14 Aug 2022

86

The Impact of Lone Wolf Attacks on America's Policing

Format: APA

Academic level: Master’s

Paper type: Research Paper

Words: 1133

Pages: 4

Downloads: 0

Part 1 

Neo, L. S., Khader, M., Ang, J., Ong, G., & Tan, E. (2017). Developing an Early Screening Guide for Jihadi Terrorism: A Behavioral Analysis of 30 Terror Attacks. Security Journal, 30, 227-246. 

What was the aim of the study? The primary purpose of this study was to develop a profile for Jihadi attackers. The researchers set out to identify the characteristics that define these attackers. The study was carried out with the ultimate goal of providing law enforcement and intelligence agencies with insights needed to identify Jihadist attackers. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Where did they collect the data? The researchers obtained a bulk of their data and insights from previous studies. They extensively cite other scholars who have explored the traits that characterize Jihadist attackers. Empirical analysis is yet another source of data and information that the researchers share in the article. They focus on a study that Yin (2014) conducted. In this study, Yin sought to establish 30 common traits that define Jihadi attackers. The researchers also provide details from their personal experiences. These experiences also define their analysis of the data. 

What was the research methodology? Literature review is the primary research methodology used. They cite numerous publications which detail the results of studies. All the publications examine some aspect of Jihadi terrorism. 

How was the data analyzed? The main data analysis method that the researchers used is empirical analysis. They compared the insights from the reviewed literature against documented terrorist attacks. The goal of the analysis was to determine whether the features of Jihadi terrorism as presented in the literature matches the recent terrorist attacks. 

How did they disseminate the findings? To disseminate the findings of the study, the researchers issue recommendations. They call on law enforcement agencies to develop a mechanism for screening suspected Jihadist attackers. These agencies should use the traits identified in the study to detect attacks before they are carried out. As part of the dissemination, the researchers also use such graphical tools as tables. Law enforcement and intelligence agencies would benefit greatly from the research. 

LaFree, G., Dugan, L., Xie, M., & Singh, P. (2011). Spatial and Temporal Patterns of Terrorist Attacks by ETA 1970 to 2007. Journal of Quantitative Criminology, 28, 7-29. 

What was the aim of the study? The main purpose of this study was to determine if an examination of the tactics that a terrorist organization uses can be used to identify areas that could come under attack. Through an analysis of the techniques that the ETA used, the researchers hold to establish if these tactics offered any insights regarding attack targets. 

Where did they collect the data? For the purpose of data collection, the researchers consulted a database that contains close to 2000 attacks that the ETA carried out from 1970 to 2007. 

What was the research methodology? The research methodology used involved classifying the attacks that the ETA carried. These attacks were placed in two groups. One group was composed of attacks that occurred within the Basque region while the other group was made up of attacks that took place in other areas and were blamed on the ETA. 

How was the data analyzed? Statistical computations are the main method that the researchers employ in their data analysis. They use a complex statistical model to predict attacks. They feed the data to this model and obtain the likelihood of an attack taking place in a particular area. The researchers also used regression analysis to make sense of the data. 

How did they disseminate the findings? The researchers provide mathematic figures as part of their dissemination of the findings. These figures indicate that the research was primarily targeted at the academic community. However, the simple discussion that they offer would make it possible for a regular member of the public to understand the findings. Overall, the findings are presented in a manner that is rather technical but still sufficiently simple for individuals to understand. 

Zierhoffer, D. M. (2014). Threat Assessment: Do Lone Terrorists Differ from other Lone Offenders? Journal of Strategic Security, 7 (3), 48-62. 

What was the aim of the study? Zierhoffer set out to evaluate the accuracy with which a model predicts violent behavior among lone terrorists on the basis of previous behavior. 

Where did they collect the data? The researcher collects data through case analyses. She analyzes three cases of lone terrorists with the aim of creating a profile and evaluating the accuracy of the risk assessment model. 

What was the research methodology? Case study analysis is the primary research model used. As noted above, the researcher examines three cases involving lone terrorists. 

How was the data analyzed? The data analysis involves comparing the profiles of the terrorists in the three cases against the elements in the risk assessment model. 

How did they disseminate the findings? The use of simple language is the main technique that the researcher uses to disseminate the findings. This language makes it possible for the general public to make sense of the findings. The law enforcement and intelligence communities would also benefit greatly from the findings. 

Part 2 

The overview and aim of the study. The purpose of the study that will be conducted is to determine the impact that domestic terrorism has had on government policy and the sentiments of the American public. The study will examine how the various terrorist attacks that have occurred in the US since the 9/11 attacks have shaped government policy. Particular focus will be given to the initiatives that the government has adopted in response to the threat of home grown terrorism. The study will also investigate how the American people have responded to homegrown terrorism. As part of the investigation, an analysis of how domestic terrorism has inspired fear and panic among the American people will be conducted. Overall, the study will seek to establish that homegrown terrorism has become the new focus of government counter-terrorism initiatives. Furthermore, it is hoped that the study will make it clear that homegrown terrorism has inspired fear among Americans. 

Where will you collect the data? The data used in the research will be collected from databases that contain publications. Special focus will be given to publications whose primary focus is the emergence of homegrown terrorism and its impact on the security landscape of the United States. The Library Resources Network, the Criminal Justice Database and the Journal of Criminal Justice Education are some of the databases which will serve as key sources of data. As part of data collection, publications which contain meta-analyses will be the source of the bulk of the collected data. Meta-analyses tend to be saturated with insights. It is for this reason that they will receive particular focus. Much of the data collected will be about lone-wolf attackers since this is the primary focus of the study. 

What is your research methodology? The study will generally take the form of a literature review. As pointed out above, the data used will be obtained from published articles. 

How will the data be analyzed? The purpose of the data analysis will be to establish if patterns of lone-wolf attacks that have occurred in previous years can be used to predict the next attack. To fulfill this purpose, a rigorous data analysis will be carried out. The analysis will involve examining the trend of lone-wolf attacks in the US. It is hypothesized that the frequency of lone-wolf attacks has been on the rise. Through the data analysis, it will be possible to determine if this hypothesis is true. 

How will you disseminate the findings? The findings will be disseminated largely through figures and simple language. The figures will offer a clearer picture of the security situation in the US since the 9/11 attacks. On the other hand, the simple language is intended to enhance understanding. Overall, the dissemination method will allow the study to appeal to a broad range of audiences. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). The Impact of Lone Wolf Attacks on America's Policing.
https://studybounty.com/the-impact-of-lone-wolf-attacks-on-americas-policing-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

The 1931 Central China Flood

The country of China was a vibrant agricultural hub in the early 18th century. The agriculturists cultivated on every available fertile piece of land. Their activities disrupted wetlands and Nanyang trees were felled...

Words: 625

Pages: 2

Views: 143

2009 Washington DC Metro Train Collision

The 22 nd of June 2009 saw the collision of two southbound Red Line Washington Metro trains. The total number of casualties was nine with tens of others being injured. According to DC Metro, the cause of the accident...

Words: 554

Pages: 2

Views: 80

Comparing and Contrasting the Rural, Urban, and Insurgent Models of Terrorism

In the purest sense, the term terrorism refers to the application of intentional brutality and violence, in general against unarmed civilians, mainly for political reasons. The term was coined during the French...

Words: 325

Pages: 1

Views: 518

Understanding Response and Recovery

The emergency management system will have to change the response and recovery protocols for better response to an emergency. The changes in the system will entail new official organizations and primed plans for...

Words: 374

Pages: 1

Views: 209

Why Radicalization Fails: Barriers to Mass Casualty Terrorism

Radicalization is a concept that refers to the gradual social processes used to explain changes in behaviours or ideas. There is a clear distinction between behavioural and cognitive dimensions of...

Words: 1951

Pages: 7

Views: 134

Information Sharing and Collaboration: Department of Homeland Security

The Department of Homeland Security (DHS) has many intelligence agencies used for protecting American citizens. The various agencies should collaborate by sharing information to combat threats to Americans....

Words: 307

Pages: 1

Views: 62

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration