Verified Document

FBI Case Study The Primary Case Study

However, the Academy of Sciences definition of the term enterprise architecture also extends beyond mere IT architecture, although such architecture will certainly support the Academy's definition. This definition denotes "a detailed characterization of the bureau's goals, tasks, strategies, and key operational processes" (National Academy of Sciences, 2004). These objectives would then be facilitated by IT solutions it implement them. One of the most important lessons learned in this particular case study is the fact that the lack of support from upper-level management can certainly hamper any efforts towards enterprise level of IT solutions. Although funding was certainly there for Trilogy, many upper level executives did not want to become involved in the process because of the perceived difficulty not only in implementing IT solutions -- thereby linking reams of legacy data from an assortment of disparate silos -- but also because of actual difficulties in getting representatives from different departments to align...

Future recommendations for the Bureau, then, include have upper-level management involved in the implementation of enterprise architecture both from an IT perspective as well as from a unified organizational perspective. It also includes developing a fully integrative system so that communication between different branches of the agency is no longer difficult.
References

Pulliam, D. (2006). Review of FBI tech project finds millions in questionable expenses (2006). Government Executive.com, last retrieved December 12, 2011.

McGroddy, J. (2004). Letter to the FBI from the National Academy of Sciences, Committee on the FBI's Trilogy Information Technology Modernization Program, online document, last retrieved December 12, 2011.

National Academy of Sciences. (2004).A Review of the FBI's Trilogy Information Technology Modernization Program, online document, last…

Sources used in this document:
References

Pulliam, D. (2006). Review of FBI tech project finds millions in questionable expenses (2006). Government Executive.com, last retrieved December 12, 2011.

McGroddy, J. (2004). Letter to the FBI from the National Academy of Sciences, Committee on the FBI's Trilogy Information Technology Modernization Program, online document, last retrieved December 12, 2011.

National Academy of Sciences. (2004).A Review of the FBI's Trilogy Information Technology Modernization Program, online document, last retrieved December 12, 2011.
Cite this Document:
Copy Bibliography Citation

Related Documents

Cybersecurity Recent Case Studies of
Words: 4325 Length: 16 Document Type: Term Paper

The level and sophistication of this attack on the Department of Defense's systems suggests that professionals conducted this attack with significant resources at their disposal and an interest in the national security secrets of the United States. The data mining operation was so successful that, while detected, still managed to make-off with a significant amount of information. Since the attack, the United States responded in a number of critical ways.

Forensic Case Study Enrique Camarena the Abduction
Words: 1293 Length: 4 Document Type: Essay

Forensic Case Study Enrique Camarena The abduction of Enrique Camarena The abduction of Enrique Camarena presents numerous interesting and unusual features regarding the gathering of forensic evidence. Many of obstacles that arose over the course of the investigation can be traced to the fact that the DEA Special Agent was apprehended in Mexico, where U.S. laws about preserving evidence did not apply. The Mexican police force (at least at the time of the

Case Study on Homeland Security Event
Words: 1951 Length: 5 Document Type: Case Study

Homeland Security Event Over the last ten years, Homeland Security has been focused on dealing with a wide variety of terrorist attacks. In most cases, these incidents usually involve some kind of intelligence indicating that a terrorist related incident was about to occur. One recent example of this happened in October 2011, with a failed assassination attempt on the Saudi Arabian Ambassador. When the news was first announced, this seemed

Case Study on Legal and Ethical Considerations in Marketing
Words: 3095 Length: 9 Document Type: Term Paper

Marketing, Product Safety, and Intellectual Property Business ethics have become an increasingly essential requirement for firms, especially with the ongoing situation of globalization of the world economy. In the long run, corporate-to-corporate ethics of suitable behavior influence the achievement of businesses in a positive way, or have the power to greatly impact the behavior. As a consequence, the downfall of ethical disgrace has appeared both in Europe and in the

Tylenol Case Analysis: Johnson and
Words: 1160 Length: 4 Document Type: Case Study

Johnson and Johnson issued a public relations response immediately naming their number one priority: to aggressively protect any consumer from the potential hazards that may be present in any of their family of products. Symptoms of the Problem -- Quickly, the crisis reached epic nationwide coverage. The panic that ensued, somewhat as the result of the twenty-four hour media coverage, fueled this panic into a frenzy. One hospital in Chicago,

Welcome to Homicide Case "Welcome to Homicide"
Words: 2613 Length: 8 Document Type: Essay

Welcome to Homicide Case "Welcome to Homicide" "There's a theory that every time you leave an area, you always leave evidence behind, no matter what, no matter how careful you are; and that's why there's forensics" (Santy, 2007). Forensic science has seen a number of major developments over the years. Throughout its evolution, analytic techniques have become finer tuned and accurate, allowing for much greater law enforcement practices. Today, forensics relies

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now