StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

MHE514 Module 5 Case - Essay Example

Cite this document
Summary
Terrorism can and must be defeated. Societies which condone terrorism betray the fundamental tenets of democracy and the cause of freedom around the world. Terrorism can be dealt with in a very resolute manner. Terrorism prevails if Western governments refuse to take a series of serious pre-emptive actions to deal with it.
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
MHE514 Module 5 Case
Read Text Preview

Extract of sample "MHE514 Module 5 Case"

Terrorism can and must be defeated. Societies which condone terrorism betray the fundamental tenets of democracy and the cause of freedom around the world. Terrorism can be dealt with in a very resolute manner. Terrorism prevails if Western governments refuse to take a series of serious pre-emptive actions to deal with it. Although cloaked with persistence, the seeming overpowering strength of terrorism can be overturned. The multiple causes of poverty, exclusion, fanaticism to Islamic values and racial divide can foster the spread of terrorism among young people.

Terrorism is not an empty threat. There is a need to utilize very defensive responses to diminish new terror threats. The only effective response is a dynamic system that can assess and monitor the threat and our vulnerabilities and respond convincingly. The main aim to restore the sense of safety and security available to the public before the September 11 debates. There is a need to monitor potential hotbeds of terrorism. The ubiquitous and continuous, the persistent observation of terrorist locations, combined with precision interdiction of terrorist cells is important.

There is a need to neutralize the threat. The governments can invest in small gadgets that have a global positioning locator, sensor, communicator, and a computer. These devices can be distributed by the military to its different outposts throughout the country in order to give a comprehensive picture of enemy movements. Government borders must be highly friendly to trade, yet opaque to enemy transmission of goods or personnel. The tricky action is how to increase the trade flow and legitimate visitors while diminishing the number of harmful gadgets and illegal visitors.

The countries can invest in better gadgets and adopt a different way of looking at things - instead of a border, a zone. This global system will track the flow of goods, with cooperation from other friendly countries. A smarter way to minimize damage from future terrorist attacks is to create a more durable defense infrastructure. For instance, damage-resistant systems present better defense, together with special systems that decrease damage, aid rescue personnel, and restore basic services.

Rapid response teams are needed to help a badly hit area recover and sustain itself until more permanent facilities are established. The goal is to develop buildings that minimize losses in the face of attack, and are designed to counter threats. Finally, there is a need to unite the operations of security groups composed of law enforcement, public health, first responders, army commanders, local governments, and private citizens. References:Gareau, Frederick. (2004). State Terrorism and the United States: From Counterinsurgency to the War on Terrorism.

Atlanta: Clarity Press. Simon, J (n.d.) The Global Terrorist ThreatRetrieved May 27, 2007 from http://www.futureterrorists.com/pdf/phi-kappa-phi-forum.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“MHE514 Module 5 Case Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
MHE514 Module 5 Case Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1510473-mhe514-module-5-case
(MHE514 Module 5 Case Essay Example | Topics and Well Written Essays - 500 Words)
MHE514 Module 5 Case Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1510473-mhe514-module-5-case.
“MHE514 Module 5 Case Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1510473-mhe514-module-5-case.
  • Cited: 0 times

CHECK THESE SAMPLES OF MHE514 Module 5 Case

Major Issues in the Google Case

Answer#1: The smart phone industry has adapted a big change with introduction of android technology in collaboration with Google incorporation and introduce by Google in the market in 2008.... With this technology, Google forces the user to make extra use of web browsing on their mobile phones.... hellip; The practice will ensure that the users will increase the use of internet on their cell phones that will increase traffic on the web and then that traffic will determined to various Google services where Google show advertisements....
3 Pages (750 words) Case Study

Business Intelligence of Sysco Company

Answer: Business Intelligence (BI) is a process where large amount of data can be examined, providing managers and business owners only that information which is useful and resourceful.... BI software has predefined reports and allows users to help them develop their own graphs.... hellip; The main objective of this software is to accumulate the historical data and then reveal the information to the user in such a way that it becomes easier for the At Sysco, the main problem that might arise after the implementation of business intelligence is that the information that is provided is too small of what is actually required by the firm in order to function....
5 Pages (1250 words) Case Study

Case Study 1: Mobile Devices

In case STUDY MOBILE DEVICES case Study Mobile Devices Affiliation Table of Contents Risks Inherent In the Use of Wireless and Mobile Technologies 3Plan for Monitoring and Analysis 4Backups 4Services installed 4Firewall 5Strong Password 5Recommendation 5References 6IntroductionWireless technology offers a number of advantages for the businesses as well as individuals....
2 Pages (500 words) Case Study

BKK Mobile Oil ICT

This case study "BKK Mobile Oil ICT" discusses ICT that can influence the running of the entire firm and cause significant contributions to the success of the company.... The study has also formulated the implementation stages and the persuasive manner to reach the employees.... hellip; The challenges that come up also need to be accepted since it's a step by step process....
11 Pages (2750 words) Case Study

P-value, Inflation, Coefficient and Regression

An investigator will regularly do away with the null hypothesis in case the p-value will turn to be less than the normal significant level that is normally 0.... In case the p-value is less than or equal to the threshold value previously set, one discards the neutral hypothesis and the test on the hypothesis is considered valid.... This becomes the case depending on velocity of circulation....
2 Pages (500 words) Case Study

Jeff Bazos as a Chairman and CEO of Amazon

4 expectation in loss of the 34 analysts… The revenue growth is projected to come from Amazon Web Services as the system enabled businesses to replace upfront capital infrastructure expenses with a lower variable cost. Jeff Bazos is the founder, president, chairman and CEO of case Study #5: Amazon Amazon....
1 Pages (250 words) Case Study

Richter IT: Case Analysis

The work describes the case of Richter, which had no central strategy for IT before its conversion to a private sector enterprise in 1992, and hence every department was responsible for the management of its own technological needs prior to privatization.... From the case study, it is clear that the information technology adds to Richter's organizational value.... Subsequently, in 1995, he implemented the sales and distribution (SD) module and encouraged IT departments to shift its focus to infrastructure projects....
5 Pages (1250 words) Case Study

Physical Security Survey on Bank of Kentucky

The researcher of this essay will make an earnest attempt to provide a security survey conducted at the Bank of Kentucky, below is a report on the security situation of the facility.... The Bank of Kentucky is definitely among the largest commercial banks in the region.... hellip; The survey was conducted based on the course requirement....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us