Premium Essay

Management Information System Case Study on Terrorists Watch List Database

In:

Submitted By Batigoldat162
Words 288
Pages 2
From this case study we have found out that combined efforts towards counter terrorism are being made by various agencies by creating a terrorist watch list. Terrorist Screening center or TSC is the organization created to organize and standardize information about suspected terrorist from various government agencies such into a single list. Records there only contain sensitive but unclassified information about the suspects. The database is daily updated with new nominations, modification and deletion. Various agencies that provide the valuable information to TSC are FBI, CIA, National Security Agency, Transportation security administration, Department of Homeland Security, State Department, Customs and Border Protection, secret service, U.S. Marshall Service, and the Whitehouse airlines. The unification of various terrorism databases has been a huge step towards combating terrorists, the project has been quite slow in implementing itself to its full potential as information from 12 different agencies provides them with large amount of data and the TSC has not been able to process it all. Besides the huge database the modification made daily also makes it hard for them in the integration process. Even though this step makes great difference in countering terrorism, it still has many drawbacks that affect the innocent public too. Reports from both the government accountability office and the office of the inspector general assert that the watch list contains several inaccuracies and the government policies to be nominated and to be removed from the watch list are not uniform. Information about the process for inclusion on the list must necessarily be carefully protected; this provides the confidentiality needed for the list is to be effective against terrorism. This on the other hand makes innocent people who are on the list unable to know

Similar Documents

Premium Essay

Case Study

...Bijesh Palikhe 171474 Management information system Case study on Terrorists Watch List Database Pg # 187 Summary From this case study we have found out that combined efforts towards counter terrorism are being made by various agencies by creating a terrorist watch list. Terrorist Screening center or TSC is the organization created to organize and standardize information about suspected terrorist from various government agencies such into a single list. Records there only contain sensitive but unclassified information about the suspects. The database is daily updated with new nominations, modification and deletion. Various agencies that provide the valuable information to TSC are FBI, CIA, National Security Agency, Transportation security administration, Department of Homeland Security, State Department, Customs and Border Protection, secret service, U.S. Marshall Service, and the Whitehouse airlines. The unification of various terrorism databases has been a huge step towards combating terrorists, the project has been quite slow in implementing itself to its full potential as information from 12 different agencies provides them with large amount of data and the TSC has not been able to process it all. Besides the huge database the modification made daily also makes it hard for them in the integration process. Even though this step makes great difference in countering terrorism, it still has many drawbacks that affect the innocent public too. Reports from both the government...

Words: 1401 - Pages: 6

Premium Essay

Wach List

...Mid-Term Individual Assignment   1. Information systems are too important to be left to computer specialists. Do you agree? Why or why not? 2. Adopting an enterprise application is a key business decision as well as a technology decision. Do you agree? Why or why not? Who should make this decision? 3. It has been said that the advantage that leading-edge retailers such as Dell and Wal-Mart have over their competition isn’t technology; it’s their management. Do you agree? Why or why not?   4. Should producers of software-based services, such as ATMs, be held liable for economic injuries suffered when their systems fail?   5. Why is selecting computer hardware and software for the organization an important business decision? What management, organization, and technology issues should be considered when selecting computer hardware and software?   6. To what extent should end users be involved in the selection of a database management system and database design? MID-TERM GROUP PROJECT - Dropbox   In groups of 3 or 4 (groups of 5 for this Session), complete the case analysis outlined below. Week 4  Midterm Group Project     Business Problem-Solving Case: Trouble with the Terrorist Watch List Database   This is a group project and only one group paper will be accepted for the team.   Read the case study for chapter 6 (pages 241 -244).  Complete a 5 to 8 page paper addressing each of the five case study questions listed below. State the question then the answer...

Words: 6259 - Pages: 26

Free Essay

Trouble with the Terrorist Watch List Database Case Study

...Trouble with the Terrorist Watch List Database Case Study 1. What concepts in this chapter are illustrated in this case? Many of the advantages (and shortcomings) of database management systems (DBMS) are illustrated by the terrorist watch list case study. For instance, the watch list solves some of the problems of traditional file environment by reducing redundancy (each agency with some responsibility for homeland security maintaining its own separate list). Also, ideally the list should minimize data inconsistency. DBMS includes tools for accessing and manipulating the information in the database (test, p. 245). This should be helpful on a terrorist watch list in which changes, deletions and retrieval of data may be required by multiple users. 2. Why was the consolidated terrorist watch list crated? What are the benefits of the list? The list was created in the aftermath of the 9-11 attacks, when critics of US intelligence suggested that the lack of shared information among intelligence agencies was partially responsible for our vulnerability to attack. Specifically, the list was created “to organize and standardize information about suspected terrorists…into a single list to enhance communication between agencies.” Prior to creation of the list, these agencies “lacked a consistent process to share relevant information concerning the individual’s on each agency’s list.” The benefits of the list include its daily updating, which keeps it current. Also...

Words: 947 - Pages: 4

Premium Essay

Opsec and Terrorism

...OPSEC in Warfare and Terrorism “The enemy aggressively "reads" our open source and continues to exploit such information for use against our forces. Some soldiers continue to post sensitive information to internet websites and blogs, e.g., photos depicting weapon system vulnerabilities and tactics, techniques, and procedures. Such OPSEC violations needlessly place lives at risk and degrade the effectiveness of our operations.” Peter Schoomaker (1). Operations Security (OPSEC), while a relatively recent term, is an operations enabler that has been practiced in varying degrees throughout history. This document will explore the history of OPSEC as it’s known today, discuss the process and its role in disrupting the capabilities of adversarial forces using multiple collection and planning models and examine the rapidly advancing technical capabilities of threat vectors. OPSEC as a concept was developed during the Vietnam War under the command of Admiral Ulyssess Sharp. The mission of the newly-established “Purple Dragon” team was to determine how the enemy was able to gather information on military operations (2). The team was able to understand the need to alter tactics and procedures to reduce an adversary's ability to make educated predictions based on the knowledge of routines (3). Post-war OPSEC was formally established as a national program when President Ronald Regan signed the National Security Decision Directive Number...

Words: 5936 - Pages: 24

Premium Essay

Mis 301

...MIS 301 Introduction to Information Technology Management FALL 2010 - Unique Numbers: 03905, 03910, 03915 Instructor tructorBin Gu – bin.gu@mccombs.utexas.edu Dr. Information, Risk, & Operations Management (IROM) Dept. Office CBA 5.228 Office Hours MW 4:00-5:00 pm or by appointment Qian Tang - qian.tang@phd.mccombs.utexas.edu Teaching Assistant CBA 1.308B Office TBD Office Hours Course Description Information technology (IT) has transformed all aspects of 21st century business and everyday life. New IT investments continue to be staggering. Worldwide, over $2.5 trillion is invested in IT. In the U.S., over 50% of capital expenditures are related to IT. Information systems influence business processes, organizational structures, and the ways people do business, work, and communicate. Emerging technologies have triggered new forms of organization and business process innovation; they have also impacted organizational structure, culture, politics, decision making, and society as a whole. IT is transforming how physical products are designed, how services are bundled with products, and how individuals interact with businesses and with other individuals. A silent transformation is occurring as more and more physical products use embedded IT to improve customer experience and product performance. The pervasiveness of IT is expanding global trade and changing how and where work is performed. It is vital that future managers—in every area of business—have a...

Words: 3229 - Pages: 13

Free Essay

Cams

...Study Guide for the Certification Examination Fifth Edition ACAMS.org ACAMS.org/español ACAMSToday.org MoneyLaundering.com Study Guide for the Certification Examination Fifth Edition a publication of the association of certified anti-money laundering specialists Study Guide for the Certification Examination Fifth Edition Executive Vice President John J. Byrne, CAMS Editor Robert S. Pasley, CAMS Co-Editor Kevin M. Anderson, CAMS Contributors Joyce Broome, CAMS Heather Brown, CAMS Aub Chapman, CAMS Vasilios Chrisos, CAMS David Clark, CAMS Jurgen Egberink, CAMS Michael D. Kelsey, CAMS Saskia Rietbroek, CAMS Nancy J. Saur, CAMS Mansoor Siddiqi, CAMS Daniel Soto, CAMS Timothy White CAMS Production Assistant Catalina Martinez We would like acknowledge the following individuals for their contributions to the CAMS Exam, and the Online and Live Preparation Seminars: Kevin M. Anderson, CAMS Joyce Broome, CAMS Aub Chapman, CAMS David Clark, CAMS Josue Garcia, CAMS Hoi Luk, CAMS Ira Morales Mickunas, CAMS Robert S. Pasley, CAMS Karim Rajwani, CAMS Mansoor Siddiqi, CAMS Saskia Rietbroek, CAMS Ed Rodriguez, CAMS Nancy J. Saur, CAMS Wendy Steichen, CAMS Brian J. Stoeckert, CAMS Charles Taylor, CAMS Will Voorhees, CAMS Natalie Ware, CAMS Peter Warrack, CAMS Amy Wotapka, CAMS Crispin Yuen, CAMS Copyright © 2012 by the Association of Certified Anti-Money Laundering Specialists (ACAMS). Miami, USA. All rights...

Words: 105184 - Pages: 421

Free Essay

Aviation Security

...Low-Probability Attacks TERRORISME AÉRIEN Contrecarrer des attaques improbables à impacts élevés A Thesis Submitted to the Division of Graduate Studies of the Royal Military College of Canada by Jacques Duchesneau, C.M., C.Q., C.D. In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy April 2015 ©Jacques Duchesneau © This thesis may be used within the Department of National Defence but copyright for open publication remains the property of the author. ROYAL MILITARY COLLEGE OF CANADA COLLÈGE MILITAIRE ROYAL DU CANADA DIVISION OF GRADUATE STUDIES AND RESEARCH DIVISION DES ÉTUDES SUPÉRIEURES ET DE LA RECHERCHE This is to certify that the thesis prepared by / Ceci certifie que la thèse rédigée par JACQUES DUCHESNEAU, C.M., C.Q., C.D. AVIATION TERRORISM Thwarting High-Impact Low-Probability Attacks complies with the Royal Military College of Canada regulations and that it meets the accepted standards of the Graduate School with respect to quality, and, in the case of a doctoral thesis, originality, / satisfait aux règlements du Collège militaire royal du Canada et qu'elle respecte les normes acceptées par la Faculté des études supérieures quant à la qualité et, dans le cas d'une thèse de doctorat, l'originalité, for the degree of / pour le diplôme de PHILOSOPHIÆ DOCTOR IN WAR STUDIES Signed by the final examining committee: / Signé par les membres du comité examinateur de la soutenance de thèse __________________________...

Words: 155225 - Pages: 621

Premium Essay

Staddium Management System Project

...| DEDAN KIMATHI UNIVERSITY OF TECHNOLOGYPROJECT DOCUMENTATION FOR FINAL YEAR STUDY INBachelor of Science in Computer ScienceByKiprotich Emmanuel LangatC026-1127/2011PROJECT TITLEStadium Management System Submitted in partial fulfillment of the degree in BSC in Computer Science.DeclarationI declare that the ideas described herein are my original work and have not been submitted to any Institution for an award of degree or diploma:Students ConfirmationName: Kiprotich Emmanuel Langat Date: Signature………………………..……… …………………………………………….Supervisor ConfirmationName: Mr. Gabriel Kamau Date: Signature………………………………….. ……………….……………………………. | Abstract Although many stadium management systems have been developed today, major issues which could make these stadium management systems interactive towards the public/stadium users and be able to play a leading role in ensuring that a well secure stadium is realized have not been implemented. Ensuring that there is a better and efficient means by which the stadium can be able to communicate to its users today informing them of the activities which do take place in the stadium such as the day of football matches has been a pretty challenge to most stadium managers. Yet communication among relevant parties is recognized as the only means by which absolute trust and effective service delivery can be achieved. Ways of handling insecurity...

Words: 7302 - Pages: 30

Premium Essay

Management and Information Systems

...Chapter 4 Ethical and Social Issues in Information Systems LEARNING OBJECTIVES After reading this chapter, you will be able to: 1. Analyze the relationships among ethical, social, and political issues that are raised by information systems. 2. Identify the main moral dimensions of an information society and specific principles for conduct that can be used to guide ethical decisions. 3. Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property. 4. Assess how information systems have affected everyday life. CHAPTER OUTLINE 4.1 UNDERSTANDING ETHICAL AND SOCIAL ISSUES RELATED TO SYSTEMS A Model for Thinking About Ethical, Social, and Political Issues Five Moral Dimensions of the Information Age Key Technology Trends that Raise Ethical Issues ETHICS IN AN INFORMATION SOCIETY Basic Concepts: Responsibility, Accountability, and Liability Ethical Analysis Candidate Ethical Principles Professional Codes of Conduct Some Real-World Ethical Dilemmas THE MORAL DIMENSIONS OF INFORMATION SYSTEMS Information Rights: Privacy and Freedom in the Internet Age Property Rights: Intellectual Property Accountability, Liability, and Control System Quality: Data Quality and System Errors Quality of Life: Equity, Access, and Boundaries HANDS-ON MIS Developing a Web Site Privacy Policy: Dirt Bikes USA Achieving Operational Excellence: Creating a Simple Web Site Using Web Page Development Tools Improving Decision Making: Using...

Words: 20079 - Pages: 81

Free Essay

Core Concepts of Ais

...CORE CONCEPTS OF Accounting Information Systems Twelfth Edition Mark G. Simkin, Ph.D. Professor Department of Accounting and Information Systems University of Nevada Jacob M. Rose, Ph.D. Professor Department of Accounting and Finance University of New Hampshire Carolyn Strand Norman, Ph.D., CPA Professor Department of Accounting Virginia Commonwealth University JOHN WILEY & SONS, INC. VICE PRESIDENT & PUBLISHER SENIOR ACQUISITIONS EDITOR PROJECT EDITOR ASSOCIATE EDITOR SENIOR EDITORIAL ASSISTANT PRODUCTION MANAGER PRODUCTION EDITOR MARKETING MANAGER CREATIVE DIRECTOR SENIOR DESIGNER PRODUCTION MANAGEMENT SERVICES SENIOR ILLUSTRATION EDITOR PHOTO EDITOR MEDIA EDITOR COVER PHOTO George Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the...

Words: 241803 - Pages: 968

Premium Essay

Maritime Terrorism in Southeast Asia

...and open access by CREATE Research Archive. It has been accepted for inclusion in Non-published Research Reports by an authorized administrator of CREATE Research Archive. For more information, please contact gribben@usc.edu. A BRIEF ANALYSIS OF THREATS AND VULNERABILITIES IN THE MARITIME DOMAIN1 N.O. BAKIR University of Southern California, Center for Risk and Economic Analysis of Terrorism Events (CREATE) 3710 McClintock Avenue, RTH 322, Los Angeles, CA 90089-2902 USA Abstract The attacks of September 11 have exposed the vulnerability of the American homeland against terrorism. Terrorists have already expressed their intentions to continue their aggression towards United States. Their goal is to incur maximum economic damage, inflict mass casualty, spread unprecedented fear among citizens and thus destabilize the nation to further their agenda. Many critical sites lay across US maritime borders, all of which could be potential targets to accomplish these goals. All these sites are simple elements of a complex body where the vulnerability of the whole system is a function of the vulnerability of the weakest element against an adaptive adversary. Ports, nuclear facilities, LNG facilities, urban areas, bridges, chemical plants and other critical infrastructure are all elements of this complex system. In this paper, we review the current status of...

Words: 14868 - Pages: 60

Free Essay

Csec 610 Final Exam

...is designed to conceal that fact that an operating system has been compromised. They ultimately allow viruses and malware to hide from usual methods of detection, and permits continued privileged access to a computer. Rootkits allow for full control over a system, which means that existing software can be modified including detection software. Rootkit detection is difficult because a rootkit is activated before the operating system boots up and is able to subvert the software intended to find it (Vacca, 2013, pp. 53-54). The next step would then be to install spyware and use the rootkit to disguise it as necessary files that anti-spyware software will overlook. Once a user purchases this product and it is connected, off-site agents will be able to start collecting files and data and have the ability to access and control the infected devices. b) As a technology procurer for an organization, it is very important to do your research on your vendors. The legitimacy of the vendor needs to be verified and their workforce, production lines and supply chains need to be checked to ensure they have appropriate security measures and monitoring in place to safeguard against malicious activity. A security vulnerabilities assessment needs to be done on all new information technologies to ensure it meets the requirements for the organization’s IT security policies. It is important to ensure IT products meet the suitable information technology security policies and requirements of an...

Words: 5301 - Pages: 22

Free Essay

Case Study

...MIS Mini-cases -- 1 of 30 Cases for Use in Management Information Systems MIS Mini-cases -- 2 of 30 MIS Mini-cases -- 3 of 30 Case 01 -- Freeway Ford You are a management consultant working for Franklin Absolom, the majority stockholder for a group of 10 automobile dealerships. He has asked you to spend several days at Freeway Ford, a dealership that is not performing up to its potential. You are not to go ―looking for trouble‖: instead, your assignment is to find ways to help management at the dealership take advantage of opportunities. One day while you are talking with James Kahler, the sales manager for Freeway Ford, you realize that the dealership only uses transaction processing systems—it is not realizing the full potential of the information it has gathered for managerial decision making. For example, Freeway Ford knows the purchase date and owner of every car it sells, but it never contacts owner about routine maintenance. Freeway Ford know that people who purchase a new car generally trade it in for another new car 3 to 4 years later, but the dealership does not contact these previous customers. Another opportunity comes from used car purchasing and sales. Every car has a vehicle identification number (VIN), and the dealership uses this number to check for known problems with a used car before it makes a purchase. A data bank of car insurance claims histories and major repairs is kept on a set of CDs that is sent to the dealership each month. At the...

Words: 12946 - Pages: 52

Premium Essay

Social, Legal, and Ethical Issues in the Information Age

...Chapter 5 Social, Legal, and Ethical Issues in the Information Age Teaching Objectives Students should be able to answer the following questions: 1. What ethical, social, and political issues are raised by information systems? 2. Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? 3. Why does contemporary information technology pose challenges to the protection for individual privacy and intellectual property? 4. How have information systems affected everyday life? 5. How can organizations develop corporate policies for ethical conduct? Key Terms The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided. |Accountability, 154 |Intellectual property, 164 | |Carpal tunnel syndrome (CTS), 176 |Liability, 154 | |Computer abuse, 173 |Non-obvious relationship awareness (NORA), 153 | |Computer crime, 173 |Opt-in, 161 | |Computer vision syndrome (CVS), 177 |Opt-out, 161 | |Cookie, 160 ...

Words: 5310 - Pages: 22

Premium Essay

Essay Statistics

...Chapter 5 Social, Legal, and Ethical Issues in the Information Age Teaching Objectives Students should be able to answer the following questions: 1. What ethical, social, and political issues are raised by information systems? 2. Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? 3. Why does contemporary information technology pose challenges to the protection for individual privacy and intellectual property? 4. How have information systems affected everyday life? 5. How can organizations develop corporate policies for ethical conduct? Key Terms The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided. |Accountability, 154 |Intellectual property, 164 | |Carpal tunnel syndrome (CTS), 176 |Liability, 154 | |Computer abuse, 173 |Non-obvious relationship awareness (NORA), 153 | |Computer crime, 173 |Opt-in, 161 | |Computer vision syndrome (CVS), 177 |Opt-out, 161 | |Cookie, 160 ...

Words: 5310 - Pages: 22