Running Head: TROUBLE WITH THE TERROR WATCH LIST2Trouble with the Terror Watch ListOne of the major concepts outlined in the case study is the usage of a database management system, or DBMS for short, which is primarily used as a way to “store and retrieve database information that is both convenient and efficient” (Vidhya et al., 2016, p. 22). This database contains a wide variety of information on individuals suspected of being engaged in domestic terror activities, to include their names and aliases that they are known to use. Through the use of a combined DBMS, multiple federal and local agencies are able to pool together their information into a single repository, instead of each of them creating and maintaining their own fraction of information that would be better suited for consolidation.Another concept touched upon by the case study is the issue of data accuracy. It is noted that many individuals are on the Terror Watch list purely due to misspellings within the database,or some other form of error. This is quite troublesome for many innocent people, some as young as 8 years old, who have done nothing to be put on the list; yet they are frequently unable to travel unhindered due to their inclusion.The Goal of the Terror Watch ListThe watch list was created in an effort to make a “single database that contains sensitive national security and law enforcement information concerning the identities of those who are known or reasonably suspected of being involved in terrorist activities” (Terrorist Screening Center, 2016). This database is accessible by many law enforcement agencies, allowing them to identify and track individuals more efficiently while also promoting inter-agency communication.The list does have its benefits; the greatest of which is putting information into the hands of those law enforcement agencies that would most need it. Without the database being in place,