Free Essay SamplesAbout UsContact Us Order Now

Mid Term Essay Questions

0 / 5. 0

Words: 825

Pages: 3

96

Mid Term Essay Questions
Student name
University affiliation
Date
Question One
The growth of Security in the United States can be evaluated from the 19th century. The manner in which threats have been dealt with over the years shows that changes have occurred to deal with the increase in insecurity directly and to protect various things that ought to be protected. Security has improved to the extent that it is no longer upon the police to protect the people. The sprouting of private security in the 19th century due to the incapability and or unwillingness of the police to deal with emerging security issues has extended the notion of security hence its growth (Nemeth, 2011).
The reasons for the professionalization of the field of private security include; an increase in crime, the attention given to crime occurrences by the media which sensitized people about the need to protect themselves and inadequate resources within the police force causing them to be overwhelmed by the increasing crime (Gericke, 2012). The establishment of bodies and programs that are aimed at training people in security matters further fueled the growth in the professionalization of private security (Gericke, 2012).
Question Two
The factors that increase career opportunities in the security sector are: Firstly, increased digitization and reliance on technology. This has brought about new threats in the form of hackers. Hence, the need for a professional experienced in the field to deal with the problem, causing a career niche (Security, n.

Wait! Mid Term Essay Questions paper is just an example!

d). Secondly, due to the increase of security threats in the country, people find it necessary to contract private security to supplement the police. Thirdly, with the United States being among the wealthiest countries in the world, regarding GDP (Spaulding Security and Investigations, 2016), many people are acquiring wealth and employing more people to work behind the scenes. Therefore, there is an increased need for protection for both the people and property as well as investigations for the people employed to work behind the scenes; these investigations are mostly done by private security.
Question Three
Differences between proprietary and contractual guard services
Proprietary security services involve a company hiring security personnel such that they become part of its general staff. Whereas Contractual guard services involve a company contracting an independent security firm that works together with it to achieve its security goals (Gericke, 2011).
In the case of proprietary security, the directors of the company have direct control over the guards. That is, they have the right to dictate their terms of service just like other employees. In contrast, contractual security is independent. Here, the guard is only accountable to the terms of their contracts with the security firm and not the company.
Further, the cost of employing contractual guards is lesser than that of employing proprietary guards (Gericke, 2011). This is because, in contractual guard services, the company does not have to incur costs of the guards’ equipment, training, vacation or insurance, while in proprietary security, the company must commit all these costs as the guard is an employee and not an independent contractor.
In addition to this, it is also argued that proprietary security guards are harder to manage than contractual ones (Gericke, 2011). This is because proprietary security guards are a part of a larger organization, the company. Whereas contractual security guards are part of a small organization involving a few people.
Further, proprietary guards may be more efficient as the guards are subjected to a rigorous hiring process that ensures that they are up to par. Contractual guards may be useful as well but bring about integrity problems about the sharing of company information with outsiders.
Question Four
Key tasks in organizing the security function
The first task is planning. The threats are identified and their effects assessed about the business (Gericke, 2012). This ensures that the security function is tailored to suit the business’ needs and that some parts of it do not become redundant.
The second task is the establishment of the responsibilities undertaken by each person. That is, who does what and who is accountable for what. The importance of this is to ensure accountability in case of loss.
The third task is the organization of the security department. This entails allocation of specific duties to specific persons (Gericke, 2012). This ensures that the right people are brought on board. This also involves the training and establishment of responsibilities. This ensures that the personnel is aware of their roles as well as placing the best people for the job at the right position.
The fourth task is supervision done by the appointed Chief Security Officer. The CSO is in charge of establishing the code of conduct in the department and maintaining the balance between the security guards and the other employees (Gericke, 2012).
The fifth and the last task is implementation and evaluation. The CSO is expected to bring to the attention of the employees the importance of the security and the role they are to play. This prevents alienation of the employees from the security function. The CSO then undertakes the evaluation of the business’ security.
Question Five
Importance of accounting procedures in security survey
Accounting is part of every business. Therefore, it should be included in the security survey to identify instances that may provoke crime, reward it or provide an excuse for criminal behavior (Benson, n.d). Accounting procedures ensure that employees do not engage in activities that result in financial crimes.
The importance of security files in planning emanates from the fact that there is a need to know what the business is being protected from. Security files will enable the planners to assess any prior risks that the business has encountered, the counter-means that proved efficient and what should be improved or be done away with.
References
Benson, C. (2018). Security Planning. Retrieved from Microsoft Developer: https://msdn.microsoft.com/en-us/library/cc723503.aspxGericke, JJ. (2011). What are the differences between proprietary and contractual security services? Retrieved from https://www.scribd.com/document/73879413/What-Are-the-Differences-Between-Proprietary-and-Contractual-Security-Services  
Gericke, JJ. (2012). What are the key tasks in organizing the security function? The Security Manager. Retrieved from http://thesecuritymanager.blogspot.co.ke/2012/08/what-are-key-tasks-in-organizing.html  
Nemeth, Charles P. (2011). “Private Security and the Law.” 4th Edition. New York. Elsevier.
Spaulding Security and Investigations. (2016). The Historical Growth of Private Security in the United States, Retrieved from https://www.spauldinginvestigations.com/2016/02/19/the-historical-growth-of-private-security-in-the-united-states/

Get quality help now

Top Writer

Alton Sloan

5.0 (251 reviews)

Recent reviews about this Writer

I have ordered a college case study from this company, and I’m on cloud nine! It is written in an extremely professional manner, doesn’t contain any mistakes, and is just perfect. Thank you for saving my grades!

View profile

Related Essays

Supplier diversity

Pages: 1

(275 words)

Career Development

Pages: 1

(275 words)

Legal Pitfalls of sonography

Pages: 1

(275 words)

Discusssion

Pages: 1

(275 words)

High Stake Testing

Pages: 1

(275 words)

New York City Elite Model

Pages: 1

(275 words)

Pros and Cons of a Public Option

Pages: 1

(275 words)

Proofreading

Pages: 1

(275 words)