15- to 18-page Final Project, you should include the following:Executive Summary: Describe the public policy problem of interest to you, the scope of the problem, and a capsule summary of your recommended course of action. (1–2 paragraphs)The public policy
problem to be analyzed concerns the issue of privacy and whether the government
should have the right to intrude on privacy
to protect the country. This policy issue has been
heightened in the wake of the Edward Snowden intelligence leak case
which exposed some of the surveillance operations by the government of which
the public, hitherto, was unaware.Introduction and Problem Definition: Explain why the problem is important. Why should the decision-maker care about this issue? (1–2 pages)Issue Analysis: Explain in detail, supported by scholarly resources, the scope of the public policy problem. You should describe the stakeholders (e.g., branches of government, interest groups, nonprofit organizations, media, the bureaucracy, etc.) connected to the problem. (3–4 pages)Proposed Solutions: You are not expected to detail every possible approach to the issue you selected. However, based on your research, select 3 or 4 potential solutions that directly address the public policy problem you selected. It is important that you explain which stakeholders would be proponents and which would be opponents of each policy alternative you identify, and why, and the implications of their being for or against the alternative(s). You should make clear to the decision-maker the complexities involved with each proposed solution you analyze. (7–8 pages)Policy Recommendation: Choose one of the alternatives to the public policy problem you selected and explain, based on scholarly materials you have examined, why it t is best suited to address the problem. Be sure to address opportunities and challenges of implementing your recommendation given any relevant political, social, economic, or cultural considerations. Additionally, explain what, if any, social justice and/or ethical issues are impacted by your recommended policy alternative. (3–4 pages)You are expected to support your arguments and perspectives with citations in APA format. Approximately 5–10 scholarly resources, at a minimum, should be referenced within the Final Project. Resources to inform
and support recommendations are as follows:
J. E. (2015). Public policymaking: An introduction (8th ed.). Stamford,
CT: Cengage Learning.
Bardach, E., & Patashnik, E. M. (2016). A practical
guide for policy analysis: The eightfold path to more effective problem
solving (5th ed.). Thousand Oaks, CA: CQ Press.
Laureate Education. (2014). Agenda setting [Video file].
Walsh, P. F., & Miller, S. (2015). Rethinking ‘Five
Eyes’ Security Intelligence Collection Policies and Practice Post-Snowden. Intelligence
and National Security, Vol. 31, No. 3, 345–368.
Berman, J., & Flint, L. (2003). Guiding lights: Intelligence oversight and control
for the challenge of terrorism. Criminal Justice Ethics, 22(1), 2.
Haglund, D. G. (2003). North American
cooperation in an era of homeland security. Orbis, 47(4), 675–691.
Seifert, J. W., & Relyea, H. C. (2004). Do you know where your information is in the homeland
security era? Government Information Quarterly, 21(4), 399–405.
Sutherland, D. W. (2005). Homeland security and civil liberties: Preserving
America’s way of life. Notre Dame Journal of Law, Ethics & Public
Yen, J. (2004). Emerging technologies for homeland security.Communications
of the ACM, 47(3), 32–35.
D. (2007). US counter-terrorism options: A taxonomy. Survival, 49(3), 121–150.
recommendation to the decision maker is that the despite privacy being
fundamental rights of all citizens, as
prescribed by the U. S. Constitution, the government also has the legal responsibility to protect the lives and
property. In providing this protection, the government has to use all
necessary means to track and apprehend perpetrators, even if it means
monitoring those things- such as the internet, mobile communications, etc. –
that are for the benefit of good meaning citizens which are being used to
cause chaos as well. However, the government should make people aware of the
extra length that it will go to provide this protection and why it is going
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more