Humanities
Research Methodology and Policy Analysis for Homeland Security and Emergency management

HLS325

Question Description

As you complete the study of validity, you should be considering how you will produce a complete research plan geared towards a homeland security, criminal justice, or emergency management issue for the final week’s assignment.

Throughout the term, you have been introduced to many concepts related to conducting social science research. By the end of the term, you must synthesize what you’ve learned and produce, execute in part, and write up results of a complete research plan.

You may draw a topic from any of the illustrations used in past weeks or any topic of your choosing related to the fields of homeland security, criminal justice, or emergency management.

1750-2000 Words: APA

Assignment Guidelines

  • Choose a topic, and describe why it should be studied. What is the problem or condition you seek to consider and evaluate, and why will the results of your study matter for social science and for policy makers?
    1. Find at least 3 external sources that address a topic relative to yours to produce a miniversion of a comprehensive literature review. Use journal articles, government documents, texts, testimony, official manuals, and other credible resources only.
    2. Provide each source’s bibliographic reference here in accordance with APA style guidelines.
    3. Summarize briefly what exists—or does not exist—in the literature review that provides a starting point for your project. This point should inform the choices you make in answering the questions below.
    4. If your topic seems to be difficult, you may want to start anew with a narrower focus.
  • Create a research question or questions. Look back at narratives from previous weeks for guidance on this.
    1. Identify and explain your research constructs.
  • Create 1 or more hypotheses.
    1. Fully operationalize each variable. Make certain that this step is as extensive as possible.
    2. Explain how and why your form of operationalization for each variable will help you avoid the threats to validity you learned about this week.
  • What approach will you employ to study your topic—quantitative, qualitative, or mixed methods analysis?
    1. Define the parameters for the population you will study as a whole, draw samples from, or combine methods for.
      1. How will you extend any findings from this population to a larger one?
      2. Fully defend the choices you are making.
    2. Explain what research instruments you plan to use for any and all phases of your research.
      1. Fully defend the choices you are making.
    3. Outline how you will proceed in conducting your study.
      1. What forms of data collections will you use, and why did you choose them?
  • Explain the findings you expect to reveal.
    1. Consider and forecast the form your data output will be in.
    2. Estimate what process you will use to interpret and report your findings (you cannot do much more without conducting your research).
  • Provide an outline for your entire research plan. (outline is due Friday).

Phase Two

  • In your narrative at a minimum, you should do the following:
    • Seamlessly integrate all elements of the research plan.
    • Extensively review the external resources you selected, and identify their relevance for studying your topic.
    • Explain in detail the quantitative, qualitative, or mixed methods you plan to employ and what findings you expect these to produce (the type not the specific results).

Final Answer

Attached.

Running head: HOMELAND SECURITY AND EMERGENCY MANAGEMENT

Homeland security and Emergency management
Student’s name
Institution affiliation
Course

1

HOMELAND SECURITY AND EMERGENCY MANAGEMENT

2

Cybersecurity
Reasons for studying cybersecurity
With the tremendous increase in the use of computers and other interrelated devices,
cybersecurity has emerged to be an issue of concern, since if neglected, it may cause harm in
various sectors including national security, economy, and individual welfare. The topic on
cybersecurity should be developed and studied in great terms to acquire the knowledge required
while analyzing the possibility of threats, the vulnerabilities they may cause and the
countermeasures needed to counteract such threats.
Threats to internet change now and then. The threats, if effected may cause harm to
multiple systems in different institutions. Nowadays, most systems are digitalized, and attackers
may use that platform for their individual benefits. Currently, missiles and other harmful
weapons, are controlled remotely using computer devices. If a loop exists in such a system and
the attacker gets control of the system, he/she may launch such missiles, therefore, threatening
the security of the entire nation (Rosenzweig, P, 2013).
The use of malicious code has also boomed, and attackers have used this method to
manipulate a preexisting code thereby obtaining sensitive information, authentication passwords,
and also redirecting weapons of war from their intended destination. Some of the malicious code
which has been used by attackers include Trojan horses, worms, and viruses. These codes have
time and again threatened the national security of a country for example, in 9th June 2018, the
Chinese government used a worm to hack a US Navy contractor and stole highly sensitive
security data (Carafano, J. J, 2005). Were it not for the quick detection and response to the

HOMELAND SECURITY AND EMERGENCY MANAGEMENT

3

matter, and the attackers could have launched multiple deadly weapons linked to the Navy and
caused mass destruction.
With the knowledge of cybersecurity and information network security, the entrusted
personnel will be in a position to identify and deal with the interrelated cases, therefore, securing
the systems and the national security at large. Mitigation of hazards that would occur due to
loops existing in systems will also be, and the nationals of a given country would be assured of
maximum security while transferring data through a network, and also the three pillars of
security, i.e. confidentiality, integrity, and availability would be achieved (Schneidewind, N,
2010).

Problem/Condition to be...

EagleEye1 (23727)
Purdue University

Anonymous
Top quality work from this tutor! I’ll be back!

Anonymous
It’s my second time using SP and the work has been great back to back :) The one and only resource on the Interwebs for the work that needs to be done!

Anonymous
Thanks, good work

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors