How are the threats posed by biological weapons more significant than other weapons of mass destruction? 2. Explore more in-dept
1. How are the threats posed by biological weapons more significant than other weapons of mass destruction?
2. Explore more in-depth about biological weapons to generate new ideas for WMD planning.
TECHNICAL REQUIREMENTS
1. Include a research question, a hypothesis or purpose statement, and a literature review of at least 6 sources, four of which must be peer-reviewed. Add a methodology section, findings & analysis, and conclusions & recommendations sections
2. A brief one or two paragraph hypothesis or purpose statement outlining your approach to what you hope to show/validate.
3. MINIMUM of 15 pages (excluding Title page, Reference page, or any appendices).
4. At least 2 scholarly sources per page of content.
5. Type in Times New Roman, 12 point and double space. Current APA Style as the sole citation and reference style.
6. Highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc. Points will be deducted for the use of Wikipedia or encyclopedic type sources.
References
· Burke, R. (2002, July 1). Biological Terrorist Agents: Part 2 – Viral Agents. Firehouse. Retrieved from http://www.firehouse.com/article/10545309/biological-terrorist-agents-part-2-viral-agents
· Center for Civilian Biodefense Studies. (2001). Plague. Bloomberg School of Public Health, Johns Hopkins University. Retrieved from http://www.jhsph.edu/research/centers-and-institutes/johns-hopkins-center-for-public-health-preparedness/tips/topics/Biologic_Weapons/plague2.html
· Center for Disease Control. (2017). Anthrax: The Basics. Retrieved from https://www.cdc.gov/anthrax/basics/index.html
· Center for Disease Control. (2017). Anthrax: Bioterrorism. Retrieved from https://www.cdc.gov/anthrax/bioterrorism/index.html
· Hooker, E. (2016, June 30). Biological Warfare. eMedicineHealth. http://www.emedicinehealth.com/biological_warfare/article_em.htm
· Kim, S. (2015, November 19). The Plague. Healthline. Retrieved from http://www.healthline.com/health/plague#Overview1
· Pike, J. (2011, July 24). Biological Warfare Agent Delivery. Global Security. Retrieved from http://www.globalsecurity.org/wmd/intro/bio_delivery.htm
· U.S. Department of Homeland Security. (2017). Biological Threats. Retrieved from https://www.ready.gov/biological-threats
· Biography.com editors. (2016, June 6). Bhagwan Shree Rajneesh Biography. A&E Television Networks. Retrieved from http://www.biography.com/people/bhagwan-shree-rajneesh-20900613
· Clinton, B. (1995, June 21). Presidential Decision Directive/NSC-39. The White House, Washington, DC. Retrieved from https://fas.org/irp/offdocs/pdd/pdd-39.pdf
· Department of Homeland Security. (2013, May). National Response Framework. Retrieved from https://www.fema.gov/media-library-data/20130726-1914-25045-1246/final_national_response_framework_20130501.pdf .
· Forest, J.J.F. (2012, Winter). Framework for Analyzing the Future Threat of WMD Terrorism. Journal of Strategic Security 5, 4. Retrieved from http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1193&context=jss
· Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat
· Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from http://www.johnstonsarchive.net/terrorism/chembioattacks.html
· Kay, D. (2001). WMD Terrorism: Hype or Reality. In TheTerrorism Threat and US Government Response: Operational and Organizational Factors , Smith J.M. and Thomas, W.C., eds. US Air Force Academy: INSS Book Series.
· Mowatt-Larsen, R. (2010, January 25). Al Qaeda’s Pursuit of Weapons of Mass Destruction. Foreign Policy. Retrieved from http://www.foreignpolicy.com/2010/01/25/al-qaedas-pursuit-of-weapons-of-mass-destruction
· Myers, R.B. (2002, August 19). Fighting Terrorism in an Information Age. International Information Programs, U.S. Department of State, 2. http://usinfo.state.gov/regional/nea/sasia/text/0819info.htm
· Nuclear Threat Initiative. (2015, July 8). Global Initiative to Combat Nuclear Terrorism (GICNT). NTI. Retrieved from http://www.nti.org/learn/treaties-and-regimes/global-initiative-combat-nuclear-terrorism-gicnt/ .
· Pew Research Center for the People & the Press. (2010, June 22). Public Sees a Future Full of Promise and Peril. Retrieved from http://people-press.org/2010/06/22/public-see-a-future-full-of-promise-and-peril/
· Reagan R. (1988, November 18). Executive Order 12656. Executive Office of the President, the White House, Washington, DC. Retrieved from https://www.archives.gov/federal-register/codification/executive-order/12656.html .
· Ruff, T. (2006, November). Nuclear Terrorism. The Energy Science Coalition. Retrieved from http://energyscience.org.au/FS10%20Nuclear%20Terrorism.pdf
· Stafford, R.T. (2013, April). The Stafford Act: Robert T. Stafford Disaster Relief and Emergency Assistance Act, as Amended. Federal Emergency Management Agency. Retrieved from https://www.fema.gov/media-library-data/1383153669955-21f970b19e8eaa67087b7da9f4af706e/stafford_act_booklet_042213_508e.pdf.
· U.S. Department of State. (2006). The Global Challenge of WMD Terrorism. Retrieved from https://www.state.gov/documents/organization/65477.pdf
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
