Information Systems and Security Research Paper by Quality Writers

Information Systems and Security
This paper critically examines the information systems of the United States with regards to the struggle against terrorism.
# 104017 | 2,977 words | 10 sources | APA | 2008 | US

$19.95 Buy and instantly download this paper now


The paper examines the Department of Homeland Security (DHS) and looks at how the United States' information systems fail to meet the tests of universality and of platform and operating systems compatibility. The paper then looks at how border security and the war against bioterrorism have been facilitated by cutting-edge technologies that are compromised by the same interoperability issues. The paper concludes that the failings of the DHS is proof that a more streamlined, centralized data-gathering and data-exchange process is needed.

Information Systems and Standards Universality, Oversight and Compatibility: the Case of the United States Government
Federal Information Systems and the Border
A brief Look at Federal information Systems and Bioterrorism
Future Vision

From the Paper:

"A Government Accountability Office Study conducted in June of 2005 found many problems with the information system in place at the Department of Homeland Security - problems that clearly reveal logistical and planning problems that must be overcome both in the public and in the private realms if the terrorist threat is to be appreciably reduced. To begin with, if the DHS is to be held up as an example, the United States government has done a desultory job of putting in place universal information security practices and controls. Things like a proper risk assessment, security plan, a regime of security tests and evaluations, remedial action plans, and a structure for the continuity of operations have (in one way or another) fallen short of expectations or have simply been absent (Government Accountability Office, 2005)."

Sample of Sources Used:

  • Florence, Justin. (2006). Making the no-fly list fly: a due process model for terrorist watch lists. Yale Law Journal, 115(8): 2148+. Retrieved May 2, 2007 from <>
  • Ford, Jess T. (2003, June 18). Border Security: New Policies and Procedures are needed to fill gaps in the Visa revocation process: GAO Reports (GAO-03-798). Washington, DC: Government Accountability Office.
  • Gingrich slams immigration plans; sympathizes with illegal aliens (2006, April 27). New York Times, A09. Retrieved May 2, 2007 from <
  • Government Accountability Office (United States). Homeland Security: Risks facing key border and transportation security program need to be addressed: GAO Reports (GAO-03-1083). Washington, DC: Government Accountability Office.
  • Government Accountability Office (United States). Information Security: Department of Homeland Security Needs to fully Implement its Security Program: GAO Reports (GAO-05-700). Washington, DC: Government Accountability Office.

Cite this Research Paper:

APA Format

Information Systems and Security (2008, June 01) Retrieved August 15, 2020, from

MLA Format

"Information Systems and Security" 01 June 2008. Web. 15 August. 2020. <>