HMLS 310 Week 6 conference - Coursework Example

Comments (0) Cite this document
This prompted terrorist organizations to seek legitimacy through media coverage of their acts. Supporters of military frame typically…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
HMLS 310 Week 6 conference
Read TextPreview

Extract of sample "HMLS 310 Week 6 conference"

HMLS 310 Week 6 Conference HMLS 310 Week 6 Conference Anthrax attacks involved a bioterrorism attack where letters containing anthrax antidotes were mailed to different offices in the United States. This prompted terrorist organizations to seek legitimacy through media coverage of their acts. Supporters of military frame typically cast potential responses to “threats” as battles that must be won after the attacks (Driskill and Goldstein, 2005). This paper assesses two conferences which evaluate Congressional Research Service by Lindsay’s report on how social media could have been used during the attacks and EPA publication on effective risk and communication and the seven general rules of risk communication.
Conference 1#: Lindsay Congressional Research Service Report
It is evidential that the development of new technologies that have emerged during the mid-1990s has led to the establishment of internet based application referred to as the social media. This include blogs, discussions forums, you tube channels, Facebook and twitter. Most importantly, social media has played an increasing role in emergencies and disasters. This report summarizes how social media has been used by emergency management officials and agencies. It also evaluates the potential benefits and consequences of using social media in the context of emergency and disasters.
Generally in the anthrax attacks, social media would have been used as a medium for conducting emergency communications and issue warnings, receive victim’s requests for assistance, monitoring user’s activities and postings to determine situational awareness and using downloaded images to create damage estimates among others(1).
For instance in the attacks, social media would have been used to pass notifications by the use of Community Emergency Response Team (CERT), emergency warnings and alerts to citizens. Besides, social media would have been used to alert emergency officials on the anthrax attacks by monitoring the flow of information from different sources to help in the reduction of the number of casualties.
Conference 2#: Environmental Protection Agency Publication
Risk communication refers to the interactive process of exchanging information and opinion among individuals, groups, and institutions involving multiple messages about the nature of risk. It is a science based programme for communicating accurately and effectively in cases of extreme stress and concerns. Moreover, risk communication skills are imperative for the successful management of crises.
One way to achieve effective risk communication especially in the case of anthrax attack is through message mapping. This refers to the tool of risk communicator that involves the use of clear and credible messages without any mental noises. The key elements of message mapping involve the identification of potential stakeholders in this case the anthrax spread by terrorist. Identification of stakeholder questions for instance “how first will the antidote spread?” which leads to developing key messages by observing the templates and principles to target the specific audience. After this one develops supporting facts and later tests and practices these messages to confirm their effectiveness. Finally the message maps are delivered using the appropriate information channels for instance in this case the local authorities can be used to alert the citizens.
Besides, the most important rule in seven general rules of communication is to meet the needs of the media because information travels faster through it. Considering the anthrax attacks, the rule of listening to people was violated because rumors circulated in the media about assumptions and what people thought about the attacks some of which were false hence violating the rules.
Covello, V. (2007) Effective Risk and Crisis Communication during Water Security Emergencies. Summary Report of EPA sponsored Message Mapping Workshops.
Lindsay, B. (2011) Social Medias and Disasters: Current Uses, Future Options and Policy Considerations .Congressional Research Service. Read More
Cite this document
  • APA
  • MLA
(“HMLS 310 Week 6 conference Coursework Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from
(HMLS 310 Week 6 Conference Coursework Example | Topics and Well Written Essays - 500 Words)
“HMLS 310 Week 6 Conference Coursework Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF HMLS 310 Week 6 conference

HS630 Week 8 Conference

...HS630 Week 8 Conference Discuss 2 features of your chosen annex that you found useful and explain why you think that. Be sure to which annexyou are discussing. One found the Catastrophic Incident Annex useful because, the nature of the emergency situation itself, being a catastrophic incident, defined as “is any natural or manmade incident, including terrorism, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the population, infrastructure, environment, economy, national morale, and/or government functions” (Department of Homeland Security/Federal Emergency Management Agency, 2008, p. 1), is a potential threat and awareness on ways of preparing, addressing, and managing... and Engineering...
2 Pages(500 words)Essay

HS630 week 9 conference

...HS630 Week 9 Conference Essay Question Was the risk made clear or not? From the discussion of Lindell, Prater & Perry (2007), it was explicitly indicated that there are eight stages of a person’s information processing during a warning, of which the first stage is earmarked for risk identification (Lindell, Prater, & Perry, 2007, p. 78). As such, the authors emphasized that “the most important sources of risk identification are warning messages from authorities, the media, and peers. The first step you must take is to disseminate your message widely” (Lindell, Prater, & Perry, 2007, p. 78). In this regard, at the onset, risk was made apparently clear. Do people know what to do and when to do it? Through...
3 Pages(750 words)Essay

MGMT670 week 6 Conference

...Marketing Global Products Instructions: Task: Marketing Global Products Global products are identical products with uniform features and/or functions. In the contemporary business world, competition amongst such products is extensive. Consequently, marketing and promotion of products for a firm are unavoidable practices, if it is to thrive in the global market (Stonehouse & Purdie, 2004). To cap it all, most of the people today spend most of their time visiting diverse social media sites and watching various television programs. As a result, getting your company product’s brand name in any of the communication media and networks can lend a hand in letting people know of the product’s existence (Marquardt, 2012). If you have yet... Global...
2 Pages(500 words)Assignment

Week 7 Conference

...WEEK 7 CONFERENCE Sickle cell anemia Erythrocytes get produced in the bone marrow and they are responsible for circulating oxygen around the body tissues through blood flow. Leucocytes also get derived from the bone marrow. They form the immune system and are vital in defending the body against foreign material and disease (Cohen, 2013). Thrombocytes are formed in the bone marrow. They provide growth factors and are key to regulating blood loss through bleeding by formation of blood clots. The plasma makes about 55% of the human’s blood volume. Red cells make up 40-50 % of the blood. White cells comprise of 1% of the blood volume in healthy people. Hemoglobin is the blood protein that transports oxygen...
3 Pages(750 words)Essay

Week 3 Conference

...Military Tribunal Military tribunal Military tribunal is machinery that gives ity to the military officers to determine and hear cases that involve the violation of law of war against the United States. It is composed of the military officers who act as juror and as judges at the same time. The significance of the tribunal is ensuring that the persons, who have committed war crimes or terrorist, are punished for the crimes they have committed. These courts have been in place for a long time as they were used to try spies and war criminals. I do not agree that the military tribunal provide constitutional right fully because they do not provide tor the right of the due process of law that has been accorded to all accused persons... Tribunal...
2 Pages(500 words)Essay

Week 3 Conference

...Military Tribunal Military tribunal Military tribunal is a court that tries enemy forces at the time of war and it operates on its own that is it is independent. It is composed of the military officers who act as juror and as judges at the same time. The significance of the tribunal is ensuring that the persons, who have committed war crimes or terrorist, are punished for the crimes they have committed. The military tribunal was given more powers by the president Bush government, where he gave an order to the tribunal to detain the persons who were non-citizens and accused of committing international war crimes or terrorism. This order was issued on 13 November 2001. I do not agree that the military tribunal provide constitutional...
2 Pages(500 words)Essay

Week 6 class discussions

...Information Technology Security Information Technology Security Week 6 Discussion Cryptography means secrete writing (Coron, 2006). The main aim of cryptography is to protect the content of the message from unauthorized persons or programs. It ensures that communication between two devises happen securely over an insecure channel. Steganography means hiding of information in order not to be detected. It is advantageous to cryptography as the hidden message will not attract any audience. Watermarking involves embedding information to a host signal (Jiang, 2010). It operates with the principle of robustness to be safe against any attacks. Watermarking communication usually takes place in a one-to-many...
2 Pages(500 words)Assignment

Conference 6

...The role of National Security Council The role of National Security Council The National Security Council plays a vital role as far as the country economic position is of concern. In consideration of budget priorities, National Security Council ensures that there is high performance index as far as attraction of large flows of inward investment and fiscal deficit is of concern. As articulated from the Williams and Adams writing, the United States of America becomes one of the largest economic cooperation developers and top ranked state initiated by the National Security Council and vesting over $ 50 billion investors oversees. Determination of budget priorities however, leads to economic growth of entire country as well as state... role of...
1 Pages(250 words)Coursework

Conference week

... March 19, Globalisation and Anti-Globalisation The World Trade Organisation (WTO) supports neoliberal economic policies that encourage globalisation economically and politically through its promotion and negotiation of global trade agreements. It opens national markets to global trade through privatisation and deregulation. Global offers many articles against the WTO and globalisation. One of these articles comes from Michel Chossudovsky who argues that global capitalists are manufacturing dissent, or creating a false anti-globalisation movement, through funding the anti-globalisation movement. He believes that globalisation is wrong because it solely serves the interests of the ruling elites by controlling... March 19,...
1 Pages(250 words)Essay

Conference week 4

... Forward integration strategy comprises the Vertical integration (VI) strategy. VI is a business strategy, which companies normally use with the purpose of gaining control over the value chain of their industry. Forward integration strategy is therefore, a vertical integration strategy whereby a manufacturer obtains the distribution channels of its output to realize a higher market share or economies of scale. Normally, when a company, engages in sales or after-sales industries, it is certainly pursuing forward integration strategy. Most companies usually adopt this kind of strategies when they desire to gain a large market share or achieve a greater level of economies of scale. This strategy currently is evident with online... Forward...
3 Pages(750 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic HMLS 310 Week 6 conference for FREE!

Contact Us