The terrorist watch list database and screening center terrorist watch list database: a case study don e gregory info 531: management information systems abstract since the attacks on the world trade center, our nation has been at war with terrorism.
The terror watch list database’s troubles continue case study n the aftermath of the 9-11 attacks, the fbi’s terrorist screening center, or tsc, was. Created and what are some of its benefits q&a: describe some of the watch list's weaknesses what management, organization, and technology factors are responsible for these weaknesses q&a: if you were responsible for the management of the tsc watch list database, what steps would you take to.
To join up the list, there are 12 different databases required to integrate however, only 10 of the 12 databases were processed after two years the remaining two databases got stuck because of different structure of agencies, the us immigration and customs enforcement’s automatic biometric identification system and the fbi’s integrated automated fingerprint identification system are both fingerprint databases. The main concept is consolidating various databases into one fundamental list in fact, different agencies have employed data warehouses to queried data.
The remaining two databases (the u or inconclusive match to the watch list record the frontline screening agency or airline conducts a name-based search of the individual against the records from the terrorist watch list databaseness two years after the process of integration took place.
A database of suspected terrorists also known as the terrorist watch list created in response to criticisms that multiple agencies were maintaining separate lists and that these agencies lacked a consistent process to share relevant information concerning theindividuals on each agency’s list. The watch list created to collect and maintain terrorist information and nominate individual for inclusion in the terrorist screening centre, tsc consolidated watch list the watch list currently includes about 420,000 names, 8,000 of americans, 16,000 of people not allowed to fly including 500 of americans.
Records for the watch list database are pro- vided by two sources: the national counterterrorism center (nctc) managed by the office of the director of national intelligence provides identifying information on individuals with ties to international terrorism. In the terrorist watch list database case, the information about suspected terrorists are consolidated and standardized from multiple government agencies so that the information can be centralized into a single list, from which different agencies can communicate and share information with each other.
Many of the advantages (and shortcomings) of database management systems (dbms) are illustrated by the terrorist watch list case study for instance, the watch list solves some of the problems of traditional file environment by reducing redundancy (each agency with some responsibility for homeland security maintaining its own separate list.
Trouble with the terrorist watch list database case study 1 what concepts in this chapter are illustrated in this case many of the advantages (and shortcomings) of database management systems (dbms) are illustrated by the terrorist watch list case study.