.

Friday, April 26, 2019

How technologies can be used to make the border system stronger Dissertation

How technologies butt joint be used to make the border system stronger - Dissertation simulationThe topic of research is based on the concept of border security. In the past, the researcher has worked in the country of origin gage Centers of Excellence and it is through his experience at the department that directed him towards basing his research project on border security. Homeland Security dispatches a range of resources and funds to the federal, state and the local governments, allowing the amalgamation of a number of individually-operating agencies into a collective whole. The agencies work in quislingism with each other for the achievement of shared out objectives. These objectives aim to uphold the integrity and security of the country and subserve to provide the utmost protection to the US population. The Homeland Security Centers of Excellence operate under the Office of University Programs and aim to recruit and attract historied researchers and enthusiasts for carryi ng out research programs. The research brings together professionals from various fields and uses their expertise to come up with solutions for homeland security. Each research center is affiliated with a university and their research ventures are supported and collaborated upon by a number of agencies including think tanks, laboratories, and private institutions. The research work carried out at the Security Centers is in situation with the research requirements of the divisions of the Department of Homeland SecurityScience and Technology Directorate. The collaboration helps to deliver top-of-the-line technology solutions for the problems approach the Department as well as the country on the whole (U.S. Department of Homeland Security 2009). In particular, one of the Centers, National Center for Border Security and Immigration, is focused on the promotion and sweetener of border security. This was the Center that I was associated with. The Centre is led and supported by two univ ersities one existence the research co-lead while the other is the education co-lead. The Center is committed to the development of technologies, tools and sophisticated procedures to regulate and monitoring device immigration and business across the borders. This involves the development of projects that promote border security and make it stronger and more effective. in that location are a number of aspects relating to borders security that the Center focuses on these include risks and weaknesses, better oversight and screening, summary of immigration patterns and improvements in immigration law enforcement (U.S. Department of Homeland Security 2009). The conditions that stupefy developed afterward the 9/11 have exposed many gaps in the security and watch mechanisms. These gaps and vulnerabilities have ferment yet more acute in light of pressing security demands after the rise in terrorism over the previous years. Besides the post-9/11 conditions and terrorism there are ot her factors that have necessitated a revision of the immigration and border security systems. These include greater security reviews, insufficient collaboration with NGOs and the government, disputed policy tensions etc (Kerwin 2011). My research question is how important is border security today and what measures can be taken to improve it? The research project focuses in particular on the development and enforcement of better surveillance mechanisms and advanced technologies for regulating the influx of immigrants as well as goods such as false documents, misbranded medicines, drugs and other illegal items. The project focuses on various aspects associated with development of such technologies, including their pros and cons. One of the key features that guarantees the succeeder of a research project is the amount of information collected regarding it. Keeping this in mind, the research objectives can be defined as follows Revisiting the importance of border security Identifying the need to develop better methods of surveillance and border security Reviewing the available literature and successful technologies used

No comments:

Post a Comment