Report on the integration of technology in Public Safety Administration

PUBLIC SAFETY 1
Report on the integration of technology in Public Safety Administration
Name of the Student;
Institution affiliation;
Date of Submission;
PUBLIC SAFETY 2
Executive briefing on integrating technology for response on cyber bullying
1. Problem
The problem identified is that most people using social media are prone to cyber bullying
with some being direct or indirect victims of the said cybercrime. Cyber bullying is a first
emerging public safety issue that has been neglected over the decade. (Tokunaga, 2010) It has
been propelled by the emergence of social media platforms and thus increasing the online
presence of variating individual characters.
Experts have described cyber bullying as bullying that is executed on digital devices such
as mobile phones and computers. The act is perpetrated on online platforms availed by the
devices such as text messages online applications and social media forums. It occurs by sharing
content on the platforms that can be described as negative, dangerous and harmful to someone
else. It includes private information on someone that causes great exposure or humiliation. Most
of these acts are usually for purposes of blackmail or extorting some material or information
from the affected party.
While some states have legislations on criminal law applying to cyber bullying not all of
them, have effective response methods as it is assumed that most of these bullying happens in
only in schools or to adolescent peers. However, these are not true. It is such kind of assumptions
that have propelled the crime to be a first rising issue that is a direct threat to public safety. Cyber
bullying is a crime that is perpetrated by anyone, even older generations like workmates or
neighbors living next door. This is because, by statistics, online presence and use of internet
across the world has greatly increased in the past years. The data indicated below shows the
percentage of internet users around the globe by specific continents.
PUBLIC SAFETY 3
2. Proposed solution
The proposed solution is to the local government authority, is the independent setting up
of a policing institution and oversight committee that specifically handles the response to the said
cybercrime. (Nhan and Huey, 2009) The authorities mandated with the administration of public
safety policies such as the national government at Congress level and the local government
should device legislative policies that empower the policing institution dealing with the public
safety menace.
The policing institution set up should be facilitated with resources that enable an efficient
response. This is because, as indicated in the chart, the internet has made the world a global
49%
17%
11%
4%
7%
11%
0%
internet users as per continent
asia europe africa middle east north america south america 11% austria
PUBLIC SAFETY 4
place. Cyber bullying is not limited to just the people living in a certain jurisdiction, as there are
numerous people operating online around the universe.
An independent policing institution will help in the quick tracing of the source where the
cyber bully is operating from or main area code in which the cybercrime is usually perpetrated
from. With such kind of resources to make a quick trace, the said institution can prove then lias
with authority mandated with administering public safety in the jurisdiction to move swiftly in
response and take action on the perpetrator of the crime.
Dealing with cyber bullying is not an easy task however and requires a combined effort
and a huge amount of resources ranging from finances, manpower and facilities for the same.
Since all of the Cybercrime happens online, the policing institution should thus be facilitated
with resources that enhance harnessing of online intelligence network and information. The
institutions must also be allowed to partner with the private sector that handles and deals with
online communication and innovation. As we can all see, such measures may include the
acquisition of sate-likes to do the supervisory work.
3. Cost of solution
Tackling Cyber- crime by forming independent institution will require heavy financial
investment. Both the local government and the national government will require forming a
supplementary budget that specifically aims at setting aside funds to facilitate this activity.
(Fischer and Halibozek, 2009) The government has no doubt invested heavily in the homeland
and international security and definitely allocates a lot of funds to this exercise. There has been a
budgeting proposal by the government on U.S spending to handle cyber security for the
dissimilar government security agencies and programs. According to varying reports, the
PUBLIC SAFETY 5
department of homeland security has proposed around 980 million U.S dollars to handle cyber-
related crimes. The table below shows a critical analysis on proposed budgets by the various
security agencies.
Security agent Proposed budget in a million U.S dollars
Security agent
Proposed budget in million U.S dollars
DHS; Cyber tasks
980
DHS; cyber protection system
400
DHS; scientific directorate
440
DHS; programs directorate
11
DHS; diagnostic and mitigation
280
DHS; NCICC
50
DOJ; FBI cyber operations
42
DOJ; dark investigative tech
22
DOJ; foreign cyber operations
20
NIST; technology research
650
The statistics indicated above are as per the year 2018. The large sum of the proposal indicates
that if there were an independent institution that specifically handled, cyber-related matters, then
the government would be able to support it financially.
PUBLIC SAFETY 6
4. Benefits
The first major benefit would be that the government would manage to keep up with the
ever-changing online security trends. Setting up an independent policing institution would assist
in monitoring efficiency, as the mission and vision of the same would be defined and thus
avoiding collision with other tasks and responsibilities as earlier on proposed in public safety.
The other major benefit would be that the institution would assist the government in
saving up financial resources as the parties being budgeted for would be minimized to only one.
As seen in the analyses above, the government receives proposals on cybercrime safety matters
from both the department of justice and the department of homeland security. Both of these
departments have their varying proposals, and thus budget on cybercrime is split. However, with
the setting up of an independent cybercrime response institution, budgeted finance would thus be
integrated to serve one department and thus cutting down unnecessary expenses
The government would also manage to respond to cybercrime related issues more quickly
and efficiently. With the clear definition of the institution's missions and visions, the
responsibility and duties of responding to cybercrime would be clearly defined and thus efficient
response and accountability as to negligent responses. (Boes&Leukfeldt, 2017) It would also
quicken response as the numerous protocols involved when it comes to response would be
minimized.
The institution would be solely responsible for any decision making, rather in a joint task
force which requires the approval of different officials tasked with the administration of the
different public safety institutions in the department of justice and department of homeland
PUBLIC SAFETY 7
security. The protocol of response would thus be minimized to approval by the officials in charge
of administration in the newly set up institution
In conclusion, the proposal to set up an independent institution that is specifically
mandated to handle the emerging threat towards public safety should be highly considered as it
has more benefits to both the public and government as a whole.
PUBLIC SAFETY 8
REFERENCES;
Boes, S., &Leukfeldt, E. R. (2017). Fighting cybercrime: A joint effort. In Cyber-Physical
Security (pp. 185-203). Springer, Cham.
Fischer, R., &Halibozek, E. (2008). Introduction to security. Butterworth-Heinemann.
Nhan, J., & Huey, L. (2009). Policing through nodes, clusters and bandwidth. Technocrime:
Technology, crime and social control,
Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of
research on cyberbullying victimization. Computers in human behavior.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.