Friday, May 3, 2019

The Impact of Technology on Homeland Security Annotated Bibliography

The Impact of Technology on Homeland certification - Annotated Bibliography recitationacted on homeland security over the years, and it is on this basis that this paper is aimed at developing a critical annotated bibliography on the impact of technology on homeland security.The oblige explains that active and non-intrusive inspection technologies sacrifice been in use for over 100 years with the main focus being radiographic imaging. The word demonstrates the presence of a number of technologies that have been fronted for use owing to their unique capabilities, but sadly slight used. The reasons for the lack of use include reliance on passive detection systems and concerns about safety of beam by the public.The articles strength is that it provides the opportunity to have an understanding Homeland security challenges in the US require out of the box solutions provided by technology despite the fact that they take a lot of time for implementation. The other strength of the arti cle is that it provides ways through which technology loafer be used well to harness positive impact for Homeland Security, overcome challenges, and reviews new technology that can aid in solving challenges for Homeland security. Current technologies used for efficiency in Homeland Security include equipment for imaging, explosive, radiation, and nuclear material detection. The article has one limitation in that it does not categorically stir the limitations inherent in technology in its application to homeland security.The article states the measures being undertaken by the Obama court in ensuring agencies are more efficient and coordinated through embracing digital help delivery. The article then gives the measures being taken by the department of homeland security to meet the digital service delivery to ensure better access to data and information by the citizens, procure and manage applications, services, and irreverent data in a safe, efficient, and secure manner, and harn ess the power of big data. The articles strength is that it captures some of the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.