Academic Writing Experts For Your Research Projects

Order custom papers, masters thesis and dissertation in 3 guided steps; human written!

Posted: January 31st, 2023

USING IT TO FIGHT TERRORISM IN THE US

One of the greatest challenge of mankind in the 21st century is the act of terrorism which is gaining roots and penetrating everywhere across the world. Nichols (2017) postulated how the US has become one of the prime targets by terrorists in the world due to its fight against terror. With terrorism increasing, and threatening the security of Americans, both at home and away, it is important to ensure that better solutions are provided to curb the increased activities of terrorism, in and outside the US (Nichols, 2017). Curbing the terror activities before the actual attacks happen is important since it will minimize the losses and the pain that occurs after the terror attacks.
1. Overview of Solution: Dave (2017) reiterated that terror attacks can be curbed and controlled through the use of sophisticated technology. The research paper therefore tries to explain the fundamental solution to curbing terror attacks using IT technology. According to Dave (2017), IT is a solution device with its own inbuilt software known as the Terror-Abo which will be applied to monitor terror activities as well as identifying probable location points of terrorists. This technology will be integrated together with artificial intelligence and global position systems to ease communication and accuracy. The device will be installed in all communication gadgets such as satellites, computers, and mobile phones in the US and will have a capability to capture and trace flow of information from one entity to another as well as keeping all transactions for future retrieval.
All flow of communications will be tracked to avoid terror attacks from criminals. Furthermore, airport scrutiny will have to be thorough to prevent any injection of harmful materials to the US to prevent terror attacks. The devices will be designed in such a way that, if it is disabled, the computers and the mobile phones will stop functioning immediately, except for the satellites which shall have a back signal system to indicate interference with its system.
1. Methodology In the US, technology has been used for a long time since the 9/11 to curb the acts of terror and also ensure that there is no subjection of the unwanted activities. The armed forces in the US have been in the forefront in using technology to predict and control terror attacks. They are able to gather intelligence about the patterns of terror groups, how they operate and how they carry out their activities (Billingslea, 2004). Moreover, the greatest terror-fighting programs which have been put in place by the US is the “Programme of Work for Defense against Terrorism”. Amazingly, with the use of the Terror-Abo, it will be easy for the government and security agencies to incorporate the various technologies available into curbing the terror menace.
Notably, using the “Programme of Work for Defence against Terrorism” in conjunction with the use of Terror-Abo program, it will be easy to detect any communications among terrorists based on their transactions, communication, on-and –off-phone and computer browsing content both in and outside the US. The installation of the software in the phones, satellites, and computers will make it possible to detect anyone’s move towards the acts of terror.
In order to develop and further this program by incorporating the software into the target systems such as mobile, satellite and computers, manufacturing companies in the US and other countries need to cooperate by making every device with inbuilt software in order to address the issue of terror attacks. The US can therefore take the lead by showcasing how such prototypes work by demonstrating to the companies how it can be used effectively in managing terrorisms. (Dave, 2017). The only disadvantage to this proposal is the lack of corporation from the computer, satellite and mobile phone production industry.
1. Tools There are a number of tools required for the program to work effectively and efficiently in its application against terror. First and foremost, is to prioritize the creation of a program through the use of the existing communication software to enhance simple IT design, compatibility, visualization and resolution capabilities. The program should also have a cloud storage capabilities due to the high volumes of data transmitted per day. The program must also incorporate the software programming languages in order to make it easy and effective to operate.
1. Requirements The program will incorporate better systems of enhancing security and its performance to ensure efficiency in its operations. The Terror-Abo program is better than the one used by the US security agencies, since its time sensitive, transmitting information in the real time, with efficiency and accuracy.
1. Compliance In order to enhance this program, it is important to consider compliance with the existing laws and policies which shall include the law on cyberbullying, privacy and illegal access to other individuals information without their consent.

Tags: Undergraduate Dissertations Topics Examples Ideas, Thesis and Dissertation Ideas for Research Topics in UK, Thesis Topics for Your Masters Degree, Thesis Topics for Your Final Academic Project, Research Titles Examples, Need help with essay

Why choose Homework Ace Tutors

You Want Quality and That’s What We Deliver

Top Academic Writers

We’ve put together our writing team with care, choosing talented writers who shine in their fields. Each one goes through a tough selection process, where we look for folks with deep expertise in specific subjects and a solid history of academic writing. They bring their own mix of know-how and flair to the table, making sure our content hits the mark—packed with info, easy to read, and perfect for college students like you.

College Prices

We don’t do AI-written essays or copycat work—everything’s original. Competitive pricing is a big deal for us; we keep costs fair while delivering top-notch quality. Our writers are some of the best out there, and we charge rates that stack up well against other services. This means you get stellar content without draining your wallet. Our pricing is straightforward and honest, built to give you real value for your money. That’s why students turn to us for high-quality writing services that won’t break the bank.

100% Plagiarism-Free

Academic integrity is at the heart of what we do. Every paper starts from scratch, with original research and writing tailored just for you. We write 100% authentic—no plagiarism research essays. Our strict quality control process includes scanning every draft with top tools like SafeAssign and Turnitin, so you get a similarity score and proof of originality. We’re obsessive about proper citation and referencing too, crediting every source to keep things legit. It’s all about giving you peace of mind with content that meets the highest standards.

How it works

When you decide to place an order with Dissertation Writer, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went and the marking criteria grade you scored. You can leave a review recommending a writer for your class and course mates.