StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Emergency Technologies - Essay Example

Cite this document
Summary
Technology has been a fundamental revolution in the global transformation of changes. This is in terms technologies such as phones and computers used to avert crimes and bring order in the society. Therefore, this essay is going to tackle various advantages of computer and computer technology especially in investigations (Easttom & Taylor, 2010). …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
Emergency Technologies
Read Text Preview

Extract of sample "Emergency Technologies"

Emergency Technologies Task: Technology has been a fundamental revolution in the global transformation of changes. This is in terms technologies such as phones and computers used to avert crimes and bring order in the society. Therefore, this essay is going to tackle various advantages of computer and computer technology especially in investigations (Easttom & Taylor, 2010). Additionally, the discussion delves on the disadvantages of the same technologies in abetting crimes such as hacking and phising.

There are various advantages of computers and the use of computer technology in investigations. For instance, in the determination of crimes, it is essential to conduct forensic investigations. This is to identify their authenticity in order to unearth the evidence. However, despite the numerous benefits of forensics, it also has its disadvantages. On that note, the prevention of crimes such as corporate fraud, intellectual property disputes, phising and contravention of the contract would most likely apply computer technology such as forensics to find the truth.

For instance, computer technology through forensics enables the investigators to search and examine hug amount of data fast and efficiently (Moore, 2010). In other words, such technology uses search keywords stored in a hard drive found in different languages. Additionally, computer technology mitigates on cyber crimes because they occur in the internet. Alternatively, the use of forensics is making it easy to recover valuable data that was previously lost and deleted especially in a court of law.

Therefore, during investigations the use of forensics is paramount in finger print identification and facial recognition of suspect. However, despite the numerous advantages of computers and computer technology, there are other disadvantages to law enforcement. For example, the advancement of technology has led to hacking by technical persons who stall systems and interfere with credit numbers of customers online. In the same context, the use of computer technology is hard to be accepted in court especially when law enforcement officers want to prosecute a suspect.

This is because the modification of data is easy for the criminals. Alternatively, only persons with knowledge in computer forensics may be able to determine if data is tampered with hence insubordination of the roles of law enforcement officers (Pattavina, 2004). This also applies in the retrieval of such data for the law enforcement officers who do not have the technical knowledge in the field. Furthermore, in order to burst crimes related to computers, the law enforcement is compelled to hire computer forensic experts who are paid per hour for their services.

On the same account, analysis and reporting of investigated data to the law enforcement may take more than 15 hours thus subjugating the validity of the presented case. Therefore, if the officers are careful, disclosure of privilege documents may be done by forensic analysts to the defendant hence interfere with the case. In other words, the integrity and independence of the case is not guaranteed if it involves cyber crime for untrained law enforcement officers. On that prospect, a good example of a case where the computer was used to aid in the commission of crime was during the 9/11 attacks off the U.S. During this period, terrorists shared coded emails and untapped phone calls to strategize on their mission.

Additionally, these terrorists hacked into the sensitive information of Department of Defense (DoD) of the US in order to determine the arrangement of buildings to be bombed (Savona, 2005). Similarly, the hijackers of the three planes hacked into the website of the air tower system in order to avoid counter attacks. On the other hand, case where the use of the computer was beneficial to the prosecution in a criminal case involves that O.J Simpson. After their successful robbery at a sports memorabilia, the former football star was arrested as a suspect (Easttom & Taylor, 2010).

Both police officers and forensic experts who picked fingerprint samples of the touched materials inside the memorabilia and matched them with those of the experts dusted the crime scene. During this process, most samples were discovered to match those of O.J Simpson including his weapon at the time of the robbery. Therefore, in conclusion, I think there are both benefits and hindrances to the use of technology by the law enforcement officers. For example, when used in forensics to determine the identity of suspects, it will help in the prosecution of criminal cases.

Similarly, technologies would help law enforcement efforts in gathering of electronic data that may be used in other cases (Moore, 2010). On the other hand, there are hindrances such as lack of technical training and skills of understanding crimes involving technology crime on the part of law enforcement officers. References Easttom, C. & Taylor, J. (2010). Computer Crime, Investigation, and the Law. New Jersey, NJ: Course Technology. Moore, R. (2010). Cybercrime: Investigating High-Technology Computer Crime.

New York, NY: Elsevier. Pattavina, A. (2004). Information Technology and the Criminal Justice System. New York, NY: SAGE. Savona, E. (2005). Crime and Technology: New Frontiers for Regulation, Law Enforcement and Research. New York, NY: Springer.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Emergency Technologies Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Emergency Technologies Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/design-technology/1456253-emergency-technologies-criminal-justice-class
(Emergency Technologies Essay Example | Topics and Well Written Essays - 500 Words)
Emergency Technologies Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/design-technology/1456253-emergency-technologies-criminal-justice-class.
“Emergency Technologies Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/design-technology/1456253-emergency-technologies-criminal-justice-class.
  • Cited: 0 times

CHECK THESE SAMPLES OF Emergency Technologies

Safety Training for Emergency Responders

Running Head: SAFETY TRAINING FOR EMERGENCY RESPONDERS Safety Training For Emergency Responders [ Name] [ School] Abstract The response to disasters over the last decade has raised questions regarding the effectiveness and capabilities of emergency responders, in spite of the continued development of new technologies to aid in emergency response.... hellip; This paper explains who emergency responders are, their different manifestations form the police, to the firefighters to the paramedics, what they do and some of the challenges that they face at work....
15 Pages (3750 words) Essay

Emergency planning and Business Continuity Management

The paper “emergency planning and Business Continuity Management” looks at the business environment, which has become complex.... Various internal and external factors contribute to this complexity.... Organizations have no choice but to determine and manage the risks....
19 Pages (4750 words) Research Proposal

State Disaster Management System and Emergency Operation Center

The center will incorporate Information, Communication and Space technologies (ICST) which bear wide-ranging applications for preempting, reducing and mitigating disaster such as hurricane and floods (Sahu, 2009).... Renewable energy technologies will be availed alongside continued food and medical supply until the residents regain their self sufficiency.... Guidebook on technologies for disaster preparedness and mitigation.... Recent disasters across the USA especially in terms of hurricanes, flooding and tornadoes among other events have made it imperative that each state develops feasible and well-planned disaster response systems, backed by well-equipped emergency Operations facilities such as the… Although preparations by Disaster Response Systems have been there for various events, hurricanes have recently proven to be a principal cause of concern....
2 Pages (500 words) Essay

The Media Effect in Communication

The authors offer a clear understanding on the way media technologies develop, converge and impact the society.... technologies.... technologies can educate the society on the emergency management; thus enabling people to utilize social media effectively.... technologies in order to facilitate clear understanding of the significant principles of social media.... technologies.... +technologies....
3 Pages (750 words) Essay

The Emergence of Contemporary Technologies

The paper under the title 'The emergence of Contemporary technologies' presents the growing which needs for a better tomorrow has changed the magnitude of academic work.... hellip; The emergence of contemporary technologies like EndNote proved to be a very beneficial aspect of technological advancement helped solve such a puzzle while also an improvement to the academic activities of knowledge seekers.... These technologies have often helped in improving the quality of research work thus uplifting the growth of various sectors....
9 Pages (2250 words) Research Paper

Emergency, Exception and New Technologies in International Relations

In his 2012 article titled “Cyber Conflict and International Humanitarian Law”, Herbert Lin highlights the vulnerability to cyber conflict which the globe is continually immersing itself into.... This emergence is caused by the fact that Information Technology, IT, has become… Vulnerability of cyberspace emerges in that parties who are not authorized to access any adversaries in cyberspace can devise means of In it, malicious actions such as usurping, destroying, altering, disabling, or damaging them occur....
4 Pages (1000 words) Essay

Mobile Networks in the Public Service Sector

In this paper, I will assess the mobile networking systems implementation for service and battement of the public service sectors such as police, fire, and emergency.... This research is aimed at the analysis of different areas of life regarding the implementation of a new “state of the art” mobile networking technology implementation....
12 Pages (3000 words) Term Paper

Communication Challenge in Emergency Management

This paper "Communication Challenge in emergency Management" focuses on the emergency or crisis management (EM) that entails an assortment of activities undertaken to minimize the impact of future probable disasters.... Also, taking into account that in an emergency situation information is widely distributed and owned by different agencies, lack of interoperability among EM agencies has complicated the information sharing process.... econdary data has been the main source of information relating to the communication challenges facing emergency management....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us