Technology in Disaster Management Over Research Paper

Download this Research Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Research Paper:

This is an important element, in reducing the overall amounts of collateral damage and casualties from these events.

How the Use of this Technology is Helping to Address Risk Management

The use of this technology will play an interconnected role in the larger disaster management plan that an organization will utilize. Where, it will consist of two parts to include: prevention and response. Prevention is when you are taking into account a number of different elements to limit the possible damages. This is when you are utilizing technology, as a part of the strategy to: assess the vulnerability of site and to provide back up support in the event of a disaster taking place. (Auserwald, 2005) During this phase of the disaster management plan, both GIS as well as CRG protocols can play a vital role in helping to: understand these weaknesses, address them and provide an effective solution in the event of disaster. When you compare and contrast this with government and private agencies, these tools help to prevent damage to property as well as mitigate any kind of casualties. Where, these they can be used to take a proactive approach in addressing the problem. In many ways one could argue, that this is the key to preventing manmade and natural disasters from spiraling out of control. (Auserwald, 2005)

Response is when you are reacting to the various events surrounding a disaster that has taken place. There a number of different elements that are taken into consideration as this part of the disaster management plan to include: rescue, relief and recovery. In this case, GIS and CRG technology can help to improve communication as well as coordination in the aftermath of these events. As they can help first responders to understand where they are needed the most and they help to more effectively assess damage. (Auserwald, 2005) at the same time, these tools will ensure that key data is provided in real time to different levels within the chain of command and there is sufficient communication. When you put these different elements together, this will help all entities to be able to address any areas of the disaster management plan through the use of these tools.

As you compare and contrast these different technology solutions to government as well as private agencies, it is clear they are providing an effective way of: assessing any kind of damage and quickly reaching those individuals who maybe injured. As it will help first responders along with the command structure to understand where these resources are needed most. At the same time, it helps to improve recovery efforts by ensuring that all data is protected and updated in real time (to reflect the changes that are occurring). This is significant, because it is highlighting how the use of this technology can help both governments and private organizations to be able to understand the overall nature of the threats they are facing. At which point, they can be prepared for them by addressing these issues and ensuring that the resources are sent where they are most needed.

Clearly, technology is helping both private organizations and governments to tackle a host of different threats from manmade as well as natural disasters. This is because the events surrounding September 11th and improvements in technology have forced organizations to begin utilizing such a strategy. Where, GIS and CRG protocols have been continually utilized on a regular basis. The reason why is because these tools can help any organization to effectively plan and understand the overall threats that they are facing. At the same time, it is ensuring that there are sufficient resources that are in place in the event that such incidents would occur. This is important, because it shows how these different tools can help to prevent possible disasters from occurring at specific locations. As the GIS technology can provide an effective solution for assessing the possible vulnerabilities and helping to coordinate resources / provide assessments in the aftermath of these events. While CRG technology, would be utilized to address the possible communications issues that could be faced in the aftermath of an event. It can also improve collaboration between: the public, first responders, government entities and the command structure of the operation. When you compare and contrast how these tools help to improve an organizations ability to respond to these events, it is obvious that they are seeking a proactive approach in dealing with the various challenges. This is significant, because it shows how the different tools can be utilized by both organizations, to prevent the possibility of the events taking place and limiting the amounts damage. If these objectives can be achieved, the odds improve dramatically that private agencies and governments can be able to effectively tackle these challenges. Once this occurs, it reduces the chances of manmade and natural disasters having an adverse effect upon a location.

Bibliography

Auserwald, P. (2005). The Challenge of Protecting Critical Infrastructure. (Dissertation). Retrieved from University of Pennsylvania. (0511)

Eden, B. (2005). 2D and 3D Information. American Library Association 41 (1). 18 --…[continue]

Cite This Research Paper:

"Technology In Disaster Management Over" (2010, November 29) Retrieved December 5, 2016, from http://www.paperdue.com/essay/technology-in-disaster-management-over-6283

"Technology In Disaster Management Over" 29 November 2010. Web.5 December. 2016. <http://www.paperdue.com/essay/technology-in-disaster-management-over-6283>

"Technology In Disaster Management Over", 29 November 2010, Accessed.5 December. 2016, http://www.paperdue.com/essay/technology-in-disaster-management-over-6283

Other Documents Pertaining To This Topic

  • Technologies in Disaster Management the

    The lack of onsite training and motivation is not a problem anymore as terrorists get to watch videos of dangerous activities (destroying helicopters, beheading soldiers etc.) and read digitized letters of suicide bombers. Google earth is a software which uses satellite images to enhance maps to a whole new level. However its capabilities can backfire with regards to safety as terrorists might use it to plan attacks on crucial

  • Disaster Management Plan Scenario XYZ

    The disaster management plan will minimize the potentialities of the disaster in the areas as follows: (1) Minimizing potential economic loss; (2) Decreasing potential exposures; (3) Reducing the probability of occurrence; (4) Reduction of disruptions to operations; (5) providing an orderly recovery; (6) minimizing insurance premiums; (7) reduction of reliance on certain key individuals; (8) protecting organizational assets; (9) ensuring the safety of personnel and customer; (10) Reducing disruptions

  • Disaster Management Natural Disasters Such

    A b) Event management People react differently when faced with disaster, some may respond and follow the disaster response plan without a problem, other may forget key instructions and follow their own plans, the most dangerous situations however, are when individuals freeze and fail to act when disaster strikes. Response before, during and after a disaster can be the difference between life and death. (Bridegan et al., 1997) Failure to heed

  • Management Over the Last Several Years a

    Management Over the last several years, a wide variety of financial institutions have been facing a number of different security challenges. This is because of the information that they are storing has sensitive data about their clients such as: the social security numbers and net worth. Over the course of time, this has become a major target for identify thieves who are looking to steal this material. At which point,

  • International Human Resource Management Over

    E. Nutra Sweet). At the same time, they also had a number of failures, like when they company replaced the original formula for their soft drink with a new one. This led to a massive revolt among consumers, who did not want this product. Instead, they demanded something that could bring both of these elements together. At which point, Coke would begin utilizing the original formula, with the understanding that

  • Emergency and Disaster Management

    Emergency and Disaster Management: Hurricanes Katrina and Ike In the recent decades, the United States of America has increasingly experienced various disasters not only from natural sources but also from industry and technology. The country has even faced deliberate disasters from terrorist sources. Unfortunately, there is no attenuation or lessening that is in sight at the moment. The predictions regarding the weather disturbances are increasing. There has been a continuation in

  • Managing Information Systems Introduction in

    Furuholt, (2006) argues that lack of management engagement to the acceptance of information systems has been a barrier to the implementation of information systems. The issues are even common with organizations in the developing countries where management does not give enough priority to the information systems implementation. Importantly, implementation of information systems requires management support since management will need to approve fund that would be used for IS implementation.


Read Full Research Paper
Copyright 2016 . All Rights Reserved