StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

CJ452 Security Planning and assessment - Essay Example

Cite this document
Summary
1.) The history of security services can be traced from the time of the grandeur of the Roman Empire. The Vigiles Urbani (city watchmen) and Cohortes Vigilum (cohorts of the watchmen) were initially assigned in Roman cities by Augustus Caesar to safeguard the empire against fires…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
CJ452 Security Planning and assessment
Read Text Preview

Extract of sample "CJ452 Security Planning and assessment"

Download file to see previous pages

They also sound the alarm (usually church bells) if there was emergency and to announce the time (Bradley, 2007). From being firefighters, security services in the earlier times have gradually transformed into curbing of criminal activities that have become more sophisticated and become more organized over time. In the United States, the US Secret Service was instituted as early as 1865 to suppress counterfeiting of currencies (Secret Service History, 2007). To provide national intelligence to senior US policymakers, President F.

Roosevelt established the Office of Strategic Services that was to become The Central Intelligence Agency (CIA) (History of the CIA, 2007). The September 11, 2001 attacks on the World Trade Center and the Pentagon by terrorists have spurred Pres. George W. Bush to from the Department of Homeland Security to protect Americans from terrorist activities of organized groups such as Al Qaeda. 2.) Risk as defined by Webster's Dictionary is "possibility of loss or injury" or "someone or something that creates or suggests a hazard" (2007).

It is widely used in different fields to suggest the possible loss and presence of danger. There are five types of security concerns: threat to life; to public health and safety; to property; to reputation, privacy and civil liberty; and to government and administration. Tight security mTight security measures, such as body search and use of advanced gadgets that will detect arms and deadly weapons are needed to ensure the safety of life of a person in a building. Sharp senses and high-tech gadgets can also be used to curb life threats within the community.

Tight quarantine and medical inspection in airports and seaports should be implemented to ensure safety against medical threats. Constant campaign immunization campaigns of government and other health agencies are also important in preventing the spread of highly communicable diseases. Installation of surveillance cameras and use of shoplifting detection tools are some of the methods used to prevent stealing and theft. Advanced security and anti-virus programs should also be installed in computers to prevent hacking and other data theft in cyberspace.

In line with this, since most personal documents nowadays are stored in computers, constant update of Internet and other network security devices are also imperative in protecting one's privacy and reputation. Gathering of data concerning destabilization, assassination, or terrorist threat is needed in government and administration security. 3.) Private security personnel have the task to "detect, deter, observe and report" any criminal activities or other security threats in the company or organization wherein they are assigned.

Their main obligation is to prevent crime within the boundaries of their assigned place and to enforcing company rules and regulations. They can also use their power to make a citizen's arrest against a criminal offender. They are required to have training in the usage of weapons, such as batons, firearms and pepper spray. They are also often trained to perform clerical jobs, such as preparing reports and taking accurate notes concerning the status of compliance of the company's personnel he is working at.

They are also provided with additional training to perform handcuffing and restraints; operate emergency equipments; and to perform first aid. Due to terrorist threats, most of them have undergone trainings in

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CJ452 Security Planning and assessment Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
CJ452 Security Planning and assessment Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/sociology/1508979-cj452-security-planning-and-assessment
(CJ452 Security Planning and Assessment Essay Example | Topics and Well Written Essays - 1000 Words)
CJ452 Security Planning and Assessment Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/sociology/1508979-cj452-security-planning-and-assessment.
“CJ452 Security Planning and Assessment Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/sociology/1508979-cj452-security-planning-and-assessment.
  • Cited: 0 times

CHECK THESE SAMPLES OF CJ452 Security Planning and assessment

Human Resource Management: cases of Barclays and Unilever

The research will compare Personnel Management and Human Resource Management, and then it will demonstrate the role of HR Manager, HR planning and recruitment and selection process and tell about approaches and exit procedure adopted by Barclays Company.... HRM focuses on the planning, scrutinizing and managing aspects of resources while personnel management was mainly about arbitrating amid the administration and workforce....
14 Pages (3500 words) Essay

Implementation of triage protocol for nurses

This paper seeks to provide evidence based literature review on triage protocol covering various aspects related to it.... The guidelines issued by the international bodies, articles published in the medical journals and books have been used for the purpose the study.... hellip; In the Literature Review Grid given under Appendix –III, the study/research type, method used or information available and the results and comments related to the source materials are given for highlighting the reliability of the materials used and its relevance to the study....
18 Pages (4500 words) Dissertation

Security Planning and Assessment

An essay "security planning and assessment" reports that one specific example of sustainable planning is the requirement that programs, policies, practices, and processes are integrated across levels of authority—that is, everyone should know about it.... nbsp;… The most important aspect of security assessment and planning is its sustainability.... Risk management framework establishing processes for combining consequence, vulnerability, and threat information to produce a comprehensive, systematic, and rational assessment of national or sector risk....
7 Pages (1750 words) Essay

Security Planning

good first step for prevention in all workplaces consists of a general assessment designed to evaluate the presence of any specific risks of violence, both from within and outside the organization.... Such an assessment will help the organization to fully understand the particular safety and security needs of the workplace - information that will help shape its prevention efforts.... To what degree is workplace violence a problem in the United States What factors contribute to it What, if anything, can be done to reduce the incidence of violent crime in the workplace Do private security organizations play a role in the solution ...
14 Pages (3500 words) Assignment

Information Security Issues

hellip; As the technology enhanced it brought in some technological issues such as Information security Risk.... The security Risks involved with the various information systems need to be addressed in order to better the performance of the organization in the dynamic global market.... The management of Information security Risks and to implement various methodologies to mitigate the security risks is a growing challenge in the filed of Information technology....
11 Pages (2750 words) Essay

Heritage Education and Interpretation

Have you made a substantial contribution to the planning and... assessment Details ... emember all parts of the assessment are compulsory.... With care and a little planning the reader should be able to complete all the tasks by the end of you placement....
4 Pages (1000 words) Dissertation

Background of Performance Management Program

The planning process starts with a clear and defined goal set before the employee along with the expectations.... The process of review is part of the planning process where there is a two-way communication between the supervisor/manager and the employee with a focus on development.... Companies are no longer able to offer job security and hence a new relationship needs to be developed that rewards performance and skills which contribute to personal growth as well as improve organizational efficiency....
20 Pages (5000 words) Research Paper

Facing Environmental Challenge and Encouraging United Arab Emirates in Sustainable Urban Development

The UAE is the leading hub of peace, security, stability, and commerce in the Arabian Gulf region.... This report "Facing Environmental Challenge and Encouraging United Arab Emirates in Sustainable Urban Development" discusses Population growth globally as a call to awakening that countries should create ways to accommodate the people and businesses....
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us