A Case Study on the Factors of Biometric Counterterrorism Policies as a Result of September 11, 2001

Authors

  • Sharon Liu McDowell High School
  • Robert Hodgson Millcreek Township School District - McDowell High School

DOI:

https://doi.org/10.47611/jsrhs.v9i2.1124

Keywords:

biometrics, 9/11, case study, counterterrorism, factors

Abstract

Biometrics has emerged as a rapidly moving technology that has been continuously evolving and improving. It has even been incorporated as a form of counterterrorism, preventing incidents of terrorism as well as providing safety measures. While various researchers have analyzed the effectiveness of biometric counterterrorism measures, the factors behind the reasonings of those decision making process of implementation have been untouched. This paper looks to analyze the factors through a case study on the events of September 11, 2001, using a qualitative thematic analysis to identify the factors. It is important to note that rather than analyzing secondhand sources, this study will analyze first hand sources throughout the study. Through this study, it can be concluded that there are five main factors behind implementation of biometric counterterrorism policies: ensuring safety if a terrorist incident were to happen, increasing security to prevent the incident from occurring, public sentiment, potential to become in the future, and current effectivity.

Downloads

Download data is not yet available.

References or Bibliography

Bardach-Yalov, Elina. "Analyzing Russian propaganda: Application of Siegfried Kracauer’s qualitative content analysis method." Journal of Information Warfare 11.2 (2012): 24-36.

Bowen, G. A. (2009). Document analysis as a qualitative research method. Qualitative research journal, 9(2), 27.

Carey, J. W., Morgan, M., & Oxtoby, M. J. (1996). Intercoder agreement in analysis of responses to open-ended interview questions: Examples from tuberculosis research. CAM Journal, 8(3), 1-5.

Crane, M. A., Levy-Carrick, N. C., Crowley, L., Barnhart, S., Dudas, M., Onuoha, U., ... & Ozbay, F. (2014). The response to September 11: a disaster case study. Annals of global health, 80(4), 320-331.

Garson, G. D. (2002). Case study research in public administration and public policy: Standards and strategies. Journal of Public Affairs Education, 8(3), 209-216.

Grbich, Carol. (2013). "Qualitative Data Analysis" (2nd ed.). The Flinders University of South Australia: SAGE Publications Ltd.

Guest, Greg; MacQueen, Kathleen; Namey, Emily (2012). Applied thematic analysis. Thousand Oaks, California: SAGE Publications. p. 11.

Hall, T. H., & Ross, A. A. (2015). Affective politics after 9/11. International Organization, 69(4), 847-879.

Huddy, L., Feldman, S., Taber, C., & Lahav, G. (2005). Threat, anxiety, and support of antiterrorism policies. American journal of political science, 49(3), 593-608.

Jain, A. K., Nandakumar, K., & Ross, A. (2016). 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern Recognition Letters, 79, 80-105.

Kairinos, N. (2019). The integration of biometrics and AI. Biometric Technology Today, 2019(5), 8-10.

Kalaiselvi, S., UniversityKaraikudi, A., India, T., Jothi, R. A., India, T., & Palanisamy, V. (2018). Biometric Security with Iris Recognition Techniques: A Review. International Journal of Pure and Applied Mathematics, 118(8), 567-572.

Koh, W. T. (2007). Terrorism and its impact on economic growth and technological innovation. Technological Forecasting and Social Change, 74(2), 129-138.

Lukyamuzi, L., McKenzie, S., Parks, C., & Smith, T. (2019). A Brief Look into Biometrics and One Use in Higher Education paragraphs 3-4

MacCallum, R. C., Widaman, K. F., Zhang, S., & Hong, S. (1999). Sample size in factor analysis. Psychological methods, 4(1), 84.

Morgan, D., & Krouse, W. (2005, February). Biometric identifiers and border security: 9/11 Commission recommendations and related issues. LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE.

Muhlhausen, David B., and Jena Baker McNeill. Terror trends: 40 years' data on international and domestic terrorism. Heritage Foundation, 2011.

Nacos, B. L., Bloch-Elkon, Y., & Shapiro, R. Y. (2007). Post-9/11 terrorism threats, news coverage, and public perceptions in the United States. International Journal of Conflict and Violence (IJCV), 1(2), 105-126.

Technikgestaltung, P. (2004). Biometric Identity Cards: Technical, Legal, and Policy Issues. In ISSE 2004—Securing Electronic Business Processes: Highlights Of The Information Security Solutions Europe 2004 Conference (p. 47). Springer Science & Business Media.

Vaismoradi, M., Turunen, H., & Bondas, T. (2013). Content analysis and thematic analysis: Implications for conducting a qualitative descriptive study. Nursing & health sciences, 15(3), 398-405.

Walls, E. (2017). Waves of Modern Terrorism: Examining the Past and Predicting the Future (Doctoral dissertation, Georgetown University).

Zucker, D. M. (2009). How to do case study research. School of nursing faculty publication series, 2.

Published

11-20-2020

How to Cite

Liu, S., & Hodgson, R. (2020). A Case Study on the Factors of Biometric Counterterrorism Policies as a Result of September 11, 2001. Journal of Student Research, 9(2). https://doi.org/10.47611/jsrhs.v9i2.1124

Issue

Section

AP Capstone™ Research