Saturday, September 7, 2019
Technology and civil security Essay Example | Topics and Well Written Essays - 750 words
Technology and civil security - Essay Example to employ and train technological staff with an aim of developing counter technologies that will effectively prevent terrorist attacks, mitigate natural hazards, protect critical infrastructure, improve all-hazards preparedness, support disaster response, continuity and recovery. As such, we can devise ways that will hinder the use of technology in terrorism, mass destruction, and disruption. Actually, there are many demonstrations on the impact of technology on warfare and security. Most assuredly, the unavoidable diffusion of technology has led to the possibility of using technology in irresponsible manner that propagates terrorism and jeopardizes civil security (Mallik, 2012). Security is becoming an increasingly important facet of global society. However, many technological aspects enable the protection of citizens and state from organized crime, natural calamities, and terrorism (European Nanotechnology Gateway, 2007). Nevertheless, there are various concepts of technology that enable crime, security, and policing (McQuade, 2011). As seen herein, the effects of technology on civil security are diverse. Indeed, criminals use technology to access secret government files, launch viral attacks to secret systems, create advanced missiles, and launch missile attacks, and counteracting security and policing procedures. As such, the use of technology by the criminals has le d to complex criminal activities, unmanageable security threats to the society. On the other hand, the federal government adopts a security theme that seeks to develop technologies that will build significant potential to guarantee the security of citizens from terrorism and other forms of crime. Moreover, there is an objective to incorporate technology in European security for purposes of promoting civil security, reducing security gaps, and improving the competitiveness of the European security industry (European Commission, 2012). Ideally, we can devise technological measures geared towards
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.