logo image

Mitigation strategies

To address these gaps and challenges in the country, the government should seek to enhance better coordination and harmony of the new department via use of modern technology (Subcommittee on Homeland Security, 2008). As indicated earlier, it is clear that the Act demands greater interaction between technology and the human system. However, this has proved to give varying errors depending with individuals at various times. As a result, the Airport Security Measures should assimilate greater levels of technology use in most of its operations in relation to the passengers getting on board.

Radiation assisted screening should be e...

Need essay sample on "Mitigation strategies"? We will write a custom essay sample specifically for you for only $13.90/page

...mployed for all the passengers and luggage to reduce human error. To add to that, integrated on board auto screening systems should be established as an added security system. This would reduce the overall demand for large staff numbers and make monitoring much easier both on board and outside the plane (Robert et al, 2008). To add to that, it would address the problem of coordination and harmony between the authorities.

Technological applications form the main platform for future secure air transport. Use of biometrics based authentication techniques increases the ability to effectively identify individual from their physiological and behavioral characteristics. Biometric technology mostly employs use of finger prints, iris, signature, speech, and gait to identify and ensure that dangerous people are not allowed on board. Through this technology, it is possible to pro-actively address the passenger’s details and luggage without losing their trace.

Besides, forging identity becomes totally impossible as one cannot change his physiological characteristics. However, this system should be applied as a compliment and not a substitute to the current system (United States General Accounting Office, 2003).

Reference list

Alexander, T. & Seth, B. (2004). Airport Planning & Management. Miami: McGraw-Hill Professional. Marcus, J. (2004). The Myth of Homeland Security. New York: John Wiley and Sons. Robert, F. , Edward, H. & Gion, G. (2008). Introduction to Security.

New York: Butterworth- Heinemann. Subcommittee on Homeland Security, (2008). Department of Homeland Security Appropriations for 2009: Hearings Before a Subcommittee of the Committee on Appropriations, House of Representatives, One Hundred Tenth Congress, Second Session. Washington: Subcommittee on Homeland Security United States General Accounting Office, (2003). Transportation Security: Post-September 11th Initiatives and Long-Term Challenges, Retrieved from >http://www. gao. gov/new. items/d03616t. pdf. <

Read full document

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
Signup & Access Essays

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy