Sign In
Not register? Register Now!
Pages:
7 pages/β‰ˆ1925 words
Sources:
Check Instructions
Style:
APA
Subject:
Social Sciences
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 36.29
Topic:

Counterterrorism: Port Security Vulnerabilities

Research Paper Instructions:

Here is the specific format:
1. Title Page (APA format)
2. Abstract (150-250 words, no quotes or paraphrases. This is your “elevator speech” of the research)
3. Introduction (Research Question and Hypothesis)
4. Literature Review (Note this is not an annotated bibliography but a Literature Review)
5. Methodology - don't simply state qualitative methodology.
6. Analysis & Findings
7. Conclusion and Recommendations
8. Reference list
1. Methodology: This section provides the reader with a description of how you carried out your qualitative research project, and the variables you identified and analyzed. It describes any special considerations and defines any limitations and terms specific to this project, if necessary. This section can be brief or more complicated, depending on the project, written in a single page. I want to see more than “I used qualitative methods”….what do you specifically mean? Did you use content analysis? Did you use Case Study? These questions are being asked NOW so that you are not surprised in other courses that require this to be included.
2. Analysis and Findings: They are not the same as conclusions. In the analysis component of this section you identify how you analyzed the data. The second part is the finding you got from your analysis of the data. The findings are the facts that you developed, not your interpretation of the facts. That interpretation is conducted in the conclusions and recommendations section of the paper. Findings will come from the prior research you examined and your analysis of those prior findings to create new findings for your paper. While there may be some facts that are such that they will stand and translate to your paper, the intent is to create new knowledge, so you will normally analyze the data to create your own findings of what facts that data represents.
3. Conclusions and Recommendations: This is the section where you give your interpretation of the data. Here you tell the reader what the findings mean. Often the conclusions and recommendations sections will mirror the findings in construct as the researcher tells the reader what that researcher sees as the meaning of that data, their conclusions. Then, drawing on those conclusions, the researcher tells the reader what they believe needs to be done to solve/answer the research question. This section may include recognition of any needs for further research and then finishes with a traditional conclusion to the paper as a whole.
Remember, your paper should seek to answer a question that helps to solve the research question and validates or culls your hypothesis.

Research Paper Sample Content Preview:

Counter-terrorism: Port Security Vulnerabilities
Student’s Name
Institution Affiliation
Counter-terrorism: Port Security Vulnerabilities
Abstract
The port is one of the critical epicenters of security concerns. It acts as a point of entry and exit, thereby becoming a center of possible security infringes. With possible terrors attacks, the port can quickly act as a conduit used by terrorists to smuggle personnel and mass destruction weapons. Most of the ports across the world are closely guarded for various reasons, noting that ports connect states or countries to others, which provides a plethora of supports to revamp security at ports. The countries core interest in the face of the globe is put at a stake if port security is compromised. The protection of lives and commerce underpins aggressive efforts in directing resources and energy towards post security as one of the focal points in the country security planning and operations. The fundamental thought-provoking issues revolve around how to develop a foolproof, efficient, responsive and sensitive port security system that is free from security threats and vulnerabilities.
Introduction
Ports are centric points of focus in the nation’s security. The relevance and importance of ports to country security and ensuing commercial interest cannot be overstated. Ports constitute some of the critical areas underpinning the country’s move, growth and development towards the property. With growing globalization and trade liberalization, port security's relevance is magnified in the face of global commercial interest and external security threats. The gist of the argument troubling nation’s security ideology on port security revolves around ways of creating a more robust border security system that responds to the global standard, existing realities, protection nation’s interest and equally efficient. The article argues that contemporary nations need to assume shared responsibility in developing security responsive and efficient system at ports that protect parties inclusively. Countries no longer exist in isolation or as an island, but they live in a complex, highly interconnected system with interdependence, motilities, permeability and reliance. Such sophistication puts more burdens on security systems to develop impervious security barriers and sieving points. It is in light of this argument that nation’s security installed at ports as entry and exit points should be highly organized and efficient in the face of the rising wave of globalization and persistent security threats and vulnerabilities.
Literature Review
Concerns are often raised whenever security incidence, such as terrorism events, occurs. Questions are posed regarding the role, performance and efficiency of port system securities. What are the pints of vulnerabilities? What are the potential threats? Why did it fail to respond to security threats appropriately?
What could be the relevance of ports? The larger populace or citizenry may often demonstrate little curiosity or attention on security issues at the primary exit and entry points to international arenas. Public and political discussion seemingly fails to highly and emphasizes the role of ports in security ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Research Paper Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!