Thursday, April 18, 2019
Technology and civil security Essay Example | Topics and Well Written Essays - 750 words
Technology and elegant pledge - Essay Exampleto employ and curry expert staff with an aim of developing counter technologies that will effectively prevent terrorist attacks, mitigate natural hazards, protect critical infrastructure, improve all-hazards preparedness, support disaster response, continuity and recovery. As such, we can devise shipway that will hinder the use of engine room in terrorism, mass destruction, and disruption.Actually, there are many demonstrations on the impact of engine room on warfare and security. Most assuredly, the unavoidable diffusion of technology has led to the misadventure of using technology in irresponsible manner that propagates terrorism and jeopardizes civil security (Mallik, 2012). Security is graceful an increasingly important facet of global society. However, many technological aspects enable the protection of citizens and state from organised crime, natural calamities, and terrorism (European Nanotechnology Gateway, 2007). Nevert heless, there are various concepts of technology that enable crime, security, and policing (McQuade, 2011). As seen herein, the effects of technology on civil security are diverse. Indeed, criminals use technology to access secret presidential term files, base viral attacks to secret systems, create advanced missiles, and launch missile attacks, and counteracting security and policing procedures. As such, the use of technology by the criminals has led to complex criminal activities, unmanageable security threats to the society. On the other hand, the federal government adopts a security theme that seeks to develop technologies that will build significant potential to guarantee the security of citizens from terrorism and other forms of crime.Moreover, there is an objective to incorporate technology in European security for purposes of promoting civil security, reducing security gaps, and improving the competitiveness of the European security industry (European Commission, 2012).Ide ally, we can devise technological measures geared towards
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.