Technology Support System For Homeland Security Program

Technology Support System For Homeland Security Program Assignment example
Undergraduate
Assignment
Design & Technology
Pages 12 (3012 words)
Download 0
TECHNOLOGY SUPPORT SYSTEM FOR HOMELAND SECURITY Technology Support System for Homeland Security TECHNOLOGY SUPPORT SYSTEM FOR HOMELAND SECURITY Executive Summary The Department of Homeland Security or DHS was created by former U.S. President George W. Bush as a post-9/11 response to the threat of Jhadist terrorism in the United States…

Introduction

Former Senator Rudman views the department to be a needed “formulation” in spite of the existing of great Army, Marine Corps and Air Force (2003). However, in assessing the organization and mission of the DHS, this proposal sees the agency to be wanting in resources and capacity along the aspects of independent mobilization and focus of initiatives. Organizationally, the DHS has to correlate with federal agencies to be able to mobilize anti-terrorism initiatives; it also lacks the integrated mechanism so that the department can effectively interface with the anti-terrorism network of agencies within the bureaucracy. Thus, the creation of an Information Communication and Assistance Services or ICAS is hereby proposed. Specifically, the ICAS is a novel concept of a management information system which will link the DHS with correlated anti-terrorism federal, state and local agencies using information and communication technologies. It will also enable the DHS to directly serve the people at the grassroots level through a social Web site and a 9-12 quick assistance response system. If implemented with a budget request of 18 Million USD, the proposal will consequently resolve what U.S. President Barack Obama perceives to be a “systemic failure in the existing homeland security services (Newsweek, an. 11, 2010). ...
Download paper
Not exactly what you need?

Related papers

Security Technology
Security cameras are one aspect of business security that is commonly used across many different business types. Often a number of video cameras transmit their signals to a specific point, frequently a set of monitors. This system is known as closed-circuit television (CCTV) the name derives from the fact that although a television signal is produced it is not transmitted openly, and as a…
RFID Technology
2.1.1 RFID Technology Deployment The DoD and Wal-Mart asked their suppliers to deploy RFID infrastructure in 2004. However, there were issues arising regarding labels, readers, and software in the pilot studies. Nevertheless, most suppliers were ready to beat the January 1 2005 deadline while others were in the pilot study stages (RFID). For Wal-Mart however, deployment was slow due to the…
Technology Implementation Paper
Implementation of the newly developed information system follows successful design and development of the system. This paper will therefore give details and recommendations on how the new technology system should be implemented. Being the manager in charge of implementing the new information system my main objective will be to ensure that the new system is efficient. In an organization, change is…
Technology Improves Transportations
Due to this reason, users consult reliable companies which utilize the latest modes of transportation and technologies for efficient delivery. The use of latest technologies has introduced new trends in transportation industry and put certain direct implications on different actors associated with this field…
construction technology
The modern design criteria normally depending on the use of the building is enhanced to consider factors like aesthetic value, clear spans and heights and to achieve the structural economy. Timber being one of the materials very suitable for the construction of frames, has several advantages over the counterparts like steel and concrete. Domestic construction has extensively dominated the use of…
Security Audit
Also, some team members violated integrity and confidentiality assertions by disclosing information to external parties. This paper entails the details and implications of security audit procedures carried out and observations noted. Conducting audit Lafleur has a complicated network of information systems in place, with various remote offices and centralized IT function. Therefore, to evaluate…
Green Building
Without appropriate accommodation, the performance of the student may deteriorate due to varying factors an example being health. Most of the buildings in the city are pre-modern and thus the importance of giving or rather outlining a new design in which a building can get remodeled through. The contemporary world is faced with numerous problems one of them being pollution, it is important to go…