View : 1656 Download: 0

On U.S. homeland security and database technology

Title
On U.S. homeland security and database technology
Authors
Kim W.
Ewha Authors
김원
Issue Date
2005
Journal Title
Journal of Database Management
ISSN
1063-8016JCR Link
Citation
Journal of Database Management vol. 16, no. 1, pp. 1 - 17
Indexed
SCIE; SCOPUS scopus
Document Type
Review
Abstract
Since the terrorist attacks of September 11, 2001, "homeland security" has become the centerpiece of U.S. domestic and foreign policies. The number of terrorists is a tiny fraction of all the people who live in or enter the U.S. However, given the enormous consequences of a repeat of the September 11 attacks, all non-terrorists have been subjected to security measures. The cost of all the security measures includes not only the cost of human resources, deployment of defensive weaponry and technology purchases, but also the time that all people waste. One of the ways to reduce costs is to make terrorist-related intelligence more precise and accurate, so that efforts to track, arrest and deter terrorists, their supporters and movements of funds and weapons can be more precisely directed. One of the ways to make such intelligence more precise is the use of data gathered and stored in databases, and database and related technologies to query, search and mine the databases. This paper first reviews the difficulties in tracking terrorist suspects and their activities. It then examines how databases, and database and related technologies, can be used and made more effective in aiding the war against terror.
Appears in Collections:
공과대학 > 컴퓨터공학과 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE