ESSENTIALS OF Management Information Systems 12e KENNETH C. LAUDON AND JANE P. LAUDON continued Systems CHAPTER 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS CASE 3 Data Mining for Terrorists and Innocents SUMMARY This case describes how data mining software, combined with Big Data collection from the Internet, are used to identify potential terrorists. The PRISM program of the U.S. National Security Agency (NSA) is an on-going effort to enable such Internet surveillance. In some cases innocent people have been mistaken for terrorists, while sometimes a terrorist plot is disrupted. The existence of the PRISM program was a national security secret until its existence was revealed by Edward Snowden, a former NSA contractor. There are two videos in this case: (1) Data Mining for Terrorists and Innocents (L= 5:10) URL http://www.youtube.com/watch?v=4lKpD7MC22I (2) How Does the PRISM Program Work? (L=1:59) URL https://www.youtube.com/watch?v=JR6YyYdF8ho CASE Anti-terrorism agencies around the world have made effective use of new surveillance tech- nologies that offer unprecedented abilities to identify and apprehend potential terrorists. Today’s terrorists are by nature difficult to track, as disconnected groups of individuals can use the Internet to communicate their plans with lower chance of detection. Anti-terrorist technology has evolved to better handle this new type of threat. But there are drawbacks to these new strategies. Often, innocent people may find their privacy compromised or completely eliminated as a result of inaccurate information. Surveillance technologies are constantly improving. While this makes it more difficult for Chapter 4, Case 3 Data Mining for terrorists anD innoCents 2 continued terrorists and other criminals to exchange information, it also jeopardizes our privacy, on the Internet and elsewhere, going forward. For instance, it may be necessary to monitor the phone calls of all American citizens, and visiting foreigners, in order to uncover a terrorist plot. Is this reason for worry? Are comparisons to Orwell’s 1984 appropriate or overblown? The first video displays both the positive and negative results of new advances in tech- nology. The first segment describes a program called the Dark Web Project developed by a team at the University of Tucson that combs the Internet in search of militant leaders and their followers. The program creates profiles based on word length, punctuation, syntax, and content, and displays information about the personality type of an individual graphically. The plotting of information on a graph represents whether the user is violent or militant, inexperienced and seeking advice, or an opinion leader holding sway over many more people. Programs like this have been adopted by many intelligence agencies worldwide, who incorporate it into their arsenal of terrorist surveillance technologies. It’s unclear if this project i ...
ESSENTIALS OF Management Information Systems 12e KENNETH C. LAUDON AND JANE P. LAUDON continued Systems CHAPTER 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS CASE 3 Data Mining for Terrorists and Innocents SUMMARY This case describes how data mining software, combined with Big Data collection from the Internet, are used to identify potential terrorists. The PRISM program of the U.S. National Security Agency (NSA) is an on-going effort to enable such Internet surveillance. In some cases innocent people have been mistaken for terrorists, while sometimes a terrorist plot is disrupted. The existence of the PRISM program was a national security secret until its existence was revealed by Edward Snowden, a former NSA contractor. There are two videos in this case: (1) Data Mining for Terrorists and Innocents (L= 5:10) URL http://www.youtube.com/watch?v=4lKpD7MC22I (2) How Does the PRISM Program Work? (L=1:59) URL https://www.youtube.com/watch?v=JR6YyYdF8ho CASE Anti-terrorism agencies around the world have made effective use of new surveillance tech- nologies that offer unprecedented abilities to identify and apprehend potential terrorists. Today’s terrorists are by nature difficult to track, as disconnected groups of individuals can use the Internet to communicate their plans with lower chance of detection. Anti-terrorist technology has evolved to better handle this new type of threat. But there are drawbacks to these new strategies. Often, innocent people may find their privacy compromised or completely eliminated as a result of inaccurate information. Surveillance technologies are constantly improving. While this makes it more difficult for Chapter 4, Case 3 Data Mining for terrorists anD innoCents 2 continued terrorists and other criminals to exchange information, it also jeopardizes our privacy, on the Internet and elsewhere, going forward. For instance, it may be necessary to monitor the phone calls of all American citizens, and visiting foreigners, in order to uncover a terrorist plot. Is this reason for worry? Are comparisons to Orwell’s 1984 appropriate or overblown? The first video displays both the positive and negative results of new advances in tech- nology. The first segment describes a program called the Dark Web Project developed by a team at the University of Tucson that combs the Internet in search of militant leaders and their followers. The program creates profiles based on word length, punctuation, syntax, and content, and displays information about the personality type of an individual graphically. The plotting of information on a graph represents whether the user is violent or militant, inexperienced and seeking advice, or an opinion leader holding sway over many more people. Programs like this have been adopted by many intelligence agencies worldwide, who incorporate it into their arsenal of terrorist surveillance technologies. It’s unclear if this project i ...