Business Research Denial Of Security Clearance: An Essay

Business Research Denial of Security Clearance: An Examination and Application of Real World Business Statistics

The purpose of this research is to identify the factors most relevant to decisions involving access to classified information and the denial of such security clearance. From an analysis of the commonly cited reasons for such denials, which range in official reports from sexual misconduct to the equally ambiguous and somehow more intriguing issue of "financial considerations," to acquiring specific information regarding the circumstances and considerations involved in particular incidents of either clearance approval or denial, this research would aim to develop an understanding of who might be granted clearance and who would be denied such clearance and access (Dice 2011). A broad and accurate understanding of current security clearance procedures and rationales would hopefully be developed as the ultimate objective and conclusion of the data analysis conducted in this research.

This research problem is highly important for several reasons, not the least of which is greater transparency in how the government keeps secrets. Several high profile incidents involving the unauthorized release of classified information have occurred in the past several years, and there is an...

...

This research could potentially identify areas in which extra exposure to unauthorized use or distribution of classified information could occur, with implications on national security.
Research Hypothesis

Substantial amounts of data regarding the official reasons for the denial of security clearance at various levels of classification already exists, demonstrating potential trends simply from a cursory examination of the raw data (Dice 2011). Financial considerations are cited in more than half of all denials of security clearance, with personal conduct a distant though still proportionately quite large second place (Dice 2011). This does not necessarily imply as conservative and careful a policy as might be hoped for or at first glance be observed, but rather demonstrates the potential possibility that decisions of security clearance or denial are made for factors other than those that actually account for, address, and mitigate the risks to classified information and its misuse or unauthorized distribution. It is the hypothesis of this author that the research will reveal that in granting or denying security…

Sources Used in Documents:

References

Dice. (2011). Top reasons for security clearance denial. Accessed 21 February 2011.

http://www.clearancejobs.com/news.php?articleID=65


Cite this Document:

"Business Research Denial Of Security Clearance An" (2011, February 22) Retrieved May 8, 2024, from
https://www.paperdue.com/essay/business-research-denial-of-security-clearance-49798

"Business Research Denial Of Security Clearance An" 22 February 2011. Web.8 May. 2024. <
https://www.paperdue.com/essay/business-research-denial-of-security-clearance-49798>

"Business Research Denial Of Security Clearance An", 22 February 2011, Accessed.8 May. 2024,
https://www.paperdue.com/essay/business-research-denial-of-security-clearance-49798

Related Documents

Metrics, Implementation, and Enforcement (Security Governance) How can you determine whether there has been a malware outbreak? The threat situation today has become more dangerous than in the past. Security and safety threats have been increasing in an alarming rate; there are more than 70,000 brand new bits of malware recognized daily. Well-funded cybercriminals have been currently making advanced malware that has been made to bypass present security options by launching prior

Security Management 1. While some people may be better leaders than others, all people can lead and all people can learn to lead better. Discuss some ideas of how leadership skills may be improved. Development and education Leaders need to develop in their position. Owing to managerial tasks’ knowledge-based nature, the word “development” has been used to describe the continuous growth in skills and cognition of executives and managers. Managerial development is promoted

The following diagram represents the structure of the idea. Figure 2. Project flow pursuant to Plan Abu Dhabi 2030: Urban Structure Framework Plan Objectives of the Study The overarching objective of this study is to build a solid portfolio management application that connects all the local governments of Abu Dhabi emirates in ways that will allow them to collaborate on various projects pursuant to Plan Abu Dhabi 2030 through one unified system

Pony Botnet
PAGES 5 WORDS 1534

Pony Botnet attack. Details about the attack, resolutions, and concerned parties will be studied. Background/Hacking Botnets can be loosely described as a collection of interconnected compromised devices, known as 'zombies', synchronously working with compromised devices to execute malicious tasks. Zombies are not self-directed like internet worms; they need proper direction to carry out a particular function. Zombies can be transmitted by a variety of channels for instance, an Internet Relay Chat

Air Traffic
PAGES 102 WORDS 28110

Air traffic has continued to increase and it now constitutes a considerable proportion of the travelling public. The amount of long-hour flights has increased significantly. Based on the International Civil Aviation authority, air traffic can be anticipated to double amid till 2020. Airline travel, especially over longer distances, makes air travelers vulnerable to numerous facets that will impact their health and well-being. Particularly, the speed with which influenza spreads and

History of Cyber Crimes
PAGES 5 WORDS 1827

Cybercrime, Cybercriminals, And Cybercops Cybercrime Cybercrime has long been perceived to represent new crimes arising from the emergence of technological advancement, but an examination of the history of cybercrime reveal that its roots are as ancient as the crimes of fraud, harassment, and malicious property damage. The history of cybercrime is reviewed briefly here, as are the challenges faced by law enforcement efforts to curb cybercrime. Some gains have been realized, such