A Case Study on the Factors of Biometric Counterterrorism Policies as a Result of September 11, 2001
DOI:
https://doi.org/10.47611/jsrhs.v9i2.1124Keywords:
biometrics, 9/11, case study, counterterrorism, factorsAbstract
Biometrics has emerged as a rapidly moving technology that has been continuously evolving and improving. It has even been incorporated as a form of counterterrorism, preventing incidents of terrorism as well as providing safety measures. While various researchers have analyzed the effectiveness of biometric counterterrorism measures, the factors behind the reasonings of those decision making process of implementation have been untouched. This paper looks to analyze the factors through a case study on the events of September 11, 2001, using a qualitative thematic analysis to identify the factors. It is important to note that rather than analyzing secondhand sources, this study will analyze first hand sources throughout the study. Through this study, it can be concluded that there are five main factors behind implementation of biometric counterterrorism policies: ensuring safety if a terrorist incident were to happen, increasing security to prevent the incident from occurring, public sentiment, potential to become in the future, and current effectivity.
Downloads
References or Bibliography
Bardach-Yalov, Elina. "Analyzing Russian propaganda: Application of Siegfried Kracauer’s qualitative content analysis method." Journal of Information Warfare 11.2 (2012): 24-36.
Bowen, G. A. (2009). Document analysis as a qualitative research method. Qualitative research journal, 9(2), 27.
Carey, J. W., Morgan, M., & Oxtoby, M. J. (1996). Intercoder agreement in analysis of responses to open-ended interview questions: Examples from tuberculosis research. CAM Journal, 8(3), 1-5.
Crane, M. A., Levy-Carrick, N. C., Crowley, L., Barnhart, S., Dudas, M., Onuoha, U., ... & Ozbay, F. (2014). The response to September 11: a disaster case study. Annals of global health, 80(4), 320-331.
Garson, G. D. (2002). Case study research in public administration and public policy: Standards and strategies. Journal of Public Affairs Education, 8(3), 209-216.
Grbich, Carol. (2013). "Qualitative Data Analysis" (2nd ed.). The Flinders University of South Australia: SAGE Publications Ltd.
Guest, Greg; MacQueen, Kathleen; Namey, Emily (2012). Applied thematic analysis. Thousand Oaks, California: SAGE Publications. p. 11.
Hall, T. H., & Ross, A. A. (2015). Affective politics after 9/11. International Organization, 69(4), 847-879.
Huddy, L., Feldman, S., Taber, C., & Lahav, G. (2005). Threat, anxiety, and support of antiterrorism policies. American journal of political science, 49(3), 593-608.
Jain, A. K., Nandakumar, K., & Ross, A. (2016). 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern Recognition Letters, 79, 80-105.
Kairinos, N. (2019). The integration of biometrics and AI. Biometric Technology Today, 2019(5), 8-10.
Kalaiselvi, S., UniversityKaraikudi, A., India, T., Jothi, R. A., India, T., & Palanisamy, V. (2018). Biometric Security with Iris Recognition Techniques: A Review. International Journal of Pure and Applied Mathematics, 118(8), 567-572.
Koh, W. T. (2007). Terrorism and its impact on economic growth and technological innovation. Technological Forecasting and Social Change, 74(2), 129-138.
Lukyamuzi, L., McKenzie, S., Parks, C., & Smith, T. (2019). A Brief Look into Biometrics and One Use in Higher Education paragraphs 3-4
MacCallum, R. C., Widaman, K. F., Zhang, S., & Hong, S. (1999). Sample size in factor analysis. Psychological methods, 4(1), 84.
Morgan, D., & Krouse, W. (2005, February). Biometric identifiers and border security: 9/11 Commission recommendations and related issues. LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE.
Muhlhausen, David B., and Jena Baker McNeill. Terror trends: 40 years' data on international and domestic terrorism. Heritage Foundation, 2011.
Nacos, B. L., Bloch-Elkon, Y., & Shapiro, R. Y. (2007). Post-9/11 terrorism threats, news coverage, and public perceptions in the United States. International Journal of Conflict and Violence (IJCV), 1(2), 105-126.
Technikgestaltung, P. (2004). Biometric Identity Cards: Technical, Legal, and Policy Issues. In ISSE 2004—Securing Electronic Business Processes: Highlights Of The Information Security Solutions Europe 2004 Conference (p. 47). Springer Science & Business Media.
Vaismoradi, M., Turunen, H., & Bondas, T. (2013). Content analysis and thematic analysis: Implications for conducting a qualitative descriptive study. Nursing & health sciences, 15(3), 398-405.
Walls, E. (2017). Waves of Modern Terrorism: Examining the Past and Predicting the Future (Doctoral dissertation, Georgetown University).
Zucker, D. M. (2009). How to do case study research. School of nursing faculty publication series, 2.
Published
How to Cite
Issue
Section
Copyright (c) 2020 Sharon Liu; Robert Hodgson
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.