Prepared by Question 1: Saumya Medushani Pepera Question 2+3: Nguyen Ngoc Tien Question 4: Novina Magai Question 5: Yang Xiaolin Table of Contents
Executive Summary 3 Introduction 4 Q1. Why was the consolidated terror watch list created? What are the benefits of the list? 5 Q2. Describe weaknesses of the watch list. What management, organisations and technology factors are responsible for these weaknesses? What communication barriers exist between the organisations involved in the construction of the watch list? 7 Q3. How effective is the system of watch list described in this case study? 10 Q4. What steps could be taken to correct some of the weaknesses? 12 Q5. How could more effective communication betweeen the organisations assist with the accuracy of the watch lists? What technologies could be used to improve this communication? 14 Conclusion 15 Recommendations 16 References 17 Appendices 18
Executive Summary
.
Introduction
.
1. Why was the consolidated terror watch list created? What are the benefits of the list?
The terrorist watch list is a data base including suspected terrorist that trying to obtain visas, enter the country, board aircraft, or engage in other activities. The FBI’s Terrorist Screening Center (TSC) was established after the September 11 attacks in 2001, to organize and standardize information about suspected terrorists between multiple government agencies into a single list to enhance communications between agencies . The watch list created to collect and maintain terrorist information and nominate individual for inclusion in the Terrorist Screening Centre, TSC consolidated watch list. The watch list currently includes about 420,000 names, 8,000 of Americans, 16,000 of people not allowed to fly including 500 of Americans. The terrorist screen centre demonstrate, It is apparent once someone on
References: • UniSA Lecture Notes 2012, ‘The terror watch list database troubles continue’, SAIBTCISB Lecture Series 2010, South Australia. • Robbins, S, DeCenzo, D, Coulter, M, & Woods, M 2012, Management: The Essentials, Pearson. Sydney. • Waddell, D. Devine, J, Jones, G. and George, J. 2007, Contemporary Management, Boston, McGraw Hill. Button A, 2012, ‘How to Improve Information Communication Technology’, eHow, viewed 29 August 2012, < http://www.ehow.com/how_7701800_improve-information-communication-technology.html>. Fenell Z, 2012, ‘How Has Technology Made Communication Better?’, eHow, viewed 29 August 2012, < http://www.ehow.com/facts_6175341_technology-made-communication-better_.html>. • Salaverría, R 2005, ‘An Immature Medium. Strengths and Weaknesses of Online Newspapers on September 11’, Gazette: The international journal for communication studies, vol 67. • Homeland Security, 2011, ‘Risk management fundamental’, Homeland Security Risk Management Doctrine. | | Appendices .