Showing Page:
1/6
1
Research Plan
Name
Institution
Course
Professor
Date
Showing Page:
2/6
2
Research Plan
Services previously supplied by the state are increasingly being offered by private
intelligence and defense businesses. As a result of public-private partnerships, the business sector
has been gradually integrated into effective security policy management. Such as protecting
crucial infrastructure or preventing conflict despite this, there are some sensitive issues to be
addressed as we go toward dismantling the state's monopoly on force. Security policy could
benefit by integrating the private sector further. Personal safety and intellectual property
protection are critical to the success of any business, so private security is vital (Collier, 2018).
Many of the nation's institutions and essential infrastructure systems, including manufacturing,
energy, transport, and educational and health facilities, are protected by private security guards
and officers.
Additionally, private security agencies are used by companies to undertake a wide range
of functions, including private investigations and pre-employment screening and IT security.
Commercial and residential customers alike rely on these services (Mihaljević,2018). In some
cases, businesses employ their security employees, while in others, security services are
contracted out, or a combination of both in-house and contract workers is used. In this paper, I
will examine the role that the private sector has in security policy to improve security status.
Hypothesis
The working solution is Making the private sector a part of domestic security. Aside from
the actual security corporations, many additional corporate actors are now active in security
policy. Among these, we should start with the numerous business sectors that play an important
role in handling emerging risks. The banking industry, for example, is an essential partner in
anti-terrorism financing initiatives. Some other sector that cannot be safeguarded without the
Showing Page:
3/6
3
participation of businesses is the security of essential infrastructure aspects such as
transportation, telecommunications, and water supply. Involving the private sector eases the
Budden on security in the public sector.
Measurement and analysis approach
The key points that I will research in this paper are;
1. International security
Today, the field with the greatest number of organizations active in security policy is
conflict prevention. The emphasis here is on avoiding a situation in which business activities
effectively foster conflict. Companies doing business in developing nations may engage in a
variety of potentially destabilizing practices. Public-private cooperation is also gaining traction
in this sector, where the roles of corporate and state actors are supplemented by the presence of
non-governmental organizations (NGOs). The UN Global Compact is the most visible example
of a multi-stakeholder process. Its goal is to promote ten principles in human rights, labour
standards, environmental conservation, and anti-corruption measures across the board (Carrapico
& Farrand,2017). Companies that participate can demonstrate ethical entrepreneurship while
assisting the UN in managing global concerns.
2. The private sector and peacebuilding
Until now, the private sector's role in global conflict prevention has been limited to
damage avoidance. Efforts are currently underway, however, to persuade corporate actors to take
an active role in peacebuilding. Recent experience has demonstrated that a lack of economic
growth can be a key element in the aggressive escalation of conflicts. According to World Bank
research, the weakest one-sixth of the world's population faces 80 per cent of the world's wars.
Showing Page:
4/6
4
According to statistics, increasing the median earnings in a specific state reduces the likelihood
of conflict by 50% (Mihaljević,2018).
How data will be gathered and analyzed
Data will be gathered through interviews, interviews, focus groups, oral histories and the
use of questionnaires and surveys. Data will be analyzed by use of statistical techniques by using
various data analysis softwares like SPSS.
Applicable resources
CSS Analyses in Security Policy. (2007).
https://www.files.ethz.ch/isn/27580/css_analysen_nr6-0107_e.pdf - The main idea is a study
concerning security and military companies
Strom, K., Berzofsky, M., Shook-Sa, B., Barrick, K., & Kinsey, S. (2010).
https://www.ojp.gov/pdffiles1/bjs/grants/232781.pdf - The main idea is how Companies in the
United States also rely significantly on private security for a variety of tasks, including employee
and property protection, investigation, pre-employment screening, information systems security,
and many more.
Mihaljević, B. (2018). Protection of critical national infrastructure: challenges for
the private security sector. Annals of Disaster Risk Sciences: ADRS, 1(1.), 47-56. The main
idea is the use of both private and public security to protect critical national infrastructure.
Nemeth, C. P. (2017). Private security and the law. CRC Press. The main idea
in this book is legal requirements faced by security firms and emphasizes the liability problems
common to security operations, including negligence and tortious liability, civil actions
frequently litigated, and strategies to avoid legal actions that affect business efficiency.
Showing Page:
5/6
5
Stiernstedt, P., Button, M., Prenzler, T., & Sarre, R. (2019). The “three-pillars
model of regulation”: a fusion of governance models for private security. Security Journal.
https://doi.org/10.1057/s41284-019-00224-3 - The main idea is how the 'three pillars of effective
regulation can improve private security regulation.
Ethical standards
Full consent will be obtained from the participants before the study.
Any confidential information that the study participants reveal will be protected.
There will be complete anonymity with the study of the individuals or the
organizations that will take part in the research.
Any misrepresentation or exaggeration about the research's goals and objectives
will be avoided.
Any information that is biased or inaccurate will be avoided.
Permission will be obtained to use any material that has a copyright.
Showing Page:
6/6
6
References
Carrapico, H., & Farrand, B. (2017). ‘Dialogue, partnership and empowerment for network and
information security’: the changing role of the private sector from objects of regulation to
regulation shapers. Crime, Law and social change, 67(3), 245-263.
Collier, J. (2018). Cyber security assemblages: a framework for understanding the dynamic and
contested nature of security provision. Politics and Governance, 6(2), 13-21.
Mihaljević, B. (2018). Protection of critical national infrastructure: challenges for the private
security sector. Annals of Disaster Risk Sciences: ADRS, 1(1.), 47-56.

Unformatted Attachment Preview

1 Research Plan Name Institution Course Professor Date 2 Research Plan Services previously supplied by the state are increasingly being offered by private intelligence and defense businesses. As a result of public-private partnerships, the business sector has been gradually integrated into effective security policy management. Such as protecting crucial infrastructure or preventing conflict despite this, there are some sensitive issues to be addressed as we go toward dismantling the state's monopoly on force. Security policy could benefit by integrating the private sector further. Personal safety and intellectual property protection are critical to the success of any business, so private security is vital (Collier, 2018). Many of the nation's institutions and essential infrastructure systems, including manufacturing, energy, transport, and educational and health facilities, are protected by private security guards and officers. Additionally, private security agencies are used by companies to undertake a wide range of functions, including private investigations and pre-employment screening and IT security. Commercial and residential customers alike rely on these services (Mihaljević,2018). In some cases, businesses employ their security employees, while in others, security services are contracted out, or a combination of both in-house and contract workers is used. In this paper, I will examine the role that the private sector has in security policy to improve security status. Hypothesis The working solution is Making the private sector a part of domestic security. Aside from the actual security corporations, many additional corporate actors are now active in security policy. Among these, we should start with the numerous business sectors that play an important role in handling emerging risks. The banking industry, for example, is an essential partner in anti-terrorism financing initiatives. Some other sector that cannot be safeguarded without the 3 participation of businesses is the security of essential infrastructure aspects such as transportation, telecommunications, and water supply. Involving the private sector eases the Budden on security in the public sector. Measurement and analysis approach The key points that I will research in this paper are; 1. International security Today, the field with the greatest number of organizations active in security policy is conflict prevention. The emphasis here is on avoiding a situation in which business activities effectively foster conflict. Companies doing business in developing nations may engage in a variety of potentially destabilizing practices. Public-private cooperation is also gaining traction in this sector, where the roles of corporate and state actors are supplemented by the presence of non-governmental organizations (NGOs). The UN Global Compact is the most visible example of a multi-stakeholder process. Its goal is to promote ten principles in human rights, labour standards, environmental conservation, and anti-corruption measures across the board (Carrapico & Farrand,2017). Companies that participate can demonstrate ethical entrepreneurship while assisting the UN in managing global concerns. 2. The private sector and peacebuilding Until now, the private sector's role in global conflict prevention has been limited to damage avoidance. Efforts are currently underway, however, to persuade corporate actors to take an active role in peacebuilding. Recent experience has demonstrated that a lack of economic growth can be a key element in the aggressive escalation of conflicts. According to World Bank research, the weakest one-sixth of the world's population faces 80 per cent of the world's wars. 4 According to statistics, increasing the median earnings in a specific state reduces the likelihood of conflict by 50% (Mihaljević,2018). How data will be gathered and analyzed Data will be gathered through interviews, interviews, focus groups, oral histories and the use of questionnaires and surveys. Data will be analyzed by use of statistical techniques by using various data analysis softwares like SPSS. Applicable resources ➢ CSS Analyses in Security Policy. (2007). https://www.files.ethz.ch/isn/27580/css_analysen_nr6-0107_e.pdf - The main idea is a study concerning security and military companies ➢ Strom, K., Berzofsky, M., Shook-Sa, B., Barrick, K., & Kinsey, S. (2010). https://www.ojp.gov/pdffiles1/bjs/grants/232781.pdf - The main idea is how Companies in the United States also rely significantly on private security for a variety of tasks, including employee and property protection, investigation, pre-employment screening, information systems security, and many more. ➢ Mihaljević, B. (2018). Protection of critical national infrastructure: challenges for the private security sector. Annals of Disaster Risk Sciences: ADRS, 1(1.), 47-56. – The main idea is the use of both private and public security to protect critical national infrastructure. ➢ Nemeth, C. P. (2017). Private security and the law. CRC Press. – The main idea in this book is legal requirements faced by security firms and emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency. 5 ➢ Stiernstedt, P., Button, M., Prenzler, T., & Sarre, R. (2019). The “three-pillars model of regulation”: a fusion of governance models for private security. Security Journal. https://doi.org/10.1057/s41284-019-00224-3 - The main idea is how the 'three pillars of effective regulation can improve private security regulation. Ethical standards ➢ Full consent will be obtained from the participants before the study. ➢ Any confidential information that the study participants reveal will be protected. ➢ There will be complete anonymity with the study of the individuals or the organizations that will take part in the research. ➢ Any misrepresentation or exaggeration about the research's goals and objectives will be avoided. ➢ Any information that is biased or inaccurate will be avoided. ➢ Permission will be obtained to use any material that has a copyright. 6 References Carrapico, H., & Farrand, B. (2017). ‘Dialogue, partnership and empowerment for network and information security’: the changing role of the private sector from objects of regulation to regulation shapers. Crime, Law and social change, 67(3), 245-263. Collier, J. (2018). Cyber security assemblages: a framework for understanding the dynamic and contested nature of security provision. Politics and Governance, 6(2), 13-21. Mihaljević, B. (2018). Protection of critical national infrastructure: challenges for the private security sector. Annals of Disaster Risk Sciences: ADRS, 1(1.), 47-56. Name: Description: ...
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4