Strategic Analysis: FEMA National Prevention Framework and IS/IT Use

Verified

Added on  2022/08/22

|4
|869
|21
Report
AI Summary
This report delves into the strategic use of Information Systems/Information Technology (IS/IT) within the Federal Emergency Management Agency's (FEMA) National Prevention Framework. It focuses on the framework's primary objective: mitigating the risk of imminent terrorist threats and attacks, highlighting the roles of various stakeholders, including citizens and government leaders. The report details specific steps for risk mitigation, such as planning, screening, intelligence gathering, and public information dissemination. It emphasizes the framework's unique focus on terrorism, contrasting it with other frameworks addressing natural disasters. The document also discusses recommended strategies, including initial assessment, promoting security reporting, and the associated costs. The report references several sources and underscores the importance of being optimally prepared to secure the U.S. from imminent terrorist attacks. The report also mentions the political division that are present and how FEMA plays an essential part of the entire community.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: STRATEGIC USE OF IS/IT
Strategic use of IS/IT
Name of the student:
Name of the university:
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1STRATEGIC USE OF IS/IT
Discussion on the “Federal Emergency Management Agency” or “FEMA
National Prevention Framework”:
Risk it mitigates:
It concentrates in the imminent terrorist threats and attacks. It covers the abilities needed to
prevent, avoid or halt the actual or threatened the terrorism act. There are various terrorism related
national efforts of preparedness. This involves the installing of concrete barriers and additional
physical security across the building. This is to protect from different types of road side bombing.
These are seen to be covered in other frameworks.
Reason why the risk is a priority:
Preventing terrorism can never be done by intelligence officers and police. Here, distinct
business and citizens play essential responsibilities like contacting the law enforcement as they
witness suspicious activities threatening to the national security. The framework of prevention can
help all the resident and citizen of U.S. Nevertheless, this is specifically helpful for the leaders of
government and people having liabilities to secure the attacks on terrorists on homeland (Perry et al.,
2017).
Steps to be taken for mitigating against this risk:
Firstly, there must be the process of planning and direction. This is to deploy the intelligence
and different data requirements of consumers. Then, there is screening, searching and detecting. For
this one must locate the networks and persons related to the threats imminent terrorist. Then the
terrorist financing is to be disrupted and preserving of the entire crime scene. Next, there is the
conducting of the site exploitation related to the collection of intelligence. Further, there is the
planning that comprises of time-sensitive and flexible process of planning developed in the current
Document Page
2STRATEGIC USE OF IS/IT
plans and includes the real-time intelligences. Apart from this, there is public information present
there along with the warning and various operational coordination (Cook, 2018).
The other frameworks concentrate on hazards like natural disasters. Despite the fact that
there has been other type of frameworks concentrating on every hazards. This includes the natural
disasters. It is seen that the National Prevention Framework has been solely concentrating on various
types of terrorist activities and particularly the imminent acts or threats of terrorism. The imminent
indicates to the fact that there has been no information and intelligence warning of the impending,
specific and credible ongoing attack of threat of terrorist. Though the prevention has been highly
liable for the academic research institutions, law enterprises and the enterprise of the researches have
the roles to implement (Liu et al., 2018). The recommended strategies includes the initial assessment
with the current monitoring and evaluation program. Then, there is promoting of reporting security
and safety issues as per the culture of trust, cohesiveness, responsibility and respect. The strategy is
successful as it can demonstrates every seven core abilities and can list the critical activities for
everyone.
The anticipated cost for the present case is 18 billion dollars. FEMA has legally dissolved the
latest type of Emergency Preparedness. Additionally, the reaction of Directorate as deployed within
DHS for replacing that. The political divisions have secured the unity for leaders during crisis time.
At the earlier stages, FEMA, as treated to be the essential part of the entire community, has been
concentrating on the potential is seen to be projecting and then escalating critical incident tasks
(Hansen & Henri, 2017).
As the recommended project is not undertaken in the above domains, it can lead to fail the
achieving of resilient and secure nation. This is needed to be optimally prepared for securing
imminent attack of terrorists at US.
Document Page
3STRATEGIC USE OF IS/IT
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]