TACKLING NATIONAL SECURITY CHALLENGES USING INFORMATION TECHNOLOGY

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0224
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 62 Pages
  • Methodology: Simple Percentage
  • Reference: YES
  • Format: Microsoft Word
  • Views: 2K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

TACKLING NATIONAL SECURITY CHALLENGES USING INFORMATION TECHNOLOGY


ABSTRACT
Information Technology (IT) is the bedrock for rapid development in a nation, and challenges us to devise bold and courageous initiatives to address a host of vital socio-economic issues such as national security, reliable infrastructure, skilled human resources, open government and other essential issues of capacity building.
 The measures adopted to maintain national security in the face of threats to society has led to ongoing dialectic, particularly in liberal democracies, on the appropriate scale and role of authority in matters of civil and human rights.
Although national security measures are imposed to protect society as a whole, many such measures will restrict the rights and freedoms of all individuals in society. This research work tries to examine ways of tackling national security challenges using Information Technology system as a tool.

CHAPTER ONE-

INTRODUCTION
1.0 Background of Study
Information Technology (IT) is the bedrock for national survival and development in a rapidly changing global environment, and challenges us to devise bold and courageous initiatives to address a host of vital socio-economic issues such as national security, reliable infrastructure, skilled human resources, open government and other essential issues of capacity building.
In addition, an Information Technology security built on reliable human resources and infrastructure constitutes the fundamental tool and means of assessing, planning, managing development change and for achieving sustainable growth. It is for this reason that every progressive country has a national IT policy and an implementation strategy to respond to the emerging global reality and thus avert becoming a victim of the digital divide. A developing nation like Nigeria that aspires to participate effectively and become a key player in the emerging Information Age needs to have in place, a highly efficient Information Technology system driven by a vibrant national Security IT.
The measures adopted to maintain national security in the face of threats to society has led to ongoing dialectic, particularly in liberal democracies, on the appropriate scale and role of authority in matters of civil and human rights. Tension exists between the preservation of the state (by maintaining self-determination and sovereignty) and the rights and freedoms of individuals. Although national security measures are imposed to protect society as a whole, many such measures will restrict the rights and freedoms of all individuals in society.

1.1     Statement of problem

This study is primarily delved into order to find out how information technology could be used in National security challenges. It looks out for the challenges encountered in National Security and how they could be tackled.
This is deemed necessary because Information technology in National security challenges have been known to have been performing poorly over the years. It has been observed that the main reason for this low performance or ineffectiveness is due to poor Information technology in the country.

1.2 Research Question

i.    Are there suitable, qualified, experienced and well trained personnel to use information technology to track national security challenges?
ii.    Using the IT does it affect the national security in anyway?
iii.    Do you think there is capacity building in national security using IT?
iv.    Do you think the use of information technology will facilitate national survival security?
v.    Do you think if IT is used, it will help in economic strategy in challenges faced in national security in our country?
vi.    With the introduction of IT facilities in national security has there been a positive increase in security challenges in the country?
vii.    Do you think IT also help in military security, political security and economic security?

1.3 Objective of study

i.    To ensure that Information Technology resources are readily available to promote efficient national development.
ii.    To guarantee that the country benefits maximally, and contributes meaningfully by providing the global solutions to the challenges of the Information Age.
iii.    To empower Nigerians to participate in software and IT development.
iv.    To encourage local production and manufacture of IT components in a competitive manner.
v.    To improve accessibility to public administration for all citizens, bringing transparency to government processes.
vi.    To establish and develop IT infrastructure and maximize its use nationwide.
vii.    To enhance planning mechanisms and forecasting for the development of local infrastructure.

viii.    To enhance the effectiveness of environmental monitoring and control systems.

ix.    Providing new tools and methods for the national security community to share and use information.

x.    Enhancing how the national security community makes decisions, shares operational information and communicates in a crisis.
xi.    Contributing to the evidence base for policies and standards that enhance our national security.
xii.    Developing smarter tools and methods to detect, observe, monitor and identify entities of interest or concern.
xiii.    Ensuring agencies have the ability to collect, analyze and use evidence from a range of sources.

1.4 Scope of Study

This scope of this research work will be limited to the National Security Challenges using Information Technology.

1.6 Definition of Terms

Technology: Scientific knowledge used in practical way in industry.
Information: are data that have processed by the computer.
Information Technology (IT) can be defined as any computer based tool capable of accepting data and processing it into useful information as well as transporting anddisseminating it to user who need them.
National Security:  is a capacity to control those domestic and foreign conditions that the public opinion of a given community believes necessary to enjoy its own self-determination or autonomy, prosperity and well-being.

TACKLING NATIONAL SECURITY CHALLENGES USING INFORMATION TECHNOLOGY
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0224
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 62 Pages
  • Methodology: Simple Percentage
  • Reference: YES
  • Format: Microsoft Word
  • Views: 2K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU0224
    Fee ₦5,000 ($14)
    Chapters 5 Chapters
    No of Pages 62 Pages
    Methodology Simple Percentage
    Reference YES
    Format Microsoft Word

    Related Works

    ABSTRACT This research work seeks to reveal the Causes and effects of insecurity in Nigeria and the challenges and relevance of the Enugu State as a panacea. It is on this premise that the study bases its emphasis on the Enugu State to appraise and ascertain efforts and limitation... Continue Reading
    ABSTRACT The insecurity challenge in Nigeria has assumed a formidable dimension that not only requires a multistakeholder approach, as it is being touted in various quarters, in quelling this conflagration threatening Nigeria’s statehood, but also necessitates a revival... Continue Reading
    CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
    CHAPTER ONE INTRODUCTION Background of the study Worldwide Port and Maritime operations and their associated facilities and infrastructure collectively represent one of the single greatest unaddressed challenges to the security of nations and the global economy today. The reason that ports and shipping activity are so difficult to secure lies... Continue Reading
    CHAPTER ONE INTRODUCTION Information technology (IT) plays a critical role in many businesses and organization including safety and security management. Safety and Security Management focuses on the safety and security of people, organizations and public spaces. It meets a... Continue Reading
    ABSTRACT This study was intended to evaluate the maritime security, information and communication technology. The study employed the descriptive and explanatory design; questionnaires in addition to library research were applied in order to collect data. Primary and secondary data sources were used and data was analyzed using the correlation... Continue Reading
    TABLE OF CONTENTS   CONTENTS                                                                                                           PAGES   Certification--------------------------------------------------------------------------------------i... Continue Reading
    TABLE OF CONTENTS   CONTENTS                                                                                                           PAGES   Certification--------------------------------------------------------------------------------------i... Continue Reading
    ABSTRACT This study examined the impact of integrated personnel payroll and information system in tackling fund mis-management in Nigeria public service. Primary source of data was used with questionnaires administered to internal audit department of Corporate affair commission Ogo Oluwa Osogbo and Federal polytechnic Ede Osun State. The data were... Continue Reading
    CHAPTER ONE INTRODUCTION 1.0Background of the Study The rapid adoption of information communication and technology  by journalist is a nationwide phenomenon. The process by which computerization or digitalization impacted upon the media of the 21th Century has moved on many fronts and at different speeds.  Agba (2007, p.83) notes that “ with... Continue Reading
    Call Us
    whatsappWhatsApp Us