The technology industry has taken a paradigm shift and is fast evolving. In the next five years, technology usage will have had a profoundly more considerable impact on how industries operate. Pervasive technological effects have resulted in the radical restructuring of entire industries (Bharadwaj et al., 2013). It has become evident that adopting real-time digital technologies results in a high rate of productivity.
One of the areas where technological interventions should be applied is security, and in particular terror combat sector. The future of anti-terrorism is dependent on advanced breakthrough technological features since terrorist groups, with their limited resources, are quick in refining their existing methods and improvising time-tested techniques that might overcome the military troops out there in the field (Pavlou and El Sawy, 2010). Terrorist groups are in a battle that they believe they are yet to win and they are always at the forefront in seeking new ways in striking the new targets. Therefore, the next five years in the Anti-Terrorism sector need advanced methods, which are inclusive of system technologies, Biometrics, non-lethal weapons, data mining and link analysis technologies, nanotechnology and directed-energy weapons. All these can be achieved by adopting new computer systems that can support an array of such applications. Network-centric operations are part of the system-integrated technologies and eases effectiveness through networking sensors, which in turn ensures active coordination between emergency responders, law enforcement officials and decision makers thus enhancing shared awareness, increase the speed of command and higher tempo of operations in curbing vulnerability to potential hostility. On the other hand, the idea on biometrics ensures details of every individual who enters or leaves any nation are captured and stored in the computer database for future identification or verification. Such biometrics make it easy for the Anti-Terrorism Agencies to narrow down to individuals who are suspected of possible or have been involved in mass killings since biometric details are unique to every individual. Individual features captured in the computer systems include hand geometry, face recognition, voice recognition and Iris recognition.
Delegate your assignment to our experts and they will do the rest.
A wide range of computing in this industry in the next half-decade should be on a platform of supporting the application referred to as Non-lethal Weapons. There is a more significant challenge at the battlefields as forces try combating the enemy. In a bid to safeguard lives, possible destruction of property, apprehend, and incapacitate the enemy, the Anti-Terrorism sector ought to do things the smart way. In the next five years, computer applications will have been improvised to accommodate the idea of non-lethal weapons that are controlled by expertise in the server rooms without necessarily engaging forces on a man-on encounter with the terrorist. Such discriminate weapons are designed to incapacitate the enemy or bombs and missiles thus minimizing fatalities and undesired damage to property and environment. The broad spectrum covered by non-lethal weapon ranges from development of acoustic systems, non-penetrating projectiles, and munitions, communication system, electromagnetic systems, and chemicals. There is also the idea of data mining, which tracks the historical and current online data to support informed decision-making. Vast datasets are subjected to scrutiny to aid in identifying patterns and anomalies from previous searches ("Future of Anti-Terrorism Technologies | The Heritage Foundation," n.d.). Data mining and link analysis in computing can harbor and exploit the vast amount of information about individuals undergoing probing and thus stands out to be the most efficient, unlike the initial processes where trailing terrorists were often indistinguishable from a mass of bills, census records, license applications and visa forms.
References
Bharadwaj A., O.A. El Sawy, P.A. Pavlou, N. Venkatraman. Digital business strategy: Toward a next generation of insights.
P.A. Pavlou, O.A. El Sawy. The ‘third hand': IT-enabled competitive advantage in turbulence through improvisational capabilities
The Future of Anti-Terrorism Technologies | The Heritage Foundation. (n.d.). Retrieved from http://www.heritage.org/homeland-security/report/the-future-anti-terrorism-technologies