Paper Example on Information Sharing

Paper Type:  Essay
Pages:  2
Wordcount:  499 Words
Date:  2022-06-19
Categories: 

Information Sharing Methods and Problems

Homeland security mandated with protecting the United States within at and outside borders through preparing for, preventing and responding to terrorist threats domestically. Homeland security works at the civilian sphere, and thus it is required that information sharing is a significant aspect of ensuring that it carries out its functions effectively. One of the focal methods is fusion centers located nationally that analyze, gather, and share threat information between state, citizens, territorial and private sector. Problems faced are such as cyber-attacks, internal threats to information and nuclear propagation.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Ways to Improve Information Sharing

Several techniques can improve information sharing such as high-end technology communication and information systems. Moreover, use risk management approach rather than avoiding the risk. More methods used in information sharing are such as, SAR process of reporting, tracking and accessing information in a manner that ensures confidentiality. Use of National Terrorism Advisory System (NTAS) that effectually communicates detailed and timely information about threats to the government, citizens, and private sector. Implementing public awareness program to report suspicious activity to law enforcement. Jasper (2017) notes that through proper channels of information sharing, 39% of threats could be avoided. Logos set that if danger is prominent sharing information has the threat through merged efforts (Moritz et al. 2016).

Social Media for Emergency Information

One of the most common drawbacks of relying on social media for information is that sometimes information shared may not be accurate. Misleads are common and often make the public uneasy for no reason. Moreover, once federals dispatch information, it may be changed and distorted by malicious people reaching a group of people wrongly and thus increasing the potential terrorist attacks (Imran, Castillo, Diaz & Vieweg, 2015). Recently Hawaii residents were advised to seek shelter from ballistic missile threat that leads to panic throughout which later identified as a false alarm. The prevalence of the news in social media made its top story for most of private and citizens worrying about the effects the missile would have caused.

Contributions of the Ham Radio

A capability of ham radio is voice communications across stretched distances. During a terrorist attack where blockage or damage of mobile system happens, Armature radios provide an only communication system link between rescuers. Moreover, victims that are unable to get through the overload of the 911 response system may use the ham radio to call for help. A principle that seems to be proven is the capability of frequently identifying the names and the reason for using the net.

References

Imran, M., Castillo, C., Diaz, F., & Vieweg, S. (2015). Processing social media messages in a mass emergency: A survey. ACM Computing Surveys (CSUR), 47(4), 67.

Jasper, S. E. (2017). US cyber threat intelligence sharing frameworks. International Journal of Intelligence and CounterIntelligence, 30(1), 53-65.

Moritz, M., Wiederhold, A., Pavlek, B., Bizzoni, Y., & Buchler, M. (2016). Non-literal text reuse in historical texts: An approach to identify reuse transformations and its application to bible reuse. In Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing (pp. 1849-1859).

Cite this page

Paper Example on Information Sharing. (2022, Jun 19). Retrieved from https://proessays.net/essays/paper-example-on-information-sharing

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism