Skip to Content
Author's profile photo Former Member

Observations from the field – Public Security and Collaborative Outcomes

Collaborative outcomes enable the interests of multiple departments, organizations or agencies to be met through sharing resources or information in a synergistic fashion.  While preparing to travel to South Africa for business, I registered with the US State Department – a service for citizens traveling abroad to help in keeping them safe.  I am not sure exactly where my information went, but I felt more comfortable knowing that someone could alert me if my travel plans or activities would be affected during my visit.  While on my trip, I received updates on my Blackberry to incidents that transpired.  In a case such as this, I would like to know that governments or organizations are working together, so that I would be alerted if, for example the area where my hotel was located had been affected by a power outage, or even a vehicle accident which prevented me from entering the area, and provided alternate routes I might take.  In these types of events, the utility company would collaborate with government to alert them of the power outage, and Police would respond to ensure traffic is not affected, or even position additional units in the area to deter crime.  They can collaborate in this way through a common Business Process Platform, on which each organization is able to better accomplish its mission by utilizing necessary information which may reside outside of the organization itself.  During my visit I was interested to see that the South African government is already working closely with the tourism industry to ensure that travelers are safe during their stay in the area.  Organizations collaborating in these ways helps to maintain the safety of the public and also to ensure the resilience of the government as a whole by aligning the proper resources with the incidents at hand.  Leveraging Business Process Platforms to support these Collaborative Outcomes is an ideal way to improve public security.

Assigned Tags

      1 Comment
      You must be Logged on to comment or reply to a post.
      Author's profile photo Former Member
      Former Member
      As time moves on the subject of civil alarms get more attention world-wide.
      You ponder on the question 'so that I would be alerted if, for example the area where my hotel was located had been affected . . ' – and who would do that.

      Apart from a collaborative outcome (safety for all) we need a collaborative input. This means (1) all actors must share essential information on their grasp on the operational field  – and (2) subjects (civilians) willing to share some of their privacy.
      The first element is sharing knowhow (like the nature of events, man-made hazards or natural catastrophes for instance). This must fit a ‘common operation picture’ that the emergency responders share to act within the frame of responding. A lot of attention is given here.
      The second part is interesting. Many civil alarm concepts are based on a brute force approach. That means: grasp the content of the Home Location Register of the mobile operator and dump an message to all in an area.
      A smart way might well fit in with your concept: a method to have lists shared from corporate, (employees and guests on a compound, known from ID cards), the afore mentioned telecommunications clients in the vincity on a set of infrastructures; PLUS the access to a repository of situational importance. As a disabled, for instance, I’d like to receive a different message. A message ‘get out/get inside’) might reach me just too late. Conversely - if I just happen to be a medic – then I want to help and give support (I am obliged by my oath to give it!), the emergency team must be able to find and recognize my capabilities.

      In essence this means adding a one-to-one communications style to the civil alarms.

      This implies an even broader concept to the nature of the unifying infrastructure. It als points to the need to have utmost security (privacy) to all the data.

      Interesting topic.