Wednesday, September 25, 2019
The Impact of Technology on Homeland Security Annotated Bibliography
The Impact of Technology on Homeland Security - Annotated Bibliography Example acted on homeland security over the years, and it is on this basis that this paper is aimed at developing a critical annotated bibliography on the impact of technology on homeland security. The article explains that active and non-intrusive inspection technologies have been in use for over 100 years with the main focus being radiographic imaging. The article demonstrates the presence of a number of technologies that have been fronted for use owing to their unique capabilities, but sadly less used. The reasons for the lack of use include reliance on passive detection systems and concerns about safety of radiation by the public. The articleââ¬â¢s strength is that it provides the opportunity to have an understanding Homeland security challenges in the US require out of the box solutions provided by technology despite the fact that they take a lot of time for implementation. The other strength of the article is that it provides ways through which technology can be used well to harness positive impact for Homeland Security, overcome challenges, and reviews new technology that can aid in solving challenges for Homeland security. Current technologies used for efficiency in Homeland Security include equipment for imaging, explosive, radiation, and nuclear material detection. The article has one limitation in that it does not categorically state the limitations inherent in technology in its application to homeland security. The article states the measures being undertaken by the Obama administration in ensuring agencies are more efficient and coordinated through embracing digital service delivery. The article then gives the measures being taken by the department of homeland security to meet the digital service delivery to ensure better access to data and information by the citizens, procure and manage applications, services, and smart data in a safe, efficient, and secure manner, and harness the power of big data. The articles strength is that it captures some of the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.