace of terrorists in the United States of America.

Data administration is also another IS concept illustrated in the case as it is responsible for portraying specific procedures and policies of data management and organization resource. The development of information policies, data planning, and logical administration of database designs are some of the responsibilities associated with these information systems. Organization’ s rules for acquiring, sharing, classifying, disseminating, information inventory and standardizing are specific policies of the organization.

This is important because it specifies procedures and accountability records displayed by different agencies by identifying the organizational units and users who can share retrieved or gathered information. The consolidated FBI’ s Terrorist Screening Center (TSC) watch list database for terrorists was established in order to standardize and systematize suspected terrorist information into a single list and therefore, enhance communication between the multiple government agencies. The TSC watch list database records provided by two sources that provide information identifying individuals with ties to both international and domestic terrorism also communicated and share information.

The agencies use the list in collecting and maintaining terrorist information and thereafter, nominating individuals for the inclusion in the consolidated watch list.

References

:

Fine, Glenn. (2009). Federal Bureau of Investigation’s Terrorist Watch list Nomination

Practices. Philadelphia: DIANE Publishing.

United States, Committee on Homeland Security, Congress, Eileen Regen Larence, House.

Terrorist Watch List Screening: Recommendations to Promote a Comprehensive and

Coordinated Approach to Terrorist-Related Screening. Philadelphia: DIANE Publishing.

Download full paperFile format: .doc, available for editing
Contact Us