Homeland Security Department Qualitative Research

Exclusively available on IvyPanda Available only on IvyPanda

Introduction

Homeland Security Department (DHS) continues to face security threats even after the egregious attacks of September 11. Following these attacks, the traditional security measures changed dramatically, security enforcement systems and roles changed significantly in a bid to close all identified loopholes (Clark 2007, 33).

We will write a custom essay on your topic a custom Critical Writing on Homeland Security Department
808 writers online

However, this research develops the hypothesis that the security challenges will remain imminent given that security implementation personnel are yet to comprehend their new roles and responsibilities.

Research Design

This study employs the Lockwood Analytical Method for Prediction (LAMP) to offer a predictive analysis by use of qualitative empirical data. The Lamp provides a unique model for data analysis, targeting to establish the potential solutions to the foreseeable and unforeseeable problems (Sparks, and Sulmasy 2006, 69).

This article will try to respond to the question that, will the DHS combat the security threats it is facing. The research purpose is to identify the underlying challenges that the DHS will continue to face in the future. In this study, the causes of insecurity are the independent variables while the effects are the dependent variables.

Data Collection

LAMP utilizes qualitative empirical data collected through interviews and observation to demonstrate how this approach is useful when dealing with real world problems. For example, LAMP enables the researcher to foresee the most likely results for various certain research problems such as the likelihood of terrorist attack(Puyvelde 2013, 144).

The selection of research method by the Intelligence community matters a lot since an in-depth analysis helps to come up with the appropriate method for the current research problem. Thus, the LAMP approach is necessary to advance the collection of essential data concerning values, beliefs and the convictions propelling heinous acts (Puyvelde 2013, 142).

Involving the intelligence circle in focus group discussions would improve coordination, preparedness and response in anticipation of attacks.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Data Analysis

This research uses measurement scales that include nominal, ordinal, interval and ratio scales to assess variables such as values, policies, and behavior. The historical data collection approach is employed to collect views on the topic and show that the National Intelligence community started evolving since the World War I when the military engaged in protecting the home front from its enemies.

However, following the September 11 event, Homeland Security magnified to a prominent policy (Robinson et al. 2013, 717). Prior to the attacks, the system was less bureaucratic, and sharing of intelligence information was a bit faster, even though there was the reluctance to act.

After the attacks, the President George Bush’s administration and the Congress enforced strict bureaucratic measures within the Intelligence Community. Qualitative analysis by military researchers and Intelligence analysts indicate that U.S remains vulnerable to both traditional and non-traditional security problems (Schmid 2011, 103).

Such threats include transnational crime like human and drug trafficking, the existence of nuclear weapons, cyber sabotage, and biological weapons. These threats will persist due to the lack of sufficient funds to boost the pace of research, training and recruitment. Besides, the terrorist network is widespread, well orchestrated, less bureaucratic, and unpredictable. Thus, it is difficult for the DHS to track down terrorist activities (Clark 2007, 47).

Conclusion

Since national and global security is a multifaceted agenda, the U.S Intelligence community should advance intercultural literacy. Both governmental and non-governmental agencies have shown efforts to fight global insecurity, human and drug trafficking.

However, these efforts will bear fruit if communication begins from a central position whereby the leaders can easily link to large groups without wasting time and resources. Therefore, adoption of such conclusions is dependent on consistent patterns that reflect the effectiveness of the LAMP predictions.

References

Clark, Robert M. 2007. Intelligence Analysis: A Target-Centric Approach. Washington, D.C: CQ Press.

Remember! This is just a sample
You can get your custom paper by one of our expert writers

Puyvelde, Damien. 2013. “Intelligence Accountability and the Role of Public Interest Groups in the United States.” Intelligence and National Security 28, no. 2 (May): 139-158. Web.

Robinson, Scott, Liu Xinsheng, James Stoutenborough, and Arnold Vedlitz. 2013. “Explaining Popular Trust in the Department of Homeland Security.” Journal of Public Administration Research & Theory 23, no. 3 (June): 713-733.

Schmid, Alex P. 2011. The Routledge Handbook of Terrorism Research. New York: Routledge.

Sparks, Thomas McK., and Glenn M. Sulmasy. 2006. International Law Challenges: Homeland Security and Combating Terrorism. Newport, R.I: Naval War College.

Print
Need an custom research paper on Homeland Security Department written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2020, May 27). Homeland Security Department. https://ivypanda.com/essays/homeland-security-department/

Work Cited

"Homeland Security Department." IvyPanda, 27 May 2020, ivypanda.com/essays/homeland-security-department/.

References

IvyPanda. (2020) 'Homeland Security Department'. 27 May.

References

IvyPanda. 2020. "Homeland Security Department." May 27, 2020. https://ivypanda.com/essays/homeland-security-department/.

1. IvyPanda. "Homeland Security Department." May 27, 2020. https://ivypanda.com/essays/homeland-security-department/.


Bibliography


IvyPanda. "Homeland Security Department." May 27, 2020. https://ivypanda.com/essays/homeland-security-department/.

Powered by CiteTotal, paper citation generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1