Free

Counterterrorism and Information Systems Your protection versus your rights - Research Paper Example

Comments (1) Cite this document
Summary
Counterterrorism and Information Systems: Your protection versus your rights Name University of Maryland University College In this era of technology, terrorists have managed to infiltrate governments and systems by implanting spies to do groundwork for them, plan then execute their terrorism act (John, 2003)…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
Counterterrorism and Information Systems Your protection versus your rights
Read TextPreview

Extract of sample "Counterterrorism and Information Systems Your protection versus your rights"

Counterterrorism and Information Systems: Your protection versus your rights of Maryland College In this era of technology, terrorists have managed to infiltrate governments and systems by implanting spies to do groundwork for them, plan then execute their terrorism act (John, 2003). After the 9/11 terrorist attack on American soil, U.S.A managed to instil stringent measures to ensure such events do not occur again. This gave rise to counterterrorism (John, 2003). In order for counterterrorism to be successful, it relies heavily on information collected on various events, people, organizations, and even documents. Counterterrorism aims at picking up and detecting terrorist’s plans before expecting them by gathering information about their where about, plans and try by all means to have them arrested and prosecuted (John, 2003). The war towards terrorism has never been a smooth path, hence a number of ethical issues had to be broken. A country is always torn by the dilemma of either protecting its citizens from terrorism by use of information technology to feed them with required data to help them fight terrorism and the constitutional rights of individuals to have their personal rights (John, 2003). It is evident that a sound decision in such a case is necessary as this is an ethical dilemma and one that can cause problems if messed around with. Vital information regarding people’s lives is usually interfered with in the process of counterterrorism (Policy, 2012). For instance, the government usually uses personal databases to extract information about certain people hence breaching their constitutional personal rights (Crenshaw, 2010). Faced with a tough decision on breaking its constitutional mandate to protect its citizens from terrorists and protecting their rights, somehow calls for a proper decision on whether counterterrorism use of information technology is ethical (Policy, 2012). There usually so many ways which the government can combat terrorism without interfering with the personal rights of their individuals. This can involve sending spies to terrorist zones, of which it has not been successful as they eventually get discovered and stringent punishment administered to them (Policy, 2012). Another alternative to the government combating terrorism will be through fighting together with other countries to ensure that the leaders and the culprits funding them are detained (Shlomo, 2009). In practical sense, these has been one impossible affair since most of the terrorist groups usually live in hiding and have spies all over when soldiers come to attack them (Lech, 2008). Another alternative that can be used to combat terrorism may be through rigorous checks and racial profiling of individuals from countries prone to harbour terrorist, like Muslim countries (Crenshaw, 2010). This cannot happen since it would cause worldwide rebellion and hatred of the U.S government resulting in more chaos and uncertainty in those regions. Some of U.S citizens in diaspora working in such countries might face humiliation, discrimination and even subjected to death when such a system is put in place (Lech, 2008). In looking at the alterative provided in trying to make a sound decision on the most preferable way to go about with combating terrorism of a given country, still the use of information systems comes first because of a number of reasons (Lech, 2008). Acquisition of information regarding terrorist by use of information systems is usually silent and not alarming, hence the departments in charge of terrorism are able to take their time and filter out information and narrow down to a few suspects based on their findings (Crenshaw, 2010). Terrorist usually affect the citizens of a given country by their acts, and it is usually the sole responsibility of the government to protect its citizens (Robert, 2006). Protecting millions of lives usually surpasses the rights of a single individual (Crenshaw, 2010). Terrorism is a worldwide menace, and if provided with the rightful condition, can cause immense havoc to the world (Robert, 2006). Hence the need to institute measures to monitor and detect any terrorism activity likely to occur before it happens. In addition, in using information technology in counterterrorism, it somehow eliminates the issue of racial profiling related to individuals that come from Muslim states and regions that harbour terrorist groups. Furthermore, it would be beneficial in using information technology in combating terrorism as it would save the government cost and time of sending spies to the war stricken zones (Crenshaw, 2010). Hence, in coming to a conclusion on the ethical choice of using information technology to combat terrorism, I believe it is an ethical decision and which should be supported as it is for the good of it citizens when as it its advantages surpass its disadvantages (Crenshaw, 2010). Hence in applying the utilitarian approach in ethical decision making, I believe this decision is paramount and beneficial to its citizens in as much as it entails breaking their constitutional mandate of protecting their citizen’s personal rights (Crenshaw, 2010). References Crenshaw. (2010). The consequences of counterterrorism. New York: Russell Sage Foundation. John L. Hennessy, D. A. (2003). Information Technology for Counterterrorism: Immediate Actions and Future Possibilities. New York: National Academies Press. Lech J. Janczewski, A. M. (2008). Cyber warfare and cyber terrorism. New York: Idea Group Inc. Policy, E.-b. C. (2012). Evidence-based Counterterrorism Policy. New York: Springer. Robert L. Popp, J. Y. (2006). Emergent Information Technologies and Enabling Policies for Counter-Terrorism. New York: John Wiley & Sons. Shlomo Argamon, N. H. (2009). Computational methods for counterterrorism. New York: Springer. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Counterterrorism and Information Systems Your protection versus your Research Paper”, n.d.)
Counterterrorism and Information Systems Your protection versus your Research Paper. Retrieved from https://studentshare.org/information-technology/1472226-counterterrorism-and-information-systems-your
(Counterterrorism and Information Systems Your Protection Versus Your Research Paper)
Counterterrorism and Information Systems Your Protection Versus Your Research Paper. https://studentshare.org/information-technology/1472226-counterterrorism-and-information-systems-your.
“Counterterrorism and Information Systems Your Protection Versus Your Research Paper”, n.d. https://studentshare.org/information-technology/1472226-counterterrorism-and-information-systems-your.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
ed
edickinson added comment 3 months ago
Student rated this paper as
The topic of "Counterterrorism and Information Systems Your protection versus your rights" was hard to find. I spent ages to find it. Here at StudentShare, I got the best example. Many thanks!

CHECK THESE SAMPLES OF Counterterrorism and Information Systems Your protection versus your rights

College Rights versus Gun Rights

...?College rights versus gun rights: This paper is primarily based on defending gun rights in the campuses and presenting valid reasons for this defense. Although states have greatly differing gun laws, yet banning guns at campuses remains a widespread national policy (Jaschik, 2006). While student associations favoring gun rights argue that gun ban on campus may aggravate the incidence of felonies since innocent student will be left vulnerable and unprotected, proponents argue that reduced level of criminal activities like mass shootings seen in some campuses is directly the result of banning arms. In my opinion, colleges should not be able to ban arms...
3 Pages(750 words)Essay

Consumer Rights and Protection

...? Summary According to the article, the web giants and leading email providers Google, Microsoft, Yahoo and AOLhave all expressed agreement towards the US Consumer Privacy Bill of Rights that the Obama administration announced on Thursday. The aim of the bill is to boost “consumer trust” by having the web email providers “wipe the database” and “strengthen protection” concerning emails and exchange of information among web users and companies. Aside from web providers, the bill also applies to social networks, mobile gadget companies and even computer game companies that randomly solicit data from visitors and subscribers. Moreover, the US Federal Trade Commission helps in the passage of...
5 Pages(1250 words)Essay

Childrens Rights Protection

...from various sites depicting U.K and U.S.A educational environment. The paper is a realistic approach conducted in order to determine the various critical measures adopted by schools, which goes in their own benefit. SENDA (2001) Act is discussed in the light of its extension, 'Every Child Matters' policy. Discrimination on the basis of 'disabled children' is not limited to secondary schools alone, even primary schools suffer at the hands of such discrimination. Example is given at a nursery level. In the end there is a need to determine and change not only our policies but also our way of thinking. Objective "To produce a report that critically evaluates one aspect of legislation and policy relating to protecting...
8 Pages(2000 words)Essay

Counterterrorism

...making regarding the actions required to ensure the nation's security. This will help the government determine the best economic or military move, or create more appropriate security policies. Human rights Human rights are the basic rights and freedoms to which all humans are considered entitled: the right to life, liberty, freedom of thought and expression, and equal treatment before the law, among others. Many conflicts are sparked by a failure to protect human rights, and the trauma that results from severe human rights violations often leads to new human rights...
5 Pages(1250 words)Essay

European Human Rights Protection

...Introduction Derogation is abolition of law so as to fulfill a particular purpose or to meet a certain objective. In the case of derogation the rule is usually abolished partially. The security of the nation or state is a vital element at times it takes priority over some human right. Some security measures taken by some European Countries have also limited some human freedom. Human right treaties have also recognized the fact that matters of National interest have to be given priority over some human rights. Some restriction may also be put in place to protect their rights of other individuals from violation. Limitation justification relies on several...
5 Pages(1250 words)Essay

International Human Rights Protection

...programmes for even perpetrators of domestic violence need to be put in place adequately. This aspect in most cases is not just a criminal problem but a social reform challenge too. If viewed from right perspective, this reform is applicable to the whole society and not just a single individual. However, since it is important to bring the perpetrator back to society after committing gender violence, a detailed rehabilitation program would be more applicable in many cases than simple punitive action. Effective legal sanctions including penal ones, civil antidote and compensatory requirements need to be formulated and implemented to protect women against all kinds of violence, sexual abuse and sexual...
11 Pages(2750 words)Essay

Counterterrorism

...that could help in times threats from the terrorist. By suspending laws in time of national emergency, security personal could freely investigate and capture suspected criminals or terrorist and turned them for questioning (Weaver, 2006). It was criticize for having a different meaning other than aiding the security force during emergency. It was similar for declaring Martial Law for it suspends some human rights. The American government, although before they implement this law, have foreseen the necessary acts that should be taken once terrorist are known trying to launch an attack. Homeland security, a new federal agency was created during these times. Although it was a common knowledge that community...
9 Pages(2250 words)Essay

Counterterrorism and Information Systems Your protection versus your rights

...Counterterrorism and Information Systems: Your protection versus your rights In this era of technology, terrorists have managed to infiltrate governments and systems by implanting spies to do groundwork for them, plan then execute their terrorism act. After the 9/11 terrorist attack on American soil, U.S.A managed to instil stringent measures to ensure such events do not occur again. This gave rise to counterterrorism. In order for counterterrorism to be successful, it relies heavily on information collected on various events, people,...
3 Pages(750 words)Research Paper

How Secure is Your Data, Information and Information Systems Technology

...There are both similarities and differences in the security issues that you raised when compared to mine. This is because we both touched on password issues but I did not touch on the issue of virus. Reading about your post carefully, I find that it is important for your organization to take the issue of virus very serious as it can easily bring down the entire information system of the company (Chen, Ramamurthy and Wen, 2012). This is because of the differences in threat and harm that viruses pose. As a way of mitigating the risk of virus and their threat, I believe your organization must be very emphatic on the use of cloud backup...
1 Pages(250 words)Assignment

Your Rights in the Workplace

..., and workplace testing in an ideal manner. Based on the prevalence of these issues in modern-day organizations, Repa has devoted her work to guide individual employees and other stakeholders in diverse organizations on the diverse ways in which they can utilize the law to safeguard their interests and secure ideal working environments (Repa, 2010). Reflection In Repa’s work, Your Rights in the Workplace,” I believe she has made significant devotion towards creating awareness about the diverse laws that protect employees in the workplace. For most people in workplaces, they may be curious, cautious, or interested in understanding things that can permit them operate efficiently...
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Counterterrorism and Information Systems Your protection versus your rights for FREE!

Contact Us