IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Realized Applications of Positioning Technologies in Defense Intelligence

Realized Applications of Positioning Technologies in Defense Intelligence
View Sample PDF
Author(s): Katina Michael (University of Wollongong, Australia)and Amelia Masters (University of Wollongong, Australia)
Copyright: 2006
Pages: 29
Source title: Applications of Information Systems to Homeland Security and Defense
Source Author(s)/Editor(s): Hussein A. Abbass (University of New South Wales, Australia)and Daryl Essam (University of New South Wales, Australia)
DOI: 10.4018/978-1-59140-640-2.ch007

Purchase

View Realized Applications of Positioning Technologies in Defense Intelligence on the publisher's website for pricing and purchasing information.

Abstract

Spurred by the recent escalation of terrorist attacks and their increasingly devastating outcomes, defense intelligence in the context of homeland security has been drawn into the spotlight. The challenge, at both national and global levels, of managing information in order to offensively resist attack or defensively keep citizens safe from further harm has never been greater. In meeting this challenge, the tools and strategies used by relevant defensive powers are a key factor in the success or failure of all activities, ranging from small-scale, homeland security administration through to large-scale, all-inclusive war. In all areas within this wide scope, the adoption of positioning technologies has played an important role. Of special significance are the global positioning system (GPS), second-generation (2G) and beyond mobile telephone networks (includingwireless data networks), radio-frequency identification (RFID) and geographic information systems (GIS). Since most positioning technology has been developed or released for use within the commercial sector, however, concerns beyond technological feasibility are raised when applications are harnessed solely for defense. The integration between commercial and military sectors and public and private needs must be considered and, primarily, this involves ensuring that the enforcement of homeland security does not compromise citizen rights.

Related Content

Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri. © 2024. 58 pages.
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper. © 2024. 31 pages.
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha. © 2024. 33 pages.
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi. © 2024. 25 pages.
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya. © 2024. 24 pages.
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf. © 2024. 24 pages.
Rida Zehra. © 2024. 18 pages.
Body Bottom