Security Policy Analysis Paper
Prompt: Rethinking U.S. Border Security: Addressing Gaps in
Immigration Policy: Analyze the current U.S. immigration system, focusing on
the security threats posed by illegal immigration and potential reforms.
A security policy analysis
defines the problem or issue at hand, describes its background, and provides
a balanced assessment of policymakers’ options to resolve the problem.
Finally, the paper should conclude with a recommended course of action for
policymakers.
Guidelines for Submission: Your research proposal
should be six pages (including your reference page) in Microsoft Word, with 12-pt. Times New Roman font, do in text
citation as well double-spacing, citing four scholarly articles, and sources
cited in APA format.
Examples
A. Policy Problem
Pick and introduce a specific security issue. Rather than
preparing your policy paper on a general topic such as global terrorism or the
impacts of natural disasters, try to select a researchable and analyzable
specific topic. Whether the issue is the financial capacity of ISIS terrorist
organization, the effects of Hurricane Katrina on Homeland Security, or the
opioid epidemic in the U.S., you should identify a specific issue and
articulate why it is crucial. For example, you can identify the opioid epidemic
in the United States using opioid overdose deaths statistics. Similarly, you
can describe how ISIS has been a global threat using statistics on terrorist
incidents perpetrated by ISIS. If you cannot find data or statistics, you can
use governmental reports to introduce a specific issue. Your description to
identify a specific issue should also include why this security issue threatens
the U.S. or the world. Place the issue in historical context by describing how
the problem arose and outlining previous efforts, if any, to address the
problem. To detail the issue and any prior policy responses, you can use a
range of sources, including books, articles from scholarly journals, previous
policy analyses, and government reports.
B. Policy Discussion (Prior and Current Policies)
Summarize the results of prior policy efforts and identify
the major stakeholders. These are the individuals and groups likely to affect
or be affected by new government policies taken in response to the issue under
discussion. Discuss current policy alternatives. This forms the main body of
your policy analysis research paper.
C. Policy Recommendation and Conclusion
Identify and recommend a set of policy options the
government might take to resolve the issue. Be sure the options involve
substantive policy measures aimed at the issue in question. This is a policy
analysis, not a manifesto outlining broader social, economic or political
changes. Your research on the issue and past policy actions will help you
identify policy proposals and create new approaches for addressing the
identified problem
Examples 1. Title: How AQAP is threatening United States?
Policy Problem: Introduce why AQAP is a security issue and
mention terrorist attack attempts by AQAP targeting the United States
(Underwear bomber, the role of Awlaki, the connection between Awlaki and Nidal
Hassan, Awlaki’s role training and radicalizing individuals who are involved in
terrorist attacks) Place the AQAP issue in the historical context. Describe how
AQAP was formed, where it is operating, what ideology is using, and how it is
networked to global jihadist groups as well as how proxy war between Saudis and
Iranians are creating opportunities forAQAP.
Policy Discussion: Summarize the prior policy efforts
(counterterrorism policies used to target Al Qaeda in the region, targeting
AQAP’s leaders by U.S.) and identify stakeholders (regional governments, Yemeni
government, Iran, U.S.). Identify current policies (Saudi-led forces, U.S.
drone attacks).
Policy Recommendation and Conclusion: Identify and recommend
a set of policy options government might take to resolve the issue (increasing
law enforcement capacity in the region, targeting the ties of Salafi-jihadist
ideologists with AQAP, increasing the fight against financial resources,
raising awareness on how corruption facilitates terrorism in the region,
targeting military capacity of the organization, strengthening Yemeni
government, finding solutions for ongoing civil war, increasing intelligence capacity
e.t.c…)
Example 2. Why the Right-Wing extremists are a growing
threat in the United States?
Policy Problem: Introduce why right-wing extremism (its
definition) is a security issue and mention about recent attacks by right-wing
extremists as well as why individuals are adopting right-wing ideology and
making attacks. Place the right-wing extremism issue in the historical context.
Describe how right-wing groups have formed in the U.S., what ideology they are
using, what right-wing groups have operated (KKK, Aryan Brotherhood, Atomwaffen
Division, the Base…), the impacts of William Pierce, notable attacks by
right-wing groups, their group structures, the leadership in right-wing groups,
and their tactics
Policy Discussion: Summarize the prior policy efforts (how
U.S. governments treated right-wing groups in the past, what policies have been
implemented, how politics have been influential over right-wing extremism
issue, how gun laws are creating opportunities for these groups. Identify
current policies over right-wing extremism.
Policy Recommendation and Conclusion: Identify and recommend
a set of policy options U.S. government might take to resolve the issue.
Critical Element |
Exemplary (100%) |
Proficient (80%) |
Needs Improvement (60) |
Not Evident (0%) |
Value |
Policy Problem |
Meets “Proficient” criteria and |
Establishes a context that provides |
Discusses some background information but |
Does not describe the details of policy |
30 |
Policy Discussion |
Meets “Proficient” criteria and |
Establishes a context that provides |
Discusses some background information but |
Does not describe the details of prior and |
30 |
Policy Recommendations |
Meets “Proficient” criteria, and identification and recommendation of policy |
Establishes a context that provides recommendations |
Discusses some background information but |
Does not describe the details of U.S. counterterrorism policies |
30 |
Articulation of Response |
Submission is free of errors related to |
Submission has no major errors related to |
Submission has major errors related to |
Submission has critical errors related to prevent understanding of ideas |
10 |
|
|
|
|
Total |
100 |