Disaster Management Process

1842 Words4 Pages

Introduction

A disaster is the occurrence of a negative impact through human or natural efforts that leads to human suffering. They are highly associated with effects that leave man in a situation he cannot easily alleviate themselves without external assistance. The scenario is also said to have manifested itself if a disaster occurs in a disaster prone area (Wattegama, 2007).

Due to the essentiality of disaster management in today’s world, there has been generally a holistic approach rather than a single approach ideology to the issue. This interdisciplinary approach is what is referred to as disaster management. It tries to curtail disasters as well as strategically protect critical assets of an organisation. The field is also burdened with the role of ensuring existing processes last for their stipulated lifetime (Haddow G. et.al. 2007).

This paper will seek to address how XYZ can formulate an efficient disaster management policy under my steer ship as their consultant. It will further look into the core aspects of disaster management programs, how they are formulated, run and maintained.

The disaster cycle

Disaster management in practise has four phases unlike some theories that seem to suggest three. The four can be identified as: Prevention or Mitigation; Preparedness; Response; and Rehabilitation or Reconstruction. What is evident is that those who propose three phases tend to integrate the response and rehabilitation phases yet the two are distinct and autonomous of each other. The four phases are illustrated in the diagram 1.

In the prevention stage, preventive safeguards are setup in an effort to stop the occurrence of disasters. In the ICT world, this could entail a wide range of steps. They would generally indul...

... middle of paper ...

... should invest considerably in efficient security and surveillance systems. They should ensure that the safety of the firm is well implemented and all the necessary support teams are well informed and equipped to avert any eventuality. Ensuring information is not leaked and sabotage is averted should be considered and even if a difficult objective with proper systems and adequate resources it can be enhanced.

References

Greenwald, R., Stackowiak, R., & Stern, J. (2007). Oracle Essentials: Oracle Database 11g, 4th ed. (p.386). O’Reilly Media, Inc.

Haddow, G, Bullock, J., & Coppola, D.P. (2007). Introduction to Emergency Management,

Third Edition (Homeland Security Series) (p. 496). Butterworth-Heinemann. Retrieved from http://www.amazon.com/Introduction-Emergency-Management-Homeland-Security/dp/075068504X

Wattegama, C. (2007). ICT for Disaster Management.

Open Document