Internal and External Stakeholders: Cyber Security Policy discussion

Anonymous
timer Asked: Mar 9th, 2019
account_balance_wallet $9.99

Question Description

Influence of Internal and External Stakeholders

Discussion about a "national policy agenda" raises issues about the interests, goals, and fears of many different communities, constituencies, and interest groups. The policy agenda is formulated by the input of many different groups. All of the groups think or believe that a particular issue, concern, or problem is deserving of immediate attention. Oftentimes the issue, concern, or problem requires a significant investment of taxpayer dollars to address the situation. Many public policy problems compete for attention from busy, multitasking, and constantly campaigning elected decision-makers. Those constituencies with the best tactics, goals, and strategies are often successful in garnering more attention for their causes than those that lack such cohesion.

In many ways, the study of public policy is really a sociological endeavor. It attempts to identify the many groups, communities, and interest groups that thrive across the United States and other nations. The study of public policy examines problems that are important to them and evaluates how motivated and organized they are in achieving their policy goals.

Consider the constellation of actors both within and outside of government who impact the public policy process. Indeed, public policy is oftentimes an amalgam of the inputs and constraints imposed by both organizations and individuals. Examine the actors who impact a policy issue that is, or should be, on the policy agenda at the local, state, national, or international level

The Assignment 1-2 pages must include:

  • Post a brief analysis of a public policy problem either in the United States that you think warrants a place on the public policy agenda and include why.
  • Then explain the influence of internal and external stakeholders on the formation of a policy agenda.
  • Select two internal and two external stakeholders that you think are most relevant to getting the problem you selected on the agenda and explain why.

Must use at least 2 of these Required Resources:

Laureate Education (Producer). (2014). Agenda setting [Video file]. Baltimore, MD: Author.

Liu, X., Lindquist, E., Vedlitz, A., & Vincent, K. (2010). Understanding local policymaking: Policy elites' perceptions of local agenda setting and alternative policy selection. Policy Studies Journal, 38(1), 69–91.

Anderson, J. E. (2015). Public policymaking: An introduction (8th ed.). Stamford, CT: Cengage Learning.

  • Chapter 3, “Policy Formation: Problems, Agendas, and Formulation” (pp. 89–132)

Bardach, E., Patashnik, E. M. (2016). A practical guide for policy analysis: The eightfold path to more effective problem solving (5th ed.). Thousand Oaks, CA: CQ Press.

  • Part I, “The Eightfold Path”
    • “Step Four: Select the Criteria” (pp. 27-46)
    • “Step Five: Project the Outcomes” (pp. 46-65)

Guess, G. M., & Farnham, P. G. (2011). Cases in public policy analysis (3rd ed.). Washington, D.C.: Georgetown University Press.

  • Chapter 2, “Problem Identification and Structuring” (pp. 23–73)

Tutor Answer

DrReginaldWoof
School: University of Maryland

Hi, please see the attached paper. Have a look at it and in case of any edit, please let me know. Otherwise, it is my pleasure to have you as my buddy now and future. Until the next invite, Bye!

Running Head: CYBER SECURITY POLICY

Cyber Security Policy
Student’s Name
Course
Institutional Affiliation

1

CYBERSECURITY POLICY

2
Cyber Security Policy

A brief analysis of a public policy problem in the United States that warrants a place on the
public policy agenda
The national security of any country depends on the efficient functions of the
infrastructures systems. However, cybersecurity threat has posed risks to the infrastructure
systems due to the increased complexities and the connections that consequently becomes a
threat to the general economy, public health as well as security and safety of the federal and
individual financial information (Liu, Lindquist, Vedlitz & Vincent, 2010). Cybersecurity is a
threat to the public.
American citizens have also become victims of a data breach as their personal
information such as bank account details...

flag Report DMCA
Review

Anonymous
Thanks, good work

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors