StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Impact of Technology on Homeland Security - Annotated Bibliography Example

Cite this document
Summary
The bibliography "Impact of Technology on Homeland Security" focuses on the critical analysis of the major issues on the impact of technology on homeland security. Braun defines technology as the ways and means by which humans produce purposeful material artifacts and effects…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful
Impact of Technology on Homeland Security
Read Text Preview

Extract of sample "Impact of Technology on Homeland Security"

Impact of technology on Homeland Security Annotated Bibliography: Impact of technology on Homeland Security IntroductionBraun defines technology “as the ways and means by which humans produce purposeful material artefacts and effects” (Braun, 1998). From the definition, it is evident that technology has been a benefit as well as a curse depending on the view taken when delivering an opinion on technology. What remains to be true on technology is that it has changed the lives of people since agricultural revolution and manner other technological advances that have been seen in the present day use of internet in almost all facets of human living. Technology has also impacted on homeland security over the years, and it is on this basis that this paper is aimed at developing a critical annotated bibliography on the impact of technology on homeland security. Critical bibliography on the Technologies impact on Homeland Security Jones, J., (2003). Active, non-intrusive inspection technologies for homeland defense. Idaho National Engineering and Environmental Laboratory, Retrieved from http://www.inl.gov/technicalpublications/Documents/2585364.pdf The article explains that active and non-intrusive inspection technologies have been in use for over 100 years with the main focus being radiographic imaging. The article demonstrates the presence of a number of technologies that have been fronted for use owing to their unique capabilities, but sadly less used. The reasons for the lack of use include reliance on passive detection systems and concerns about safety of radiation by the public. The article’s strength is that it provides the opportunity to have an understanding Homeland security challenges in the US require out of the box solutions provided by technology despite the fact that they take a lot of time for implementation. The other strength of the article is that it provides ways through which technology can be used well to harness positive impact for Homeland Security, overcome challenges, and reviews new technology that can aid in solving challenges for Homeland security. Current technologies used for efficiency in Homeland Security include equipment for imaging, explosive, radiation, and nuclear material detection. The article has one limitation in that it does not categorically state the limitations inherent in technology in its application to homeland security. Homeland Security. (February 3, 2015). DHS Digital Strategy. Retrieved on February 10, 2015 from http://www.dhs.gov/dhs-digital-strategy The article states the measures being undertaken by the Obama administration in ensuring agencies are more efficient and coordinated through embracing digital service delivery. The article then gives the measures being taken by the department of homeland security to meet the digital service delivery to ensure better access to data and information by the citizens, procure and manage applications, services, and smart data in a safe, efficient, and secure manner, and harness the power of big data. The articles strength is that it captures some of the impacts of technology to homeland security including access to innovations and improvements such as cloud computing and agile development and mobility allowing for value delivery. The other impact of technology on homeland security captured in the article is quality service delivery through better use of departmental data, promote innovation and leverage on unique mobile computing for further service delivery. The article will be very useful in the research is it provides a first-hand account of the impacts of technology on homeland security from the department of homeland security. Orphan, V., Muenchau, E., Gormley, J. & Richardson, R. (2005). Advanced y ray technology for scanning cargo containers. Applied Radiation and Isotopes, 63 (5/6), 723-732. The article provides a comprehensive discussion on the use of SAIC scanning technology in improving the efficiency of cargo screening in Los Angeles, Oakland, San Diego, and Seattle ports. The benefit of the technology to Homeland Security is that it produces radiographic images of the vehicles and containers in less than a minute allowing for fast screening and avoidance of congestion in ports without compromising security. There is the use of the SAIC technology at all seaports in the United States, and the mechanisms of use of the SAIC technology are well explained by the article allowing for better understanding. The strengths are inherent in the article making it an important addition to the literature in the research include that it is published in a peer-reviewed journal depicting credibility. The other strength is that the articles provide insightful information on current technology used by Homeland security allowing the research to gauge its effectiveness in measuring the impact of technology on Homeland Security. The authors of the article have wide recognition as writers in the scanning technology field making the article an important addition to the literature. The main limitation of the research is that it focuses only on the technology used in ports, which is only a facet of the functions under Homeland security. Gozani, T. (2007). Principles and applications of neutron-based inspection techniques. Nuclear Instruments & Methods in Physics Research, 261 (1-2), 311-315. The article reviews the use of neutron based explosive inspection systems and its ability to detect a lot of substances including explosives, nuclear materials, and narcotics for national security reasons. The article explains the measures for use in neutron based technology in Homeland security at airports and other points of entry. The article is relevant to the literature review because it relays the research development that will impact Homeland Security in terms of improving the technology use it positively. The article proffers the current technology used in homeland and the potential for better technology in neutron based systems. Illicit cargo detection is the main impact that is highlighted by the article in terms of the impact of the technology on Homeland Security. Hazi, A. (2005). Screening cargo containers to remove a terrorist threat. Lawrence Livermore National Laboratories, United States Department of Energy. The article makes an informative description of the intersection of commerce and security at seaports in terms of ensuring security is checked while activities at the airport run smoothly. The effect is the need to have the improved technology at seaports with the article explaining the research undertaken by Lawrence Livermore researchers on radiation science and detection to achieve this goal. The article explains the neutron interrogation system for cargo containers that will allow for quick screening of shipments for plutonium and highly enriched uranium, nuclear materials. The article tackles an important Homeland Security function, hence an important addition to the research owing to the in-depth analysis of technology improvement for nuclear material detection at seaports. This information will be important in the review of the literature of the research on the impact of technology on Homeland Security. Homeland Security. (December 15, 2008). Privacy Impact Assessment for the Future Attribute Technology (FAST) Project. The article reviews the impacts of the Fast project that aims at ensuring innovation and technology is harnessed to support, apply, and advance homeland technology in the provision of better security for the homeland. The article makes an exposure of the different technological tools that are poised for screening of people in evaluation of suspicious behaviour and the judgement of the implications of the behaviours. The article demonstrates the benefits of the FAST project including the ability of Homeland personnel to rapidly assess potential threats. The article has strengths that make it an important addition to the literature review including that it is authored by Homeland Security providing information on the first-hand experiences and the technological needs of the department in dealing with security issues. The article touches on the impacts of technology on certain functions of Homeland Security, which form the main basis for the research hence the need to have the research as part of the literature. The article also depicts the measures that are taken to ensure the privacy of the participants and the general public faced by technological improvements in Homeland security making an argument for the impact of technology on Homeland Security. Office of the President of the United States of America. (April, 2005). Science and Technology a Foundation for Homeland Security. The article states the importance of science and technology in protecting the homeland both from catastrophic events and terrorism. Radiological, medical, and nuclear countermeasures, biological & chemical threat detection, and use of protection are the avenues for use of technology in defending the homeland from catastrophic events. The articles detail different aspects through which science and technology have been monumental in dealing with terrorism. The facets through which science and technology play an important role include research and development coordination, intent detection, technical analysis, biometric identification, first responder capabilities among other ways analysed in the article. The article involves the highest office in the land and is aimed at making policy hence high credibility of the research. The article also provides in-depth attention on both terrorism and catastrophic protection through the use of technology, which are the main homeland functions. This makes the article an important piece for inclusion in the research literature on technology impacts on Homeland Security. Jackson, B. (January 2009). “Technology Strategies for Homeland Security: Adaptation and Coevolution of Offense and Defense.” Homeland Security Affairs 5, (4), https://www.hsaj.org/articles/109 The article begins with the portrayal of the actions of terrorists that are mainly anchored on production of fear and damage with the main use of technology. To counter terrorism, Homeland Technology has a reliance on technology to be in a position to meet these threats head on and protect Americans. The article expounds on the adaptation and coevolution of offense and defence by terrorists and Homeland Security respectively with emphasis on the use of technology in the process. Terrorist tailor activities are depending on the technology and weapons at their disposal. The article demonstrates the need to have technology that is flexible in building defensive approaches, shaping choices for the adversaries, and reducing sensitivity to change and adaptation to terrorists. The article takes on the core functions of Homeland security and takes a lot of research and examples of the technology used by both terrorists and homeland security. The article takes time to explain the need for technology incorporation in Homeland security. The article will provide the much-needed emphasis on the impact of technology on Homeland Security. The article also forms a platform to blend the other research on other functions of Homeland Security with the terrorist activities touched on by the article to make comprehensive research. Conclusion The articles depict the monumental role played by technology in the activities by Homeland security in ensuring the safety of the American citizens. There is a huge quantity of research that points to the dependence on technology at Homeland security especially in the prevention and enforcement phases of protecting the homeland. The sources are wide and written by varied authors under different organizations and aimed at meeting different purposes allowing for the research authenticity, reduced bias, and objectivity. The articles will aid in the formation of a strong conclusion on the impacts of technology on Homeland Security. References Braun, E. (1998). Technology in context: Technology assessment for managers. London: Routledge. Jones, J., (2003). Active, non-intrusive inspection technologies for homeland defense. Idaho National Engineering and Environmental Laboratory, Retrieved from http://www.inl.gov/technicalpublications/Documents/2585364.pdf Homeland Security. (February 3, 2015). DHS Digital Strategy. Retrieved on February 10, 2015 from http://www.dhs.gov/dhs-digital-strategy Orphan, V., Muenchau, E., Gormley, J. & Richardson, R. (2005). Advanced y ray technology for scanning cargo containers. Applied Radiation and Isotopes, 63 (5/6), 723-732. Gozani, T. (2007). Principles and applications of neutron-based inspection techniques. Nuclear Instruments & Methods in Physics Research, 261 (1-2), 311-315. Hazi, A. (2005). Screening cargo containers to remove a terrorist threat. Lawrence Livermore National Laboratories, United States Department of Energy. Homeland Security. (December 15, 2008). Privacy Impact assessment for the Future Attribute Technology (FAST) Project. Office of the President of the United States of America. (April, 2005). Science and Technology a Foundation for Homeland Security. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Impact of Technology on Homeland Security Annotated Bibliography”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1677259-the-impact-of-technology-on-homeland-security
(The Impact of Technology on Homeland Security Annotated Bibliography)
https://studentshare.org/miscellaneous/1677259-the-impact-of-technology-on-homeland-security.
“The Impact of Technology on Homeland Security Annotated Bibliography”, n.d. https://studentshare.org/miscellaneous/1677259-the-impact-of-technology-on-homeland-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Impact of Technology on Homeland Security

Homeland Security

This paper focuses on the major components of homeland security and their functions since the September 11 attack.... As a result of research it was suggested that the urgency, with which the department of homeland security was created after the September 11 attacks, raised the question whether America would successfully fight against the international terrorists, more specifically al-Qaeda and its Taliban allies who threatened the nation.... The author has rightly presented that in America, homeland security has always been a matter of concern long before the September 11 attacks....
8 Pages (2000 words) Research Paper

Homeland Security

If one were to define homeland security, it would be something like this : homeland security is the action taken by a domestic government to prevent, detect, respond to, and recover from terrorist attacks and also natural disasters.... homeland security is defined by the National.... rategy for homeland security (2002) as "a concerted national effort to prevent terrorist attacks within the United States, reduce Americas vulnerability to terrorism, and minimize the damage and recover from attacks that do occur"....
4 Pages (1000 words) Research Paper

Technological Issue in Homeland Security

The author discusses how information technology has impacted homeland security.... , homeland security Department makes use of technology since, without using technology, dealing with terrorism could be a predicament.... homeland security Department makes use of technology since, without using technology, dealing with terrorism could be a predicament.... On the side of homeland security, the internet has been an excellent tool since it has assisted the department in identifying individuals who are terrorists through the use of biometric technology....
8 Pages (2000 words) Term Paper

HTreats to Homeland Security

he second course, The Unconventional Threat to homeland security, how terrorism operate and how there organized in terms of the extremists behind them and the groups.... Research writing and homeland security and Research Colloquium are the two courses offered dealing with it.... The institution offers use of technology as a core course because the terrorist on our times employs technology to organize the crimes and implement.... As an a new applicant to pursue the Master Program at the Center of Homeland Defense and security (CHDS), the courses that the institution offers....
4 Pages (1000 words) Essay

Homeland Security

"homeland security" refers to the consorted efforts by the national and federal government of preventing and averting attacks of terror to the people f the United States of America.... The term homeland security started in 2003 when there was a reorganization of the state agencies after the devastating September 11th attack, hence seeing the formation of the Department The actions of this department are what are amalgamated into the term homeland security....
5 Pages (1250 words) Case Study

Quadrennial Homeland Security

The Department of homeland security is mandated with securing the united states of American on so many levels and grounds, starting from the borders to the cyberspace.... he private sector through firms in various sector has a fundamental impact on the way the homeland security department is able to accomplish this mission.... Technology firm in the private sector can also be very important in helping the department of homeland security to achieve this area....
5 Pages (1250 words) Assignment

Threat Posed by Cyber Crimes to Homeland Security

"Threat Posed by Cyber Crimes to homeland security" paper points out an example of an incident that has recently occurred and how it is a challenge to homeland security.... It also identifies viable solutions and countermeasures that homeland security is currently implementing to curb this threat.... The department of homeland security is tasked with the role of countering cyber threats and maintaining cybersecurity (DHS, 2010)....
6 Pages (1500 words) Coursework

Homeland Security

This paper '' Security'' tells that The final essay topic for this journal is homeland security.... The existence of homeland security has impacted many people for a long time though the security department has existed since 9/11.... Apart from terrorism, homeland security was entrusted with the well-being of the nation and anything or anyone that threatened the peace of the country.... in this article, the evolution of homeland security will be discussed broadly as well as several factors that affect the development of the department (Immell, 2010)....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us