Verified Document

Business Research Denial Of Security Clearance: An Essay

Business Research Denial of Security Clearance: An Examination and Application of Real World Business Statistics

The purpose of this research is to identify the factors most relevant to decisions involving access to classified information and the denial of such security clearance. From an analysis of the commonly cited reasons for such denials, which range in official reports from sexual misconduct to the equally ambiguous and somehow more intriguing issue of "financial considerations," to acquiring specific information regarding the circumstances and considerations involved in particular incidents of either clearance approval or denial, this research would aim to develop an understanding of who might be granted clearance and who would be denied such clearance and access (Dice 2011). A broad and accurate understanding of current security clearance procedures and rationales would hopefully be developed as the ultimate objective and conclusion of the data analysis conducted in this research.

This research problem is highly important for several reasons, not the least of which is greater transparency in how the government keeps secrets. Several high profile incidents involving the unauthorized release of classified information have occurred in the past several years, and there is an...

Parts of this document are hidden

View Full Document
svg-one

This research could potentially identify areas in which extra exposure to unauthorized use or distribution of classified information could occur, with implications on national security.
Research Hypothesis

Substantial amounts of data regarding the official reasons for the denial of security clearance at various levels of classification already exists, demonstrating potential trends simply from a cursory examination of the raw data (Dice 2011). Financial considerations are cited in more than half of all denials of security clearance, with personal conduct a distant though still proportionately quite large second place (Dice 2011). This does not necessarily imply as conservative and careful a policy as might be hoped for or at first glance be observed, but rather demonstrates the potential possibility that decisions of security clearance or denial are made for factors other than those that actually account for, address, and mitigate the risks to classified information and its misuse or unauthorized distribution. It is the hypothesis of this author that the research will reveal that in granting or denying security…

Sources used in this document:
References

Dice. (2011). Top reasons for security clearance denial. Accessed 21 February 2011.

http://www.clearancejobs.com/news.php?articleID=65
Cite this Document:
Copy Bibliography Citation

Related Documents

Metrics Implementation and Enforcement Security Governance
Words: 2896 Length: 10 Document Type: Research Paper

Metrics, Implementation, and Enforcement (Security Governance) How can you determine whether there has been a malware outbreak? The threat situation today has become more dangerous than in the past. Security and safety threats have been increasing in an alarming rate; there are more than 70,000 brand new bits of malware recognized daily. Well-funded cybercriminals have been currently making advanced malware that has been made to bypass present security options by launching prior

Development and Education of Security Management
Words: 765 Length: 3 Document Type: Essay

Security Management 1. While some people may be better leaders than others, all people can lead and all people can learn to lead better. Discuss some ideas of how leadership skills may be improved. Development and education Leaders need to develop in their position. Owing to managerial tasks’ knowledge-based nature, the word “development” has been used to describe the continuous growth in skills and cognition of executives and managers. Managerial development is promoted

Initiatives Require Bold Solutions, and
Words: 10456 Length: 38 Document Type: Capstone Project

The following diagram represents the structure of the idea. Figure 2. Project flow pursuant to Plan Abu Dhabi 2030: Urban Structure Framework Plan Objectives of the Study The overarching objective of this study is to build a solid portfolio management application that connects all the local governments of Abu Dhabi emirates in ways that will allow them to collaborate on various projects pursuant to Plan Abu Dhabi 2030 through one unified system

Pony Botnet
Words: 1534 Length: 5 Document Type: Research Paper

Pony Botnet attack. Details about the attack, resolutions, and concerned parties will be studied. Background/Hacking Botnets can be loosely described as a collection of interconnected compromised devices, known as 'zombies', synchronously working with compromised devices to execute malicious tasks. Zombies are not self-directed like internet worms; they need proper direction to carry out a particular function. Zombies can be transmitted by a variety of channels for instance, an Internet Relay Chat

Air Traffic
Words: 28110 Length: 102 Document Type: Thesis

Air traffic has continued to increase and it now constitutes a considerable proportion of the travelling public. The amount of long-hour flights has increased significantly. Based on the International Civil Aviation authority, air traffic can be anticipated to double amid till 2020. Airline travel, especially over longer distances, makes air travelers vulnerable to numerous facets that will impact their health and well-being. Particularly, the speed with which influenza spreads and

History of Cyber Crimes
Words: 1827 Length: 5 Document Type: Essay

Cybercrime, Cybercriminals, And Cybercops Cybercrime Cybercrime has long been perceived to represent new crimes arising from the emergence of technological advancement, but an examination of the history of cybercrime reveal that its roots are as ancient as the crimes of fraud, harassment, and malicious property damage. The history of cybercrime is reviewed briefly here, as are the challenges faced by law enforcement efforts to curb cybercrime. Some gains have been realized, such

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now