Legal Justice Information Systems Integration Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

For instance, in the eyes of the courts, an offense's level could be equated to the guideline for the seriousness of a crime. The next aspect of the scorecard was the offender's personal or associative criminal history. Prior offenses dictated a level of conviction frequencies and social offenses. Therefore the personal criminal history of an individual ends up playing a major role in the sentencing guidelines. A person's propensity to repeat offences entails longer sentences. The person that had a history of repeat offenses offered a greater threat and therefore was often thought to be more dangerous to society. but, how does the justice system maintain a culprit's history without an ability to utilize integrated processes?

This is a prime example of where justice information systems integration could have far reaching implications. In regard to sentencing, first time offenders in one community may not have been labeled as serial offenders because of the lack of integration and communication between disparate communities. Far too often individuals were not severely punished when they committed crimes in one local that did not communicate with a local where the same offender had committed the same or a similar crime. Other examples can be seen when one agency searches for a potential criminal culprit even though that individual was already in custody in another jurisdiction unbeknownst to the first. Through an integrated jurisprudence system, these types of offenders are less likely to get away from multiple jurisdiction crimes. Thus, inter-community communication and systems integration will lead to more accurate sentencing and arrest patterns and therefore may reduce crime.

Security

One area where the justice system integration will need to be epically careful is the area of security. Network security in networked environments has three main objectives. "Three basic security concepts important to information on the Internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication, authorization, and nonrepudiation." (Dekker, 2004) an illegal entry into the justice system entails much more than a network for a different user. When illegal network accesses stalled the computer systems at Yahoo one summer could have far less reaching implications than a terrorist wiping out the all fingerprint files in as single swoop. Whatever the case, network security for an integrated justice system will have many entry points for criminal as well as legal elements. Consider that any high school kid with an F. average could have the basic knowledge to make an unauthorized access into a secure network environment. A integrated communication link in the justice system could therefore allow for access to the many people who know exactly what they are doing because they have grown up with this technology. Couple that with the fact that terrorists can represent whole nations and they have many tools at their disposal to bring our judicial system down. "Incidents can be broadly classified into several kinds: the probe, scan, account compromise, root compromise, packet sniffer, denial of service, exploitation of trust, malicious code, and Internet infrastructure attacks." (Dekker, 2004)

The key is that if the integrated judicial systems are open-ended for ease of use, they may be insecure at best. No one who uses an 'open ended network' or that has access to an outside domain can be considered immune to security breeches. "Security and usability are often inversely proportional. There is no such thing as "complete security" in a usable system. Consequently, it's important to concentrate on reducing risk, but not waste resources trying to eliminate it completely." (Avolio, 2000) This integrated system will have a daunting task of protecting itself and the entire population. "Those affected include banks and financial companies, insurance companies, brokerage houses, consultants, government contractors, government agencies, hospitals and medical laboratories, network service providers, utility companies, the textile business, universities, and wholesale and retail trades." (Dekker, 2004)

Conclusion

This report was about Information Systems Integration in regard to the legal and justice systems of the nation. We are currently a part of the twenty first century digital era where information has become a major part of the criminal justice process. In order to make the justice process more accurate, efficient and effective, integration will be required though the many diverse departments, localities, states and national systems. This system will need to combine the advances in technology with an overall reevaluation of the existing day-to-day manual processes. Integration of the justice information system will imply future seamless sharing of information at all points of the justice decision making process and advances will raise the level of expertise and efficiency from the highest court in the land to the local sheriff's departments of the nation. "In recognition of this need to share information, many state and local jurisdictions, including the State of Iowa, are actively developing and implementing plans for comprehensive integrated justice information systems. Integrated systems improve the quality of information and thereby: improves public safety, eliminates data entry errors and redundant data entry, provides complete, current and timely data, improves the ability to evaluate policy decisions and changes, maximizes available resources, improves data retrieval response time, provides for better, more informed decision making, and improves the operational effectiveness of existing systems." (Meyers, 2004)

References

Avolio, Frederick M. (2000, March 20). Best Practices in Network Security -- as the Networking Landscape Changes, So Must the Policies That Govern Its Use. Don't Be Afraid of Imperfection When it Comes to Developing Those for Your Group. Network Computing.

Capital Punishment in U.S. Hit 30-Year Low in 2003. Ed. All American Patriots. (March 1, 2005). Retrieved on April 21, 2005, from All American Patriots at http://www.allamericanpatriots.com/m-news+article+storyid-6869-PHPSESSID-c7528df1df14be6397da4e89e25a7374.html.

Dekker, Marcel. (n.d.). Security of the Internet. Retrieved on April 21, 2005, at http://www.cert.org/encyc_article/tocencyc.html#Overview

Holmes, Amir., Webster, Lawrence P., & Sullivan, Teri (2004). JIEM Reference Model. SEARCH, the National Consortium for Justice Information and Statistics. Retrieved on April 21, 2005, at http://www.search.org/integration/JRM1.0.1.pdf

Meyers, D. (2004). Justice Information Systems Integration Summary. State of Iowa Implementation.

Morton, Heather. (n.d.). Integrated Criminal Justice Information Systems. Retrieved on April 21, 2005, from National Conference of State Legislatures Web Site: http://www.ncsl.org/programs/lis/intjust/report01.htm

The Justice Information Exchange Model. (2004). SEARCH Model. Retrieved on April 21, 2005, at http://www.search.org/integration/info_exchange.asp

Schacter, Bernice. Issues and Dilemmas of Biotechnology: A Reference Guide. Westwood: Greenwood P, 1999.

Appendix a Information Technology[continue]

Some Sources Used in Document:

"Historical-CERT-Documents" 

Cite This Term Paper:

"Legal Justice Information Systems Integration" (2005, April 22) Retrieved December 8, 2016, from http://www.paperdue.com/essay/legal-justice-information-systems-integration-65724

"Legal Justice Information Systems Integration" 22 April 2005. Web.8 December. 2016. <http://www.paperdue.com/essay/legal-justice-information-systems-integration-65724>

"Legal Justice Information Systems Integration", 22 April 2005, Accessed.8 December. 2016, http://www.paperdue.com/essay/legal-justice-information-systems-integration-65724

Other Documents Pertaining To This Topic

  • Information Security Evaluation for OSI Systems a Case Study

    OSIIT An analysis of IT policy transformation The aim of this project is to evaluate the effectiveness of information security policy in the context of an organization, OSI Systems, Inc. With presence in Africa, Australia, Canada, England, Malaysia and the United States, OSI Systems, Inc. is a worldwide company based in California that develops and markets security and inspection systems such as airport security X-ray machines and metal detectors, medical monitoring anesthesia

  • Justice Crime and Ethics

    Justice, Crime and Ethics Prepping the President: Ethical Analysis and Future Policy Initiatives Suggesting the Use of Rehabilitation in Corrections The President of the United States has just scheduled a town hall meeting entitled, "Criminal Justice Ethics: Today's News and Tomorrow's Solutions." Many of the country's most interested individuals in the field of criminal justice's present ethical issues are attending the meeting and expect to be informed on the status of some of

  • Treatment vs Punishment Juvenile Justice

    Treatment vs. Punishment Treatment Concept Juvenile crime is often serious because of the ability to represent a significant proportion in relation to the total criminal activity within the community. The normal assumption indicates that adolescents deserve and require special handling during the formative period. Criminal behavior during this stage of life might not continue into adulthood thus the need for integration of special handling by the relevant justice systems within the case

  • EU Open Source Software Legal

    " (Information Society and Media, 2005) f. The eContent Programme and the eTen Programme The 100 million dollar eContent Programme (2001-2005) focuses on encouraging growth and development of tie European digital content industry. This programme funds projects with short time-to-market and as well experiments with new models in business and partnerships through use of technology that is presently available. The programme's stated 'main thrust' is to; Improve access to an expand the

  • Forest Fire Management Systems and

    It was then important to see the degree at which technology and training played a role in combating each fire. 1.2.4.Rationale of the Study What is that can be gained from this study? The reasoning behind such a study is born out of a need to provide better training for fire fighters so that fire management systems will improve and reduce the amount of loss due to the fire. By studying

  • Legal Migration Benefits of Allowing

    Allowing more legal migrants from Mexico will not only save lives, it will decrease the terrible practice of smuggling, and it will free up the Border Patrol to concentrate on more important issues, such as drug smuggling and national security. Legal migration is an important issue that needs to be addressed by Congress, so that more people can enjoy the freedom and prosperity of living in America - legally

  • Judicial System Overview of the Civil Justice

    Judicial System Overview of the Civil Justice System and Its Administration Since the creation of the United States Constitution, there has been a clear distinction between the three branches of government. The third branch, the Judiciary, exists for two purposes: to determine justice according to the current laws and policies and to eliminate any legislation that is in violation of the Constitution. As with the other two branches, the Supreme Court has


Read Full Term Paper
Copyright 2016 . All Rights Reserved