SlideShare a Scribd company logo
LOGO 
IMPORTANCE AND SIGNIFICANCE OF 
INFORMATION SHARING IN TERRORISM 
FIELD 
BY 
Dr.ABDUL SAMAD SHIBGHATULLAH 
THAMER J. ABBAS
Contents 
Introduction 
Research Problem 
The importance of this Paper 
Search Methodology 
Finding and Discussion
Introduction 
 Terrorism is the premeditated use or threat to use 
violence by individuals or subnational groups in 
order to obtain a political or social objective 
through the intimidation of a large audience 
beyond that of the immediate victims. Terrorists 
try to circumvent the democratic process by 
extorting concessions through the pressures that 
targeted citizenry may bring on its government to 
end the violence.
Company Logo 
Introduction 
Domestic terrorism 
is homegrown with 
consequences for 
only the host country, 
its institutions, 
citizens, property, and 
policies. 
Terrorism subdivided 
into two type 
transnational terrorism 
It is concerns more 
than a single country. 
If the terrorists cross a 
border to perpetrate 
their acts, then the 
attacks are 
transnational.
Introduction 
 terrorism is multi-dimensional problem it does not 
belong to homeland security or a particular area and It 
is concern to destroy countries infrastructures. 
 Terrorism was given importance by the people 
especially after 11th September, 2001 attack in the 
United States. 
 Looking at the increasing and rampant attacks that 
happened in certain countries, one can say that one of 
the reasons that contributed to the failure in curbing 
this issue was that the inability of the government 
agencies to produce a better and proactive system. 
Company Logo
Problem 
Company Logo
Company Logo 
Problem 
Weak 
Information 
Sharing 
Text 
Text 
Text 
Text 
Text 
Text
Company Logo 
Problem 
Business 
Alignment 
IT 
Tools 
Information 
Share 
Knowledge 
Management
Company Logo 
The importance of this Paper 
shows some of the 
experiences in countries 
summarize works 
for this emerging field 
Survey (ICT) related to 
re-structuring of intelligence 
and counterterrorism 
gives view for EIS to 
help in developing tools 
used in intelligence and 
counter terrorism
Company Logo 
Search Methodology
Company Logo 
Finding and Discussion 
 the e-information sharing one of good tools that give good cooperation and 
coordination between intelligence communities and counterterrorism; The 
effective implementation of the decision making plans depends upon the degree 
to which government and private sector partners engage in systematic, effective, 
multidirectional information sharing and analysis. 
 The actors taking part in a coordination agency in anti-terror could be: electronic 
infrastructure owners and operators, government agencies and officials with 
responsibilities on decision making, military and civil intelligence bodies, expert 
advisory groups and local and regional authorities. 
 Inventorying and classifying assets would be a first step toward the promotion of 
a culture of information sharing into a risk-management framework. 
 Real-time collaboration on risks alerts; information gathering, infrastructure 
status, emergency responses, membership conditions and expertise should also 
be established.
LOGO

More Related Content

What's hot

Threat Indicators and Cyber Intelligence Sharing in Financial Sector
Threat Indicators and Cyber Intelligence Sharing in Financial SectorThreat Indicators and Cyber Intelligence Sharing in Financial Sector
Threat Indicators and Cyber Intelligence Sharing in Financial Sector
Blaz Ivanc
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
Commonwealth Telecommunications Organisation
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
jwilso
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck Brooks
 
Strategic informer spring 2012
Strategic informer spring 2012Strategic informer spring 2012
Strategic informer spring 2012
IBCworld
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks
 
ABI White Paper
ABI White PaperABI White Paper
ABI White Paper
Randy Weaver
 
6026 Cybersecurity China
6026 Cybersecurity China6026 Cybersecurity China
6026 Cybersecurity China
Anastasia Stitch
 
National Incident Management System (NIM) Command and Management System
National Incident Management System (NIM) Command and Management SystemNational Incident Management System (NIM) Command and Management System
National Incident Management System (NIM) Command and Management System
Terry Dorn, PhD candidate
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
Andrea Rossetti
 
Should the government monitor their people's activities online?
Should the government monitor their people's activities online?Should the government monitor their people's activities online?
Should the government monitor their people's activities online?
DannyTio
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
Sarah Granger
 
hackivism
hackivismhackivism
hackivism
Hamza Cheema
 
Multi-Organizational Confluence Sample
Multi-Organizational Confluence SampleMulti-Organizational Confluence Sample
Multi-Organizational Confluence Sample
G R
 
Journal+Feature-InsiderThreat
Journal+Feature-InsiderThreatJournal+Feature-InsiderThreat
Journal+Feature-InsiderThreat
Anthony Buenger
 
Highlights - 2018 Global Anti-Corruption & Integrity Forum
Highlights - 2018 Global Anti-Corruption & Integrity ForumHighlights - 2018 Global Anti-Corruption & Integrity Forum
Highlights - 2018 Global Anti-Corruption & Integrity Forum
OECD Governance
 
Kfdwb development aid support mechanism 1
Kfdwb development aid support mechanism 1Kfdwb development aid support mechanism 1
Kfdwb development aid support mechanism 1
Amouzou Bedi
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
Doing What I Do
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
msdee3362
 

What's hot (19)

Threat Indicators and Cyber Intelligence Sharing in Financial Sector
Threat Indicators and Cyber Intelligence Sharing in Financial SectorThreat Indicators and Cyber Intelligence Sharing in Financial Sector
Threat Indicators and Cyber Intelligence Sharing in Financial Sector
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
 
Strategic informer spring 2012
Strategic informer spring 2012Strategic informer spring 2012
Strategic informer spring 2012
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
 
ABI White Paper
ABI White PaperABI White Paper
ABI White Paper
 
6026 Cybersecurity China
6026 Cybersecurity China6026 Cybersecurity China
6026 Cybersecurity China
 
National Incident Management System (NIM) Command and Management System
National Incident Management System (NIM) Command and Management SystemNational Incident Management System (NIM) Command and Management System
National Incident Management System (NIM) Command and Management System
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Should the government monitor their people's activities online?
Should the government monitor their people's activities online?Should the government monitor their people's activities online?
Should the government monitor their people's activities online?
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
 
hackivism
hackivismhackivism
hackivism
 
Multi-Organizational Confluence Sample
Multi-Organizational Confluence SampleMulti-Organizational Confluence Sample
Multi-Organizational Confluence Sample
 
Journal+Feature-InsiderThreat
Journal+Feature-InsiderThreatJournal+Feature-InsiderThreat
Journal+Feature-InsiderThreat
 
Highlights - 2018 Global Anti-Corruption & Integrity Forum
Highlights - 2018 Global Anti-Corruption & Integrity ForumHighlights - 2018 Global Anti-Corruption & Integrity Forum
Highlights - 2018 Global Anti-Corruption & Integrity Forum
 
Kfdwb development aid support mechanism 1
Kfdwb development aid support mechanism 1Kfdwb development aid support mechanism 1
Kfdwb development aid support mechanism 1
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 

Similar to Confrance presntstation

Homeland Security Bill
Homeland Security BillHomeland Security Bill
Homeland Security Bill
Lissette Hartman
 
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docxRunning head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
joellemurphey
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation
OllieShoresna
 
250 words agree or disagree In the last several decades, peo.docx
250 words agree or disagree In the last several decades, peo.docx250 words agree or disagree In the last several decades, peo.docx
250 words agree or disagree In the last several decades, peo.docx
vickeryr87
 
R41674
R41674R41674
Week Three– The Six Strategic ChallengesEvery four years, the De.docx
Week Three– The Six Strategic ChallengesEvery four years, the De.docxWeek Three– The Six Strategic ChallengesEvery four years, the De.docx
Week Three– The Six Strategic ChallengesEvery four years, the De.docx
philipnelson29183
 
TERRORISM AND TRANSNATIONAL ORGANIZED CRIME IN BENGAL (1).pptx
TERRORISM AND TRANSNATIONAL ORGANIZED CRIME IN BENGAL  (1).pptxTERRORISM AND TRANSNATIONAL ORGANIZED CRIME IN BENGAL  (1).pptx
TERRORISM AND TRANSNATIONAL ORGANIZED CRIME IN BENGAL (1).pptx
SaptarshiBasu23
 
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docxRunning head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx
toltonkendal
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
Chuck Brooks
 
Internal Security Challenges of Nepal and Intregated Efforts
Internal Security Challenges of Nepal and Intregated EffortsInternal Security Challenges of Nepal and Intregated Efforts
Internal Security Challenges of Nepal and Intregated Efforts
Sudip Pandit
 
REPLY TO EACH POST 100 WORDS MIN EACH1. This week we wer.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. This week we wer.docxREPLY TO EACH POST 100 WORDS MIN EACH1. This week we wer.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. This week we wer.docx
chris293
 
Running head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxRunning head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docx
wlynn1
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform Movement
Jennifer Reither
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
David Sweigert
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
Government
 
How does Terrorism Effect on Business and Relation Between Countries
How does Terrorism Effect on Business and Relation Between CountriesHow does Terrorism Effect on Business and Relation Between Countries
How does Terrorism Effect on Business and Relation Between Countries
ijtsrd
 
Facebook
FacebookFacebook
Facebook
BabelNews
 
TestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docxTestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docx
mattinsonjanel
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for Legislators
Kristin Judge
 
Cyberterrorism Research Paper
Cyberterrorism Research PaperCyberterrorism Research Paper
Cyberterrorism Research Paper
Rachel Phillips
 

Similar to Confrance presntstation (20)

Homeland Security Bill
Homeland Security BillHomeland Security Bill
Homeland Security Bill
 
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docxRunning head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation
 
250 words agree or disagree In the last several decades, peo.docx
250 words agree or disagree In the last several decades, peo.docx250 words agree or disagree In the last several decades, peo.docx
250 words agree or disagree In the last several decades, peo.docx
 
R41674
R41674R41674
R41674
 
Week Three– The Six Strategic ChallengesEvery four years, the De.docx
Week Three– The Six Strategic ChallengesEvery four years, the De.docxWeek Three– The Six Strategic ChallengesEvery four years, the De.docx
Week Three– The Six Strategic ChallengesEvery four years, the De.docx
 
TERRORISM AND TRANSNATIONAL ORGANIZED CRIME IN BENGAL (1).pptx
TERRORISM AND TRANSNATIONAL ORGANIZED CRIME IN BENGAL  (1).pptxTERRORISM AND TRANSNATIONAL ORGANIZED CRIME IN BENGAL  (1).pptx
TERRORISM AND TRANSNATIONAL ORGANIZED CRIME IN BENGAL (1).pptx
 
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docxRunning head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
Internal Security Challenges of Nepal and Intregated Efforts
Internal Security Challenges of Nepal and Intregated EffortsInternal Security Challenges of Nepal and Intregated Efforts
Internal Security Challenges of Nepal and Intregated Efforts
 
REPLY TO EACH POST 100 WORDS MIN EACH1. This week we wer.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. This week we wer.docxREPLY TO EACH POST 100 WORDS MIN EACH1. This week we wer.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. This week we wer.docx
 
Running head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxRunning head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docx
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform Movement
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
How does Terrorism Effect on Business and Relation Between Countries
How does Terrorism Effect on Business and Relation Between CountriesHow does Terrorism Effect on Business and Relation Between Countries
How does Terrorism Effect on Business and Relation Between Countries
 
Facebook
FacebookFacebook
Facebook
 
TestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docxTestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docx
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for Legislators
 
Cyberterrorism Research Paper
Cyberterrorism Research PaperCyberterrorism Research Paper
Cyberterrorism Research Paper
 

Recently uploaded

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 

Recently uploaded (20)

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 

Confrance presntstation

  • 1. LOGO IMPORTANCE AND SIGNIFICANCE OF INFORMATION SHARING IN TERRORISM FIELD BY Dr.ABDUL SAMAD SHIBGHATULLAH THAMER J. ABBAS
  • 2. Contents Introduction Research Problem The importance of this Paper Search Methodology Finding and Discussion
  • 3. Introduction  Terrorism is the premeditated use or threat to use violence by individuals or subnational groups in order to obtain a political or social objective through the intimidation of a large audience beyond that of the immediate victims. Terrorists try to circumvent the democratic process by extorting concessions through the pressures that targeted citizenry may bring on its government to end the violence.
  • 4. Company Logo Introduction Domestic terrorism is homegrown with consequences for only the host country, its institutions, citizens, property, and policies. Terrorism subdivided into two type transnational terrorism It is concerns more than a single country. If the terrorists cross a border to perpetrate their acts, then the attacks are transnational.
  • 5. Introduction  terrorism is multi-dimensional problem it does not belong to homeland security or a particular area and It is concern to destroy countries infrastructures.  Terrorism was given importance by the people especially after 11th September, 2001 attack in the United States.  Looking at the increasing and rampant attacks that happened in certain countries, one can say that one of the reasons that contributed to the failure in curbing this issue was that the inability of the government agencies to produce a better and proactive system. Company Logo
  • 7. Company Logo Problem Weak Information Sharing Text Text Text Text Text Text
  • 8. Company Logo Problem Business Alignment IT Tools Information Share Knowledge Management
  • 9. Company Logo The importance of this Paper shows some of the experiences in countries summarize works for this emerging field Survey (ICT) related to re-structuring of intelligence and counterterrorism gives view for EIS to help in developing tools used in intelligence and counter terrorism
  • 10. Company Logo Search Methodology
  • 11. Company Logo Finding and Discussion  the e-information sharing one of good tools that give good cooperation and coordination between intelligence communities and counterterrorism; The effective implementation of the decision making plans depends upon the degree to which government and private sector partners engage in systematic, effective, multidirectional information sharing and analysis.  The actors taking part in a coordination agency in anti-terror could be: electronic infrastructure owners and operators, government agencies and officials with responsibilities on decision making, military and civil intelligence bodies, expert advisory groups and local and regional authorities.  Inventorying and classifying assets would be a first step toward the promotion of a culture of information sharing into a risk-management framework.  Real-time collaboration on risks alerts; information gathering, infrastructure status, emergency responses, membership conditions and expertise should also be established.
  • 12. LOGO

Editor's Notes

  1. Terrorism subdivided into two type domestic and transnational terrorism. Domestic terrorism is homegrown with consequences for only the host country, its institutions, citizens, property, and policies. As such, domestic terrorism involves perpetrators, victims, and targets solely from the host country. Through its victims, targets, supporters, perpetrators, or implications. transnational terrorism concerns more than a single country. If the terrorists cross a border to perpetrate their acts, then the attacks are transnational. Terrorist incidents that begin in one country and conclude in another country (e.g. an international skyjacking or the mailing of a letter bomb to another country) are transnational terrorist events.
  2. الاستغلال. الاستهلاك. نشر. exploitation. consumption. dissemination.
  3. The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security. This includes many different communities; law enforcement, public safety, homeland security, intelligence, defense, and foreign affairs. The people in these communities may work for federal, state, local, tribal, or territorial governments. They may also need to collaborate and share national security information with each other, private sector partners, or our foreign allies. While they work in different disciplines and have varying roles and responsibilities, they all rely on timely and accurate information to achieve their national security mission responsibilities.
  4.   How to build a framework that can deter/decrease the terrorists attack and how can an information-sharing system be best optimized? How to launch cooperation and coordination between security forces, intelligence agencies, people and other partners by electronic information share and What can be done to improve cooperation among them, and can a coordination alone be a sufficient policy? What would be the technical requirements to design a framework for electronic intelligence framework? How to evaluate the proposed framework?