The Role of the Corps of Engineers in Homeland Security

2002 ◽  
Author(s):  
Michael S. Flanagan
2021 ◽  
pp. 349-373
Author(s):  
David Hughes McElreath ◽  
Daniel Adrian Doss ◽  
Barbara Russo ◽  
Greg Etter ◽  
Jeffrey Van Slyke ◽  
...  
Keyword(s):  

Author(s):  
Christopher G. Reddick

Collaboration is an important element in the advancement of e-government (Hu et al., 2006). This chapter examines the level of collaboration among state governments to see how advanced they are in e-government. Collaboration is critical in homeland security because it is one of the often cited challenges in the time of a crisis (Reddick, 2008). In order to understand Homeland Security Information Systems (HSIS), one must delve into the impact of collaboration and e-government. There is a growing body of research on e-government and its impact on managerial effectiveness; with collaboration being an important area of management effectiveness (Yang and Paul, 2005; Reddick 2007). This chapter examines how state governments measure up against some noted principles of effective collaboration. The role of citizens in the collaborative process is examined, with citizens arguably being the key to more effective collaborative efforts through e-government (Vigoda-Gadot, 2002). Indeed, research shows that citizen involvement in the decision-making process through collaborative efforts will enhance democracy and accountability of governments (Vigoda-Gadot, 2003). In order to examine collaboration and e-government this chapter first outlines several key principles of effective collaboration and relates them to e-government. Second, this chapter provides a conceptual framework of collaboration and e-government. Third, there is a data analysis of a survey of Chief Information Officers (CIO) opinions on collaboration and e-government. The conclusion of this chapter summarizes and examines the impact of collaboration on HSIS.


2006 ◽  
Vol 4 (6) ◽  
pp. 41 ◽  
Author(s):  
Paul J. Lioy, PhD ◽  
Fred S. Roberts, PhD ◽  
Brendan McCluskey, JD, MPA ◽  
Mary Jean Lioy, MS ◽  
Audrey Cross, PhD, JD ◽  
...  

Faculty members from the New Jersey Uni - versities Consortium for Homeland Security Research served as observers in the TOPOFF 3 exercise in New Jersey in April 2005. The exercise involved a simulated release of pneumonic plague, with symptomatic individuals sent to hospitals and asymptomatic individuals sent to points of dispensing (PODs) to receive antibiotics. This paper summarizes Consortium members’ observations about the exercise, with emphasis on the PODs’ strategies and implementation, and on the role of communications and command centers. The future role of university collaborations with local and federal agencies in similar counter-terrorism exercises is also discussed.


2019 ◽  
pp. 78-91 ◽  
Author(s):  
Ping Wang ◽  
Maurice Dawson ◽  
Kenneth L Williams

There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have a consistent and reliable quality standard to guide and evaluate the training and preparation of qualified cyber defense workforce. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous national standard with specific criteria for maintaining the quality of cybersecurity education. This article explains the CAE-CDE program criteria and requirements and discusses the important role of the special designation in improving cyber defense education and workforce development. This article illustrates the educational value and quality impact of the CAE-CDE program with three case studies: (1) University of Missouri – St. Louis; (2) American Public University; and (3) Robert Morris University.


Author(s):  
Suzette A. Haughton

The illegal flow of drugs continues to undermine states border security. The chapter utilizes a document analysis of secondary source data from the USA Homeland Security and border security agencies in Jamaica. It aims to assess the security challenges posed by the Jamaica-USA trafficking of drugs and explores how border security measures function in reducing this problem. The Container Security Initiative, Customs Trade Partnership against Terrorism, the Western Hemisphere Travel Initiative, the Jamaica-USA Maritime Counter Drug Agreement (Shiprider Agreement) and the Caribbean Basin Security Initiative will be explored to assess how these border security initiatives aid in curtailing drug flows to the USA. The chapter discusses the role of border security in detection, deterrence and apprehension via coordinated intelligence driven strategies. It concludes that the trans-border nature of illegal drug flows necessitate increased state-to-state sustained future cooperation especially within the context of globalisation.


Sign in / Sign up

Export Citation Format

Share Document