Identify a security studies research article published in a scholarly journal of your choice. After reading the article carefully, identify the following:
1. Any ethical considerations the researcher had to address.
2. What research design does the author (or authors) employ?
3. What is the unit of analysis of the study?
Identify a security studies-related article that uses the social scientific approach (i.e., the research needs to be data-based). Using that article, answer the following:
1. What are the hypotheses presented and how are they theoretically justified?
2. Identify the independent and dependent variables. What control variables are used to address the issue of potential spuriousness?
3. How are the main independent and dependent variables operationalized? Are the indicators used to test the hypotheses appropriate, or do you have concerns over decisions made by the author(s)?
In a paragraph, describe whether the sampling approach was non-probability or probability sampling, and why that approach was, or what not appropriate. Does the justification for the sampling approach appear justified?
Identify an article that presents research which employed an experimental design (it does not have to be a true experimental design). Explain briefly what the researchers did, what design they used, and what threats to validity were an issue.