APPROVED SCHOLARS

BCJ 4385, Workplace Security 1

BCJ 4385, Workplace Security 1

Course Learning Outcomes for Unit VI Upon completion of this unit, students should be able to:

Can’t Find the Right Words? We’ll Help You Write a Winning Essay.

Tell us about your paper and we will find the best writer for your essay.

Write My Essay For Me

1. Evaluate security problems within private and public institutions and cultivate applicable security measures.

2. Analyze contemporary security investigation tactics. 3. Examine intellectual property and security measures taken to protect business intelligence and

proprietary information.

Reading Assignment Chapter 9: Investigations, Intelligence Operations, and Reporting Chapter 10: Institutional Security, Disaster Recovery, and Executive Protection

Unit Lesson General Overview When people hear the term investigation the first thing that comes to mind is what they saw on a dramatized crime show or TV program. In actuality there are several types of investigations. There are human resource investigations that investigate issues related to employee backgrounds, workplace violence, employment discrimination, worker compensation, sexual harassment, sexual abuse, substance abuse, and wrongful termination. There are also personal injury and property damage investigations, and criminal investigations which include undercover investigations. Another aspect of criminal investigations is business crime investigations which involves investigations concerning crimes committed against businesses by employees (e.g., fraud and embezzlement), crimes committed against businesses by outsiders (e.g., arson and robbery), and crimes committed by individuals on behalf of businesses (e.g., tax evasion and commercial bribery). Information collected in investigations is derived from various sources which “include physical evidence, specialized databases, victims, witnesses, suspects, records, informants, and the Internet” (Ortmeier, 2013, p. 212). Once information is gathered it is then analyzed. The analysis of physical evidence is associated with forensic science and criminalistics. Such analyses are traditionally conducted in the laboratory. DNA testing is one of several analysis techniques used by forensic scientists. Other techniques include psychological profiling, anthropological strategies, forensic accounting, biology, chemistry, ballistics testing, and many more. Every investigation is governed by a code of conduct. Both private and public law enforcement and security agencies are governed by investigative statutes which govern overt and covert investigative techniques (e.g., the Omnibus Crime Control and Safe Streets Act of 1968 and the Employee Polygraph Protection Act of 1988). While the fourth amendment to the Constitution only restricts government conduct, private and nongovernment employees may also have an expectation of privacy if their employers knowingly or knowingly create an expectation of privacy among their employees. Intelligence operations are not limited to criminal investigations. They also include business intelligence operations, which is also known as competitive intelligence. This form of intelligence is designed to assist businesses in controlling losses that result from competition. Business intelligence is a legitimate and ethical activity. Both internal and external sources can be accessed to obtain information about competing organizations strategies such as sales promotions, employee recruitment, pricing, distribution center strategies, and advertising.

UNIT VI STUDY GUIDE

Security Investigations, Institutional Security, Disaster Recovery, and Executive Protection

BCJ 4385, Workplace Security 2

UNIT x STUDY GUIDE

Title

Criminal intelligence is used to protect against actual criminal activity and possible threats of criminal activity, such as industrial espionage. An extension of criminal intelligence is national intelligence which focuses on collecting information about foreign entities viewed as potential threats to the nation. Counterespionage strategies prevent espionage using covert and overt strategies which “involves application of appropriate physical, personnel, and information security measures as well as a thorough investigation of all actual intent to security breaches” (Ortmeier, 2013, pp.220-221). Documentation of incidents, interviews, accidents, investigations or criminal activity is instrumental in assisting security personnel in addressing security issues. Such documentation is useful in the development of reports (contact, incident, narrative, and organization – specific) which are one of the most important outcomes associated with investigations. To maximize the usefulness of reports, reports must be well organized, grammatically sound, clear and concise, free of unnecessary jargon, and include crucial information (e.g., how the report writer was involved in the incident, details about what happened, information about all the parties involved, statements from the involved parties, descriptions of the scene where the incident occurred, descriptions of evidence, damage or theft, and any actions conducted by personnel on the scene). There are some distinctions and exceptions to general security management principles, and loss prevention philosophies and practices. For example, banking and financial institutions are susceptible to threats and loss of assets in physical and digital environments. Funds can now be transferred electronically without any paper trails. In addition, the types of financial institutions are as diverse as the way funds move across these entities. In 1968 the Bank Protection Act was passed by the U.S. Congress to assist in reducing the vulnerability of financial institutions. However, the act only established minimal guidelines and is not effective in controlling technological threats to financial assets. High profile cases involving the murder of court personnel walking to work and even the murder of court personnel and law enforcement in the perceived security of their homes by defendants in the cases they were associated with exemplifies the need for courthouse and courtroom security. To respond to these increase threats many courthouses and courtrooms have increased security measures such as metal detectors, state- of-the-art surveillance systems, security glass, secured and covered entrances and parking decks for court personnel, and the use of sheriff deputies as courthouse and courtroom security. Educational institutions also require unique security preparations. It was once believed that schools were safe havens into which the threats from the outside world could not penetrate. However, recent events in which children at schools have become the victims of murder at the hands of lone gunman and/or have died as a result of natural disasters that have impacted schools critically exemplify the need for special security measures at educational institutions. Violent crime, sexual assaults, homicides, thefts, gang and drug activity, and many other threats to institutional security exist across all levels of education. However, the age of the students, structure of the facilities, the number and characteristics of staff, and the access of members of the community very across all levels of education. Thus, different criteria must be considered for elementary and secondary schools and colleges and universities. Many states have created safe-school zones. The federal government has created informational material such as a guide entitled Threats Assessments in Schools published by the U.S. Secret Service. Agencies have also developed informational pages on their websites concerning school safety. Legislation like the Crime Awareness And Campus Security Act of 1990, also known as the Clery Act, have been established and require post-secondary institutions to gather and post the current crime statistics so that students, parents, faculty and staff all were on the status of crime on their campuses. College and university informational guides also include sections about safety security measures available at their featured colleges and universities. Healthcare facilities also have unique security concerns. Security must be maintained in order for healthcare facilities to function. There are numerous international, federal, state, and local requirements that mandate the provision of a secure healthcare environment. Healthcare security covers many facets such as facilities, personnel, equipment and supplies, service provision, records, and mobile healthcare units. Hospitality security, entertainment security, disaster recovery, and executive protection are other areas which require specific security considerations. For example, the hospitality industry has invested significant amounts of money into making its establishments attractive to its guests. However, in so doing many internal controls were not established. We can all think of people we know who have come home from a hotel with linen,

BCJ 4385, Workplace Security 3

UNIT x STUDY GUIDE

Title

dishes, and other items that were not intended for guests take home in their suitcases. In addition to loss of assets, the hospitality industry is also susceptible to accidents, fires, and natural disasters. To respond to these unique threats to security key control, alarm systems, security cameras, and the employment of security personnel are usually implemented. The entertainment industry (sporting events, recreation areas and their components, racetracks, movies and music, ships and boats, casinos) also has its set of unique threats to security that are associated with the size of the venue, the openness of the venue facilities, and the number of people that attend the events. Disaster recovery is a specialty area in the field of security management that focuses on managing organization-related disasters (damages that result from natural and environmental disasters) to ensure that services are restored quickly and customers are not loss due to dissatisfaction with the services provided during disaster recovery efforts. Lastly, protection of executives, citizens, and political leaders is a continual challenge. Incidences of executive kidnapping continue to increase abroad. Acts of terrorism against citizens is on the rise in the United States, and political leaders are more at risk of being injured or killed by gunfire during public appearances and at their private residences. Therefore, it is important that effective executive protection programs include 1) risk assessments that accurately identify threats, the likelihood of the threat being realized, and assessment of the damage that would result if the threat was realized; 2) advanced procedures that implement security arrangements before, during, and after the executive travels; and 3) protective operations which involve the accompanying of the executive by executive detection personnel who are equipped and ready to use counter surveillance and defensive tactics to protect the executive.

Reference Ortmeier, P.J. (2013). Introduction to security: Operations and management (4th ed.). Upper Saddle River,

NJ: Pearson. Questions to Consider

1. What are the different types of investigation? 2. What are the different sources of information collected in investigations? 3. What is the role of forensic science in the analysis of evidence collected in investigations? 4. What statutes govern investigative conduct? 5. How does business intelligence different from criminal intelligence? 6. How is business intelligence different from industrial espionage? 7. What are the different types of reports that can be utilized in a security investigation? 8. What are the key elements of report writing and why is report writing important? 9. What unique threats to security do banks and financial institutions face?

10. What unique security issues must be considered when developing security measures for educational institutions?

11. What statutes govern the maintenance of security in healthcare environments? 12. What types of issues threaten safety and security in the hospitality industry? 13. What factors complicate the maintenance of security in the entertainment industry? 14. What is the role of disaster recovery and reducing the loss of assets associated with organizations

that have been impacted by a disaster? 15. What are the key components of an effective executive protection program?

Learning Activities (Non-Graded) Non-graded Learning Activities are provided to aid students in their course of study. You do not have to submit them. If you have questions, contact your instructor for further guidance and information.

1. Watch the local news at the same time every day for a week. Make note of the various types of investigations that are mentioned. Keep track of how many investigations fall into each category, who conducted the investigations, what information was gathered in the investigations, and the outcome of

BCJ 4385, Workplace Security 4

UNIT x STUDY GUIDE

Title

the investigations. Review your findings to access the most frequent types of security-related investigations that are conducted in your community.

2. Search the Internet for any current events that talk about industrial espionage. Review the events to identify what business intelligence and/or counter espionage strategies were utilized. Prepare a mock report of your findings and include suggestions for preventing future espionage attacks on the organization.

3. Use the search engine of a national or local newspaper source to chronologize the threats to security that have occurred in banking and financial institutions, courthouses and courtrooms, and educational institutions. Assess the key components of maintaining security that were compromised and/or absent. Outline strategies that you think would reduce and/or eliminate such threats in the future.

4. Conduct a historical analysis of homicides that have occurred in courtrooms and courthouses or educational institutions in the United States. Make note of any trends that become evident as you conducted your analysis. Explore whether identify threats appear to be diminishing, staying the same or increasing. Outline the existing strategies being used and make note of any strategies that in your opinion should be implemented.

5. The next time you attend and entertainment activity take note of the various security measures that are utilized. Assess whether the measures discussed in the text were utilized and, in your opinion, whether there were measures that were or were not utilized that seemed more appropriate for the venue than what was discussed in the text.

6. Imagine that you were the chief executive protection agent for one of the U.S. Supreme Court justices and that you have recently been informed that the justice will be attending an international court convention in London, UK and then will be going on vacation in South Africa. You have been given a 72-hour notice of these plans and have been ordered to provide a briefing of the executive protection program that you will implement to the Attorney General of the United States no later than 12 hours prior to your departure. Clearly outline the executive protection program that you implement.

SOURCE: APPROVEDSCHOLARS.COM
APPROVEDSCHOLARS – PLACE YOUR ORDER HERE: https://www.approvedscholars.com/place-order/

BEST-ESSAY-WRITERS-ONLINE

Havent found the Essay You Want?
We Can Assist
The Paper is Written from Scratch Specifically for You

Order Now

    WHY APPROVEDSCHOLARS.COM

  • Confidentiality & Authenticity Guaranteed
  • Plagiarism Free Content Guarantee
  • APPROVEDSCHOLARS Guarantee Timely Delivery of All Papers
  • Quality & Reliability
  • Papers Written from Scratch and to Your Instructions
  • Qualified Writers Only
  • APPROVEDSCHOLARS Allow Direct Contact With Your Writer
  • Using APPROVEDSCHOLARS.COM Means Keeping Your Personal Information Secure
  • 24/7 Customer Support

GET QUALITY ESSAY HELP AT: https://www.approvedscholars.com/

ORDER A PAPER WRITTEN FROM SCRATCH AND TO YOUR EXACT INSTRUCTIONS (APPROVEDSCHOLARS.COM – For 100% Original Content)

PLACE YOUR ORDER

Share with friends