StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security and Risk Management Challenges - Research Proposal Example

Cite this document
Summary
This research proposal "Security and Risk Management Challenges" discusses some of the blasts that include: the Abuja bombing, UN Guest House Attack in Kabul, Alger's bombing and Canal Hotel Bombing. This research paper is also makes the readers understand various research methodologies that are suitable.  …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.3% of users find it useful
Security and Risk Management Challenges
Read Text Preview

Extract of sample "Security and Risk Management Challenges"

United Nations: Security and Risk Management Challenges Introduction The current years, terrorism has been in the rise in various countries. Some of the countries especially have seriously considered terrorism as a national threat and has put various measures and policies in place to help fight terrorism. Some of the happenings that have drive the United nation to consider terrorism as national threat are the blast that have mainly targeting their global offices in various countries. Some of the blasts include; the Abuja bombing, UN Guest House Attack in Kabul, Algers bombing and Canal Hotel Bombing. This research paper is also to make the readers understand various research methodologies that are suitable. Previous research finding Since the Washing tone and New York bombing in the year 2001, most of researchers have been involved in the theoretical perspective with he aim of understanding why there has been an increase of the act of terrorism in the current world. However, the economic, psychology, sociology and other parts of social science were mandated to understand incidents and to come up with a policy response that is appropriate. However, the reviewed evidence shows that despite these theories contribution, the reason to why terrorists do what they do and the terrorism class dimension have not been addressed adequately. This gap is an indication that there is the opening up of new possibilities, and the scholars need to understand this terrorism new dimension (Bayo, 2012). In another research according to the findings of a Terrorism Risk Insurance Act (TRIA) that was enacted by the Congress in the year 2002 in response with the unavailability of the insurance of terrorism. Some of the key findings of these researches include; Terrorism remains a real threat to a nation: the most attack scenarios that are more likely involves firearms, arsons and convectional explosives. Al Qaeda and other terror groups are always determined to cause attacks that are more destructive using weapons that are unconventional, however they lack capability and combined intent to do so. In addition, the past and current trend analysis dose not provides a solution to the uncertainty that surrounds the terrorism future risks. The risk models of terrorism are limited when it comes to the estimation of the type of risks: The terrorism risk model that depends on the theories of terrorism or the historical events decision making are limited: they cant extrapolate to estimate the future attacks likelihood from the threats of terrorism beyond those that have so far been identified. Furthermore, the threshold of $27.5 billion for aggregate TRIA insured losses ensures that the industry of insurance instead of the taxpayers is responsible for paying events that occur within the industry. The insurance of terrorism can add to making the community more flexible to events of terrorism: access to terrorism insurance price that is appropriate can promote growth in the economy, increasing the availability of the resources for the addressing the threats in the national security or other social problems. Secondly, insurance of terrorism can improve both the effectiveness and pace of the effort of recovery, since that kind of an effort will be more efficient and rapid when it is clarified the amount of compensation that will be available and the means of its distribution. Finally, to the extent that the insurance in terrorism is more available with TRIA, the legislation renewal will contribute to the improvement of the security of the nation (Willis & Al-Shahery, 2014). Relevant theoretical perspective Same of the Events that marked the changes of the UN Security and Risk Management policies and procedures are: Abuja Bombing Abuja Bombing took place on Friday, August 26, 2011 and was car bomb explosion in the capital city of Nigeria at the UN building in Abuja where 21 people were killed and 60 were wounded. The spokesperson of Boko Haram later claimed that they were responsible for the attack (Nossiter Adam, 2011). In Abuja at about 11:00WAT in the zone of diplomatic at the city centre the car bomb passed through two security barriers. And the bomb was detonated after the driver crashed it into the reception area of the United Nation (BBC News 2011). The building that car bomb exploded is believed to be the head quarter of about four hundred United Nation employees and the number that was present at the time of the attack is not clear. The buildings ground floor was damaged badly and a wing of the building collapsed. After the attack, there was a quick response as the emergency services were at the scene taking those who were wounded to the hospital and removing the dead body from the building. At the scene were also cranes to ensure that no-one was trapped inside (BBC News 2011). The Minister of States for Foreign Affairs said that that attack was not for Nigeria but for the global community. Top mean it was an attack in the world (BBC News 2011). The United Nation Secretary- General Ban Ki-moon referred the attack of Abuja as an assault on people who have devoted themselves to help others (Theguardian, 2011). The attack was the fist Nigerian suicide bombing on an international organization (The Economics, 2011). UN Guest House Attack in Kabul The report by the survivors of the UN guest house attack in Kabul claims that three attackers who were dressed as police men arrived at the area at around 3:30 a.m. they then shot two security guards of Afghan at the front entrance of the compound. Two of the terrorists then climbed the wall and started firing at the guest house while the third terrorist fired the machine gun to repel any rescue by other security guard and the police (Tavernise and Rahimi, 2009). Two security guards of the UN responded and fired at the terrorists as 25 of the guest’s runaway through the back of the house (Tavernise and Rahimi, 2009). One security guard of the UN and an American from Miami climbed to the top of the building and started firing the terrorists. This action was able to prevent the people attacking from entering the building for almost one hour. The two, Maxwell and Mefful were later reported to have been killed by the attackers, however, the report that was received latter suggested that Maxwell survived the confrontation though he was wounded, but was executed by the policemen of Afghan who were responding to the terrorism action (Farmer, 2010). Two of the terrorist were killed by gun fire and the third one detonated a suicide vest, thus killing two other guests who were still in the guest house and himself (Tavernise and Rahimi, 2009). Concurrent with the attack at the guest house, rocket was fired at the palace of the Afghan President and at the Serena Hotel, however no death or injury was reported (Tavernise and Rahimi, 2009). Algers Bombing In the Algers bombing, two car bombs each containing eight hundred kilogram of explosive were utilized in the bombing. The fist explosion was experienced in the district of Ben Aknoun which was some few kilometres to the Supreme Constitutional Court. While the second blast happened ten minutes after the first blast and it was on the road that office of the United Nation from the office of United Nation High Commissioner for Refugees (UNHCR) in the neighbourhood of Hydra (UNHCR, 2007). According to the official of UNHCR the building of the United Nation partly collapsed while the office of UNHCR were levelled (CNN, 2007). In the Building of the United Nation some of the offices that were housed included; the Department of Safety and Security (DSS), the International Labour Organization (ILO), the Joint UN Programme on HIV/AIDS (UNAIDS), the offices of the UN Development Programme (UNDP), the Population Fund (UNFPA), the UN Industrial Development Organization (UNIDO), The United Nations building housed and the World Food Programme (WFP). The section that collapsed housed the UNDP (BBC News, 2007). Attack against the office of the United Nation was a suicide bombing (BBC News, 2007). This attack caused staff casualties that were the third highest as recorded in the history of the United Nation. This follows the Canal Hotel bombing of the year 2003 that targeted the headquarters of United Nation in Iraq, Baghdad that also contributed to the death of a Secretary-General Special Representative to Iraq and twenty one other members of staffs (CBCnews, 2007) and the Haiti earthquake of the year 2010 in which twenty two peacekeepers of the United Nations were reported to be dead and one hundred and fifty missing. Also in the disaster, the Head of MINUSTAH was killed. Canal Hotel Bombing The Canal Hotel Bombing took place when the director of Mine Action Service of the United Nation (UNMAS) Martin Barber was holding a press conference. This explosion destroyed the treatment centre for spinal cord of the hospital that was near and Civil-Military Operation Centre of the United States Army that was located at the Canal Hotel rear and the shock wave that resulted was felt over some miles from the hotel. The blast at the hotel was caused b a suicide bomber who was driving a truck bomb. The identification of the vehicle has been that it is a long flatbed of 2002 (Roberts Joel, 2003). The investigation on the incident identified that the bomb was made from munitions that were old, including a single an aerial bomb that is of 500 pound from pre-war arsenal of Iraq. The OCHA humanitarian information center (HIC) for Iraq (UNOHCI) was situated directly below the Sergio Vieira de Mallo’s office, the United Nation High Commissioner for Human Rights and suffered a hit that was direct. The eight staffs and one visitor that were at the office at that time, seven died on the spot but Gil Loescher and Sergio Vieira de Mallo were seriously wounded and traps under the debris of the portion of the building that collapsed. First Sergeant William von Zehale who was an American solder, crawled down through the building that had collapsed stated the work to rescue the two men who were trapped. He was later joined by Staff Sergeant Andrew Valentine who was another American Solder and the two solders without the assistance of any rescue equipment spent the next three hours trying to rescue the two. Loescher was rescued after the solders amputated his leg that was crushed. However, Sergio Vieira de Mallo died before being removed from the collapsed building (OCHA, n.d). According to Abu Musab al-Zarqawi, Sergio Vieira de Mallo was the main target of the blast. The reason for the target was because Sergio Vieira de Mallo had participated of the removal of territory from caliphate of Islamic which was unlawful and was categorized as a criminal and a thief (Black Triangle, 2007). After the attack in the UN in 19 August, the organization made every effort to continue with their activity of assisting the human while reducing the risks of the staffs that were remaining. The role faced allot of challenge when the when the international program staffs that were remaining were removed from Baghdad after the September 22 attack (UNSC, 2003). Despite the reduction of the number of UN staffs the remaining staffs have closely worked with the government, and some of the UN staffs relocated in the neighboring county in delivering there duty (UNSC, 2003). Some of the countries were the staffs were redeployed included Jordan and Kuwait. Several agenesis of the united nation have been have been undertaking their operation through crossing of the border of Islamic Republic of Iran, Saudi Arabia, Kuwait, Syria Arab Republic, and Jordan to serve Iraqi (UNSC, 2003). The Accountability Framework for the United Nation security management system is the most development that is positive and significant in the evolution on the management and conceptualization of security by the United Nation. The identification of the responsibility and roles of the security actors is the resent important step. This is because in the past there was a confusion of the responsibility when it comes to ensuring the function of security (UNO, 2008). The initiation of the framework was in the year 2002. However two years later, 59/276 (XI) resolution of the general assembly, requested for the submission of a revised framework by the Secretary- General for the security management system of the United Nation as a whole. This was particularly clarifying the roles and responsibility of each official and elaborating how other United Nation Security Personnel can be integrated in a structure of security management that is common at the level of the country under the DO’s authority (UNO, 2008). According to the framework, the DO has the accountability for the security persons that have been employed by the organization and their recognized departments in various designated areas or through out the country (UNO, 2008). The United Nation has currently improved the security that it provides to the staffs that are that have been deployed in the field despite of the risk and dangers in those countries that they have been deployed to (UNNC, 2013). The acting head of the Department of Security and Safety, Kevin Kennedy conformed that there are dangers that are unexpected in Afghanistan where bicycle improvised explosive devices are also used (UNNC, 2013). The main threat that the United Nation is facing is mainly at its operational level. This is mainly against staffs at their office and residents. Mr. Kennedy said that some of the measure taken by the United Nation to improve the security in the compound includes, safe room, early warning system that contributed in reducing the loss of life. Also in the improvement of the security are also the Afghan forces that are trained by the United Nation to respond to issues related to safety and other international organization. In addition to the security measures, UN has hire private security companies which also played a role in addressing security issues (UNNC, 2013). In addition to United Nation taking physical measures to reduce risks, it is also doing its level best to be accepted by the local community. This is mainly through having the local community residents to understand the presence of the United Nation in at their country and their main role (UNNC, 2013). Mr. Kennedy further noted that the United Nation is focused in balancing the security need for the security guards and staffs with being available and open to the citizens of the country. The philosophy of the security of the United Nation has drastically changed in the past five year on how to stay and deliver in a country. This is opposed to the approach they previously head were the organization will be quick to temporarily relocate its staffs, mainly the staffs members who are international, in a case where there is a deterioration in the security of a country (UNNC, 2013). Research methodology Design 1 Questioners Information on terrorism can be obtained by coming up with various questions or designing some question that may be used to achieve a given goal. Questioners can also be designed for the security officers. This will be mainly to understanding the various strategies put in place in encountering the act of terrorism. Advantages of questioners People may complete and return them at their convenient time, it is inexpensive, it is confidential, Disadvantage Low number of respondents, questionnaires may be uncompleted, no analysis of the body language. (Burns, 1997) Design 2 Interview The research can organize for an interview with one of the mangers of the United Nation Security. For an example the research can decide to have an appointment with Kevin Kennedy, who is the acting Head of Department of Security and Safety. Advantages The interviewee feels as part of the project, provides a chance for follow up, question can be reworded during interviewing, and encourages observation of body language. Disadvantages It is costly and time consuming, communication skill of interview is vital, the interviewee’s readiness to participate is vital (Opdenakker, 2006). Design 3 Research on the past history on terrorism The research may decide to have a research in order to obtain data. He or she might access the yearly report of the United Nation. The researcher may also read through the various interview carried in various media stations between the journalists and some of the official members at the United Nation Security. The utilization of both the qualitative and quantitative data collection method to obtain a mixed data (Triangulation) will assist in validating the issues that might arise from the initial study. (Olsen, 2004). Advantage Saves time, researcher can understand how others have solved the same problem and the research is kept up to date. Disadvantage Needs access to source of information that is appropriate, the problem may not have been documented (Thomas and Carolyn, 2010). Preferred choice The preferred choice is interviewing. Face to face interviewing is the best choice as the interviewer gets the first hand information from the person being interviewed. An appointment can be made with the top government official on their plans and progress in encountering the issue of terrorism. Furthermore, researcher can also decide to have an interview with the journalist who understands the militants. Some of the journalists that will be interviewed may have had a contact with some of the terror groups (Dolnik, 2011). Research ethics It is important for the researcher to be honest when it comes to collect of data. The researcher should record the data as obtain from the primary or secondary source without any modification of the data or report. The researcher should not misrepresent, falsify or fabricate any data. He or she should also not deceive the public, colleagues or granting agencies. In addition to being honest, the researcher should be open. He or she should share result, data, tools, idea and resources. The researcher should also protect any communication that was confidential. Confidentially may be needed in papers, military or tread secrets, and personal records. In every organization there are rules and regulations that govern it. The research should always obey the relevant laws and policies (Rasnik, 2011). Anticipated problems During this research, most of the interview that was carried out was face to face interview. However, the main problems that were faced in this type of interview were that it was expensive. In addition face to face interview was also consumes a lot of time. This was because there was a lot of time consumed when gathering the data from the respondent. Most of the time was also consumed as the research had to travel to meet the respondents at different locations. Another issue that was encountered was that some of the respondents felt very uneasy in responding to some sensitive issues as they were not sure of the anonymity of their response. Bibliography BAYO, O. A. (2012). Research on terrorism: An overview of theoretical perspectives. Asia Journal of Research in Social Sciences and Humanities, 2(9), 11-27. BBC NEWS, (2007). UN review after Algiers bombing. Web < http://news.bbc.co.uk/2/hi/africa/7139787.stm >accessed July 3, 2015. BBC NEWS,(2011). Abuja attack: car bomb hits Nigeria UN building. Web< http://www.bbc.com/news/world-africa-14677957> accessed July 3, 2015. BLACK TRIANGLE, (2007). The UN bombers. Web < http://www.blacktriangle.org/blog/?p=1687 > accessed July 4, 2015. BURNS, R. B. (1997). Introduction to research methods. Addison Wesley Longman. CBCNEWS, (2007). 11 UN workers among 26 killed in Algeria blast. Web < http://www.cbc.ca/news/world/11-un-workers-among-26-killed-in-algeria-blasts-1.636919 > accessed July 3, 2015. CNN, (2007). Rescuers search for bomb survivors. Web < http://edition.cnn.com/2007/WORLD/africa/12/11/algeria.blast/index.html?iref=mpstoryview > accessed July 3, 2015. DOLNIK ADAM, (2011). Conducting Field research on Terrorism: a Brief Primer. Web < http://www.terrorismanalysts.com/pt/index.php/pot/article/view/dolnik-conducting-field-research/html > accessed July 5, 2015. FARMER BEN, (2010). UN bodyguard executed by Afghan police. Web accessed July 3, 2015. NOSSITER ADAM, (2011). Islamic group says it was behind fatal Nigeria attack. Webhttp://www.nytimes.com/2011/08/29/world/africa/29nigeria.html?_r=0 accessed July 3, 2015. OCHA, (n.d). The state of humanitarian aids. Web < http://www.unocha.org/ > accessed July 4, 2015. OPDENAKKER, R. (2006, September). Advantages and disadvantages of four interview techniques in qualitative research. In Forum Qualitative Sozialforschung/Forum: Qualitative Social Research (Vol. 7, No. 4). OLSEN WENDY, (2004). Triangulation in Social Research: qualitative and quantitative Method Can Really Be Mixed. Web < http://www.harep.org/Social%20Science/Triangulation.pdf > accessed July 6, 2015. RASNIK B. DAVID, (2011). What is Ethics in Research & Why is it Important? Web < http://www.niehs.nih.gov/research/resources/bioethics/whatis/ > accessed July 6, 2015. ROBERTS JOEL, (2003). Baghdad Bomb Crude but deadly. Web < http://www.cbsnews.com/news/baghdad-bomb-crude-but-deadly/ > accessed July 3, 2015. TAVERNISE SABRINA AND RAHIMI SANGAR, (2009). Attack in Afghan Capital illustrates Taliban’s Reach. Web < http://www.nytimes.com/2009/10/29/world/asia/29afghan.html?_r=1> accessed July 3, 2015. THE ECONOMICS, (2011). Terrorism in Nigeria: A dangerous new level. Web < http://www.economist.com/node/21528307> accessed July 3, 2015. THEGUARDIAN, (2011). Abuja bombing: UN official hit by deadly blast. Web < http://www.theguardian.com/world/video/2011/aug/26/abuja-bombing-un-offices-nigeria> accessed July 3, 2015. THOMAS CONNOLLY AND CAROLYN BEGG, (2010). Fact-finding Techniques. Web < http://home.kku.ac.th/wichuda/Sa/Slide/MIT/MIT_C2Fact.pdf > accessed July 5, 2015. UNHCR, (2007). UNHCR chief condemns Algiers bombing; mourns dead. Web http://www.unhcr.org/news/NEWS/475ebc454.html accessed July 3, 2015. UN NEWS CENTER, (2013). Back from Afghanistan, UN security chief highlights future challenges. Web < http://www.un.org/apps/news/story.asp?NewsID=45562#.VZqcD1I6HGg > accessed July 6, 2015. UN ORGANIZATION, (2008). Towards Culture of Security and Accountability. Web http://www.un.org/News/dh/infocus/terrorism/PanelOnSafetyReport.pdf accessed July 6, 2015. UN SECURITY COUNCIL, (UNSC) (2003). Iraq: Report of the Secretary-General (S/2003/1149). Web http://reliefweb.int/report/iraq/iraq-report-secretary-general- s20031149 accessed July 6, 2015. WILLIS, H. H., & AL-SHAHERY, O. (2014). National Security Perspectives on Terrorism Risk Insurance in the United States. Rand Corporation. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security and Risk Management Challenges Research Proposal, n.d.)
Security and Risk Management Challenges Research Proposal. https://studentshare.org/politics/1881853-united-nations-security-and-risk-management-challenges
(Security and Risk Management Challenges Research Proposal)
Security and Risk Management Challenges Research Proposal. https://studentshare.org/politics/1881853-united-nations-security-and-risk-management-challenges.
“Security and Risk Management Challenges Research Proposal”. https://studentshare.org/politics/1881853-united-nations-security-and-risk-management-challenges.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security and Risk Management Challenges

Risk Management

risk management Name University risk management Like many other organizations in several parts of the world, our organization continues to face a significant number of security related threats.... For example our network security technologies are still susceptible to disruption by unauthorized persons.... hellip; Generally some of the security technologies and methodologies we use in our company include Cisco security agent (CSA), Antivirus, and file Encryption....
3 Pages (750 words) Essay

Risk Management in a Satellite Project

Introduction The importance behind risk management can hardly be overstated.... … Introduction The importance behind risk management can hardly be overstated.... In fact, risk management techniques help in improving the strategies of doing business because the parties venturing are more cautious in all undertaking they involve themselves in.... One of the key significances of risk management in a project is the proper identification of all possible risks....
4 Pages (1000 words) Essay

Project Planning Management and Control

However, it should not escape the construction industry stakeholders that there are certain core factors and challenges that unpleasantly affect the planning, implementation and the completion of construction projects (Cleland and Gareis, 2006).... Project managers and workers thus require special and distinct technical and management skills/strategies to ensure all project factors and challenges are identified and addressed thoroughly (Cleland and Gareis, 2006)....
7 Pages (1750 words) Essay

Private and security

The challenges that the project faced included sustainability because it was clear that it was not going to be easy to find physicians who would be willing to treat minor ailments.... The main reason for increase in “identity management” by healthcare providers is that there is a strict law requiring that all hospitals that use electronic records keep such records as secure as possible to prevent unauthorized people from accessing patient information… The authors support their conclusion that medical practices are “not as advanced” as hospitals in their patient data security practices by pointing out that respondents working in medical practices were more likely to report that their facility did not conduct a risk Inserts Inserts Privacy and security 30 November Privacy and Security Identity management The main reasonfor increase in “identity management” by healthcare providers is that there is a strict law requiring that all hospitals that use electronic records keep such records as secure as possible to prevent unauthorized people from accessing patient information (Jonathan)....
2 Pages (500 words) Essay

Project Management - Project Breakdown, Risks and Staffing

For an organization to run and operate smoothly it is the duty of the managers to control… The management should come up with a plan which will ensure effective project management with regard to the risks and challenges that the organisation faces.... The major risks that face the business organisation are staffing, management, and handling of a new project and the risk of running out of business because of the adverse competitors.... There is also poor human resource management....
4 Pages (1000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us