Technology for Enhancing National Security
نویسنده
چکیده
National security has received unprecedented attention from academics, industrial leaders and the general public since September 11, 2001. The resulting worrying situation calls for solutions from a variety of promising areas, such as database technology. Additionally, traditional data management technologies (e.g., query processing and transaction management), data processing technologies (e.g., schema integration , data quality, name entity recognition and metadata management) and data management applications (e.g., data mining) must all be re-evaluated in the context of national security. Furthermore, the ability to track and monitor people raises serious issues of security and privacy. In this special issue, six papers contributed by researchers from academia, industry and government highlight the progress made in these and other areas of concern, focusing on the challenges and opportunities for database technology in national security applications. The first paper, " On U.S. Homeland Security and Database Technology, " is by Won Kim. Kim reviews the state-of-the-art and provides a future vision for applying database technology to national security applications. He highlights the difficulties of tracking terrorist activities and examines how databases and database technology, including database federation, metadata management and fuzzy querying, can be made more effective in the war against terror. He also discusses relevant technologies , database-related and otherwise, that can help sharpen and fine-tune homeland security efforts. The accuracy of terrorist-related data and information has a profound impact on intelligence agencies. The stakes of false positives and false negatives in tracing terrorists are very high. One way to reduce the chances of misjudgment is to improve data quality. National security poses special challenges to managing information quality, due to the broad coverage of information types, diverse information sources, data collected with incompatible technologies from different agencies, widely distributed information collection processes involving humans, obfuscated data to protect privacy, and so on. The second paper, " Information Quality: Critical Ingredient for National Security, " is by Larry P. En-glish. English argues that systematic and rigorous procedures and technologies must be in place to ensure information quality in data collection, access, aggregation and usage. The procedures and technologies include standardizing the definition for data and information required for sharing across national security agencies, designing flex
منابع مشابه
Modern Communication Technology and National Security In the Middle East
One of the characteristics of the modern international systems is the undeniable role the new communication technologies play in different sections of human societies. Modern communication technologies such as satellites and computers have challenged the national authority and sovereignty of Vestfallian states. Although national states, specially, in the third world countries, extremely resist...
متن کاملPerformance Assessment and analysis of Specialized Nutrition and Food Security Working Group in Achiveing Strategic Goals of National Nutrition and Food Security Document in Iran
Performance Assessment and analysis of Specialized Nutrition and Food Security Working Group in Achiveing Strategic Goals of National Nutrition and Food Security Document in Iran Mona Pourghaderi1, Fatemeh Mohammadi-Nasrabadi2, Behzad Damari3*, Zahra Abdollahi4, Shiva Mafimoradi5,6, Sareh Edalati7, Nasrin Omidvar8** 1Ph.D. Candidate in Food and Nutrition Policy, Department of Community Nutriti...
متن کاملMothers’ Views on Food Security and Complementary Feeding: A Qualitative Study in Urban Iran
Background and Objectives: Food insecurity may be associated with poor nutrition, which in turn can increase the risk of adverse nutrition and health outcomes among infants and toddlers. This study was undertaken in 2008 to gain an insight of mothers' views on complementary feeding practices and food security. Materials and Methods: In this qualitative study, data were collected through 10 Foc...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملFood Security Is Associated with Dietary Diversity: Tehran Lipid and Glucose Study
Background and Objectives: This study was undertaken to determine the relationship between food security and individual dietary diversity score (IDDS). Materials and Methods: This population-based cross-sectional study was conducted on 200 non-diabetic individuals aged ≥40 years, selected randomly from the Tehran Lipid and Glucose Study. Household food security was measured using a validated U...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005