Friday, September 13, 2019

The Impact Of Technology On Modern Warfare Research Proposal

The Impact Of Technology On Modern Warfare - Research Proposal Example In this respect, it will be critical to highlight the history of modern technology in modern warfare. After exploring the history of technology in warfare over time, transitions from one technology to another will be considered. Computer and the internet era, information technology, surveillance, intelligence, weapon accumulation, and fire volumes (Singer 77) will be explored in detail. Use of different sources will provide key insights in this section. Following massive technological developments, it is evident that modern warfare practices are more effective and efficient compared to both World War I and II (Chakrabarti 57). This section will consider current state of affairs as far warfare activities are concerned. Command and control of modern warfare is an intensive and extensive exercise. This exercise encompasses the use of computer, surveillance, information, target acquisition, and communication systems (Loo 91). For successful, effective, and efficient execution of contemporary warfare, it is critical to integrate these systems. This section will explore strategies, actions, and policies that aid in the integration of the aforementioned systems. The continued use of advanced technologies in warfare comes with a number of advantages. Primary advantages of technology in warfare include faster, quicker, and more destructive combat, nuclear weapons, employment of information war as opposed to physical combat, relieving soldiers of heavy load during combat, use of drones, communication anytime anywhere, and global communication and surveillance among others (Howorth 106). Amid the above-highlighted advantages of technology in modern warfare, critical technological vulnerabilities are evident. Privacy and security of software used by military and related agencies could be in jeopardy if massive caution and protection are not in place (Percy 83). Hacking and other forms of cybercrimes are also critical to the prospects of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.