Homeland Security Activities And Programs In Cyber-security And Privacy Protection

Crime
3 min, 8 sec read Download Article

Key issue and research question

In the face of the ongoing focus on internal security, the key issue has remained the level of effectiveness of the Department of Homeland Security and, in particular, Homeland Security and Emergency Management. Several terrorist attack attempts on the U.S soil post 9/11 and the response failures from homeland security department has led policymakers and the American people to seek a review of the efficacy of various programs and activities that the department has initiated towards mitigating terrorist attacks in the country. In this respect, this research draws from the question, ‘how has the homeland security activities and programs been successful in dealing with issues of cyber-security and privacy protection?’ A profound look into Homeland Security and Emergency Management reveals that it is a multifaceted framework primarily comprising reactive and proactive measures. The ‘Homeland Security’ aspect comprises both reactive and proactive measures while ‘Emergency Management’ solely entail reactive measures. While the Department continues to strengthen its systems and streamline its programs, both reactive measures and proactive measures are necessary in a bid to thwart both actual attempts as well as prevent any occurrence of an attempt. It is on such grounds that this research question, with its broad spectrum, becomes significant. In particular, this research question will lead to a coverage of privacy issues surrounding such technology as body scanners at the airports as well as cyber-security which have become a major concern in the Department of Homeland Security. Examining the feasibility of homeland security activities and programs is pertinent in contributing to the larger realm of security and associated policies, which is one of the primary purposes of this research. However, while the question is pivotal in guiding a greater part of the research, necessary digressions, but within the research context, will help with a comprehensive response to the research question and the hypothesis.

Research hypothesis

Hypothetically, Homeland Security has come up with adequate activities and programs to deal with issues of privacy protection and cyber-security. The U.S Department of Homeland Security came into operation with a primary view to preserving the lives of the American citizens. In this respect, the organization would prevent terrorist attacks both from without and within. There are several other functions of the department, but all of them draw from the chief mandate of the Department of Homeland Security. Preventing such attacks remains the top priority of this body. As a means of living up to its expectations the department has a vision of creating a highly resilient nation out of America through a framework that will not only guarantee freedom but also utmost prosperity. As such, a wide spectrum of programs and activities have been adopted especially in the sector of cyber-security and its close associate, privacy protection, as a means of achieving the very objectives for which the body was established. Over the past, these two elements have been gaining ground probably as a result of the incessant and unhinged technological growth. Terrorism is, therefore, moving online, and in a bid to deal with it, privacy issues have become a concern. In most cases, cyber-security maintenance will require intrusion of privacy of a common citizen, which makes the two issues closely related. Even so, the Department of Homeland Security has come up with sufficient programs and activities to manage both cyber-security and privacy protection. The ongoing debate on the two issues could imply the relentless efforts of security organization to ensure that a terrorism-free America.

Research variables

The research considers three main variables namely homeland security, terrorism, and risk assessment. These three variables will aid in refuting or confirming the previously stated research hypothesis. It is critical to note that a research hypothesis is never absolute. That is, it can be argued in the affirmative or otherwise.

Share this post:

Cite this Page

APA 7
MLA 9
Harvard
Chicago

GradShark (2023). Homeland security activities and programs in cyber-security and privacy protection. GradShark. https://gradshark.com/example/homeland-security-activities-and-programs-in-cyber-security-and-privacy-protection

Finding it challenging to complete your essay within the given deadlines?