SlideShare a Scribd company logo
1 of 16
HM502
Unit 1 Assignment
For this assignment, you will create a 15-20 slide Microsoft®
PowerPoint® presentation to analyze the three routinely used
risk assessment methods below:
1. Exercises, scenarios, and game theory — Terrorism Risk
Assessment and Management (TRAM)
2. Event-tree model — Biological Threat Risk Assessment
(BTRA)
3. Community Preparedness - Thread and Hazards Identification
and Risk Assessment (THIRA)
The analysis should determine threat, vulnerability, and
consequence assessment validity and reliability. It should also
identify at least three strengths and three weaknesses for each
methodology. The criteria for assessing the methodologies is in
the Review of the Department of Homeland Security’s Approach
to Risk Analysis.
Note: This assignment will require outside research. Use at least
two credible sources in addition to the assigned
textbook/reading material and discuss how you evaluated the
credibility of the resources used.
You may consult the Library, the internet, the textbook, other
course material, and any other outside resources in supporting
your task, using proper citations in APA style.
PowerPoint Formatting
The PowerPoint presentation should have the following
characteristics.
· Contains a title and references slide.
· Bullets for your main points.
· Designed with a live audience in mind in order to inform your
viewers about the topic.
· Must include speaker notes below the slides to fully explain
what is being discussed in the slide bullet points as though you
are presenting to an audience.
· Research from at least two reliable outside sources in addition
to the assigned textbook/reading to support the main message.
· Incorporate information from course readings, the course
materials, and other library sources to support your discussion.
Properly cite all sources of information by including in-text
citations and a list of references.
· Research and visuals are cited in APA citation format, both in-
text and on a References slide. You need to quote material taken
directly from a source.
· Avoid using images, graphics, or logos that are copyrighted.
· The same standards for documenting sources that apply to an
essay, apply to a presentation. Refer to the APA Style® Central
website for a digital library of APA Style quick guides and
tutorials to refine your writing. You can access this site under
Academic Tools.
Speaker Notes
To learn more about creating speaker notes in PowerPoint,
review the website below.
GCF Learn Free (1998-2020). PowerPoint 2010-Slide Basics:
Goodwill Community Foundation, Inc. Retrieved from
https://www.gcflearnfree.org/powerpoint2010/slide-basics/6/
Directions for Submitting Your Assignment
Compose your presentation in Microsoft PowerPoint and save it
with a name you will remember. Be sure to include your name,
class, and section number. Submit your assignment by selecting
the Unit 1: Assignment Dropbox by the end of Unit 1.
Download Unit 1 Assignment Checklist
RUBRIC ( Please follow)
1. All of the following is true for each of the three risk
assessment methodologies:
● Accurately identifies the primary characteristics of the risk
assessment methodology
● Accurately identifies at least three strengths of the risk
assessment methodology
● Accurately identifies at least three weaknesses of the risk
assessment methodology.
2. All of the following is true for each of the three risk
assessment methodologies:
● Analyzes the threat assessment for the risk assessment
methodology
● Analyzes the vulnerability assessment for the risk assessment
methodology
● Analyzes the reliability and validity of the risk assessment
methodology
3. Both of the following are true:
● Includes two credible sources beyond the textbook/assigned
reading.
● Discusses the credibility of the outside sources.
4. All of the following are true:
● Uses appropriate PowerPoint format as per assignment
instructions.
● Content of the presentation concisely stays focused on the
topic.
● Provides 15-20 slides of content, excluding title slide and
reference slide.
5. The assignment meets all of the following:
● Clearly written in Standard English.
● Free of spelling, grammar, or punctuation errors.
● References or academic sources as required including in-text
citation(s).
● The document is properly formatted in APA style, per the
assignment instructions.
HM502
Unit 1 DQ (Only has a Topic 2, NO TOPIC #1)
Part 1
Topic 2: Risk Assessment Methods (Respond)
The Department of Homeland Security (DHS) has enormous
responsibilities. The missions of DHS are:
1. Preventing terrorism and enhancing security
2. Securing and managing borders
3. Enforcing and administering immigration laws
4. Safeguarding and securing cyberspace
5. Ensuring resilience to disasters
As a result of this broad, expansive, and complex set of
missions, the DHS must assess risks from a range of threats to
homeland security. Also, in some cases, the DHS shares
responsibility with other entities, states, cities, or tribes, for
assessing risks and creating plans to prepare for, respond to,
and recover from man-made or natural disasters, threats, or
hazards. These diverse and multi-faceted risk assessments are
used in the process of risk management by decision makers to
mitigate these challenges.
Unfortunately, there is not just one risk assessment
methodology that is or can be employed by all the agenci es
within the DHS. Consequently, there are several methodologies
currently in use throughout the DHS to varying degrees of
effectiveness. Two measures of the effectiveness of these
methodologies are their validity and reliability (National
Research Council (NRC), 2010). Essentially, do these
methodologies assess what you want to assess accurately (valid)
and do these methodologies consistently/precisely measure what
the assessment intends them to measure (reliable)?
After reading about each of the different risk assessment
methodologies, what are the strengths and weaknesses of each
methodology?
What are some of the application and implementation challenges
that each method currently faces?
As you discuss the various attributes of each risk assessment
method, consider the validity and reliability of each method as
they relate to the threat, vulnerability, and consequence
assessment capabilities of the method.
Reference:
National Research Council. (2010). Review of the Department
of Homeland Security's approach to risk analysis. National
Academies Press. Retrieved from
http://www.nap.edu/catalog.php?record_id=12972
Part 2
Topic 2: Student Response #1 (Respond to Skyler)
Skyler Fry
Terrorism Risk Assessment and Management (TRAM)
TRAM is a computer program that was developed by FEMA to
compare risk against assets within specific geographical
boundaries (Stromgren & Ryan, 2008). TRAM identifies and
prioritizes upgrades in security, protection, response and
recovery in order to minimize the risks associated with a
potential threat (Stromgren & Ryan, 2008). A major benefit of
TRAM is its availability to various jurisdictions and across the
many levels of government. TRAM is focused on future threat
analysis and risk associated with facilities rather than
populations, therefore, the program is limited as to the extent of
effectiveness in regards to population threats (Stromgren &
Ryan, 2008).
Biological Threat Risk Assessment (BTRA)
BTRA is a strategic event tree based program that requires
subject matter expert level of understanding to be utilized
effectively (National Research Council, 2010). The model used
is 17 steps and very information based with "Frequency of
initiation by terrorist group, Target selection, Bioagent
selection, Mode of dissemination (also determines wet or dry
dispersal form), Mode of agent acquisition, Interdiction during
acquisition, Location of production and processing, Mode of
agent production, Preprocessing and concentration, Drying and
processing, Additives, Interdiction during production and
processing, Mode of transport and storage, Interdiction during
transport and storage, Interdiction during attack, Potential for
multiple attacks, and Event detection" all needing to be
identified in order to formulate the risk associated with a
specific potential event (National Research Council, 2010). The
BTRA is best utilized at the upper echelons of government with
highest probabilities being shared with potential target areas.
BTRA is not as useful for local governments as a biological
threat is much less likely when compared to other threats and
would distract resources that could be used
more efficiently elsewhere.
Threat and Hazards Identification and Risk Assessment
(THIRA)
The THIRA model is the best and most applicable across the
board as it doesn't deal with non realistic or low probability
threats and hazards but instead focuses on those that are more
likely to happen that would challenge the capabilities of a
specific jurisdiction. Based on model outcomes, a specific
location all the way up to the national level can identify what
capabilities will be needed in order to combat or mitigate
against possible outcomes (National Research Council, 2010).
THIRA is made up of four main components; risks and
associated impacts, capability targets, current capabilities, and
gaps (FEMA, 2019). The risks and associated impacts
component identifies and assesses threats and hazards(FEMA,
2019). The capability targets component utilizes likely impacts
to create capability goals in order to combat the potential threat
or hazard(FEMA, 2019). The current capabilities component
measures the current capabilities compared to needed
capabilities based on possible threats and hazards(FEMA,
2019). The gaps component identifies current gaps that would
hinder an effective response and assists in development of
strategies to close the gaps(FEMA, 2019).
National Research Council. (2010) Review of the Department of
Homeland Security's Approach to Risk Analysis. Washington,
DC: The National Academies
Press. https://doi.org/10.17226/12972.
FEMA. (2019). 2019 National Threat and Hazard Identification
and Risk Assessment (THIRA). Federal Emergency Management
Agency. https://www.fema.gov/sites/default/files/2020-
06/fema_national-thira-overview-methodology_2019_0.pdf.
Stromgren, C., & Ryan, K. (2008). Introduction to the Terrorism
Risk Assessment and Management (TRAM) Methodology.
Calhoun. https://calhoun.nps.edu/bitstream/handle/10945/51764/
Stromgren_Ryan_Introduction_to_the_Terrorism_Risk_CIP_Met
rics_Tools_2008.pdf?sequence=1&isAllowed=y.
Topic 2: Student Response #2 (Respond to Sunday)
Sunday Akinwunmi
Though risk management does not prevent events from
occurring, it does assist the department in focusing on the
occurrences of the more destructive events and assisting in the
avoidance or mitigation efforts. Risk management produces
analysis, which creates a better platform for decision making.
The potential perils are identified in terms of their likelihood to
occur to assist decision-makers in selecting, implementing, and
evaluating risk management alternatives. Different assessment
methods, such as TRAM, BTRA, and THIRA, are used to assess
and analyse threats, whether they are man-made or naturally
occurring (Ezell, et al., 2017). Scholars have criticized these
tools because terrorists can adapt to the preventive measures
developed, and the terrorist may be focused on maximizing a
specific consequence rather than all.
TRAM is a model that focuses on determining the threat,
capability, and intent of a terrorist attack. TRAM evaluates
critical scenarios. The framework of the model uses ratings
from various SMs to project the vulnerability and the
consequences of a potential threat. As a result, TRAM focuses
on identifying the critical infrastructure to be protected, as well
as the infrastructure's vulnerability and the consequences of the
risk if it occurs. However, the model is untrustworthy due to its
complicity, making effective employability and evaluation
difficult.
TRAM has a number of flaws, including the fact that the
analysis process is extremely complex, and that comparing the
minimum experience of the SMs on training makes determining
the exact target value difficult. Second, the process of
developing the criticality of risk assessment factors lacks
transparency, which can lead to misleading criticality
assessments. Finally, there is the uncertainty of estimating the
factors used to calculate venerability. As a result, it is
conclusive that TRAM reliability is not certain because its
complicity makes it extremely difficult to use effectively while
evaluating the model.
The model has advantages, such as the outputs being useful in
conceptualizing the risk space. Second, it discusses risk
mitigation options and how they affect the various ranks,
thereby improving cost-benefit analyses. The model also lowers
the risk of purchasing because it has the ability to improve
security systems in the various organizations that use it.
Using BTRA involves employing the logic tree, also known as
an event tree model. This assessment tool divides a complex
assessment into smaller and simpler segments that can be
addressed fully and effectively. There are two methods in the
tool: probability, event, and decision trees, as well as fault,
attack, and successful trees. Branches and nodes make up
probability, event, and decision trees.
The limitation of BTRA as a terrorism risk assessment tool,
according to Ezell et al. (2010), is the level of uncertainty,
incompleteness, and the fact that it is not static. The
incompleteness and uncertainty of the data collected make it
difficult to develop exact probabilities. For example, a terrorist
may plan to produce virus A in order to cause the greatest
number of casualties possible because the same virus is optimal
for virus B. However, because biological systems are complex,
such an attack may fail. Terrorists, being intelligent, examine
the US defensive mechanism and adapt to it while developing
new attack tactics. Understanding terrorist motivations, intent,
and capabilities is the most important strategy for preventing
attacks. As a result of the aforementioned flaws, the model is
only a snapshot of a specific time period.
References
James F. Broder, & Gene Tucker. (2012). Risk Analysis and the
Security Survey: Vol. 4th ed. Butterworth-Heinemann.
Ezell, B., Bennett, S. P., Winterfeldt, D. V., Sokolowski, J., &
Collins, A. J. (2017). Probabilistic Risk Analysis and Terrorism
Risk. Improving Homeland Security Decisions, 5-31.
doi:10.1017/9781316676714.002
CJ513
Unit 1 Assignment
Analysis and Application: Essay
After completing the assigned readings and Learning Activity,
write a 3- to 4-page paper that addresses the following:
· Identify the role of three major religions in the development of
social and political attitudes on terrorism and discuss at least
three different religious sects associated with each. Include a
discussion of the unique doctrines or worldviews on terrorism
associated with each sect.
· How does religion specifically impact the social and political
attitudes of the members of each of these sects?
· How does religion appear to shape the development of the
social and political attitudes on terrorism?
For each of your responses, provide examples along with
documentation and research that support your assertions and
analysis. Provide support for each of your assertions and
include specific examples.
Please double space your writing. Remember to follow APA
guidelines in your writing. Save your work in a Word document.
Submit it in the Dropbox.
Use at least two credible sources in addition the assigned
reading and discuss how you evaluated the credibility of each
source. You may consult the Library, the internet, the textbook,
other course material, and any other outside resources in
supporting your task, using proper citations and references in
APA style.
Download the Unit 1 Assignment Checklist.
Directions for Submitting Your Assignment
Compose your essay in Microsoft® Word® and save it with a
name you will remember. Be sure to include your name, class,
and unit number in your essay. Submit your Assignment by
selecting the Unit 1: Assignment Dropbox by the end of Unit 1.
1. All of the following are true:
● Identifies the role of three major religions in the development
of social and political attitudes on terrorism
● Discusses at least three different religious sects associated
with each religion selected.
● Includes a discussion of the unique doctrines or worldviews
on terrorism associated with each sect.
● Addresses how religion specifically impacts the social and
political attitudes of the members of each of these sects
● Explains how each religion appears to shape the development
of the social and political attitudes on terrorism
● Provides examples along with documentation and research
that support assertions and analysis.
● Provides support for each of assertions and includes specific
examples.
2. All of the following are true:
● Includes two credible sources beyond the textbook.
● Discusses the credibility of the outside sources.
3. All of the following are true:
● Uses appropriate format as per assignment instructions.
● Content of the paper concisely stays focused on the topic.
● Overall length meets the assignment parameters of 3-4 pages,
excluding cover page and reference page.
4. The assignment meets all of the following:
● Clearly written in Standard English.
● Free of spelling, grammar, or punctuation errors.
● References or academic sources as required including in-text
citation(s).
● The document is properly formatted in APA style, per the
assignment instructions.
CJ513
Unit 1 DQ
Discussion topics support this unit’s objectives and should be
completed after reading all materials (No Less than 100 words).
Your responses should include original evaluation, synthesis, or
analysis of the topic and contribute to the weekly Discussion in
a meaningful way. Refer to the Discussion Board Rubric in
Course Documents for additional requirements.
Part 1
Topic #1: The Role of Religion (Respond)
Discuss the role of religion in the development of social and
political attitudes on terrorism. Identify three examples of
terrorist incidents motivated by religious beliefs. Discuss the
ideology used to justify each of these incidents. Where do each
of these attitudes fall on the classical ideological continuum?
Be sure to include APA citations and references for any sources
used to inform or support your posts.
Part 2
Topic #1 Student Response #1(Respond to Damon)
Damon Bradshaw
Religion is a significant factor in influencing different attitudes
leading to terrorism. Extremist ideologies that are religious in
the description are the leading cause of acts of terrorism.
Different religions have been caught up with acts of terrorism
that are majorly due to radicalization (Rodger et al., 2007).
Terrorists influenced by religious views feel they have a role to
play in society by accomplishing their act, where their religion
allegedly justifies. Religion has different influences socially
and politically, and these are critical elements in society—
wrong perceptions and manipulations advocate for the same
influences to be channeled into terrorism.
On September 21, 2013, a terrorist attack was reported in a mall
Nairobi, Kenya, with Al-Shabaab, a Somalia-based extremist
group taking responsibility. The act was a retaliation to the
Kenyan military forces’ presence in Somalia, and they believe it
is their duty in the Holy war. There are conflicting reports on
the death toll, but the attack resulted in hostages, mass
shootings, and damages, with 71 reported deaths (Blanchard,
2013). The attack strategically targeted an entity that would
strike a blow and not involve fellow Muslims but rather more of
foreigners and other religious groups.
Al-Shabaab is a group influenced by religion's role in the
development of social and political attitudes towards terrorism.
The extremist group follows a social way of life guided by
Sharia laws, not the nation's constitution. Politically the group
feels they are obligated to liberate the nation to a Sharia rule
state, resulting in conflicts with the national government, with a
spillover to neighboring countries like Kenya that sent its
troops to Somalia to bring peace and extend security to its
borders, something the militia term as an invasion from infidels
or the non-believers and unclean (Anderson & McKnight, 2015).
Their actions in this particular day were based on religious
extremism.
September 11, 2001, popularly known as 9/11, was a terror
event influenced by religious affiliation on a specific group.
The terror event was a series of attacks on American soil by an
extremist group known Al Qaeda. The group planned attacks by
19 of their militants. They hijacked four airplanes and embarked
on a suicide mission. The first two airplanes were directed at
the World Trade Center at the Twin Towers in New York.
Another plane crashed into the Pentagon, and the last one
crashed in a field in Pennsylvania (Gus, 2010). The attacks led
to a death toll estimated at 3000. The group took responsibility
through their leader Osama Bin Laden, advocating for the
invasion of western powers to the Middle East.
The 9/11 attack was an example of a classical ideological
continuum involving terrorism and extremism as the root
source. The two aspects are clearly influenced by religious
affiliation playing out in the social and political structures i n
the Middle East. The Al Qaeda extremist group advocate for the
Jihadi war, which refers to a Holy war in other terms. The
involvement of United States troops in the Middle East brought
about the campaign against non-Muslim believers meddling
with the political state. The extremist group beliefs they are at
war with any allies to Jewish, Christianity affiliations (Gus,
2010). It brings about the ideology that anyone not of Muslim
belief is against them, and actions against them will bring a
particular reward in the afterlife. These beliefs and actions
influenced the rise of different extremist groups under the Al
Qaeda Islamic extremist group.
On July 22, 2011, Norway experienced terrorist attacks in Oslo
and the island of Utoya. The bombing attack was strategically
placed near governmental offices. The police responded to the
terrorist attack. It was realized the terrorist used the bombing as
a decoy while another attack took place at the island of Utoya
where some youths were camping (Meyer, 2013). The terrorist
opened fire on the campers with nowhere to escape on the
island. The gunman massacred 68 people on the island, and a
total count was 80 people in addition to the bombing.
The gunman was a member of Neo-Nazi and Anti-Islamic
groups, according to police investigations. The perpetrator
published a manifesto listing the reasons and the changes he
demanded. The root cause influence by the hatred towards the
Muslim religion and any Jewish affiliation. This motive
radicalized and influenced his actions. It was a clear classical
continuum of terrorism. The gunman raised an issue with the
Norwegian government allowing cultural mix, significantly
increasing Muslims within the nation. The gunman identified
himself as a martyr. His hate towards Muslims and Jews
influenced a fascist ideology that led him into a Neo-Nazi
affiliation mission.
References
Anderson, D., & McKnight, J. (2015). Understanding al-
Shabaab: clan, Islam and insurgency in Kenya. Journal Of
Eastern African Studies, 9(3), 536-
557. https://doi.org/10.1080/17531055.2015.1082254
Blanchard, L. (2013). The September 2013 Terrorist Attack in
Kenya: In Brief. Fas.org. Retrieved 5 August 2021,
from https://fas.org/sgp/crs/row/R43245.pdf.
Gus, M. (2010). Terrorism and homeland security. California,
Cal: Sage Publications.
Meyer, S. (2013). Impeding lone-wolf attacks: lessons derived
from the 2011 Norway attacks. Crime Science, 2(1), 1-
13. https://doi.org/10.1186/2193-7680-2-7
Rogers, M., Loewenthal, K., Lewis, C., Amlôt, R., Cinnirella,
M., & Ansari, H. (2007). The role of religious fundamentalism
in terrorist violence: A social psychological
analysis. International Review of Psychiatry, 19(3), 253-
262. https://doi.org/10.1080/09540260701349399
Topic #1 Student Response #2 (Respond to Travis)
Travis Reed
Hello Y’all
Religion is often a big contributor towards the development of
various political and social attitudes towards terrorism. Religion
influences social and political injustices which lead to
terrorism (Borum, & Neer, 2017). As people try to adhere to
accepted religious ideology or rather what they perceive as
political or social right, and then another religious ideology
strips them of their rights, an attitude of violence may
arise (Borum, & Neer, 2017). This comes in because of the
belief that the use or threat of violence will be effective in
ushering in change. Many terrorists have confessed that they
chose violence after a long consideration because they felt that
they had no choice.
Christmas day bombings at Madall, Gadaka, and Jos churches in
Northern Nigeria by the Boko Haram is an example of a
terrorist attack motivated by Islamic religious beliefs. The
ideology behind these killings by Boko Haram group was that it
was on mission to kill those against the Islamic associated
group. This incidence was a clear manifestation of right–wing
extremism because the Boko Haram felt like their glory to the
Muslim belief had been lost to Christianity (Crossen, 2019). In
another incidence in Garissa University College in Kenya, 148
people were killed by gunmen from Al-Shabaab group. The
group held hostage more than 700 people but released the
Muslims and killed those who identified as Christians. The
mission was carried out to kill those against Shabaab, for
reasons of removing Kenyan troops deployed in Somalia, and to
claim the Muslim land which had been ‘colonized’ by non-
Muslims. These shootings were an expression of both right-
wing extremism and left-wing extremism because killings were
done due to an oppressive system and religious inferiority. In
2017, a suicide bomber of Islamist extremist origin attacked
Manchester Arena in UK, killing 22 people and injuring 1017
others. The attacker claimed he was motivated by injustices to
Muslim children which makes it a case of right-wing extremism.
v/r
Reed
References
Borum, R., & Neer, T. (2017). Terrorism and violent extremism.
In Handbook of behavioral criminology (pp. 729-745).
Springer, Cham.
Crossen, C. E. (2019). The Nature of the Beast: Transformations
of the Werewolf from the 1970s to the Twenty-first Century.
University of Wales Press.
HM502Unit 1 Assignment For this assignment, you will create

More Related Content

Similar to HM502Unit 1 Assignment For this assignment, you will create

The list of references to the required reading are list below  W.docx
The list of references to the required reading are list below  W.docxThe list of references to the required reading are list below  W.docx
The list of references to the required reading are list below  W.docx
cdorothy
 
7-Copyright © 2010 Pearson Education, Inc. Publishing a.docx
7-Copyright © 2010 Pearson Education, Inc. Publishing a.docx7-Copyright © 2010 Pearson Education, Inc. Publishing a.docx
7-Copyright © 2010 Pearson Education, Inc. Publishing a.docx
evonnehoggarth79783
 
TestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docxTestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docx
mattinsonjanel
 
We need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docxWe need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docx
celenarouzie
 
Assignment 1Contingency Planning in ActionCreate a hypothe.docx
Assignment 1Contingency Planning in ActionCreate a hypothe.docxAssignment 1Contingency Planning in ActionCreate a hypothe.docx
Assignment 1Contingency Planning in ActionCreate a hypothe.docx
deanmtaylor1545
 
HM500Unit 6 DQTopic 1 Developing an Emergency Response Plan
HM500Unit 6 DQTopic 1 Developing an Emergency Response PlanHM500Unit 6 DQTopic 1 Developing an Emergency Response Plan
HM500Unit 6 DQTopic 1 Developing an Emergency Response Plan
SusanaFurman449
 
Outline for Cyber Security Improvement PlanObjectiveThis assig.docx
Outline for Cyber Security Improvement PlanObjectiveThis assig.docxOutline for Cyber Security Improvement PlanObjectiveThis assig.docx
Outline for Cyber Security Improvement PlanObjectiveThis assig.docx
gerardkortney
 
Page 1 of 6 [1514] COM7005 Information S.docx
Page 1 of 6 [1514] COM7005   Information S.docxPage 1 of 6 [1514] COM7005   Information S.docx
Page 1 of 6 [1514] COM7005 Information S.docx
karlhennesey
 
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
VinaOconner450
 
10 Trends in Capability Planning for Defence and Security
10 Trends in Capability Planning for Defence and Security10 Trends in Capability Planning for Defence and Security
10 Trends in Capability Planning for Defence and Security
Stephan De Spiegeleire
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
cargillfilberto
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
drandy1
 
1 Beacon International College Major Incident an
1 Beacon International College Major Incident an1 Beacon International College Major Incident an
1 Beacon International College Major Incident an
MartineMccracken314
 
1 Beacon International College Major Incident an
1 Beacon International College Major Incident an1 Beacon International College Major Incident an
1 Beacon International College Major Incident an
AbbyWhyte974
 

Similar to HM502Unit 1 Assignment For this assignment, you will create (20)

The list of references to the required reading are list below  W.docx
The list of references to the required reading are list below  W.docxThe list of references to the required reading are list below  W.docx
The list of references to the required reading are list below  W.docx
 
7-Copyright © 2010 Pearson Education, Inc. Publishing a.docx
7-Copyright © 2010 Pearson Education, Inc. Publishing a.docx7-Copyright © 2010 Pearson Education, Inc. Publishing a.docx
7-Copyright © 2010 Pearson Education, Inc. Publishing a.docx
 
TestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docxTestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docx
 
Pm0016 project risk management
Pm0016 project risk managementPm0016 project risk management
Pm0016 project risk management
 
We need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docxWe need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docx
 
Assignment 1Contingency Planning in ActionCreate a hypothe.docx
Assignment 1Contingency Planning in ActionCreate a hypothe.docxAssignment 1Contingency Planning in ActionCreate a hypothe.docx
Assignment 1Contingency Planning in ActionCreate a hypothe.docx
 
HM500Unit 6 DQTopic 1 Developing an Emergency Response Plan
HM500Unit 6 DQTopic 1 Developing an Emergency Response PlanHM500Unit 6 DQTopic 1 Developing an Emergency Response Plan
HM500Unit 6 DQTopic 1 Developing an Emergency Response Plan
 
Outline for Cyber Security Improvement PlanObjectiveThis assig.docx
Outline for Cyber Security Improvement PlanObjectiveThis assig.docxOutline for Cyber Security Improvement PlanObjectiveThis assig.docx
Outline for Cyber Security Improvement PlanObjectiveThis assig.docx
 
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Satori Whitepaper: Threat Intelligence  - a path to taming digital threatsSatori Whitepaper: Threat Intelligence  - a path to taming digital threats
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
 
Security Risk Management Essay
Security Risk Management EssaySecurity Risk Management Essay
Security Risk Management Essay
 
Page 1 of 6 [1514] COM7005 Information S.docx
Page 1 of 6 [1514] COM7005   Information S.docxPage 1 of 6 [1514] COM7005   Information S.docx
Page 1 of 6 [1514] COM7005 Information S.docx
 
Lean project risk factor management
Lean project risk factor managementLean project risk factor management
Lean project risk factor management
 
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
 
10 Trends in Capability Planning for Defence and Security
10 Trends in Capability Planning for Defence and Security10 Trends in Capability Planning for Defence and Security
10 Trends in Capability Planning for Defence and Security
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
 
strategic risk management.pdf
strategic risk management.pdfstrategic risk management.pdf
strategic risk management.pdf
 
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapTech Talks Webinar April 2023 Joshua Sinai.pptxCapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
 
1 Beacon International College Major Incident an
1 Beacon International College Major Incident an1 Beacon International College Major Incident an
1 Beacon International College Major Incident an
 
1 Beacon International College Major Incident an
1 Beacon International College Major Incident an1 Beacon International College Major Incident an
1 Beacon International College Major Incident an
 

More from SusanaFurman449

Please read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docxPlease read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docx
SusanaFurman449
 
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docxPRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
SusanaFurman449
 
Must Be a hip-hop concert!!!!attend a .docx
Must Be a             hip-hop concert!!!!attend a           .docxMust Be a             hip-hop concert!!!!attend a           .docx
Must Be a hip-hop concert!!!!attend a .docx
SusanaFurman449
 
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docxMini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
SusanaFurman449
 
Please write these 2 assignments in first person.docx
Please write these 2 assignments in                 first person.docxPlease write these 2 assignments in                 first person.docx
Please write these 2 assignments in first person.docx
SusanaFurman449
 
Personal Leadership Training plan AttributesColumbia South.docx
Personal Leadership Training plan  AttributesColumbia South.docxPersonal Leadership Training plan  AttributesColumbia South.docx
Personal Leadership Training plan AttributesColumbia South.docx
SusanaFurman449
 
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docxJung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
SusanaFurman449
 
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docxJournal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
SusanaFurman449
 
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docxLDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
SusanaFurman449
 
Overview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docxOverview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docx
SusanaFurman449
 
Judicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docxJudicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docx
SusanaFurman449
 
IntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docxIntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docx
SusanaFurman449
 

More from SusanaFurman449 (20)

Please read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docxPlease read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docx
 
PLEASE read the question carefully.  The creation of teen ido.docx
PLEASE read the question carefully.  The creation of teen ido.docxPLEASE read the question carefully.  The creation of teen ido.docx
PLEASE read the question carefully.  The creation of teen ido.docx
 
Please reflect on the relationship between faith, personal disciplin.docx
Please reflect on the relationship between faith, personal disciplin.docxPlease reflect on the relationship between faith, personal disciplin.docx
Please reflect on the relationship between faith, personal disciplin.docx
 
Please read the following questions and answer the questions.docx
Please read the following questions and answer the questions.docxPlease read the following questions and answer the questions.docx
Please read the following questions and answer the questions.docx
 
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docxPRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
 
Must Be a hip-hop concert!!!!attend a .docx
Must Be a             hip-hop concert!!!!attend a           .docxMust Be a             hip-hop concert!!!!attend a           .docx
Must Be a hip-hop concert!!!!attend a .docx
 
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docxMini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
 
Please write these 2 assignments in first person.docx
Please write these 2 assignments in                 first person.docxPlease write these 2 assignments in                 first person.docx
Please write these 2 assignments in first person.docx
 
Personal Leadership Training plan AttributesColumbia South.docx
Personal Leadership Training plan  AttributesColumbia South.docxPersonal Leadership Training plan  AttributesColumbia South.docx
Personal Leadership Training plan AttributesColumbia South.docx
 
Need help on researching why women join gangs1.How does anxi.docx
Need help on researching why women join gangs1.How does anxi.docxNeed help on researching why women join gangs1.How does anxi.docx
Need help on researching why women join gangs1.How does anxi.docx
 
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docxJung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
 
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docxJournal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
 
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docxLDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
 
In this paper, you will select an ethics issue from among the topics.docx
In this paper, you will select an ethics issue from among the topics.docxIn this paper, you will select an ethics issue from among the topics.docx
In this paper, you will select an ethics issue from among the topics.docx
 
In the past few weeks, you practiced observation skills by watchin.docx
In the past few weeks, you practiced observation skills by watchin.docxIn the past few weeks, you practiced observation skills by watchin.docx
In the past few weeks, you practiced observation skills by watchin.docx
 
Overview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docxOverview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docx
 
Judicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docxJudicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docx
 
IntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docxIntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docx
 
In studying Social Problems, sociologists (and historians) identify .docx
In studying Social Problems, sociologists (and historians) identify .docxIn studying Social Problems, sociologists (and historians) identify .docx
In studying Social Problems, sociologists (and historians) identify .docx
 
I need help correcting an integrative review.This was the profes.docx
I need help correcting an integrative review.This was the profes.docxI need help correcting an integrative review.This was the profes.docx
I need help correcting an integrative review.This was the profes.docx
 

Recently uploaded

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

HM502Unit 1 Assignment For this assignment, you will create

  • 1. HM502 Unit 1 Assignment For this assignment, you will create a 15-20 slide Microsoft® PowerPoint® presentation to analyze the three routinely used risk assessment methods below: 1. Exercises, scenarios, and game theory — Terrorism Risk Assessment and Management (TRAM) 2. Event-tree model — Biological Threat Risk Assessment (BTRA) 3. Community Preparedness - Thread and Hazards Identification and Risk Assessment (THIRA) The analysis should determine threat, vulnerability, and consequence assessment validity and reliability. It should also identify at least three strengths and three weaknesses for each methodology. The criteria for assessing the methodologies is in the Review of the Department of Homeland Security’s Approach to Risk Analysis. Note: This assignment will require outside research. Use at least two credible sources in addition to the assigned textbook/reading material and discuss how you evaluated the credibility of the resources used. You may consult the Library, the internet, the textbook, other course material, and any other outside resources in supporting your task, using proper citations in APA style. PowerPoint Formatting The PowerPoint presentation should have the following characteristics. · Contains a title and references slide. · Bullets for your main points. · Designed with a live audience in mind in order to inform your viewers about the topic. · Must include speaker notes below the slides to fully explain what is being discussed in the slide bullet points as though you
  • 2. are presenting to an audience. · Research from at least two reliable outside sources in addition to the assigned textbook/reading to support the main message. · Incorporate information from course readings, the course materials, and other library sources to support your discussion. Properly cite all sources of information by including in-text citations and a list of references. · Research and visuals are cited in APA citation format, both in- text and on a References slide. You need to quote material taken directly from a source. · Avoid using images, graphics, or logos that are copyrighted. · The same standards for documenting sources that apply to an essay, apply to a presentation. Refer to the APA Style® Central website for a digital library of APA Style quick guides and tutorials to refine your writing. You can access this site under Academic Tools. Speaker Notes To learn more about creating speaker notes in PowerPoint, review the website below. GCF Learn Free (1998-2020). PowerPoint 2010-Slide Basics: Goodwill Community Foundation, Inc. Retrieved from https://www.gcflearnfree.org/powerpoint2010/slide-basics/6/ Directions for Submitting Your Assignment Compose your presentation in Microsoft PowerPoint and save it with a name you will remember. Be sure to include your name, class, and section number. Submit your assignment by selecting the Unit 1: Assignment Dropbox by the end of Unit 1. Download Unit 1 Assignment Checklist RUBRIC ( Please follow) 1. All of the following is true for each of the three risk assessment methodologies: ● Accurately identifies the primary characteristics of the risk assessment methodology ● Accurately identifies at least three strengths of the risk assessment methodology
  • 3. ● Accurately identifies at least three weaknesses of the risk assessment methodology. 2. All of the following is true for each of the three risk assessment methodologies: ● Analyzes the threat assessment for the risk assessment methodology ● Analyzes the vulnerability assessment for the risk assessment methodology ● Analyzes the reliability and validity of the risk assessment methodology 3. Both of the following are true: ● Includes two credible sources beyond the textbook/assigned reading. ● Discusses the credibility of the outside sources. 4. All of the following are true: ● Uses appropriate PowerPoint format as per assignment instructions. ● Content of the presentation concisely stays focused on the topic. ● Provides 15-20 slides of content, excluding title slide and reference slide. 5. The assignment meets all of the following: ● Clearly written in Standard English. ● Free of spelling, grammar, or punctuation errors. ● References or academic sources as required including in-text citation(s). ● The document is properly formatted in APA style, per the assignment instructions. HM502 Unit 1 DQ (Only has a Topic 2, NO TOPIC #1) Part 1 Topic 2: Risk Assessment Methods (Respond) The Department of Homeland Security (DHS) has enormous responsibilities. The missions of DHS are:
  • 4. 1. Preventing terrorism and enhancing security 2. Securing and managing borders 3. Enforcing and administering immigration laws 4. Safeguarding and securing cyberspace 5. Ensuring resilience to disasters As a result of this broad, expansive, and complex set of missions, the DHS must assess risks from a range of threats to homeland security. Also, in some cases, the DHS shares responsibility with other entities, states, cities, or tribes, for assessing risks and creating plans to prepare for, respond to, and recover from man-made or natural disasters, threats, or hazards. These diverse and multi-faceted risk assessments are used in the process of risk management by decision makers to mitigate these challenges. Unfortunately, there is not just one risk assessment methodology that is or can be employed by all the agenci es within the DHS. Consequently, there are several methodologies currently in use throughout the DHS to varying degrees of effectiveness. Two measures of the effectiveness of these methodologies are their validity and reliability (National Research Council (NRC), 2010). Essentially, do these methodologies assess what you want to assess accurately (valid) and do these methodologies consistently/precisely measure what the assessment intends them to measure (reliable)? After reading about each of the different risk assessment methodologies, what are the strengths and weaknesses of each methodology? What are some of the application and implementation challenges that each method currently faces? As you discuss the various attributes of each risk assessment method, consider the validity and reliability of each method as they relate to the threat, vulnerability, and consequence assessment capabilities of the method. Reference: National Research Council. (2010). Review of the Department of Homeland Security's approach to risk analysis. National
  • 5. Academies Press. Retrieved from http://www.nap.edu/catalog.php?record_id=12972 Part 2 Topic 2: Student Response #1 (Respond to Skyler) Skyler Fry Terrorism Risk Assessment and Management (TRAM) TRAM is a computer program that was developed by FEMA to compare risk against assets within specific geographical boundaries (Stromgren & Ryan, 2008). TRAM identifies and prioritizes upgrades in security, protection, response and recovery in order to minimize the risks associated with a potential threat (Stromgren & Ryan, 2008). A major benefit of TRAM is its availability to various jurisdictions and across the many levels of government. TRAM is focused on future threat analysis and risk associated with facilities rather than populations, therefore, the program is limited as to the extent of effectiveness in regards to population threats (Stromgren & Ryan, 2008). Biological Threat Risk Assessment (BTRA) BTRA is a strategic event tree based program that requires subject matter expert level of understanding to be utilized effectively (National Research Council, 2010). The model used is 17 steps and very information based with "Frequency of initiation by terrorist group, Target selection, Bioagent selection, Mode of dissemination (also determines wet or dry dispersal form), Mode of agent acquisition, Interdiction during acquisition, Location of production and processing, Mode of agent production, Preprocessing and concentration, Drying and processing, Additives, Interdiction during production and processing, Mode of transport and storage, Interdiction during transport and storage, Interdiction during attack, Potential for multiple attacks, and Event detection" all needing to be
  • 6. identified in order to formulate the risk associated with a specific potential event (National Research Council, 2010). The BTRA is best utilized at the upper echelons of government with highest probabilities being shared with potential target areas. BTRA is not as useful for local governments as a biological threat is much less likely when compared to other threats and would distract resources that could be used more efficiently elsewhere. Threat and Hazards Identification and Risk Assessment (THIRA) The THIRA model is the best and most applicable across the board as it doesn't deal with non realistic or low probability threats and hazards but instead focuses on those that are more likely to happen that would challenge the capabilities of a specific jurisdiction. Based on model outcomes, a specific location all the way up to the national level can identify what capabilities will be needed in order to combat or mitigate against possible outcomes (National Research Council, 2010). THIRA is made up of four main components; risks and associated impacts, capability targets, current capabilities, and gaps (FEMA, 2019). The risks and associated impacts component identifies and assesses threats and hazards(FEMA, 2019). The capability targets component utilizes likely impacts to create capability goals in order to combat the potential threat or hazard(FEMA, 2019). The current capabilities component measures the current capabilities compared to needed capabilities based on possible threats and hazards(FEMA, 2019). The gaps component identifies current gaps that would hinder an effective response and assists in development of strategies to close the gaps(FEMA, 2019). National Research Council. (2010) Review of the Department of Homeland Security's Approach to Risk Analysis. Washington, DC: The National Academies Press. https://doi.org/10.17226/12972. FEMA. (2019). 2019 National Threat and Hazard Identification and Risk Assessment (THIRA). Federal Emergency Management
  • 7. Agency. https://www.fema.gov/sites/default/files/2020- 06/fema_national-thira-overview-methodology_2019_0.pdf. Stromgren, C., & Ryan, K. (2008). Introduction to the Terrorism Risk Assessment and Management (TRAM) Methodology. Calhoun. https://calhoun.nps.edu/bitstream/handle/10945/51764/ Stromgren_Ryan_Introduction_to_the_Terrorism_Risk_CIP_Met rics_Tools_2008.pdf?sequence=1&isAllowed=y. Topic 2: Student Response #2 (Respond to Sunday) Sunday Akinwunmi Though risk management does not prevent events from occurring, it does assist the department in focusing on the occurrences of the more destructive events and assisting in the avoidance or mitigation efforts. Risk management produces analysis, which creates a better platform for decision making. The potential perils are identified in terms of their likelihood to occur to assist decision-makers in selecting, implementing, and evaluating risk management alternatives. Different assessment methods, such as TRAM, BTRA, and THIRA, are used to assess and analyse threats, whether they are man-made or naturally occurring (Ezell, et al., 2017). Scholars have criticized these tools because terrorists can adapt to the preventive measures developed, and the terrorist may be focused on maximizing a specific consequence rather than all. TRAM is a model that focuses on determining the threat, capability, and intent of a terrorist attack. TRAM evaluates critical scenarios. The framework of the model uses ratings from various SMs to project the vulnerability and the consequences of a potential threat. As a result, TRAM focuses on identifying the critical infrastructure to be protected, as well as the infrastructure's vulnerability and the consequences of the risk if it occurs. However, the model is untrustworthy due to its complicity, making effective employability and evaluation difficult. TRAM has a number of flaws, including the fact that the analysis process is extremely complex, and that comparing the
  • 8. minimum experience of the SMs on training makes determining the exact target value difficult. Second, the process of developing the criticality of risk assessment factors lacks transparency, which can lead to misleading criticality assessments. Finally, there is the uncertainty of estimating the factors used to calculate venerability. As a result, it is conclusive that TRAM reliability is not certain because its complicity makes it extremely difficult to use effectively while evaluating the model. The model has advantages, such as the outputs being useful in conceptualizing the risk space. Second, it discusses risk mitigation options and how they affect the various ranks, thereby improving cost-benefit analyses. The model also lowers the risk of purchasing because it has the ability to improve security systems in the various organizations that use it. Using BTRA involves employing the logic tree, also known as an event tree model. This assessment tool divides a complex assessment into smaller and simpler segments that can be addressed fully and effectively. There are two methods in the tool: probability, event, and decision trees, as well as fault, attack, and successful trees. Branches and nodes make up probability, event, and decision trees. The limitation of BTRA as a terrorism risk assessment tool, according to Ezell et al. (2010), is the level of uncertainty, incompleteness, and the fact that it is not static. The incompleteness and uncertainty of the data collected make it difficult to develop exact probabilities. For example, a terrorist may plan to produce virus A in order to cause the greatest number of casualties possible because the same virus is optimal for virus B. However, because biological systems are complex, such an attack may fail. Terrorists, being intelligent, examine the US defensive mechanism and adapt to it while developing new attack tactics. Understanding terrorist motivations, intent, and capabilities is the most important strategy for preventing attacks. As a result of the aforementioned flaws, the model is only a snapshot of a specific time period.
  • 9. References James F. Broder, & Gene Tucker. (2012). Risk Analysis and the Security Survey: Vol. 4th ed. Butterworth-Heinemann. Ezell, B., Bennett, S. P., Winterfeldt, D. V., Sokolowski, J., & Collins, A. J. (2017). Probabilistic Risk Analysis and Terrorism Risk. Improving Homeland Security Decisions, 5-31. doi:10.1017/9781316676714.002 CJ513 Unit 1 Assignment Analysis and Application: Essay After completing the assigned readings and Learning Activity, write a 3- to 4-page paper that addresses the following: · Identify the role of three major religions in the development of social and political attitudes on terrorism and discuss at least three different religious sects associated with each. Include a discussion of the unique doctrines or worldviews on terrorism associated with each sect. · How does religion specifically impact the social and political attitudes of the members of each of these sects? · How does religion appear to shape the development of the social and political attitudes on terrorism? For each of your responses, provide examples along with documentation and research that support your assertions and analysis. Provide support for each of your assertions and include specific examples. Please double space your writing. Remember to follow APA guidelines in your writing. Save your work in a Word document. Submit it in the Dropbox. Use at least two credible sources in addition the assigned reading and discuss how you evaluated the credibility of each source. You may consult the Library, the internet, the textbook,
  • 10. other course material, and any other outside resources in supporting your task, using proper citations and references in APA style. Download the Unit 1 Assignment Checklist. Directions for Submitting Your Assignment Compose your essay in Microsoft® Word® and save it with a name you will remember. Be sure to include your name, class, and unit number in your essay. Submit your Assignment by selecting the Unit 1: Assignment Dropbox by the end of Unit 1. 1. All of the following are true: ● Identifies the role of three major religions in the development of social and political attitudes on terrorism ● Discusses at least three different religious sects associated with each religion selected. ● Includes a discussion of the unique doctrines or worldviews on terrorism associated with each sect. ● Addresses how religion specifically impacts the social and political attitudes of the members of each of these sects ● Explains how each religion appears to shape the development of the social and political attitudes on terrorism ● Provides examples along with documentation and research that support assertions and analysis. ● Provides support for each of assertions and includes specific examples. 2. All of the following are true: ● Includes two credible sources beyond the textbook. ● Discusses the credibility of the outside sources. 3. All of the following are true: ● Uses appropriate format as per assignment instructions. ● Content of the paper concisely stays focused on the topic. ● Overall length meets the assignment parameters of 3-4 pages, excluding cover page and reference page.
  • 11. 4. The assignment meets all of the following: ● Clearly written in Standard English. ● Free of spelling, grammar, or punctuation errors. ● References or academic sources as required including in-text citation(s). ● The document is properly formatted in APA style, per the assignment instructions. CJ513 Unit 1 DQ Discussion topics support this unit’s objectives and should be completed after reading all materials (No Less than 100 words). Your responses should include original evaluation, synthesis, or analysis of the topic and contribute to the weekly Discussion in a meaningful way. Refer to the Discussion Board Rubric in Course Documents for additional requirements. Part 1 Topic #1: The Role of Religion (Respond) Discuss the role of religion in the development of social and political attitudes on terrorism. Identify three examples of terrorist incidents motivated by religious beliefs. Discuss the ideology used to justify each of these incidents. Where do each of these attitudes fall on the classical ideological continuum? Be sure to include APA citations and references for any sources used to inform or support your posts. Part 2 Topic #1 Student Response #1(Respond to Damon) Damon Bradshaw Religion is a significant factor in influencing different attitudes leading to terrorism. Extremist ideologies that are religious in the description are the leading cause of acts of terrorism. Different religions have been caught up with acts of terrorism that are majorly due to radicalization (Rodger et al., 2007). Terrorists influenced by religious views feel they have a role to play in society by accomplishing their act, where their religion
  • 12. allegedly justifies. Religion has different influences socially and politically, and these are critical elements in society— wrong perceptions and manipulations advocate for the same influences to be channeled into terrorism. On September 21, 2013, a terrorist attack was reported in a mall Nairobi, Kenya, with Al-Shabaab, a Somalia-based extremist group taking responsibility. The act was a retaliation to the Kenyan military forces’ presence in Somalia, and they believe it is their duty in the Holy war. There are conflicting reports on the death toll, but the attack resulted in hostages, mass shootings, and damages, with 71 reported deaths (Blanchard, 2013). The attack strategically targeted an entity that would strike a blow and not involve fellow Muslims but rather more of foreigners and other religious groups. Al-Shabaab is a group influenced by religion's role in the development of social and political attitudes towards terrorism. The extremist group follows a social way of life guided by Sharia laws, not the nation's constitution. Politically the group feels they are obligated to liberate the nation to a Sharia rule state, resulting in conflicts with the national government, with a spillover to neighboring countries like Kenya that sent its troops to Somalia to bring peace and extend security to its borders, something the militia term as an invasion from infidels or the non-believers and unclean (Anderson & McKnight, 2015). Their actions in this particular day were based on religious extremism. September 11, 2001, popularly known as 9/11, was a terror event influenced by religious affiliation on a specific group. The terror event was a series of attacks on American soil by an extremist group known Al Qaeda. The group planned attacks by 19 of their militants. They hijacked four airplanes and embarked on a suicide mission. The first two airplanes were directed at the World Trade Center at the Twin Towers in New York. Another plane crashed into the Pentagon, and the last one crashed in a field in Pennsylvania (Gus, 2010). The attacks led to a death toll estimated at 3000. The group took responsibility
  • 13. through their leader Osama Bin Laden, advocating for the invasion of western powers to the Middle East. The 9/11 attack was an example of a classical ideological continuum involving terrorism and extremism as the root source. The two aspects are clearly influenced by religious affiliation playing out in the social and political structures i n the Middle East. The Al Qaeda extremist group advocate for the Jihadi war, which refers to a Holy war in other terms. The involvement of United States troops in the Middle East brought about the campaign against non-Muslim believers meddling with the political state. The extremist group beliefs they are at war with any allies to Jewish, Christianity affiliations (Gus, 2010). It brings about the ideology that anyone not of Muslim belief is against them, and actions against them will bring a particular reward in the afterlife. These beliefs and actions influenced the rise of different extremist groups under the Al Qaeda Islamic extremist group. On July 22, 2011, Norway experienced terrorist attacks in Oslo and the island of Utoya. The bombing attack was strategically placed near governmental offices. The police responded to the terrorist attack. It was realized the terrorist used the bombing as a decoy while another attack took place at the island of Utoya where some youths were camping (Meyer, 2013). The terrorist opened fire on the campers with nowhere to escape on the island. The gunman massacred 68 people on the island, and a total count was 80 people in addition to the bombing. The gunman was a member of Neo-Nazi and Anti-Islamic groups, according to police investigations. The perpetrator published a manifesto listing the reasons and the changes he demanded. The root cause influence by the hatred towards the Muslim religion and any Jewish affiliation. This motive radicalized and influenced his actions. It was a clear classical continuum of terrorism. The gunman raised an issue with the Norwegian government allowing cultural mix, significantly increasing Muslims within the nation. The gunman identified himself as a martyr. His hate towards Muslims and Jews
  • 14. influenced a fascist ideology that led him into a Neo-Nazi affiliation mission. References Anderson, D., & McKnight, J. (2015). Understanding al- Shabaab: clan, Islam and insurgency in Kenya. Journal Of Eastern African Studies, 9(3), 536- 557. https://doi.org/10.1080/17531055.2015.1082254 Blanchard, L. (2013). The September 2013 Terrorist Attack in Kenya: In Brief. Fas.org. Retrieved 5 August 2021, from https://fas.org/sgp/crs/row/R43245.pdf. Gus, M. (2010). Terrorism and homeland security. California, Cal: Sage Publications. Meyer, S. (2013). Impeding lone-wolf attacks: lessons derived from the 2011 Norway attacks. Crime Science, 2(1), 1- 13. https://doi.org/10.1186/2193-7680-2-7 Rogers, M., Loewenthal, K., Lewis, C., Amlôt, R., Cinnirella, M., & Ansari, H. (2007). The role of religious fundamentalism in terrorist violence: A social psychological analysis. International Review of Psychiatry, 19(3), 253- 262. https://doi.org/10.1080/09540260701349399 Topic #1 Student Response #2 (Respond to Travis) Travis Reed Hello Y’all Religion is often a big contributor towards the development of various political and social attitudes towards terrorism. Religion influences social and political injustices which lead to terrorism (Borum, & Neer, 2017). As people try to adhere to accepted religious ideology or rather what they perceive as political or social right, and then another religious ideology strips them of their rights, an attitude of violence may arise (Borum, & Neer, 2017). This comes in because of the belief that the use or threat of violence will be effective in ushering in change. Many terrorists have confessed that they chose violence after a long consideration because they felt that
  • 15. they had no choice. Christmas day bombings at Madall, Gadaka, and Jos churches in Northern Nigeria by the Boko Haram is an example of a terrorist attack motivated by Islamic religious beliefs. The ideology behind these killings by Boko Haram group was that it was on mission to kill those against the Islamic associated group. This incidence was a clear manifestation of right–wing extremism because the Boko Haram felt like their glory to the Muslim belief had been lost to Christianity (Crossen, 2019). In another incidence in Garissa University College in Kenya, 148 people were killed by gunmen from Al-Shabaab group. The group held hostage more than 700 people but released the Muslims and killed those who identified as Christians. The mission was carried out to kill those against Shabaab, for reasons of removing Kenyan troops deployed in Somalia, and to claim the Muslim land which had been ‘colonized’ by non- Muslims. These shootings were an expression of both right- wing extremism and left-wing extremism because killings were done due to an oppressive system and religious inferiority. In 2017, a suicide bomber of Islamist extremist origin attacked Manchester Arena in UK, killing 22 people and injuring 1017 others. The attacker claimed he was motivated by injustices to Muslim children which makes it a case of right-wing extremism. v/r Reed References Borum, R., & Neer, T. (2017). Terrorism and violent extremism. In Handbook of behavioral criminology (pp. 729-745). Springer, Cham. Crossen, C. E. (2019). The Nature of the Beast: Transformations of the Werewolf from the 1970s to the Twenty-first Century. University of Wales Press.