SlideShare a Scribd company logo
1 of 5
Running head: RESEARCH PROPOSAL
Introduction
This paper intends to investigate the measures of enhancing
security in learning institutions. In the previous decades, most
universities and colleges have appeared much unique
environmental position in terms of security provisions. The
security provisions are mainly based significant features which
are mainly changing. The university hence can be held
accountable for individual functions it is committed as an
autonomous body concerning the rules and regulation. Public
learning institutions have a supreme equivalence of any other
government parastatals that has a duty to protect its clients and
employees
Thesis Statement
This paper seeks to discuss the current statistics which indicates
clearly that there is upsurging of numerous crimes which
happen in colleges and universities on a continuous basis. It has
been discovered that, in the year 2001, there were 11,659
robberies reported from the universities and colleges.
Additionally, there have also been 610 murders. Similarly, more
than 10,000 compulsory sexual assaults were also described in
the college campuses over this same period.
Hypothesis
Security enhancement leads to a reduction in crimes in Learning
Institutions.
The universities and schools in this country are prone to the
violence. If the plight of violence in this country is not
sufficiently addressed, it will lead to a rise in a number of the
casualties and victims of murder in the learning institutions
(Prenzler, 2012). This is considered to be evident of the
challenges that take place in Virginia Tech. Even after the
perilous and hazardous occurrence, the country ends up going to
normal business, this must not be the case.
The federal government and other stakeholders have made the
decision to take a stand and commit itself on just what it takes
to ensure there is safety in the learning institutions.
The first step is to file the bill of installing security measures in
learning institutions. Last year the report indicated that over
450 bills were filed but they have never been debated. Based on
that, it should be noted that the university and school
management do not have an obligation to be blamed with the
government on certain aspects of safety and security measures.
The second step is to involve all learning institutions
stakeholders in the decision making. This requires all teachers,
the college management, the parents, board of governors and
local communities to come up with diverse and practical
strategies to put in place so as to save the students.
The third and final step is implementation. Since it has been
noted that safe environment is basic to the success of the
institution, and it is part and parcel of the school management.
The management must execute all strategies discussed including
all the bills regarding security. The much-required quality
education hence ought to be stressed in all possible situations
with the same enthusiasm that is bestowed to different academic
issues which the students engage in.
These learning institutions, in this case, ought to endeavor to
implement the campus security practices which have been
considered to be effective in other private colleges and
campuses. In addition, it is significant that there must be a
stringent evaluation of the execution of the emergency reaction
strategies that have to be piloted, where there are numerous
crime incidences which take place (Heizer & Render, 2014).
This will assist in guaranteeing that the ongoing cycle of
mitigation, preparation, response and recovery, is adhered to
(Prenzler, 2012).
Measurement and Analysis Approach
Some of the approaches that will be applied in order to carry
out the appropriate and effective study to put in place stringent
security measures to the students include a collection of data
from the students especially those who have been victims. There
will be the use of questionnaires, where questions will be
drafted regarding insecurity incidences and what the main
causes were. The questionnaires will give feedback on the
safety or security measures that have been in place before to
curb insecurity issues and were a general impact on the lives of
the students. Finally, there will be the use of interviews. The
students will be interviewed on the matters concerning security.
The interview will be on individual basis. The victims will be
given priority in the interview because they have life
experience.
Ethical Standards
Data integrity: falsification and fabrication of research data is
misconduct. It is my role as a researcher to avoid some of the
omission and false statements that misrepresents research
record. Hence I will ensure that I report what has been observed
at the time of submission. On issue of publication I will
communicate to the scholarly world to help the readers to be
more informed of the research findings by making them
accessible in continuous manner with pertinent publication
standards. The data to be reported must be detailed to help me
duplicate the result (Herlihy &Corey, 2014).
Applicable Resources
Heizer, J. H., & Render, B. (2014). Operations Management:
Sustainability and supply chain
management. Boston: Prentice Hall
This source discusses the designing, overseeing and controlling
of the research process to effectively deliver appropriate study.
Jones, C., & Kennedy-Pipe, C. (2000). International security in
a global age: Securing the
Twenty-first century. London: F. Cass.
This source provides details regarding international security and
management of learning institutions safety measures.
Prenzler, T. (2012). Policing and security in practice:
Challenges and achievements. Houndmills, Basingstoke,
Hampshire: Palgrave Macmillan.
This source provides some guidelines and policing strategies
that can help to minimize insecurity.
Weiss, L. (2003). States in the global economy: Bringing
domestic institutions back in. Cambridge, U.K: Cambridge
University Press.
This source provides an overview of bringing institutions
together and establishing organized structure of dealing with
insecurity.
Herlihy, B., & Corey, G. (2014). ACA ethical standards
casebook. John Wiley & Sons.
This source provides ethical standards that must be applied
during and presentation of the research
3

More Related Content

Similar to Running head RESEARCH PROPOSAL IntroductionThis pap.docx

INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...ijcsit
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...AIRCC Publishing Corporation
 
JJCCJ Peer Review Report - CIS SPO Program
JJCCJ Peer Review Report - CIS SPO ProgramJJCCJ Peer Review Report - CIS SPO Program
JJCCJ Peer Review Report - CIS SPO ProgramJeff Ezell
 
Assigment # 1Discuss about a few human Bacterial and vira.docx
Assigment # 1Discuss about a few human  Bacterial and vira.docxAssigment # 1Discuss about a few human  Bacterial and vira.docx
Assigment # 1Discuss about a few human Bacterial and vira.docxjane3dyson92312
 
Driving Age Essay. Should the driving age be raised to 21 Essay Example Topi...
Driving Age Essay. Should the driving age be raised to 21 Essay Example  Topi...Driving Age Essay. Should the driving age be raised to 21 Essay Example  Topi...
Driving Age Essay. Should the driving age be raised to 21 Essay Example Topi...Chelsea Cote
 
Driving Age Essay.pdf
Driving Age Essay.pdfDriving Age Essay.pdf
Driving Age Essay.pdfEvelin Santos
 
Student data privacy manifesto
Student data privacy manifestoStudent data privacy manifesto
Student data privacy manifestoCaitlin Sharp
 
Introduction.pdf
Introduction.pdfIntroduction.pdf
Introduction.pdfstudy help
 
Disciplinary Hearing Request Report
Disciplinary Hearing Request ReportDisciplinary Hearing Request Report
Disciplinary Hearing Request ReportPatty Buckley
 
2023 Semester 2 Academic Integrity.pdf
2023 Semester 2 Academic Integrity.pdf2023 Semester 2 Academic Integrity.pdf
2023 Semester 2 Academic Integrity.pdfMartin McMorrow
 
Career And Educational Goals Research Paper
Career And Educational Goals Research PaperCareer And Educational Goals Research Paper
Career And Educational Goals Research PaperStacey Wilson
 
A Scale Development Study about School Safety
A Scale Development Study about School SafetyA Scale Development Study about School Safety
A Scale Development Study about School Safetyinventionjournals
 
Journal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docxJournal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docxtawnyataylor528
 
chapter 9 interprofessional practice, education, and research1. .docx
chapter 9 interprofessional practice, education, and research1. .docxchapter 9 interprofessional practice, education, and research1. .docx
chapter 9 interprofessional practice, education, and research1. .docxchristinemaritza
 
Addressing Academic Integrity In Education And Innovation
Addressing Academic Integrity In Education And InnovationAddressing Academic Integrity In Education And Innovation
Addressing Academic Integrity In Education And InnovationJessica Thompson
 
Guardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low ResGuardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low ResJeff Ezell
 
Terrorism awareness in kenya schools
Terrorism awareness in kenya schoolsTerrorism awareness in kenya schools
Terrorism awareness in kenya schoolsAmb Steve Mbugua
 

Similar to Running head RESEARCH PROPOSAL IntroductionThis pap.docx (20)

INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
JJCCJ Peer Review Report - CIS SPO Program
JJCCJ Peer Review Report - CIS SPO ProgramJJCCJ Peer Review Report - CIS SPO Program
JJCCJ Peer Review Report - CIS SPO Program
 
Assigment # 1Discuss about a few human Bacterial and vira.docx
Assigment # 1Discuss about a few human  Bacterial and vira.docxAssigment # 1Discuss about a few human  Bacterial and vira.docx
Assigment # 1Discuss about a few human Bacterial and vira.docx
 
Driving Age Essay. Should the driving age be raised to 21 Essay Example Topi...
Driving Age Essay. Should the driving age be raised to 21 Essay Example  Topi...Driving Age Essay. Should the driving age be raised to 21 Essay Example  Topi...
Driving Age Essay. Should the driving age be raised to 21 Essay Example Topi...
 
Driving Age Essay.pdf
Driving Age Essay.pdfDriving Age Essay.pdf
Driving Age Essay.pdf
 
Student data privacy manifesto
Student data privacy manifestoStudent data privacy manifesto
Student data privacy manifesto
 
Introduction.pdf
Introduction.pdfIntroduction.pdf
Introduction.pdf
 
Disciplinary Hearing Request Report
Disciplinary Hearing Request ReportDisciplinary Hearing Request Report
Disciplinary Hearing Request Report
 
2023 Semester 2 Academic Integrity.pdf
2023 Semester 2 Academic Integrity.pdf2023 Semester 2 Academic Integrity.pdf
2023 Semester 2 Academic Integrity.pdf
 
Career And Educational Goals Research Paper
Career And Educational Goals Research PaperCareer And Educational Goals Research Paper
Career And Educational Goals Research Paper
 
A Scale Development Study about School Safety
A Scale Development Study about School SafetyA Scale Development Study about School Safety
A Scale Development Study about School Safety
 
Journal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docxJournal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docx
 
School Safety And Security
School Safety And SecuritySchool Safety And Security
School Safety And Security
 
Responsible Conduct of Research: A Framework for Research Administrators and ...
Responsible Conduct of Research: A Framework for Research Administrators and ...Responsible Conduct of Research: A Framework for Research Administrators and ...
Responsible Conduct of Research: A Framework for Research Administrators and ...
 
chapter 9 interprofessional practice, education, and research1. .docx
chapter 9 interprofessional practice, education, and research1. .docxchapter 9 interprofessional practice, education, and research1. .docx
chapter 9 interprofessional practice, education, and research1. .docx
 
Addressing Academic Integrity In Education And Innovation
Addressing Academic Integrity In Education And InnovationAddressing Academic Integrity In Education And Innovation
Addressing Academic Integrity In Education And Innovation
 
Guardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low ResGuardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low Res
 
Terrorism awareness in kenya schools
Terrorism awareness in kenya schoolsTerrorism awareness in kenya schools
Terrorism awareness in kenya schools
 
Analysis Essay Template
Analysis Essay TemplateAnalysis Essay Template
Analysis Essay Template
 

More from charisellington63520

in addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxin addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxcharisellington63520
 
In an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxIn an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxcharisellington63520
 
In American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxIn American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxcharisellington63520
 
In addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxIn addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxcharisellington63520
 
In addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxIn addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxcharisellington63520
 
In Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxIn Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxcharisellington63520
 
In a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxIn a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxcharisellington63520
 
In a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxIn a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxcharisellington63520
 
In a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxIn a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxcharisellington63520
 
In a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxIn a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxcharisellington63520
 
In a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxIn a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxcharisellington63520
 
In a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxIn a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxcharisellington63520
 
In a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxIn a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxcharisellington63520
 
In a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxIn a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxcharisellington63520
 
In a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxIn a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxcharisellington63520
 
In a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxIn a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxcharisellington63520
 
In a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxIn a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxcharisellington63520
 
In a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxIn a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxcharisellington63520
 
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxIn a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxcharisellington63520
 
In a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxIn a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxcharisellington63520
 

More from charisellington63520 (20)

in addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxin addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docx
 
In an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxIn an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docx
 
In American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxIn American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docx
 
In addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxIn addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docx
 
In addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxIn addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docx
 
In Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxIn Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docx
 
In a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxIn a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docx
 
In a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxIn a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docx
 
In a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxIn a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docx
 
In a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxIn a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docx
 
In a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxIn a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docx
 
In a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxIn a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docx
 
In a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxIn a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docx
 
In a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxIn a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docx
 
In a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxIn a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docx
 
In a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxIn a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docx
 
In a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxIn a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docx
 
In a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxIn a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docx
 
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxIn a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
 
In a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxIn a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docx
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

Running head RESEARCH PROPOSAL IntroductionThis pap.docx

  • 1. Running head: RESEARCH PROPOSAL Introduction This paper intends to investigate the measures of enhancing security in learning institutions. In the previous decades, most universities and colleges have appeared much unique environmental position in terms of security provisions. The security provisions are mainly based significant features which are mainly changing. The university hence can be held accountable for individual functions it is committed as an autonomous body concerning the rules and regulation. Public learning institutions have a supreme equivalence of any other government parastatals that has a duty to protect its clients and employees Thesis Statement This paper seeks to discuss the current statistics which indicates clearly that there is upsurging of numerous crimes which happen in colleges and universities on a continuous basis. It has been discovered that, in the year 2001, there were 11,659 robberies reported from the universities and colleges. Additionally, there have also been 610 murders. Similarly, more than 10,000 compulsory sexual assaults were also described in the college campuses over this same period. Hypothesis Security enhancement leads to a reduction in crimes in Learning Institutions.
  • 2. The universities and schools in this country are prone to the violence. If the plight of violence in this country is not sufficiently addressed, it will lead to a rise in a number of the casualties and victims of murder in the learning institutions (Prenzler, 2012). This is considered to be evident of the challenges that take place in Virginia Tech. Even after the perilous and hazardous occurrence, the country ends up going to normal business, this must not be the case. The federal government and other stakeholders have made the decision to take a stand and commit itself on just what it takes to ensure there is safety in the learning institutions. The first step is to file the bill of installing security measures in learning institutions. Last year the report indicated that over 450 bills were filed but they have never been debated. Based on that, it should be noted that the university and school management do not have an obligation to be blamed with the government on certain aspects of safety and security measures. The second step is to involve all learning institutions stakeholders in the decision making. This requires all teachers, the college management, the parents, board of governors and local communities to come up with diverse and practical strategies to put in place so as to save the students. The third and final step is implementation. Since it has been noted that safe environment is basic to the success of the institution, and it is part and parcel of the school management. The management must execute all strategies discussed including all the bills regarding security. The much-required quality education hence ought to be stressed in all possible situations with the same enthusiasm that is bestowed to different academic issues which the students engage in. These learning institutions, in this case, ought to endeavor to
  • 3. implement the campus security practices which have been considered to be effective in other private colleges and campuses. In addition, it is significant that there must be a stringent evaluation of the execution of the emergency reaction strategies that have to be piloted, where there are numerous crime incidences which take place (Heizer & Render, 2014). This will assist in guaranteeing that the ongoing cycle of mitigation, preparation, response and recovery, is adhered to (Prenzler, 2012). Measurement and Analysis Approach Some of the approaches that will be applied in order to carry out the appropriate and effective study to put in place stringent security measures to the students include a collection of data from the students especially those who have been victims. There will be the use of questionnaires, where questions will be drafted regarding insecurity incidences and what the main causes were. The questionnaires will give feedback on the safety or security measures that have been in place before to curb insecurity issues and were a general impact on the lives of the students. Finally, there will be the use of interviews. The students will be interviewed on the matters concerning security. The interview will be on individual basis. The victims will be given priority in the interview because they have life experience. Ethical Standards Data integrity: falsification and fabrication of research data is misconduct. It is my role as a researcher to avoid some of the omission and false statements that misrepresents research record. Hence I will ensure that I report what has been observed at the time of submission. On issue of publication I will communicate to the scholarly world to help the readers to be more informed of the research findings by making them accessible in continuous manner with pertinent publication
  • 4. standards. The data to be reported must be detailed to help me duplicate the result (Herlihy &Corey, 2014). Applicable Resources Heizer, J. H., & Render, B. (2014). Operations Management: Sustainability and supply chain management. Boston: Prentice Hall This source discusses the designing, overseeing and controlling of the research process to effectively deliver appropriate study. Jones, C., & Kennedy-Pipe, C. (2000). International security in a global age: Securing the Twenty-first century. London: F. Cass. This source provides details regarding international security and management of learning institutions safety measures. Prenzler, T. (2012). Policing and security in practice: Challenges and achievements. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. This source provides some guidelines and policing strategies that can help to minimize insecurity. Weiss, L. (2003). States in the global economy: Bringing domestic institutions back in. Cambridge, U.K: Cambridge University Press. This source provides an overview of bringing institutions together and establishing organized structure of dealing with insecurity. Herlihy, B., & Corey, G. (2014). ACA ethical standards
  • 5. casebook. John Wiley & Sons. This source provides ethical standards that must be applied during and presentation of the research 3