Monday, November 18, 2019
Policy Brief Essay Example | Topics and Well Written Essays - 500 words
Policy Brief - Essay Example This service will also promote security and make people to refrain from getting involved in criminal activities. They will therefore, look for other options such as setting up a business to sustain themselves. This will increase the level of employment and widen the sources of revenue to the government. The gross domestic product of the country will also improve due to increase in number of people doing business. Furthermore, it will enhance productivity among the members of a society because; they will not be worried about their security. The service will be tested through multiple testing to ensure that it works and is free from abuses. This technology will require every mobile owner to submit his or her details with the intelligence offices. The fingerprints will be taken and every individual will have a secret code that will be pressed once criminals attack a person. Once the code is pressed, security personnel will be alerted. The location and the names of the individual appear on the security personnel computers. The security personnel will quickly identify the nearest police stations in the area and instantly communicate for a quick measure to be taken. Mobile phones will therefore, be used to ensure that security of the individual is guaranteed. The service will function in such a way that even if the phone is stolen, the second person cannot use it. The phone can be traced and the last personââ¬â¢s fingerprint will be detected and used to launch investigation using information stored in the database in the security headquarter. For this mobile service to succeed, it requires cooperation of security officers with the citizens. Every citizen will be required to scan their fingers and retain their details with police officers. The second condition is that the person when attacked must dial the secret code. Thirdly, the security intelligence department will be required to be vigilant and put up measures to enhance the security of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.