StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security Roles - Research Paper Example

Cite this document
Summary
Essential Security Roles: An Analysis Name Date Institution Essential Security Roles: An Analysis Introduction The security role has developed as an essential part of major corporate players that are profoundly operating around the world. The local government neither posses the ability and desire to police the economic and operational interests of corporate giants and therefore, these companies have to hire security experts from specialized consultants or buy services of security professionals on their own (Avant, 2005)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Security Roles
Read Text Preview

Extract of sample "Security Roles"

Download file to see previous pages

Additionally, the head of security has some important duties and responsibilities and they most notably include filtering criminal records of the newly hired employees. Secondly, the leaders have to make hard choices during their jobs because they cannot to afford to trust anyone and it is a common belief that security professionals are paid to remain suspicious of everyone. The need to suspect everyone and everything is a defining attribute of security professionals in both public and private sectors of the society (Spitler, jones, Hawkins, & Dudka, 1987).

The private security officials and agencies are bound to perform their duties under Police and public law enforcement as they are blessed with the governmental authority to prosecute any suspect. The role of private security is to minimize any immediate threat and danger to the interests of corporations. In the court of law, however private security officials have the capacity of expert witnesses while; the local police departments are responsible and accountable for conducting detailed crime investigational activities.

The heads of corporate security departments have the important duty to neutralize any possibility of offence against the company and they are helped in this cause by technological interventions such as CCTV cameras and walkthrough gates. The idea is to minimize the possibility and probability of fatalities of security professionals specifically. The heads of security departments are also supposed to propose training and development of the staff so that they can perform their roles in a better manner.

The private security professionals are nonetheless, believed to have lower level of dedication towards ethical standards in the field because they often suspect an innocent person as a possible threat and therefore, the suits stating that companies are engaged in harassing people, are piling up in developed parts of the world. The main purpose for outsourcing security to corporation is to minimize the strain on dollars of the taxpayers. In the past, the public law enforcement agencies were expected to provide security to the interests of corporations.

The citizens of advanced nations developed the knowledge and publically challenged the practice. They held on to the point that their tax-revenues should be spent on betterment of public services and they must not be wasted on the protection of private economic interests. As a response to the abovementioned societal change, the companies were allowed to hire security professionals on their own. The security professionals are notorious for having introvert personalities whereas; people use to get annoyed by their tendency to suspect everyone.

The public law enforcers have to commit to the higher ethical standards in order to win a conviction in the court of law but the private professionals do not succumb to any civic values and therefore, are infamous for using excessive force on suspects. Furthermore, they are also believed to illegally detain corporation’s enemies and torture them against their misdeeds. The public imagines private security officials as thugs that are hired in order to do the dirty work of their employers. The governments on the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Roles Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Security Roles Research Paper Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/law/1492122-security-roles
(Security Roles Research Paper Example | Topics and Well Written Essays - 1000 Words)
Security Roles Research Paper Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/law/1492122-security-roles.
“Security Roles Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/law/1492122-security-roles.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Roles

Evaluation of Data and System Security

Classically, computer security has been about systems of prevention.... An organisation or company has to have security in place to protect it from attacks.... The difficulty in getting this right depends upon the company and its products, if it manufactures then there is an added problem building security into its Information Technology and Telecoms (IT & T) structure on the shop floor which is not present if it is something like a bank or college which has a whole set of differing demands on security and who and where to watch for major attacks....
3 Pages (750 words) Coursework

JOPES and CAS Systems

Homeland security: roles and missions for the United States Northern Command.... JOPES and CAS systems Based on the IP-3000 PowerPoint Slides, the Joint Operations Planning and Execution System or JOPES is “the principal system within the Department of Defense for translating policy decisions into OPLANs, CONPLANs, Functional Plans, and OPORDs in support of national security objectives” (Slide 7).... JOPES and CAS systems Based on the IP-3000 PowerPoint Slides, the Joint Operations Planning and Execution System or JOPES is “the principal system within the Department of Defense for translating policy decisions into OPLANs, CONPLANs, Functional Plans, and OPORDs in support of national security objectives” (Slide 7)....
3 Pages (750 words) Essay

Asset Inventory

eople System administrators(trusted employees) Key Persons Dependency(Poor Systems Administration Patterns) $1,000,000 critical Unavailability of the system IT Security Roles and Responsibilities Medium 0 .... Moderate $240,000 security Audit Standard.... LOW $24,000 IT System Interoperability security Standard Patches and updates from a reliable sources Hardware Internal server Hardware Issues/Equipment Failure or loss Loss or theft of data from server $8,000, 000 Vital System Unavailable Data Backup and System Restore Standard High 0....
4 Pages (1000 words) Essay

Security Roles in an Organization

Name: and number: Project title: Security Roles in an Organization Security Roles IN AN ORGANIZATION Introduction The nature and quantum of an organization's asset goes a long way to determine the trend of growth and development that will be achieved by that organization.... Professional responsibilities of security directors One of the major aspects of the interview touched on the roles that various security professionals play in the organizations....
4 Pages (1000 words) Research Paper

National Initiative for Cyber Security Education

This initiative will also elevate the variety, assortment, and number of courses related to science in a bid to produce more individuals or professionals to take up cyber Security Roles.... Cyber security Name Date Cyber security Cyber security has become one of the most important issues of national security over the recent past.... This paper describes the National Initiative for Cyber security Education (NICE), its initiative, assesses the value of NICE, as well as other important aspects of this initiative....
3 Pages (750 words) Assignment

Security Managers Should Be Managers First And Security Specialist Second

In today's world of high technology, security became part of the business of many private and government organizations and companies.... From local to international projects, security became important on global activities.... As a result, others see the importance that made them aware of involving security in anything they are involved. … While in some aspect of considerations, security perceptions to some organizations don't change 'till something goes wrong....
14 Pages (3500 words) Essay

Information Technology Strategy of Events Planning Company

The business venture will also entail determining the information technology personnel or roles in place and a SWOT analysis for the same.... Then following the strategic plan will outline the current situation of Great Heights in terms of technology and security aspects....
9 Pages (2250 words) Term Paper

The 2004 Madrid Train Bombings and Its Effect on the Homeland Security Operations

… The paper "The 2004 Madrid Train Bombings and Its Effect to the Homeland security Operations" is a brilliant example of a term paper on history.... The US Department of Homeland security was established in November 2002 in response to the US terror attacks on September 11, 2001, with the main role of safeguarding the USA and the US territories and Protectorates against threats.... The paper "The 2004 Madrid Train Bombings and Its Effect to the Homeland security Operations" is a brilliant example of a term paper on history....
6 Pages (1500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us