Free

Security History - Research Paper Example

Comments (0) Cite this document
Summary
Security History Name: Course: College: Tutor: Date: Security History Society has gone through significant development over the years. Humanity has changed from the time there was no private ownership to the capitalist society today. This has led to a need of private security, and this industry continues getting more and more sophisticated…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Security History Research Paper
Read TextPreview

Extract of sample "Security History"

Security History College: Security History Society has gone through significant development over the years. Humanity haschanged from the time there was no private ownership to the capitalist society today. This has led to a need of private security, and this industry continues getting more and more sophisticated. Private security forces’ history dates back to 13th century in Egypt. Egyptian pharaoh would hire Nubians, Syrians and Libyans to compliment Egypt’s military. This practice first adoption was by Romans where the rich would hire private security to guard their properties and family. Private security developed fully in middle age in, Europe and Asia. China and Japan were the first Asian countries to follow this tradition. They engaged private security to guard their property and themselves against Mongol Hordes. Warlords from Italy secured private security to defend their bases as they fought in the military. This was happening regularly and private security soldiers began coming together forming private security organizations (Kinsey, 2006). In times of English King John’s reign, there were pressures to him to approve Magna Carta. This meant that no man was to be mistreated, imprisoned, or destroyed without proper judgment from his peers or the law (Dunigan, 2011). Later during that era, many security concepts were developed for villages for the villagers, to adhere to these concepts. It was the responsibility of every citizen to apprehend felons. There were security measures that were put in villages such as closing village gates during the night king’s highway was cleared, and there were patrols at night. Between 14th and 18th century, security systems grew, and feudalism came to an end. In the 16th century, English parliament was willing to crown Mary and William if they agreed to reaffirm citizens’ rights. A bill of rights was obtained. In 17th century, many people moved to the cities looking for better lives. This created many hardships such as poverty, crime and violence. As a result, it became more crucial to have stronger security. In 1737, tax revenues were put to use to set up security forces to patrol city streets. Harry Fielding, in 1748, proposed a security force be formed that was permanent and payment was reasonable. This was the beginning of the idea of preventing crimes rather than controlling it. Industrial revolution and factories that came up during this period led to an outbreak of more criminal epidemic. During Sir Robert reign, several reforms were made to the criminal law. These reforms made police forces in urban areas to be more effective, however, private security organizations continued to do well. America got the idea securities forming forces from England. During the 1850s, a private security agency was created by a past Chicago detective. Pinkerton agency did so well and led to their hiring by President Abraham Lincoln. After this agency, there was the formation of other private security forces. There were measures implemented in order to make better the security forces services. One of those innovations was a burglar alarm. After this automobile security, equipments gained popularity, and so did the industries that provided materials. The whole country needed and was using personal security forces. War started raging in Europe after some time. The then president Roosevelt passed an order towards US war department mandating them to come up with and train private security force. This was to ensure there are no threats to the US industry. This was as a result of lend-lease program that the US government had passed that enabled them to provide war tools to Allied countries in 1941. Later there was bombing of Pearl Harbor and the US joined the war (Jager, 2007). Private security began rising as factories got the need to produce war materials in larger quantities. This personal security guarded and protected thousands of factories in the US as the war continued. By the end of the war, the government set certain standards where the private security companies followed so as to continue with their operations. The companies had to provide documentation that they had a genuine and convincing security plan. This brought into place the first generation of private security companies. They used technological methods to improve their systems. The practice has continued as years went by and with the level of technological advancement increasing, the companies have improved their abilities and spectrum. After the attack on the US famously known as the 9/11, private security got increased demand. These events caused the government to shrink the budgets of public law enforcement. Many institutions reverted to private security as their alternative. With all these, private security continued to grow. References Dunigan, M. (2011). Victory for hire: Private security companies' impact on military effectiveness. Stanford, Calif: Stanford Security Studies. Ja?ger, T., & Ku?mmel, G. (2007). Private military and security companies: Chances, problems, pitfalls and prospects. Wiesbaden: VS Verlag fu?r Sozialwissenschaften. Kinsey, C. (2006). Corporate soldiers and international security: The rise of private military companies. London: Routledge. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security History Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Security History Research Paper Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/law/1444808-security-history
(Security History Research Paper Example | Topics and Well Written Essays - 750 Words)
Security History Research Paper Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/law/1444808-security-history.
“Security History Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/law/1444808-security-history.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security History Research Paper

Homeland Security

...?Running Head: HOMELAND SECURITY Homeland Security In America, homeland security has always been a matter of concern long before the September 11 attacks. For decades, national and international terrorist groups have attacked the homeland of America to disrupt its internal interests and facilities. These events did not create many waves and so any programs regarding counterterrorism did not fetch much help from the government. Only the massive and destructive nature of the September 11 attacks in 2001 managed to shake the US Federal government out of its torpor to make terrorism a major issue in public, political and media agendas. Within 9 days of the terrorist attack, George Bush...
8 Pages(2000 words)Research Paper

Information Security

...?Fundamental Issues in Network Security Introduction Before going into the discussion regarding fundamental issues in network security, let us get a better understanding of what network security actually is and why is it important in the present world. A computer network is a collection of computers connected to each other through LANs or WANs in order to carry out different business transactions. Network security is a strategy that is used to protect computer networks from different sorts of threats by identifying the potential threats to the networks and then applying the most appropriate measures to combat the identified threats. Network security is...
5 Pages(1250 words)Research Paper

Network Security

.... Bhattacharya, Somak and S. K. Ghosh. "An intelligent search technique for network security administration ." International Journal of Artificial Intelligence and Soft Computing, Volume 1 Issue 2/3/4 (2009): 338-351. Danchev, Dancho. Building and Implementing a Successful Information Security Policy. 2010. 08 May 2011 . Daya, Bhavya. Network Security: History, Importance, and Future. 2010. 08 May 2011 . Global Crossing. RAISING THE BAR FOR NETWORK SECURITY . 2011. 15 May 2011 . Ioannidis, Sotiris, et al. "Implementing a distributed firewall ." Conference... ID # Network Security Introduction During the last few decades several technologies have been emerged throughout the whole globe and networking technology is certainly...
13 Pages(3250 words)Research Paper

Social Security

...?Running Head: SOCIAL SECURITY Social Security Social Security Introduction Social security is a retirement program that provides an income for workers and their families during their lives and especially at retirement. It can be the only source of income for many retired Americans who have not made any other provisions for the twilight time of their lives. There has also been an influx in older Americans have to acquire “retirement jobs” in order to maintain their income. Many low-income households utilize social security as their only income source. Women and minorities depend on Social Security due to lack of education and employment...
8 Pages(2000 words)Research Paper

The History, Background, and Issues of the Establishment of the Social Security Program

...?  The History, Background, and Issues of the Establishment of the Social Security Program Outline a. What was the problem/s or needs that the program sought to address? Target population?  b. Who were the individuals (legislators, community leaders, others) who SUPPORTED the establishment of this program and who FOUGHT AGAINST or disagree with the program?  c. What were the arguments in FAVOR of the program and AGAINST the program?  d. What are significant dates in the establishment of the program and of major changes in the program?  e. What were the CONDITIONS of the people targeted by this program BEFORE the program was established and AFTER the program was established?  f. How was the program...
4 Pages(1000 words)Research Paper

Security

...Security management 12 March Security management Introduction Dynamism of risk facing organizations, which induces threats to the safety and daily operations of the organizations, means that security management, should be a top priority to organizations. Various organizations have different levels of security needs depending on the sensitivity of material to be protected as well as nature of the internal and external business environment. Security therefore plays a major role in protection of an organization’s assets. This paper seeks to discuss the role of security in protecting an organization’s assets. The paper will explore the scope...
3 Pages(750 words)Research Paper

Cyber Security A Homeland Security Dilemma

...Cyber Security: A Homeland Security Dilemma? Research question How can the Department of Homeland Security effectively secure cyberspace from cyber attack, viruses, worms and other forms of malwares? The next big conflict is computer warfare that the United States government has to respond vigorously as the Center for Strategic and International Studies has said that the Department of Homeland Security has not well performed the task of protecting the government from cyber attacks. Groups like Al Qaeda and other criminal syndicates have been finding every possible opportunity to penetrate government- and private-sector websites and leaving behind...
9 Pages(2250 words)Research Paper

Security Design

... Assignment Research Paper Summary The paper d “A systems engineering approach for security system design” (Alston and Campbell, 107-112) was published in the proceedings of the International Conference on Emerging Security Technologies held in 2010. In this paper, the authors have attempted to provide a methodical approach of design to develop security systems. Systems engineering paradigm has been implemented to this approach which is poised to enable a systems designer to comprehend all the contributory factors that lead to a system’s situation and problems. Complex systems that critically need fool proof security solutions include battlefield defences systems, money transaction system, international telephone system, etc... . With the...
1 Pages(250 words)Research Paper

The History of the Transportation Security Agency

...The History of the Transportation Security Agency Introduction The transportation Security Administration agency is a federal department agency for security in U.S. This agency basically has the authority for security of public travelling in the U.S. This agency plays a very vital role over U.S. Homeland Security since 2001. This agency was founded by Don Young and Ernest Hollings, the agency since then has been a part of U.S. security services in a very prominent way and deals with all means of transport security in the entire United States. After the black day September 11, 2001 attacks, this agency has...
6 Pages(1500 words)Research Paper

Aviation security

...of any flight debris or a crash site. As such, the there was no official theory which was formulated by the authorities that could have aided in the search for the missing flight. As a result, there were informal many theories and speculations of what happened to the plain. There are no reports on where the plane might be or whether the passengers and the crew members are still alive despite month of searching. The search effort for this plane is of a multinational dimension which has turned out to be the most expensive and largest search efforts in history. There has been diverse theories and misconception about the causes of disappearance of the Boeing 777. Some of the theories indicate that the plane was shot down due...
9 Pages(2250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Security History Research Paper for FREE!

Contact Us