Information Sharing Methods and Problems
Homeland security mandated with protecting the United States within at and outside borders through preparing for, preventing and responding to terrorist threats domestically. Homeland security works at the civilian sphere, and thus it is required that information sharing is a significant aspect of ensuring that it carries out its functions effectively. One of the focal methods is fusion centers located nationally that analyze, gather, and share threat information between state, citizens, territorial and private sector. Problems faced are such as cyber-attacks, internal threats to information and nuclear propagation.
Ways to Improve Information Sharing
Several techniques can improve information sharing such as high-end technology communication and information systems. Moreover, use risk management approach rather than avoiding the risk. More methods used in information sharing are such as, SAR process of reporting, tracking and accessing information in a manner that ensures confidentiality. Use of National Terrorism Advisory System (NTAS) that effectually communicates detailed and timely information about threats to the government, citizens, and private sector. Implementing public awareness program to report suspicious activity to law enforcement. Jasper (2017) notes that through proper channels of information sharing, 39% of threats could be avoided. Logos set that if danger is prominent sharing information has the threat through merged efforts (Moritz et al. 2016).
Social Media for Emergency Information
One of the most common drawbacks of relying on social media for information is that sometimes information shared may not be accurate. Misleads are common and often make the public uneasy for no reason. Moreover, once federals dispatch information, it may be changed and distorted by malicious people reaching a group of people wrongly and thus increasing the potential terrorist attacks (Imran, Castillo, Diaz & Vieweg, 2015). Recently Hawaii residents were advised to seek shelter from ballistic missile threat that leads to panic throughout which later identified as a false alarm. The prevalence of the news in social media made its top story for most of private and citizens worrying about the effects the missile would have caused.
Contributions of the Ham Radio
A capability of ham radio is voice communications across stretched distances. During a terrorist attack where blockage or damage of mobile system happens, Armature radios provide an only communication system link between rescuers. Moreover, victims that are unable to get through the overload of the 911 response system may use the ham radio to call for help. A principle that seems to be proven is the capability of frequently identifying the names and the reason for using the net.
References
Imran, M., Castillo, C., Diaz, F., & Vieweg, S. (2015). Processing social media messages in a mass emergency: A survey. ACM Computing Surveys (CSUR), 47(4), 67.
Jasper, S. E. (2017). US cyber threat intelligence sharing frameworks. International Journal of Intelligence and CounterIntelligence, 30(1), 53-65.
Moritz, M., Wiederhold, A., Pavlek, B., Bizzoni, Y., & Buchler, M. (2016). Non-literal text reuse in historical texts: An approach to identify reuse transformations and its application to bible reuse. In Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing (pp. 1849-1859).
Cite this page
Paper Example on Information Sharing. (2022, Jun 19). Retrieved from https://proessays.net/essays/paper-example-on-information-sharing
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Subjective and Objective Descriptive Essays
- Effects of Social Media on Physical and Mental Health Essay
- Film Analysis Essay on Vice: Narrative Time, Space, Causality and Change
- Black Mirror: The Entire History of You Essay
- Essay Example on End Misogyny in Music: Its Effects on Society & Young Listeners
- Exploring Socio-Economic Marginalization - Movie Review Sample
- How Wolves Change Rivers - Movie Review Sample