TACKLING NATIONAL SECURITY CHALLENGES USING INFORMATION TECHNOLOGY - Project Topics & Materials - Gross Archive

Click To download full Project Materials

TACKLING NATIONAL SECURITY CHALLENGES USING INFORMATION TECHNOLOGY


ABSTRACT
Information Technology (IT) is the bedrock for rapid development in a nation, and challenges us to devise bold and courageous initiatives to address a host of vital socio-economic issues such as national security, reliable infrastructure, skilled human resources, open government and other essential issues of capacity building.
 The measures adopted to maintain national security in the face of threats to society has led to ongoing dialectic, particularly in liberal democracies, on the appropriate scale and role of authority in matters of civil and human rights.
Although national security measures are imposed to protect society as a whole, many such measures will restrict the rights and freedoms of all individuals in society. This research work tries to examine ways of tackling national security challenges using Information Technology system as a tool.

CHAPTER ONE-

INTRODUCTION
1.0 Background of Study
Information Technology (IT) is the bedrock for national survival and development in a rapidly changing global environment, and challenges us to devise bold and courageous initiatives to address a host of vital socio-economic issues such as national security, reliable infrastructure, skilled human resources, open government and other essential issues of capacity building.
In addition, an Information Technology security built on reliable human resources and infrastructure constitutes the fundamental tool and means of assessing, planning, managing development change and for achieving sustainable growth. It is for this reason that every progressive country has a national IT policy and an implementation strategy to respond to the emerging global reality and thus avert becoming a victim of the digital divide. A developing nation like Nigeria that aspires to participate effectively and become a key player in the emerging Information Age needs to have in place, a highly efficient Information Technology system driven by a vibrant national Security IT.
The measures adopted to maintain national security in the face of threats to society has led to ongoing dialectic, particularly in liberal democracies, on the appropriate scale and role of authority in matters of civil and human rights. Tension exists between the preservation of the state (by maintaining self-determination and sovereignty) and the rights and freedoms of individuals. Although national security measures are imposed to protect society as a whole, many such measures will restrict the rights and freedoms of all individuals in society.

1.1     Statement of problem

This study is primarily delved into order to find out how information technology could be used in National security challenges. It looks out for the challenges encountered in National Security and how they could be tackled.
This is deemed necessary because Information technology in National security challenges have been known to have been performing poorly over the years. It has been observed that the main reason for this low performance or ineffectiveness is due to poor Information technology in the country.

1.2 Research Question

i.    Are there suitable, qualified, experienced and well trained personnel to use information technology to track national security challenges?
ii.    Using the IT does it affect the national security in anyway?
iii.    Do you think there is capacity building in national security using IT?
iv.    Do you think the use of information technology will facilitate national survival security?
v.    Do you think if IT is used, it will help in economic strategy in challenges faced in national security in our country?
vi.    With the introduction of IT facilities in national security has there been a positive increase in security challenges in the country?
vii.    Do you think IT also help in military security, political security and economic security?

1.3 Objective of study

i.    To ensure that Information Technology resources are readily available to promote efficient national development.
ii.    To guarantee that the country benefits maximally, and contributes meaningfully by providing the global solutions to the challenges of the Information Age.
iii.    To empower Nigerians to participate in software and IT development.
iv.    To encourage local production and manufacture of IT components in a competitive manner.
v.    To improve accessibility to public administration for all citizens, bringing transparency to government processes.
vi.    To establish and develop IT infrastructure and maximize its use nationwide.
vii.    To enhance planning mechanisms and forecasting for the development of local infrastructure.

viii.    To enhance the effectiveness of environmental monitoring and control systems.

ix.    Providing new tools and methods for the national security community to share and use information.

x.    Enhancing how the national security community makes decisions, shares operational information and communicates in a crisis.
xi.    Contributing to the evidence base for policies and standards that enhance our national security.
xii.    Developing smarter tools and methods to detect, observe, monitor and identify entities of interest or concern.
xiii.    Ensuring agencies have the ability to collect, analyze and use evidence from a range of sources.

1.4 Scope of Study

This scope of this research work will be limited to the National Security Challenges using Information Technology.

1.6 Definition of Terms

Technology: Scientific knowledge used in practical way in industry.
Information: are data that have processed by the computer.
Information Technology (IT) can be defined as any computer based tool capable of accepting data and processing it into useful information as well as transporting anddisseminating it to user who need them.
National Security:  is a capacity to control those domestic and foreign conditions that the public opinion of a given community believes necessary to enjoy its own self-determination or autonomy, prosperity and well-being.

TERMS AND CONDITIONS

Using our service is LEGAL and IS NOT prohibited by any university/college policies

You are allowed to use the original model papers you will receive in the following ways:

1. As a source for additional understanding of the subject

2. As a source for ideas for your own research (if properly referenced)

3. For PROPER paraphrasing ( see your university definition of plagiarism and acceptable paraphrase)

4. Direct citing ( if referenced properly)

Thank you so much for your respect to the authors copyright.


For complete Project

Visit www.grossarchive.com

Or call

+2348130686500

+2348093423853