Retrieved de https://studentshare.org/social-science/1688841-annotated-bibliogrphy
https://studentshare.org/social-science/1688841-annotated-bibliogrphy.
Political Science Carter II, J. W. . Federal emergency management agency. Policing: An International Journal of Police Strategies & Management, 36(3). The article asserts that the main role of FEMA is to manage any disaster response in the U.S. It also claims that FEMA has power over the resources of the state as well as local authorities. Apart from giving experts in various specialized fields to the local governments and the states, the article claims that FEMA also funds for reconstruction.
Additionally, the article claims that FEMA assists people access loans at low interest. May, P. J., Jochim, A. E., & Sapotichne, J. (2011). Constructing homeland security: An anemic policy regime. Policy studies journal, 39(2), 285-307.The article expounds on the strength of the homeland security in the U.S. It achieves by evaluating the homeland security policy that was brought into formation after the September 2001 terrorist attack. The article claims that the Department of Homeland Security was formed thirty days after the attack through the coming together of many agencies in order to combat terrorism.
Reiter, M., & Rohatgi, P. (2004). Homeland security. Internet Computing, IEEE, 8(6), 16-17.The article asserts that “Homeland Security” is a key area of concern for governments worldwide, which is obliged to provide protection to the citizens as well as the infrastructures that support them. The article also claims that role of information technology is very important in homeland security. In relation to this, the article claims that information technology can help mitigate risk as well as enhance effective response to natural or manmade disasters.
On contrast, the article also claims that use of technology like surveillance, profiling in addition to data aggression hamper privacy and civil rights. The article also claims that information technology constitute of an infrastructure that need to be protected.
Read More