Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Department of Homeland Security, and Science and Technology Policy and Politics - Essay Example

Comments (0) Cite this document
Science and technology has proven its significance and worth towards a country's unparalleled stability. On the other hand, there were several instances for science and technology's unrestricted capabilities are often neglected. The United States' haunting experience five years ago has continually disturbed the country…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
Department of Homeland Security, and Science and Technology Policy and Politics
Read TextPreview

Extract of sample "Department of Homeland Security, and Science and Technology Policy and Politics"

Download file to see previous pages Science is about the search for objective evidence that would support successful predictions about the world around us; while politics is about governing based on the public's acceptance of the legitimacy and accountability of elected officials. On the other hand, in the U.S. democracy, science and politics are uniquely dependent on one another, although the relationship has never been an easy one. The search for truth in science and for legitimacy in politics both require systems for generating public trust, but these systems are not the same, and indeed they are often incompatible. (Branscomb, Oct. 14, 2006) The need for both to be acceptable in the society entails great deal of issues that are needed to be resolved to attain the same goal of achieving strength and concord for the community.
The establishment of the Department of Homeland Security has created several issues about its yet another political dogma that might eventually become another burden of the federal government that will threaten the US community.
Although science and technology has an unlimited capacity in preserving peace and stability of a nation, the need for a government and public support is an integral part in its utmost success. Even the most basic research requires financial assistance from the government such that it may be able to provide an incomparable assistance to the society. This irrefutable fact, on the other hand, provides restrictions in its competence of granting both practical and cultural value to society. (Branscomb, Oct. 14, 2006)
Moreover, yet other factors that concerns public policy affect the various accomplishments that may have been attained by science and technology. Foreign policies that promote or limit collaborations of scientists worldwide may prevent new and innovative ideas to launch. The educational system that may train and develop the new breed of scientists in the future provides a very limited if not anything at all. The achievement of these goals of science and technology depends on new scientific institutions and facilities that would define the leading-edge capabilities of science. Finally, scientists, like other citizens, do care about how society uses the knowledge their research creates. In addition, for this reason, a great number of citizens are happy to serve on advisory committees even without financial compensation. (Branscomb, Oct. 14, 2006)
Scientists have often opposed the government although they have been accepting federal funding. The federal government perceives them as insufficiently grateful of their assistance for which these scientists overly contesting the government policies. Regardless of the situation, the government could not ignore the fact that science and technology and the people behind its research and implementation are a significant factor in attaining the nation's goals. Politicians still rely on the competent, objective, and useful science advices of the scientists such that in most cases, they are incapable of instigating the different functions of the government agencies that requires sound technical advices. (Branscomb, Oct. 14, 2006)
The Department of Homeland Security and Science and Technology Policy
And Politics in the US
Safeguarding the nation has turned out to be the main concern of the US federal ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Department of Homeland Security, and Science and Technology Policy and Essay”, n.d.)
Retrieved from
(Department of Homeland Security, and Science and Technology Policy and Essay)
“Department of Homeland Security, and Science and Technology Policy and Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Department of Homeland Security, and Science and Technology Policy and Politics

Department of Homeland Security

.... (Silverberg, 2011). The Department of Homeland Security faces many challenges as we move into the year 2012. Even though the wounds of 9/11 will fade as time passes on, lessons will be learned from it that will form our opinions, policies and actions for the future. Documenting the events of that day will be stored so that no American will ever have to feel threatened on their own soil or lose face in their own government in the aftermath. (Silverberg, 2011). References Department of Homeland Security, OIG. 31 December 2003. Major Management Challenges Facing the Department of HomelandSecurity. Web. 01 April 2012. Fiscal Year 2012 Budget in Brief. 2012. Fiscal Year 2012 Budget Request, U. S...
13 Pages(3250 words)Essay

Homeland Security-Policy Analysis

The act pointed out the major reason for the creation of the Homeland Department as the need to prevent radical assault in the U.S. Homeland Security Presidential Directive (HSPD) 12 – Policy for a Common Identification Standard for Federal Employees and Contractors There are several policies related to homeland security. One of these policies is the Homeland Security Presidential Directive 12. This policy is a general recognition standard for federal workforce and contractors. There are broad disparities in the value and security of recognition used to get access to secure amenities where there is the prospective for terrorist attacks. In order to eradicate these disparities, the United States Homeland Security Presidential Dire...
7 Pages(1750 words)Essay

Department of Homeland Security

... for securing the homeland is on the shoulders of Science and Technology directorate. The Information analysis and Infrastructure protection directorate takes the responsibility of analyzing the Intelligence and Information from agencies like CIA, FBI and NSA. The information collected by them includes issues related to threats for the homeland security and also regarding the risks in the nation’s infrastructure. On the surface the organization’s structure and responsibilities seem to satisfy the requirements to achieve the mission of this department. However, there are few loop holes that have been exposed recently. Failures of DHS and Suggestions for better DHS: This has resulted in many organizations questioning the purpose...
6 Pages(1500 words)Essay

The Department of Homeland Security

The DHS has several internal arms that contribute to the functioning of the organization such as Science and Technology, and the Office for Civil Rights and Civil liberties. These arms have been created for the sole purpose of serving DHS's mission. In addition, several independent agencies have departments that work in conjunction with the DHS and report to the Secretary. These include the Secret Service and the Coast Guard. This model assures greater cooperation between diverse independent organizations as they relate to such issues as immigration, border security, and search and rescue.
The DHS states that its mission is to "prevent and deter terrorist attacks and protect against and respond to threats and hazards to the...
3 Pages(750 words)Assignment

The Department of HomeLand Security

White (2011) asserts that, following the 2001, September 11th attacks, the United States government strived to intensify security and protect the international borders. As a result, the government formed the department of homeland security, which became operational on 24th January 2003. This department came into being when the Homeland Security act of 2002 was passed into law by the Senate. Since its formation, this department has become the third largest department in the cabinet. It ranks third after Department of that of Veteran affairs. The Senate enacted the homeland Security act of 2002. The Department of Homeland Security can be regarded as one of the executive departments, under title 5 of the United States code.
6 Pages(1500 words)Research Paper

Department of Homeland Security

...Department of Homeland Security The United s federal government through the Congress formed the in 2002 after the September 11 2001 terrorist attacks (Department of Homeland Security 1). The U.S Department of Homeland Security refers to an incorporation of 22 departments and agencies that unify and integrate to articulate the responsibility of enhancing state security in U.S.A (Department of Homeland Security 1). The U.S Department of Homeland Security has a wide jurisdiction that includes immigration enforcement, cyber security, countering terrorism, emergency response to all disasters, border, and custom issues. Ideally, the U.S federal government formed the U.S Department of Homeland Security to respond to the September 11 terrorist...
2 Pages(500 words)Research Paper

Security plan for Department of Homeland Security

efined as assets and systems vital for the national economic security, security and national public health safety for the United States of America (National Institute of Standards and Technology, 2014, p. 3).
The main aim is to provide and ensure the physical security for the Department of Homeland Security (DHS). In the physical security plan, the security objectives include only allowing authorized personnel inside the DHS building and further classification based on the type of critical infrastructure sub-departments within the DHS will also be required for any entry into the sub-departments.
A complete security department will be set up. In this security department, a comprehensive hierarchy of security officials will...
4 Pages(1000 words)Admission/Application Essay

Department of Homeland Security

... July The Department of Homeland Security (DHS) recently celebrated its 10th anniversary of existence. The creation of DHS combined 22 former agencies with over 180,000 people into the largest restructuring in the government since President Truman formed the Department of Defense (DoD) in 1947. In many ways, DHS is the most visible USG response to the terrorist threat. Rumors persist that many government officials continue to consider taking a critical, second look at the organizational composition of DHS. Does the DHS organization need a significant "redo." One of the goals for creating DHS was to improve the overall security/safety of the US critical infrastructure. The almost successful Christmas "underwear" bomber a few years ago...
9 Pages(2250 words)Essay

The Department of Homeland Security

... Homeland security The Department of Homeland Security (DHS) is at a crossroads as it endeavors to protect the country against all forms of hazards. Finding the balance between terrorism and other threats to national security has been the major challenge. Although some have argued that the DHS should solely focus on terrorism, this paper proposes an all-hazards approach. This is based on several reasons. First, the DHS can effectively focus on all hazards by ensuring that the department has adequate experienced and well-trained staff members. As noted in the report on the Federal Response to Hurricane Katrina (2006), the DHS demonstrated a lack of energy and professionalism to deal with such disasters. Secondly, since the department...
1 Pages(250 words)Assignment

Dental Veneers as a Breakthrough in Modern Dental Technology

In today’s fashion-conscious world, porcelain and composite veneers remain some of the most popular choices for people seeking to improve the esthetics of their teeth. Porcelain veneers have several advantages when compared to composite veneers including durability, resistance to staining, and amount of tooth structure removed during the procedure.
First and foremost, the porcelain veneers are very durable. They are also very thin – usually between 0.5 - 0.7 millimeters – and brittle, although once bonded to a healthy tooth structure they can become quite strong. The bonding process increases durability and veneers made of porcelain can last for many years, oftentimes between 10-15 years depending on how wel...
8 Pages(2000 words)Term Paper

Department of Homeland Security

...Department of Homeland Security In the wake of recent terror activities, it becomes essential for States to step up their security setup. In the current scenario of Unites States under a recession, its authority being questioned and the objective and consequences of War on Terror, topic dear to its heart, being questioned, United States has to deal with the tough job of limiting the terrorists and the threat to its national security. Through this essay, we assess the Department of Homeland Security. We see whether the steps taken by the department are enough to prevent another 9/11 or are they good enough to checkmate the plans of terrorists, who are educated and carry out their motives with a sense of vengeance. Department...
8 Pages(2000 words)Essay

The Relationship Between Security, Risk and Health in a Large Organisation

Managers in modern organizations tend to use appropriately customized policies – in accordance with their firms’ needs and resources (employees, funds, technology) available. The current paper focuses on the examination of the various aspects of security, risk, health and safety within large organizations; Particular emphasis is paid on the fact that the demands of each one of these factors may be differentiated under the pressure of the market conditions and the organizational priorities. The case of Shell in Nigeria has been used as an example in order to show the potential co-existence and interaction of these factors within a specific organizational environment. The measures required and the role of the security ma...
9 Pages(2250 words)Coursework

Active Directory - Security, User, and Resource Management

Administrators make use of group policies to launch principles for desktop predilections and software. For many corporate information technology groups, concurrence with group policies to identify what software should be presented to each category of user, even without human intervention installing it on demand from a corporate server (Silberschatz, Galvin, & Gagine 2002. P. 838). The capability of the AD was introduced in the year 1999, its initial release was with the MS Windows 2000 Server Ed., additionally personalized to spread out functionality, security parameters and build up administration in MS Win Server 2003. The most recent better facilities and efficient edition of the AD are introduced in the Windows Server 2008...
6 Pages(1500 words)Report

Info-Point: Marketing of New Touch Screen Information Technology

The development of the new Info-Point technology, a stand-alone information module designed to offer the public information on tourism, local shopping, weather, and transportation, has created the opportunity to successfully market these information technologies to different UK cities. The entire marketing concept is to establish self-service information centers that offer a wide variety of regional information, utilizing an easy-to-use touch screen methodology to cater to a broad mass market of consumers. 

Touch screen interface systems are becoming more and more common in the UK and abroad. During a pilot experiment using touch screen information technology, the automotive manufacturer Lexus piloted an informatio...
10 Pages(2500 words)Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

Organisations in the Engineering and Technology Environment: Singapore Airlines

In those days, just three flights per week, to Kuala Lumpur, Ipoh, and Penang, were all that the people in Singapore were privileged to. There were very fast developments in the situation in a span of two decades. During this period, Singapore’s Kallang Airport gained international exposure and started making huge additions to its fleet. Soon after the birth of the Federation of Malaysia on February 1963, the Malayan Airlines came to be known as the Malaysian Airlines, and in 1966, it was renamed the Malaysian-Singapore Airlines. But, in 1972, fifteen years from the day it was founded, Singapore Airlines split up with Malaysian Airlines and acquired a separate identity.
This split, however, helped the airlines to take i...
10 Pages(2500 words)Case Study

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

Role of the Police and Private Security

Hence understanding the criminal justice system is extremely important so that it may be implemented effectively and impartially. Hence, this report will also cover the following areas namely, the three levels of law enforcement in the United States, the interaction between those agencies, the role of the police and private security personnel in homeland security, the role of this group in intelligence gathering and federal funding.

The three levels of law enforcement in the United States cover national, state and local security. This task of homeland security is the responsibility of the Federal Bureau of Investigation (FBI), the state police forces, and the local police force. Each of them has specific areas to cover...
8 Pages(2000 words)Case Study

European Union Policy: Turkey

..., a viable market economy and the capacity of the Nation to abide by the policies of the European Union. The Commission screens the suitability of the country in the light of 35”chapters” like food safety, agriculture, energy and transport policies, foreign and security policies etc. Before the negotiations begin, the country may be asked to fulfill certain benchmarks, and the procedure varies depending on the merit of the applying country. The country must indicate a time-line for the implementation of the EU policies and processes. “When all negotiations are complete to the unanimous satisfaction of the member countries, a Draft Accession Treaty is compiled and submitted to the Council, Commission, Parliament and member countries...
9 Pages(2250 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Department of Homeland Security, and Science and Technology Policy and Politics for FREE!

Contact Us