0 Comments

Description

For the Capstone Project, you will complete a policy analysis, program evaluation, or administrative analysis. The Capstone Project The Department of Homeland Security. I have attached the first half.

To complete the Capstone Project, you will write a paper that addresses the following:

  1. Getting Started
  • Write 2–3 sentences describing a problem or issue related to public administration, public policy, or nonprofit management and leadership.
  • Identify which type of Capstone paper (i.e., policy analysis, program evaluation, or administrative analysis) would be appropriate for this particular problem or issue.
  1. Research Question
  • Identify your research question.
  • Write a 1- to 2-page rationale for your research question, including why the question is relevant to public administration, public policy, or nonprofit management and leadership.
  1. Literature Review
  • Write a 12- to 14-page literature review that includes a minimum of 20–25 relevant scholarly articles, research reports, and/or other academic sources. Be sure to follow the literature review guidelines provided in the Machi and McEvoy (2012) text.
  1. Types of Data and Research Methods
  • Write 4–5 pages explaining the types of data that may help you answer your research question, including which research method might be best if you were to collect data for your Capstone Project and why.
  1. Conclusions and Recommendations
  • Write 3–4 pages explaining conclusions you might make, based on the analysis of the literature you found and your proposed research. Include recommendations, as well as how you might disseminate this information to relevant stakeholders.
Research Question
1
Research Question
Courtnie Walker
Walden University
March 17, 2019
Research Question
2
Research Question
Liberty and privacy from the Department of Homeland Security is relevant to public
administration. DHS is a dynamic player in the construction of public Trust initiative that gets
motivation from increasing relations between its officers, and members of the communities they
serve. Initiating and sustaining the relationships maintains sharing info, encourages law
enforcement awareness to community trepidations and significant concerns, and how to applicably
identify suspicious activities by distinguishing between innocent behaviors and behaviors that
indicate of radical and criminal activity (Carter, 2017).
The liberty and privacy policy also facilitate making information openly available in a way
that enhances how a community understands the intelligence undertakings, while persistently
protecting information whose revelation would damage national security.
Liberty and privacy from the DHS are relevant to public policy. Freedom depends on
security, and as known in America depends on eradicating the risk of terror from our lives.
Therefore, the DHS must do everything in their capability to preserve the fundamental freedoms
and privacy protected by the U.S. Constitution. For example, the right to be free from irrational
combs and attacks from the security agency.
Having the policy allows the public to freely express their ideas and feel that they can give
testimonies on criminal activities and other grievances Instead of going against the law to get their
justice, they trust the DHS with this role.
The relevance of liberty and privacy of nonprofit management organizations from the DHS
is essential. It is because the organizations’ activities should not be disrupted if the organizations
do not harm the general population. The activities of these organizations, in most cases, is to give
Research Question
3
solutions to the communities’ problems and therefore they should be let free to conduct their
activities. However, the organizations should be accountable for their actions and cooperative with
the security agencies if the need arises. Therefore, when the DHS maintains its privacy and civil
liberty policies, the public and nonprofit management are more likely to cooperate with it in its
duties (Nissenbaum, 2018).
Research Question
4
References
Nissenbaum, H. (2018). Respecting context to protect privacy: Why meaning matters. Science and
engineering ethics, 24(3), 831-852.
Carter, J. G., Carter, D. L., Chermak, S., & McGarrell, E. (2017). Law enforcement fusion centers:
Cultivating an information sharing environment while safeguarding privacy. Journal of Police and
Criminal Psychology, 32(1), 11-27.
CAPSTONE PROJECT: A LITERATURE REVIEW
Capstone Project: A Literature Review
Courtnie Walker
Walden University/MMPA 6910
April 14, 2019
1
CAPSTONE PROJECT: A LITERATURE REVIEW
2
Capstone Project: Literature review
Terrorists attacked America on 11th September 2001, which increased the need
for coming up with measures that could help to avert terrorism (Marion & Cronin,2009).
The issue was of great concern to both government officials and individuals, all of them
concerned with how they could avoid such a problem from happening in the future.
Furthermore, the government channeled more money towards programs that seemed
helpful in averting such a disaster from occurring in the future. A terrorist attack is a
disaster that the government wishes it does not happen in the US soil again, because of
the adverse effects it has in all aspects of the society whether political, social or even
economical. Thus, both the state and federal government through the department of
homeland security has prioritized counterterrorism in their agendas. Therefore, my
primary objective for the Capstone project is to elaborate on how the Department of
Homeland Security reinforced itself for counterterrorism. For this purpose, to be
achieved, I have reviewed several scholarly resources related to counterterrorism to show
how effective the suggested or taken measures to help the situation.
According to Szpunar, 2017, counterterrorism is an efficient means of averting
terror attack. The writer primarily focuses on Sting operation, which is one of the
strategies that the officers in the Homeland Security department use. Sting operations
refer to a backbone of the DHS counterterrorism strategy, and it entails installing traps at
probable terrorist for them to be nabbed. The book is very crucial in this research because
it restructures the entire sting operation and its effectiveness. Nonetheless, I feel that
using sting operation to combat terrorism is very controversial. Markedly, the author has
pointed out that the strategy is contentious, but they have not explained what measures
CAPSTONE PROJECT: A LITERATURE REVIEW
3
should be taken to ensure that the operation is applied accordingly to combat terror attacks.
Nonetheless, the book is an excellent source on counterterrorism, because it has given hints now
further research can be done on how to conduct sting operations effectively.
Technology can also be used as a great measure to help in combatting terror attacks by
the DHS (John, 2004). In the current day society, there is a great advancement in technology, and
people can manipulate it in various ways to help handle most issues at hand. In this instance,
technology can assist in gathering information about possible terror attacks, and giving warnings
before the attack for the relevant people to act accordingly. According to John, 2004, cyber
infrastructures can be safeguarded and help in a faster action plan in case the initial protection
strategy fails. John (2004) has comprehensively analyzed technology as a resourceful factor
which DHS department can use for their factor as an excellent counterterrorism tool. However,
the terrorist also has an ever-increasing prowess in technology, and they too can use their
expertise to counter our systems. Nonetheless, it is a useful measure which we can put more
study and resources to ensure that we are always a notch higher than the terrorist with respect to
technology.
The United States homeland security National Strategy which was launched a few
months after the attack is also a vital source in counterterrorism. The strategy highlights the
principal measures which can help the country to be more prepared in case such an attack
happens in the future — for instance, collecting intelligence information and warning, border and
transport security and emergency preparedness. All the solutions that are elaborated in this
strategic plan are workable. Additionally, there is an emphasis that the government has
channeled great focus on counterterrorism, which the federal government as the main spearhead.
However, most of the objectives which the source has highlighted have already been attained.
CAPSTONE PROJECT: A LITERATURE REVIEW
4
According to Kogut et al.,2004, software agents can be very resourceful in
combatting terror attacks by the DHS. Software agents are vital in the collection of
anticipated information which can be communicated to the homeland security team thus
helps in the counterterrorism endeavor. Nonetheless, this is an expensive and challenging
strategy to implement.
According to Monahan, 2010, DHS should focus most of its energy and resources
to establishing fusion centers to help in evaluating threats and sharing information.
Various ways are elaborated by the writer on how DHS can enhance their focus on fusion
centers. Nonetheless, the author acknowledges that assessing threats and information
sharing can be exploited maliciously, although he does not give details on the nature of
exploitation, which calls for further research into the strategy.
An analysis of the measures that the Homeland Security department has taken
prior is currently undertaking, or the plans that are underway to be undertaken is also a
great strategy to help in counterterrorism (Kemp, 2012). Notably, the DHS is using
support groups and citizen assistance to aid in averting any future terror attack in the
American soils. Nonetheless, I feel that most of the measures analyzed in this source are
reactive, therefore not tackling the issue on what we can do now to combat any future
terror attack.
Brattbergy 2012 did not discuss counterterrorism measures, but instead, he
focusses on how the department of homeland security can enhance its coordination from
various contingencies as a measure if reducing the effects in case an attack happens
again. Although we are all working towards ensuring that such an attack never occurs, I
feel that it is for our best interests as a nation to hope for the best, but on the same time be
CAPSTONE PROJECT: A LITERATURE REVIEW
5
prepared for the worst. Brattberg has highlighted how systematic coordination amongst various
vital players can help in handling such an attack in case it happens again. Additionally, the writer
has explained how we can deal with the aftermath of the situation, to help in minimizing the
impact it has on our lives.
Radicalization is a critical factor in breeding terrorist in most parts of the world.
According to Edwards, 2015 it is essential for us as a nation to understand how radicals are
radicalized. Additionally, the study as elaborated ways that Homeland Security can use to end
radicalization as a measure of counterterrorism. Nonetheless, the measures discussed in this
study that can be used to mitigate radicalization are mainly general solutions, which are very
hard to implement given the broader population in America.
According to May 2011, the government should instill strong measures which will make
the homeland security department stronger and implement the counterterrorism strategies.
Furthermore, weak systems can result in the failure of even the most vigorous measures, which is
why the DHS should be strengthened. However, the analyses of the system are so general which
makes it difficult to implement the notion despite it being so insightful. Coming up with metrics
which can be used to measure the objectives of the homeland security department is also a create
counterterrorism strategy (Keeney et al., 2011). Nonetheless, the proposed model in this study is
very complicated for application in the system.
According to Masferrer & Walker 2013, there should be special police counterterrorism
police department whose aim is to counter terrorism, which can be done by training these police
on how to adequately conduct research pertaining terrorism for the terrorists to be sentenced.
Notably, when terrorists or the masterminds of the project are jailed, their subjects become
resistant to conducting the practices. However, if the case is forgotten with nobody being
CAPSTONE PROJECT: A LITERATURE REVIEW
6
charged in court, it makes the terrorist feel superior hence gives them an urge to fight
back even further. For justice to prevail in instances of a terror attack, the systems
should be well trained to conduct research duly for the prosecution to take the issue to
court. Thus, this calls for professional investigation and close cooperation between the
police and the police department. The police should be given enough technical assistance
pertaining to forensic analyses, crime scene management, and general analyses strategy
in areas which require technical assistance. Additionally, the Counterterrorism police
department should be given continuously adequate training to prepare them on any
emerging trends that the terrorists are using. Notably, this will help them to come up with
effective strategies and countermeasures on what can be done to reduce terror attacks.
Notably, this is a workable solution because it will ensure that the specific officers have
enough know-how and expertise pertaining to terrorism for justice to prevail. However, it
is also a challenging aspect given that most police officers are expected to conduct a
general investigation; therefore positioning them only for terror attack could be an
underutilization of this able workforce.
Van, 2011 has elaborated ways that can be used to ascertain the efficiency of
counterterrorism strategies and policies which the authorities have put in place.
According to the study, most of these strategies are not in line with the objectives of
establishing ways that can be used to combat counterterrorism, For instance, the
indicators which the author has analyzed are nor articulate on if they represent
effectiveness, or whether the authorities invest more in the specific measures they can
help in mitigating counterterrorism. Notably, an efficient strategy should be one which
the more investment is channeled towards it, the higher the reduction in chances of a
CAPSTONE PROJECT: A LITERATURE REVIEW
7
terror attack. After that, the author explains that breaking down terrorism into various topics then
evaluating each individually can help combat terror attack. Historically, successful measures
which can be used to counter terrorism are laid on the basis if deep-rooted serious issues which
entail first handling any threat at hand, which can be followed by conducting any possible
changes to ensure terrorism re-emergence is less likely to occur again. Therefore, we should
evaluate the loopholes which DHS found could be the probable reason for the attack, and then
analyses what the department is doing about this loophole. Commendably, this is a handy source
because we cannot just keep on investing in new measures without evaluating whether they are
helping the solution, or working towards stopping the problem at hand.
According to Levi, 2010 the DHS should channel more funds towards controlling the
cash flow and resource flow to the designated terror attack groups. Monitoring of all the financial
systems in the country can help in controlling cash flow to the dreadful group. Notably, several
wealthier financiers support terror attacks in the shadows. The authorities should make a sound
threat on any group of the state which assists the terror groups to get guns and other missiles
which they use to do mass destruction. Moreover, the DHS should also conduct political warfare
in addition to military attacks with the aim of destroying the things or people whom terrorist
treasure, (Crenshaw, M. 2010). This shows that the government has not surrendered to their
threat, but instead, it is working on frustrating them to ensure that they lose anything they hold
dear. Nevertheless, when trying to frustrate the financers of a terror attack, the Homeland
security should do so while preserving the core American values, for instance, avoid using force
and maintenance of due process while providing speedy justice. A possible donor could be just a
suspect, so the government should conduct enough investigate to avoid frustrating an innocent
person. Stiff action should be made to people giving links to terrorists on how they can get the
CAPSTONE PROJECT: A LITERATURE REVIEW
8
devices to use or those giving them the devices, for instance, liquidating their financial
accounts and being prosecuted in the court of law. However, the main weakness of this
counter-terrorism measure is that it is challenging to identify the private-public interface
in this risky capital of financing terrorism.
Wilkinson, 2012 argues that technology is a very essential but complicated
strategy for DHS to focus on using to counter terrorism. In several instances, the terrorist
also has great prowess when it comes to technology so that any new technology will be
utilized by both the DHS, and the terror groups. The best way for DHS to win over the
terror groups is to ensure they have the right to know how much the terrorist know, that is
the capabilities and weaknesses of the attackers. After that, the DHS can use technology
as a countermeasure. The technological intelligence war with terror groups is being
intensified by the rampant know-how of the terrorists, whereby they can hack the systems
of DHS to know their communication and even use sophisticated technology to destroy
our military system. In the recent times, we have seen that terrorists are using technology
in their favor, for instance, they frequently use television satellites to communicate their
intentions globally, and why they are making this attack without any struggle,
additionally, the advancement in technology has resulted to making several public places
more vulnerable. The terrorist often targets more economically developed areas with
sophisticated technology. The source is very resourceful because it makes the point that
for DHS to effectively use technology as a measure to combat terrorism, they should be
well aware of the capabilities of the terrorist. Notably, we can invest heavily on a
particular measure, only for terrorists to use it for their advantage.
CAPSTONE PROJECT: A LITERATURE REVIEW
9
Sauter & Carafano, 2005 did a strategic study on what DHS can do to understand,
prevent and survive terror attacks. Creating a good understanding of all matters
pertaining to terror attacks makes it easy for the DHS to understand how they can attack
to counter their actions. There are complex policies that the government can install. And also,
the common policy which the terror attacks uses to help the reader in understanding the critical
topic. The author as outrightly explained the history of the terror attack and the tactics that the
terrorist commonly uses. Notably, the best way to deal with a problem is to understand its root
course. Therefore, understanding the history of terror attack helps us to know the evolution, thus
gives the relevant authorities a clear picture of the operations. With the development in times,
there is also cyber terrorism a topic that is elaborated in this study (Sauter & Carafano 2005).
Cyberterrorism entails an ideologically motivated use of the internet that results from fearing to a
person, loss of life or other physical pain with the intention of intimidating the victims. There is
also an in-depth analysis of emergency preparation that the DHS should have in case of an
attack, and the weapons of mass destructions which are commonly used by attackers. Thus, this
vast source explaining the operations of terror groups can help DHS to act accordingly to any
terror threats or attack to avoid any physical, emotional or psychological gain in case of such an
occurrence happening.
Regan & Monahan 2013 explain the decentralization approaches which the department of
homeland security can use to monitor data sharing, ensure accountability and safeguard civil
liberties with the aim of protection against terror attacks. Notably, information is a very critical
aspect when dealing with enemies. DHS fusion centers are used as a key pivotal point that is
used for receipt, analysis. Gathering and sharing any information that is related to a threat of the
state or its boundaries. The fusion centers are located in various focal points, and they help even
CAPSTONE PROJECT: A LITERATURE REVIEW
10
private security personnel or individuals to gather and disclose any threat to the
government, for it to investigate the situation as a security measure. The databases and
fusion centers help in relaying information that can be used to prevent terror attacks.
However, the issue is that despite the government investing heavily in this fusion center
there is very little information that is received in relation to the terror attack. Moreover,
any information that is collected has to be analyzed by the personnel constructively and
skillfully for it to be effective. Therefore, I feel that the government should avid
channeling a lot of money to this center and use more of the money in strategies that are
effective in combating terrorism.
White, 2016 is a book that acknowledges that DHS is well aware of the main
interests of terror attacks. According to the study, most professionals who understand
how to deal with criminals argue that crime can be minimized if the attackers have an
entrusted interest in a country’s economic structure. Thus, any counterterrorism measure
should be focused on making America economically stable with everybody being given
an opportunity to participate in the mainstream economy. When the government does not
give people enough economic opportunities, the terror attackers can create their shell
state, a group which does not have any motives of growing the economic enterprises
legitimately. Therefore, countries should work towards the abolishment of any
underground industrial networks and ensure everybody benefits from the financial
system.
Waugh, 2003 explains that the state and federal established the Department of
Homeland Security to handle any large scales disasters, like terrorism which was
previously being overlooked. Despite the human and material resources that DHS has, the
CAPSTONE PROJECT: A LITERATURE REVIEW
11
perilous terrorist-spawned catastrophe is still life-threatening, which could be attributed that
DHS is not utilizing their resources effectively. Collaboration, cooperation, and transparency in
the department can be the reason what the department has shifted to be a command and control
system. Teamwork is always an essential aspect in any institution, and when a team is divided, it
is tough to tackle common challenges, (Hoffman, B. 2006). Therefore, for the correct utilization
of funds channeled towards counterterrorism, there should be a thorough cleanup of the
Department. In case terrorism catastrophe occurs again; the capability for utilization of the
system can be significantly damaged. However, the local, state and federal emergency efforts
towards counterterrorism are also supported and pushed by private firms, nonprofit
organizations, voluntary and other unorganized groups. Therefore, the state should use more
significant support from the public to their advantage. However, this can only be helpful in the
state, and federal authorities ensure that the Department of Homeland Security is working
accordingly.
Taylor Fritsch & Liederbach, 2014 is a text that is written in a straightforward tone to
help all readers understand digital crimes, and what can be done to such crimes. Historically,
terrorists have committed many crimes using computer technology and the internet. Terrorist
exploits social media platforms and the internet to facilitate cyber terrorism. The government
should also utilize the same channels to counter terrorism. For instance, most terrorism financiers
use cryptocurrencies which make it more difficult to retrace their steps. Therefore, DHS should
ensure they have a good understanding of cryptocurrencies regulation, supervision, and
investigation.
Terrorism is a global issue that poses a severe threat to both the domestic and foreign
security of a country. In most instances, Radical Islamic fundamentalist gives America threats of
CAPSTONE PROJECT: A LITERATURE REVIEW
12
attack. Most terror groups are normally self-financed, loosely organized with
international networks. Commendably, the state has channeled many resources to the
DHS with the aim of helping them curb terrorism (Perl 2004). Commendably, since DHS
was created, they work hard to prevent a terror attack in the American soil. Estimably, the
department has a strategic and international studies program which focuses on studying
and analyzing the methods that are being done by the department to counter terrorism.
Additionally, the department also researches on any new technology or information that
terrorists have for them to combat them effectively.
Conclusion
Terrorism is a great calamity for the attacked nation because of the economic and
sociopolitical impacts of the act. The federal and state government established the
Department of Homeland Security, whose aim is to counter any catastrophe from
happening, with the main focus on terrorism. The department has taken several measures
to combat terrorism. For instance, they have resource centers research on the knowledge
which terrorists have and evaluate the strategies which they have put in place.
Technology advancement also helps in combatting terrorism, though there is a need for
the department to know the capability of attackers because the latter commonly try using
technology for their advantage, given that they have equal prowess. Additionally, several
scholars have presented more diverse ways to help prevent the attack from happening.
Use of sting operation, software agents, fusion centers and good organization are
examples of the strategies that can be utilized. However, most of these strategy needs
further study for them to be effectively applied.
CAPSTONE PROJECT: A LITERATURE REVIEW
13
References
Brattberg, E. (2012). Coordinating for Contingencies: Taking Stock of Post-9/11 Homeland
Security Reforms. Journal of Contingencies & Crisis Management, 20(2), 77–89.
https://doi.org/10.1111/j.1468-5973.2012.00662.x
Edwards, J. J. (2015). Figuring Radicalization: Congressional Narratives of Homeland Security
and American Muslim Communities. Communication & Critical/Cultural Studies, 12(1),
102–120. https://doi.org/10.1080/14791420.2014.996168
John Yen, J. G. (2004). Emerging Technologies for Homeland Security. Communications of the
ACM, 47(3), 32–35. Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=12456346&site=ehost
-live
Keeney, R. L., & von Winterfeldt, D. (2011). A Value Model for Evaluating Homeland Security
Decisions. Risk Analysis: An International Journal, 31(9), 1470–1487. Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&db=s3h&AN=66139032&site=ehost
-live
Kemp, R. L. (2012). Homeland Security in America Past, Present, and Future. World Future
Review (World Future Society), 4(1), 28–33.
https://doi.org/10.1177/194675671200400105
Kogut, P., John Yen, P., Yui Leung, P., Shuang Sun, P., Rui Wang, Mielczarek, T., & Hellar, B.
(2004). Proactive Information Gathering for Homeland Security Teams. Communications
of the ACM, 47(3), 48–50. https://doi.org/10.1145/971617.971644
Levi, M. (2010). Combating the financing of terrorism: A history and assessment of the control
of ‘threat finance.’ The British Journal of Criminology, 50(4), 650-669.
CAPSTONE PROJECT: A LITERATURE REVIEW
14
Marion, N., & Cronin, K. (2009). Law Enforcement Responses to Homeland Security Initiatives:
The Case of Ohio. Southwest Journal of Criminal Justice, 6(1).
Masferrer, A., & Walker, C. (Eds.). (2013). Counter-terrorism, Human Rights and the Rule of
Law: Crossing Legal Boundaries in Defence of the State. Edward Elgar Publishing.
May, P. J., Jochim, A. E., & Sapotichne, J. (2011). Constructing Homeland Security: An Anemic
Policy Regime. Policy Studies Journal, 39(2), 285–307. https://doi.org/10.1111/j.15410072.2011.00408.x
Monahan, T. (2010). The Future of Security? Surveillance Operations at Homeland Security
Fusion Centers. Social Justice, 37(2/3), 84–98. Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&db=eft&AN=65441998&site=ehostlive
Perl, R. (2004, December). Terrorism and national security: issues and trends. LIBRARY OF
CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE.
Regan, P. M., & Monahan, T. (2013). Beyond counterterrorism: Data sharing, privacy, and
organizational histories of DHS fusion centers. International Journal of E-Politics (IJEP),
4(3), 1-14.
Sauter, M., & Carafano, J. J. (2005). Homeland security: A complete guide to understanding,
preventing, and surviving terrorism (p. 3). New York: McGraw-Hill.
Szpunar, P. M. (2017). Premediating predisposition: informants, entrapment, and connectivity in
counterterrorism. Critical Studies in Media Communication, 34(4), 371–385.
https://doi.org/10.1080/15295036.2017.1319966
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism.
Prentice Hall Press.
CAPSTONE PROJECT: A LITERATURE REVIEW
15
US National Strategy for Homeland Security. (2002). Military Technology, 26(12), 36. Retrieved
from
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=9215391&site=ehostlive
Van Dongen, T. W. (2011). Break it down: An alternative approach to measuring effectiveness
in counterterrorism. Journal of Applied Security Research, 6(3), 357-371.
Waugh, W. L. (2003). Terrorism, homeland security, and the national emergency management
network. Public Organization Review, 3(4), 373-385.
White, J. R. (2016). Terrorism and homeland security. Cengage Learning.
Wilkinson, P. (2012). Technology and Terorrism. Routledge.
Hoffman, B. (2006). Inside terrorism. Columbia University Press.
Crenshaw, M. (2010). The causes of terrorism. Comparative politics, 13(4), 379-399.
Jackson, R. (2005). Writing the war on terrorism. Language, Politics and Counter-terrorism,
Manchester–New York.
TYPE OF DATA AND RESEARCH METHODS
Type of Data and Research Methods
Courtnie Walker
Walden University
April 11, 2019
1
TYPE OF DATA AND RESEARCH METHODS
2
Type of data to be used in answering the research question
The choice of type of data is primarily based on the objectives of the study and the research
question. This research study will involve two major types of data; the qualitative data and
quantitative data. Quantitative type of data is the kind that deals with numerical data in carrying
out statistical tests and measures variables objectively in order to derive statistical conclusions
about research (Atieno, 2009). In the research question of determining the effect of the privacy
and civil liberties policies on the operation of the Department of Homeland Security, the
quantitative data can be used to determine the correlation or numeric relationship between
operation department and the policies implemented. On the other hand, the qualitative type of data
clearly deals with the variable characteristics and description of the behavioral or trend changes
without factoring the variable numeric. This type of data observes objectively the statistical
variables and then a conclusion is drawn (Atieno, 2009). Relating this type of data to the research
question, the quantitative data will be used to observe the people’s perceptions and characteristics
on the policy changes and how they affect the operation of the Department of Homeland Security.
A research method to be used
Based on the research question and objective, the choice of research method is dependent
on the subject of the study. The research method that is best to answer the research question is the
use of surveys and interviews through questionnaires. Questionnaires will be distributed to various
people in the Department of Homeland Security and fill them out based on their experiences about
the privacy and civil liberties policies. The collected data will be analyzed through the use of
regression analysis tool to determine the relationship between privacy and civil liberties policies
and the Department of Homeland Security, thus deriving the effect of the two variables. The
TYPE OF DATA AND RESEARCH METHODS
3
dependent variable will be the Department of Homeland Security and the independent variable
will be privacy and civil liberties policies (Kothari, 2004).
TYPE OF DATA AND RESEARCH METHODS
4
References
Atieno, O. P. (2009). An analysis of the strengths and limitation of qualitative and quantitative
research paradigms. Problems of Education in the 21st Century, 13(1), 13-38.
Kothari, C. R. (2004). Research methodology: Methods and techniques. New Age International.

Purchase answer to see full
attachment

Order Solution Now

Categories: