This plan would also create borders around each

This preview shows page 1 - 2 out of 2 pages.

(see topic II for more detail). This plan would also create borders around each mission to further the security. Lastly, if an unauthorized person were to enter the mission, there would be bomb shelters and hiding spaces that each civilian and peacekeeper is assigned to. Bimonthly drills would take place to ensure that each person knows where they are going and they can get there quickly. Funding from the TBS plan would come from a small percentage of each nation’s GDP. If this fee is not paid, then that specific country will have to pay a small biannual fee (depending on their GDP). II. Using ICTs to Enhance Peacekeeping Operations For many years, the United Nations has implemented peacekeeping missions across the globe to ensure that the world becomes a safer place. Although these missions definitely get the job done, there are some issues with security. It is very difficult to keep track of the thousands of personnel within these missions. However, it can be easier if one were to use Information and Communication Technologies (ICTs). In the new technological age, the United Nations has tried to keep up with the latest innovations. Some of these initiatives include Force Protection and Security Technology Services,the Modular Command Centre Project, and Advanced Threat Detection and Sensor Information Fusion System Services Project. The main goal of these projects is to increase the security and safety of the peacekeeping missions, but they have not done a very good job considering the many threats that each mission faces each day. On multiple occasions, terrorists have easily entered the missions, killing and wounding dozens of people each year. The United Nations needs to focus on the safety of these civilians more than anything else, and more ICTs can definitely help solve this problem. The Grand Duchy of Luxembourg strongly suggests that the United Nations implements growth of security given the world’s new resources. Technology has been taking the world by storm in the past few decades. Why not use it to ensure the safety and security of these innocent people? This new security would include identification
Image of page 1

Subscribe to view the full document.

Image of page 2

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask 0 bonus questions You can ask 0 questions (0 expire soon) You can ask 0 questions (will expire )
Answers in as fast as 15 minutes