IT enabled counter terrorism infrastructure: issues and challenges Online publication date: Wed, 09-May-2007
by Syed Ahsan
International Journal of Electronic Security and Digital Forensics (IJESDF), Vol. 1, No. 1, 2007
Abstract: In the post 11 September 2001, terrorism has been an immediate and most serious threat to the free world because of its real and potential damage to the infrastructure, economy and people. In response to the 11 September 2001 terrorist attacks, developed and developing countries, such as USA and Pakistan, have emerged as front line states in the fight against terrorism with the following objectives: (1) prevent future terrorist attacks, (2) reduce the nations vulnerability and (3) minimise the damage and recovery from attacks that occur. In order to achieve these objectives, we require new approaches to intelligence and information gathering and its analysis through the use of information technology. In this paper, we attempt to identify (1) the areas where IT can contribute in accomplishing these three strategic security objectives, (2) the unique IT problems and challenges in counter terrorism applications where such applications are being used and developed such as in USA and (3) lessons learned for developing countries such as Pakistan, so that an IT counter terrorism infrastructure can be established with minimum cost in terms of time and money.
Online publication date: Wed, 09-May-2007
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Electronic Security and Digital Forensics (IJESDF):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com