Case Study: 2003 Annual Report Global Terrorism

Pages: 7 (2294 words)  ·  Style: APA  ·  Bibliography Sources: 10  ·  File: .docx  ·  Level: College Senior  ·  Topic: Terrorism  ·  Buy for $19.77

SAMPLE EXCERPT:

[. . .] The integration of all information and reports of terrorism can provided a vivid picture of perceived terror threats. The analytical and statistical tools should be developed to counter the terrorism threats. The complete integration of all intelligence information provides an opportunity for essential defense mechanism.The rigorous review of the databases, information systems, procedures, interagency process, methodology, criteria, and definitions used to compile international terrorism statistics is required.

Issues and implications for the organization:

The major issues faced by the department are in terms of upgrading the operating mechanism and system developed to integrate information. TTIC requires a complete restricting of its organizational and system infrastructure (French, & Gootzit, 2011). The development of networks and software to receive intelligence information is required to create a clear threat perception. The existing system is working on already developed mechanism. It should be updated with the latest counterterrorism strategies. The tools and software required to analyze the statistical data is also inappropriate. Usage of a global terrorism and data sharing is required to increase performance (Lum, Haberfeld, Fachner, & Lieberman, 2011).

The implications of inappropriate systems and operating procedures can be observed in two unique directions. The first dimension of the implications is in terms of losing trust in national defense and counterterrorism procedures. The national infrastructure is not functioning on acceptable standards despite having the availability of technology can create a massive concern in normal public. The second important implication of the inappropriate functioning of the system is in terms of various perceived threats to be treated as important while carrying a low vulnerability value. At the same time the real threats of terror attacks can be underestimated and provide room for conducting these activities to terrorists.

Conclusion:

The failures of information system and IT are not only observed in terms of their inability to perform actual operations. The systems developed to facilitate the required operations should be emphasized. It is possible for the government agencies to follow the traditional bureaucratic procedures followed throughout since inception. It is a dire requirement for the government and defense agencies to conduct detailed audits of their existing systems and resolve issues found present in the existing systems. The information systems architecture and systems developed to perform operations should be updated in accordance with the latest requirements. The performance of the national and global defense mechanisms should be reviewed according to actual events.

The databasesystems and information technology tools used to connect various government networks are not in line with the latest requirements. It is required to develop a comprehensive database for homeland security. The information systems capabilities can also be enhanced to perform in accordance with the latest requirements. The operating procedures should be clearly defined and cater the requirements of information sharing and threat perception. The intelligence and defense agencies should be governed in transparent and modern grounds. An appropriate system for governance and reliability should also be developed to cater needs of the modern terrorist threats. The interagency process should be clearly defined to cater and integrated effect for terrorism perception and counterterrorism requirements.

The methodology and criteria adopted to classify events of terrorism should be developed and shared throughout agencies. The agencies should adopt the developed methodology in order to integrate information and across agency sharing is possible. The definitions used to compile international terrorism statistics is required to be updated and shared across the globe. The sharing of information should also base on the newly developed methodology. The management auditing and designation of responsibility is also one of the major requirements for agencies.

References:

Alter, S. (2004). The 2003 Annual Report on Global Terrorism: An Information System Failure?. Communications of the Association for Information Systems (Volume 14, 2004), 76, 92.

Bjelopera, J.P. (2011). Terrorism Information Sharing and the Nationwide Suspicious Activity Report Initiative: Background and Issues for Congress. Congressional Research Services, (R40901).

Draheim, D. (2010). Business process technology.USA: Springer.

French, G.S., & Gootzit, D. (2011). Defining and assessing vulnerability of infrastructure to terrorist attack. Vulnerability, Uncertainty, and Risk: Analysis, Modelling, and Management-Proceedings of the ICVRAM, 782-789.

Haddow, G., Bullock, J., & Coppola, D.P. (2010). Introduction to emergency management.USA: Butterworth-Heinemann.

LaFree, G., & Dugan, L. (2011).Tracking global terrorism trends, 1970 -- 2004.InTo protect and to serve (pp. 43-80). Springer New York.

Lum, C., Haberfeld, M.M., Fachner, G., & Lieberman, C. (2011). Police activities to counter terrorism: What we know and what we need to know. In To protect and to serve (pp. 101-141).Springer New York.

Neuvel, J.M., Scholten, H.J., & van den Brink, A. (2012).From spatial data to synchronized actions: The network-centric organization of spatial decision support for risk and emergency management. Applied Spatial Analysis and Policy, 5(1), 51-72.

Piazza, J.A. (2010). Global Poverty, Inequality, and Transnational Terrorism: A Research Note. Perspectives… [END OF PREVIEW]

Ordering Options:

?
Which Option Should I Choose?

1.  Buy Full Paper (7 Pages)

Perfectly formatted MS Word document!

or

2.  Write a NEW paper for you!

Write a New Paper

Popular!

How Has Terrorism Effected the World Economy in Particular the United States Term Paper


Financing Al-Qaeda Identifying & Attempting to Slow Term Paper


Contemporary Maritime Issues in the Asia Pacific Region Essay


Hezbollah Financing Diamond Trade in West Africa Term Paper


Morally There Is No Difference Between Killing Essay


View 107 other related papers  >>

Cite This Case Study:

APA Format

2003 Annual Report Global Terrorism.  (2013, June 29).  Retrieved November 22, 2019, from https://www.essaytown.com/subjects/paper/2003-annual-report-global-terrorism/3533744

MLA Format

"2003 Annual Report Global Terrorism."  29 June 2013.  Web.  22 November 2019. <https://www.essaytown.com/subjects/paper/2003-annual-report-global-terrorism/3533744>.

Chicago Format

"2003 Annual Report Global Terrorism."  Essaytown.com.  June 29, 2013.  Accessed November 22, 2019.
https://www.essaytown.com/subjects/paper/2003-annual-report-global-terrorism/3533744.