Women's Reproductive Rights
Women's reproductive rights are controlled in a myriad of ways through both pro-natalist and anti-natalist policies.
Pro-natalist polices prohibit use of birth control and abortion in an attempt to grow populations. Romania is a perfect example.
Anti-natalist policies put restrictions on women's ability to have children. China's one child policy is a good example of an anti-natalist policy. Women from marginalized and historically oppressed groups in many cultures are sterilized in an attempt at controlling those populations seen as undesirable. This happened so frequently to black women in the U.S., that it was called the "Mississippi Appendectomy." Latinas, Puerto Rican women and Native American Indian women were also sterilized against their will in large numbers.
Answer the following questions 2 pages
1). In Kligman's Political Demography: The Banning of Abortion in Ceacescu's Romania, how were women's bodies tied to reproduction and pro-natalism?
2). How were women's bodies policed under these policies? What did women do when abortion was criminalized?
3). How does reproduction serve as an opportunity to control women's bodies across cultures including here in the U.S.?
School of Security and Global Studies
Program Name: Security Management Course Number: SCMT498
Course Name: Senior Seminar in Security Management
Credit Hours: 3 Credit Hours
Length of Course: 8 Weeks
Prerequisite: Completion of all other program requirements
Instructor Information
Instructor: See information provided in the Syllabus link in the classroom
Email:
Please use internal classroom messaging system
Table of Contents
Course Description (Catalog)
The Capstone course is a senior level course designed to allow the student to review, analyze and integrate the work the student has completed toward a degree in Security Management. The student will complete an approved academic project or paper that demonstrates mastery of their program of study in a meaningful culmination of their learning and to assess their level of mastery of the stated outcomes of their degree requirements. NOTE: All required, core, and major courses must be completed prior to enrollment in this course. Student must have SENIOR standing to register.
Table of Contents
Course Scope
This coursere-examines core program concepts, principles, and best practices. The student will synthesize, integrate, and apply program learning into a capstone paper or project. Students will be required to participate in class discussions, complete an annotated bibliography per APA Publication Manual, submit a formal research proposal for professor approval, complete a research paper or project, present the research to the class, and critically comment on classmate’s papers and projects.
T ...
Womens Reproductive RightsWomens reproductive rights are contr.docx
1. Women's Reproductive Rights
Women's reproductive rights are controlled in a myriad of ways
through both pro-natalist and anti-natalist policies.
Pro-natalist polices prohibit use of birth control and abortion in
an attempt to grow populations. Romania is a perfect example.
Anti-natalist policies put restrictions on women's ability to have
children. China's one child policy is a good example of an anti-
natalist policy. Women from marginalized and historically
oppressed groups in many cultures are sterilized in an attempt at
controlling those populations seen as undesirable. This
happened so frequently to black women in the U.S., that it was
called the "Mississippi Appendectomy." Latinas, Puerto Rican
women and Native American Indian women were also sterilized
against their will in large numbers.
Answer the following questions 2 pages
1). In Kligman's Political Demography: The Banning of
Abortion in Ceacescu's Romania, how were women's bodies tied
to reproduction and pro-natalism?
2). How were women's bodies policed under these policies?
What did women do when abortion was criminalized?
3). How does reproduction serve as an opportunity to control
women's bodies across cultures including here in the U.S.?
School of Security and Global Studies
Program Name: Security Management
Course Number: SCMT498
Course Name: Senior Seminar in Security Management
2. Credit Hours: 3 Credit Hours
Length of Course: 8 Weeks
Prerequisite: Completion of all other program requirements
Instructor Information
Instructor: See information provided in the Syllabus link in the
classroom
Email:
Please use internal classroom messaging system
Table of Contents
Course Description (Catalog)
The Capstone course is a senior level course designed to allow
the student to review, analyze and integrate the work the student
has completed toward a degree in Security Management. The
student will complete an approved academic project or paper
that demonstrates mastery of their program of study in a
meaningful culmination of their learning and to assess their
level of mastery of the stated outcomes of their degree
requirements. NOTE: All required, core, and major courses
must be completed prior to enrollment in this course. Student
must have SENIOR standing to register.
Table of Contents
Course Scope
This coursere-examines core program concepts, principles, and
best practices. The student will synthesize, integrate, and apply
program learning into a capstone paper or project. Students will
be required to participate in class discussions, complete an
annotated bibliography per APA Publication Manual, submit a
formal research proposal for professor approval, complete a
research paper or project, present the research to the class, and
critically comment on classmate’s papers and projects.
Table of Contents
Course Objectives
After completing this course, the student will be able to:
· Examine security management theory, concepts, principles,
techniques, and practices.
3. · Apply academic knowledge to identify and counter
organizational security risks and vulnerabilities.
· Identify strategic and tactical security solutions as part of a
broad based organizational protection plan.
· Describe and detail organizational security programs.
Table of Contents
Course Delivery Method
This final B.A. in Security Management course delivered via
distance learning will enable students to complete academic
work in a flexible manner, completely online. Course materials
and access to an online learning management system will be
made available to each student. Weekly assignments (submitted
for review by the Faculty Member) are posted on the discussion
board or are uploaded in assignments. Discussion assignments
are due on Thursdays. Research proposal, bibliography, research
paper/project, and classmate discussion responses are due by the
last day of the class week, Sunday. Assigned faculty will
support the students throughout this eight-week course.
Table of Contents
Course Resources
Required Course Textbooks:
Publication manual of the American Psychological Association
(6th ed.). (2009). Washington, D.C.: American Psychological
Association.
Required Readings: See Announcements
Additional Resources: See Announcements and Resources
Web Sites
In addition to the required course texts, the following public
domain web sites are useful. Please abide by the university’s
academic honesty policy when using Internet sources as well.
Note web site addresses are subject to change.
4. Site Name
Web Site URL/Address
How to Write a Bachelor’s Capstone Paper
http://www.ehow.com/how_5126546_write-bachelors-capstone-
paper.html
Writing in Third Person in APA Style
http://www.ehow.com/how_7232506_writing-third-person-apa-
style.html
The Difference between Formal and Informal Writing
http://www.word-
mart.com/html/formal_and_informal_writing.html
Guide to Grammar and Writing
http://grammar.ccc.commnet.edu/grammar/
Table of Contents
Evaluation Procedures
Grading will be based on three essay assignments, three forum
assignments (and six classmate responses – two in each of the
three weeks), a formal research proposal, an extended or
annotated bibliography per APA, a paper/project outline and
thorough summary, a research paper/project, and a forum
presentation of your paper/project (with “four” classmate
responses in week eight).
Reading Assignments: See Announcements and Lessons
Supplemental Readings: See above
Forum Assignments:
1. Introduction Forum – due by Sunday of week 1. Students will
introduce themselves in the Introduction Forum. The goal of the
forum is to accomplish two things 1) to build peer-to-peer
relationships by sharing introductions and background
information with classmates and 2) to express learning goals
and expectations for the class. This assignment requires 200 –
250 words and is a non-graded assignment.
5. 2. Forums (posted in forums “only”) are due in weeks one, four
and six. The assignments, to allow time for students to respond,
must be “posted” by midnight EST Thursdays each of these
weeks. Two classmate responses are also required and scored in
“each” of these three weeks. Post only during the assigned
course week (do “not” post in advance). Assignments must
reflect some new or original information – do not just
regurgitate data or opinion posted by previous students.
Scoring Notes: Ensure your forum postings are “on time and
substantive.” Keep in mind that substantive means fully
answering and developing your assignment answers and
classmate responses. In the forum, do “not” be concise or brief
(however, do not add “fluff”). Failing to address assignment
questions will cause point deductions from your weekly
assignment scores. This includes not thoroughly explaining
your positions. Most assignments that receive full credit will
be answered with multiple and extensive paragraphs (depending
on the assignment, 500 to 1000 words is within the normal
range. At a minimum, “classmate responses” – opposed to
assignment answers, will be five “exceptional” sentences (not
simply stating agreement and/or a reiteration of the student’s
post) – usually much more.
Homework Assignments:
3. Assignments– There are three essay assignments due in
weeks two, four and six. The first essay in week two must be
750 words, and the essays in weeks four and six must be 500
words each. The essays will discuss “HOW” the capstone
project will address the seven undergraduate security
management program learning objectives listed below under
“research proposal”. The essays are NOT intended to discuss the
objective itself, only HOW the objective will be incorporated
into the project. The essays are due by Sunday of each week.
4. Research proposal – a formal research proposal is due by the
conclusion (Sunday) of week two. The professor will approve,
disapprove or approve with modifications all proposals.
6. Your research proposal will be based on an “issue or problem”
aligned with the requirements and criteria for obtaining the BA
Degree in Security Management. The essential criteria include
the seven undergraduate security management program learning
outcome objectives:
· Identify organizational security risk exposure; identify cost-
effective mitigation
strategies; and prepare for recovery strategies.
· Employ the use of risk analysis and vulnerability assessment
processes.
· Critically examine the variety and extent of losses from
criminal acts, natural disasters, and security breaches facing
society.
· Analyze or compare and contrast concepts of information
security, personnel security, and physical security and
determine the planning approaches to prevent business losses.
· Analyze the trends affecting security and loss prevention and
determine the approaches to reduce losses facing businesses and
institutions.
· Evaluate, from a multi-disciplinary approach, non-traditional
approaches to crime prevention.
· Distinguish between traditional criminal justice roles,
function, theories, and concepts as a reactive institution to the
security roles a preventive societal institution.
Your research application will propose an examination of a
current issue or problem in security management.
You are to compare and contrast the selected issue or problem
with past, present and potential future trends or solutions.
Alternatively, you may compare and contrast the experience of
7. organizations affected by a security industry trend or whom
have developed solutions to the problem and conduct analysis of
their success or failure.
Topic Selection: Topic selection may be difficult. Typically, a
capstone research candidate has a general idea of an area within
the discipline of security management they wish to explore.
Students are encouraged to select a topic they are interested in,
but which also has applicability to their organization. In this
instance, personal enjoyment is combined with the satisfaction
of potentially improving the security posture of your
organization.
Research Topic: Conduct a review of previous studies: Begin
your research with the tools and capable librarian/archivists
available to you in the APUS Online Research Center.
IRB Guidance for the Capstone
The capstone study program does not require primary research
for publication although it is an option (pending your faculty
advisor’s approval). In the case of primary research for
publication involving human subjects, the APUS/AMU
Institutional Review Board (IRB) located at:
http://www.apus.edu/community-scholars/institutional-review-
board/
must approve your research plan prior to beginning any such
research. As the Capstone is only four months in length, this
option is highly discouraged. Four months is not truly
commensurate with primary research for publication, which
traditionally requires a longer time period for a successful
study.
Ensure the availability of ample research resources: Initially,
conduct research to ensure your proposed topic is one, which
benefits from ample research resources. These may be in many
forms including: books, papers, manuscripts, theses, doctoral
dissertations, magazine and professional journal articles, Web-
8. based resources, interviews, etc.
Feasibility assessment: Ensure the research study goal is
attainable within the established parameters. Typically,
students initially decide on a capstone research topic that is
too broad.
Conducting preliminary research should serve to narrow
the focus considerably.
Proceed to:
http://library.weber.edu/ref/guides/howto/topicselection.cfm
and read the information on research topic selection.
Proceed to:
http://www.indiana.edu/~educy520/sec5982/week_2/hypothesis_
3.pdf#search=%27Writing%20a%20problem%20statement%20%
20hypothesis
and read the information on writing a problem statement.
Topic Guidance:Security-focused: Ensure the topic is focused
on some aspect of security in the post-9/11 environment. The
topic can be management focused. For example, you may focus
on the utility to a security department of initiating a skill-based
compensation program. The topic may be focused on rapidly-
changing technologies. For example, you may select the topic of
how IT security professionals are using technologies to secure
complex systems based on wireless networks. The topic could
focus on the challenges of managing a cross-cultural security
force in hazardous regions such as Iraq or Afghanistan. You
have a high degree of flexibility bounded only by your interest,
enthusiasm, and the agreement between yourself and your
capstone professor.
Take a multi-disciplinary approach: Convergence of many
disciplines and approaches is a key factor in the 21st Century
9. security environment. You will find yourself incapable of
writing a capstone study on a security-related topic without
some discussion of related disciplines such as homeland
security, counter-terrorism, intelligence analysis, law
enforcement, etc.
Seek innovation and unorthodox solutions: It is normal, while
researching a topic, to find “school solutions” based on
prevailing trends, thought processes, analysis, etc. The key to a
great capstone study is to apply your research outcome, your
personal experiences and background, and your analysis to
create a new and innovative solution or outcome. This is the
true essence of exciting learning and the highest attainable goal
in writing a great capstone study.
Research study statement: The research study statement is
composed once you have selected a topic and narrowed your
focus to a useful degree. It is a clear and concise statement of
the purpose of the capstone study. It must be a statement
capable of being proved or disproved through your research and
the capstone study process. It is, in effect, the path for your
journey through the capstone study experience.
· Example: You are writing on the pros and cons of outsourcing
security services in a war zone. The capstone study statement
(proposition) is that while outsourcing of security services is
cost-effective over the short-term, the long-term effect is the
destabilization of military manpower and a return to large-scale
mercenary operations lacking government oversight.
· Example: You are interested in security measures necessary to
secure wireless networks. The capstone study statement
(proposition) might be that wireless networks are inherently less
secure than other communications means. A security system
design to achieve wireless network security consists of the
following components.
Examples of Acceptable Topics
10. Aviation security system design in the post-9/11 environment;
are we there yet?
The impact of the convergence of public and private sector
security operations and constructs in the post-9/11 environment
Management under fire: creating and managing a cross-cultural
security force in harm’s way.
Case studies emphasizing the validity, or lack thereof, of certain
concepts, constructs, equipment, designs, management concepts,
etc. such as the proliferation of closed circuit television systems
and the privacy issues involved, achieving successful
integration of complex security system designs, zero-based
budgeting for security departments, implementing Crime
Prevention Through Environmental Design (CPTED) concepts
for protective services operations.
Examples of Unacceptable Projects
Over-generalized topics such as “homeland security” This topic
is highly relevant if not so generalized.
Topic conflict: for example, a discussion of both Crime
Prevention through Environmental Design (CPTED) and
Targeted Crime Reduction (TCR) - they are not the same, but
similar enough that they should be avoided (in tandem).
Small technical topics, for example, a comparison of the utility
of the .40 S&W cartridge with the .38 S&W Special Cartridge
for use on protective services details.
Topics that do not require challenging and innovative research,
i.e., over-generalized - for example, the history of private
security in America. In this instance, there is no point to be
proven or disproved.
MANDATORY PROPOSAL COMPONENTS
The following sections must be included in your proposal (3
page minimum body - not including cover page, abstract or
references):
11. 1. Title Page with proposed title
2. Abstract – separate page
3. A concise capstone study statement for your proposed
research paper/project and a brief descriptive statement
a. Problem Statement
b. Significance of the Study
c. Research Question(s)
3. Paper/project components and key points to be covered in
your paper/project.
4. Proposed Methodology/Research Strategy – If you intend to
conduct primary research for publication, you must indicate the
scope of your proposed research, methodologies, estimate of
materials required for a successful effort, etc. Primary research
studies for publication are not recommended (see comments in
reference to the IRB process below)
a. Assumptions (if any)
b. Scope and Limitations
5. A preliminary, but detailed schedule of your plan to complete
the research study
6. Preliminary research sources
There will be 100 possible points for the proposal (15% of your
final grade) DUE ON Thursday OF WEEK 2.
5. An “annotated” research bibliography of a minimum of “six”
references (no older than seven years) to be used in your
paper/project is due in week three. Examples include “credible”
WWW reports and sites, books, manuscripts, theses,
dissertations, journals, newspapers, magazines, etc.
Submit/upload in a MS Word document. Ensure you follow the
12. APA style and each reference is thoroughly “summarized and
evaluated.”
Conducting Research: Upon topic approval conduct research
before proposal submission. Your starting point is the APUS
Online Research Center and the talented staff of librarians and
archivists available to assist you in your efforts. Resources
include:
· Bibliographic resources
· Web-based resources
· Web search engines
· Other resources
· Databases
Your search strategy focuses your search efforts and
makes efficient use of your time.
You must discuss search strategies first with your professor and
secondly, with the experts in the APUS Online Research Center.
There will be 100 possible annotated bibliography points (10%
of your final grade). Late submitters will be penalized 10 points
per day.
6. Extended paper/project outline, thorough summary and four
additional APA annotated references(total of 10 references) is
due in week five. This submission should be a significant
expansion of your research proposal and can be similar to a
rough draft. The body of this assignment should be a “minimum
of five pages.” Submit/upload this assignment in a MS Word
document.
There will be 100 possible points for the extended outline and
summary (10% of your final grade). Late submitters will be
penalized 10 points per day.
13. Exams/Quizzes: None
Field Experience Assignments: Optional (contact instructor)
Capstone Project:
7. Final capstone is due in week “seven”.
MANDATORY PROJECT COMPONENTS: See final capstone
template located in Resources
Sources from Wikipedia are “NOT” to be used as they
have been deemed unreliable.
ANY VIOLATIONS OF THE UNIVERSITY PLAGIARISM
POLICY WILL RESULT IN AN AUTOMATIC “F.” There
will be 100 possible points for your paper/proposal (40% of
your final grade
8. A formal presentation of your paper (and “four” classmate
responses) is due on Friday of week eight. You are required to
present your project to the class “in the forum area “only” –
“no” submission/uploading via Assignments. Your presentation
should provide a comprehensive overview and highlight the key
sections and points of your paper. A Microsoft PowerPoint slide
presentation is required. Do “not” attach and MS Word
document or copy your entire paper/project in the forum area.
Presentation/Classmate Response Scoring Notes: I will score
your presentation in “two parts.” Your presentation assignment
will be 80% of your possible grade. The remaining 20% of your
weekly assignment score will be based on the quality of your
“four” (5% each) forum “responses” to your classmates. The
excellence of your effort will be considered when grading your
presentation and classmate responses. Finally, there will be 100
total possible points for the presentation and classmate
responses (10% of your final grade). Late posters will be
penalized 10 points per day.
Grade Instruments
14. Points Possible
Forums 4 (weighted 40%)
100 / 400
Assignments – 6 (weighted 40%)
100 / 600
Capstone final (weighted 20%)
100
TOTAL
1100
Table of Contents
Course Outline
Please see the Student Handbook to reference the University’s
grading scale.
Week
Topic(s)
Learning Objectives
Readings
Assignment(s)
1
Autobiography & Response (1) / B.A. in Security Management
Program Objectives / Paper-Project Topic & Responses (2)
Develops potential topics, conducts preliminary research,
assesses various resources, research tools, libraries, etc.
Identifies and discusses “three” research topics and discusses
their viability with classmates and professor
15. Conducts research to identify and evaluate appropriate academic
and legitimate sources
See Announcements/Lessons
Autobiography & Response (1): Post to Introduction Forum only
- This is mandatory with a 250-word minimum
Week 1 Forum - post to Forum only
2
Research Proposal
Develops and submits a formal proposal
Validate a research plan.
Conducts research to identify and evaluate appropriate academic
and legitimate sources
Identify organizational security risk exposure; identify cost-
effective mitigation strategies; and prepare for recovery
strategies
Analyze concepts of information security, personnel security,
and physical security, and determine the planning approaches to
prevent business losses
Distinguish between traditional criminal justice roles, functions
and concepts as a reactive institution to the security roles as a
preventive societal institution
See Announcements/Lessons
Assignment 1 - Post to Assignments only - Capstone proposal -
Submit via Assignments using the Capstone proposal template
16. located in Resources
Assignment 2 – Post to Assignments only
3
Annotated Bibliography
Create an annotated bibliography
Conducts research to identify appropriate academic and
legitimate sources
See Announcements/Lessons
Assignment 3 - Post to Assignments only
4
Research Topic, Purpose/Problems Statements, Progress &
Responses (2)
Identifies and discusses the paper/project topic, thesis
statement, main points/sections with classmates and professor
Analyze the trends affecting security and loss prevention and
determine the approaches to reduce losses facing businesses and
institutions
Evaluate from a multi-disciplinary approach, non-traditional
approaches to crime prevention
See Announcements/Lessons
Week 4 Forum - Post to Forum only
Assignment 4 – Post to Assignments only
17. 5
Outline, Summary & Additional Annotated Bibliographic
References
Revise the preliminary proposal into an acceptable first research
study draft
Conducts research to identify and evaluate appropriate academic
and legitimate sources
Employ the use of risk analysis and vulnerability assessment
processes
Identify organizational security risk exposure; identify cost-
effective mitigation strategies and prepare for recovery
strategies
See Announcements/Lessons
Assignment 5: Post to Assignments only – use the original
Capstone proposal form you used in Assignment 1 – just expand
on it (this is also the final Capstone template).
6
Research Topic / Responses (2)
Reports paper/project topic progress with classmates and
professor
Conducts research to identify and evaluate appropriate academic
and legitimate sources
Critically examine the variety and extent of losses from
criminal acts, natural disasters, and security breaches facing
society
See Announcements/Lessons
18. Week 6 Forum – Post to Forum only
Assignment 6 – Post to Assignments only
7
Research Paper/Project
Designs and submits research paper/project
Analyze the trends affecting security and loss prevention and
determine the approaches to reduce losses facing businesses and
institutions
Evaluate from a multi-disciplinary approach, non-traditional
approaches to crime prevention
See Announcements/Lessons
Assignment 7: Final Capstone – post to Assignments only
8
Paper-Project Presentation / Responses (4)
Presents paper/project to classmates and professor; and
critically/substantively comments on four classmate’s
papers/projects.
.
See Announcements/Lessons
Week 8 Forum - PowerPoint Presentation Assignment & Forum
Responses (2):Capstone Presentation - Post to Forums only
Policies
Please see theStudent Handbook to reference all University
policies. Quick links to frequently asked question about policies
are listed below.
19. Drop/Withdrawal Policy
Plagiarism Policy
Extension Process and Policy
Disability Accommodations
Writing Expectations
All written submissions should be submitted in a font and page
set-up that is readable and neat. It is recommended that students
try to adhere to a consistent format, which is described below.
· Typewritten in double-spaced format with a readable style and
font and submitted inside the electronic classroom (unless
classroom access is not possible and other arrangements have
been approved by the professor).
· Times New Roman, 12-point font is the only acceptable font
IAW APA (6th. ed.) guidance.
· Page margins Top, Bottom, Left Side and Right Side = 1 inch,
with reasonable accommodation being made for special
situations and online submission variances.
Citation and Reference Style
Attention Please: Students will follow the APA sixth edition as
the sole citation and reference style used in written work
submitted as part of coursework to the University. Assignments
completed in a narrative essay or composition format must
follow the citation style cited in the:
Publication manual of the American Psychological Association
(2009). (6th ed.). Washington, D.C.: American Psychological
Association.
Late Assignments
Students are expected to submit classroom assignments by the
posted due date and to complete the course according to the
published class schedule. As adults, students, and working
professionals, I understand you must manage competing
demands on your time. Should you need additional time to
20. complete an assignment, please contact me before the due date
so we can discuss the situation and determine an acceptable
resolution. Routine submission of late assignments is
unacceptable and may result in points deducted from your final
course grade.
Netiquette
Online universities promote the advancement of knowledge
through positive and constructive debate – both inside and
outside the classroom. Forums on the Internet, however, can
occasionally degenerate into needless insults and “flaming.”
Such activity and the loss of good manners are not acceptable in
a university setting – basic academic rules of good behavior and
proper “Netiquette” must persist. Remember that you are in a
place for the rewards and excitement of learning which does not
include descent to personal attacks or student attempts to stifle
the Forum of others.
· Technology Limitations: While you should feel free to explore
the full-range of creative composition in your formal papers,
keep e-mail layouts simple. The Sakai classroom may not fully
support MIME or HTML encoded messages, which means that
bold face, italics, underlining, and a variety of color-coding or
other visual effects will not translate in your e-mail messages.
· Humor Note: Despite the best of intentions, jokes and
especially satire can easily be lost or taken seriously. If you feel
the need for humor, you may wish to add “emoticons” to help
alert your readers: ;-), : ), (
Disclaimer Statement
Course content may vary from the outline to meet the needs of
this particular group.
21. Table of Contents
Online Library
The Online Library is available to enrolled students and faculty
from inside the electronic campus. This is your starting point
for access to online books, subscription periodicals, and Web
resources that are designed to support your classes and
generally not available through search engines on the open Web.
In addition, the Online Library provides access to special
learning resources, which the University has contracted to assist
with your studies. Questions can be directed to
[email protected].
· Charles Town Library and Inter Library Loan: The University
maintains a special library with a limited number of supporting
volumes, collection of our professors’ publication, and services
to search and borrow research books and articles from other
libraries.
· Electronic Books: You can use the online library to uncover
and download over 50,000 titles, which have been scanned and
made available in electronic format.
· Electronic Journals: The University provides access to over
12,000 journals, which are available in electronic form and only
through limited subscription services.
· Tutor.com: AMU and APU Civilian & Coast Guard students
are eligible for 10 free hours of tutoring provided by APUS.
Tutor.com connects you with a professional tutor online 24/7 to
provide help with assignments, studying, test prep, resume
writing, and more. Tutor.com is tutoring the way it was meant
to be. You get expert tutoring whenever you need help, and you
work one-to-one with your tutor in your online classroom on
your specific problem until it is done.
Request a Library Guide for your course
22. (http://apus.libguides.com/index.php)
The AMU/APU Library Guides provide access to collections of
trusted sites on the Open Web and licensed resources on the
Deep Web. The following are specially tailored for academic
research at APUS:
· Program Portals contain topical and methodological resources
to help launch general research in the degree program. To
locate, search by department name, or navigate by school.
· Course Lib-Guides narrow the focus to relevant resources for
the corresponding course. To locate, search by class code (e.g.,
SOCI111), or class name.
If a guide you need is not available yet, please email the APUS
Library: [email protected].
Table of Contents
Turnitin.com
Turnitin.com is a web-based plagiarism prevention application
licensed, for campus use, through the APUS Online Library.
The quick submit option lets faculty upload and check
suspicious papers, without requiring student to create their own
Turnitin.com profiles.
Turnitin.com analyzes electronic submissions of student
writing, compares them to the contents of a huge online
database, and generates a customized Originality Report. The
database used to produce this analysis contains a massive
collection of documents available on the Internet from both free
and commercial sources, as well as the full texts of all other
papers that have been previously submitted to Turnitin.com.
Similarity index is based on the amount of matching text to a
submitted paper:
23. Blue =
no matching text
Green =
one word to 24% matching
Yellow =
25 -49% matching text
Orange =
50-74% matching text
Red =
75-100% matching text
Selected BibliographyWeb Based Supplemental Resources
The Scientific Research Process
http://www.experiment-resources.com/steps-of-the-scientific-
method.html
Research Strategies – Qualitative, Quantitative, and Mixed
Methods
https://www.hitpages.com/doc/6596681877422080/1#pageTop
Developing a Research Problem Statement
http://faculty.washington.edu/ezent/imwps.htm
Developing a Purpose Statement
http://johnlatham.me/frameworks/research-methods-
framework/purpose-statement/
Developing Research Questions
http://libguides.mjc.edu/content.php?pid=163460&sid=1380251
The APA Sixth Edition Annotated Bibliography
http://libguides.brandonu.ca/content.php?pid=26571&sid=19758
6
Formal Writing Tips (Students must write in the third person
24. formal for the capstone):
http://www.quickanddirtytips.com/education/grammar/first-
second-and-third-person
Table of Contents
Last updated 30 October 2016
_1179669944.bin
_1179669945.bin
School of Security and Global Studies
Program Name: Security Management
Course Number: SCMT498
Course Name: Senior Seminar in Security Management
Credit Hours: 3 Credit Hours
Length of Course: 8 Weeks
Prerequisite: Completion of all other program requirements
Instructor Information
Instructor: See information provided in the Syllabus link in the
classroom
Email:
Please use internal classroom messaging system
Table of Contents
Course Description (Catalog)
The Capstone course is a senior level course designed to allow
the student to review, analyze and integrate the work the student
has completed toward a degree in Security Management. The
student will complete an approved academic project or paper
that demonstrates mastery of their program of study in a
meaningful culmination of their learning and to assess their
level of mastery of the stated outcomes of their degree
requirements. NOTE: All required, core, and major courses
must be completed prior to enrollment in this course. Student
must have SENIOR standing to register.
25. Table of Contents
Course Scope
This coursere-examines core program concepts, principles, and
best practices. The student will synthesize, integrate, and apply
program learning into a capstone paper or project. Students will
be required to participate in class discussions, complete an
annotated bibliography per APA Publication Manual, submit a
formal research proposal for professor approval, complete a
research paper or project, present the research to the class, and
critically comment on classmate’s papers and projects.
Table of Contents
Course Objectives
After completing this course, the student will be able to:
· Examine security management theory, concepts, principles,
techniques, and practices.
· Apply academic knowledge to identify and counter
organizational security risks and vulnerabilities.
· Identify strategic and tactical security solutions as part of a
broad based organizational protection plan.
· Describe and detail organizational security programs.
Table of Contents
Course Delivery Method
This final B.A. in Security Management course delivered via
distance learning will enable students to complete academic
work in a flexible manner, completely online. Course materials
and access to an online learning management system will be
made available to each student. Weekly assignments (submitted
for review by the Faculty Member) are posted on the discussion
board or are uploaded in assignments. Discussion assignments
are due on Thursdays. Research proposal, bibliography, research
paper/project, and classmate discussion responses are due by the
last day of the class week, Sunday. Assigned faculty will
support the students throughout this eight-week course.
Table of Contents
Course Resources
Required Course Textbooks:
26. Publication manual of the American Psychological Association
(6th ed.). (2009). Washington, D.C.: American Psychological
Association.
Required Readings: See Announcements
Additional Resources: See Announcements and Resources
Web Sites
In addition to the required course texts, the following public
domain web sites are useful. Please abide by the university’s
academic honesty policy when using Internet sources as well.
Note web site addresses are subject to change.
Site Name
Web Site URL/Address
How to Write a Bachelor’s Capstone Paper
http://www.ehow.com/how_5126546_write-bachelors-capstone-
paper.html
Writing in Third Person in APA Style
http://www.ehow.com/how_7232506_writing-third-person-apa-
style.html
The Difference between Formal and Informal Writing
http://www.word-
mart.com/html/formal_and_informal_writing.html
Guide to Grammar and Writing
http://grammar.ccc.commnet.edu/grammar/
Table of Contents
Evaluation Procedures
Grading will be based on three essay assignments, three forum
assignments (and six classmate responses – two in each of the
three weeks), a formal research proposal, an extended or
annotated bibliography per APA, a paper/project outline and
thorough summary, a research paper/project, and a forum
27. presentation of your paper/project (with “four” classmate
responses in week eight).
Reading Assignments: See Announcements and Lessons
Supplemental Readings: See above
Forum Assignments:
1. Introduction Forum – due by Sunday of week 1. Students will
introduce themselves in the Introduction Forum. The goal of the
forum is to accomplish two things 1) to build peer-to-peer
relationships by sharing introductions and background
information with classmates and 2) to express learning goals
and expectations for the class. This assignment requires 200 –
250 words and is a non-graded assignment.
2. Forums (posted in forums “only”) are due in weeks one, four
and six. The assignments, to allow time for students to respond,
must be “posted” by midnight EST Thursdays each of these
weeks. Two classmate responses are also required and scored in
“each” of these three weeks. Post only during the assigned
course week (do “not” post in advance). Assignments must
reflect some new or original information – do not just
regurgitate data or opinion posted by previous students.
Scoring Notes: Ensure your forum postings are “on time and
substantive.” Keep in mind that substantive means fully
answering and developing your assignment answers and
classmate responses. In the forum, do “not” be concise or brief
(however, do not add “fluff”). Failing to address assignment
questions will cause point deductions from your weekly
assignment scores. This includes not thoroughly explaining
your positions. Most assignments that receive full credit will
be answered with multiple and extensive paragraphs (depending
on the assignment, 500 to 1000 words is within the normal
range. At a minimum, “classmate responses” – opposed to
assignment answers, will be five “exceptional” sentences (not
simply stating agreement and/or a reiteration of the student’s
28. post) – usually much more.
Homework Assignments:
3. Assignments – There are three essay assignments due in
weeks two, four and six. The first essay in week two must be
750 words, and the essays in weeks four and six must be 500
words each. The essays will discuss “HOW” the capstone
project will address the seven undergraduate security
management program learning objectives listed below under
“research proposal”. The essays are NOT intended to discuss the
objective itself, only HOW the objective will be incorporated
into the project. The essays are due by Sunday of each week.
4. Research proposal – a formal research proposal is due by the
conclusion (Sunday) of week two. The professor will approve,
disapprove or approve with modifications all proposals.
Your research proposal will be based on an “issue or problem”
aligned with the requirements and criteria for obtaining the BA
Degree in Security Management. The essential criteria include
the seven undergraduate security management program learning
outcome objectives:
· Identify organizational security risk exposure; identify cost-
effective mitigation
strategies; and prepare for recovery strategies.
· Employ the use of risk analysis and vulnerability assessment
processes.
· Critically examine the variety and extent of losses from
criminal acts, natural disasters, and security breaches facing
society.
· Analyze or compare and contrast concepts of information
security, personnel security, and physical security and
determine the planning approaches to prevent business losses.
· Analyze the trends affecting security and loss prevention and
29. determine the approaches to reduce losses facing businesses and
institutions.
· Evaluate, from a multi-disciplinary approach, non-traditional
approaches to crime prevention.
· Distinguish between traditional criminal justice roles,
function, theories, and concepts as a reactive institution to the
security roles a preventive societal institution.
Your research application will propose an examination of a
current issue or problem in security management.
You are to compare and contrast the selected issue or problem
with past, present and potential future trends or solutions.
Alternatively, you may compare and contrast the experience of
organizations affected by a security industry trend or whom
have developed solutions to the problem and conduct analysis of
their success or failure.
Topic Selection: Topic selection may be difficult. Typically, a
capstone research candidate has a general idea of an area within
the discipline of security management they wish to explore.
Students are encouraged to select a topic they are interested in,
but which also has applicability to their organization. In this
instance, personal enjoyment is combined with the satisfaction
of potentially improving the security posture of your
organization.
Research Topic: Conduct a review of previous studies: Begin
your research with the tools and capable librarian/archivists
available to you in the APUS Online Research Center.
IRB Guidance for the Capstone
The capstone study program does not require primary research
for publication although it is an option (pending your faculty
advisor’s approval). In the case of primary research for
publication involving human subjects, the APUS/AMU
Institutional Review Board (IRB) located at:
30. http://www.apus.edu/community-scholars/institutional-review-
board/
must approve your research plan prior to beginning any such
research. As the Capstone is only four months in length, this
option is highly discouraged. Four months is not truly
commensurate with primary research for publication, which
traditionally requires a longer time period for a successful
study.
Ensure the availability of ample research resources: Initially,
conduct research to ensure your proposed topic is one, which
benefits from ample research resources. These may be in many
forms including: books, papers, manuscripts, theses, doctoral
dissertations, magazine and professional journal articles, Web-
based resources, interviews, etc.
Feasibility assessment: Ensure the research study goal is
attainable within the established parameters. Typically,
students initially decide on a capstone research topic that is
too broad.
Conducting preliminary research should serve to narrow
the focus considerably.
Proceed to:
http://library.weber.edu/ref/guides/howto/topicselection.cfm
and read the information on research topic selection.
Proceed to:
http://www.indiana.edu/~educy520/sec5982/week_2/hypothesis_
3.pdf#search=%27Writing%20a%20problem%20statement%20%
20hypothesis
and read the information on writing a problem statement.
Topic Guidance:Security-focused: Ensure the topic is focused
31. on some aspect of security in the post-9/11 environment. The
topic can be management focused. For example, you may focus
on the utility to a security department of initiating a skill-based
compensation program. The topic may be focused on rapidly-
changing technologies. For example, you may select the topic of
how IT security professionals are using technologies to secure
complex systems based on wireless networks. The topic could
focus on the challenges of managing a cross-cultural security
force in hazardous regions such as Iraq or Afghanistan. You
have a high degree of flexibility bounded only by your interest,
enthusiasm, and the agreement between yourself and your
capstone professor.
Take a multi-disciplinary approach: Convergence of many
disciplines and approaches is a key factor in the 21st Century
security environment. You will find yourself incapable of
writing a capstone study on a security-related topic without
some discussion of related disciplines such as homeland
security, counter-terrorism, intelligence analysis, law
enforcement, etc.
Seek innovation and unorthodox solutions: It is normal, while
researching a topic, to find “school solutions” based on
prevailing trends, thought processes, analysis, etc. The key to a
great capstone study is to apply your research outcome, your
personal experiences and background, and your analysis to
create a new and innovative solution or outcome. This is the
true essence of exciting learning and the highest attainable goal
in writing a great capstone study.
Research study statement: The research study statement is
composed once you have selected a topic and narrowed your
focus to a useful degree. It is a clear and concise statement of
the purpose of the capstone study. It must be a statement
capable of being proved or disproved through your research and
the capstone study process. It is, in effect, the path for your
32. journey through the capstone study experience.
· Example: You are writing on the pros and cons of outsourcing
security services in a war zone. The capstone study statement
(proposition) is that while outsourcing of security services is
cost-effective over the short-term, the long-term effect is the
destabilization of military manpower and a return to large-scale
mercenary operations lacking government oversight.
· Example: You are interested in security measures necessary to
secure wireless networks. The capstone study statement
(proposition) might be that wireless networks are inherently less
secure than other communications means. A security system
design to achieve wireless network security consists of the
following components.
Examples of Acceptable Topics
Aviation security system design in the post-9/11 environment;
are we there yet?
The impact of the convergence of public and private sector
security operations and constructs in the post-9/11 environment
Management under fire: creating and managing a cross-cultural
security force in harm’s way.
Case studies emphasizing the validity, or lack thereof, of certain
concepts, constructs, equipment, designs, management concepts,
etc. such as the proliferation of closed circuit television systems
and the privacy issues involved, achieving successful
integration of complex security system designs, zero-based
budgeting for security departments, implementing Crime
Prevention Through Environmental Design (CPTED) concepts
for protective services operations.
Examples of Unacceptable Projects
Over-generalized topics such as “homeland security” This topic
is highly relevant if not so generalized.
33. Topic conflict: for example, a discussion of both Crime
Prevention through Environmental Design (CPTED) and
Targeted Crime Reduction (TCR) - they are not the same, but
similar enough that they should be avoided (in tandem).
Small technical topics, for example, a comparison of the utility
of the .40 S&W cartridge with the .38 S&W Special Cartridge
for use on protective services details.
Topics that do not require challenging and innovative research,
i.e., over-generalized - for example, the history of private
security in America. In this instance, there is no point to be
proven or disproved.
MANDATORY PROPOSAL COMPONENTS
The following sections must be included in your proposal (3
page minimum body - not including cover page, abstract or
references):
1. Title Page with proposed title
2. Abstract – separate page
3. A concise capstone study statement for your proposed
research paper/project and a brief descriptive statement
a. Problem Statement
b. Significance of the Study
c. Research Question(s)
3. Paper/project components and key points to be covered in
your paper/project.
4. Proposed Methodology/Research Strategy – If you intend to
conduct primary research for publication, you must indicate the
scope of your proposed research, methodologies, estimate of
materials required for a successful effort, etc. Primary research
studies for publication are not recommended (see comments in
34. reference to the IRB process below)
a. Assumptions (if any)
b. Scope and Limitations
5. A preliminary, but detailed schedule of your plan to complete
the research study
6. Preliminary research sources
There will be 100 possible points for the proposal (15% of your
final grade) DUE ON Thursday OF WEEK 2.
5. An “annotated” research bibliography of a minimum of “six”
references (no older than seven years) to be used in your
paper/project is due in week three. Examples include “credible”
WWW reports and sites, books, manuscripts, theses,
dissertations, journals, newspapers, magazines, etc.
Submit/upload in a MS Word document. Ensure you follow the
APA style and each reference is thoroughly “summarized and
evaluated.”
Conducting Research: Upon topic approval conduct research
before proposal submission. Your starting point is the APUS
Online Research Center and the talented staff of librarians and
archivists available to assist you in your efforts. Resources
include:
· Bibliographic resources
· Web-based resources
· Web search engines
· Other resources
· Databases
Your search strategy focuses your search efforts and
makes efficient use of your time.
35. You must discuss search strategies first with your professor and
secondly, with the experts in the APUS Online Research Center.
There will be 100 possible annotated bibliography points (10%
of your final grade). Late submitters will be penalized 10 points
per day.
6. Extended paper/project outline, thorough summary and four
additional APA annotated references (total of 10 references) is
due in week five. This submission should be a significant
expansion of your research proposal and can be similar to a
rough draft. The body of this assignment should be a “minimum
of five pages.” Submit/upload this assignment in a MS Word
document.
There will be 100 possible points for the extended outline and
summary (10% of your final grade). Late submitters will be
penalized 10 points per day.
Exams/Quizzes: None
Field Experience Assignments: Optional (contact instructor)
Capstone Project:
7. Final capstone is due in week “seven”.
MANDATORY PROJECT COMPONENTS: See final capstone
template located in Resources
Sources from Wikipedia are “NOT” to be used as they
have been deemed unreliable.
ANY VIOLATIONS OF THE UNIVERSITY PLAGIARISM
POLICY WILL RESULT IN AN AUTOMATIC “F.” There
will be 100 possible points for your paper/proposal (40% of
your final grade
8. A formal presentation of your paper (and “four” classmate
responses) is due on Friday of week eight. You are required to
present your project to the class “in the forum area “only” –
“no” submission/uploading via Assignments. Your presentation
36. should provide a comprehensive overview and highlight the key
sections and points of your paper. A Microsoft PowerPoint slide
presentation is required. Do “not” attach and MS Word
document or copy your entire paper/project in the forum area.
Presentation/Classmate Response Scoring Notes: I will score
your presentation in “two parts.” Your presentation assignment
will be 80% of your possible grade. The remaining 20% of your
weekly assignment score will be based on the quality of your
“four” (5% each) forum “responses” to your classmates. The
excellence of your effort will be considered when grading your
presentation and classmate responses. Finally, there will be 100
total possible points for the presentation and classmate
responses (10% of your final grade). Late posters will be
penalized 10 points per day.
Grade Instruments
Points Possible
Forums 4 (weighted 40%)
100 / 400
Assignments – 6 (weighted 40%)
100 / 600
Capstone final (weighted 20%)
100
TOTAL
1100
Table of Contents
Course Outline
Please see the Student Handbook to reference the University’s
grading scale.
Week
Topic(s)
37. Learning Objectives
Readings
Assignment(s)
1
Autobiography & Response (1) / B.A. in Security Management
Program Objectives / Paper-Project Topic & Responses (2)
Develops potential topics, conducts preliminary research,
assesses various resources, research tools, libraries, etc.
Identifies and discusses “three” research topics and discusses
their viability with classmates and professor
Conducts research to identify and evaluate appropriate academic
and legitimate sources
See Announcements/Lessons
Autobiography & Response (1): Post to Introduction Forum only
- This is mandatory with a 250-word minimum
Week 1 Forum - post to Forum only
2
Research Proposal
Develops and submits a formal proposal
Validate a research plan.
Conducts research to identify and evaluate appropriate academic
and legitimate sources
38. Identify organizational security risk exposure; identify cost-
effective mitigation strategies; and prepare for recovery
strategies
Analyze concepts of information security, personnel security,
and physical security, and determine the planning approaches to
prevent business losses
Distinguish between traditional criminal justice roles, functions
and concepts as a reactive institution to the security roles as a
preventive societal institution
See Announcements/Lessons
Assignment 1 - Post to Assignments only - Capstone proposal -
Submit via Assignments using the Capstone proposal template
located in Resources
Assignment 2 – Post to Assignments only
3
Annotated Bibliography
Create an annotated bibliography
Conducts research to identify appropriate academic and
legitimate sources
See Announcements/Lessons
Assignment 3 - Post to Assignments only
4
Research Topic, Purpose/Problems Statements, Progress &
Responses (2)
Identifies and discusses the paper/project topic, thesis
39. statement, main points/sections with classmates and professor
Analyze the trends affecting security and loss prevention and
determine the approaches to reduce losses facing businesses and
institutions
Evaluate from a multi-disciplinary approach, non-traditional
approaches to crime prevention
See Announcements/Lessons
Week 4 Forum - Post to Forum only
Assignment 4 – Post to Assignments only
5
Outline, Summary & Additional Annotated Bibliographic
References
Revise the preliminary proposal into an acceptable first research
study draft
Conducts research to identify and evaluate appropriate academic
and legitimate sources
Employ the use of risk analysis and vulnerability assessment
processes
Identify organizational security risk exposure; identify cost-
effective mitigation strategies and prepare for recovery
strategies
See Announcements/Lessons
Assignment 5: Post to Assignments only – use the original
Capstone proposal form you used in Assignment 1 – just expand
on it (this is also the final Capstone template).
40. 6
Research Topic / Responses (2)
Reports paper/project topic progress with classmates and
professor
Conducts research to identify and evaluate appropriate academic
and legitimate sources
Critically examine the variety and extent of losses from
criminal acts, natural disasters, and security breaches facing
society
See Announcements/Lessons
Week 6 Forum – Post to Forum only
Assignment 6 – Post to Assignments only
7
Research Paper/Project
Designs and submits research paper/project
Analyze the trends affecting security and loss prevention and
determine the approaches to reduce losses facing businesses and
institutions
Evaluate from a multi-disciplinary approach, non-traditional
approaches to crime prevention
See Announcements/Lessons
Assignment 7: Final Capstone – post to Assignments only
8
Paper-Project Presentation / Responses (4)
41. Presents paper/project to classmates and professor; and
critically/substantively comments on four classmate’s
papers/projects.
.
See Announcements/Lessons
Week 8 Forum - PowerPoint Presentation Assignment & Forum
Responses (2):Capstone Presentation - Post to Forums only
Policies
Please see the Student Handbook to reference all University
policies. Quick links to frequently asked question about policies
are listed below.
Drop/Withdrawal Policy
Plagiarism Policy
Extension Process and Policy
Disability Accommodations
Writing Expectations
All written submissions should be submitted in a font and page
set-up that is readable and neat. It is recommended that students
try to adhere to a consistent format, which is described below.
· Typewritten in double-spaced format with a readable style and
font and submitted inside the electronic classroom (unless
classroom access is not possible and other arrangements have
been approved by the professor).
· Times New Roman, 12-point font is the only acceptable font
IAW APA (6th. ed.) guidance.
· Page margins Top, Bottom, Left Side and Right Side = 1 inch,
with reasonable accommodation being made for special
situations and online submission variances.
Citation and Reference Style
Attention Please: Students will follow the APA sixth edition as
42. the sole citation and reference style used in written work
submitted as part of coursework to the University. Assignments
completed in a narrative essay or composition format must
follow the citation style cited in the:
Publication manual of the American Psychological Association
(2009). (6th ed.). Washington, D.C.: American Psychological
Association.
Late Assignments
Students are expected to submit classroom assignments by the
posted due date and to complete the course according to the
published class schedule. As adults, students, and working
professionals, I understand you must manage competing
demands on your time. Should you need additional time to
complete an assignment, please contact me before the due date
so we can discuss the situation and determine an acceptable
resolution. Routine submission of late assignments is
unacceptable and may result in points deducted from your final
course grade.
Netiquette
Online universities promote the advancement of knowledge
through positive and constructive debate – both inside and
outside the classroom. Forums on the Internet, however, can
occasionally degenerate into needless insults and “flaming.”
Such activity and the loss of good manners are not acceptable in
a university setting – basic academic rules of good behavior and
proper “Netiquette” must persist. Remember that you are in a
place for the rewards and excitement of learning which does not
include descent to personal attacks or student attempts to stifle
the Forum of others.
· Technology Limitations: While you should feel free to explore
the full-range of creative composition in your formal papers,
43. keep e-mail layouts simple. The Sakai classroom may not fully
support MIME or HTML encoded messages, which means that
bold face, italics, underlining, and a variety of color-coding or
other visual effects will not translate in your e-mail messages.
· Humor Note: Despite the best of intentions, jokes and
especially satire can easily be lost or taken seriously. If you feel
the need for humor, you may wish to add “emoticons” to help
alert your readers: ;-), : ), (
Disclaimer Statement
Course content may vary from the outline to meet the needs of
this particular group.
Table of Contents
Online Library
The Online Library is available to enrolled students and faculty
from inside the electronic campus. This is your starting point
for access to online books, subscription periodicals, and Web
resources that are designed to support your classes and
generally not available through search engines on the open Web.
In addition, the Online Library provides access to special
learning resources, which the University has contracted to assist
with your studies. Questions can be directed to
[email protected].
· Charles Town Library and Inter Library Loan: The University
maintains a special library with a limited number of supporting
volumes, collection of our professors’ publication, and services
to search and borrow research books and articles from other
libraries.
· Electronic Books: You can use the online library to uncover
and download over 50,000 titles, which have been scanned and
made available in electronic format.
44. · Electronic Journals: The University provides access to over
12,000 journals, which are available in electronic form and only
through limited subscription services.
· Tutor.com: AMU and APU Civilian & Coast Guard students
are eligible for 10 free hours of tutoring provided by APUS.
Tutor.com connects you with a professional tutor online 24/7 to
provide help with assignments, studying, test prep, resume
writing, and more. Tutor.com is tutoring the way it was meant
to be. You get expert tutoring whenever you need help, and you
work one-to-one with your tutor in your online classroom on
your specific problem until it is done.
Request a Library Guide for your course
(http://apus.libguides.com/index.php)
The AMU/APU Library Guides provide access to collections of
trusted sites on the Open Web and licensed resources on the
Deep Web. The following are specially tailored for academic
research at APUS:
· Program Portals contain topical and methodological resources
to help launch general research in the degree program. To
locate, search by department name, or navigate by school.
· Course Lib-Guides narrow the focus to relevant resources for
the corresponding course. To locate, search by class code (e.g.,
SOCI111), or class name.
If a guide you need is not available yet, please email the APUS
Library: [email protected].
Table of Contents
Turnitin.com
Turnitin.com is a web-based plagiarism prevention application
45. licensed, for campus use, through the APUS Online Library.
The quick submit option lets faculty upload and check
suspicious papers, without requiring student to create their own
Turnitin.com profiles.
Turnitin.com analyzes electronic submissions of student
writing, compares them to the contents of a huge online
database, and generates a customized Originality Report. The
database used to produce this analysis contains a massive
collection of documents available on the Internet from both free
and commercial sources, as well as the full texts of all other
papers that have been previously submitted to Turnitin.com.
Similarity index is based on the amount of matching text to a
submitted paper:
Blue =
no matching text
Green =
one word to 24% matching
Yellow =
25 -49% matching text
Orange =
50-74% matching text
Red =
75-100% matching text
Selected BibliographyWeb Based Supplemental Resources
The Scientific Research Process
http://www.experiment-resources.com/steps-of-the-scientific-
method.html
46. Research Strategies – Qualitative, Quantitative, and Mixed
Methods
https://www.hitpages.com/doc/6596681877422080/1#pageTop
Developing a Research Problem Statement
http://faculty.washington.edu/ezent/imwps.htm
Developing a Purpose Statement
http://johnlatham.me/frameworks/research-methods-
framework/purpose-statement/
Developing Research Questions
http://libguides.mjc.edu/content.php?pid=163460&sid=1380251
The APA Sixth Edition Annotated Bibliography
http://libguides.brandonu.ca/content.php?pid=26571&sid=19758
6
Formal Writing Tips (Students must write in the third person
formal for the capstone):
http://www.quickanddirtytips.com/education/grammar/first-
second-and-third-person
Table of Contents
Last updated 30 October 2016
_1179669944.bin
_1179669945.bin
Running Head: Security & Human Trafficking
1
Security & Human Trafficking
2
American Public University System
American Military University
Title of paper goes here
Date:
47. Your name goes here
SCMT498 Session # goes here
Submitted in partial fulfillment of the degree requirements for
the
BA in Security Management
Abstract
The intent of this mixed method capstone is to determine how
security professionals can successfully combat human
trafficking. The issue of human trafficking produces challenges
for law enforcement and security professionals worldwide. This
capstone will challenge the reader by further defining human
trafficking, identifying the scope and magnitude of this
phenomenon, and examining the U.S.’s domestic legislative
attempts to combat it. After considering all of these factors,
there will be an examination of how human trafficking
influences, or should influence, vulnerability assessments, risk
analysis, and risk exposure strategies in security management.
Problem Statement
The problem this mixed method capstone will seek to
address is how security managers can identify and implement
proactive anti-human trafficking efforts. From a border security
and immigration standpoint, the United States (U.S.) and United
Nations (U.N.) have taken productive steps toward defining and
combating human trafficking through legislation and traditional
law enforcement. The threats associated to human trafficking
have the potential to adversely effect corporations. If a
company were found to support human trafficking through its
human resource practices or if company executives are found to
contribute to human trafficking through the hiring of
undocumented housekeepers, prostitutes, or other individuals
48. held in captivity, the executive’s personal safety and the
company’s overall wellbeing could all be at stake. How are
security strategies adjusted to account for human trafficking and
the associated security and political concerns?
Purpose Statement
The purpose of this mixed method capstone is first to clearly
define human trafficking and identify the steps taken, both
nationally and internationally, to address this issue. Finally,
there will be an examination of proactive measures being
employed, or those that could be taken, by proprietary and
contract security professionals to protect their clients from
human trafficking concerns. Essentially, the aim is to examine
practices employed by security professionals that educate
human resources processes in an effort to avoid victims of
human trafficking as well as traditional vulnerability and risk
management practices aimed at reducing the likelihood of
company assets being associated with human trafficking.
Research Questions
Q1. Which industries are at higher risk to be affected by human
trafficking?
Q2. How can organizational risk exposure strategies be
employed to combat human trafficking?
Q3. How do the private security and traditional law
enforcement roles differ concerning human trafficking?
Q4. How can vulnerability assessment processes be used to
identify the presence of human trafficking?
Key Points Addressed
49. P1. Human trafficking is a large problem in the United States
and the International community.
P2. Law enforcement agencies have made steps toward better
understanding human trafficking but there is still much progress
yet to be made.
P3. Human Trafficking is not only a national security concern
but also a concern for businesses and their security managers.
P4. Organizational risk exposure can be greatly reduced
through a comprehensive human trafficking education program
put in place by the security manager.
Methodology/Research Strategy
The research method selected as most appropriate for this study
is the mixed method. The qualitative research will focus on
gathering data related to the history and evolution of human
trafficking both in the United States and abroad. This will
provide context for further discussion. The qualitative research
method will also be utilized to properly define the terms being
utilized, to explore legislation put in place by the United States
and the United Nations, and to identify standard security
practices designed to combat human trafficking. The
quantitative research method will be utilized to gather
numerical data supporting the overall impact of human
trafficking, to include the estimated number of victims, any
adverse financial impacts that can be discovered, and any
impact of law enforcement efforts to counter human trafficking.
Assumptions
One assumption is that quantitative data will be difficult to
obtain due to the underground nature of human trafficking.
Many non-profit organizations may have estimates, but vetted
data may be limited. It is also assumed that data regarding
50. private security approaches to human trafficking may be limited
and may result in speculative reporting regarding the security
industry’s approach to this phenomenon.
Scope
The scope of this capstone will focus on the efforts of security
managers and will hopefully identify best practices and areas of
improvement for security managers.
Limitations
The only limitation known is the time constraint preventing
comprehensive research, which will result in a reduction of
comprehensive data for consideration.
Human Trafficking: A Security Manager’s Developing
Challenge
Many challenges face corporate interests and for businesses
operating in an international environment, the risks are even
greater. One issue that faces international law enforcement and
private businesses, and has recently gained notoriety in popular
culture, is human trafficking. Human trafficking, or trafficking
in persons, is a term used to describe the movement of people
for use in various industries. According to the U.S. Department
of State (2014),the methodology of human trafficking can
include “sex trafficking” of adults and children, “forced labor”,
“bonded labor or debt bondage”, “involuntary domestic
servitude”, “forced child labor”, and “unlawful recruitment and
use of child soldiers” (p.19). Human trafficking is gaining
traction as a 21st century epidemic, often noted as modern day
slavery, and is even among one of the annual training
requirements for U.S. military and Department of Defense
employees. Human trafficking and forced labor are terms that
are often confused. As noted in the aforementioned definition,
51. human trafficking and forced labor are not the same; although,
the term human trafficking is often used as a synonym for
forced labor and vice-a-versa. It is important to note that
human trafficking only describes the actual transportation of
victims and does not address the reason for victim transport or
type of captivity enforced thereafter. Forced labor, unlike
human trafficking, involves the revocation of the freedoms of
employees forced to work. Another common methodology of
human trafficking is debt bondage. Debt bondage is similar to
forced labor, but debt bondage often involves a scenario where
a worker is charged a large monetary fee, often under the ruse
being a recruiting fee or hiring fee, and they incur a large debt
as a result. The employee starts their work already in a large
amount of debt and they often find the salary they earn is far
less than the salary they were promised when recruited. This
scenario often results in the employee, who has large amounts
of unpaid debt, continuing to work for a meager salary while
trying to pay off the debt. This situation becomes an endless
cycle with no resolution as the workers’ low wages prevent
them from ever fully repaying the debt and thus, preventing
them from being granted their freedom to leave. To further
control their victims, the perpetrators of forced labor and debt
bondage will often illegally sneak workers into a country and
then threaten them with deportation or, in the event of a legal
immigrant, they will hold their passport until their debt is paid,
thus eliminating their ability to leave. There are several
methods in which workers are denied basic freedoms and held in
captivity, but regardless of how the act is committed, it is still
detrimental. When considering the methodologies used in
human trafficking, it is easy to mistakenly assume this is a rare
phenomenon, is an uncommon issue, or at least an issue that
does not occur within the boundaries of the United States. All
of these assumptions would be incorrect. In fact, Miko (2006)
reported, “there are an estimated two to four million people
victimized by transnational human trafficking each year. Of
those two to four million victims, it is estimated that 17,500 of
52. them are smuggled into the United States annually” (para 2).
While these statistics show that human trafficking within the
United States accounts for less than one percent of global
human trafficking, the epidemic still adversely affects American
interests even when it occurs abroad. As participants in the
global marketplace, corporations and their security managers
must be keenly aware of the vulnerabilities and liabilities
associated with human trafficking. Corporations are not the
only entities that have had to develop systems for combating
human trafficking; the issue has especially challenged law
enforcement agencies and non-governmental organizations
worldwide.
As human trafficking has become more wide spread and
publicized, law enforcement agencies at all levels have been
challenged with creating effective education programs, agency
enforcement policies, and comprehensive mitigation strategies.
While modest advances have been made toward creating a more
educated police force, the progress has proven to be extremely
slow. According to Farrell, McDevitt, and Fahy (2010), a
national survey of law enforcement agencies revealed, “Less
than one fifth of the agencies responding to the national survey
had conducted any type of human trafficking training” (p.222).
Farrell et al. (2010) went on to say, of those agencies that did
conduct human trafficking training, “most (47%) used brief, in-
service training sessions or only offered specialized regional
training for a few investigators (43%)” (p.222). The results of
this national survey establish a concern that traditional law
enforcement is not trained nor equipped to fully combat human
trafficking. To put it more plainly, law enforcement personnel
are not currently able to combat human trafficking because they
have ill-equipped training. A more current national survey
could not be found so there is a possibility in more recent years
police agencies have increased their focus toward human
trafficking, but further research suggests otherwise. More
comprehensive examination revealed an additional survey was
53. taken a couple of years after the aforementioned national
survey, yet it yielded similar results. In fact, the concern of
inadequate training and preparation of police forces was more
so substantiated as a result of this survey administered to law
enforcement agencies in the State of Georgia. According to
Grubb & Bennett (2012), “The Georgia Law Enforcement
Survey [determined] that over 75% of all respondents reported
that no human trafficking training took place within their
agencies in the last four years” (p.496). Additionally, the
survey found that in addition to a lack of proper training, most
law enforcement agencies failed to establish specific protocols
or polices focused on human trafficking. To wit, Grubb &
Bennett (2012) reported “Only 6% of the respondents in the
current study reported that their departments had such protocols
or policies in place” (p.496). These results show that while law
enforcement agencies have taken steps toward a better
understanding this problem, there is still much progress yet to
be made. With only one-fourth of the police population
receiving training, it is easy to see how police are still
unprepared. More recently, the U.S. Congress passed a bill
titled, the Justice for Victims of Trafficking Act of 2015. This
bill directly addressed the inadequate law enforcement training
issue by requiring the Department of Justice to provide specific,
technical anti-trafficking training to Federal, State, and local
law enforcement. The training will include effective methods
for investigating covered offenders. Additionally the Justice for
Victims of Trafficking Act of 2015 requires an annual report be
produced, and provided to the U.S. Senate Committee on the
Judiciary. The annual report will show arrest, prosecution, and
conviction data for trafficking related crimes. The President has
not yet signed this bill, but in the event it is signed, there will
presumably be a delay in enacting its requirements.
Unfortunately, because of the ill preparedness evident in these
surveys and in the need for Congress to formally hold law
enforcement accountable, private security managers cannot trust
traditional law enforcement alone to protect their businesses
54. from the threats associated with human trafficking. Even when
law enforcement personnel have a better understanding of the
issue, their approach will be reactive in nature. Their impact
would be limited to responding to citizen concerns regarding
human trafficking. Certainly city, state, and the federal
government will encourage community-policing initiatives,
public awareness campaigns, and will encourage police agencies
to increase their awareness of human trafficking, but ultimately
law enforcement will primarily fulfill a reactive role in
combating this issue. Unfortunately, even if they try to be
proactive, law enforcement professionals will have a difficult
time impacting human trafficking due to the covert nature in
which it is conducted. Criminal gangs or other organized
criminal groups are often responsible for the human trafficking
that occurs internationally and within the United States. These
gangs exercise excellent operational security; which makes it
difficult for law enforcement to counteract them. Additionally,
many corporations’ supply chains originate overseas, outside of
the jurisdictional boundaries of U.S. based law enforcement
agencies. As a result, even if U.S. law enforcement agencies
were competent in battling human trafficking, these
corporations would have to depend on foreign police forces to
identify issues in the international supply chain locations. It is
presumed many foreign governments and their law enforcement
entities are replete with corruption and thus can’t be trusted to
enforce anti trafficking protocols within their jurisdictions. For
these reasons, security managers must develop and rely on their
own proactive programs in order to identify human trafficking
within their ranks.
At first glance, human trafficking can appear as solely a law
enforcement issue, but human trafficking is not only a national
security concern but also a concern for businesses and their
security managers. In fact, international companies actually
benefit from contributing to the fight against human trafficking
by collaborating with international government entities, non-
55. governmental agencies, and other private organizations.
Security managers can make sure their corporations benefit by
maintaining a proactive anti-trafficking program. A few of
these benefits include avoiding criminal investigations,
sanctions, and fines. An added benefit of a strong anti-
trafficking program is the positive public image portrayed by
showing proactive measures toward this increasingly well
known global and social issue. Because human trafficking is
seen as a human rights issue, a company who takes proactive
measures to combat it would likely receive positive press,
which would influence marketability and hopefully increase
sales and profit. According to Fields (2013), “By taking action
against human trafficking, companies protect their financial
interests and promote themselves as being socially responsible”
(para 3). A great example of this comes from a 2007 scandal
involving allegations of child labor at a Gap clothing
corporation’s sub-contracted facility in India. The incident
resulted in poor publicity; but Gap used the media attention as
an opportunity to publicly restate their zero tolerance policy
regarding child labor and restructure procedures. Fields (2013)
said of Gap’s response “This resulted in improved supply chain
tracking, enhanced monitoring, and education and awareness-
raising…Certainly, Gap was motivated in large part by the need
to protect its brand name” (para 7). While globally publicized
trafficking scandals can be harmful to business, a proactive,
preventative and publicized corporate policy against trafficking
and forced labor can benefit a company in the private sector.
Until recent years, corporations only addressed human
trafficking of their own free will and were not dictated by
anyone. Some companies maintained these efforts in order to
guard against liability while others truly wanted the positive
public relations that would result from contributing to non-
governmental organization efforts to combat human trafficking.
This structure, since it was completely voluntary, resulted in
some companies addressing the concerns while other companies
did nothing. In an effort to create consistency in business
56. practices, and force more compliance with emerging industry
anti-trafficking standards, some states authored legislation that
allowed the state government to begin monitoring corporate
anti-trafficking efforts. According to Altschuller (2013):
New statutes, including the California Transparency in Supply
Chains Act and the proposed Business Transparency on
Trafficking and Slavery Act have focused attention on corporate
efforts to address human trafficking risks. The California
statute, which went into effect on January 1, 2012, requires
companies to make public disclosures of their efforts, if any, to
ensure that their supply chains are free from forced labor and
human trafficking (para 3).
It is easy to see that creating corporate anti-trafficking efforts is
of increasing importance to many executives in the private
sector. Consolidating these new anti-trafficking efforts under a
corporate social responsibility program is becoming a popular
practice. The goal of a corporate social responsibility program
is to create and participate in initiatives that benefit society.
The hope for these programs would be that by improving
society, especially local communities in which the company
operates, the company would increase its public image while
also contributing to societal improvements likely to reduce risk
of loss to the company. The challenge for corporate executives
was in aligning the corporate social responsibility program
initiatives within existing corporate constructs. Would a new
program manager be created, resulting in additional payroll
expenses, or could an existing position incorporate corporate
social responsibility efforts within their current duties? While
the idea of having a corporate social responsibility program is
generally a new initiative, there are strong trends emerging that
suggest it is becoming an industry standard. According to Kane
(2011), “The Security Executive Council has noticed an uptick
in the number of security executives being asked to run
corporate social responsibility (CSR) programs for their
57. organizations” (p.54). There are many possibilities as to why
the corporate social responsibility programs are being delegated
to security executives, but one possible reason is due to the
implied security benefits of such a program. Kane (2011)
explained this when he said, “Security acts as an enabler for
CSR programs…The security of an organization really depends
on how it is perceived” (p. 54). In other words, if a corporation
is seen as being proactive against crime, involved positively in
the community, and is perceived as being focused on risk
analysis, then they are more likely to have a strong security
posture as a result of their efforts. Developing and
implementing a corporate social responsibility program could
aid in reducing a corporations risk, but in spite of all corporate
social responsibility efforts, all businesses still assume some
level of risk toward becoming associated with human
trafficking. This could occur regardless of whether the
company is unwitting or complicit. A previous example
discussed human trafficking within the supply chain of the
retail-clothing company GAP. This example fits the stereotype
often evoked when one thinks of child labor in sweat shops
producing products for commercial sale. The retail industry is
often viewed as the most susceptible to forced labor or child
labor; both of which benefit from human trafficking. A closer
examination of several industries shows some industries are at a
higher risk of exposure to human trafficking than others. In
fact, in 2014, the Interfaith Centre on Corporate Responsibility
(ICCR) initiated a campaign focusing on two specific
industries: hospitality and food agriculture. The hospitality
sector, which includes hotels, food service, retailers, and
airlines, assumes great risk due to their extensive, international
operations and large employee populations. Of these hospitality
industries, hotels are especially at risk. One prominent example
of a human trafficking scandal involving a hotel came against
the Marriott hotel chain in 2006. According to Biron (2014), in
2006:
58. “Scandinavian investors began pressuring the Marriott hotel
chain over reports of child prostitution rings making use of the
some of the company's facilities in Costa Rica. Within a year,
Marriott had rolled out a new, pointed policy on the issue, and
has since engaged in annual shareholder disclosure” (para 12).
There is a very important lesson learned in this scenario.
Marriott International Incorporated was never found to have
been knowledgeable or otherwise complicit in the human
trafficking and prostitution occurring on their facility. The
corporation could have claimed ignorance, publically denounced
the practice of child prostitution, and moved past the scandal,
but instead they created new policy on the issue and started
providing shareholders with information. So, why did Marriot
International Incorporated go to such great lengths when they
were not found culpable of any wrongdoing in the first place?
As Biron (2014) noted, “the lack of stated policy was seen as
detrimental to broader anti-trafficking efforts” (para 12).
Overall, this goes to support the theory that if a company does
not have programs and policies prohibiting and combating
human trafficking, they face the likelihood of being viewed as
complicit in its perpetration. No longer can companies afford to
sit idly by and hope to stay above the fray. Instead, companies
must have active anti-trafficking programs, often run by
security executives, or they will be viewed as indifferent or
even supportive of the crime. Obviously being seen in such a
way would be unfavorable for corporate reputation and brand
integrity. As mentioned previously, another industry
susceptible to human trafficking and forced labor is agriculture.
Agriculture workers are often uneducated, come from poverty,
and are often isolated from the public as a result of the rural
locations they work in or come from. In an example of a
particularly egregious agriculture related incident, in 2006 the
Justice Department brought, what was at the time, the largest
human trafficking case in the history of the U.S. federal
government. According to the New York Times (2006), six
59. contractors, who worked for a Los Angeles based company,
were indicted for conspiracy after they were accused of holding
400 workers from Thailand on farms in the U.S. The company
lured workers to the U.S. utilizing the federal guest worker
program and promises of good salaries. Once the workers
arrived, they were forced to pay high recruiting fees, had their
passports taken and were coerced with threats of deportation if
they complained (para 2). In most of these previous examples,
the company was not held legally liable for the human
trafficking incidents they were associated with; however, their
public image and corporate security were adversely affected.
While the U.S. and other international governments are
attempting to address this issue through legislation and
prosecution, it is clear that their efforts are predominately
reactive in nature. Only through a proactive approach can
security professionals protect their companies from increased
risk of human trafficking related incidents.
All companies manage a certain level of risk exposure.
Managing the risk of human trafficking related scenarios is no
different than managing other risks. A security manager must
identify the threat, assess the level of risk, and implement
policies to combat the threat. Many highly regarded companies
have already begun making human trafficking and forced labor
a priority in their overall security posture. According to
Meinert (2012), several global businesses, including Microsoft,
LexisNexis, Carlson, The Coca-Cola Co., Exxon Mobil, Delta
Air Lines, Manpower Group, NXP and Travelport, formed the
Global Business Coalition Against Human Trafficking in an
effort to join their resources on “eliminating forced labor that
may be present in corporate supply chains, as well as sex
trafficking that relies on facilities in the travel and tourism
industries” (para 2). While forming coalitions may be good for
public relation campaigns, the task is worthless if there is no
true impact or risk mitigation. The aforementioned law
enforcement surveys revealed law enforcement officers are not
fully educated on their agency’s human trafficking enforcement
60. policies. This lack of education and awareness is likely present
in a larger scale within many corporate employee populations.
Organizational risk exposure can be greatly reduced through a
comprehensive human trafficking education program put in
place by the security executive. The approach has to be
multidisciplinary in order to be effective. Security managers
must successfully incorporate cyber security, physical security,
human resources, law enforcement, government agencies,
multilateral organizations, civil society, and non-governmental
organizations into their strategy. At the company level, senior
level corporate executives must first be shown the corporate
liabilities of human trafficking and forced labor. This is
important because an effective anti-trafficking program or
corporate social responsibility program must be well funded in
order to be effective and funding won’t come without buy in
from senior corporate leaders. Simply understanding the
symptoms of human trafficking can help executives to better
understand the problem. In an effort to assist leaders in
combating this issue, the International Labour Office (2008)
developed the following 10 Principles for Business Leaders to
Combat Forced Labour and Trafficking:
· Have a clear and transparent company policy, setting out the
measures taken to prevent forced labour and trafficking.
Clarify that the policy applies to all enterprises involved in a
company’s product and supply chains;
· Train auditors, human resource and compliance officers in
means to identify forced labour in practice, and seek
appropriate remedies;
· Provide regular information to shareholders a potential
investors, attracting them to products and services where there
is a clear and sustainable commitment to ethical business
practice including prevention of forced labour;
61. · Promote agreements and codes of conduct by industrial sector
(as in agriculture, construction and textiles), identifying the
areas where there is risk of forced labour, and take appropriate
remedial measures;
· Treat migrant workers fairly. Monitor carefully the agencies
that provide contract labour, especially across borders,
blacklisting those known to have used abusive practices and
forced labour;
· Ensure that all workers have written contracts, in language
that they can easily understand, specifying their rights with
regard to payment of wages, overtime, retention of identity
documents, and other issues related to preventing forced labour;
· Encourage national and international events among business
actors, identifying potential problem areas and sharing good
practice;
· Contribute to programmes and projects to assist through
vocational training and other appropriate measures, the victims
of forced labour and trafficking;
· Build bridges between governments, workers, law enforcement
agencies and labour inspectorates, promoting cooperation in
action against forced labour and trafficking;
· Find innovative means to reward good practice, in conjunction
with the media.
Once a corporate vision is born and policy is created to support
that vision, then security managers must focus on educating
human resources professionals. The means by which human
trafficking affects businesses is primarily through the hiring
processes of sub contracted employment agencies. Security
managers should support human resources in vetting contracted
hiring companies in order to confirm they are conducting sound
hiring practices and are not committing human trafficking
violations only to have the parent company unwittingly
perpetrate forced labor practices. As previously mentioned,
security managers must exercise cyber security in combating
human trafficking as well. Security professionals must
coordinate with human resources to examine any company job
62. advertisements or descriptions, which may be on the web.
Could third party companies use information within legitimate
job advertisements to lure in workers only to limit their
freedoms upon arrival? Could the company unwittingly be
contributing to human trafficking as a result of not exercising
information or cyber security? Additionally security managers
must focus on corporate hiring practices even when third party
agencies are not used. There still exists a threat that a small
group of like-minded employees within the company could
commit human trafficking and forced labor violations, so it is
important for a security professionals to take a holistic approach
to risk assessment.
Findings/Conclusions
Human trafficking is a pervasive and developing challenge for
corporate security executives. Human trafficking includes the
transportation of people for use in criminal schemes such as
child labor, prostitution, forced labor, and debt-bondage; just to
name a few. Companies in all industries are at some level of
risk for liability associated with human trafficking.
Corporations operating exclusively within the U.S., to include
their supply chain, are exposed to less risk than corporations
operating globally. This is not to say that U.S. companies are
not at risk of having human trafficking related issues as was
evidenced by the aforementioned federal indictment for human
trafficking related crimes in Hawaii and the continental U.S.
Corporations must establish clear hiring policies and implement
checks and balances into their processes in order to flesh out
any conspiracies that may be present within the workforce.
This challenge is more difficult for corporations with foreign
supply chains. These companies must attempt to incorporate
their anti-trafficking values to their foreign contractors.
Whether a company utilized foreign manufacturing or uses third
party hiring agencies, the corporation must take measured
63. actions toward ensuring their direct employees and employees
of contracted companies are there of their own free will and
have not been subjected to human trafficking. Research has
shown several examples of U.S. companies who have fallen
victim to human trafficking scandal and how the poor publicity
could affect the overall viability of the company. This research
proves that corporations not only have to avoid any perception
of involvement with human trafficking, but they must also take
proactive steps toward creating robust anti-trafficking and
corporate social responsibility programs. Casual observers are
likely to view a company without an anti-trafficking program as
apathetic or even supportive of the crime, so having a well-
publicized anti-trafficking campaign is of utmost importance to
the protection of the brand and avoidance of liability. Part of
developing an anti-trafficking program is to conduct a risk
analysis and threat assessment. One factor that increases a
company’s risk is the industry in which the company operates.
Agriculture and hospitality industries are currently at higher
risks of human trafficking. The agriculture industry is at risk
primarily due to the fact it often employees poor, unskilled
workers from foreign countries. Often a third party hires these
workers and if the third party is not trustworthy, he or she could
manipulate workers into a position of debt-bondage or other
manifestation of human trafficking. The hospitality industry is
also at great risk of human trafficking related offenses due
primarily to its global exposure and large employee populations.
Hospitality companies, such as hotels, could have solid hiring
practices and still become involved in human trafficking
scandal if their facilities are found to be used to transport or
house victims. For these reasons it is very important for
corporations to develop sound policies and guidelines
denouncing the practice of human trafficking and placing their
company in a morally superior position in the event there are
allegations of misconduct. Another way corporations can
increase their positive public relations regarding human
trafficking is by developing a corporate social responsibility
64. program to positively influence the communities in which it
works. One of the primary concerns of human trafficking is a
lack of training and awareness within the employee population;
to include senior level executives. Educating human resource
personnel and others in key positions will increase a
corporation’s defensive posture and will aid in proactively
looking for signs of human trafficking. Additionally, security
executives can take a proactive, anti-trafficking stance by hiring
an auditor responsible for examining company practices and
employee pools for signs of human trafficking. Security
executives can create an environment of transparency by sharing
audit results with shareholders, government agencies, and non-
governmental organizations. By partnering with other industry
corporations, international governments, and non-governmental
organizations corporations can share experiences, develop best
practices in combating human trafficking, and most importantly
can build their brand’s reputation as being serious about anti-
trafficking efforts.
Corporate security executives must realize the reality of the risk
human trafficking presents to their corporate interests. The
liability of employing victims of human trafficking go well
beyond lost revenue damaged corporate identity, and poor
publicity. Becoming involved with human trafficking obviously
has civil liability risks but also presents criminal liabilities as
well. By creating clear policies and practices and
incorporating those into daily business, security executives can
decrease their risk and increase positive branding at the same
time.
References
Altschuller, S. (2013, January 10). Corporate responsibility for
human trafficking & five steps that your company can take right
now. Retrieved from
65. http://www.mondaq.com/unitedstates/x/215116/Corporate+Com
mercial+Law/Corporate+Responsibility+For+Human+Traffickin
g+Five+Steps+That+Your+Company+Can+Take+Right+Now.
Biron, C. L. (2014, January 03). U.S.: Hospitality, industrial
farming at risk for human trafficking. Global Information
Network. Retrieved from
http://search.proquest.com/docview/1474382911?accountid=828
9.
Farrell, A, McDevitt, J, and Fahy, S. (2010). Where are all the
victims? Understanding the determinants of official
identification of human trafficking incidents. Criminology &
Public Policy 9(2), 201-233.
Fields, S. (2013). Combating human trafficking: Engaging the
private sector. Retrieved from
http://www.stimson.org/spotlight/combating-human-trafficking-
engaging-the-private-sector/.
Forced Labor. (2010, September 8). The New York Times, p.26.
Retrieved from
http://www.lexisnexis.com.ezproxy1.apus.edu/lnacui2api/api/ve
rsion1/getDocCui?lni=50YT-GV11-DXY4-
X0NF&csi=6742&hl=t&hv=t&hnsd=f&hns=t&hgn=t&oc=00240
&perma=true.
Grubb, D and Bennett, K. (2012). The readiness of local law
enforcement to engage in U.S. anti-trafficking efforts: an
assessment of human trafficking training and awareness of
local, county, and state law enforcement agencies in the State of
Georgia. Police Practice and Research, 13(6), 487-500.
International Labour Office (2008) Combating forced labour: A
handbook for employers & business. Geneva: International
Labour Organization. Retrieved from
http://site.ebrary.com/lib/apus/reader.action?docID=10512144.