Criminal Justice

Running head: CRIMINAL JUSTICE 1
Criminal Justice
Name:
Institutional Affiliation:
CRIMINAL JUSTICE 2
Criminal Justice
Evaluation
Based on the research, it complies with the following aspects of the checklist. The
research question serves as a logical extension of the purpose of the study that is the creation of
awareness regarding cyber-terrorism. Also, it reflects the best question, since an analysis of the
technological levels in Saudi Arabia equips it to handle the cyber threat (Alqahtani, 2014).
Moreover, the research seeks to compares its technological status with other countries, thus
comparison study is the most appropriate mechanism. The research questions follow the
methodology appropriate in the data collection since if inquires about abstract data. Furthermore,
it relates the central question to the qualitative approach because the variables of interests
identified from the title of the study (Alqahtani, 2014). However, it fails to observe the
utilization of non-directional language and does not specify the participants.
Research design
The research uses Grounded Theory Method (GTM) as the qualitative approach to fulfill
the expectations of the study. The method utilizes a combination of systematic and inductive
techniques and comparison study to formulate a theory based on the empirical evidence collected
from the research process (Alqahtani, 2014). The researcher implements the approach through
the selection of the appropriate participants and analysis of the results. Moreover, the alternating
collection and analysis of data promotes the development of a theory based on the research
design. Additionally, it uses purposive sampling in the selection of the participants (Alqahtani,
2014). The method ensures that the respondents provide data that will facilitate the answering of
the research questions.
CRIMINAL JUSTICE 3
Analysis of alignment
The research manifests an alignment of the conceptual framework, problem, and purpose.
The theoretical framework utilizes secondary data from security experts to help improve
awareness in Saudi Arabia regarding the threat that cyber terrorism posses to the prosperity of
the region (Alqahtani, 2014). It confers with the research design since the purpose of the study is
to generate awareness (abstract quality) about the impending challenges that cyber-terrorism
pose.
CRIMINAL JUSTICE 4
References
Alqahtani, A. (2014). Awareness of the Potential Threat of Cyber-Terrorism to the National
Security. Journal of Information Security, 5(4), 137-146.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.