DHS' Measures to Overcome Challenges
**Built upon the week 1 assignment that you helped me with.
Craft an original research hypothesis that will prove or disprove your research question approved in Week 1. This will be the focus of your research for the Capstone Research Project. You must clearly state your hypothesis in a standalone statement. You must further discuss the hypothesis and reasoning for the hypothesis in a follow-on paragraph. Be sure to address how the hypothesis is related to your research question. Then, for your selected research hypothesis, identify three research variables which you believe will answer, confirm, or refute your research hypothesis and answer your research question. Each of these research variables should be listed in a standalone statement (i.e., Research Variable #1: XXXXX). Be sure to determine if they are independent or dependent variables. Explain how your research variable relates to your hypothesis. Identify how each of the three research variables will be measured in order to confirm or deny your research hypothesis.
In the second part of your paper provide an annotated bibliography that accurately describes your literature review for the Capstone Research Project. Identify five of the eight required resources (scholarly, government, or professional resources), other than the course textbook, that you will use to research and evaluate your research variables and utilize to confirm or deny your research hypothesis. Remember, at least five of your resources for the Capstone Research Project must be found in the UAGC Library. (Be sure to note those resources you found in the UAGC Library.) For each of the resources identified, describe in two to three sentences how the resource supports your research.
Literature Review and Variables
Name
Institution
Course
Professor
Date
Literature Review and Variables
The key research hypotheses include:
1 The Department of Homeland Security is sufficient to secure the cyber ecosystem.
2 Homeland Security programs appropriately prepare the country for cyber-attacks.
3 Homeland Security uses cutting-edge technology to tackle cybercrime.
Homeland security refers to a coordinated national attempt to block terrorist attacks
Research Variables
The main variables of the identified hypotheses include:
* The size of cyberspace in terms of the number of available connections.
* The number of attacks that the nation is likely to experience.
* The advancement in technology on both the attackers and the DHS.
Variable #1 Number of Available Connections – Dependent Variable
The United States is a fairly expansive nation that is highly sophisticated in technology. There are lots of available connections that people use in daily communication. The DHS faces the challenge of overseeing all such connections, both secured and non-secured. The size of cyberspace poses a major challenge for the DHS to deliver on its duties as it continues to grow, with newer connections and proxies opening up each new day. As the DHS closes in on the available connections, some close as newer ones open up in a bid to evade the department’s interventions. This variable refutes the claim that the DHS is sufficient to secure the cyber ecosystem and indicates the need for additional interventions.
Variable #2 Number of Attacks – Dependent Variable
The number of cyberattacks that the nation is likely to face is unpredictable. Therefore, the DHS has to operate in an uncertain environment marred by complexity and unpredictability. This variable also refutes the claim that the DHS sufficiently and appropriately prepares the nation for cyber-attacks.
Variable #3 Technological Advancements – Dependent Variable
Newer technologies arise daily, making it difficult to keep up with every aspect of technology. Various forms of malware keep getting developed, requiring a highly informed department to handle them. Despite using cutting-edge technology, this variable indicates the need to keep up with newer trends in technological advancements. The variable refutes the hypothesis that may praise the reliance on the cutting-edge technology used by the DHS.
Annotated Bibliography
Beckner, C. (2021). Reassessing Homeland Security Intelligence: A Review of the DHS Office of Intelligence and Analysis. Center for a New American Security. https://www. jstor. org/stable/resrep32252.
This article focuses on the provision of intelligence and warning roles of t...
👀 Other Visitors are Viewing These APA Essay Samples:
-
Right And Left Wing Extremist Organizations
11 pages/≈3025 words | 10 Sources | APA | Social Sciences | Research Paper |
-
Different Methods the DHA Can Provide Privacy and Protection from Cybercrimes
10 pages/≈2750 words | 7 Sources | APA | Social Sciences | Research Paper |
-
Hochschild's Theory of Emotion Management
4 pages/≈1100 words | 3 Sources | APA | Social Sciences | Research Paper |