StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

How Policy Network Analysis Is Used to Analyze Policy - Coursework Example

Cite this document
Summary
The paper "How Policy Network Analysis Is Used to Analyze Policy" discusses that in all the well-accepted models of policy-making, the process generally starts with elective or appointive officials identifying the social, political, or economic problem that requires a government policy. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
How Policy Network Analysis Is Used to Analyze Policy
Read Text Preview

Extract of sample "How Policy Network Analysis Is Used to Analyze Policy"

Download file to see previous pages

Each of the approaches has its own strengths and advantages but all four fail to recognize that any attempt to use policy networks as an explanatory variable involves three dialectical relationships – one between structure and agency, another between network and context, and the third relationship between network and outcome (Ibid). Dialectic relationship is defined as the interactive relationship between two entities in which one affects the other in a continuing iterative process. This process influences the strategic knowledge of both actors as well as the structured context, which in turn shapes the agent’s future action. The implications are that policy network analysis may not be the foolproof method of policy analysis that it is made out to be. Nonetheless, it is attracting considerable interest in the policy-making arena because it expands the concerns of policy research previously confined to options directly or indirectly related to an issue.

Analysis of policy with the use of the policy network concept involves theoretical approaches in a wide range of disciplines including political science, sociology, anthropology, international relations and management (Sutton, 1999). By putting political science theories at work, the process looks at policy networks as epistemic communities that can help develop an understanding of the role of various interest groups in the undertaking. The concept of an epistemic community is important, especially in knowledge-based theories, because it can influence four stages of the policy process – policy innovation, diffusion, selection and persistence (Hasenclever, et al., 1997).

These epistemic communities are likely to take a strong stand on the policy decisions, and once politicians agree with this position, the latter is expected to invite experts into the circle of power, thus giving such communities an opportunity to have a substantial influence on the policy process (Ibid). From the sociological viewpoint, policy networks are classified as either corporatist, state-directed, collaborative, or pluralist, which essentially differ in their degree of integration. The networks with the greatest level of integration are the so-called “Iron Triangle” coalitions in the US, which are state-directed communities composed of congressional subcommittees, interest groups and government bureaus pursuing a mutually supportive relationship (Dowding, 1995). 

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Public Policy Coursework Example | Topics and Well Written Essays - 6500 words”, n.d.)
Retrieved from https://studentshare.org/politics/1511285-public-policy
(Public Policy Coursework Example | Topics and Well Written Essays - 6500 Words)
https://studentshare.org/politics/1511285-public-policy.
“Public Policy Coursework Example | Topics and Well Written Essays - 6500 Words”, n.d. https://studentshare.org/politics/1511285-public-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF How Policy Network Analysis Is Used to Analyze Policy

Analyzing and contrasting data mining based network intrusion detection

In this thesis, some systems are discussed that can be used for detecting network intrusions by data network and host data mining.... It also covers the different types of network intrusions and how they can be best detected using available data mining tools.... There are many people actively involved in developing attack software and are ready to attack anyone and any site that has a vulnerability in its network security setup.... Since many e-commerce companies and enterprises depend on the Internet for their survival, it is not a surprise that there is an interest in finding different way to protect one's network....
48 Pages (12000 words) Thesis

Analyzing and contrasting data mining based network intrusion detection system

This research discusses data mining and the significance of IDSs for network security followed by few drawbacks, provides data mining and its various techniques in an elaborate manner, in relation to the present topic apart from various methodologies implemented till date, concludes the work done and gives plan for future work.... The objective of this research is to acquire a better insight about Data Mining-Based network Intrusion Detection Systems.... In this present era the computers are sophistically connected to each other in a form of network....
46 Pages (11500 words) Essay

Using Business Intelligence to Determine Social Network

Business Intelligence can be used to analyze people's social networks to an extent that it may impact on organizations' performances.... Yet again, information stored by the business may be used to analyse customer behavior (Negash 2004).... Business intelligence may be used to harness trends, and create business to business and business to customer relationships on social networks such as Twitter and Facebook.... The impact of using BI applications such as SPSS Clementine to analyse data from social networks may be positive or negative depending on how the information or data that is gathered is used....
5 Pages (1250 words) Essay

Forensics Based On Evidence Gathered With Peep Attacks

This paper proposes a forensic procedure to analyze the attack behavior and explains how to carry out a computer crime investigation.... This paper proposes a forensic procedure to analyze the attack behavior and explains how to carry out a computer crime investigation.... However, investigators can use well-known computer forensic techniques such as Hash Analysis and CAM (Create-Access-Modify) times to analyze the digital evidence.... Packet sniffing is an effective way to analyze what data was stolen and where it was sent....
15 Pages (3750 words) Essay

Examples of Financial Crime

With this in mind, the study seeks to analyze the financial security of the Bank of England. ... Incident monitoring and reporting aids the bank to analyze emerging trends.... The main aim of the study is to analyze the mechanisms used in filtering information on the internet.... It is also vital to analyze the financial crime resistance program.... The most difficult sector to apply financial crime restrictions is in the social media where similar services are used to host different sites....
17 Pages (4250 words) Coursework

Network Security-Intrusion Detection System

(2003) had said that, Intrusions are attempts by malicious individuals to dis­cover and exploit vulnerabilities that may be used to com­promise network security.... ntrusion detection system can be used to prevent problem behaviors by increasing the perceived risk of discovery and punishment for those who would attack or otherwise abuse the system. ... ntrusion detection system can be used to detect attacks and other security violations that are not prevented by other security measures. ...
16 Pages (4000 words) Essay

Role of Decision Support Systems

Generally these type of tools used to answer in a generalised manner.... In case of figure 2 the perceptual system based on psychology was used to present the data.... When ever the changes are to be made more analysis and laborious programming used to be required by the development staff.... This can make possible of segregating the logic, policy and process from the application of the programming.... The data supplied, the documents fed, communications made were used by the system in assisting the managers to take decisions....
8 Pages (2000 words) Essay

Decision Making in the European Union - towards a Framework for Analysis by Peterson John

eterson article details how policy networks can be used to analyze European Union policy making process.... In addition, he believes that this will ensure that decisions used to formulate the policies will determine the policy outcome. ... Thus he argues that analytical tools of comparative politics should be used to explain systemic change in EU instead of using international relations.... Therefore policy networks are used to explain outcomes at this level of poly making instead of macro theories. ...
7 Pages (1750 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us