Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.

Slides:



Advertisements
Similar presentations
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Chapter 2 Business Processes, Information, and Information Systems Chapter 2.
Advertisements

Data Modeling and the Entity-Relationship Model
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall COS 236 Day 25.
By: Mr Hashem Alaidaros MIS 211 Lecture 4 Title: Data Base Management System.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter 9 Competitive Advantage with Information Systems for Decision Making © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter Extension 19 Alternative Development Techniques © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
System Development Text Chapter 10. System Development The introductory slides from text Chapter 10 (showing the questions addressed) will be shown. Some.
Chapter Extension 14 Database Marketing © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter Extension 1 Information Systems for Collaboration © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Introduction to Database Processing
Chapter Extension 3 Knowledge Management and Expert Systems © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter Extension 17 Small-Scale Systems Development © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter 2 Business Processes, Information, and Information Systems © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall COS 346 Day 26.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Chapter Extension 21 Financing and Accounting for IT Projects © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 5-1 Strong Entity Patterns: 1:1 Strong Entity Relationships.
Database Processing for Business Intelligence Systems
Business Intelligence Systems
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 1-1 David M. Kroenke’s Database Processing: Fundamentals, Design, and.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter Extension 22 Managing Computer Security Risk © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter Extension 6 Using Microsoft Access © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
© 2011 Pearson Prentice Hall, Salkind. Nonexperimental Research: Qualitative Methods.
Chapter 2 Introduction to Database Development Database Processing David M. Kroenke © 2000 Prentice Hall.
© Pearson Prentice Hall 2009 Part 4-1 Using MIS 2e Part 4 The International Dimension: International IT Development & Management David Kroenke.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 2-1 David M. Kroenke’s Chapter One: Why DB? Database Processing: Fundamentals,
5.1 © 2007 by Prentice Hall 5 Chapter Foundations of Business Intelligence: Databases and Information Management.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 9 Competitive Advantage with Information Systems for Decision Making.
Chapter Extension 18 Large-Scale Systems Development © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
© 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang 5-1 Chapter 5 Business Intelligence: Data.
Data Mining Chapter 1 Introduction -- Basic Data Mining Tasks -- Related Concepts -- Data Mining Techniques.
Chapter 18 - The Fourth Amendment and National Security.
Business Intelligence Systems Appendix J DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 6 th Edition.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
Chapter 13 Designing Databases Systems Analysis and Design Kendall & Kendall Sixth Edition.
Chapter Extension 2 Information Systems and Decision Making © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter Extension 15 Reporting Systems and OLAP © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
The International Dimension, Part IV International IT Development and Management © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Foundations of Business Intelligence: Databases and Information Management.
Chapter Extension 13 Information Technology for Data Exchange: EDI and XML © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
+ Big Data. + Chapter Objectives Learn the basic concepts of Big Data, structured storage, and the MapReduce process Learn the basic concepts of data.
2- PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ CRIMINALISTICS An Introduction to Forensic Science, 9/E By Richard Saferstein.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 2 Business Processes, Information, and Information Systems.
Detecting terrorist activities Presentation on a specialist topic in Data Mining and Text Analytic.
Section 2: The Fourth Amendment: Your Right to Be Secure Chapter 13: Supreme Court Cases.
Chapter 3 Organizational Strategy, Information Systems, and Competitive Advantage.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
The International Dimension, Part II Global Communications © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 5-1 David M. Kroenke’s Chapter Five: Data Modeling with the Entity-Relationship.
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Appendix J: Business Intelligence Systems.
Chapter 12: Criminal Justice Process ~ The Investigation Objective: Student should be able to correlate how the constitution relates to an investigation.
© Pearson Prentice Hall 2009 Part 2-1 Using MIS 2e Part 2 The International Dimension: Global Communication David Kroenke.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Chapter 13 CIVIL LIBERTIES: Ordered Liberty in America
David M. Kroenke and David J
Database Processing: David M. Kroenke’s Chapter Five:
What is a Database and Why Use One?
Database Processing: David M. Kroenke’s Chapter One: Introduction
Database Processing: David M. Kroenke’s Chapter Nine: Part One
Chapter 18 - The Fourth Amendment and National Security
Introduction to Databases
Database Processing: David M. Kroenke’s Chapter Five:
CHAPTER 1: THE DATABASE ENVIRONMENT AND DEVELOPMENT PROCESS
Database Processing: David M. Kroenke’s Chapter Five:
Chapter 23 Government Regulation and Administrative Law
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Presentation transcript:

Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-2 Study Questions What is the goal of counterterrorism intelligence? How does synthesis produce information? What are the characteristics of counterterrorism intelligence decision making? Hoe do information systems facilitate intelligence collaboration? How do data connections synthesize? How is data-mining used for counterterrorism intelligence? What are the social and legal implications of counterterrorism intelligence?

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-3 What Is the Goal of Counterterrorism Intelligence? Goals: – Produce information Useful Obtainable – Used to prevent terrorist attacks How will it be used? Terrorism process Difficult to focus solely on operations stage Must focus on entire process

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-4 Stages in Counterterrorism Process Figure CE16-1

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-5 How Does Synthesis Produce Information? Information: – Data presented in meaningful way – Difference that makes a difference – Usually produced by analysis Broken down into constituent parts – May be produced by synthesis Construct larger entity out of constituent parts

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-6 Counterterrorism Intelligence Information Synthesis – Most counterterrorism information produced this way – Primary operation in construction of intelligence – Organize known facts into pattern to create information

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-7 Decision Processes Structured – Follows known path – Readily documented – “Which shipper should we use for this order?” Unstructured – Evolves as each step in process is taken – Process usually not known until after final decision made – “How do we fix the gas turbine?”

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-8 Decision Modes Analysis or synthesis that creates information – Analysis: Break problem into constituent parts Address each part separately – Synthesis Build pattern from parts Used to inform a decision

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-9 Counterterrorism Intelligence Unstructured – Depends on events and information Synthetic – Requires formation of patterns – Relationships often more important than data

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-10 How Do Information Systems Facilitate Intelligence Collaboration? Lack of collaboration harmful because intelligence built by synthesis – Unable to recognize patterns – Caused by political, historical, technological factors Need database to share information – Facilitates collaboration

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-11 Counterterrorism Database Problems Problems: – Intelligence process unstructured – Predefined relationships seldom adequate – Require more flexibility – Creating relationships unfeasible Use data connections instead

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-12 Data Connections Match of data values Do not need to be predefined May or may not be meaningful Requires techniques other than relational models – Connections usually not predefined Contiguous connection model (CCM) – Data model built for processing connections

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-13 Using Connections Figure CE16-8

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-14 How Is Data-Mining Used in Counterterrorism Intelligence? Data-mining techniques used: – Connection processing No mathematical processing Form of reporting – Text mining Documents are searched for keywords and patterns Analyst reads and extracts relevant data Stores data in intelligence database

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-15 Legal Implications of Counterterrorism Intelligence Uncertainty as to applicable laws – Fourth Amendment protection against unreasonable search and seizure Telephone record examination – Domain of criminal law and domain of national security – Intelligence agencies do not always know what event they are investigating Uncertain as to which rules apply – Violation of privacy

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-16 Active Review What is the goal of counterterrorism intelligence? How does synthesis produce information? What are the characteristics of counterterrorism intelligence decision making? Hoe do information systems facilitate intelligence collaboration? How do data connections synthesize? How is data mining used for counterterrorism intelligence? What are the social and legal implications of counterterrorism intelligence?