1. Please read the case study that starts on the next page. 2. Answer all 5 questions below.
1. What Information Systems concepts are illustrated in this case? 2. Why was the consolidated terror watch list created? What are the communication benefits of the list? (Comm) 3. Describe some of the weaknesses of the watch list. What management, organization, and technology factors are responsible for these weaknesses? 4. What steps would you take to correct some of the weaknesses identified in question 3? 5. Do you believe that the watch list represents a significant threat to individual’s privacy or Constitutional rights? Why or why not? Discuss the importance of business communication ethics in this case.
Chapter 6 Foundations of Business Intelligence: Databases and ..
"",¢~";,,,:",~,,:,::q7''''''
!69
," ,"
~'"
"'
~'~
~
'Y')"'~
~
'"
,
.'
Trouble with the TerJ'orist Watch l.ist Databa"Sc:! t~~A;"jA""t""'1IHt""'" .
"
'w~ ~
,
'
•
. •.
.
~1
:, , _
~"'" "'" ,1
eASE STUDY
,',
d':
''', '"
"
,~
'~
,.
n the aftermath ofthe 9-11 attacks, both critics and defenders of the information systems employed by the U.S. intelligence community united to help analyze where things went wrong and how to prevent future terrorist incidents. The FBI's Thrrorist Screening Center, or TSC, was established to organize and standardize information about suspected terrorists between multiple government agencies into a single list to enhance communication between agencies. A database of suspected terrorists known as the terrorist watch list was born from these efforts in 2003 in response to criticisms that multiple agencies were maintaining separate lists and that these agencies lacked a consistent process to share relevant information concerning the individuals on each agency's list. Records in the TSC database contain sensitive but unclassified