Terrorism essay
Terrorist attacks prevalence continues to happen in open occasions, congregations, and outside the guarded extents of an event, mostly due to the absence of security, access to public affairs, and huge uncontrolled entrance. Information technology plays a critical role in the elimination, identification, and reduction of terrorist threats. By allowing broader knowledge of crucial information in the intelligence department, information technology may aid the identification of significant behavior patterns. Data amalgamation aggregates data from various sources, intending to identify some insight into terrorist acts. IT also assists in revealing terrorists or their intentions in time to avoid attacks. IT facilitates fast and accurate discovery of attack characteristics and helps in giving quick feedback. The full use of computing technologies and advances in machine study, have made it manageable to sift across massive volumes of information associated with terrorism and offenses. Recognize of fundamental causes and correlations, utilization, processing of information, and circulations is significant to facilitate agile safety.
Data fusion assures to exercise a significant responsibility in elimination, identification, and feedback to terrorism. e.g., checkpoint successfulness in airline entering gates could become significantly advanced through data infusion tools to backup checkpoint activities in actual time. Data mining can be useful in countering terrorist activities through data being in several varying and non-structured for, e.g., videos, messages, and pictures, which are in various languages(Lyon,2007). Sensors, which detect harm in surroundings, and work well when joined in a sensor transmission network. C3I are technologies that are crucial for emergency feedback for organizing their efforts and advancing the rapidness and effectiveness of their response to terrorist acts.
A risk assessment
Identifying hazards: When it comes to terrorism, keen threat identification is vital since there are several potential threats to consider. Terrorism can involve explosion, acts linked with the preparation of explosives, arson, and firing bullets. Therefore, with such a broad range of threat assessment. We might have to examine subjects that enhance and minimize the probability of a terror team membership. To another extent, we may be excited about the threat a terrorist team or a person who is a member of the terror team portrays in terms of the possibility of the terrorist occurrence. In another stage, we might be interested in the risk of occurrence of a particular expression of terrorist destruction, e.g., probability of experiencing explosions or shootings from a specific group (Graaf,2001)
The frequency of a threat: It implies how frequent risks are probably to happen within a given time frame. When looking at the time factor, the suggested frequency of the threat should become established with a time gauge, which is practically of help (Horgan,2005). Under a terrorist context, time might be of added significance. Considering terrorist associations might carry out their activities towards particular periods, e.g., certain anniversaries.
The issue of low base rate: Necessarily this implies that the threat in question is very general relative to other types of activities. e.g., back in 2005 in America, 56 people died from a terrorist act. terrorist acts may, therefore, get classified as relatively rare occurrences
Repeated Threat Assessment: The risk of a threat to rise or fall depends on the participant’s change of behavior, situations, and specific threat management approaches used. Therefore, threats assessment must be conducted regularly to identify these transformations. For example, a terrorist team might give a minimal risk of holding an attack without using bombs. However, the threat that they instill will transform if they opt to use explosives. It is crucial to know all the likelihood absent in a particular kind of weapons which might be impactful in the establishment of other types of risks by the terrorist team. The requirement to get money with which they buy the tools and bomb s, for example, might raise the risk of terrorist association undertaking and supporting terrorist actions. Therefore, risk assessment requires a continuous process that is keen on new trends of threats.