Sources:
Scott Shane, “Lapses Allowed Suspect to Board Plane,”
The New York Times
, May 4, 2010; Mike McIntire, “Ensnared by
Error on Growing U.S. Watch List,”
The New York Times
, April 6,
2010; Eric Lipton, Eric Schmitt, and Mark Mazzetti, “Review of Jet
Bomb Plot Shows More Missed Clues,”
The New York Times
,
January 18, 2010; Lizette Alvarez, “Meet Mikey, 8: U.S. Has Him
on Watch List,”
The New York Times
, January 14, 2010; Eric
Lichtblau, “Justice Dept. Finds Flaws in F.B.I. Terror List,”
The New
York Times
, May 7, 2009; Bob Egelko, “Watch-list Name Confusion
Causes Hardship,”
San Francisco Chronicle
, March 20, 2008;
“Reports Cite Lack of Uniform Policy for Terrorist Watch List,”
The
Washington Post
, March 18, 2008; Siobhan Gorman, “NSA’s
Domestic Spying Grows as Agency Sweeps Up Data,”
The Wall
Street Journal
, March 10, 2008; Ellen Nakashima, and Scott
McCartney, “When Your Name is Mud at the Airport,”
The Wall
Street Journal
, January 29, 2008.
242
Part Two
Information Technology Infrastructure
CASE STUDY QUESTIONS
1. What concepts in this chapter are illustrated in
this case?
2. Why was the consolidated terror watch list
created? What are the benefits of the list?
3. Describe some of the weaknesses of the watch
list. What management, organization, and
technology factors are responsible for these
weaknesses?
4. How effective is the system of watch lists
described in this case study? Explain your answer.
5. If you were responsible for the management of
the TSC watch list database, what steps would you
take to correct some of these weaknesses?
6. Do you believe that the terror watch list
represents a significant threat to individuals’
privacy or Constitutional rights? Why or why not?
This page intentionally left blank
LEARNING OBJECTIVES
S
After reading this chapter, you
will be able to answer the
following questions:
1.
What are the principal components
of telecommunications networks and
key networking technologies?
2.
What are the main telecommunica-
tions transmission media and types
of networks?
3.
How do the Internet and Internet
technology work and how do they
support communication and
e-business?
4.
What are the principal technologies
and standards for wireless network-
ing, communication, and Internet
access?
5.
Why are radio frequency identifica-
tion (RFID) and wireless sensor
networks valuable for business?
CHAPTER OUTLINE
7.1
TELECOMMUNICATIONS AND NETWORKING
IN TODAY’S BUSINESS WORLD
Networking and Communication Trends
What Is a Computer Network?
Key Digital Networking Technologies
7.2
COMMUNICATIONS NETWORKS
Signals: Digital vs. Analog
Types of Networks
Physical Transmission Media
Do'stlaringiz bilan baham: |