Technologies For Evacuation Planning & Disaster Response

Read Complete Research Material



Technologies for Evacuation Planning & Disaster Response

Technologies for Evacuation Planning and Disaster Response

Introduction

This paper discusses the situation and circumstances addressing a real-world scenario regarding the anticipation of a devastating crisis emergency. This raises the concerns for technologies regarding evacuation planning and disaster response which can be implemented to reduce or mitigate such hazards and risks. Therefore, it is deemed necessary to utilize the technologies for this purpose which consequently results in the aversion and recovery processes. The advent of technology has created various issues and challenges these days. The terrorists are committing cyber attacks in several locations and instances to develop a sense of fear among the internet users around the world. Technologies can be used as preventive countermeasures to overcome or reduce this threat and eliminate such devastating crisis emergency.

Discussion

Cybercrime in world is increasing along with the advancements in technologies. Terrorists have shifted from physical attacks to online security breaches for the purpose of stealing information and using it their own benefit. This has created several problems for individuals and organizations. These terrorists are sometimes referred as hackers. People are now more concerned about network security than before. Organizations are investing more towards security enhancements to improve their data security. Fear is the main factor for a lot of companies' refusal to join networks and Internet databases, which ultimately turns out costing them a large amount of money for security measures.

There are different phases of emergency management which are responsible for mitigating and recovery of data and information. Operational efficiencies can be developed by elevating the security and successfully implementing such technologies. These operational efficiencies include communications, industrial technology, and data storage. The real world examples are filled with incidents and claims for security breaches. Hackers have attempted these crimes numerous times in America and other parts of ...
Related Ads