SlideShare a Scribd company logo
1 of 8
Concentric rings of security can be one of the best approach
methods to install any security program in its entirety and has
been updated by the use of technologies and processes such as
CPTED, the understanding of the end product is a not as easy as
its name sounds. The use of these differing items can help ball
the end product up into the most effective outcome giving the
parameters that are directed by those in control and
understanding the difference of needs to the area that you are in
can make it even better.
In making any portion of any product that goes into the security
methodology. The use of items such as CPTED and critical
thought processing in assessments make the attributed effort of
security an intrinsic sectioning of the spaces involved. Knowing
how to see and predict faults in systematic collapses of areas
that might allow for a bypass of the procedures can lower the
effectiveness of the security in any given area. This process of
concentric rings of security can pinpoint the areas effectiveness
and their need for additional security protocols and processes in
a given section of the concentric rings.
A reminder in this process, is that the areas’ location can affect
the total situations needed to be put into place in the areas in
question. The targeted secure item needs to heave different
technology and stricter procedures than someone entering into
the perimeter of a complex. Things like the use of Identification
card scanners might work in the lower ring or outer ring, but the
more you peel back the rings and go deeper this would not be an
effective deterrent into the inner most ring that would be
beneficial to the person entering into it, and not the company
protecting it.
Using some of the references that I have listed below can add to
the thought process in my paper in the fact they are considered
to be productive members in their specialized profession. These
authors and groups allow for a complete understanding of their
individual design systems and how they can add to their speci fic
field by integrating such thought processes that would allow for
the personal growth of those involved in the areas to be
protected.
Some of the references give instruction on how the government
had to take consideration into protecting its own facili ties in
such a way to prevent future attacks and their potential damage
and was produced after the bombing of the Alfred P. Murrah
Federal Building in Oklahoma City, Oklahoma. The idea was to
lower the potential number of injuries involved, harden the
structures, and then keep would be criminal characters from
entering into such facilities. A known target would be the
central concern of the concentric rings of security.
References:
Aasmae, K. (2018, October 28). Security: After Estonia's ID-
card train wreck this identity app is taking Baltics by storm.
ZDNet, p. 1. Retrieved
from https://www.zdnet.com/article/security-after-estonias-id-
card-train-wreck-this-identity-app-is-taking-baltics-by-storm/
Cregg, J. (2018, August 01). A Study of CPTED Principles and
their Relationship to Crime Risk in Beaumont, Texas. Texas
State University, p. 1-76. Retrieved
from https://digital.library.txstate.edu/bitstream/handle/10877/7
705/Cregg-DRFinal.pdf?sequence=1&isAllowed=y
Meyer, C. (2020, October). At Rest, At Risk. Security
Management, 20(10), 30-37.
Macano, K. (2018, January 01). Crime Prevention Through
Environmental Design [CPTED]: Designing Out Opportunity
and Fear. Center for Public Safety, p. 1-6. Retrieved
from https://www.rit.edu/liberalarts/sites/rit.edu.liberalarts/files
/docs/CRIM%20Resources/Crime%20Prevention%20Through%2
0Environmental%20Design%20%5BCPTED%5D-
%20Designing%20Out%20Opportunity%20and%20Fear.pdf
Godown, J. (2013). The CompStat Process: Four Principles for
Managing Crime Reduction . The Police Chief Magazine, 1(1),
1. Retrieved
from https://www.iadlest.org/Portals/0/Files/Documents/DDAC
TS/Docs/The%20CompStat%20Process.pdf
Practice Profile: Closed Circuit Television (CCTV)
Surveillance. (2020). Retrieved September 12, 2021. Retrieved
from https://crimesolutions.ojp.gov/ratedpractices/25#pd
U.S. Marshals Office, n. DOJ. (1995). Vulnerability Assessment
of Federal Facilities (156412 C.2). Retrieved August 29, 2021,
from DOJ,
website: https://www.ojp.gov/pdffiles1/Digitization/156412NCJ
RS.pdf
General Security Risk Assessment Guidelines. (2021). Retrieved
October 17, 2021,
from https://www.asisonline.org/publications--
resources/standards--guidelines/gsra/
Management System for Quality of Private Security Company
Operations-Requirements with Guidance. (2021). Retrieved
October 17, 2021,
from https://www.asisonline.org/publications--
resources/standards--guidelines/psc1/
Mackay, R. (2017). Lessons from Manchester and Paris:
Physical Security for the Entertainment Industry and Executive
Protection: Iconic entertainers will remain attractive targets for
terrorist attacks because they attract substantial crowds and
promote social norms and values that conflict with terrorists'
worldviews. Security, 54(9), 54-. Retrieved from https://www-
proquest-
com.ezproxy1.apus.edu/docview/2108801853/9B8E4B406BC44
126PQ/1?accountid=8289
Hello Dr. Aguiar and Classmates,
For this week’s forum, we were asked to discuss the
project topic, thesis statement, and main points being
researched. For my capstone project, I will be highlighting the
active shooter incident at Stoneman Douglas High School in
Parkland, Florida. The Parkland shooting occurred on February
14, 2018, where the perpetrator Nikolas Cruz killed 17 people.
The Parkland shooting is considered one of the deadliest
shootings in modern history, and research shows that many
countermeasures could have prevented the incident. This
research paper will use the Parkland incident as a baseline of
what possible shortfalls occurs when preventive a school
shooting. I choose this subject matter because school shootings
have played a significant role in my life. I was in National
Incident Management System (NIMS) School at the time of the
Sandy Hook shooting. I was able to understand the response
procedures of an active shooter and how subject matter experts
determine the motives of the perpetrator.
The thesis statement that I will be using in the capstone
project will be “Innumerable active shooter incidents will
continue to occur in the United States unless law enforcement,
educators, and security professionals develop countermeasures.”
The purpose of the thesis statement is to narrow down the
spectrum of research. I will be using the mixed research method
of research while focusing on the four quantifiable categories
consisting of school administrator’s responsibilities, law
enforcement, and security professional integrated response, the
significance of school architecture, and preliminary mental
health detection. When it pertains to school administrators’
responsibilities, I will be utilizing research from Dr. Jeff
Daniels and his published research titled The Counseling
Psychologis. The publication states that trends found in active
shooter incidents dating back to Columbine High School have
remained consistent. For example, Dr. Daniels believes a root
cause for an adolescent perpetrator is violent influences like
social media or video games. Dr. Daniels concludes that when a
child is exposed to a violent experience, they become
desensitized to tragedy. With Dr. Daniel’s research, I will be
able to validate my thesis by showing the need for school
administrators to take action.
An additional academic source is from author James
Seebock and his publication named Responding to High-Rise
Active Shooters. The information is structured to assist law
enforcement officers and security professionals’ ineffective
response to an active shooter. It is vital to show the
advancements in emergency services response and compare
what effective procedures are. This source balances the need for
fast emergency response in order to reduce the loss of life in an
active shooter. Mr. Seebock has contributed too many
advancements in law enforcement response. For example, in
1999, law enforcement officers would treat an active shooter as
a barricaded suspect, meaning that they would not make entry.
Mr. Seebock’s research has shown that immediate entry and a
“direct to threat” mindset has reduced the loss of life.
The last main point focuses on the preventive measures
taken when architecturally building a school. The concept
Crime Prevention through Environmental Design (CPTED) is
utilized in new construction throughout the world. When it
pertains to schools, the preemptive placement of landscape can
contribute to preventing an active shooter. Professor Todd
Schneider describes in his book CPTED 101: Crime Prevention
through Environmental Design--The Fundamentals for Schools
the need for schools to place walkways, access roads, and
common student areas in a restricted posture. This writing is
imperative to justice the thesis because it is the first line of
defense when it comes to preventives. Overall, these categories
of research will show trends and provide insight on how to
prevent a high school, active shooter.
-Bryan
Reference
Daniels, J. A., Volungis, A., Pshenishny, E., Gandhi, P.,
Winkler, A., Cramer, D. P., & Bradley, M. C. (2010). A
qualitative investigation of averted school shooting rampages.
The Counseling Psychologist, 38(1), 69-95.
Schneider, T. (2010). CPTED 101: Crime Prevention through
Environmental Design--The Fundamentals for Schools.
National Clearinghouse for Educational Facilities.
Seebock, J. (2018). Responding to High-Rise Active Shooters.
Homeland Security Affairs.
The public’s perception of what the primary roles of a security
officer/manager and that of a law enforcement officer maybe
drastically different from reality. Without a doubt there are
distinct differences between the two (2) types of law
enforcement. Primary roles of security officers/managers place
an emphasis on “the protection of assets, immediate deterrence,
and commercial enforcement.” (Nemeth, 2011) Understanding
that security officers/managers are charged with the duty to
protect the entity of which they are employed and/or their assets
while law enforcement officers (LEO’s) have society watch
over, naturally points out gaps in enforcement coverage. Many
of the primary roles of law enforcement officers (LEO) fill
these gaps. For example, LEO’s typically take an oath to protect
and serve the public. This means they focus on matters
concerning citizens, whereas a security manager focuses more
on their clients. Their guiding principle for primary roles is
established within the laws and statues of their jurisdiction.
This gives them a very large scope of responsibility from traffic
control, sexual assaults to murder. Although both types have a
vested interest in crime prevention. LEO’s primary roles endow
them with the authority to apprehend, and make arrest foll owing
a crime.
A security officer/manager may be held liable for their actions
even if it’s in accordance with their duties. Many of them are
faced with confrontational employees, clients and even
student’s or faculty members. On many college campuses across
America, security officers are employed and often tasked to
handle crowd control for special events. In the event that a
physical altercation occurred and the security officer/manager
caused injury to someone while trying to diffuse the situation
the injured party may seek a tort claim for assault. Likewise,
they may be held liable for the duration of time they have
detained a person. Given the same example above, if the
security officer/manager detained one of the agitators of the
altercation and then questioned them for over an hour it, “can
give rise to the claim of false imprisonment.” (Nemeth 2011)
References:
Nemeth, C. (2011). Private security and the law. Elsevier
Science & Technology. https://ebookcentral.proquest.com
Good afternoon class,
This week we looked at the relationship of private security and
law enforcement.
The role and responsibility of private security is to primarily be
a deterrent. The simple presence of a security officer can reduce
the likelihood of crimes. When a crime does occur, often the
security officer is the first responder. In this situation it is up to
the security to maintain a safe scene, identify and isolate
witnesses, perform crowd control measures and depending on
training and needs, assist the injured. Security officers first
objective is to ensure the well-being of the client or site where
posted. That could include securing merchandise, protecting
employees, buildings or information. Security officers are not
responsible for eliminating an armed hostile threat, they are
responsible for preserving the lives of themselves and others
surrounding them.
When it comes to law enforcement, they are trained to eliminate
hostile threats. When law enforcement enters a scene where the
security has identified a suspect and separated witnesses, the
law enforcement agency will often take over the scene as they
can conduct official investigations. Depending on the laws
around private security in any given region, it is a general idea
that security officers are not authorized to conduct intensive
interviews or search individuals. Law enforcement is able to
recite Miranda rights and make official arrests while security
can only make a citizen arrest.
Security officers can be liable in their actions if they are
performing criminal activity, working against their agency
policies or client policies. This includes negligent performance
of their duties, wrongful or unauthorized use of force and many
other questionable activities. If a security officer used force to
handle a situation that posed no threat to his or her life or the
life of those around the situation, their agency may not be able
to defend their actions, putting the officer as the liable party.
Some private security agencies will not stand behind their
officers when they use force, even if the force is relatively
justified.
Regards,
Jessie
References
Nemeth, C. (2011). Private security and the law. Elsevier
Science & Technology.

More Related Content

Similar to Concentric rings of security can be one of the best approach metho

NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk ModelsDavid Sweigert
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxcockekeshia
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?IJCNCJournal
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docxhealdkathaleen
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docxtodd271
 
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...Nicola Marae Allain, PhD
 
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...IJNSA Journal
 
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...IJCI JOURNAL
 
Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...IJCNCJournal
 
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...IJCNCJournal
 
Reliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docxReliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docxcarlt4
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...IJECEIAES
 
Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...
Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...
Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...Gordana Dodig-Crnkovic
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Managementijitcs
 
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...IJCSES Journal
 
Chapter 8 - External Threats and CountermeasuresSecurity a.docx
Chapter 8 - External Threats and CountermeasuresSecurity a.docxChapter 8 - External Threats and CountermeasuresSecurity a.docx
Chapter 8 - External Threats and CountermeasuresSecurity a.docxchristinemaritza
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...IJNSA Journal
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxduketjoy27252
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 

Similar to Concentric rings of security can be one of the best approach metho (20)

NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docx
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
 
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
 
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
 
Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...
 
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
 
Reliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docxReliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docx
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...
 
Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...
Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...
Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Management
 
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
 
Chapter 8 - External Threats and CountermeasuresSecurity a.docx
Chapter 8 - External Threats and CountermeasuresSecurity a.docxChapter 8 - External Threats and CountermeasuresSecurity a.docx
Chapter 8 - External Threats and CountermeasuresSecurity a.docx
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 

More from LynellBull52

· · · Must be a foreign film with subtitles· Provide you wit.docx
· · · Must be a foreign film with subtitles· Provide you wit.docx· · · Must be a foreign film with subtitles· Provide you wit.docx
· · · Must be a foreign film with subtitles· Provide you wit.docxLynellBull52
 
·  Identify the stakeholders and how they were affected by Heene.docx
·  Identify the stakeholders and how they were affected by Heene.docx·  Identify the stakeholders and how they were affected by Heene.docx
·  Identify the stakeholders and how they were affected by Heene.docxLynellBull52
 
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docxLynellBull52
 
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docxLynellBull52
 
· Week 10 Assignment 2 SubmissionStudents, please view the.docx
· Week 10 Assignment 2 SubmissionStudents, please view the.docx· Week 10 Assignment 2 SubmissionStudents, please view the.docx
· Week 10 Assignment 2 SubmissionStudents, please view the.docxLynellBull52
 
· Write in paragraph format (no lists, bullets, or numbers).· .docx
· Write in paragraph format (no lists, bullets, or numbers).· .docx· Write in paragraph format (no lists, bullets, or numbers).· .docx
· Write in paragraph format (no lists, bullets, or numbers).· .docxLynellBull52
 
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
· WEEK 1 Databases and SecurityLesson· Databases and Security.docxLynellBull52
 
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docxLynellBull52
 
· Unit Interface-User Interaction· Assignment Objectives Em.docx
· Unit  Interface-User Interaction· Assignment Objectives Em.docx· Unit  Interface-User Interaction· Assignment Objectives Em.docx
· Unit Interface-User Interaction· Assignment Objectives Em.docxLynellBull52
 
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docxLynellBull52
 
· Question 1· · How does internal environmental analy.docx
· Question 1· ·        How does internal environmental analy.docx· Question 1· ·        How does internal environmental analy.docx
· Question 1· · How does internal environmental analy.docxLynellBull52
 
· Question 1Question 192 out of 2 pointsWhat file in the.docx
· Question 1Question 192 out of 2 pointsWhat file in the.docx· Question 1Question 192 out of 2 pointsWhat file in the.docx
· Question 1Question 192 out of 2 pointsWhat file in the.docxLynellBull52
 
· Question 15 out of 5 pointsWhen psychologists discuss .docx
· Question 15 out of 5 pointsWhen psychologists discuss .docx· Question 15 out of 5 pointsWhen psychologists discuss .docx
· Question 15 out of 5 pointsWhen psychologists discuss .docxLynellBull52
 
· Question 1 2 out of 2 pointsWhich of the following i.docx
· Question 1 2 out of 2 pointsWhich of the following i.docx· Question 1 2 out of 2 pointsWhich of the following i.docx
· Question 1 2 out of 2 pointsWhich of the following i.docxLynellBull52
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
· Strengths Public Recognition of OrganizationOverall Positive P.docx
· Strengths Public Recognition of OrganizationOverall Positive P.docx· Strengths Public Recognition of OrganizationOverall Positive P.docx
· Strengths Public Recognition of OrganizationOverall Positive P.docxLynellBull52
 
· Part I Key Case SummaryThis case discusses the Union Carbid.docx
· Part I Key Case SummaryThis case discusses the Union Carbid.docx· Part I Key Case SummaryThis case discusses the Union Carbid.docx
· Part I Key Case SummaryThis case discusses the Union Carbid.docxLynellBull52
 
· Perceptual process is a process through manager receive organize.docx
· Perceptual process is a process through manager receive organize.docx· Perceptual process is a process through manager receive organize.docx
· Perceptual process is a process through manager receive organize.docxLynellBull52
 
· Performance Critique Assignment· During the first month of.docx
· Performance Critique Assignment· During the first month of.docx· Performance Critique Assignment· During the first month of.docx
· Performance Critique Assignment· During the first month of.docxLynellBull52
 
· Please read the following article excerpt, and view the video cl.docx
· Please read the following article excerpt, and view the video cl.docx· Please read the following article excerpt, and view the video cl.docx
· Please read the following article excerpt, and view the video cl.docxLynellBull52
 

More from LynellBull52 (20)

· · · Must be a foreign film with subtitles· Provide you wit.docx
· · · Must be a foreign film with subtitles· Provide you wit.docx· · · Must be a foreign film with subtitles· Provide you wit.docx
· · · Must be a foreign film with subtitles· Provide you wit.docx
 
·  Identify the stakeholders and how they were affected by Heene.docx
·  Identify the stakeholders and how they were affected by Heene.docx·  Identify the stakeholders and how they were affected by Heene.docx
·  Identify the stakeholders and how they were affected by Heene.docx
 
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
 
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
 
· Week 10 Assignment 2 SubmissionStudents, please view the.docx
· Week 10 Assignment 2 SubmissionStudents, please view the.docx· Week 10 Assignment 2 SubmissionStudents, please view the.docx
· Week 10 Assignment 2 SubmissionStudents, please view the.docx
 
· Write in paragraph format (no lists, bullets, or numbers).· .docx
· Write in paragraph format (no lists, bullets, or numbers).· .docx· Write in paragraph format (no lists, bullets, or numbers).· .docx
· Write in paragraph format (no lists, bullets, or numbers).· .docx
 
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
 
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
 
· Unit Interface-User Interaction· Assignment Objectives Em.docx
· Unit  Interface-User Interaction· Assignment Objectives Em.docx· Unit  Interface-User Interaction· Assignment Objectives Em.docx
· Unit Interface-User Interaction· Assignment Objectives Em.docx
 
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
 
· Question 1· · How does internal environmental analy.docx
· Question 1· ·        How does internal environmental analy.docx· Question 1· ·        How does internal environmental analy.docx
· Question 1· · How does internal environmental analy.docx
 
· Question 1Question 192 out of 2 pointsWhat file in the.docx
· Question 1Question 192 out of 2 pointsWhat file in the.docx· Question 1Question 192 out of 2 pointsWhat file in the.docx
· Question 1Question 192 out of 2 pointsWhat file in the.docx
 
· Question 15 out of 5 pointsWhen psychologists discuss .docx
· Question 15 out of 5 pointsWhen psychologists discuss .docx· Question 15 out of 5 pointsWhen psychologists discuss .docx
· Question 15 out of 5 pointsWhen psychologists discuss .docx
 
· Question 1 2 out of 2 pointsWhich of the following i.docx
· Question 1 2 out of 2 pointsWhich of the following i.docx· Question 1 2 out of 2 pointsWhich of the following i.docx
· Question 1 2 out of 2 pointsWhich of the following i.docx
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
· Strengths Public Recognition of OrganizationOverall Positive P.docx
· Strengths Public Recognition of OrganizationOverall Positive P.docx· Strengths Public Recognition of OrganizationOverall Positive P.docx
· Strengths Public Recognition of OrganizationOverall Positive P.docx
 
· Part I Key Case SummaryThis case discusses the Union Carbid.docx
· Part I Key Case SummaryThis case discusses the Union Carbid.docx· Part I Key Case SummaryThis case discusses the Union Carbid.docx
· Part I Key Case SummaryThis case discusses the Union Carbid.docx
 
· Perceptual process is a process through manager receive organize.docx
· Perceptual process is a process through manager receive organize.docx· Perceptual process is a process through manager receive organize.docx
· Perceptual process is a process through manager receive organize.docx
 
· Performance Critique Assignment· During the first month of.docx
· Performance Critique Assignment· During the first month of.docx· Performance Critique Assignment· During the first month of.docx
· Performance Critique Assignment· During the first month of.docx
 
· Please read the following article excerpt, and view the video cl.docx
· Please read the following article excerpt, and view the video cl.docx· Please read the following article excerpt, and view the video cl.docx
· Please read the following article excerpt, and view the video cl.docx
 

Recently uploaded

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Concentric rings of security can be one of the best approach metho

  • 1. Concentric rings of security can be one of the best approach methods to install any security program in its entirety and has been updated by the use of technologies and processes such as CPTED, the understanding of the end product is a not as easy as its name sounds. The use of these differing items can help ball the end product up into the most effective outcome giving the parameters that are directed by those in control and understanding the difference of needs to the area that you are in can make it even better. In making any portion of any product that goes into the security methodology. The use of items such as CPTED and critical thought processing in assessments make the attributed effort of security an intrinsic sectioning of the spaces involved. Knowing how to see and predict faults in systematic collapses of areas that might allow for a bypass of the procedures can lower the effectiveness of the security in any given area. This process of concentric rings of security can pinpoint the areas effectiveness and their need for additional security protocols and processes in a given section of the concentric rings. A reminder in this process, is that the areas’ location can affect the total situations needed to be put into place in the areas in question. The targeted secure item needs to heave different technology and stricter procedures than someone entering into the perimeter of a complex. Things like the use of Identification card scanners might work in the lower ring or outer ring, but the more you peel back the rings and go deeper this would not be an effective deterrent into the inner most ring that would be beneficial to the person entering into it, and not the company protecting it. Using some of the references that I have listed below can add to the thought process in my paper in the fact they are considered to be productive members in their specialized profession. These authors and groups allow for a complete understanding of their individual design systems and how they can add to their speci fic
  • 2. field by integrating such thought processes that would allow for the personal growth of those involved in the areas to be protected. Some of the references give instruction on how the government had to take consideration into protecting its own facili ties in such a way to prevent future attacks and their potential damage and was produced after the bombing of the Alfred P. Murrah Federal Building in Oklahoma City, Oklahoma. The idea was to lower the potential number of injuries involved, harden the structures, and then keep would be criminal characters from entering into such facilities. A known target would be the central concern of the concentric rings of security. References: Aasmae, K. (2018, October 28). Security: After Estonia's ID- card train wreck this identity app is taking Baltics by storm. ZDNet, p. 1. Retrieved from https://www.zdnet.com/article/security-after-estonias-id- card-train-wreck-this-identity-app-is-taking-baltics-by-storm/ Cregg, J. (2018, August 01). A Study of CPTED Principles and their Relationship to Crime Risk in Beaumont, Texas. Texas State University, p. 1-76. Retrieved from https://digital.library.txstate.edu/bitstream/handle/10877/7 705/Cregg-DRFinal.pdf?sequence=1&isAllowed=y Meyer, C. (2020, October). At Rest, At Risk. Security Management, 20(10), 30-37. Macano, K. (2018, January 01). Crime Prevention Through Environmental Design [CPTED]: Designing Out Opportunity and Fear. Center for Public Safety, p. 1-6. Retrieved from https://www.rit.edu/liberalarts/sites/rit.edu.liberalarts/files /docs/CRIM%20Resources/Crime%20Prevention%20Through%2 0Environmental%20Design%20%5BCPTED%5D- %20Designing%20Out%20Opportunity%20and%20Fear.pdf Godown, J. (2013). The CompStat Process: Four Principles for Managing Crime Reduction . The Police Chief Magazine, 1(1), 1. Retrieved from https://www.iadlest.org/Portals/0/Files/Documents/DDAC
  • 3. TS/Docs/The%20CompStat%20Process.pdf Practice Profile: Closed Circuit Television (CCTV) Surveillance. (2020). Retrieved September 12, 2021. Retrieved from https://crimesolutions.ojp.gov/ratedpractices/25#pd U.S. Marshals Office, n. DOJ. (1995). Vulnerability Assessment of Federal Facilities (156412 C.2). Retrieved August 29, 2021, from DOJ, website: https://www.ojp.gov/pdffiles1/Digitization/156412NCJ RS.pdf General Security Risk Assessment Guidelines. (2021). Retrieved October 17, 2021, from https://www.asisonline.org/publications-- resources/standards--guidelines/gsra/ Management System for Quality of Private Security Company Operations-Requirements with Guidance. (2021). Retrieved October 17, 2021, from https://www.asisonline.org/publications-- resources/standards--guidelines/psc1/ Mackay, R. (2017). Lessons from Manchester and Paris: Physical Security for the Entertainment Industry and Executive Protection: Iconic entertainers will remain attractive targets for terrorist attacks because they attract substantial crowds and promote social norms and values that conflict with terrorists' worldviews. Security, 54(9), 54-. Retrieved from https://www- proquest- com.ezproxy1.apus.edu/docview/2108801853/9B8E4B406BC44 126PQ/1?accountid=8289 Hello Dr. Aguiar and Classmates, For this week’s forum, we were asked to discuss the project topic, thesis statement, and main points being researched. For my capstone project, I will be highlighting the active shooter incident at Stoneman Douglas High School in Parkland, Florida. The Parkland shooting occurred on February 14, 2018, where the perpetrator Nikolas Cruz killed 17 people.
  • 4. The Parkland shooting is considered one of the deadliest shootings in modern history, and research shows that many countermeasures could have prevented the incident. This research paper will use the Parkland incident as a baseline of what possible shortfalls occurs when preventive a school shooting. I choose this subject matter because school shootings have played a significant role in my life. I was in National Incident Management System (NIMS) School at the time of the Sandy Hook shooting. I was able to understand the response procedures of an active shooter and how subject matter experts determine the motives of the perpetrator. The thesis statement that I will be using in the capstone project will be “Innumerable active shooter incidents will continue to occur in the United States unless law enforcement, educators, and security professionals develop countermeasures.” The purpose of the thesis statement is to narrow down the spectrum of research. I will be using the mixed research method of research while focusing on the four quantifiable categories consisting of school administrator’s responsibilities, law enforcement, and security professional integrated response, the significance of school architecture, and preliminary mental health detection. When it pertains to school administrators’ responsibilities, I will be utilizing research from Dr. Jeff Daniels and his published research titled The Counseling Psychologis. The publication states that trends found in active shooter incidents dating back to Columbine High School have remained consistent. For example, Dr. Daniels believes a root cause for an adolescent perpetrator is violent influences like social media or video games. Dr. Daniels concludes that when a child is exposed to a violent experience, they become desensitized to tragedy. With Dr. Daniel’s research, I will be able to validate my thesis by showing the need for school administrators to take action. An additional academic source is from author James Seebock and his publication named Responding to High-Rise Active Shooters. The information is structured to assist law
  • 5. enforcement officers and security professionals’ ineffective response to an active shooter. It is vital to show the advancements in emergency services response and compare what effective procedures are. This source balances the need for fast emergency response in order to reduce the loss of life in an active shooter. Mr. Seebock has contributed too many advancements in law enforcement response. For example, in 1999, law enforcement officers would treat an active shooter as a barricaded suspect, meaning that they would not make entry. Mr. Seebock’s research has shown that immediate entry and a “direct to threat” mindset has reduced the loss of life. The last main point focuses on the preventive measures taken when architecturally building a school. The concept Crime Prevention through Environmental Design (CPTED) is utilized in new construction throughout the world. When it pertains to schools, the preemptive placement of landscape can contribute to preventing an active shooter. Professor Todd Schneider describes in his book CPTED 101: Crime Prevention through Environmental Design--The Fundamentals for Schools the need for schools to place walkways, access roads, and common student areas in a restricted posture. This writing is imperative to justice the thesis because it is the first line of defense when it comes to preventives. Overall, these categories of research will show trends and provide insight on how to prevent a high school, active shooter. -Bryan Reference Daniels, J. A., Volungis, A., Pshenishny, E., Gandhi, P., Winkler, A., Cramer, D. P., & Bradley, M. C. (2010). A qualitative investigation of averted school shooting rampages. The Counseling Psychologist, 38(1), 69-95. Schneider, T. (2010). CPTED 101: Crime Prevention through Environmental Design--The Fundamentals for Schools. National Clearinghouse for Educational Facilities. Seebock, J. (2018). Responding to High-Rise Active Shooters. Homeland Security Affairs.
  • 6. The public’s perception of what the primary roles of a security officer/manager and that of a law enforcement officer maybe drastically different from reality. Without a doubt there are distinct differences between the two (2) types of law enforcement. Primary roles of security officers/managers place an emphasis on “the protection of assets, immediate deterrence, and commercial enforcement.” (Nemeth, 2011) Understanding that security officers/managers are charged with the duty to protect the entity of which they are employed and/or their assets while law enforcement officers (LEO’s) have society watch over, naturally points out gaps in enforcement coverage. Many of the primary roles of law enforcement officers (LEO) fill these gaps. For example, LEO’s typically take an oath to protect and serve the public. This means they focus on matters concerning citizens, whereas a security manager focuses more on their clients. Their guiding principle for primary roles is established within the laws and statues of their jurisdiction. This gives them a very large scope of responsibility from traffic control, sexual assaults to murder. Although both types have a vested interest in crime prevention. LEO’s primary roles endow them with the authority to apprehend, and make arrest foll owing a crime. A security officer/manager may be held liable for their actions even if it’s in accordance with their duties. Many of them are faced with confrontational employees, clients and even student’s or faculty members. On many college campuses across America, security officers are employed and often tasked to handle crowd control for special events. In the event that a physical altercation occurred and the security officer/manager caused injury to someone while trying to diffuse the situation the injured party may seek a tort claim for assault. Likewise, they may be held liable for the duration of time they have detained a person. Given the same example above, if the security officer/manager detained one of the agitators of the
  • 7. altercation and then questioned them for over an hour it, “can give rise to the claim of false imprisonment.” (Nemeth 2011) References: Nemeth, C. (2011). Private security and the law. Elsevier Science & Technology. https://ebookcentral.proquest.com Good afternoon class, This week we looked at the relationship of private security and law enforcement. The role and responsibility of private security is to primarily be a deterrent. The simple presence of a security officer can reduce the likelihood of crimes. When a crime does occur, often the security officer is the first responder. In this situation it is up to the security to maintain a safe scene, identify and isolate witnesses, perform crowd control measures and depending on training and needs, assist the injured. Security officers first objective is to ensure the well-being of the client or site where posted. That could include securing merchandise, protecting employees, buildings or information. Security officers are not responsible for eliminating an armed hostile threat, they are responsible for preserving the lives of themselves and others surrounding them. When it comes to law enforcement, they are trained to eliminate hostile threats. When law enforcement enters a scene where the security has identified a suspect and separated witnesses, the law enforcement agency will often take over the scene as they can conduct official investigations. Depending on the laws around private security in any given region, it is a general idea that security officers are not authorized to conduct intensive interviews or search individuals. Law enforcement is able to recite Miranda rights and make official arrests while security can only make a citizen arrest. Security officers can be liable in their actions if they are
  • 8. performing criminal activity, working against their agency policies or client policies. This includes negligent performance of their duties, wrongful or unauthorized use of force and many other questionable activities. If a security officer used force to handle a situation that posed no threat to his or her life or the life of those around the situation, their agency may not be able to defend their actions, putting the officer as the liable party. Some private security agencies will not stand behind their officers when they use force, even if the force is relatively justified. Regards, Jessie References Nemeth, C. (2011). Private security and the law. Elsevier Science & Technology.