Home > Free Essays > Politics & Government > International Relations > International Security Case Studies’ Analysis

International Security Case Studies’ Analysis Essay

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Jan 25th, 2022

A case study is an explanation of activities, events or problems that contain hypothetical or real situations and comprises the complexities likely to be encountered in the workplace. A case study can be used to help see how these complexities affect decision-making in the real life (Dancun 2012, 78).

Analysis of case studies requires both practical experience in knowledge application and thinking talents which are applied in real circumstances. Learning from case study implies analysis which can be described as evaluation, interpretation and use of knowledge that help make final decision (Baker 2004, 12).

According to Valentine, an excellent case must have the following characteristics:

  1. Must be drawn from a real life situation but identities can be concealed.
  2. Must consist of various parts where each part ends with predicaments and proposals for debate.
  3. The case study must include enough information for the reader that help solve problems and related issues.
  4. It must be believable for the reader (Valentine 2009, 75).

The case studies are in-depth studies of particular circumstances before a survey. Case study method is used to narrow down a broad research subject into one simple and easily researchable question (Baker 2004, 12).

A case study may not respond to a query satisfactorily, but it gives some suggestions and advocates for the further expansion and theory creation on a particular issue (Yvonne 2007, 19).

The process of case study testing means that proof of an individually stated hypothesis depends on the framework or design. For instance, you have an excellent computer model. The model can be applicable to describe the way a rock pool ecosystem works, but only real situation trials can show whether it is realistic or not (Yvonne 2007, 19).

When writing a proposal for any case study research, a work plan must be of an achievable period. The requirements to the whole research process should be included in the plan and a reasonable budget should be proposed to manage the whole process successfully. The final report of the case study must be in line with the plan. The case study report should explain its findings. Recommendations and gaps for further research must be stated in the report (Baker 2004, 12).

Many scientists have proposed case study as a confident way of doing research and the records were set many years ago. Scientists are occasionally guilty of bogging down in the standard picture, and it is essential to recognize exact cases and guarantee a more holistic way to conduct the research (Sun Tzu 1998, 93).

One benefit of designing a case study research is the possibility to focus on exact and motivating cases. This can tempt you to experiment with a hypothesis or a distinctive case (Sun Tzu 1998, 93).

A case study tries to simplify complex and vast area of research into a small and comprehensible topic. It is crucial to put more weight on relevance of the subject to the questions or question in the research (William 2001, 43).

Analysis

Results of a case study rely on the views of the people involved in the research and not on statistical data. After the researcher collected all the required data, he or she has the duty to analyze and simplify the data so that it could be handled in presentable manner (Sun Tzu 1998, 93).

According to Carey, security and safety is a lifetime career. The war against pirates, terrorists and other sources of international security threats are of worldwide anxiety (Carey 2004, 44). Security issues are more extensive in third world countries than in developed ones. Developed countries have advanced security facilities that enable them to manage the occurrence of security threats.

Several factors contribute to worsening of the security state. Corruption is a major factor, financial status comes next, followed by expertise and international distrust (Gordon 2001, 11).

Corruption is evidently stronger in third world countries where the economy is weak, and security personnel are poorly paid. The poor pay is the primary cause of bribes by wicked people who aim at altering the state of security in a country (McMen 2014, 24).

Development of technology is a challenge mainly to third world countries. Terrorists nowadays use advanced electronic devices to accomplish their missions, so it is hard for less developed countries to control terror attacks (William 2001, 43).

Poor politics weakens the security system in the countries. Political leaders are intensely becoming greedy while neglecting the welfare of the fellow citizens who suffer most at the end of the day (Hopkins 2010, 881).

Several strategies are in place to ensure that different governments and international organizations boost security around the globe today. Worldwide structures have been formed to strengthen agreements with nations and to increase their security (Nelson 2011, 66).

International criminals are taken to the international criminal court in case they are arrested. This helps wash blame from a particular state, that may cause it to become a target point for revenge by criminals (Gordon 2001, 11).

In order to maintain security in any nation, it is the mandate of the government to design and implement strict security measures. Methods vary from offering good salaries, to providing and maintaining proper work conditions for security personnel as well as supplying them with requisite facilities to perform their duties (William 2001, 43).

Introduction of performance contract is another way to compel security personnel to perform their duties accordingly. A periodical review of the moral and performance is introduced to eliminate incompetent personnel from the security team (Hopkins 2010, 881).

The government has the mandate to maintain good relation with neighboring countries and other countries to keep peace within its borders. It is possible to do by cooperation in case of emergency in order to help fight with the security threat.

There is no precise formula to solve security problems so far, but success relies on the management system in place adopted by the government.

The management information system should be able to identify and evaluate emerging problems successfully. Problems are common in many organizations, such as power struggle and tendency towards disorder. Every management in an organization should focus on solving these problems in case they arise in their respective firms (Hopkins 2010, 881).

Steps to solve these problems are apparent. The first one is to diagnose the problem, then evaluate it and finally execute the solution. Preventive measures should be in place in any organization and in any situation to avoid crisis. Management of any organization is responsible to check whether it is proper to ensure that appropriate measures are in place for the healthy running of the organization.

The right relation between workers, proper communication and respect is the key to good performance within any organization. The management must therefore, act the part of a good team player (William 2001, 43).

References

Baker, Wilson. International security. (New York: Oxford University Press, 2004) 12.

Carey, Morris. The war tactics. (Tokyo: Longman Publishers, 2013) 44.

Dancun, Valentine. Public administration. (Washington: Longhorn Publishers, 2012) 78.

Gordon, Barrow. War in Iraq. (France: Oxford University Press, 2001) 11.

Hopkins, George. Government of today, (Columbia: Oxford University Press, 2010) 881.

McMen, William. The art of war. (Russia: Nerds Publishers, 2014) 24.

Nelson, Olisasa. The science of winning. (Bangladesh: Longhorn Publishers, 2011) 66.

Valentine, Pius. Security and development. (Australia: Oxford University Press, 2009) 75.

William, Samuel. Firm Defense. (New York: Oxford University Press, 2001) 43.

Yvonne, Grace. Public safety techniques. (America: Oxford University Press, 2007) 19.

Sun Tzu. Tactical Disposition. (China. Longman Publishers, 1998) 93.

This essay on International Security Case Studies’ Analysis was written and submitted by your fellow student. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly.
Removal Request
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda.
Request the removal

Need a custom Essay sample written from scratch by
professional specifically for you?

801 certified writers online

Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, January 25). International Security Case Studies' Analysis. https://ivypanda.com/essays/international-security-case-studies-analysis/

Reference

IvyPanda. (2022, January 25). International Security Case Studies' Analysis. Retrieved from https://ivypanda.com/essays/international-security-case-studies-analysis/

Work Cited

"International Security Case Studies' Analysis." IvyPanda, 25 Jan. 2022, ivypanda.com/essays/international-security-case-studies-analysis/.

1. IvyPanda. "International Security Case Studies' Analysis." January 25, 2022. https://ivypanda.com/essays/international-security-case-studies-analysis/.


Bibliography


IvyPanda. "International Security Case Studies' Analysis." January 25, 2022. https://ivypanda.com/essays/international-security-case-studies-analysis/.

References

IvyPanda. 2022. "International Security Case Studies' Analysis." January 25, 2022. https://ivypanda.com/essays/international-security-case-studies-analysis/.

References

IvyPanda. (2022) 'International Security Case Studies' Analysis'. 25 January.

Powered by CiteTotal, the best citation generator
More related papers