StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Measures - Essay Example

Cite this document
Summary
This essay "Security Measures" claims that security is of extreme importance to everyone and this has been identified as such in everyday affairs in society. This importance is consistent with Maslow’s need hierarchy in which security represents one of the lower order needs that need to be satisfied before others can be dealt with…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
Security Measures
Read Text Preview

Extract of sample "Security Measures"

Security ID Introduction Security is of extreme importance to everyone and this has been identified as such in the everyday affairs in society. This importance is consistent with Maslow’s need hierarchy in which security represents one of the lower order needs that needs to be satisfied before others can be dealt with. It is therefore significant that security is assessed in different contexts. Events in medieval England that led to the creation of private watches and patrols In their examination of the origins and development of security in medieval England Fischer et al (2008) indicate that throughout history the concept of security can be traced to changes in the society as it mirrors the social structure as well as its economic conditions. It is also reflective of how law, crime and morality are perceived by members of the society. The security practices of removing concealments from the sidewalks to protect people who travelled the highways from being attacked by robbers could not work alone. Other attempts to deal with crime at the local level proved futile and so night watches and patrols which were established privately was the means of protection for citizens. Fischer et al (2008) indicate that under the feudal system the society was controlled by kings and feudal barons and so a high level of security was available for both individuals and groups. However, judicial reforms led to the separation of courts and the exercise of the rule of law from the power of the king. Every district was then made accountable for crimes committed within its boundaries and all strangers were required to report to the magistrates on entering a district. Attempts to control crime and other vices were not successful and this also led to the establishment of private night watches and patrols. Steenkamp (2002) indicates that Armed robberies of merchants and other groups such as clergymen and nobles who often carried money and other valuables became commonplace during the period. The safety of those who were affected could only be guaranteed by hiring private security. Procedures for enabling a good risk management program Six and Kowalski (n.d.) defines risk as the possibility of the occurrence of a harmful or undesirable event. This consists of events including harm, injury or abuse to individuals or groups of people. Risk management is a procedure aimed at protecting individuals or a group of people. Amanda D’Costa (2011) introduced six steps in a risk management program. They are: i. Identifying risk and registering them; ii. Analyzing the risks using various methods of risk analysis; iii. Identifying the cause of these risks; iv. Identifying ways in which risks can be resolved; v. Developing an action plan to resolve risks; and vi. Making someone responsible and accountable for resolution of risk. As a first step risks need to be identified before they can be dealt with. Once they are identified they should be registered so that all parties concerned will have an idea of the risk factors. In the Middle Ages crimes such as robbery and physical abuse were identified. The second step is to analyze the risks by breaking them down into their constituent parts. The third step is to identify the causes of the risks. In the cause of robbery, the cause was poverty and the change in the system of governance involving the administration of law and order. This leads to the fourth step which involves identifying ways in which risks can be resolved. In the case of robbery and abuse in the Middle Ages, three measures were designed as a means of resolving risks. They include the use of private night watches and patrols; the hue and cry system; and assize of arms (Hess 2009). This plan involved individuals taking turns in their community to watch over it during the nights. In so doing the community on a whole was responsible for their own protection. The Role of Security in Preventing Crime According to O’Block et al (1991) the idea of crime prevention is nothing new. Based on the events that led to private night watches and patrols in England in the Middle Ages and even before that time, it was clear that concerns in relation to the safety and security have long been in existence. There are may approaches to crime prevention and private security and policing is just two of them. O’Block et al (1991) looks at security in terms of Maslow’s hierarchy of needs and indicates that security is one of the more basic needs that individuals have and if not fulfilled will become a hindrance to the achievement of higher levels needs. There are private security and public security. Private security is a business and in keeping with the main objectives of businesses the aim is that of making a profit. The role of private security is to protect their clients by preventing crime from taking place while the police provide protection for the public in general. Private security existed before public security. O’Block et al (1991) also points out that the issue of security and crime prevention would not be significant if society did not consider it to be a serious problem which negatively impact peoples’ quality of life. In consideration of these factors, O’Block et al (991, p. 8) defines security as ‘freedom from fear of crime and the actual danger of being the victim of crime.’ However, O’Block et al (1991) makes reference to an all encompassing and ‘the most widely accepted contemporary definition of crime prevention’ which is: ‘The anticipation, the recognition and the approval of a crime risk and the initiation of action to remove or reduce it.’ This is clearly the role of private security as indicated previously. The police in its capacity to protect the public will act as a deterrent to crime and may therefore reduce crime. However, it may not be in a position to prevent most of the criminal activities that take place and is therefore empowered to act after the crime has occurred. Private security is contracted to prevent and deter crime. Therefore, they are required to use physical force when the well being of those whom they are contracted to protect is endangered. They are also contracted to protect the property of their clients. The role of security in preventing fire In providing security it is expected that anything which can endanger life and property should be the target. Someone needs to be observant and on the alert at all times in order to identify these types of threats which are natural hazards. This role is generally left to the security personnel. Fire is a natural hazard that can endanger both life and property. Therefore, security personnel are given the task of responding to fire alarms and notifying people to evacuate where necessary. The security personnel are also responsible for notifying the fire department. Security will also carry out all the necessary procedures to ensure that the fire does not spread to other areas of the building or property. In so doing the fire extinguisher may be activated in order to fight the fire if it is a fairly small one. The security personnel will also close doors to prevent the fire from spreading. In assisting with evacuation procedures the security will check records of staff and visitors who entered the building and ensure that they are properly accounted for. Assistance will also be provided to the firemen in terms of providing them with information that will better enable them to carry out their task. This is an action of protection and security and fulfils one aspect of the safety needs of society as explained in Maslow’s hierarchy of needs (Hess 2009). In terms of the prevention of fire the role of the security personnel is to ensure that the area is free from fire hazards. It is the role of the security to ensure that fire extinguishers are in place to deal with small fires and to ensure that activities which involve the use of fire are properly controlled and monitored and takes place in areas where it is considered safe. It is important that employees and visitors to an office or other business operations follow the rules in relation to hazardous materials which can cause fires. It is therefore important that security carry out the necessary checks in relation to these risks. The importance of law to the security officer and manager The role of the security officer and manager is to protect the individuals that they serve. In order to carry out the role as a security officer effectively, awareness of the laws governing the role and conduct of self is paramount. The security officer needs to be aware of what the law allows. Therefore, in protecting life and property regards should also be given to the laws that govern occupational health and safety. According to WSU (2006) the law gives legitimacy to private security and the primary reference in this regard is to case law such as Cervantez v. J.C. Penney. The security officer and security manager needs to be aware of their boundaries in terms of what they can and cannot do. The police are vested with certain authority that has been granted by the legislature and therefore has the power to arrest (WSU 2006). The security officer/ manager have no such powers and are therefore advised to work with the legal counsel. A security officer may be given the authority to search vehicles leaving and entering the property (WSU 2006). However, unlike the police seizure of a vehicle for not adhering to rules, this does not fall within the ambit of nether the security officer or the security manager’s legal rights. Knowledge of the law is therefore important as it will prevent both the security officer and the security manager from running afoul of the law. WSU (2006) indicates that the security manager should work with legal counsel and human resources (HR) in the organization in carrying out the security functions. They will provide the necessary guidance where rules and regulations are in place. However, if HR is being investigated then they cannot be depended to provide certain information (WSU 2006). The Occupational Health and Safety Act and its effect on organizational safety operations The Occupational Health and Safety Act (OSHA) provide hazard specific safety and health standards that employers must comply with. It has a positive effect on organizations as it requires the employer to provide a safe environment for employees to work in (OSHA 2007). The General Duty Clause of the Act requires that the employee provides employees with a work environment that is free from any hazards that are likely to result in death or serious physical harm. Some work environments involve the use of hazardous chemicals. There are rules governing the level of exposure that employees should be allowed. There are several ways in which hazardous materials can be released and the security officer is likely to play an important role in the efforts to respond to such emergencies (OSHA 2007). It is therefore important that they are familiar with this particular role. Employers must ensure that security personnel is aware of and have a good understanding of the possible release of hazardous substances and the risks that are associated with it. Security staff that is well trained will be able to provide the necessary alerts during an emergency and help to ensure that the proper procedures for communication and evacuation of employees are followed (OSHA 2007). It is therefore of extreme importance that the security officer in his role of providing security should be empowered to do so based on an awareness of the surroundings and the ability to identify risk. By doing so the security manager will be able to develop a risk management program that will allow security officers to effectively deal with any situation that may be encountered. The impact of federal law legislation on the security industry There are various Acts that help to guarantee the safety of different groups of people. Two of these Acts include The American with Disabilities Act of 1990 and the Civil Rights Act of 1990. While ensuring the rights of all Americans with disabilities in relation to their right to employment, the Act also looks at the security of this group of individuals in terms of their access to buildings and various kinds of facilities. Alterations are therefore required to existing buildings that are not equipped with various facilities for people with disabilities and new buildings are required to conform to new building codes. Like the American With Disabilities Act of 1990, the Civil Rights Act of 1990 ensured the rights and protection against discrimination of all groups of people. This too is a means of security against various forms of social abuse because of race. The law provides these rights and where they are not upheld the court reserves the right to pass judgment once the matter is brought to its attention. The police are empowered to deal with some aspects of discrimination where it results in physical abuse. However, the security industry is not so empowered except that it will take the necessary steps to ensure that the disabled are assisted in getting around a facility safely. Security will also take the necessary steps to ensure that discrirnination involving physical abuse is prevented. However, the security personnel are not empowered to make arrest. Conclusion The need for security became a matter of extreme importance to all members of society from as early as ancient times. It became even more significant in the Middle Ages when certain changes in the legislature meant that the arrangements in place could not continue to exist. Both the private security and the police became significant in their quest to prevent individuals form robberies, violence and abuse. Security officers became important in protecting businesses from all types of risk including crime and fire. The need also arose for the development of risk management programs in order to be better prepared to identify and resolve risks. The need for safety for all without fair of discrimination was emphasized in two important Acts in the United States. It meant that the security industry had to be even more alert to ensure the safety of the disabled in moving around and to ensure that employees were not discriminated against based their race and their disability. References D’Costa, A. (2012). A Practical Approach to Creating a Risk Management Plan. Retrieved from: http://www.brighthub.com/office/project-management/articles/2875.aspx. Last accessed 5th May 2012 Fischer, R.J., Halibozek, E and Green, G. (2008). Introduction to Security. 8th ed. USA: Butterworth-Heinemann Hess, K.M (2009). Introduction to Private Security. 5th ed. USA: Wadsworth/CENGAGE Learning O’Block, R.L., Donnermeyer, J.F and Doeren, S.E. (1991) Security and Crime Prevention. 2nd ed. USA: Butterworth-Heinemann OSHA. (2007). Preparing and Protecting Security Personnel in Emergencies. Retrieved from: http://www.osha.gov/Publications/3335-security-personnel.pdf. Last accessed 5th May 2012 Six, Karen and Kowalski, E. (n.d.) Developing a Risk Management Strategy: Five Steps to Risk Management in Nonprofit and Charitable Organizations. Retrieved from: http://library.imaginecanada.ca/files/nonprofitscan/kdc-cdc/guide_kowalski_risk_eng.pdf. Last accessed 5th May 2012 Steenkamp, D.G. (2002). The Role of Private Security in Crime Prevention. University of Zululand Institutional Repository. Retrieved from: http://uzspace.uzulu.ac.za/handle/10530/210?show=full. Last accessed 5th May 2012 Weber State University (WSU) (2006) Chapter 7: Security and the law. Retrieved 5th may 2012. http://ocw.weber.edu/Criminal_Justice/introduction-to-security/Chapter_07_lecture.htm. Last accessed 5th May 2012 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security Essay Example | Topics and Well Written Essays - 1750 words, n.d.)
Security Essay Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/social-science/1596200-security
(Security Essay Example | Topics and Well Written Essays - 1750 Words)
Security Essay Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/social-science/1596200-security.
“Security Essay Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/social-science/1596200-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Measures

The Electronic Submission Process and the Security Measures

This assignment focuses on the Electronic submission process and its advantages over classic paper solicitations, the Security Measures associated with it.... However, in order to get rid of these issues, companies or the authorities have taken several measures.... The differences may be in the form of security measure or it may appear in the form of interface display.... One of the major problems emerges in the form of security threat....
7 Pages (1750 words) Assignment

Implementing Network and Personnel Security Measures

Implementing Network and Personnel Security Measures 1.... Maintenance Plan for the Government Agency to Ensure Having the Latest Security Measures The maintenance plan concerning the installation of advanced network security devices is one of the essential steps for the government agency to uphold the security of its vital information.... The following are the primary activities of the maintenance plan for the government agency to ensure having the latest Security Measures: Monitoring performance of the network security devices as per their expected outcomes Ensuring better alignment of network security devices with the primary objectives of the government agency Confirming appropriate development of the network security devices installed within the agency Continuous minimization of the network down-time and, Minimizing IT related costs of the government agency Source: (Torstensson, 2010) a....
5 Pages (1250 words) Research Paper

Firewall Security Measures

This paper deals with the Security Measures in information technology.... Admittedly, layers 3 and 4 of OSI models use packet filtering as a firewall Security Measures, with IP address in the packets, and also the ports used to filter session that is admitted or otherwise drop.... … The author of the paper touches upon the security means within the information technology sphere....
13 Pages (3250 words) Essay

Security Recommendations After Security Breach

However, the huge costs involved go not mean taking chances with business network security especially given the rapidly expanding networks both commercially and… With these and other factors, security issue gains top priority for all companies where information technology use is inevitable.... As a security administrator of a major organization recently breached by social engineer, below are the Thesis: With network breaches being inevitable, small, medium, and large organizations must have security plans and standard operation procedures in place to prevent, detect, and respond efficiently to intrusions....
4 Pages (1000 words) Assignment

Microsoft's Security Measures

The paper "Microsoft's Security Measures" states setting a firm's agenda without proper security settings in place is inappropriate for most firms.... This clearly shows that Microsoft Corporation requires adequate Security Measures.... Security Measures used by Microsoft Corporation and Data Security from Hackers Most firms such as Microsoft Corporation are on the look for superior and successful ways of managing their safety infrastructure....
7 Pages (1750 words) Case Study

Hacking Strategies and Online Security Measures

This paper “Hacking Strategies and Online Security Measures” is aimed at identifying the various ways hackers use to penetrate computer systems, with the particular focus on the use of malware, social engineering tactics, cyberespionage, and advanced persistent threats (APT).... In one of the most recent attacks, details of which have been uncovered by Kaspersky Lab (a Russian cyber security company), the malware used to attack banks has been said to be one of the most sophisticated malware-based attack ever (Peralta 2015)....
10 Pages (2500 words) Research Proposal

Physical Security Measures to Address an Explosive Threat

This literature review "Physical Security Measures to Address an Explosive Threat" discusses a number of physical Security Measures, including wall security, protective glazing products and systems, perimeter protection, energy-absorbing systems, and floor-slab reinforcements.... From this time period, the discussion of buildings security has revolved around the physical Security Measures that may actually address explosive threats in all buildings across the United States and other parts of the world....
10 Pages (2500 words) Literature review

Security Measures in the Laboratory

… The paper "Security Measures in the Laboratory" is an excellent example of a research paper on engineering and construction.... The paper "Security Measures in the Laboratory" is an excellent example of a research paper on engineering and construction.... There are numerous different Security Measures, and all of them have different costs.... This paper provides a report on the Security Measures in the proposed laboratory based on the initial plan provided in the presentation....
19 Pages (4750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us