On US homeland security and database technology

被引:19
作者
Kim, W [1 ]
机构
[1] Cyber Database Solut, Austin, TX USA
关键词
data integration; data quality; data warehousing; database systems; homeland security; metadata management; terrorism;
D O I
10.4018/jdm.2005010101
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the terrorist attacks of September 11, 2001, "homeland security" has become the centerpiece of U.S. domestic and foreign policies. The number of terrorists is a tiny fraction of all the people who live in or enter the U.S. However given the enormous consequences of a repeat of the September 11 attacks, all non-terrorists have been subjected to security measures. The cost of all the security measures includes not only the cost of human resources, deployment of defensive weaponry and technology purchases, but also the time that all people waste. One of the ways to reduce costs is to make terrorist-related intelligence more precise and accurate, so that efforts to track, arrest and deter terrorists, their supporters and movements of funds and weapons can be more precisely directed. One of the ways to make such intelligence more precise is the use of data gathered and stored in databases, and database and related technologies to query, search and mine the databases. This paper first reviews the difficulties in tracking terrorist suspects and their activities. It then examines how databases, and database and related technologies, can be used and made more effective in aiding the war against terror.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 11 条
  • [1] BACHELDOR B, 2003, INFORMATION WEE 1222
  • [2] BRANT M, 2003, NEWSWEEK 1117
  • [3] Information quality: Critical ingredient for national security
    English, LP
    [J]. JOURNAL OF DATABASE MANAGEMENT, 2005, 16 (01) : 18 - 32
  • [4] Han J., 2012, Data Mining, P393, DOI [DOI 10.1016/B978-0-12-381479-1.00009-5, 10.1016/B978-0-12-381479-1.00001-0]
  • [5] KIM W, 2003, J KNOWLEDGE DISCOVER, V7
  • [6] KIM W, 2003, J OBJECT TECHNOL MAY
  • [7] *REG TERR GROUPS P, 2004, NY TIMES 0208
  • [8] Semantic association identification and knowledge discovery for national security applications
    Sheth, A
    Aleman-Meza, B
    Arpinar, IB
    Bertram, C
    Warke, Y
    Ramakrishanan, C
    Halaschek, C
    Anyanwu, K
    Avant, D
    Arpinar, FS
    Kochut, K
    [J]. JOURNAL OF DATABASE MANAGEMENT, 2005, 16 (01) : 33 - 53
  • [9] A database interface for link analysis
    Smith, MN
    King, PJH
    [J]. JOURNAL OF DATABASE MANAGEMENT, 2005, 16 (01) : 60 - 74
  • [10] Text mining, names and security
    Thompson, P
    [J]. JOURNAL OF DATABASE MANAGEMENT, 2005, 16 (01) : 54 - 59