Skip to main content

2022 | OriginalPaper | Buchkapitel

16. Geographic Information System (GIS) for National Security

verfasst von : Amit Mukherjee

Erschienen in: Varying Dimensions of India’s National Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The ubiquitous nature of geospatial information systems has made them a useful system for managing and mitigating issues of resource and service management. It plays a crucial role in collecting, collating, analysing, distributing information that can better process the mechanisms of any earthly process or cycle. Its use in national security too is omnipresent. The significance of a location and location-based information for security purposes, traditional and non-traditional, find efficient manoeuvring of processes and information for the meeting of desired goals. The development of Geographic Information System (GIS) systems and related advancement has led to a stage where conventional aspects and information of national security can be integrated with GIS systems. This would reduce analysis time and increase efficiency in decision-making for the security issues.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
C3ISR is the acronym for military standards that define the command control and communication, intelligence, surveillance, and reconnaissance protocols for operational elements of traditional security. With the advent of computers this has been transformed to C4ISR where the added element of computers has been incorporated to take advantage of the IT revolution. GIS enhances this ability of computers to its full potential in planning and achieving operational effectiveness, due to its capability to integrate spatial and temporal data.
 
Literatur
Zurück zum Zitat Austin, R. F., Disera David, P., & Brooks Talbot, J. (2015). GIS for critical infrastructure protection of India. CRC Press, Taylor and Francis.CrossRef Austin, R. F., Disera David, P., & Brooks Talbot, J. (2015). GIS for critical infrastructure protection of India. CRC Press, Taylor and Francis.CrossRef
Zurück zum Zitat Coley Micahel M. (2005). JGES—Research program (JGES-RP). U.S. Army Engineer Research and development Centers; Topographic Engineering Center. Alexandria USA. Coley Micahel M. (2005). JGES—Research program (JGES-RP). U.S. Army Engineer Research and development Centers; Topographic Engineering Center. Alexandria USA.
Zurück zum Zitat Chen, Z., Lin, H., Chen, M., Liu, D., Bao, Y., & Ding, Y. (2014). A framework for sharing and integrating remote sensing and GIS models based on Web service. Scientific World Journal, 2014, 354919. Chen, Z., Lin, H., Chen, M., Liu, D., Bao, Y., & Ding, Y. (2014). A framework for sharing and integrating remote sensing and GIS models based on Web service. Scientific World Journal, 2014, 354919.
Zurück zum Zitat Gupta, A. (2018). How India manages its national security. Penguin Books. Gupta, A. (2018). How India manages its national security. Penguin Books.
Zurück zum Zitat Gandhi, N. (2010). National security: Emerging dimensions and threats. Pentagon Press. Gandhi, N. (2010). National security: Emerging dimensions and threats. Pentagon Press.
Zurück zum Zitat Kaplan, D., & Hakli, J. (Eds) (2001). Bordering Europe and bounding states: The ‘civilizational’ roots of European national boundaries. In Borderlands and place, Rowman and Allenheld (pp. 54–77). Boston: Rowman & Littlefield. Kaplan, D., & Hakli, J. (Eds) (2001). Bordering Europe and bounding states: The ‘civilizational’ roots of European national boundaries. In Borderlands and place, Rowman and Allenheld (pp. 54–77). Boston: Rowman & Littlefield.
Zurück zum Zitat Koontz Linda D. (2003). Geographic information systems. Challenges to effective data sharing. Testimony Before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, Committee on Government Reform, House of Representatives, United States General Accounting Office, USA, x:1, Retrieved June 17, 2020, from https://www.gao.gov/new.items/d03874t.pdf. Koontz Linda D. (2003). Geographic information systems. Challenges to effective data sharing. Testimony Before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, Committee on Government Reform, House of Representatives, United States General Accounting Office, USA, x:1, Retrieved June 17, 2020, from https://​www.​gao.​gov/​new.​items/​d03874t.​pdf.
Zurück zum Zitat OGC Standards and Resources. (2019). OGC. Wayland Massachusetts. OGC Standards and Resources. (2019). OGC. Wayland Massachusetts.
Zurück zum Zitat Paleri. (2008). National security: Imperatives and challenges. Tata McGraw-Hill. Paleri. (2008). National security: Imperatives and challenges. Tata McGraw-Hill.
Zurück zum Zitat Steele Robert David. (2007). Open-source intelligence—Intelligence ethics—Hand book of intelligence (p. 142). London, New York: Routledge. Steele Robert David. (2007). Open-source intelligence—Intelligence ethics—Hand book of intelligence (p. 142). London, New York: Routledge.
Zurück zum Zitat Upadhyaya, P, (2006). Securitization matrix in South Asia: Bangladeshi migrants as enemy alien. In M. Caballero-Anthony, M. Caballero, R. Emmers, & A. Acharya (Eds.), Non-traditional security in Asia: Dilemmas in securitization (pp. 13–39). Burlington. UK, VT: Ashgate Publishing. Upadhyaya, P, (2006). Securitization matrix in South Asia: Bangladeshi migrants as enemy alien. In M. Caballero-Anthony, M. Caballero, R. Emmers, & A. Acharya (Eds.), Non-traditional security in Asia: Dilemmas in securitization (pp. 13–39). Burlington. UK, VT: Ashgate Publishing.
Zurück zum Zitat Wortman Kathryn, C. (2013). Developing standards for a national spatial data infrastructure. Cartography and Geographic Information Systems, 1994(3), 132–135. Wortman Kathryn, C. (2013). Developing standards for a national spatial data infrastructure. Cartography and Geographic Information Systems, 1994(3), 132–135.
Zurück zum Zitat Wheatley, D., & Gilling, M. (2002). Spatial technology and archaeology: The archaeological applications of GIS. Published January 24, 2002. CRC Press.CrossRef Wheatley, D., & Gilling, M. (2002). Spatial technology and archaeology: The archaeological applications of GIS. Published January 24, 2002. CRC Press.CrossRef
Metadaten
Titel
Geographic Information System (GIS) for National Security
verfasst von
Amit Mukherjee
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-7593-5_17