it need to write with in this source
Topic: My research agenda will focus on the border security in Texas.
Sources:
1. Koskela, Hille. ” Did You Spot an Alien? Voluntary Vigilance, Borderwork and the TexasVirtual Border Watch Program.” Space & Polity Vol. 14 Issue 2 Aug2010 p103-121. 19p. 1 Chart. DCCCD libraries. Web. 14 Oct 2015.
2. Robbins, Hannah. “HOLDING THE LINE: CUSTOMS AND BORDER PROTECTION’S EXPANSION OF THE BORDER SEARCH EXCEPTION AND THE ENSUING DESTRUCTION OF INTERIOR FOURTH AMENDMENT RIGHTS.” Vol. 36 Issue 6 February 10, 2014: p2247-2282. 36p. DCCCD libraries. Web. 14 Oct 2015.
3. Spradley, M. Katherine. “TOWARD ESTIMATING GEOGRAPHIC ORIGIN OF MIGRANT REMAINS ALONG THE UNITED STATES-MEXICO BORDER.” Vol. 38 Issue 1 May2014 May2014 p101-110. 10p. DCCCD libraries. Web. 14 Oct 2015.
Project Guidelines
Introduction
This activity is an opportunity for you to closely examine a contemporary policy issue facing the state of Texas. Over its history, the Texas government has had many conflicts with the national government as part of the dynamics in a federal system of governance. These disputes have heated up in recent years, and include immigration policy, education policy, environmental policy, social welfare policy and many others issues. Select one of personal interest and objectively outline the nature of the dispute. This will allow you to work towards finding a solution.
Take into consideration constitutional/legal issues along with political, economic and cultural differences. Look at the history underlying the dispute, how it is playing out within the governing institutions, and how it may be resolved. It is strongly suggested that you use the library database at the start of the semester to begin researching a topic. This assignment requires carefully planning throughout the semester. Refer to the course calendar for the specific due date. The final draft is to be submitted via the submission guidelines identified by the instructor.
The grading standards used to assess the quality of your work for this policy paper will be detailed in a grading rubric, which will be provided during the semester. Completing this activity is a mandatory component of this course. It serves as the standard course assessment for all GOVT 2306 students. Failure to submit this project in its entirety will result in a failing grade for the course.
There are four steps to completing this project:
Step 1: Identify the issue and how the policies of both the US government and Texas government have been addressing it historically.
Step 2: Conduct research to locate three (3) peer-reviewed articles published in an academic journal (aka: scholarly sources) using the following criteria:
The article must be less than ten years old and a minimum of five pages in length.
Carefully choose those works that provide a variety of perspectives on the topic.
For current events information relevant to your topic, you may use newspaper articles, magazine articles, government publications and other reliable sources as “supplemental sources.” That is, in addition to the 3 scholarly sources.
Textbooks, Dictionaries, Encyclopedias (including Wikipedia), Almanacs, or an Atlas are reference materials and should not be listed in any works cited page on the collegiate level.
Properly document your sources in your memo and on a works cited page.
Step 3: Submit a proposal in the appropriate dropbox in Unit I by October 15th at 11:55 pm. Identify your topic and present a bibliography listing the 3 primary sources. Failure to submit an acceptable proposal by the deadline will result in the assignment being incomplete.
Step 4: Prepare a formal policy report that is a minimum of 800 of your own words (excluding cited text), which must include the following:
A statement of the current policy
Reasons for initiating changes
Policy options to be considered
Pros and cons of each option
Recommended course of action
Reasoning for selecting that course of action
For a custom paper on the above topic, place your order now!
What We Offer:
• On-time delivery guarantee
• PhD-level writers
• Automatic plagiarism check
• 100% money-back guarantee
• 100% Privacy and Confidentiality
You May Also Like This:
- W1 Replies – Cross border commerce: With biblical worldview application
- The Enterprise Information Security Policy
- Information Security Policy
- Researching Social Issues Related to the Literature
- Legal Challenges for Private Security
- Informative Essay
- The Human Mindset and how it creates our Reality
- computer security
- Implementing Network and Personnel Security Measures
- Analysis and the current status of security logins to DAMTSC
- Youth Gang Violence
- SQL Security and High Availability
- Security Policy
- Economics for Business 2
- Public Policy Problem
- Designing infrastructure and security protocols.
- social justice
- EnerGuide Rating System Program
- Security and Risk Management
- Homeland Security
- supporting homeland security efforts
- Fiction Project
- Communication Policy
- Course Project: Community Advocacy Project—Local Government
- CAPSTONE
- How can organizations develop confidence in the security of their networked systems when they have the capability to open their systems to almost any network?
- Security and Privacy Implications of the HITECH Act
- contemporary global security agenda in relation to major events and key theoretical concepts;
- The McGraw-Hill Handbook of Homeland Security
- Information security