Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.

Similar presentations


Presentation on theme: "Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke."— Presentation transcript:

1 Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

2 CE16-2 Study Questions What is the goal of counterterrorism intelligence? How does synthesis produce information? What are the characteristics of counterterrorism intelligence decision making? Hoe do information systems facilitate intelligence collaboration? How do data connections synthesize? How is data-mining used for counterterrorism intelligence? What are the social and legal implications of counterterrorism intelligence?

3 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-3 What Is the Goal of Counterterrorism Intelligence? Goals: – Produce information Useful Obtainable – Used to prevent terrorist attacks How will it be used? Terrorism process Difficult to focus solely on operations stage Must focus on entire process

4 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-4 Stages in Counterterrorism Process Figure CE16-1

5 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-5 How Does Synthesis Produce Information? Information: – Data presented in meaningful way – Difference that makes a difference – Usually produced by analysis Broken down into constituent parts – May be produced by synthesis Construct larger entity out of constituent parts

6 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-6 Counterterrorism Intelligence Information Synthesis – Most counterterrorism information produced this way – Primary operation in construction of intelligence – Organize known facts into pattern to create information

7 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-7 Decision Processes Structured – Follows known path – Readily documented – “Which shipper should we use for this order?” Unstructured – Evolves as each step in process is taken – Process usually not known until after final decision made – “How do we fix the gas turbine?”

8 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-8 Decision Modes Analysis or synthesis that creates information – Analysis: Break problem into constituent parts Address each part separately – Synthesis Build pattern from parts Used to inform a decision

9 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-9 Counterterrorism Intelligence Unstructured – Depends on events and information Synthetic – Requires formation of patterns – Relationships often more important than data

10 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-10 How Do Information Systems Facilitate Intelligence Collaboration? Lack of collaboration harmful because intelligence built by synthesis – Unable to recognize patterns – Caused by political, historical, technological factors Need database to share information – Facilitates collaboration

11 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-11 Counterterrorism Database Problems Problems: – Intelligence process unstructured – Predefined relationships seldom adequate – Require more flexibility – Creating relationships unfeasible Use data connections instead

12 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-12 Data Connections Match of data values Do not need to be predefined May or may not be meaningful Requires techniques other than relational models – Connections usually not predefined Contiguous connection model (CCM) – Data model built for processing connections

13 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-13 Using Connections Figure CE16-8

14 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-14 How Is Data-Mining Used in Counterterrorism Intelligence? Data-mining techniques used: – Connection processing No mathematical processing Form of reporting – Text mining Documents are searched for keywords and patterns Analyst reads and extracts relevant data Stores data in intelligence database

15 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-15 Legal Implications of Counterterrorism Intelligence Uncertainty as to applicable laws – Fourth Amendment protection against unreasonable search and seizure Telephone record examination – Domain of criminal law and domain of national security – Intelligence agencies do not always know what event they are investigating Uncertain as to which rules apply – Violation of privacy

16 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke CE16-16 Active Review What is the goal of counterterrorism intelligence? How does synthesis produce information? What are the characteristics of counterterrorism intelligence decision making? Hoe do information systems facilitate intelligence collaboration? How do data connections synthesize? How is data mining used for counterterrorism intelligence? What are the social and legal implications of counterterrorism intelligence?


Download ppt "Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke."

Similar presentations


Ads by Google