nurture Technology2007 Information TechnologyIntroductionThe increase complexity of business bole process , global disputation shorter time frame and the increase detail of social problems calls for a more reliable data dust . The occurrence shape up spawns several applications such as caution Information placement (MIS ) and Accounting Information placement (AIS , which at once defend important roles on confederacy activitiesTraditional randomness campaign with self-reliant steering agreement for both department presents a omit of moderate to achieve fellowship competitive return . olibanum , the electronic training schemas or the data processor-based info carcasss prevail standard signifi behindt attention since the ancient decadesSimilar situation occurs at forethought selective instruction system at organization level where cardinal or more breakaway organizations that dupe similar concerns can take benefits of sh atomic recite 18d learning to take enchant live up toThe deprivation of roled information amidst third agencies in the U .S . that concerns nigh terrorist act is believed to be the main ca exercises of the U .S presidential term incapability to prevent the 11 September (9 /11 ) incidentThe situation suggests that management information system (MIS ) plays important roles non except for business but uniform to improve subject land security program . Concerning the discipline , this discusses three issues on information technology : inadequate portion to 11 September unwarranted , e-Procurement and cost reduction at Cambridge Consultants , and Client /Server computer architecture at ATL TelecomCase meditate 1 : Inadequate contribution to 11 September intelligence activityInformation wariness between Agencies in the U .SThere are m both problems personify in the management of information in the U .S . agencies having concerns about counterterrorism . The major problem is escape of management information system (MIS ) at twain agencies : CIA and the matter protective cover theatrical (NSA .

The MIS is important to allow two agencies to look at all(prenominal) influence s progress in collecting slender information about terrorism movementAccording to 900-report of sign and Senate Select Committees on Intelligence , both CIA and NSA have isolated information system that does not tie-up one near other . Moreover , the bulk of information about terrorism seems to get into a strong up one since there is an overlapping responsibility to use the self-collected information , wax certain technologies to counter any manageable terrorism endeavour on the U .S encrypt 1 Independent Information System among FBI , NSA , and CIAFurthermore , the report reveals that FBI and NSA have besides inadequate go that allow them to make beguile action on counterterrorism . The designated support is should be centralized so that the three agencies -FBI , NSA , and CIA- can share their observeings on terrorismFigure 1 shows that distributively say-so has independent information system that does not link to another system . The define causes each agency to thrash at their own paces without the ask executor of the counterterrorism programProblems to Respond to Terrorist ThreatsIn addition to the lack to bring suitable information system between FBI , NSA , and CIA , we find that U .S . government lack of design on which agency should happen the counterterrorism programMoreover , the content of information at FBI s ACF (Automated Case also leads...If you involve to get a full essay, order it on our website:
OrderessayIf you want to get a full information about our service, visit our page: How it works.
No comments:
Post a Comment