Internal Web 2.0 Delivery Solution Analysis

Internal Web 2.0 Delivery Solution Analysis

University of Phoenix

Internal Web 2.0 Delivery Solution Analysis

Over the past five years, social media has changed how people live their lives. People use social media to post photos, inform on what is happening in their lives and go as far as identifying where they are. With the use of social media, law enforcement agencies can benefit by increasing collaboration with the citizens of the community to solve crimes. “Many law enforcement agencies have expanded their involvement in social media, using platforms, such as Facebook, Twitter, and Nixle, to deliver information to their communities” ( 2016, p. 1). Law enforcement agencies are relying on Facebook and Twitter to disseminate critical information to the public and to seek their assistance during the investigative process. The objective of this paper is to reexamine our chosen solution for offsite storage of both confidential private data


Technology has changed the way crime is organized and conducted. Technology has created new criminal opportunities. However, technology has also contributed to changes in investigative techniques and methods of prevention. The FBI has been communicating with government agencies to request the creation of backdoors. Having access to a computer program that bypasses security mechanisms is known as a back door. (Rouse, n.d.). Backdoors are tools that allow law enforcement and other government agencies to read encrypted text in the format of plaintext. After failing to eliminate the restrictions, which would enable the FBI to read encrypted messages of people or groups under investigation, the FBI and other law enforcement agencies have found a way to use Facebook, Twitter, and YouTube to their advantage.

With the changing investigative techniques and the use of social media, the amount of data accumulated by the FBI is steadily growing. Managing and maintaining the collected data requires people, a data center, software, and hardware. The investment to archive, maintain, and manage email, Instant messaging, and the web 2.0 applications can be costly. Hiring a third party contractor to manage the Web 2.0 applications will help reduce the cost and maintenance of those tools. Many organizations are moving to the cloud. A cloud-based solution may help the FBI meet its current and future storage requirements. According to Pearlson and Saunders (2013), a cloud-based solution does offer cost advantages but it comes with associated risks.

Alternate Solutions

There were many assumptions of the solutions we provided for the FBI. Retaining email and instant messaging were one solution chosen for the FBI. The assumption was the FBI would keep current email and instant message tools to save costs on hiring a third party to manage these tools. The FBI could still incur cost for resources to manage the current email and instant messaging tools. The FBI would incur additional costs if they were to manage their own Web 2.0. Applications. Moving to a third party vendor would enhance their current communication applications. Therefore, it was decided that the FBI would not retain its current IM and email system.

The second solution was to use a third party vendor to manage the Web 2.0 applications. The assumption was that using a third party vendor may negatively impact the quality of the accumulated data because the FBI loses control over the handling of the data. There are always risks involved when using a third party vendor, but this solution would work best for the FBI. The FBI just needs to carefully examine and research all third party vendors they plan to use. The advantages outweigh the disadvantages for moving forward with a cloud-based solution.

The third solution was to retain instant messaging and email at the FBI. The assumption that all the FBI has to do is set up its own Web 2.0. Applications, such as Facebook and Twitter, and that was it. It takes many man-hours to maintain these Web 2.0. Applications and it will certainly cost the FBI additional expense to maintain Web 2.0. applications. That is why the decision to move to a third party cloud provider would be the best choice for the FBI. The FBI will not have to maintain these applications, and the cloud provider can also manage the current email and instant messaging system in place.

Recommended Solution

The recommended solution is to contract a third-party provider to manage the FBI’s Web 2.0 tools. The third party provider may implicate cloud-computing solutions, which allows users to access the resources regardless of their location (Camara, Fuentes, & Marin, 2015). This third party source will offer cloud services and provide software as a service (SaaS) type or SaaS subscription for the FBI. SaaS is similar to a rental, but focused on software applications. Software as a Service provides on-demand access to a web-based application that is housed by the cloud provider. These applications are the Web 2.0 applications that the FBI will utilize. Hsu (2011) stated that cloud computing is an innovative business model that provides resources to clientele using Internet technologies. By choosing a cloud-based solution, the FBI will not require additional resources to manage and maintain the Web 2.0 applications. Managing and maintaining the Web 2.0 applications on-site would require additional resources. Creating an on-site solution to manage and maintain Web 2.0 applications could take up-to-a year or longer before the FBI experiences positive results. However, transitioning to a cloud-based solution can be executed quickly and effortlessly.

Currently, choosing a cloud provider to manage Web 2.0 tools is the optimal solution for the FBI. The resources from the cloud provider can hit the ground running on day 1 of the subscription service. The cloud provider can recommend the Web 2.0 applications that the FBI can use. Many law enforcement agencies use modern Web 2.0 applications such as Facebook, Google Docs, Twitter, YouTube, and Gmail. Web 2.0 applications provide a medium to share and exchange information with one another (Hsu, 2011). Once theWeb 2.0 applications are transitioned to the cloud, the FBI will not be required to manage and monitor the data.. Managing Web 2.0. Tools include sharing information and posting information on social media sites such as Facebook and Twitter. Also, the cloud provider can provide email and instant messaging capabilities and will also maintain these communication tools. FBI can cease using it’s own email and instant messaging applications and allow the cloud provider to handle it.


Cloud offers data storage and processing capabilities, thus allowing firms to improve their efficiency and respond to their customer’s needs. Although cloud-based solutions provide the benefits of cost savings, there are also risks of data vulnerability and data loss. According to Pearl and Saunders (2013), the number one concern of pursuing a cloud-based solution is security. Many of the web 2.0 applications do not contain any provisions to monitor content or ensure that data is not stolen or transmitted improperly. Management must take the necessary precautions to make sure that confidential and private information hosted in the cloud environment does not get into the hands of individuals for which it was not intended. According to Pearl and Saunders (2013), cloud services offers cost savings and a smooth transition from an on-site solution to a cloud-based solution.

Consequences of the Recommended Solution

The consequences for failing to address security issues related to e-mail, instant messaging (IM) systems, and Web 2.0 applications could have devastating effects on cases initiated by the FBI. The FBI must have the ability to provide some assurance to the community that information they have provided to assist in solving a case is protected. A case could be jeopardized if confidential information is leaked and becomes tainted. Tainted information could be dismissed in a court of law, leaving the FBI without a viable case.

While transitioning confidential data to the cloud rather than maintaining an on-the premises solution may present some risks, the benefits of a cloud-based solution outweighs the risks (Weldon, 2013). The FBI must consider the time and resources spent on maintaining and monitoring the email, instant messaging and Web 2.0 applications. The cost savings gained from moving to the cloud translates to more time that the FBI can focus on their core competencies.

Investment required

The investment to transition from an on-the-premise to a cloud-based solution is approximately $ 100.00 per user which equates to approximately $ 2,100.00 per month, based on 20 users. For smaller firms, they might have the ability to purchase the required server(s) and have their IT department handle their needs. The future appears to be leading to the cloud to handle the organizations’ needs. Pearlson and Saunders (2013) claim that transitioning email and IM will enable the organization’s resources to focus on its core competencies. The key benefits of moving to a cloud solution are increased efficiency and greater innovation (, 2013). For smaller companies, the price tag of $ 100.00 per user might appear high; however, in comparison to the on-going costs to maintain the current on-site solution, the costs are nominal.

Why Solution was chosen

Using a third party provider to handle Web 2.0 tools make sense for the FBI. The FBI can focus on the protection and defense of the United States against terrorist threats, and to uphold and enforce criminal laws. The FBI can focus on their core competencies and not have to worry about managing the Web 2.0 applications. Software as service solutions sit on the cloud and do not require installation on the local server. The FBI will certainly benefit from not having to pay maintenance cost to for the Web 2.0 application. It is a risk going to a third party agency, especially since the FBI may allow the contractor access to highly classified information. The FBI as with any other company when choosing a third party vendor will need to go with an established firm that will provide many information security features to ensure no data breach occurs. It is recommended to review at least 5 or 6 different providers before deciding which third party vendor to use. There are certainly more advantages versus disadvantages when going to a cloud-based vendor as mentioned above. The FBI can inform the third party provider which Web 2.0 applications to use, and the vendor can also make recommendations on which tools to use.


Technology demands and the associated risks have changed significantly over the past five years. Social media has altered the way businesses operate and how employees connect with vendors, creditors, and customers. For the FBI, investing time in managing, archiving, and monitoring Web 2.0 applications in addition to e-mail and instant messaging requires resources. Additionally, the accumulation of data is steadily growing and is expected to growing well into the future. The FBI needs to secure a provider with the ability to handle fast moving security threats in addition to the agency’s data storage, monitoring and maintenance requirements. To become a future-ready organization with the capabilities of focusing on their core competencies, the FBI will transition the storage, monitoring and maintenance of their data to a cloud provider.


Anonymous, (2015), FBI organization, Retrieved January 24, 2016, from

Camara, S.B., Fuentes, J.M., & Marin, J.M.M. (2015). Cloud computing, Web 2.0. and operational performance: The mediating role of supply chain integration. The International Journal of Logistics Management, 26(3), .426-458

Hsu, I.(2011, October). Mutilayer context cloud framework for mobile Web 2.0: A proposed infrastructure. International Journal of Communication Systems, 26, 610-625

Marks, G. (2013). Do you replace your service or go the cloud? The answer may surprise you.

Retrieved January 30, 2016 from

O’Bannon, I.M. (2009, May 22). Web 2.0, SAAS and Cloud Computing: What the New Internet means for Tax & Accounting Professionals, Retrieved from

Pearlson, K., & Saunders, C. (2013). Managing and using information systems: A strategic approach (5th ed.). Hoboken, NJ: John Wiley & Sons.

Rouse, M. (n.d.). Back Door, Retrieved from

Stevens, L. (2016, January). Social Media in Policing: Nine Steps for Success. Retrieved from

Weldon, D. (2013). Choosing a cloud. The Journal, 40(3), 36-40.

Place an Order

Plagiarism Free!

Scroll to Top