Theory and Policy: Security and Intelligence DimensionsIt is important to understand the relationship between theory and policy. Prior to beginning work on this discussion, read Martin’s (2015) discussion on Organizational Theory (Chapter 5). Examine the following theoretical frameworks: Cold War Terrorist Networking Theory (Chapter 7, Martin 2015), Netwar: A New Organizational Theory (Chapter 7, Martin 2015) and Contagion Theory (Chapter 9, Martin 2015). You may utilize alternative scholarly sources to research each of these theories. To find further information on these theories you can run a search for an individual theory through the UAGC Library.It is also important to be able to differentiate deductive and inductive research and to understand how both forms are utilized by scholars to advance knowledge in the area of homeland security. It may be that you are unfamiliar with either or both of these terms. Consult the Purdue Online Writing Lab’s Using Rhetorical Strategies for Persuasion (Links to an external site.)webpage which presents brief descriptions of deductive and inductive approaches.Martin (2015) differentiates homeland security policy alternatives across several dimensions, which include but are not limited to security and intelligence dimensions. Martin (2015) indicates that the strategic objective for intelligence associates with its predictive application, whereas security emphasizes deterrence.This discussion consists of two distinct but related prompts. First, differentiate the following theoretical frameworks: Organizational theory, Cold War Terrorist Networking Theory, Netwar: A New Organizational Theory and Contagion Theory. Second, compare and contrast skills that are needed to identify, evaluate, and resolve complex intelligence policy issues with those that are needed to resolve complex security policy issues. You may wish to consult Table 1.1 in the Martin (2015) text for this purpose. Third, Martin (2015) discusses the context within which homeland security theory developed. Select one of the above theories, and explain how it contributes to the development of policy with particular attention on security and intelligence considerations. As a reminder, please incorporate citations when appropriate.The content of the initial post must contain a minimum of two references to the assigned weekly reading materials. No quotations are permitted. Your posts should incorporate analytical and evidence-based statements and reflect a synthesis of the assigned readings. Your initial post should be a minimum of 250 words.Guided Response: Please read the initial posts of other students. Respond to a minimum of three different student posts by 11:59 p.m. on Day 7 of the week. To enhance discussion quality, please post your responses earlier in the week. Your response posts should build upon or challenge your peer’s post on skills needed to resolve intelligence and security policy issues. Further, your response should contain a follow-up question that pertains to your peer’s connection between theory and policy. The follow-up question should reflect critical thinking and should either challenge or deepen the analysis. Response posts should contain no fewer than 100 words and a minimum of two references from the assigned weekly reading materials.Please continue to monitor the discussion forum until 5:00 p.m. (Mountain Time) on Day 7. In addition, respond to anyone who replies to your initial post, and ensure that your responses engage follow-up questions.