StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Terror Attack within Australia - Case Study Example

Cite this document
Summary
The paper "Terror Attack within Australia" will find out the risk of terrorism in Australia, which has become a major concern for the government and other stakeholders. The study will be based on the risk that has been received by government intelligence and terror attack attempts within Australia…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful

Extract of sample "Terror Attack within Australia"

Student’s Name: Instructor’s Name: Course Code & Name: Date of Submission: (Word count 1,505) 1. PARAMETERS OF RESEARCH The research will find out the risk of terrorism in Australia, which has become a major concern for the government and other stakeholders. The study will be based on the risk that has been received by government intelligence and terror attack attempts within Australia. The impact will be evaluated on its effects on the level of investment and impact on the general economy. Evaluation of the impact of the level of investment will be majorly based on international firms entering Australia market and expansion of investment by the current international business entities in Australia. The domestic investment will also be used since the level of domestic investment is directly influenced by the probability of terror attacks. The entry and expansion of international firms will form the basis for measuring risk of terrorism since terrorism risk is inversely related to the level of investment by foreign and domestic investors. When the level or probability of terror attack is high, the level of investment is low since investors fear to enter or expand its businesses. In addition, the research will find out the effect of risk of tourism to the number of visitors to Australia. The visitors will include tourist, international students, and expatriates. The number of visitors visiting Australia is inversely related to the level of terrorism attack facing the nation. The high number of visitors will signify low probability of terrorism fear. The research will be important to the government, investors and other stakeholders in understanding the current effect of the risk of terrorism to Australia. The research will give the users insight on the level of terrorism and recommendation of what to do in order to reduce its occurrence, and its impact to the three pillars of economic, political and social fabrics of the society. This ensures secure Australia that attracts global attention on the three core pillars that are essential to any given country. 2. Research question The research question below will form basis and framework for the overall research. i. What is the recent terror attacks witnessed in Australia? ii. What are the factors that have lead to increased terror threats? iii. What is the effect of terrorism risk on investment and economic status of Australia? iv. Does terrorism risk affect the number of visitors visiting Australia? v. Who are the major stakeholders to terrorism risk? vi. What are the policies that government has to reduce current and future terrorist threats? The research question assumes that the number of visitors and level of investment is inversely related to the risk of terrorism facing Australia. In addition, other factors affecting these variables will be adjusted for to arrive at a sufficient conclusion. 3. EPISTEMOLOGICAL POSITION AND THEORETICAL FRAMEWORK The research will be guided by government publication and statistics on an instance of terror threats and the level of investment, and number of visitors during that period. This will be compared with periods of low or fear of terror attacks. The other source of literature that will guide the research will include published books, journals and thesis carried out by previous scholars to avoid repetition, mistakes, and obtain relevant theories. Research Conceptual framework 4. Ethical issues The research will be conducted in ethical manner. The researcher will seek consent from any stakeholders to ensure that they are aware and also ascertain the information obtained to be true. In addition, it will be important to ensure that the privacy and confidentiality are provided to the research team and respondents. The work from other authors will be cited appropriately to avoid infringement of copyright. 5. METHODOLOGY The research will be qualitative and descriptive nature due to the nature of the variables, recommendation needed and use of the research. The major reason for the adoption of the qualitative approach by the researcher, in order to provide the platform of interacting with the natural setting of the variables and coming up with more accurate information necessary to arrive at conclusive research. The questionnaire ensures that respondents have the ability to explain themselves adequately. The questionnaires questions will be formulated by taking care of the reaction of the respondent and ensuring it is within the scope of the study. The questions should be based on the research questions developed and theoretical framework of the study. The consideration of these variables will ensure that relevant data will be collected. The relevant of the data ensures that analysis will yield required confidence interval. This is useful in coming up with the conclusion and recommendation of the research that achieves the objective of the overall research. The qualitative approach also enables the researcher to interact with the interviewee extensively and enable interviewees to explain themselves exhaustively since it uses an open-ended type of questions. The use of close-end questions will be minimized since it will not provide enough information required by the researcher. The terms on the use of respondents and interviewers will be explained in order to ensure that concerned parties know the purpose of the research. The interview questions should be developed basing on the questionnaire questions to be used in complementing the findings obtained from questionnaires. In addition, it will be linked to the research questions and theoretical framework to enhance consistency. The researcher will adopt the essential packages in analyzing the data in order enhance accuracy and ease researchers work in analyzing the data collected. 6. Data collection Population and sample size The data will be collected from a population of 100 respondents who will be required to fill the questionnaires. The 100 questionnaires will be administered to stakeholders who are directly or indirectly affected by the risk of terrorism. The questionnaires will be scrutinized to ensure it is well answered without signs of inconsistency by the respondents. The defective questionnaires will be removed. The remaining questionnaires will be randomly picked to obtain a sample size of 50 which be used in the analysis. The random selection will be used to eliminate biases and obtain high accuracy from the collected data. The interview will be carried out with five government official from foreign affairs, economic and security docket to obtain relevant data. Instrumentation The data will be collected by use of questionnaire due to the qualitative technique that will be adopted in the research. The audio of the interview will be recorded with a mobile phone and short notes to be used during analysis. The research will use the teleconferencing and call interviewers in conducting interviews to cut on cost since face to face interview is costly and time consuming. The data will be tabulated at the end of the exercise to ensure easy and accurate transfer of data during the analysis process. Data collection process The research will be carried out by administering questionnaires and interviews with stakeholders such as investors, government officials, and citizens. The questionnaires will be administered through emails after receiving consent from the respondent to participate. The questionnaires will be complimented by direct interview via phone call or teleconferencing with a top government official on matters of foreign affairs, security and economic. The data collected will then be arranged and recorded for analysis. 7. Data Analysis The gathered data will be analyzed by use of qualitative techniques. Qualitative analysis technique will be used since questionnaires will comprise of open-end questions. The instruments to be used in the analysis include Statistical Package SPSS and Ms. Excel. Ms. Excel will be used in the presentation of the data through generation graphs from data that will be recorded after collection. The graphs generated will include bar charts and line graphs that are essential to findings and analysis. The graphs and charts generated by Ms. Excel will be used in comparing results visually and enabling the users to understand the research paper easily. Data analysis will entail the use of wide range of values to increase the accuracy of the research. SPSS will be majorly used in the evaluation of the reliability and validity of the data by obtaining the significance of the confidence level of the data. This is done before opting to use the data further since wrong information will lead affect the accuracy of the recommendation and conclusion of the research. The confidence interval should be reasonable before deciding to rely on the data collected. The research will adopt confidence of 96% where only 4% of the data will not be explained by the data collected. The use of the set confident interval will ensure that the research will be useful to the users due to sufficient conclusion and recommendation drawn from the analyzed data obtained. The data that will not be analyzed by the use of the two packages will be tabulated and analyzed theoretically to compliment the analyzed data obtained from MS Excel and SPSS. The data analysis will be linked to the framework of the research questions and theoretical framework adopted to guide research to minimize confusion due to inconstancy in the overall research. 8. LITERATURE AND REFERENCES Balogh, S. (2015). Jihadist fighters ‘risk Australian citizenship’. [online] TheAustralian. Available at: http://www.theaustralian.com.au/in-depth/terror/jihadist-fighters-risk-australian-citizenship/story-fnpdbcmu-1227362158080 [Accessed 30 May 2015]. Coaffee, J. (2009). Terrorism, risk and the global city. Farnham, England: Ashgate. Willis, H. (2005). Estimating terrorism risk. Santa Monica, CA: RAND. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Terror Attack within Australia Case Study Example | Topics and Well Written Essays - 1500 words, n.d.)
Terror Attack within Australia Case Study Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/social-science/2065733-discussion-paper-social-research-methods
(Terror Attack Within Australia Case Study Example | Topics and Well Written Essays - 1500 Words)
Terror Attack Within Australia Case Study Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/social-science/2065733-discussion-paper-social-research-methods.
“Terror Attack Within Australia Case Study Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/social-science/2065733-discussion-paper-social-research-methods.
  • Cited: 0 times

CHECK THESE SAMPLES OF Terror Attack within Australia

Events That Lead to Guadalcanal Battle and Victory

The use of islands, like Guadalcanal, Tulagi and Florida in Southern Solomon by Japanese forces was proving a major threat to supply routes between USA, australia and New Zealand.... uch disarray within Japanese forces was the major element for American victory.... Such disarray within Japanese forces was the major element for American victory.... Leading the attack on August 07, 1942, allied forces expected stiff resistance from Japanese army, but the tactical combined approach by allied forces took the other side by complete surprise and they did not find any resistance from Japanese....
3 Pages (750 words) Essay

Is War Against Terrorism Moral And Has It Done Things Better Or Worse

… According to the report US launched its terror retaliation activities with its allies United Kingdom, australia and Spain as well as a number of other nations so as to combat Osama bin Laden and his associates which according to US sources, were scattered all over the planet.... This War on Terror was indeed an attack on all the forces.... This paper talks that the War on terror started after the terrorists attacked the US motherland on September 11th, 2001 whereby they blew up the World Trade Center as well as crashed planes into the Pentagon....
9 Pages (2250 words) Essay

Terrorist Techniques

Specifically, this motive is aimed at liberating territory from the control of the state or acquiring a particular position within the society either politically or geographically (Kydd & Walter, 2006).... Specifically, the terrorist group uses threats such as car bombing, suicide bombers in public places, and other cheap methods of attack to limit the government's intervention.... The conflict between Sri Lanka and the terror group Liberation Tigers of Tamil Eelam (LTTE) utilized this strategy....
2 Pages (500 words) Essay

Middle East Studies

The main focus of the paper "Middle East Studies" is on the relationship between countries in the Persian Gulf themselves and between the latter countries and other western countries, social, political and economic issues in the Persian Gulf and trade opportunities for australia.... The tensions occur as a result of religious extremism within the faith.... The youth as a group may have certain difficulties in adjusting to social change within the region....
7 Pages (1750 words) Essay

Chess Is the Oldest Game in History

When an opponent has made his or her move then he stops the clock indicating that he made a move within the time required to and that it was the other opponent's turn to make a move.... The esssay "Chess Game" discusses how a player who successfully manages to capture the king, most important figure in the game, manages to win the game and the steps that are leading to it....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us