Communications Interagency Technology Security Essay


Public service organizations and other large bureaucracies with hierarchical structures depend on technology for effective communications. Those communications do need to be guided by protocol that reflects the overall mission, values, and goals of the organization, to prevent ethical infractions, and to preserve chains of command. However, the constraints of bureaucratic communications procedures and protocol can be perceived of as stifling interagency cooperation. The communication barriers that prevent effective interagency cooperation are not necessarily linked to technology, nor even to rules and protocol, but rather to typical communication barriers like ineffective encoding and decoding of messages and their meanings (Widhiastuti, 2012). Technology can be used to break down communication barriers while improving the outcomes of existing communication breakdowns. For example, technological tools can be used to create transparent and open forum discussions that allow for multilateral discussions. Technology also permits asynchronous communications, which prevent hasty information decoding and therefore prevent miscommunications. Some technological tools can be used to provide more media-rich accounts, which can also help reduce the burden on verbal communications in a culturally or linguistically diverse organizational environment.

Technology is instrumental for improving interagency communications, particularly during times of crisis or other situations requiring a...


The key principles of interagency communication include honesty, regularity, clarity, monitoring, feedback, and role clarity (Tampere, n.d.). Moreover, consistent technological platforms need to be used to prevent unnecessary problems in critical communications scenarios. Technology can be used to enhance interagency communications via the sharing of multimedia data as well as verbal message transmissions.
Technological tools that enhance safety and security bolster critical infrastructure and improve overall resilience. However, safety and security networks need to be regular updated and maintained. Technology can be employed specifically for the purposes of security management, training, and consistent monitoring of all essential services. Likewise, technology can be used as a means of interfacing with the public during crisis scenarios. Each agency can establish its own channel of communication, providing the public and other external stakeholders with access to multiple messages via many media channels. Social media and other new media can also be leveraged for informing the public about critical infrastructure breakdowns and updates.

Current types of technology used in the protection of critical infrastructure and during interagency interactions are generally effective but continually evolving to be more so. A plethora of products and services, some of which are proprietary, make interagency communications complicated…

Cite this Document:

"Communications Interagency Technology Security" (2018, October 03) Retrieved April 23, 2024, from

"Communications Interagency Technology Security" 03 October 2018. Web.23 April. 2024. <>

"Communications Interagency Technology Security", 03 October 2018, Accessed.23 April. 2024,

Related Documents

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

2 Implications for Homeland Security and Law Enforcement: Generally, any biological weapons attack that necessitates a federal response requires local authorities to provide site security while also ensuring that maintenance of essential police and emergency services by local agencies who are most familiar with the geography and public utilities.3 in that respect, biological weapons terrorist attacks require effective crisis management planning well in advance to establish emergency mobilization procedures and to

The other components of DNI office operate under the guidance of heads of independent departments. The apparent organizational chart of DNI office is grounded on a middle link between confederated model and the intelligence department with line managers over different functions. This services resources with and not daily guidelines of the subordinate structures. This design was introduced by the 2004 Act that formed the office of DNI (United States,

S. DHS "Strategic Plan," 2008, Realistically acts of terrorism, domestic or foreign are exceedingly rare, though slightly more common than they have been in the past and at least marginally more violent in nature, they occur very, very rarely. (Lewis, 2000, p. 201) Though maintaining serious preparedness the mitigation of natural disasters, most which cannot be avoided is an issue needed to be addressed almost yearly, on both small

Department of Homeland Security is clearly start-up: How quickly can DHS be up and running? The department formally began operating on January 24, 2003, and by March 1 had absorbed representatives from most of its component parts. The formal process of transferring agencies is expected to be completed by September 30, 2003, but analysts suggest full integration of agencies will take at least several years. Notwithstanding, as a practical matter,

Port Security The CBP (Customs and Border Protection) is a unit in the homeland security department and is the agency responsible for regulating, monitoring and facilitating flow of products at the points of entry. CBP policy formulation is done is such a way as to ensure that there is smooth movement of cargo through the border line. CBP enforces the customs and trade rules which are put in place with a