Verified Document

Communications Interagency Technology Security Essay

Related Topics:

Public service organizations and other large bureaucracies with hierarchical structures depend on technology for effective communications. Those communications do need to be guided by protocol that reflects the overall mission, values, and goals of the organization, to prevent ethical infractions, and to preserve chains of command. However, the constraints of bureaucratic communications procedures and protocol can be perceived of as stifling interagency cooperation. The communication barriers that prevent effective interagency cooperation are not necessarily linked to technology, nor even to rules and protocol, but rather to typical communication barriers like ineffective encoding and decoding of messages and their meanings (Widhiastuti, 2012). Technology can be used to break down communication barriers while improving the outcomes of existing communication breakdowns. For example, technological tools can be used to create transparent and open forum discussions that allow for multilateral discussions. Technology also permits asynchronous communications, which prevent hasty information decoding and therefore prevent miscommunications. Some technological tools can be used to provide more media-rich accounts, which can also help reduce the burden on verbal communications in a culturally or linguistically diverse organizational environment.

Technology is instrumental for improving interagency communications, particularly during times of crisis or other situations requiring a...

The key principles of interagency communication include honesty, regularity, clarity, monitoring, feedback, and role clarity (Tampere, n.d.). Moreover, consistent technological platforms need to be used to prevent unnecessary problems in critical communications scenarios. Technology can be used to enhance interagency communications via the sharing of multimedia data as well as verbal message transmissions.
Technological tools that enhance safety and security bolster critical infrastructure and improve overall resilience. However, safety and security networks need to be regular updated and maintained. Technology can be employed specifically for the purposes of security management, training, and consistent monitoring of all essential services. Likewise, technology can be used as a means of interfacing with the public during crisis scenarios. Each agency can establish its own channel of communication, providing the public and other external stakeholders with access to multiple messages via many media channels. Social media and other new media can also be leveraged for informing the public about critical infrastructure breakdowns and updates.

Current types of technology used in the protection of critical infrastructure and during interagency interactions are generally effective but continually evolving to be more so. A plethora of products and services, some of which are proprietary, make interagency communications complicated…

Cite this Document:
Copy Bibliography Citation

Related Documents

Security Information Is the Power. The Importance
Words: 5012 Length: 15 Document Type: Term Paper

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Technology - Biological Science Weapons
Words: 625 Length: 2 Document Type: Term Paper

2 Implications for Homeland Security and Law Enforcement: Generally, any biological weapons attack that necessitates a federal response requires local authorities to provide site security while also ensuring that maintenance of essential police and emergency services by local agencies who are most familiar with the geography and public utilities.3 in that respect, biological weapons terrorist attacks require effective crisis management planning well in advance to establish emergency mobilization procedures and to

Challenges Facing the Department of Homeland Security With New Technology...
Words: 1922 Length: 6 Document Type: Research Paper

Department of Homeland Security is clearly start-up: How quickly can DHS be up and running? The department formally began operating on January 24, 2003, and by March 1 had absorbed representatives from most of its component parts. The formal process of transferring agencies is expected to be completed by September 30, 2003, but analysts suggest full integration of agencies will take at least several years. Notwithstanding, as a practical matter,

Managing Homeland Security You Were
Words: 2062 Length: 5 Document Type: Essay

S. DHS "Strategic Plan," 2008, http://www.dhs.gov/xabout/strategicplan/) Realistically acts of terrorism, domestic or foreign are exceedingly rare, though slightly more common than they have been in the past and at least marginally more violent in nature, they occur very, very rarely. (Lewis, 2000, p. 201) Though maintaining serious preparedness the mitigation of natural disasters, most which cannot be avoided is an issue needed to be addressed almost yearly, on both small

My Personal Interest in a Career in Information Technology IT
Words: 805 Length: 3 Document Type: Term Paper

information technology skills I acquired through the military are transferable to civilian situations. The 20 years I gave to the military have placed me in a wide variety of situations quite different from what others might encounter in civilian life. My experience in the U.S. Navy has allowed me to learn new skills in the information technology field and I have been able to apply them in new situations. The

Emergency Management Evaluate the Cims Program As
Words: 2015 Length: 5 Document Type: Term Paper

Emergency Management Evaluate the CIMS program as a means for implementing the NIMS It was on May 14, 2004 when Major Bloomberg and the Office of the Emergency Management -- OEM came with the declaration of the City's introduction of the Citywide Incident Management System -- CIMS as the City's proposal for dealing with emergency recovery plans and also for managing the planned events. From that time onwards, the City's first responder

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now