1 / 16

Enhancing the National Schengen Information System for Combatting Human Trafficking

This project aims to strengthen the National Schengen Information System with advanced IT technologies designed for addressing human trafficking. Managed by Miloš Kucej and supported by systems analyst Henryk Huťka, it utilizes worldwide IT standards and operates on a three-tier application architecture. The system provides 24/7 accessibility via intranet, ensuring efficient case management, victim assistance, and perpetrator tracking. It features a role-based activity tree and robust notification mechanisms to streamline operations and facilitate legal proceedings.

aileen
Télécharger la présentation

Enhancing the National Schengen Information System for Combatting Human Trafficking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information SystemTrafficking Human Beings Used IT Technologies Design Description

  2. Project manager • Ing. Miloš Kucej • Head of Department of National Schengen Information System • Mail:milos.kucej@minv.sk • Systems Analyst • & Programmer • Mgr. Henryk Huťka • Senior Referent Specialist • Application Development Department • Mail:henryk.hutka@minv.sk

  3. Initial Info about IS • Actual standards of the Ministry of Interior • According our internal Needs • No outsourcing – Own resources • Standard Worldwide IT Technologies used • Central System available 24/7 via Intranet • Thin Client – no need to update client, accessibility

  4. Three-tier Application Architecture

  5. Software Architecture LDAP server Database server Clients Application server HTTPS server

  6. Computing Center

  7. Three Deploy Environments

  8. Simplified Database Model Case Victim Perpetrator Trial Exploitation Perpetrators at Trial Victim’s Background Person Recruitment & Transportation Identification& Assistance

  9. IS Screenshots – Activity Tree • Role-based Activity Tree • Selecting Tree node starts Activity

  10. IS Screenshots – Find Case/Add new Case • Find Case by Identifier • Find Case by Person (Victim or Perpetrator ) • Add new Case, if not exists • Archive registry if Case deleted

  11. IS Screenshots – Case Editing – The Case • Shows all Case related Information • Edit Case Information • Possibility to delete Case – Move to Archive

  12. IS Screenshots – Case Editing – The Trial • Shows all Trials – only some Information • View selected Trial’s full Detail • Edit selected Trial’s Information • Possibility to delete selected Trial – Move to Archive

  13. IS Screenshots – Case Editing – The Victim & Perpetrator • Shows all Victims & Perpetrators – only some Information • View full Detail of selected Person • Edit Selected Victim’s or Perpetrator’s Information • Possibility to delete selected record – Move to Archive

  14. IS Screenshots – Notifications • Notifications shown for superior Role upon login into IS • New Case Notification • Tracked period Notification

  15. Reference Tables

  16. Statistics

More Related