Edudorm Facebook

Interagency Operations

Interagency Operations

Q1.  Interagency operations can be defined as the operations that involve two or more agencies that are based on the government. According to the public value and their motivation, the operations consider the knowledge that is based on those persons working on the interagency approach as an organizational feature that needs to be effectively used (Bryant & Land Warfare Studies Centre Australia, 2007).

Q2.  Institutional division acts as a barrier against collaboration and this is because the divisions hinder them from effectively teaming up with the other organizations.  If institutions can know how to work together in collaboration, then there will be no limits in them succeeding (Bryant & Land Warfare Studies Centre Australia, 2007). 

Q3.  The pros –The system of collaboration contributes to the wider based approach of a successful team.

                        -  This also calls for a wider range of collaboration and communication. 

            The cons- This reorganization causes some delays in having the best team idea. 

  • Reorganization in any institution leads to lack of productivity as some ideas are slows down due to lack of collaboration (Davis & Daniels, 2016).

Q4.  a) Schools would prepare for a rare event for them to become prepared for new ideas, methods and approaches.  This helps the students to become self dependent (Davis & Daniels, 2016). 

Q5.  a) School shootings are the kind of mass shooting that involves the use of attack by guns in the school institution while the terrorists attack is the appearance of the terrorists in the institution and killing a mass of people. 

  1. b) School shootings cannot be called a terrorist attack as it is either caused by either an assault on the government or the government while the terrorist attacks are not based on politics but are planned by the terrorists (International Handbook of Threat Assessment, 2013).

Q6. School buses become the preferred targets for the terrorists as they have a high concentration of students in a small place while there is also high numbers of the students who stay in the bus stations and can be well caught by the terrorist blast (International Handbook of Threat Assessment, 2013). 

Q7.  The issue on collaboration on the Beslan Massacre explains how the Russian officials did not partner with the hostages who demanded for the removal of the troops in Russia from Chechnya and they also wanted the prisoners who were sentenced after the guerilla war to be released. 

  1. b) Schools are responsible for the day to day activities of the student whenever they are in the institution. Thus school safety should be a shared responsibility starting with the whole community (Giduck, 2005).

Q8.  a) Mitigate is the prevention of future emergencies and slowing down their influences.  These include the forms of activities that reduce the damaging influences of the emergencies that are hard to prevent.

  1. b) Preparedness is the way of handling an already happened emergency. It consists of the plans and the provisions that are planned in saving lives and respond to the rescue operations. 
  2. c) Response is the way of recuperating from the emergency. It includes the actions that are taken to save lives and the prevention of the future damage while in a condition of an emergency.   
  3. d) Recovery is the way of getting away from an emergency.  It includes the actions that are taken to get back to normal or to a better situation based on the emergency (Moore & Hansen, 2012). 

Q9.  Developing a plan can be helpful to the change makers so that they can turn their dreams into reality.  In developing a plan, one should know whether the action is complete or if all the steps are relevant in all the parts of the community.  One should also review whether the plans are clear and whether the plans are innovative.  This will help them know whether the plans reflect the current works of the organization (Abrams, 2003).

  1. b) A plan should be based on the committee formulation as it is important to convene a planning group so that the plan should be well designed. This committee can be the people who can help in deciding the strategies of the plan and its objectives. 
  2. c) Formulating a plan in jobs and responsibilities help in developing of the job description that provides the most important results that one needs from an employee in performing a particular task (Abrams, 2003).

Q10.  a) The Pull down behind the head is the least effective program.  It is exercised by sitting on the machine with a biased and a cabled bar overhead.  This exercise is only done by the people with flexible shoulder joints and can keep their spines straight (Anderson, 2007). 

  1. b) Walking is the most effective exercise. It strengthens the heart and burns the calories.  It is an exercise that is performed anywhere with only a pair of shoes. 
  2. c) Full scale exercise is an inspired training that includes all the business aspects such as government agencies and other partners. This is the easiest exercise to know and it needs a high level of physical engagement and a large scale of communication (Anderson, 2007).

Q11.  Tactical site survey is the examination of the place or the spot so that one can have the actual data or information.  It has different skills and features depending on the type of plan that is needed to be seen in the location (Chandra, 2003). 

Q12.  a)  When the DHS was formed, the united 22 national agencies and departments into a united and incorporated cabinet agency. 

  1. b) Based on the public approach of the protective concepts against the natural disasters, their allocation is most often in the dominion of the bureaucratic and the expert organizations. The bureaucracy gives protection against the natural disasters (Davis, 2008). 
  2. c) The federal government should play the most important role in controlling the natural disasters. Most importantly, it should be in charge of the control of the emergencies and other natural hazards. 
  3. d) The emergency manager should control the natural disasters in coordinating the support of the government to the citizens of the nations and be the first respondents to these disasters.
  4. e) The 9/11 event is widely known as one of the calamities that affected the global consciousness project. It brought up the wide economic changes globally (Davis, 2008). 

Q13.  a) The policy mandates of the post 9/11 are important in that they made the immigration policy considered on the national security which has awakened the border security in the immigration enforcement.   

  1. b) ISE is the feature of the Cisco’s Borderless Networking. It helps in the formation and the enforcement of the security access plans for the endpoint tools to the organization’s routers and switches (Masferrer, 2012). 
  2. a) JTTF was established in 1980 in the New York City.
  3. b) The JTTF increased and became more active after 9/11 in that they were able to investigate the domestic and the foreign terrorists with the purpose of impeaching their criminal actions.
  4. c) The JTTF get involved in the surveillance and the electronic survey where they get the initial sources in their search.
  5. d) The benefits of the JTTF is that they are meant to detect and protect and terrorist actions or plans (Newman, Clarke & United States, 2010).

Q15.  a) The role of the private sector in the cyber crime is to raise the awareness and prevent people from becoming victims of the crime. 

  1. b) Terrorists are the main threat to the national cyber security (Wall, 2007).

Q16.  The private sector inclusion is important in that 9/11 was the main event that led to change.  The private sector helped sharing of information that brought up different expectations (Wall, 2007).     

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Abrams, R. M. (2003). The successful business plan: Secrets & strategies. Palo Alto, Calif: The Planning Shop.  

Anderson, B. (2007). Getting back in shape: 32 workout programs for lifelong fitness. Bolinas, Calif: Shelter Publications.

Bryant, J., & Land Warfare Studies Centre (Australia). (2007). A more lasting peace: Reflections on interagency operations in the Solomons and Iraq. Duntroon, A.C.T: Land Warfare Studies Centre.  

Chandra, R. (2003). Potentials of world terrorism. Delhi: Kalpaz Publ.

Davis, J., & Daniels, K. (2016). Effective DevOps: Building a culture of collaboration, affinity, and tooling at scale.

Davis, L. (2008). Natural disasters. New York: Facts On File.

Giduck, J. (2005). Terror at Beslan: A Russian tragedy with lessons for America's schools. Golden, Colo.: Archangel Group.  

International Handbook of Threat Assessment. (2013). s.l.: Oxford University Press Inc.       

Masferrer, A. (2012). Post 9/11 and the state of permanent legal emergency: Security and human rights in countering terrorism. Dordrecht: Springer.

Moore, K. D., & Hansen, J. R. (2012). Effective strategies for teaching in K-8 classrooms. Thousand Oaks: SAGE Publications.

Newman, G. R., Clarke, R. V. G., & United States. (2010). Policing terrorism: An executive's guide. Darby, PA: Dianne Publishing.               

Wall, D. (2007). Cybercrime: The transformation of crime in the information age. Cambridge: Polity.    

1483 Words  5 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...