100% (1)
page:
7 pages/≈1925 words
Sources:
-1
Style:
APA
Subject:
Social Sciences
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 36.29
Topic:

Counterterrorism: Port Security Vulnerabilities

Research Paper Instructions:

Here is the specific format:



1. Title Page (APA format)

2. Abstract (150-250 words, no quotes or paraphrases. This is your “elevator speech” of the research)

3. Introduction (Research Question and Hypothesis)

4. Literature Review (Note this is not an annotated bibliography but a Literature Review)

5. Methodology - don't simply state qualitative methodology.

6. Analysis & Findings

7. Conclusion and Recommendations

8. Reference list





1. Methodology: This section provides the reader with a description of how you carried out your qualitative research project, and the variables you identified and analyzed. It describes any special considerations and defines any limitations and terms specific to this project, if necessary. This section can be brief or more complicated, depending on the project, written in a single page. I want to see more than “I used qualitative methods”….what do you specifically mean? Did you use content analysis? Did you use Case Study? These questions are being asked NOW so that you are not surprised in other courses that require this to be included.



2. Analysis and Findings: They are not the same as conclusions. In the analysis component of this section you identify how you analyzed the data. The second part is the finding you got from your analysis of the data. The findings are the facts that you developed, not your interpretation of the facts. That interpretation is conducted in the conclusions and recommendations section of the paper. Findings will come from the prior research you examined and your analysis of those prior findings to create new findings for your paper. While there may be some facts that are such that they will stand and translate to your paper, the intent is to create new knowledge, so you will normally analyze the data to create your own findings of what facts that data represents.



3. Conclusions and Recommendations: This is the section where you give your interpretation of the data. Here you tell the reader what the findings mean. Often the conclusions and recommendations sections will mirror the findings in construct as the researcher tells the reader what that researcher sees as the meaning of that data, their conclusions. Then, drawing on those conclusions, the researcher tells the reader what they believe needs to be done to solve/answer the research question. This section may include recognition of any needs for further research and then finishes with a traditional conclusion to the paper as a whole.



Remember, your paper should seek to answer a question that helps to solve the research question and validates or culls your hypothesis.

Research Paper Sample Content Preview:

Counter-terrorism: Port Security Vulnerabilities
Student’s Name
Institution Affiliation
Counter-terrorism: Port Security Vulnerabilities
Abstract
The port is one of the critical epicenters of security concerns. It acts as a point of entry and exit, thereby becoming a center of possible security infringes. With possible terrors attacks, the port can quickly act as a conduit used by terrorists to smuggle personnel and mass destruction weapons. Most of the ports across the world are closely guarded for various reasons, noting that ports connect states or countries to others, which provides a plethora of supports to revamp security at ports. The countries core interest in the face of the globe is put at a stake if port security is compromised. The protection of lives and commerce underpins aggressive efforts in directing resources and energy towards post security as one of the focal points in the country security planning and operations. The fundamental thought-provoking issues revolve around how to develop a foolproof, efficient, responsive and sensitive port security system that is free from security threats and vulnerabilities.
Introduction
Ports are centric points of focus in the nation’s security. The relevance and importance of ports to country security and ensuing commercial interest cannot be overstated. Ports constitute some of the critical areas underpinning the country’s move, growth and development towards the property. With growing globalization and trade liberalization, port security's relevance is magnified in the face of global commercial interest and external security threats. The gist of the argument troubling nation’s security ideology on port security revolves around ways of creating a more robust border security system that responds to the global standard, existing realities, protection nation’s interest and equally efficient. The article argues that contemporary nations need to assume shared responsibility in developing security responsive and efficient system at ports that protect parties inclusively. Countries no longer exist in isolation or as an island, but they live in a complex, highly interconnected system with interdependence, motilities, permeability and reliance. Such sophistication puts more burdens on security systems to develop impervious security barriers and sieving points. It is in light of this argument that nation’s security installed at ports as entry and exit points should be highly organized and efficient in the face of the rising wave of globalization and persistent security threats and vulnerabilities.
Literature Review
Concerns are often raised whenever security incidence, such as terrorism events, occurs. Questions are posed regarding the role, performance and efficiency of port system securities. What are the pints of vulnerabilities? What are the potential threats? Why did it fail to respond to security threats appropriately?
What could be the relevance of ports? The larger populace or citizenry may often demonstrate little curiosity or attention on security issues at the primary exit and entry points to international arenas. Public and political discussion seemingly fails to highly and emphasizes the role of ports in security matters. Yet, the intersection between crime and port security provides clear reasons for prioritizing security at the ports. Esk. (2011) postulated that public and criminology interests surrounding ports are remarkably scarce despite forming an intersection of crime occurrence, vulnerabilities, threats and crime control. If ports as entry and exit points hold little interest to the public's eyes, questions will ensure. Who has an interest in the ports? Who formulates and implemented major security decision in the absence of ‘strong ‘public interest and curiosity? Of course, it is the government with its agencies that holds eminent responsibility of developing a blueprint of synthesizing and implement security measures, interventions and systems that match the ‘perceived population interest, global agenda, global forces and nationhood endeavors. The port security must be perceived and conceptualized from global perspectives. Esk (2011) agreed with this argument by supporting the conceptualization of port security in the realm of transnational spaces and transport and criminological theorization of the globalized security society.
Port security is the center of focus when dealing with acts of terrorism. The ever-increasing globalization and liberalism have created more permeable international entry and exit points. Many incidences that have occurred globally affirm the vulnerabilities to terrorism at the ports. It is indisputable that terrorist can enter countries via ports and institute attacks at the ports or other parts of the country. Ports can be also be used as a conduit to carry weapons of mass destruction, including bombs, which can be concealed as goods intended to commit acts of terrorism. The security vulnerabilities to terror acts have far-reaching implications in terms of commercial interest and global trade well-being. Taylor & Kaufman, P. (2010) argued that the role of ports in security containments is non-contestable, but few people would realize that if a cargo container could having a hidden weapon of mass destruction, it can be disastrous and devastating to global trade and economy if it is detonated on busy global ports.
Several incidences are a testimony to port security vulnerabilities. The terror incidents in Mumbai and U.S demonstrated how terrorists could use port weakness to their advantage. In Sept 11 terror attack against the U.S, its seaports were closed, and Coast Guard vessels were dispatched to all other major U.S ports considering the planes could also be used to transports weapons of mass destruction (McLaughlin, 2011). Cargo shipping is port terror vulnerabilities because containers provide ideal spaces for transporting illegal drugs and immigrants, and terrorists (Esk, 2011: Taylor & Kaufman, 2010). Maritime terrorism can result from a political, ideological or religious background where terrorists can hit the industrialized world's infrastructure (Feldt, Roell & Thiele, 2013). The feared containerized terrorist insecurities and related events fall under ‘maritime terrorism’, where it involves terrorist groups targeting or using ships on the sea and in ports to launch an attack against passengers and personnel (Esk, 2011). Primarily informed by post-9/11 fear, global agencies and ports scrutinize several insecurities, including severe economic consequences of cargo attacks targeted by terrorism. For instance, disruption of oil supplies via port points could significantly impact global oil prices, stability and security, and its ramifying effects could hit the local environment, economy, security, and peace.
Managing security at the ports is always a daunting task for many states. The presence of many entry points, such as ports, makes it difficult to mount an effective security system in all these points due to inadequate resources amidst expansive spaces. This fragility underpin...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!