StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethical Issues in Security Management - Essay Example

Cite this document
Summary
The essay "Ethical Issues in Security Management" critically analyzes the major ethical issues in security management. Border threats are related to the influx of people linked to migration, trade, and economic diplomacy. This is characterized by the complex pattern of crime and commerce…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Ethical Issues in Security Management
Read Text Preview

Extract of sample "Ethical Issues in Security Management"

Border threats are related to the influx of people linked to migration, trade and economic diplomacy. This is characterized by the complex pattern ofcrime and commerce rooted from smuggling to escape taxation and regulations and the movements of people which may include entry of possible terrorists or transnational criminals and illegal immigrants. This essay raises the question: what is the ethical dilemma associated to border security management and its implications to crime prevention strategies and in sustaining improve international relations of advanced nations? This paper aims to discuss the current security problems confronted by United States on border security management, the factors and experiences that challenge deployed security workforces; and the imperative of stringent enforcement of security rules to strategically manage its internal and external safekeeping. Security management and its problems Experts in national security management point out that these kinds of risks has a possibility that (a) threats will be realized and that (b) the consequence of the threat will have its impact (Ibrahim, 2005, pp.163-187). Estimating the possibility and evaluating its consequences are very challenging and difficult task in borders security management with diverse and complex situations.  Those suspected terrorists and criminals that may blend with the migrants can also strategize to pass through the borders defences (Basuchoudhary & Razzolini, 2005, p 1). Experiences in advanced countries showed that millions of cargo containers and hundreds of millions of lawful migrants and tourists visit their country each year. Some carry illegal cargoes and others are illegal migrants. Others are engaged in the risk of illegal armaments smuggling (Maril, 2011, p.10). Hence, seizure and arrest of persons could happen especially if illegal drugs and contraband are transported. Other cases include human trafficking for slavery and prostitution. Others are caught in a warzone or conflicts that are in need of a neutral state for an asylum. The variety of these cases have reached an alarming and substantial statistics in the Department of Homeland Security’s (DHS’s), if we would deal on the complex border security issues of the United States of America (USA). It has become the interest of the US to prevent illegal migration of people and goods via seas, land and on air while at the same time work to ensure security and resilience in the global movement. Combined custom and securities become also concern in weakening and dismantling transnational organizations that are actively indulged in smuggling and trafficking across the U.S. border (Rosenblum, Bjelopera, & Finklea, 2013, p. 1). Implications for Border Security Management The government and its legislatures are therefore compelled to allocate budget for comprehensive security management to reinforce and support its security program to encourage lawful trading and legal entries of people to counter the variegated threats at the borders and to ensure that intelligence cooperation with enforcement agencies are strengthened and capacitated (Rosenblum, et al., 2013, pp. 3). The assumption here is that security forces are deployed in the borders to defend the national interior against all harms coming from outside although the system apparently does not holistically secure the country in a holistic sense because notwithstanding security measures, terror groups can still get pass through them (Rosenblum, et al., 2013, pp. 4). For instance, the entry of 9/11 terrorists through airports with visas proved that any fortified borders cannot protect people from harm. The unauthorized migrants who cross the U.S.-Mexico border each year may have not posed terrorist threats, however, experts pointed out that the enforcement of laws against illegal immigrants is resource-bleeding and a distraction from serious national security management (Rosenblum, et al., 2013, p. 5). The U.S.-Mexico border for instance is free from high-risk violence although forces here are deployed still to protect US citizens against drug smuggling and illegal transport of armaments (Rosenblum, et al., 2013, pp. 10-12). United States classified national security problems from the borders following the 9/11 terrorism that killed numerous innocent civilians and destroyed the twin towers. But the nature of threats these days have changed too. Dangerous aliens are deported under immigration laws of 1798. The 20th century border security deals on problems concerning entry of anarchists (in 1903), aliens that are threat to public safety within the period of war (1918), communists (1950), and, of course, the terrorists (1996)—those who can effectively launch an attack physically and those that can cause cybercrimes operations (Rosenblum, et al., 2013, p. 8). Government’s ethical norms here are founded on systems of laws, regulations, and standard of international protocol to prevent the entry of unauthorized migrants, quell criminal networks, cease and seize smuggling of drugs and contraband, and interdict potential terrorists at America’s borders (Rosenblum, et al., 2013, pp. 13). While these are considered as high-profile cases, but the borders’ security management also include concern to facilitate lawful travel and trade (Rosenblum, et al., 2013, pp. 13).  While combating these problems, the DHS also extend beyond the border by networking with international and regional communities to holistically combat unauthorized migration, narco-criminal networks, and terrorists (Rosenblum, et al., 2013, pp. 1-27). Improving International Relations & Long-term strategies Through international relations, US were able to strengthen its partners with allied countries in regionalizing its anti-terrorism and anti-transnational policies under the context of global security. The security management partnership is shown in its military capability-building, regionalization of security policies, adaptation of security measures originally defined by US authorities, and provision of resources that are necessary for network operations. However, the regionalization of counter-terrorism measures is likewise met with opposition on the ground because some sectors express fears that the targeted enemies of US will also become the enemies of its regional partners. Under this context, ethical questions arise on potential empirical implications due to the interconnection and interdependence of countries now against threat and for global security (Hutchings, 2010, p. 16-24). Ethical and moral implications of this relationship became the subject of investigation to gain valid claims (Hutchings, 2010, p. 16) on the complexity of this concern as well as gather different views about the nature and relevance of actions done by actors in related emergent conditions (Orjuela, 2010, pp.  99-120). In response to these inquiries, national and international security experts reasserts the validity in integrating and making it primordial in the state of affairs. This is because the nature of transnational crimes has already reached a level where countries need to balance global, multilateral and bilateral approaches to safeguard national interests (Peoples & Vaughan-Williams, 2010, p. 4). Due to the geostrategic location and propensity to attain state-centric objectives, countries have started harness synergies for international collaborative security management (Peoples et al., 2010, p. 4).  Moreover, as population became diverse and multicultural, constructivist approach became essential in security management to reflect its societal values primarily and to integrate this in both national and international security agenda (Peoples et al., 2010, p. 4).  Some countries made it as an essential part of its culture to impose great deal of attention to security management. Hence, while security problems are intensified in other countries, the rest increase its security as an overarching priority to keep its border great at security relations (Peoples et al., 2010, p. 4). It is also observed that domestic security encouraged policy makers and agencies to remain outwardly focused in developing strategies to uphold national security. To cite an example, the home-grown violent extremism and border integrity in US influence the dynamics and strategies of security management of neighbouring international community (Peoples et al., 2010, p. 5). As such, countries became more focused in risk management and assessment procedures based on in economic theories of consumer behaviour and formal models of decision-making applied for industrial, environmental, business, legal, and other settings (Peoples et al., 2010, p. 5). Some experts may use “probabilistic risk assessment” (PRA) to deal on high-consequence, low-probability risks associated with nuclear power plants and other dangerous industrial processes including issues involving risks of terrorism. It is therefore significant that critical security studies be considered as an imperative so that state and its law enforcers are able to analyse human behaviours and its ecosystem to secure the referent object under threat (Peoples et al., 2010, p. 7). Security analysis can be done using traditional approach through strategic, peace, realist, liberal, studies and the like (Columba et al., 2010, p. 7). Security managers can likewise undertake broadening of security agenda; deepening of theoretical approaches on security; make normative position on a security issue; apply scientific and verifiable idea for a post-positivist analysis, and deal it as a derivative concept (Columba et al., 2010, p. 7). Security managers use temporal narratives to map security studies using different stories of varied timeframes, or historical events, and delineation of distinct eras to plot the security issues from Cold War period to the terroristic attack in 9/11, a tragedy that was caused by various colonial legacies, foreign policies and complaints on global inequities (Columba et al., 2010, p. 8).  Scholars also use mapping of critical security studies using geographical metaphors from Aberystwyth, Copenhagen and Paris schools where distinctions are appreciated between traditional and critical security studies (Columba et al., 2010, p. 7). The former is recognized only in Europe while the latter remain concentrated in US realists debates and narrowly focused on military issues intellectually discussed in American security scholarship (Columba et al., 2010, p. 9). Among the many discourse here relates securitization to the broader threats of poverty, political oppression, environmental degradation, violence and conflict. Scholars contended that Aberystwyth is a normative in its way; Cohenhagen is analytical; and Paris details on approaches (Columba et al.,2010, p. 10). They also extend their deliberation on security to anthropology, criminology, human geography, and, sociology. Securitization and Dynamism Securitization has also its conditions. These are (a) conventional plot securitization where an external threat legitimizes the use of extraordinary measures to combat it; (b) condition that requires the securitization as an actor in a position of authority and has enough social and political capital to convince an audience of threat’s existence; and (c) third, is the presentation of a threat based on associated historical connotations of danger, harm and hostile sentiments (Columba et al.,2010, p. 79). On the other hand, securitization theory makes two important assumptions in relation to military sector of security. First, military is just one of the many sectors worthy of consideration in security analysis of securitization. They may carry state humanitarian intervention through peacekeeping (Columba et al.,2010, p. 79).They are paradigmatic in approach but even if non-military threats do not have necessary logic towards outbreak of war, but they may use emergency power to quell existential threats (Columba et al.,2010, p. 79). The dynamism of securitization also varies depending on the type of interaction (Columba et al.,2010, p. 80). The military will use forceful coercion to existential threat; the environmental sector will use human activity and planetary biosphere to threats in the environment; the economic sector maximize trade, production, and finance to respond to threats in the markets, finance and resources; the societal sector develops the collective identity to respond on  threat  to culture and language; and the political sector use authority, governance and recognition to respond to threat on sovereignty, organizational stability, ideology and to social order (Columba et al.,2010, p. 80). Conclusion Security management indeed is an imperative matter in the educative process to respond to threats, war and to institutionalize a strengthened defence system. The complexity of security management in this millennium requires that security experts must be knowledgeable on the variegated faces of threats that can be posed against human lives (Jhaveri, 201, pp. 977). Threats can be imminent in financial collapse, non-adaptability to scientific agenda for environmental security, to developmental risks, and social structures that are subject of terror plots (Vanderheiden, 2011, p. 65). Indeed, border security must be strengthened to protect the nation from all forms of attacks: violent or otherwise (Smith, 2010, p 4). The time has come when securitization must be modernized and be made sophisticated since preservation of lives, property and national security has become a categorical imperative in international relations (Hutchings, 2010, pp. 16). Moreover, security management require that deployed forces are able to serve its mandates in a collaborative and coordinative system with the rest of internal security management workforces. Border control and security management can only be fully considered effective if this is complemented with internal security prevention system. Hence, government agencies and department should strategically ameliorate social conditions that could lead to effective crime prevention to reduce internal threats too that may come from migrants and tourists. Allied nations must strengthen its ties through treaties for security management to effectively quell global security threats. Police and military enforcers must likewise facilitate punitive prevention measures through efficient law enforcement and legal system. They should likewise encourage the community to actively take part in information system management so that threats can be immediately responded too to recreate environments that reduce the opportunities for crime. This is only possible if there is comprehensive security planning that integrate the punitive, corrective, mechanical, environmental and situational crime prevention approach. Rational and critical decision-making is therefore required for security managers to be able to strengthen social controls; restricting access to facilitates or means of committing crimes e.g. gun and ammunition control; restricting access to disinhibitors; thorough documentation of the influx of immigrants and their behaviours within their respective communities; and improving guardianship via increased surveillance and scaled-up enforcers capability to intervene. They must also be able to produce its crime map to holistically see where weaknesses of security can be improved strategically and complementation of border patrol and internal security management is likewise an imperative. . References Basuchoudhary, A. & Razzolini, L. (2005), Hiding in Plain Sight – Using Signals to Detect Terrorists, VA, pp. 1-17. Retrieved: http://www.people.vcu.edu/~lrazzolini/terror.pdf Hutchings, K. (2010), Global Ethics: An Introduction. Cambridge: Polity Press. pp. 16-24. Ibrahim, M. (2005), The Securitization of Migration: A Racial Discourse, International Migration, Vol. 43 (5), 163-187. Jhaveri, N. (2011), Climate Disorder & Environmental Security, Geopolitics, Vol. 16 (4), 977-983. Maril, R.L. (2011). The Fence: National Security, Public Safety, and Illegal Immigration along the U.S.-Mexico Border, US: Texas Tech University Press, pp. 1-384 Orjuela, C. (2010), The Bullet in the Living Room: Linking Security and Development in a Colombo Neighbourhood, Security Dialogue, vol. 4, no.1, pp.  99-120. Peoples, C. & Vaughan-Williams, N. (2010), Critical Security Studies. An Introduction. London & New York: Routledge. Taylor & Francis Group. Smith, M. E. (2010), International Security. Politics, Policy, Prospects. New York: Palgrave Macmillan. Rosenblum, M. R., Bjelopera, J.P. & Finklea, K. M. (2013), Border Security: Understanding Threats at U.S. Borders, US: CRS Report for Congress, pp. 1-27. Retrieved: http://www.fas.org/sgp/crs/homesec/R42969.pdf Vanderheiden, S. (2011), Globalizing responsibility for climate change, Ethics & International Affairs, Vol. 25, No. 1, pp. 65-84. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Contemporary Challenges in IR Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from https://studentshare.org/history/1615757-contemporary-challenges-in-ir
(Contemporary Challenges in IR Essay Example | Topics and Well Written Essays - 2000 Words)
https://studentshare.org/history/1615757-contemporary-challenges-in-ir.
“Contemporary Challenges in IR Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/history/1615757-contemporary-challenges-in-ir.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ethical Issues in Security Management

Business Ethics: Primark and Anglo American

ethical issues, particularly with regard to the supply chain of the firm, arise due to adverse labor situation in suppliers' countries.... Some of the critical areas where firms often face critical choices in terms of ethical business behavior include finance, accounting, supply chain management, human resource management, and marketing.... are some of the issues which have come under heavy screener of unethical business practices (Dowling, Festing, & Engle, 2008)....
6 Pages (1500 words) Case Study

Identify the ethical issues within the field of Information Technology

ethical issues in IT field cannot be addressed by moral judgments along.... ethical issues in IT field cannot be addressed by moral judgments along.... IT specific definition of ethics means “an academic field in its own right with unique ethical issues that would not have existed if computer technology had not.... Ethical aspects in Information and Communication technologies can be identified at four spheres as one's personal identity, social relations, political participation and Identify the ethical issues within the field of Information Technology Ethics is generally identified as “a system of moral principles, rules, and accepted standards of conduct” (22)....
2 Pages (500 words) Essay

Information Systems Security and Ethical Issues - Finance Management

The paper "Information Systems Security and ethical issues - Finance Management" describes that financial management is the function of the business that is involved in managing the finances of the business in terms of expenditure, revenues and other liabilities such as taxes, managing loans and sources of finance.... Managerial information if more of a product by the financial management department rather than what they collect.... As Whitman and Mattord (2011), say, there are however many security issues which have to be used which range from internal threats, external threats from hackers, etc....
6 Pages (1500 words) Assignment

Ethical Issues of Sell Side Commerce

Whereas e-commerce has undergone extensive growth in the last 10 years, consumers' concerns about ethical issues continue to increase, as well.... Even many businesses and consumers are reveling in e-commerce; business issues linked to online purchasing and selling become the negative side of the matter.... ethical rules are regulations to follow in people's interactions with others and in their actions, which impact others.... Business ethics is involved with several ethical questions, which managers must tackle as part of their day to day business decision-making (Shivani and Grewal 167)....
10 Pages (2500 words) Case Study

Ethical Research Concerns on Criminal Justice and Security Management

ecurity justice and security management are characterized by many stakeholders.... The most likely stakeholders in Security justice and security management are the government and the public in general.... security management is a tricky area in which it is difficult to provide security and at the same time ensure the procedure is ethical and respect human right in a moral sense.... This essay concerns the issues of ethics and morality....
3 Pages (750 words) Admission/Application Essay

Deontology Security Administration and Capital Equity Investigate

ethical issues are authoritative in considering different courses of action, and as a potential for targeting criminal justices.... The paper "Deontology security Administration and Capital Equity Investigate" presents that ethics in some cases is regarded as moral philosophy or guidelines.... In this regard, each and every researching body has to strike a balance between the scientific expectations and standards of its research and the human rights issues that may result in a violation of the criminal justice system....
6 Pages (1500 words) Assignment

Ethical Issues in Information Systems Security Management

The paper "ethical issues in Information Systems Security Management" states that principles of ethics dictate that a course of action should be a show of trustworthy and honesty thus failure to do so opens the door for questioning the ethics of using the particular techniques for unearthing evidence.... ethical issues also influence the level of forensic investigation of the computer crime scenes (Al-Omari, Deokar, El-Gayar, Walters, & Aleassa, 2013).... The basic principles of ethics are crucial for information security professionals since they come into play when implementing the laws and regulations pertaining to the management of information....
5 Pages (1250 words) Essay

The Ethical Issues of Information Security

The paper "The ethical issues of Information Security " looks at the ethical issues of information security as well as the various legislations that have been made to guarantee information security to individuals as well as to organizations and the empirical theories that explain behavior.... Information security is a very sensitive issue because of the ethical issues that are raised as areas of concern.... This is because ethical issues do not arise because of technical problems but because of people either intentionally or by accident (Buchanan & Huczynski, 2004)....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us