StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Israeli Private Military and Security Companies in Defence against Terrorism - Research Proposal Example

Cite this document
Summary
The paper "Israeli Private Military and Security Companies in Defence against Terrorism" discusses that the data collected will be professionally analysed by dissecting the evaluation process into two stages. Quantitative data will be sorted into groups to indicate the opinion of the participants…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Israeli Private Military and Security Companies in Defence against Terrorism
Read Text Preview

Extract of sample "Israeli Private Military and Security Companies in Defence against Terrorism"

ISRAELI PRIVATE MILITARY AND SECURITY COMPANIES (PMSCs) IN DEFENCE AGAINST TERRORISM [Insert al Affiliation Introduction Israelhas been grappling with the problem of lone foreign and Palestinian attackers since the last summers fifty-day Gaza confrontation. To combat the increasing number of lone attackers who have inexplicably claimed several innocent lives, the government sought to employ the services of the contentious PMSCs (Private military and security companies), whose existent in universal organizations and developed states is unprecedented. PMSCs are presently the reincarnation of mercenaries, privateers, and corsairs that provided physical force and security in the 19th and 21st century (Pattison, 2014; Chesterman & Lehnardt, 2007). As PMSCs provide specialized security that resembles the services of the military, the Israel government’s decision to outsource military functions to the private security company was condemned (Schooner & Swan, 2012). Many believed that such companies are often involved in grave violation of human rights and are not capable of combating lone terrorists who are becoming common in the present Israel state (Hammes, 2010). However, despite the presence of heavily armed police officers in places such as Tel Aviv and Jerusalem, attackers still manage to attack such places killing people in mosques, buses, and other congregational sites (Sommer, 2014). Most of these attackers are classified as Lone Wolves terrorists as they carry out extemporaneous attacks and have no noticeable group collaboration (Wallwork, 2005). Whereas Benjamin Netanyahu, the Prime Minister, has accused the political class of complicity through incitement, the security system admits that good intelligence is not sufficient in predicting the soft targets of Lone Wolves terrorists and the utilization of private security services would reinforce the efforts of the military (Tait, 2015). This research proposal has the aim of exploring the effectiveness of the PMSCs in curbing terrorism in Israel. What’s more, this comprehensive project will study how efficient PMSCs are in combating lone terrorism by delving into the nature of the lone terrorism attacks in Israel that have been combated through use of PMSCs services. To attain this, the research will endeavour to answer the following important questions: Is the use of PMSCs in Israel effective against terrorism and in specific against Lone Wolves terrorism? Does the use of PMSCs create an increase perception of safety and security among the population? In answering the questions, the research will be able to explicate the effectiveness of PMSCs in combating terrorism in Israel. Moreover, it will help in bolstering the efficacy and proficiency of PMSCs services in the war against terrorism as well as defining better alternatives of combating terrorism. 2. Previous Research Findings In a research conducted by III (2008), 185 people were interviewed on the use of contracted militias in Iraq. Apparently, 67% of the participants upheld that the contracted militias helped in reducing instances of attacks by “stray dog” attackers by upto 87% (Schooner & Swan, 2012). According to the respondents, while the contracted military personnel did not directly involve themselves in active terrorism counter activities such as bomb detonation and being on the frontline when fighting terrorists, they provided humanitarian support that the Iraq army required in the war against terrorism (III, 2008). Moreover, the research clarified that contracted militias function more effectively in filling the vacuum left during unstable conditions (Mikhaʼel, Kellen & Ben-Ari, 2009). These include circumstances where extractive state corporations do not intercede in troubled spots, armed conflicts, and in areas where fighters are less armed. Considering this, lone wolves attackers in Israel can be countered using PMSCs as the terrorists are often armed against defenseless Israelis. Similarly, Cusumano (2014) and Hammes (2010) assess the effectiveness of PMSCs in countering terrorism. They conduct research of the state of US security after the 9/11 bombing and the massive utilization of contracted security officers which reached its peak in July 2009 when the US DoD (Department of Defense) had 13, 145 contracted security personnel in Afghanistan and Iraq (Cusumano, 2014; Hammes, 2010). Through a review of journals and review of civilians opinion, Cusumano (2014) indicates that the contracted security personnel helped in the reconstruction efforts by creating a sense of security in the countries. They supported private firms, NGOs, and international humanitarian agencies involved in the reconstruction by securing them against terrorists who were bailing for their blood (Wallwork, 2005). The firms and organizations believed that with the presence of contracted officers from PMSCs, lone terrorists and those affiliated to particular terrorist groups would hardly attack them (Schooner &Swan, 2012). While Cusumano (2014) does not clarify whether the perception of increased security was ephemeral or not, taking his findings into our account, we can uphold the aphorism that use of PMSCs upsurges perception of safety and security among the population. 3. Relevant Theoretical Perspectives/Framework  According to the cogent choice theory of extremism, terrorism acts are not only politically motivated, but also emanate from conscious, calculated, and rational decisions. This theory upholds that terrorism exists as the best way of fulfilling personal needs and is thus not an illogical or pathological behaviour (Heidenreich & Prüter, 2009). As such, victims of terrorism might limit the amount of information they reveal even when confronted due to fear of the perpetrators. Similarly, the authorities involved in formulating and implementing terrorism measures act with utter care when dealing with third parties seeking information on terrorism as they understand that such information might fall into the hands of malicious people who might use it for their advantage (Pattison, 2014). This requires that a researcher on the topic of terrorism attempts to stymie the non-indulgence of the security system (Heidenreich & Prüter, 2009). Similarly, the community participation principle which requires involvement of community members in social research necessitates that the grounded theory be used in analyzing terrorism issues. In the theory, systematic research leads to formulation of a theory. In this case, the systematic study of whether PMSCs are effective in countering lone wolves terrorism in Israel and whether they create a sense of heightened security will be helpful in theorizing the cogent association between outsourcing military functions and terrorism (Heidenreich & Prüter, 2009). Through combination of symbolic interactionism and positivism, the study can uncover how and why people consider PMSCs relevant despite their employees being involved in stark desecration of human rights (Pattison, 2014). 4. Research Methodology  This research will employ a mixed approach in data collection and analysis. A mishmash of qualitative and quantitative methods that will allow the triangulation of various data sources will be used. Research design 1 Quantitative Research Design Research design 1 Qualitative Research Design Case for, and against, using each of these designs A quantitative research design will excellently finalize the common precept that PMSCs create a false sense of security among the citizens and determine whether contracted private militias are effective in curbing attacks perpetuated by ‘stray dog’ terrorists (Cassell & Symon, 2004). Apparently, this design will allow the researcher to filter out external factors. Consequently, the results generated will be unbiased and real, while simultaneously narrowing the direction of the research through a focused meta-analysis of data collected from 75 questionnaires that will be completed by respondents at a crime scene. The crime must have been conducted by lone wolves terrorists and PMSCs must somehow have been involved. This qualitative approach will enable the researcher to further gain the perception of universities in Israel and corporate companies regarding the effectiveness of PMSCs in countering lone terrorism by gauging the number of lone terrorism attacks that have succeeded or failed in the presence of contracted militias (Elmes, 2009). However, a major shortcoming of this design is that it requires far-reaching statistical analysis. However, to overcome this, the data collected will be systematically organized and grouped so that the SPSS data analysis software can be used in rapidly generating graphical representation of trends (Elmes, 2009). Similarly, while the method is costly and requires more time, the researcher will be left with lots of qualms that will require the utilization of other methods to jettison the uncertainty (Cassell & Symon, 2004). Similarly, a qualitative research design, according to Cassell and Symon (2004), is extremely useful when the subject under consideration is too multifaceted to be answered by mere hypothesis such as ‘yes’ or ‘no’. While our research question simply prompts a ‘yes’ or ‘no’ response, the issue whether PMSCs create a sense of security cannot adequately be answered by such simple hypothesis as it is a question of human behavior (Cassell & Symon, 2004). Using the predominant semi-structured interviews, the researcher will be able to gain a profound understanding of the topic under study as well as uncover any factors that affect the effectiveness of PMSCs in countering terrorism in the many troubled spots in Israel. What’s more, a qualitative study is cost-effective and easy to strategize and carry out (Elmes, 2009). Similarly, it is time-saving as the researcher can obtain a whole range of information from a small sample and generate meaningful deductions (Cassell & Symon, 2004). However, the lack of replication and the ostensible fact that it is open to individual judgment and opinion hinders the successfulness of the design (Elmes, 2009). Preferred methodology Considering the nature of our study, our research questions can only be answered sufficiently through the use of the qualitative and quantitative approach. Quantitative approach will supplement the qualitative approach as data collected will be analysed quantitatively (Cassell & Symon, 2004). Data shall be collected using structured interviews and questionnaires. The researcher will prepare 150 questionnaires with both open and closed questions that assess the functionality of PMSCs in Israel. Using the grounded theory that recognizes the importance of participatory action research, 75 of the 150 questionnaires will be distributed to managers of Israelis PMSCs, expert on counterterrorism and ISF (Israeli Security Forces) officers. The remaining 75 will be filled by respondents at a crime scene who have first-hand information on the incident (Hay, 2010). According to Elmes (2009), use of a small sample size plummets the cogency of the data collected. However, Hay (2010) admits that distributing the questionnaires to various groups increases the reliability and validity of the collected data. Moreover, the incorporation of both closed and open questions presents the respondents a chance to offer feedback or personal opinion where possible thus improving the quality of the data collected (Hay, 2010). Since questionnaires restraints the researcher’s comprehension of the respondents’ responses, the researcher will also use semi-structured interviews where clarification on unclear issues can be sought (Cassell & Symon, 2004). Moreover, semi-structured interviews are fairly flexible and will potentially be sensitive enough to address the needs of participants as they may arise from time to time (Elmes, 2009). Apart from the reduced likelihood of biasness as the researcher builds a rapport with the participants, the information obtained will be insightful, dependable and easy to evaluate (Hay, 2010). However, semi-structured interviews utilize open-ended questions which pose a dependability threat to the study since the interviewee is free to provide any information (Cassell & Symon, 2004). This impediment is further worsened by the ostensible fact that it might not be possible to compare responses from the managers of Israelis PMSCs, experts on counterterrorism and ISF officers (Elmes, 2009). Reducing predisposition and increasing participation are fundamental for a research’s success as asserted by Hay (2010).The researcher will attain this through interaction with the participants to inform them on the purpose of the study and the kind of support that they will be required to provide. The data collected will be professionally analysed by dissecting the evaluation process into two stages. Firstly, quantitative data will be sorted into corresponding groups to vividly indicate the opinion of the participants (Cassell & Symon, 2004). Similarly, qualitative data will be sorted and analysed using the SPSS. This will generate trends of lone wolves terrorism attacks in Israel and the effectiveness of PMSCs in countering the growing cases of ‘stray dog’ terrorism attacks in Israel (Cassell & Symon, 2004). The systematical statistical analysis of the data will ensure that the researcher’s prejudiced expectations do not impact on the analysis (Elmes, 2009). Before compiling the data and findings into a comprehensive report to be presented to policymakers, the researcher will establish networks with community members and the officials in the security sector (Cassell & Symon, 2004). This will help the researcher in assessing whether the research findings have been used in positively transforming the Israelis society (Elmes, 2009). 5. Research Ethics Prior to conducting the research, the researcher must obtain informed consent from all participants. It is unscrupulous for a researcher to conduct a study without fully disclosing to the participants tenacity and nature of the research, and unequivocally explaining to them the research procedure. The research will obtain the consent of participants by requesting them to sign consent forms (Israel & Hay, 2009). It is also requisite that since the information involved is subtle, the researcher will uphold the privacy of the contributors as well as the discretion of the provided information. The researcher will guarantee this by distributing fully signed non-disclosure documents to them. In the documents, the researcher will explicate how the data will be safeguarded from access by third parties. Moreover, the researcher will respect the culture of respondents to ensure that they freely provide vital information that will be presented honestly to the benefactors to ensure that they receive value for their money (Cassell & Symon, 2004). Conducting research in Israel will require the approval of ICQM (Israeli Center for Qualitative Methodologies) and the Israel CTB (Counter-Terrorism Bureau). The ICQM musts affirm or ascertain that the researcher is competent enough to handle victims who experienced social traumas for being perpetrators or soft targets of terrorism. Similarly, the Israel CTB must establish that since the information involved in responding to the research question is sensitive, it is not used to support any terrorism activities (Israel & Hay, 2009). As part of ethical research guidelines, the researcher will be required to submit consent forms and a replica of findings of a study that they conducted previously. 6. Anticipated Problems Considering that our research is constraint by time, thus necessitating the use of a small sample, a major problem arises on the appropriate sampling strategy. Managers of Israelis PMSCs, experts on counterterrorism and ISF officers are all important in the study (Cassell & Symon, 2004). Considering, that the questionnaires are only 150, it will be difficult to determine the participants from each group that will be given questionnaires to respond to (Elmes, 2009). However, the researcher will endeavour to overwhelm this challenge through convenience sampling where respondents will be identified as and when they become available (Cassell & Symon, 2004). Similarly, the institutions involved may place barriers that will encumber the success of the study. Most of the participants identified are in institutions involved in countering terrorism in Israel. Consequently, they might ponder the topic as being sensitive and controversial thus deciding not to participate, a factor that will indulge the research (Wallwork, 2005). However, if such unappealing circumstances occur, the researcher, rather than stopping at the first rejection, will pursue alternative avenues and build relationships will the institutions as a way of inducing them to lift the barriers (Elmes, 2009). What’s more, handling the data and making sense of it might be bewildering. There is a likelihood that there is an insignificant difference between the number of respondents who believe that PMSCs help in boosting security in Israel and those whole consider the use of PMSCs ineffective in countering terrorism in Israel (Elmes, 2009). Grounding the data in the research, sustaining the methodologies, and utilization of technology will be helpful in making sense from the data and indicating how the findings of the present research contributes to the existing of knowledge (III, 2008). References List Cassell, C., & Symon, G. 2004. Essential guide to qualitative methods in organizational research. London: SAGE Publications. Chesterman, S., & Lehnardt, C. 2007. From Mercenaries to Market: The Rise and Regulation of Private Military Companies (Introduction). Cusumano, E. 2011. Outsourcing the War on Terror? The Use of Private Military and Security Companies after 9/11. Retrieved from http://www.e-ir.info/2011/09/14/outsourcing-the-war-on-terror-the-use-of-private-military-and-security-companies-after-911/ Elmes, D. G. 2009. Research methods in psychology. Australia: Thomson/Wadsworth. Hammes T. H. 2010. Private Contractors in Conflict Zones: The Good, the Bad, and the Strategic Impact, National Defence University Strategic Forum. Hay, I. 2010. Qualitative research methods in human geography. South Melbourne, Vic: Oxford University Press. Heidenreich, P., & Prüter, I. 2009. Handbook of stress: Causes, effects and control. New York: Nova Science Publishers. III, H. P. 2008. Filling The Void: Private Security Providers and Their Implications for United States Military Operations in Iraq and Beyond. Israel, M., & Hay, I. 2006. Research ethics for social scientists: Between ethical conduct and regulatory compliance. London: Sage. Mikhaʼel, K., Kellen, D., & Ben-Ari, E. 2009. The transformation of the world of war and peace support operations. Westport, CT: Praeger Security International. Pattison, J. 2014. The Morality of Private War: The Challenge of Private Military and Security. Google Books. Retrieved from https://books.google.com/books?id=QGyVAwAAQBAJ&pg=PA84&lpg=PA84&dq=effectiveness+of+PMSCs&source=bl&ots=9gXtbM-FHP&sig=URaH_Tnu4ubJrUIlWUFDr8nee7Y&hl=en&sa=X&ei=uxudVY2eLoSnsgGtjrDgDg&ved=0CCEQ6AEwAA#v=onepage&q=effectiveness%20of%20PMSCs&f=false Schooner, S. L. and Swan, C.D. 2012. Dead Contractors: The Un-Examined Effect of Surrogates on the Public’s Casualty Sensitivity Journal of National Security Law & Policy, 2011. Sommer, K.A. 2014. Advertisement. Retrieved from http://www.haaretz.com/blogs/routine-emergencies/.premium-1.627333 Tait, R. 2015. What is behind Israels spate of lone wolf terror attacks? - Telegraph. Retrieved from http://www.telegraph.co.uk/news/worldnews/middleeast/israel/11359482/What-is-behind-Israels-spate-of-lone-wolf-terror-attacks.html Wallwork, R. D. 2005. Operational implications of private military companies in the Global War on Terror. Fort Leavenworth, KS: US Army Command and General Staff College. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Israeli Private Military and Security Companies in Defence against Research Proposal, n.d.)
Israeli Private Military and Security Companies in Defence against Research Proposal. Retrieved from https://studentshare.org/military/1699847-israeli-private-military-and-security-companies-pmscs-in-defence-against-terrorism
(Israeli Private Military and Security Companies in Defence Against Research Proposal)
Israeli Private Military and Security Companies in Defence Against Research Proposal. https://studentshare.org/military/1699847-israeli-private-military-and-security-companies-pmscs-in-defence-against-terrorism.
“Israeli Private Military and Security Companies in Defence Against Research Proposal”, n.d. https://studentshare.org/military/1699847-israeli-private-military-and-security-companies-pmscs-in-defence-against-terrorism.
  • Cited: 0 times

CHECK THESE SAMPLES OF Israeli Private Military and Security Companies in Defence against Terrorism

Home land security and terrorism

Safeguarding privacy in the fight against terrorism: The report of the Technology and Privacy Advisory Committee : executive summary.... The… rk of terrorism has been spread throughout the world and now the network has expanded so much that it seems very difficult to secure the borders of a country (Ibrahim A.... Terrorists easily use mass Government secures the borders of the United s: As the world is facing the biggest challenge of terrorism over these years, gradually it hasbecome very difficult to maintain peace in a country....
2 Pages (500 words) Essay

Hezbollah: Background and issues for Congress

The Shi'ite population had little say in the government and their weak stand in the government was evident through the lower number of positions awarded to them in the military and the legal and the executive areas of the government.... During the 60s and the 70s, the Islamic society of Shi'a started increasing in numbers and during the 60s Iman Musa Sadr migrated to Lebanon with the aim of becoming an important figure in the Shi'ite society (Addis, 2011)....
6 Pages (1500 words) Research Paper

The Military Partnerships: Terrorism

In this strategic agreement, the type of cooperation, method of cooperation and modus operandi for dealing with the security threats and security situations will be discussed and subsequently finalized.... The present paper will examine the threat of terrorism and contemporary ways of defending from it.... hellip; The threat of terrorism is growing globally.... The 9/11 attack convinced the global community to combat terrorism on all fronts....
3 Pages (750 words) Essay

Future of private military companies

private military Companies are privately owned military companies that provide all functions that are carried out by a national military force with one major difference; their main motive is to make profit unlike national military forces that exist with the rationale of… There are many private military companies across the globe, amongst which Black Water is a very famous name.... It would not make sense to think of private military companies as a cost effective alternate to governmental security forces Future of private military Companies private military Companies are privately owned military companies that provide all functions that are carried out by a national military force with one major difference; their main motive is to make profit unlike national military forces that exist with the rationale of protecting the borders of the state where they serve....
2 Pages (500 words) Essay

The Age of New Media

The author of this essay describes the age of new media.... This paper outlines the role of the communication system, surveillance, surveillance society, new media and monitoring, and history of the development of information society.... hellip; The globalization policies have helped to bring the world together....
11 Pages (2750 words) Essay

Global Conflict and Security

This paper “Global Conflict and security” analyses arguments in favor and against the operations of PMF's.... Private companies are motivated by business interest and hence they will take up any challenges if they would be able to make the profit out of it.... hellip; The author states that supporters of PMF's believe that it is essential to seek the services of PMF's on security matters as the public bodies alone may not succeed fully in ensuring the security of the public....
10 Pages (2500 words) Dissertation

Causes of Inter-state Conflicts Between U.S. and Iraq

America was concerned about protecting her dollar from depreciating against other world major currencies.... This meant that any country that was not in agreement with this strategy was actually against the US and therefore was supporting terror activities.... after the 9/11 attack, a strategy of preventing wars as illustrated in the Bush doctrine and the 2002 National security Strategy was formulated.... Due to Iraqi's invasion into Kuwait, the UN Secretary States ordered its withdrawal by imposing economic sanctions, which was aided by the use of military blockade and air embargo....
5 Pages (1250 words) Coursework

Literature Review on Private Military Companies

The existence of private military companies and their experienced military and security personnel that can be hired any time has made it possible for governments and intergovernmental organizations to circumvent certain political and legal constraints on the use of force.... Before joining NATO, the Hungarian government hired several PMCs to help restructure its military and police services (Berlau, 2004).... … Lecturer:Literature Review on private military CompaniesIntroductionPrivate military companies (PMC) are legally established firms offering services which include the potential to exercise force in systematic military or paramilitary means....
12 Pages (3000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us