Public policy making

15- to 18-page Final Project, you should include the following:

Executive Summary: Describe the public policy problem of interest to you, the scope of the problem, and a capsule summary of your recommended course of action. (1–2 paragraphs)

The public policy problem to be analyzed concerns the issue of privacy and whether the government should have the right to intrude on privacy to protect the country. This policy issue has been heightened in the wake of the Edward Snowden intelligence leak case which exposed some of the surveillance operations by the government of which the public, hitherto, was unaware.

Introduction and Problem Definition: Explain why the problem is important. Why should the decision-maker care about this issue? (1–2 pages)

Issue Analysis: Explain in detail, supported by scholarly resources, the scope of the public policy problem. You should describe the stakeholders (e.g., branches of government, interest groups, nonprofit organizations, media, the bureaucracy, etc.) connected to the problem. (3–4 pages)

Proposed Solutions: You are not expected to detail every possible approach to the issue you selected. However, based on your research, select 3 or 4 potential solutions that directly address the public policy problem you selected. It is important that you explain which stakeholders would be proponents and which would be opponents of each policy alternative you identify, and why, and the implications of their being for or against the alternative(s). You should make clear to the decision-maker the complexities involved with each proposed solution you analyze. (7–8 pages)

Policy Recommendation: Choose one of the alternatives to the public policy problem you selected and explain, based on scholarly materials you have examined, why it t is best suited to address the problem. Be sure to address opportunities and challenges of implementing your recommendation given any relevant political, social, economic, or cultural considerations. Additionally, explain what, if any, social justice and/or ethical issues are impacted by your recommended policy alternative. (3–4 pages)

You are expected to support your arguments and perspectives with citations in APA format. Approximately 5–10 scholarly resources, at a minimum, should be referenced within the Final Project.

Resources to inform and support recommendations are as follows:

1.  Anderson, J. E. (2015). Public policy making: An introduction (8th ed.). Stamford, CT: Cengage Learning.

2.  Bardach, E., & Patashnik, E. M. (2016). A practical guide for policy analysis: The eightfold path to more effective problem solving (5th ed.).Thousand Oaks, CA: CQ Press.

3.  Laureate Education. (2014). Agenda setting [Video file].

4.  Walsh, P. F., & Miller, S. (2015). Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post-Snowden. Intelligence and National Security, Vol. 31, No. 3, 345–368.

5.  Berman, J., & Flint, L. (2003). Guiding lights: Intelligence oversight and control for the challenge of terrorism. Criminal Justice Ethics, 22(1), 2.

6.  Haglund, D. G. (2003). North American cooperation in an era of homeland security. Orbis, 47(4), 675–691.

7.  Seifert, J. W., & Relyea, H. C. (2004). Do you know where your information is in the homeland security era? Government Information Quarterly, 21(4), 399–405.

8.  Sutherland, D. W. (2005). Homeland security and civil liberties: Preserving America’s way of life. Notre Dame Journal of Law, Ethics & Public Policy.

9.  Yen, J. (2004). Emerging technologies for homeland security.Communications of the ACM, 47(3), 32–35.

10.  Byman, D. (2007). US counter-terrorism options: A taxonomy. Survival, 49(3), 121–150.

My chosen recommendation to the decision maker is that the despite privacy being fundamental rights of all citizens, as prescribed by the U. S. Constitution, the government also has the legal responsibility to protect the lives and property. In providing this protection, the government has to use all necessary means to track and apprehend perpetrators, even if it means monitoring those things- such as the internet, mobile communications, etc. – that are for the benefit of good meaning citizens which are being used to cause chaos as well. However, the government should make people aware of the extra length that it will go to provide this protection and why it is going that route.