Sign In
Not register? Register Now!
Pages:
1 page/β‰ˆ275 words
Sources:
3 Sources
Style:
APA
Subject:
Literature & Language
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 3.6
Topic:

Terrorism and the Methods of Monitoring and Addressing the Threats

Essay Instructions:

 


  • Assignment # 4: Point Paper. This will also serve as an outline for your final paper

    • 10% of Course Grade (Due week 3 on Sunday February 3, 2019 @ 11:59 PM EST)

  • CO1: Effectively and ethically research and objectively evaluate a complex issue

  • CO2: Holistically analyze a complex issue through various methods, resulting in an actionable recommendation.

  • CO3: Clearly and concisely create a variety of professionally written products.

    • This assignment requires you to prepare a one-page point paper in a specific format.

 
 

  • The format requires you to identify the issue in one properly structured sentence.


 



  • The format also requires you to consider three different alternatives, present pros and cons and make a recommendation.

  • The one-page limitation reinforces the need to be concise, and that each word has value.

  • Your Assignment MUST Include the following:
  • One paragraph on the background of your issue

  • A correctly structured one sentence issue statement

  • A discussion section where three distinct alternatives are presented, pros and cons for each are briefly discussed

  • A recommendation section where you have selected only one of the alternatives you considered. 

  • Any references would be on a second page, which would not be counted against the page limitation.

  • Common concerns:

  • Having a one sentence issue statement which is a run on, lengthy sentence.

  • Having alternatives which are not feasible

  • Having alternatives which are vague (increase training, communications, cooperation, collaboration). Be specific, your writing this for a policy maker.

  • Making a recommendation which is a combination of two alternatives.

  • References may be embedded or attached in APA format. My example embeds them, however that does reduce your “real estate.”


 



  • Format:

  • One page in length, properly formatted.
  • Arial font, size 12 text

  • Single spaced.

  • 1” marginn

  • APA format on any references

  • Please have your name (last, first) and subject in the upper left corner header.


Point paper
:3

There is 1, one-page point paper due as part of the course. The key parts of the point paper are:

  • Background: 1 paragraph

  • Issue: Identify the primary in one sentence

  • Discussion: Analyze and appraise different ways this may be addressed. This is the main part of the paper;

  • Recommendation: Choose a course of action from the discussion as your recommendation.

The point paper should support the development of your research paper. You are writing this as an advisor to a leader in the homeland security arena and are responding to an ongoing situation. Your audience is professionals who work in the field and as such you will not have to explain any basic facts. Your final product is a proposal for a particular course of action. Please use this as an opportunity to develop research on your paper and use my assessment of the point paper in your writing.

The point paper should contain references to the readings, as applicable, and these should be in the text, either by a citation in the sentence or by parenthetical reference after the sentence. This paper is in 12 Arial font with 1-inch margins.

If your score on your first point paper is below 70, you will be required to send your research paper into the Writing Center for feedback before submitting it for this course. The Writing Center takes 48 hours to respond, so you will have to plan accordingly to ensure this is submitted on time.

The point papers support the following learning objectives:

  • Explain the components of this particular complex problem;

  • Discuss the disciplines of homeland security;

  • Write clearly and concisely in response to a specific issue;

  • Research and effectively convey ideas in graduate level work, recognizing the structural, procedural and academic inputs required in its preparation.

  • Attachment “A” Example Point Paper

Current Issues with Data Security

Background: The Office of Personnel Management (OPM) reported that their servers had been hacked, and “tens of thousands” of Standard Form 86 (SF-86), the 127-page detailed background investigation report used for security clearance adjudication had been compromised. (Navy Times, June 18, 2015). Federal News Radio reported on June 19, 2015 this number may increase to 4 million current and former federal employees. The Washington Post alleged on June 16, 2015 that the People’s Republic of China (PRC) was responsible.

Issue: What is the most effective means of ensuring information technology security of personally identifiable information (PII)?

Discussion: The OPM case reflects the intersection a breach of domestic security, foreign policy with the alleged perpetrator and an IT offensive response. The intrusion by a sovereign state into highly personal information represents a negligence in failing to protect, however there is the need to ensure no repetition. The following alternatives are available:

  1. Ensure the proper protective measures are in place such that no further breaches may be reasonably possible. The pros are that this is not capable of repetition, the cons are that the PRC is in possession of the information;

  2. Engage in diplomatic efforts to return the PII. Pros would be a reassurance to the millions of service members their information is secure. Cons are that it is not possible to be certain that the PII was copied, or that the PRC denies all involvement;

  3. Engage in offensive Information activity against the PRC. The pros are that such action would send a message, the cons are that it may result in a counter- retaliatory action.

Recommendation: The PII has been compromised and there is no way to definitively conclude that returning it would resolve the issue. The threat of offensive IT may result in the degradation of a larger strategic working relationship with the PRC. The recommendation is course of action number 1, specifically to identify the route of entry and protect the IT structure while protecting the service members with the indirectly conveyed threat of IT retaliation.

Essay Sample Content Preview:

Terrorism
Name
Institution
Terrorism
Terrorism is a significant security threat in the U.S. and other parts of the world. The federal government is applying different interventions to address the issue. However, technology and increasing terror groups threaten the interventions. The development has also contributed to unhealthy practices across different communities. The U.S. government has addressed the problem by increasing rates of private surveillance and through firearm regulations. It works with other superpower nations to deliver the best anti-terror initiatives. While communication technology has facilitated the event, anti-terror initiatives aim to achieve the best outcomes in addressing the problem.
Discussion
Combating terror requires extensive research into the field of security. Atran et al. outline the challenges of conducting such research. Therefore, the US has relied on the intelligence community to monitor national security threats. The initiatives aim to reduce the rates of the terror attack (Atran et al., 2017). The research will focus on the significant causes of terror and provides different methods required in monitoring the threats. Although technology a...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!