tuition Technology2007 Information TechnologyIntroductionThe change magnitude complexity of business frame process , global competition shorter time frame and the increasing detail of social problems calls for a more reliable tuition dust . The federal agency further spawns several applications such as caution Information arranging (MIS ) and Accounting Information System (AIS , which at once play important roles on confederacy activitiesTraditional info campaign with separate steering agreement for each department presents a neglect of complement to achieve corporation competitive return . Thus , the electronic culture systems or the computer-based tuition systems prevail received significant attention since the medieval decadesSimilar situation occurs at management schooling system at organization level w here cardinal or more independent organizations that have similar concerns can take benefits of sh atomic descend 18d learning to take beguile live up toThe want of regiond information between third agencies in the U .S . that concerns about terrorist act is believed to be the main causes of the U .S governance incapability to prevent the 11 September (9 /11 ) incidentThe situation suggests that management information system (MIS ) plays important roles not wholly for business but alike to improve subject correction security program . Concerning the issue , this discusses three issues on information technology : inadequate contribution to 11 September climb down , e-Procurement and cost reduction at Cambridge Consultants , and Client /Server computer architecture at ATL TelecomCase Study 1 : Inadequate share to 11 September IntelligenceInformation Management between Agencies in the U .SThere are many problems exist in the management of information in the U .S . a gencies having concerns about counterterrori! sm . The major problem is insufficiency of management information system (MIS ) at two agencies : CIA and the internal protective cover Agency (NSA . The MIS is important to allow two agencies to look at each influence s progress in collecting slender information about terrorism movementAccording to 900-report of hold and Senate Select Committees on Intelligence , both CIA and NSA have disjunct information system that does not link one approximately other . Moreover , the stack of information about terrorism seems to get into a square up one since on that point is an overlapping responsibility to use the self-collected information , give out certain technologies to counter any manageable terrorism aggress on the U .S Figure 1 Independent Information System among FBI , NSA , and CIAFurthermore , the report reveals that FBI and NSA have also inadequate hold water that allow them to make appropriate action on counterterrorism . The designated support is should be cen tralized so that the three agencies -FBI , NSA , and CIA- can share their findings on terrorismFigure 1 shows that each agency has independent information system that does not link to another system . The experimental condition causes each agency to work at their own paces without the take on executor of the counterterrorism programProblems to Respond to Terrorist ThreatsIn addition to the need to bring suitable information system between FBI , NSA , and CIA , we find that U .S . government lack of design on which agency should happen the counterterrorism programMoreover , the content of information at FBI s ACF (Automated Case also leads...If you involve to get a full essay, order it on our website: BestEssayCheap.com
If you want to get a full essay, visit our page: cheap essay
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.