Federal Government Homeland Security Information Systems

Author(s):  
Christopher G. Reddick

This chapter focuses on Homeland Security Information Systems (HSIS) in the federal government. One definition of HSIS, in the federal government, is the application of information technology to homeland security with the aim of detecting fragmented clues, assembling them as a puzzle, then using the information to stop a terrorist attack (Nunn, 2005). Nunn’s definition focuses on the use of information for data mining for deducing possible terrorist attacks and responses to these incidents. This chapter recognizes the importance of data analysis, but uses a broader definition of federal HSIS being the use of information systems to prepare for and respond to a terrorist attack or significant national emergency. This definition of HSIS covers the importance of data mining to discover how information fits together as pieces of the puzzle, but it also incorporates other elements of information technology (IT) that are used to respond and prepare for a national incident. This chapter will first examine the Department of Homeland Security which has a tremendous influence over homeland security policy and information systems in the United States. There is an examination in this chapter of the environmental context of HSIS in the federal government, demonstrating some of the important pieces of legislation that have an influence in this area. This chapter discusses the roles and responsibilities of federal government Chief Information Officers (CIOs) to discern the scope of their responsibilities. A section of this chapter examines some principles of effective IT management in federal agencies. The final part of this chapter provides the results of a survey of CIOs in federal government departments/agencies to determine the influence of HSIS on their organizations.

Author(s):  
Christopher G. Reddick

This chapter examines homeland security information systems (HSIS) with a focus on local governments. Local governments are typically the first at the scene when responding to an emergency or a terrorist attack. The most notable incidents are Hurricane Katrina and the terrorist attacks of September 11, 2001. In both of these incidents the first responders were the local governments, which faced dual issues of communication and information sharing. It is important to understand the current level of preparedness and use of HSIS in local governments. This chapter tries to discern the relative priority of HSIS compared to other priorities of local governments in the realm of homeland security. This chapter first outlines some background information on local governments with respect to their organizational structure and level of homeland security preparedness. The second section outlines the stages of e-government adoption, which is commonly discussed in the local e-government literature. Third, there is a discussion of homeland security information sharing between the federal, state, and local governments. There is some evidence presented from existing surveys of the impact of HSIS on local governments. Finally, there is survey results presented from a study conducted by the International City/ County Management Association (ICMA) on homeland security preparedness. This survey information is used to determine where HSIS fits into local priorities on homeland security.


Author(s):  
Christopher G. Reddick

This chapter examines the role that citizens play when using the internet for gathering information. It is vital to understand the use of the Internet by citizens to address the issue of access to homeland security information. This chapter also provides information on how terrorism information is presented online and citizens’ use of this information is discussed. Jones, Hackney, and Irani (2007) believe that the key to the successful development of e-government is its citizens. There needs to be efforts to engage citizens in the adoption of e-government. These authors believe that this engagement will truly create a transformation of e-government that was envisioned by earlier writers in the field. This chapter discusses this level of engagement and shows that citizens are the least likely to use Internet for homeland security information if a terrorist attack occurs. Existing research on the adoption of e-government tends to focus on the supply of e-government in terms of the breadth and sophistication of government Websites. However, Streib and Navarro (2006) have examined the role the internet plays in public organizations using public opinion data, examining the demand for e-government. There is a need for more research on the demand for e-government and that is the focus of this chapter. The argument made in this chapter is that you need to understand citizens, and why they go online, to more effectively cater homeland security information to their needs. This chapter first discusses the important issue of the digital divide, the disparity between those that have Internet access and those that do not. This is followed by a discussion of citizen trust and satisfaction with e-government Websites. Followed this, there is a discussion of the citizen-initiated contacts literature as a framework that helps us understand why citizens contact government for information and services.


2020 ◽  
Vol 50 (3) ◽  
pp. 398-422
Author(s):  
Magdalena Krajewska

Abstract This article examines implementation of the REAL ID Act of 2005, a post-9/11 measure intended to make driver’s licenses more secure. I take the opportunity, fifteen years after the Act’s passage and approaching a key October 2020 deadline, to analyze and explain how federal officials overcame obstacles to REAL ID implementation, especially resistance from elected state officials. I conclude that the role of administrative officials within the Department of Homeland Security and their ability to work with administrative officials in state Department of Motor Vehicle offices was critical to overcoming state resistance and leading states to come into alignment with REAL ID requirements. A key lesson is that overcoming state–federal conflict in policy implementation is possible when administrative officials at the state and federal level are key actors and can collaborate and perceive common interests. This analysis demonstrates the importance of direct interaction between federal and state administrative officials in program implementation.


Author(s):  
Samvel Kochoi ◽  
Ameen Hasan

After several years of fighting the international terrorist organization «Islamic State», the anti-terrorist coalitions headed by the Russian Federation and the USA managed to tip the scale in their favor in 2017. There is extensive research on how different countries counteract this most well-known of all modern international terrorist organizations. However, as Western criminologists note (Alex Braithwaite, Shane D. Johnson), there are very few empirical works that study the causes of decline and growth of terrorist activities as well as the emergence and disappearance of hot spots in Iraq itself during the American military campaign. On the whole, the overview of publications has revealed (Gary LaFree, Joshua D. Freilich) that out of over than 20 thousand articles on terrorism published between 1971 and 2004, only seven were devoted to empirical (criminological) research, while others dealt with the psychology of terrorism. The situation started to change in recent years and a large number of empirical (criminological and criminal law) studies of terrorism has been published, which is connected with the growing financial support of such research by national research foundations and state departments (for example, the Department of Homeland Security and the Department of Defense in the USA). Thus, about 100 books devoted to such studies have been annually published in the USA in the last decade. As for Russian criminal law policy, this article is one of the few devoted to countering terrorism in the motherland of «Islamic State» – in Iraq. The authors analyze Iraqi anti-terrorism legislation, in particular, Law № 13 of 2005, draw attention to an excessively wide definition of terrorism that it contains, conclude that its clause of analogy is incompatible with the principle of legality and argue that this normative act is one of the most drastic anti-terrorism laws in the world. The authors believe that an important direction in fighting terrorism is the decision of Iraqi authorities to establish a special tribunal for terrorist crimes, such as genocide against the Yazidis, and criminal prosecution of perpetrators who are outside Iraq, including those in Russian territory. They prove that the terrorist crimes against «infidels», qualified by many specialists and international organizations as crimes against peace and humanity, should mainly be the subject of proceedings in an independent court body of the international community.


2011 ◽  
Vol 204-210 ◽  
pp. 1781-1784
Author(s):  
Bin Chen

Rough sets, a tool for data mining, deal with the vagueness and granularity in information systems. This paper studies covering-based rough sets from the topological view. We explore the relationship between the relative closure and the second type of covering upper approximation. The major contributions of this paper are that we use the definition of the relative closure and the relative interior to discuss the conditions under which the relative operators satisfy certain classical properties. The theorems we get generalize some of the results in Zhu’s paper.


Author(s):  
Roy Ladner

In this chapter we provide an overview of electronic government as it pertains to national security and defense within the Department of Defense (DoD) and Department of Homeland Security (DHS). We discuss the adoption of web services and service oriented architectures to aid in information sharing and reduction of Information Technology (IT) costs. We also discuss the networks on which services and resources are being deployed and explain the efforts being made to manage the infrastructure of available services. This chapter provides an overview of e-government for national security and defense and provides insight to current initiatives and future directions.


Author(s):  
Ram L. Kumar

Organizations are increasingly recognizing the importance of information technology. Many large IT projects in the area of data warehousing and data mining have been taken up in the last few years. While many data warehousing and data mining projects have resulted in interesting business benefits, there are also many examples of cost and schedule overruns and dissatisfaction regarding the results from these projects. A recent issue of Information Week (May 24, 1999) reported that organizations are carefully scrutinizing the returns from large data warehousing projects. This makes it increasingly important for information systems professionals to understand the payoff from data warehousing investments. It is also extremely important for information systems professionals to articulate the business benefits of data warehousing and other big ticket information technology projects in terms that senior managers in general and finance executives in particular can relate to. This article outlines an approach to justifying data warehousing investments that is based on the concept of options in finance. This approach to justifying investments is being increasingly recognized as being superior to traditional methods by finance professionals (Business Week, June 7, 1999).


2020 ◽  
Vol 26 (1) ◽  
pp. 34-46
Author(s):  
Joseph W. Kane ◽  
Adie Tomer

The United States requires an enormous class of workers to keep essential services online. The Department of Homeland Security uses a sweeping definition of such essential industries from grocery stores to hospitals to warehouses, which collectively employed 90 million workers prior to the COVID-19 outbreak. A portion of these essential workers—or “frontline” workers—must physically show up to their jobs and have been especially vulnerable to additional health and economic risks, including many employed in infrastructure-related activities. This analysis—based on Brookings Institution posts written in March and June 2020—defines the country’s essential workforce and explores their economic and demographic characteristics in greater depth, revealing a need for continued protections and investments as part of the COVID-19 recovery.


Sign in / Sign up

Export Citation Format

Share Document