Remember that Walden’s Title IV Code is 025042.
The rise in terrorist activity and natural disasters in recent years has intensified the importance of and need for homeland security in the United States and abroad. Today, it plays an expanding and dynamic role in virtually every business and government institution. The Homeland Security specialization is designed for leaders in the private and public sectors interested in analyzing homeland security and crisis planning from a business perspective.
Explore how the field of homeland security has evolved, as well as the global implications it has on how an organization operates, internally and externally. From the principles of global terrorism to risk-based analysis strategies and emerging organizational and policy challenges, gain the insight and knowledge you need to confidently address organizational security issues, mitigate risk, and protect business infrastructure through critical thinking and applied research.
The majority of our students take over 2 years to complete their doctoral study or dissertation.
This sequence represents the minimum time to completion. Time to completion will vary by student, depending on individual progress and credits transferred, if applicable. For a personalized estimate of your time to completion, call an enrollment advisor at 1-866-492-5336.
Information technology and systems saturate every aspect of business, from small corner stores to global corporations. Through this course, independent scholars receive broad coverage of information systems management concepts and trends underlying current and future developments, as well as principles for providing effective implementation of information systems management. Independent scholars use business case studies to gain real-world insight on the impact of information systems on decision-making, collaboration, and maintaining business relationships. They engage in discussions on a variety of topics, such as the advantages and disadvantages of global Internet commerce, the role of onshore and offshore workers in a company-wide information system, and the pros and cons of short-cycle time approaches to information systems development. Independent scholars develop and define their position and reasoning on a variety of current issues in information systems as the course progresses. They also focus on the practical application of writing and the integration of professional practice at the doctoral level.
Independent scholars in this strategy course concentrate on the creation and implementation of business strategies that maximize competitive advantage in the marketplace. They develop an understanding of why and how individuals and business organizations work together to create sustainable businesses in the global marketplace. They also apply models for assessing the strengths and weaknesses of business organizations and identify opportunities and threats resulting from forces shaping the marketplace. Independent scholars focus on practical business applications of writing, critical thinking, and classroom engagement in a combination of essay discussions, research assignments, and writing papers to analyze, develop, and defend ideas for strategic and innovative business solutions for sustainability.
The term business continuity management (BCM) is a unifying process and the umbrella under which multiple supporting functions, including crisis management and business continuity, operate and integrate. Terrorism represents a significant threat to global business leaders, because globalization and terrorism are inextricably linked. Events such as the September 11 terrorist attacks had significant impact on business continuity management. From a business continuity perspective, independent scholars in this course examine key questions and issues facing the U.S. intelligence community from a global viewpoint. What is its role in homeland security, and how may these questions affect business continuity management? The emphasis of the course will be on issues affecting business continuity management policy, oversight, and support to homeland defense/security and global business decision-making. The course is shaped to focus on homeland intelligence support of business issues at the state, local, and tribal levels.
A foundational tenet of terrorist activity is the destruction of business structures. Business leaders can do much to prepare for the impact of hazards, including technology-related hazards, terrorism, natural hazards, and human-caused hazards. From a business planning standpoint, the business leader will examine an all-hazards approach. Independent scholars, as part of an economical system, will get an overview of terrorism that includes the definition, root causes, ideologies, historical and current perspectives, modus operandi and targets, radicalization and recruitment, terrorist group structures, domestic and international terrorist groups, state-sponsored terrorism, and counterterrorism inasmuch as all impact the business leader. Terrorism affects both the long-term and short-term segments of businesses around the world; therefore, the need for business continuity planning is investigated.
Given the uncertainty of emerging terrorist and criminal threats, business leaders require a quick qualitative assessment of the vulnerability of existing business operations, personnel, facilities, and assets. From a business perspective, critical infrastructure protection is one of the cornerstones of homeland security. The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets lists 11 critical sectors. Independent scholars in this course are introduced to the Department of Homeland Security (DHS) risk-based resource allocation process. In the course, the fundamentals of business-related risk assessment are discussed, and the advantages and disadvantages of various risk assessment tools are examined. At the completion of the course, independent scholars will be able to assess the value of various risk tools, apply those tools to any critical infrastructure within their multijurisdictional region, and derive optimal business strategies and draft policies to reduce the risk associated with future terrorist attacks and other hazards on their business interests.
In the final doctoral study, independent scholars demonstrate their ability to examine, critique, and synthesize knowledge, theory, and experience so that new ideas can be tested; best practices identified, established, and verified; and theoretical, practice, or policy constructs evaluated and advanced. In all cases, independent scholars engage in rigorous inquiry that results in new knowledge, insight, or practice, demonstrating efficacy in the world of business and management. Through this course, independent scholars gain assistance in working through the process of the doctoral study. They design personal best practices for completing their study within a designated context. They also select their committee members, with whom they establish and maintain strong working relationships and on whom they rely to mentor and approve their proposal and final study. Ultimately, independent scholars completing the doctoral study make a fresh contribution to the field of practice in the professional business environment.
Apply Now | Live Chat | Call Us
© 2016 Walden University