SlideShare a Scribd company logo
1 of 84
Women's Reproductive Rights
Women's reproductive rights are controlled in a myriad of ways
through both pro-natalist and anti-natalist policies.
Pro-natalist polices prohibit use of birth control and abortion in
an attempt to grow populations. Romania is a perfect example.
Anti-natalist policies put restrictions on women's ability to have
children. China's one child policy is a good example of an anti-
natalist policy. Women from marginalized and historically
oppressed groups in many cultures are sterilized in an attempt at
controlling those populations seen as undesirable. This
happened so frequently to black women in the U.S., that it was
called the "Mississippi Appendectomy." Latinas, Puerto Rican
women and Native American Indian women were also sterilized
against their will in large numbers.
Answer the following questions 2 pages
1). In Kligman's Political Demography: The Banning of
Abortion in Ceacescu's Romania, how were women's bodies tied
to reproduction and pro-natalism?
2). How were women's bodies policed under these policies?
What did women do when abortion was criminalized?
3). How does reproduction serve as an opportunity to control
women's bodies across cultures including here in the U.S.?
School of Security and Global Studies
Program Name: Security Management
Course Number: SCMT498
Course Name: Senior Seminar in Security Management
Credit Hours: 3 Credit Hours
Length of Course: 8 Weeks
Prerequisite: Completion of all other program requirements
Instructor Information
Instructor: See information provided in the Syllabus link in the
classroom
Email:
Please use internal classroom messaging system
Table of Contents
Course Description (Catalog)
The Capstone course is a senior level course designed to allow
the student to review, analyze and integrate the work the student
has completed toward a degree in Security Management. The
student will complete an approved academic project or paper
that demonstrates mastery of their program of study in a
meaningful culmination of their learning and to assess their
level of mastery of the stated outcomes of their degree
requirements. NOTE: All required, core, and major courses
must be completed prior to enrollment in this course. Student
must have SENIOR standing to register.
Table of Contents
Course Scope
This coursere-examines core program concepts, principles, and
best practices. The student will synthesize, integrate, and apply
program learning into a capstone paper or project. Students will
be required to participate in class discussions, complete an
annotated bibliography per APA Publication Manual, submit a
formal research proposal for professor approval, complete a
research paper or project, present the research to the class, and
critically comment on classmate’s papers and projects.
Table of Contents
Course Objectives
After completing this course, the student will be able to:
· Examine security management theory, concepts, principles,
techniques, and practices.
· Apply academic knowledge to identify and counter
organizational security risks and vulnerabilities.
· Identify strategic and tactical security solutions as part of a
broad based organizational protection plan.
· Describe and detail organizational security programs.
Table of Contents
Course Delivery Method
This final B.A. in Security Management course delivered via
distance learning will enable students to complete academic
work in a flexible manner, completely online. Course materials
and access to an online learning management system will be
made available to each student. Weekly assignments (submitted
for review by the Faculty Member) are posted on the discussion
board or are uploaded in assignments. Discussion assignments
are due on Thursdays. Research proposal, bibliography, research
paper/project, and classmate discussion responses are due by the
last day of the class week, Sunday. Assigned faculty will
support the students throughout this eight-week course.
Table of Contents
Course Resources
Required Course Textbooks:
Publication manual of the American Psychological Association
(6th ed.). (2009). Washington, D.C.: American Psychological
Association.
Required Readings: See Announcements
Additional Resources: See Announcements and Resources
Web Sites
In addition to the required course texts, the following public
domain web sites are useful. Please abide by the university’s
academic honesty policy when using Internet sources as well.
Note web site addresses are subject to change.
Site Name
Web Site URL/Address
How to Write a Bachelor’s Capstone Paper
http://www.ehow.com/how_5126546_write-bachelors-capstone-
paper.html
Writing in Third Person in APA Style
http://www.ehow.com/how_7232506_writing-third-person-apa-
style.html
The Difference between Formal and Informal Writing
http://www.word-
mart.com/html/formal_and_informal_writing.html
Guide to Grammar and Writing
http://grammar.ccc.commnet.edu/grammar/
Table of Contents
Evaluation Procedures
Grading will be based on three essay assignments, three forum
assignments (and six classmate responses – two in each of the
three weeks), a formal research proposal, an extended or
annotated bibliography per APA, a paper/project outline and
thorough summary, a research paper/project, and a forum
presentation of your paper/project (with “four” classmate
responses in week eight).
Reading Assignments: See Announcements and Lessons
Supplemental Readings: See above
Forum Assignments:
1. Introduction Forum – due by Sunday of week 1. Students will
introduce themselves in the Introduction Forum. The goal of the
forum is to accomplish two things 1) to build peer-to-peer
relationships by sharing introductions and background
information with classmates and 2) to express learning goals
and expectations for the class. This assignment requires 200 –
250 words and is a non-graded assignment.
2. Forums (posted in forums “only”) are due in weeks one, four
and six. The assignments, to allow time for students to respond,
must be “posted” by midnight EST Thursdays each of these
weeks. Two classmate responses are also required and scored in
“each” of these three weeks. Post only during the assigned
course week (do “not” post in advance). Assignments must
reflect some new or original information – do not just
regurgitate data or opinion posted by previous students.
Scoring Notes: Ensure your forum postings are “on time and
substantive.” Keep in mind that substantive means fully
answering and developing your assignment answers and
classmate responses. In the forum, do “not” be concise or brief
(however, do not add “fluff”). Failing to address assignment
questions will cause point deductions from your weekly
assignment scores. This includes not thoroughly explaining
your positions. Most assignments that receive full credit will
be answered with multiple and extensive paragraphs (depending
on the assignment, 500 to 1000 words is within the normal
range. At a minimum, “classmate responses” – opposed to
assignment answers, will be five “exceptional” sentences (not
simply stating agreement and/or a reiteration of the student’s
post) – usually much more.
Homework Assignments:
3. Assignments– There are three essay assignments due in
weeks two, four and six. The first essay in week two must be
750 words, and the essays in weeks four and six must be 500
words each. The essays will discuss “HOW” the capstone
project will address the seven undergraduate security
management program learning objectives listed below under
“research proposal”. The essays are NOT intended to discuss the
objective itself, only HOW the objective will be incorporated
into the project. The essays are due by Sunday of each week.
4. Research proposal – a formal research proposal is due by the
conclusion (Sunday) of week two. The professor will approve,
disapprove or approve with modifications all proposals.
Your research proposal will be based on an “issue or problem”
aligned with the requirements and criteria for obtaining the BA
Degree in Security Management. The essential criteria include
the seven undergraduate security management program learning
outcome objectives:
· Identify organizational security risk exposure; identify cost-
effective mitigation
strategies; and prepare for recovery strategies.
· Employ the use of risk analysis and vulnerability assessment
processes.
· Critically examine the variety and extent of losses from
criminal acts, natural disasters, and security breaches facing
society.
· Analyze or compare and contrast concepts of information
security, personnel security, and physical security and
determine the planning approaches to prevent business losses.
· Analyze the trends affecting security and loss prevention and
determine the approaches to reduce losses facing businesses and
institutions.
· Evaluate, from a multi-disciplinary approach, non-traditional
approaches to crime prevention.
· Distinguish between traditional criminal justice roles,
function, theories, and concepts as a reactive institution to the
security roles a preventive societal institution.
Your research application will propose an examination of a
current issue or problem in security management.
You are to compare and contrast the selected issue or problem
with past, present and potential future trends or solutions.
Alternatively, you may compare and contrast the experience of
organizations affected by a security industry trend or whom
have developed solutions to the problem and conduct analysis of
their success or failure.
Topic Selection: Topic selection may be difficult. Typically, a
capstone research candidate has a general idea of an area within
the discipline of security management they wish to explore.
Students are encouraged to select a topic they are interested in,
but which also has applicability to their organization. In this
instance, personal enjoyment is combined with the satisfaction
of potentially improving the security posture of your
organization.
Research Topic: Conduct a review of previous studies: Begin
your research with the tools and capable librarian/archivists
available to you in the APUS Online Research Center.
IRB Guidance for the Capstone
The capstone study program does not require primary research
for publication although it is an option (pending your faculty
advisor’s approval). In the case of primary research for
publication involving human subjects, the APUS/AMU
Institutional Review Board (IRB) located at:
http://www.apus.edu/community-scholars/institutional-review-
board/
must approve your research plan prior to beginning any such
research. As the Capstone is only four months in length, this
option is highly discouraged. Four months is not truly
commensurate with primary research for publication, which
traditionally requires a longer time period for a successful
study.
Ensure the availability of ample research resources: Initially,
conduct research to ensure your proposed topic is one, which
benefits from ample research resources. These may be in many
forms including: books, papers, manuscripts, theses, doctoral
dissertations, magazine and professional journal articles, Web-
based resources, interviews, etc.
Feasibility assessment: Ensure the research study goal is
attainable within the established parameters. Typically,
students initially decide on a capstone research topic that is
too broad.
Conducting preliminary research should serve to narrow
the focus considerably.
Proceed to:
http://library.weber.edu/ref/guides/howto/topicselection.cfm
and read the information on research topic selection.
Proceed to:
http://www.indiana.edu/~educy520/sec5982/week_2/hypothesis_
3.pdf#search=%27Writing%20a%20problem%20statement%20%
20hypothesis
and read the information on writing a problem statement.
Topic Guidance:Security-focused: Ensure the topic is focused
on some aspect of security in the post-9/11 environment. The
topic can be management focused. For example, you may focus
on the utility to a security department of initiating a skill-based
compensation program. The topic may be focused on rapidly-
changing technologies. For example, you may select the topic of
how IT security professionals are using technologies to secure
complex systems based on wireless networks. The topic could
focus on the challenges of managing a cross-cultural security
force in hazardous regions such as Iraq or Afghanistan. You
have a high degree of flexibility bounded only by your interest,
enthusiasm, and the agreement between yourself and your
capstone professor.
Take a multi-disciplinary approach: Convergence of many
disciplines and approaches is a key factor in the 21st Century
security environment. You will find yourself incapable of
writing a capstone study on a security-related topic without
some discussion of related disciplines such as homeland
security, counter-terrorism, intelligence analysis, law
enforcement, etc.
Seek innovation and unorthodox solutions: It is normal, while
researching a topic, to find “school solutions” based on
prevailing trends, thought processes, analysis, etc. The key to a
great capstone study is to apply your research outcome, your
personal experiences and background, and your analysis to
create a new and innovative solution or outcome. This is the
true essence of exciting learning and the highest attainable goal
in writing a great capstone study.
Research study statement: The research study statement is
composed once you have selected a topic and narrowed your
focus to a useful degree. It is a clear and concise statement of
the purpose of the capstone study. It must be a statement
capable of being proved or disproved through your research and
the capstone study process. It is, in effect, the path for your
journey through the capstone study experience.
· Example: You are writing on the pros and cons of outsourcing
security services in a war zone. The capstone study statement
(proposition) is that while outsourcing of security services is
cost-effective over the short-term, the long-term effect is the
destabilization of military manpower and a return to large-scale
mercenary operations lacking government oversight.
· Example: You are interested in security measures necessary to
secure wireless networks. The capstone study statement
(proposition) might be that wireless networks are inherently less
secure than other communications means. A security system
design to achieve wireless network security consists of the
following components.
Examples of Acceptable Topics
Aviation security system design in the post-9/11 environment;
are we there yet?
The impact of the convergence of public and private sector
security operations and constructs in the post-9/11 environment
Management under fire: creating and managing a cross-cultural
security force in harm’s way.
Case studies emphasizing the validity, or lack thereof, of certain
concepts, constructs, equipment, designs, management concepts,
etc. such as the proliferation of closed circuit television systems
and the privacy issues involved, achieving successful
integration of complex security system designs, zero-based
budgeting for security departments, implementing Crime
Prevention Through Environmental Design (CPTED) concepts
for protective services operations.
Examples of Unacceptable Projects
Over-generalized topics such as “homeland security” This topic
is highly relevant if not so generalized.
Topic conflict: for example, a discussion of both Crime
Prevention through Environmental Design (CPTED) and
Targeted Crime Reduction (TCR) - they are not the same, but
similar enough that they should be avoided (in tandem).
Small technical topics, for example, a comparison of the utility
of the .40 S&W cartridge with the .38 S&W Special Cartridge
for use on protective services details.
Topics that do not require challenging and innovative research,
i.e., over-generalized - for example, the history of private
security in America. In this instance, there is no point to be
proven or disproved.
MANDATORY PROPOSAL COMPONENTS
The following sections must be included in your proposal (3
page minimum body - not including cover page, abstract or
references):
1. Title Page with proposed title
2. Abstract – separate page
3. A concise capstone study statement for your proposed
research paper/project and a brief descriptive statement
a. Problem Statement
b. Significance of the Study
c. Research Question(s)
3. Paper/project components and key points to be covered in
your paper/project.
4. Proposed Methodology/Research Strategy – If you intend to
conduct primary research for publication, you must indicate the
scope of your proposed research, methodologies, estimate of
materials required for a successful effort, etc. Primary research
studies for publication are not recommended (see comments in
reference to the IRB process below)
a. Assumptions (if any)
b. Scope and Limitations
5. A preliminary, but detailed schedule of your plan to complete
the research study
6. Preliminary research sources
There will be 100 possible points for the proposal (15% of your
final grade) DUE ON Thursday OF WEEK 2.
5. An “annotated” research bibliography of a minimum of “six”
references (no older than seven years) to be used in your
paper/project is due in week three. Examples include “credible”
WWW reports and sites, books, manuscripts, theses,
dissertations, journals, newspapers, magazines, etc.
Submit/upload in a MS Word document. Ensure you follow the
APA style and each reference is thoroughly “summarized and
evaluated.”
Conducting Research: Upon topic approval conduct research
before proposal submission. Your starting point is the APUS
Online Research Center and the talented staff of librarians and
archivists available to assist you in your efforts. Resources
include:
· Bibliographic resources
· Web-based resources
· Web search engines
· Other resources
· Databases
Your search strategy focuses your search efforts and
makes efficient use of your time.
You must discuss search strategies first with your professor and
secondly, with the experts in the APUS Online Research Center.
There will be 100 possible annotated bibliography points (10%
of your final grade). Late submitters will be penalized 10 points
per day.
6. Extended paper/project outline, thorough summary and four
additional APA annotated references(total of 10 references) is
due in week five. This submission should be a significant
expansion of your research proposal and can be similar to a
rough draft. The body of this assignment should be a “minimum
of five pages.” Submit/upload this assignment in a MS Word
document.
There will be 100 possible points for the extended outline and
summary (10% of your final grade). Late submitters will be
penalized 10 points per day.
Exams/Quizzes: None
Field Experience Assignments: Optional (contact instructor)
Capstone Project:
7. Final capstone is due in week “seven”.
MANDATORY PROJECT COMPONENTS: See final capstone
template located in Resources
Sources from Wikipedia are “NOT” to be used as they
have been deemed unreliable.
ANY VIOLATIONS OF THE UNIVERSITY PLAGIARISM
POLICY WILL RESULT IN AN AUTOMATIC “F.” There
will be 100 possible points for your paper/proposal (40% of
your final grade
8. A formal presentation of your paper (and “four” classmate
responses) is due on Friday of week eight. You are required to
present your project to the class “in the forum area “only” –
“no” submission/uploading via Assignments. Your presentation
should provide a comprehensive overview and highlight the key
sections and points of your paper. A Microsoft PowerPoint slide
presentation is required. Do “not” attach and MS Word
document or copy your entire paper/project in the forum area.
Presentation/Classmate Response Scoring Notes: I will score
your presentation in “two parts.” Your presentation assignment
will be 80% of your possible grade. The remaining 20% of your
weekly assignment score will be based on the quality of your
“four” (5% each) forum “responses” to your classmates. The
excellence of your effort will be considered when grading your
presentation and classmate responses. Finally, there will be 100
total possible points for the presentation and classmate
responses (10% of your final grade). Late posters will be
penalized 10 points per day.
Grade Instruments
Points Possible
Forums 4 (weighted 40%)
100 / 400
Assignments – 6 (weighted 40%)
100 / 600
Capstone final (weighted 20%)
100
TOTAL
1100
Table of Contents
Course Outline
Please see the Student Handbook to reference the University’s
grading scale.
Week
Topic(s)
Learning Objectives
Readings
Assignment(s)
1
Autobiography & Response (1) / B.A. in Security Management
Program Objectives / Paper-Project Topic & Responses (2)
Develops potential topics, conducts preliminary research,
assesses various resources, research tools, libraries, etc.
Identifies and discusses “three” research topics and discusses
their viability with classmates and professor
Conducts research to identify and evaluate appropriate academic
and legitimate sources
See Announcements/Lessons
Autobiography & Response (1): Post to Introduction Forum only
- This is mandatory with a 250-word minimum
Week 1 Forum - post to Forum only
2
Research Proposal
Develops and submits a formal proposal
Validate a research plan.
Conducts research to identify and evaluate appropriate academic
and legitimate sources
Identify organizational security risk exposure; identify cost-
effective mitigation strategies; and prepare for recovery
strategies
Analyze concepts of information security, personnel security,
and physical security, and determine the planning approaches to
prevent business losses
Distinguish between traditional criminal justice roles, functions
and concepts as a reactive institution to the security roles as a
preventive societal institution
See Announcements/Lessons
Assignment 1 - Post to Assignments only - Capstone proposal -
Submit via Assignments using the Capstone proposal template
located in Resources
Assignment 2 – Post to Assignments only
3
Annotated Bibliography
Create an annotated bibliography
Conducts research to identify appropriate academic and
legitimate sources
See Announcements/Lessons
Assignment 3 - Post to Assignments only
4
Research Topic, Purpose/Problems Statements, Progress &
Responses (2)
Identifies and discusses the paper/project topic, thesis
statement, main points/sections with classmates and professor
Analyze the trends affecting security and loss prevention and
determine the approaches to reduce losses facing businesses and
institutions
Evaluate from a multi-disciplinary approach, non-traditional
approaches to crime prevention
See Announcements/Lessons
Week 4 Forum - Post to Forum only
Assignment 4 – Post to Assignments only
5
Outline, Summary & Additional Annotated Bibliographic
References
Revise the preliminary proposal into an acceptable first research
study draft
Conducts research to identify and evaluate appropriate academic
and legitimate sources
Employ the use of risk analysis and vulnerability assessment
processes
Identify organizational security risk exposure; identify cost-
effective mitigation strategies and prepare for recovery
strategies
See Announcements/Lessons
Assignment 5: Post to Assignments only – use the original
Capstone proposal form you used in Assignment 1 – just expand
on it (this is also the final Capstone template).
6
Research Topic / Responses (2)
Reports paper/project topic progress with classmates and
professor
Conducts research to identify and evaluate appropriate academic
and legitimate sources
Critically examine the variety and extent of losses from
criminal acts, natural disasters, and security breaches facing
society
See Announcements/Lessons
Week 6 Forum – Post to Forum only
Assignment 6 – Post to Assignments only
7
Research Paper/Project
Designs and submits research paper/project
Analyze the trends affecting security and loss prevention and
determine the approaches to reduce losses facing businesses and
institutions
Evaluate from a multi-disciplinary approach, non-traditional
approaches to crime prevention
See Announcements/Lessons
Assignment 7: Final Capstone – post to Assignments only
8
Paper-Project Presentation / Responses (4)
Presents paper/project to classmates and professor; and
critically/substantively comments on four classmate’s
papers/projects.
.
See Announcements/Lessons
Week 8 Forum - PowerPoint Presentation Assignment & Forum
Responses (2):Capstone Presentation - Post to Forums only
Policies
Please see theStudent Handbook to reference all University
policies. Quick links to frequently asked question about policies
are listed below.
Drop/Withdrawal Policy
Plagiarism Policy
Extension Process and Policy
Disability Accommodations
Writing Expectations
All written submissions should be submitted in a font and page
set-up that is readable and neat. It is recommended that students
try to adhere to a consistent format, which is described below.
· Typewritten in double-spaced format with a readable style and
font and submitted inside the electronic classroom (unless
classroom access is not possible and other arrangements have
been approved by the professor).
· Times New Roman, 12-point font is the only acceptable font
IAW APA (6th. ed.) guidance.
· Page margins Top, Bottom, Left Side and Right Side = 1 inch,
with reasonable accommodation being made for special
situations and online submission variances.
Citation and Reference Style
Attention Please: Students will follow the APA sixth edition as
the sole citation and reference style used in written work
submitted as part of coursework to the University. Assignments
completed in a narrative essay or composition format must
follow the citation style cited in the:
Publication manual of the American Psychological Association
(2009). (6th ed.). Washington, D.C.: American Psychological
Association.
Late Assignments
Students are expected to submit classroom assignments by the
posted due date and to complete the course according to the
published class schedule. As adults, students, and working
professionals, I understand you must manage competing
demands on your time. Should you need additional time to
complete an assignment, please contact me before the due date
so we can discuss the situation and determine an acceptable
resolution. Routine submission of late assignments is
unacceptable and may result in points deducted from your final
course grade.
Netiquette
Online universities promote the advancement of knowledge
through positive and constructive debate – both inside and
outside the classroom. Forums on the Internet, however, can
occasionally degenerate into needless insults and “flaming.”
Such activity and the loss of good manners are not acceptable in
a university setting – basic academic rules of good behavior and
proper “Netiquette” must persist. Remember that you are in a
place for the rewards and excitement of learning which does not
include descent to personal attacks or student attempts to stifle
the Forum of others.
· Technology Limitations: While you should feel free to explore
the full-range of creative composition in your formal papers,
keep e-mail layouts simple. The Sakai classroom may not fully
support MIME or HTML encoded messages, which means that
bold face, italics, underlining, and a variety of color-coding or
other visual effects will not translate in your e-mail messages.
· Humor Note: Despite the best of intentions, jokes and
especially satire can easily be lost or taken seriously. If you feel
the need for humor, you may wish to add “emoticons” to help
alert your readers: ;-), : ), (
Disclaimer Statement
Course content may vary from the outline to meet the needs of
this particular group.
Table of Contents
Online Library
The Online Library is available to enrolled students and faculty
from inside the electronic campus. This is your starting point
for access to online books, subscription periodicals, and Web
resources that are designed to support your classes and
generally not available through search engines on the open Web.
In addition, the Online Library provides access to special
learning resources, which the University has contracted to assist
with your studies. Questions can be directed to
[email protected].
· Charles Town Library and Inter Library Loan: The University
maintains a special library with a limited number of supporting
volumes, collection of our professors’ publication, and services
to search and borrow research books and articles from other
libraries.
· Electronic Books: You can use the online library to uncover
and download over 50,000 titles, which have been scanned and
made available in electronic format.
· Electronic Journals: The University provides access to over
12,000 journals, which are available in electronic form and only
through limited subscription services.
· Tutor.com: AMU and APU Civilian & Coast Guard students
are eligible for 10 free hours of tutoring provided by APUS.
Tutor.com connects you with a professional tutor online 24/7 to
provide help with assignments, studying, test prep, resume
writing, and more. Tutor.com is tutoring the way it was meant
to be. You get expert tutoring whenever you need help, and you
work one-to-one with your tutor in your online classroom on
your specific problem until it is done.
Request a Library Guide for your course
(http://apus.libguides.com/index.php)
The AMU/APU Library Guides provide access to collections of
trusted sites on the Open Web and licensed resources on the
Deep Web. The following are specially tailored for academic
research at APUS:
· Program Portals contain topical and methodological resources
to help launch general research in the degree program. To
locate, search by department name, or navigate by school.
· Course Lib-Guides narrow the focus to relevant resources for
the corresponding course. To locate, search by class code (e.g.,
SOCI111), or class name.
If a guide you need is not available yet, please email the APUS
Library: [email protected].
Table of Contents
Turnitin.com
Turnitin.com is a web-based plagiarism prevention application
licensed, for campus use, through the APUS Online Library.
The quick submit option lets faculty upload and check
suspicious papers, without requiring student to create their own
Turnitin.com profiles.
Turnitin.com analyzes electronic submissions of student
writing, compares them to the contents of a huge online
database, and generates a customized Originality Report. The
database used to produce this analysis contains a massive
collection of documents available on the Internet from both free
and commercial sources, as well as the full texts of all other
papers that have been previously submitted to Turnitin.com.
Similarity index is based on the amount of matching text to a
submitted paper:
Blue =
no matching text
Green =
one word to 24% matching
Yellow =
25 -49% matching text
Orange =
50-74% matching text
Red =
75-100% matching text
Selected BibliographyWeb Based Supplemental Resources
The Scientific Research Process
http://www.experiment-resources.com/steps-of-the-scientific-
method.html
Research Strategies – Qualitative, Quantitative, and Mixed
Methods
https://www.hitpages.com/doc/6596681877422080/1#pageTop
Developing a Research Problem Statement
http://faculty.washington.edu/ezent/imwps.htm
Developing a Purpose Statement
http://johnlatham.me/frameworks/research-methods-
framework/purpose-statement/
Developing Research Questions
http://libguides.mjc.edu/content.php?pid=163460&sid=1380251
The APA Sixth Edition Annotated Bibliography
http://libguides.brandonu.ca/content.php?pid=26571&sid=19758
6
Formal Writing Tips (Students must write in the third person
formal for the capstone):
http://www.quickanddirtytips.com/education/grammar/first-
second-and-third-person
Table of Contents
Last updated 30 October 2016
_1179669944.bin
_1179669945.bin
School of Security and Global Studies
Program Name: Security Management
Course Number: SCMT498
Course Name: Senior Seminar in Security Management
Credit Hours: 3 Credit Hours
Length of Course: 8 Weeks
Prerequisite: Completion of all other program requirements
Instructor Information
Instructor: See information provided in the Syllabus link in the
classroom
Email:
Please use internal classroom messaging system
Table of Contents
Course Description (Catalog)
The Capstone course is a senior level course designed to allow
the student to review, analyze and integrate the work the student
has completed toward a degree in Security Management. The
student will complete an approved academic project or paper
that demonstrates mastery of their program of study in a
meaningful culmination of their learning and to assess their
level of mastery of the stated outcomes of their degree
requirements. NOTE: All required, core, and major courses
must be completed prior to enrollment in this course. Student
must have SENIOR standing to register.
Table of Contents
Course Scope
This coursere-examines core program concepts, principles, and
best practices. The student will synthesize, integrate, and apply
program learning into a capstone paper or project. Students will
be required to participate in class discussions, complete an
annotated bibliography per APA Publication Manual, submit a
formal research proposal for professor approval, complete a
research paper or project, present the research to the class, and
critically comment on classmate’s papers and projects.
Table of Contents
Course Objectives
After completing this course, the student will be able to:
· Examine security management theory, concepts, principles,
techniques, and practices.
· Apply academic knowledge to identify and counter
organizational security risks and vulnerabilities.
· Identify strategic and tactical security solutions as part of a
broad based organizational protection plan.
· Describe and detail organizational security programs.
Table of Contents
Course Delivery Method
This final B.A. in Security Management course delivered via
distance learning will enable students to complete academic
work in a flexible manner, completely online. Course materials
and access to an online learning management system will be
made available to each student. Weekly assignments (submitted
for review by the Faculty Member) are posted on the discussion
board or are uploaded in assignments. Discussion assignments
are due on Thursdays. Research proposal, bibliography, research
paper/project, and classmate discussion responses are due by the
last day of the class week, Sunday. Assigned faculty will
support the students throughout this eight-week course.
Table of Contents
Course Resources
Required Course Textbooks:
Publication manual of the American Psychological Association
(6th ed.). (2009). Washington, D.C.: American Psychological
Association.
Required Readings: See Announcements
Additional Resources: See Announcements and Resources
Web Sites
In addition to the required course texts, the following public
domain web sites are useful. Please abide by the university’s
academic honesty policy when using Internet sources as well.
Note web site addresses are subject to change.
Site Name
Web Site URL/Address
How to Write a Bachelor’s Capstone Paper
http://www.ehow.com/how_5126546_write-bachelors-capstone-
paper.html
Writing in Third Person in APA Style
http://www.ehow.com/how_7232506_writing-third-person-apa-
style.html
The Difference between Formal and Informal Writing
http://www.word-
mart.com/html/formal_and_informal_writing.html
Guide to Grammar and Writing
http://grammar.ccc.commnet.edu/grammar/
Table of Contents
Evaluation Procedures
Grading will be based on three essay assignments, three forum
assignments (and six classmate responses – two in each of the
three weeks), a formal research proposal, an extended or
annotated bibliography per APA, a paper/project outline and
thorough summary, a research paper/project, and a forum
presentation of your paper/project (with “four” classmate
responses in week eight).
Reading Assignments: See Announcements and Lessons
Supplemental Readings: See above
Forum Assignments:
1. Introduction Forum – due by Sunday of week 1. Students will
introduce themselves in the Introduction Forum. The goal of the
forum is to accomplish two things 1) to build peer-to-peer
relationships by sharing introductions and background
information with classmates and 2) to express learning goals
and expectations for the class. This assignment requires 200 –
250 words and is a non-graded assignment.
2. Forums (posted in forums “only”) are due in weeks one, four
and six. The assignments, to allow time for students to respond,
must be “posted” by midnight EST Thursdays each of these
weeks. Two classmate responses are also required and scored in
“each” of these three weeks. Post only during the assigned
course week (do “not” post in advance). Assignments must
reflect some new or original information – do not just
regurgitate data or opinion posted by previous students.
Scoring Notes: Ensure your forum postings are “on time and
substantive.” Keep in mind that substantive means fully
answering and developing your assignment answers and
classmate responses. In the forum, do “not” be concise or brief
(however, do not add “fluff”). Failing to address assignment
questions will cause point deductions from your weekly
assignment scores. This includes not thoroughly explaining
your positions. Most assignments that receive full credit will
be answered with multiple and extensive paragraphs (depending
on the assignment, 500 to 1000 words is within the normal
range. At a minimum, “classmate responses” – opposed to
assignment answers, will be five “exceptional” sentences (not
simply stating agreement and/or a reiteration of the student’s
post) – usually much more.
Homework Assignments:
3. Assignments – There are three essay assignments due in
weeks two, four and six. The first essay in week two must be
750 words, and the essays in weeks four and six must be 500
words each. The essays will discuss “HOW” the capstone
project will address the seven undergraduate security
management program learning objectives listed below under
“research proposal”. The essays are NOT intended to discuss the
objective itself, only HOW the objective will be incorporated
into the project. The essays are due by Sunday of each week.
4. Research proposal – a formal research proposal is due by the
conclusion (Sunday) of week two. The professor will approve,
disapprove or approve with modifications all proposals.
Your research proposal will be based on an “issue or problem”
aligned with the requirements and criteria for obtaining the BA
Degree in Security Management. The essential criteria include
the seven undergraduate security management program learning
outcome objectives:
· Identify organizational security risk exposure; identify cost-
effective mitigation
strategies; and prepare for recovery strategies.
· Employ the use of risk analysis and vulnerability assessment
processes.
· Critically examine the variety and extent of losses from
criminal acts, natural disasters, and security breaches facing
society.
· Analyze or compare and contrast concepts of information
security, personnel security, and physical security and
determine the planning approaches to prevent business losses.
· Analyze the trends affecting security and loss prevention and
determine the approaches to reduce losses facing businesses and
institutions.
· Evaluate, from a multi-disciplinary approach, non-traditional
approaches to crime prevention.
· Distinguish between traditional criminal justice roles,
function, theories, and concepts as a reactive institution to the
security roles a preventive societal institution.
Your research application will propose an examination of a
current issue or problem in security management.
You are to compare and contrast the selected issue or problem
with past, present and potential future trends or solutions.
Alternatively, you may compare and contrast the experience of
organizations affected by a security industry trend or whom
have developed solutions to the problem and conduct analysis of
their success or failure.
Topic Selection: Topic selection may be difficult. Typically, a
capstone research candidate has a general idea of an area within
the discipline of security management they wish to explore.
Students are encouraged to select a topic they are interested in,
but which also has applicability to their organization. In this
instance, personal enjoyment is combined with the satisfaction
of potentially improving the security posture of your
organization.
Research Topic: Conduct a review of previous studies: Begin
your research with the tools and capable librarian/archivists
available to you in the APUS Online Research Center.
IRB Guidance for the Capstone
The capstone study program does not require primary research
for publication although it is an option (pending your faculty
advisor’s approval). In the case of primary research for
publication involving human subjects, the APUS/AMU
Institutional Review Board (IRB) located at:
http://www.apus.edu/community-scholars/institutional-review-
board/
must approve your research plan prior to beginning any such
research. As the Capstone is only four months in length, this
option is highly discouraged. Four months is not truly
commensurate with primary research for publication, which
traditionally requires a longer time period for a successful
study.
Ensure the availability of ample research resources: Initially,
conduct research to ensure your proposed topic is one, which
benefits from ample research resources. These may be in many
forms including: books, papers, manuscripts, theses, doctoral
dissertations, magazine and professional journal articles, Web-
based resources, interviews, etc.
Feasibility assessment: Ensure the research study goal is
attainable within the established parameters. Typically,
students initially decide on a capstone research topic that is
too broad.
Conducting preliminary research should serve to narrow
the focus considerably.
Proceed to:
http://library.weber.edu/ref/guides/howto/topicselection.cfm
and read the information on research topic selection.
Proceed to:
http://www.indiana.edu/~educy520/sec5982/week_2/hypothesis_
3.pdf#search=%27Writing%20a%20problem%20statement%20%
20hypothesis
and read the information on writing a problem statement.
Topic Guidance:Security-focused: Ensure the topic is focused
on some aspect of security in the post-9/11 environment. The
topic can be management focused. For example, you may focus
on the utility to a security department of initiating a skill-based
compensation program. The topic may be focused on rapidly-
changing technologies. For example, you may select the topic of
how IT security professionals are using technologies to secure
complex systems based on wireless networks. The topic could
focus on the challenges of managing a cross-cultural security
force in hazardous regions such as Iraq or Afghanistan. You
have a high degree of flexibility bounded only by your interest,
enthusiasm, and the agreement between yourself and your
capstone professor.
Take a multi-disciplinary approach: Convergence of many
disciplines and approaches is a key factor in the 21st Century
security environment. You will find yourself incapable of
writing a capstone study on a security-related topic without
some discussion of related disciplines such as homeland
security, counter-terrorism, intelligence analysis, law
enforcement, etc.
Seek innovation and unorthodox solutions: It is normal, while
researching a topic, to find “school solutions” based on
prevailing trends, thought processes, analysis, etc. The key to a
great capstone study is to apply your research outcome, your
personal experiences and background, and your analysis to
create a new and innovative solution or outcome. This is the
true essence of exciting learning and the highest attainable goal
in writing a great capstone study.
Research study statement: The research study statement is
composed once you have selected a topic and narrowed your
focus to a useful degree. It is a clear and concise statement of
the purpose of the capstone study. It must be a statement
capable of being proved or disproved through your research and
the capstone study process. It is, in effect, the path for your
journey through the capstone study experience.
· Example: You are writing on the pros and cons of outsourcing
security services in a war zone. The capstone study statement
(proposition) is that while outsourcing of security services is
cost-effective over the short-term, the long-term effect is the
destabilization of military manpower and a return to large-scale
mercenary operations lacking government oversight.
· Example: You are interested in security measures necessary to
secure wireless networks. The capstone study statement
(proposition) might be that wireless networks are inherently less
secure than other communications means. A security system
design to achieve wireless network security consists of the
following components.
Examples of Acceptable Topics
Aviation security system design in the post-9/11 environment;
are we there yet?
The impact of the convergence of public and private sector
security operations and constructs in the post-9/11 environment
Management under fire: creating and managing a cross-cultural
security force in harm’s way.
Case studies emphasizing the validity, or lack thereof, of certain
concepts, constructs, equipment, designs, management concepts,
etc. such as the proliferation of closed circuit television systems
and the privacy issues involved, achieving successful
integration of complex security system designs, zero-based
budgeting for security departments, implementing Crime
Prevention Through Environmental Design (CPTED) concepts
for protective services operations.
Examples of Unacceptable Projects
Over-generalized topics such as “homeland security” This topic
is highly relevant if not so generalized.
Topic conflict: for example, a discussion of both Crime
Prevention through Environmental Design (CPTED) and
Targeted Crime Reduction (TCR) - they are not the same, but
similar enough that they should be avoided (in tandem).
Small technical topics, for example, a comparison of the utility
of the .40 S&W cartridge with the .38 S&W Special Cartridge
for use on protective services details.
Topics that do not require challenging and innovative research,
i.e., over-generalized - for example, the history of private
security in America. In this instance, there is no point to be
proven or disproved.
MANDATORY PROPOSAL COMPONENTS
The following sections must be included in your proposal (3
page minimum body - not including cover page, abstract or
references):
1. Title Page with proposed title
2. Abstract – separate page
3. A concise capstone study statement for your proposed
research paper/project and a brief descriptive statement
a. Problem Statement
b. Significance of the Study
c. Research Question(s)
3. Paper/project components and key points to be covered in
your paper/project.
4. Proposed Methodology/Research Strategy – If you intend to
conduct primary research for publication, you must indicate the
scope of your proposed research, methodologies, estimate of
materials required for a successful effort, etc. Primary research
studies for publication are not recommended (see comments in
reference to the IRB process below)
a. Assumptions (if any)
b. Scope and Limitations
5. A preliminary, but detailed schedule of your plan to complete
the research study
6. Preliminary research sources
There will be 100 possible points for the proposal (15% of your
final grade) DUE ON Thursday OF WEEK 2.
5. An “annotated” research bibliography of a minimum of “six”
references (no older than seven years) to be used in your
paper/project is due in week three. Examples include “credible”
WWW reports and sites, books, manuscripts, theses,
dissertations, journals, newspapers, magazines, etc.
Submit/upload in a MS Word document. Ensure you follow the
APA style and each reference is thoroughly “summarized and
evaluated.”
Conducting Research: Upon topic approval conduct research
before proposal submission. Your starting point is the APUS
Online Research Center and the talented staff of librarians and
archivists available to assist you in your efforts. Resources
include:
· Bibliographic resources
· Web-based resources
· Web search engines
· Other resources
· Databases
Your search strategy focuses your search efforts and
makes efficient use of your time.
You must discuss search strategies first with your professor and
secondly, with the experts in the APUS Online Research Center.
There will be 100 possible annotated bibliography points (10%
of your final grade). Late submitters will be penalized 10 points
per day.
6. Extended paper/project outline, thorough summary and four
additional APA annotated references (total of 10 references) is
due in week five. This submission should be a significant
expansion of your research proposal and can be similar to a
rough draft. The body of this assignment should be a “minimum
of five pages.” Submit/upload this assignment in a MS Word
document.
There will be 100 possible points for the extended outline and
summary (10% of your final grade). Late submitters will be
penalized 10 points per day.
Exams/Quizzes: None
Field Experience Assignments: Optional (contact instructor)
Capstone Project:
7. Final capstone is due in week “seven”.
MANDATORY PROJECT COMPONENTS: See final capstone
template located in Resources
Sources from Wikipedia are “NOT” to be used as they
have been deemed unreliable.
ANY VIOLATIONS OF THE UNIVERSITY PLAGIARISM
POLICY WILL RESULT IN AN AUTOMATIC “F.” There
will be 100 possible points for your paper/proposal (40% of
your final grade
8. A formal presentation of your paper (and “four” classmate
responses) is due on Friday of week eight. You are required to
present your project to the class “in the forum area “only” –
“no” submission/uploading via Assignments. Your presentation
should provide a comprehensive overview and highlight the key
sections and points of your paper. A Microsoft PowerPoint slide
presentation is required. Do “not” attach and MS Word
document or copy your entire paper/project in the forum area.
Presentation/Classmate Response Scoring Notes: I will score
your presentation in “two parts.” Your presentation assignment
will be 80% of your possible grade. The remaining 20% of your
weekly assignment score will be based on the quality of your
“four” (5% each) forum “responses” to your classmates. The
excellence of your effort will be considered when grading your
presentation and classmate responses. Finally, there will be 100
total possible points for the presentation and classmate
responses (10% of your final grade). Late posters will be
penalized 10 points per day.
Grade Instruments
Points Possible
Forums 4 (weighted 40%)
100 / 400
Assignments – 6 (weighted 40%)
100 / 600
Capstone final (weighted 20%)
100
TOTAL
1100
Table of Contents
Course Outline
Please see the Student Handbook to reference the University’s
grading scale.
Week
Topic(s)
Learning Objectives
Readings
Assignment(s)
1
Autobiography & Response (1) / B.A. in Security Management
Program Objectives / Paper-Project Topic & Responses (2)
Develops potential topics, conducts preliminary research,
assesses various resources, research tools, libraries, etc.
Identifies and discusses “three” research topics and discusses
their viability with classmates and professor
Conducts research to identify and evaluate appropriate academic
and legitimate sources
See Announcements/Lessons
Autobiography & Response (1): Post to Introduction Forum only
- This is mandatory with a 250-word minimum
Week 1 Forum - post to Forum only
2
Research Proposal
Develops and submits a formal proposal
Validate a research plan.
Conducts research to identify and evaluate appropriate academic
and legitimate sources
Identify organizational security risk exposure; identify cost-
effective mitigation strategies; and prepare for recovery
strategies
Analyze concepts of information security, personnel security,
and physical security, and determine the planning approaches to
prevent business losses
Distinguish between traditional criminal justice roles, functions
and concepts as a reactive institution to the security roles as a
preventive societal institution
See Announcements/Lessons
Assignment 1 - Post to Assignments only - Capstone proposal -
Submit via Assignments using the Capstone proposal template
located in Resources
Assignment 2 – Post to Assignments only
3
Annotated Bibliography
Create an annotated bibliography
Conducts research to identify appropriate academic and
legitimate sources
See Announcements/Lessons
Assignment 3 - Post to Assignments only
4
Research Topic, Purpose/Problems Statements, Progress &
Responses (2)
Identifies and discusses the paper/project topic, thesis
statement, main points/sections with classmates and professor
Analyze the trends affecting security and loss prevention and
determine the approaches to reduce losses facing businesses and
institutions
Evaluate from a multi-disciplinary approach, non-traditional
approaches to crime prevention
See Announcements/Lessons
Week 4 Forum - Post to Forum only
Assignment 4 – Post to Assignments only
5
Outline, Summary & Additional Annotated Bibliographic
References
Revise the preliminary proposal into an acceptable first research
study draft
Conducts research to identify and evaluate appropriate academic
and legitimate sources
Employ the use of risk analysis and vulnerability assessment
processes
Identify organizational security risk exposure; identify cost-
effective mitigation strategies and prepare for recovery
strategies
See Announcements/Lessons
Assignment 5: Post to Assignments only – use the original
Capstone proposal form you used in Assignment 1 – just expand
on it (this is also the final Capstone template).
6
Research Topic / Responses (2)
Reports paper/project topic progress with classmates and
professor
Conducts research to identify and evaluate appropriate academic
and legitimate sources
Critically examine the variety and extent of losses from
criminal acts, natural disasters, and security breaches facing
society
See Announcements/Lessons
Week 6 Forum – Post to Forum only
Assignment 6 – Post to Assignments only
7
Research Paper/Project
Designs and submits research paper/project
Analyze the trends affecting security and loss prevention and
determine the approaches to reduce losses facing businesses and
institutions
Evaluate from a multi-disciplinary approach, non-traditional
approaches to crime prevention
See Announcements/Lessons
Assignment 7: Final Capstone – post to Assignments only
8
Paper-Project Presentation / Responses (4)
Presents paper/project to classmates and professor; and
critically/substantively comments on four classmate’s
papers/projects.
.
See Announcements/Lessons
Week 8 Forum - PowerPoint Presentation Assignment & Forum
Responses (2):Capstone Presentation - Post to Forums only
Policies
Please see the Student Handbook to reference all University
policies. Quick links to frequently asked question about policies
are listed below.
Drop/Withdrawal Policy
Plagiarism Policy
Extension Process and Policy
Disability Accommodations
Writing Expectations
All written submissions should be submitted in a font and page
set-up that is readable and neat. It is recommended that students
try to adhere to a consistent format, which is described below.
· Typewritten in double-spaced format with a readable style and
font and submitted inside the electronic classroom (unless
classroom access is not possible and other arrangements have
been approved by the professor).
· Times New Roman, 12-point font is the only acceptable font
IAW APA (6th. ed.) guidance.
· Page margins Top, Bottom, Left Side and Right Side = 1 inch,
with reasonable accommodation being made for special
situations and online submission variances.
Citation and Reference Style
Attention Please: Students will follow the APA sixth edition as
the sole citation and reference style used in written work
submitted as part of coursework to the University. Assignments
completed in a narrative essay or composition format must
follow the citation style cited in the:
Publication manual of the American Psychological Association
(2009). (6th ed.). Washington, D.C.: American Psychological
Association.
Late Assignments
Students are expected to submit classroom assignments by the
posted due date and to complete the course according to the
published class schedule. As adults, students, and working
professionals, I understand you must manage competing
demands on your time. Should you need additional time to
complete an assignment, please contact me before the due date
so we can discuss the situation and determine an acceptable
resolution. Routine submission of late assignments is
unacceptable and may result in points deducted from your final
course grade.
Netiquette
Online universities promote the advancement of knowledge
through positive and constructive debate – both inside and
outside the classroom. Forums on the Internet, however, can
occasionally degenerate into needless insults and “flaming.”
Such activity and the loss of good manners are not acceptable in
a university setting – basic academic rules of good behavior and
proper “Netiquette” must persist. Remember that you are in a
place for the rewards and excitement of learning which does not
include descent to personal attacks or student attempts to stifle
the Forum of others.
· Technology Limitations: While you should feel free to explore
the full-range of creative composition in your formal papers,
keep e-mail layouts simple. The Sakai classroom may not fully
support MIME or HTML encoded messages, which means that
bold face, italics, underlining, and a variety of color-coding or
other visual effects will not translate in your e-mail messages.
· Humor Note: Despite the best of intentions, jokes and
especially satire can easily be lost or taken seriously. If you feel
the need for humor, you may wish to add “emoticons” to help
alert your readers: ;-), : ), (
Disclaimer Statement
Course content may vary from the outline to meet the needs of
this particular group.
Table of Contents
Online Library
The Online Library is available to enrolled students and faculty
from inside the electronic campus. This is your starting point
for access to online books, subscription periodicals, and Web
resources that are designed to support your classes and
generally not available through search engines on the open Web.
In addition, the Online Library provides access to special
learning resources, which the University has contracted to assist
with your studies. Questions can be directed to
[email protected].
· Charles Town Library and Inter Library Loan: The University
maintains a special library with a limited number of supporting
volumes, collection of our professors’ publication, and services
to search and borrow research books and articles from other
libraries.
· Electronic Books: You can use the online library to uncover
and download over 50,000 titles, which have been scanned and
made available in electronic format.
· Electronic Journals: The University provides access to over
12,000 journals, which are available in electronic form and only
through limited subscription services.
· Tutor.com: AMU and APU Civilian & Coast Guard students
are eligible for 10 free hours of tutoring provided by APUS.
Tutor.com connects you with a professional tutor online 24/7 to
provide help with assignments, studying, test prep, resume
writing, and more. Tutor.com is tutoring the way it was meant
to be. You get expert tutoring whenever you need help, and you
work one-to-one with your tutor in your online classroom on
your specific problem until it is done.
Request a Library Guide for your course
(http://apus.libguides.com/index.php)
The AMU/APU Library Guides provide access to collections of
trusted sites on the Open Web and licensed resources on the
Deep Web. The following are specially tailored for academic
research at APUS:
· Program Portals contain topical and methodological resources
to help launch general research in the degree program. To
locate, search by department name, or navigate by school.
· Course Lib-Guides narrow the focus to relevant resources for
the corresponding course. To locate, search by class code (e.g.,
SOCI111), or class name.
If a guide you need is not available yet, please email the APUS
Library: [email protected].
Table of Contents
Turnitin.com
Turnitin.com is a web-based plagiarism prevention application
licensed, for campus use, through the APUS Online Library.
The quick submit option lets faculty upload and check
suspicious papers, without requiring student to create their own
Turnitin.com profiles.
Turnitin.com analyzes electronic submissions of student
writing, compares them to the contents of a huge online
database, and generates a customized Originality Report. The
database used to produce this analysis contains a massive
collection of documents available on the Internet from both free
and commercial sources, as well as the full texts of all other
papers that have been previously submitted to Turnitin.com.
Similarity index is based on the amount of matching text to a
submitted paper:
Blue =
no matching text
Green =
one word to 24% matching
Yellow =
25 -49% matching text
Orange =
50-74% matching text
Red =
75-100% matching text
Selected BibliographyWeb Based Supplemental Resources
The Scientific Research Process
http://www.experiment-resources.com/steps-of-the-scientific-
method.html
Research Strategies – Qualitative, Quantitative, and Mixed
Methods
https://www.hitpages.com/doc/6596681877422080/1#pageTop
Developing a Research Problem Statement
http://faculty.washington.edu/ezent/imwps.htm
Developing a Purpose Statement
http://johnlatham.me/frameworks/research-methods-
framework/purpose-statement/
Developing Research Questions
http://libguides.mjc.edu/content.php?pid=163460&sid=1380251
The APA Sixth Edition Annotated Bibliography
http://libguides.brandonu.ca/content.php?pid=26571&sid=19758
6
Formal Writing Tips (Students must write in the third person
formal for the capstone):
http://www.quickanddirtytips.com/education/grammar/first-
second-and-third-person
Table of Contents
Last updated 30 October 2016
_1179669944.bin
_1179669945.bin
Running Head: Security & Human Trafficking
1
Security & Human Trafficking
2
American Public University System
American Military University
Title of paper goes here
Date:
Your name goes here
SCMT498 Session # goes here
Submitted in partial fulfillment of the degree requirements for
the
BA in Security Management
Abstract
The intent of this mixed method capstone is to determine how
security professionals can successfully combat human
trafficking. The issue of human trafficking produces challenges
for law enforcement and security professionals worldwide. This
capstone will challenge the reader by further defining human
trafficking, identifying the scope and magnitude of this
phenomenon, and examining the U.S.’s domestic legislative
attempts to combat it. After considering all of these factors,
there will be an examination of how human trafficking
influences, or should influence, vulnerability assessments, risk
analysis, and risk exposure strategies in security management.
Problem Statement
The problem this mixed method capstone will seek to
address is how security managers can identify and implement
proactive anti-human trafficking efforts. From a border security
and immigration standpoint, the United States (U.S.) and United
Nations (U.N.) have taken productive steps toward defining and
combating human trafficking through legislation and traditional
law enforcement. The threats associated to human trafficking
have the potential to adversely effect corporations. If a
company were found to support human trafficking through its
human resource practices or if company executives are found to
contribute to human trafficking through the hiring of
undocumented housekeepers, prostitutes, or other individuals
held in captivity, the executive’s personal safety and the
company’s overall wellbeing could all be at stake. How are
security strategies adjusted to account for human trafficking and
the associated security and political concerns?
Purpose Statement
The purpose of this mixed method capstone is first to clearly
define human trafficking and identify the steps taken, both
nationally and internationally, to address this issue. Finally,
there will be an examination of proactive measures being
employed, or those that could be taken, by proprietary and
contract security professionals to protect their clients from
human trafficking concerns. Essentially, the aim is to examine
practices employed by security professionals that educate
human resources processes in an effort to avoid victims of
human trafficking as well as traditional vulnerability and risk
management practices aimed at reducing the likelihood of
company assets being associated with human trafficking.
Research Questions
Q1. Which industries are at higher risk to be affected by human
trafficking?
Q2. How can organizational risk exposure strategies be
employed to combat human trafficking?
Q3. How do the private security and traditional law
enforcement roles differ concerning human trafficking?
Q4. How can vulnerability assessment processes be used to
identify the presence of human trafficking?
Key Points Addressed
P1. Human trafficking is a large problem in the United States
and the International community.
P2. Law enforcement agencies have made steps toward better
understanding human trafficking but there is still much progress
yet to be made.
P3. Human Trafficking is not only a national security concern
but also a concern for businesses and their security managers.
P4. Organizational risk exposure can be greatly reduced
through a comprehensive human trafficking education program
put in place by the security manager.
Methodology/Research Strategy
The research method selected as most appropriate for this study
is the mixed method. The qualitative research will focus on
gathering data related to the history and evolution of human
trafficking both in the United States and abroad. This will
provide context for further discussion. The qualitative research
method will also be utilized to properly define the terms being
utilized, to explore legislation put in place by the United States
and the United Nations, and to identify standard security
practices designed to combat human trafficking. The
quantitative research method will be utilized to gather
numerical data supporting the overall impact of human
trafficking, to include the estimated number of victims, any
adverse financial impacts that can be discovered, and any
impact of law enforcement efforts to counter human trafficking.
Assumptions
One assumption is that quantitative data will be difficult to
obtain due to the underground nature of human trafficking.
Many non-profit organizations may have estimates, but vetted
data may be limited. It is also assumed that data regarding
private security approaches to human trafficking may be limited
and may result in speculative reporting regarding the security
industry’s approach to this phenomenon.
Scope
The scope of this capstone will focus on the efforts of security
managers and will hopefully identify best practices and areas of
improvement for security managers.
Limitations
The only limitation known is the time constraint preventing
comprehensive research, which will result in a reduction of
comprehensive data for consideration.
Human Trafficking: A Security Manager’s Developing
Challenge
Many challenges face corporate interests and for businesses
operating in an international environment, the risks are even
greater. One issue that faces international law enforcement and
private businesses, and has recently gained notoriety in popular
culture, is human trafficking. Human trafficking, or trafficking
in persons, is a term used to describe the movement of people
for use in various industries. According to the U.S. Department
of State (2014),the methodology of human trafficking can
include “sex trafficking” of adults and children, “forced labor”,
“bonded labor or debt bondage”, “involuntary domestic
servitude”, “forced child labor”, and “unlawful recruitment and
use of child soldiers” (p.19). Human trafficking is gaining
traction as a 21st century epidemic, often noted as modern day
slavery, and is even among one of the annual training
requirements for U.S. military and Department of Defense
employees. Human trafficking and forced labor are terms that
are often confused. As noted in the aforementioned definition,
human trafficking and forced labor are not the same; although,
the term human trafficking is often used as a synonym for
forced labor and vice-a-versa. It is important to note that
human trafficking only describes the actual transportation of
victims and does not address the reason for victim transport or
type of captivity enforced thereafter. Forced labor, unlike
human trafficking, involves the revocation of the freedoms of
employees forced to work. Another common methodology of
human trafficking is debt bondage. Debt bondage is similar to
forced labor, but debt bondage often involves a scenario where
a worker is charged a large monetary fee, often under the ruse
being a recruiting fee or hiring fee, and they incur a large debt
as a result. The employee starts their work already in a large
amount of debt and they often find the salary they earn is far
less than the salary they were promised when recruited. This
scenario often results in the employee, who has large amounts
of unpaid debt, continuing to work for a meager salary while
trying to pay off the debt. This situation becomes an endless
cycle with no resolution as the workers’ low wages prevent
them from ever fully repaying the debt and thus, preventing
them from being granted their freedom to leave. To further
control their victims, the perpetrators of forced labor and debt
bondage will often illegally sneak workers into a country and
then threaten them with deportation or, in the event of a legal
immigrant, they will hold their passport until their debt is paid,
thus eliminating their ability to leave. There are several
methods in which workers are denied basic freedoms and held in
captivity, but regardless of how the act is committed, it is still
detrimental. When considering the methodologies used in
human trafficking, it is easy to mistakenly assume this is a rare
phenomenon, is an uncommon issue, or at least an issue that
does not occur within the boundaries of the United States. All
of these assumptions would be incorrect. In fact, Miko (2006)
reported, “there are an estimated two to four million people
victimized by transnational human trafficking each year. Of
those two to four million victims, it is estimated that 17,500 of
them are smuggled into the United States annually” (para 2).
While these statistics show that human trafficking within the
United States accounts for less than one percent of global
human trafficking, the epidemic still adversely affects American
interests even when it occurs abroad. As participants in the
global marketplace, corporations and their security managers
must be keenly aware of the vulnerabilities and liabilities
associated with human trafficking. Corporations are not the
only entities that have had to develop systems for combating
human trafficking; the issue has especially challenged law
enforcement agencies and non-governmental organizations
worldwide.
As human trafficking has become more wide spread and
publicized, law enforcement agencies at all levels have been
challenged with creating effective education programs, agency
enforcement policies, and comprehensive mitigation strategies.
While modest advances have been made toward creating a more
educated police force, the progress has proven to be extremely
slow. According to Farrell, McDevitt, and Fahy (2010), a
national survey of law enforcement agencies revealed, “Less
than one fifth of the agencies responding to the national survey
had conducted any type of human trafficking training” (p.222).
Farrell et al. (2010) went on to say, of those agencies that did
conduct human trafficking training, “most (47%) used brief, in-
service training sessions or only offered specialized regional
training for a few investigators (43%)” (p.222). The results of
this national survey establish a concern that traditional law
enforcement is not trained nor equipped to fully combat human
trafficking. To put it more plainly, law enforcement personnel
are not currently able to combat human trafficking because they
have ill-equipped training. A more current national survey
could not be found so there is a possibility in more recent years
police agencies have increased their focus toward human
trafficking, but further research suggests otherwise. More
comprehensive examination revealed an additional survey was
taken a couple of years after the aforementioned national
survey, yet it yielded similar results. In fact, the concern of
inadequate training and preparation of police forces was more
so substantiated as a result of this survey administered to law
enforcement agencies in the State of Georgia. According to
Grubb & Bennett (2012), “The Georgia Law Enforcement
Survey [determined] that over 75% of all respondents reported
that no human trafficking training took place within their
agencies in the last four years” (p.496). Additionally, the
survey found that in addition to a lack of proper training, most
law enforcement agencies failed to establish specific protocols
or polices focused on human trafficking. To wit, Grubb &
Bennett (2012) reported “Only 6% of the respondents in the
current study reported that their departments had such protocols
or policies in place” (p.496). These results show that while law
enforcement agencies have taken steps toward a better
understanding this problem, there is still much progress yet to
be made. With only one-fourth of the police population
receiving training, it is easy to see how police are still
unprepared. More recently, the U.S. Congress passed a bill
titled, the Justice for Victims of Trafficking Act of 2015. This
bill directly addressed the inadequate law enforcement training
issue by requiring the Department of Justice to provide specific,
technical anti-trafficking training to Federal, State, and local
law enforcement. The training will include effective methods
for investigating covered offenders. Additionally the Justice for
Victims of Trafficking Act of 2015 requires an annual report be
produced, and provided to the U.S. Senate Committee on the
Judiciary. The annual report will show arrest, prosecution, and
conviction data for trafficking related crimes. The President has
not yet signed this bill, but in the event it is signed, there will
presumably be a delay in enacting its requirements.
Unfortunately, because of the ill preparedness evident in these
surveys and in the need for Congress to formally hold law
enforcement accountable, private security managers cannot trust
traditional law enforcement alone to protect their businesses
from the threats associated with human trafficking. Even when
law enforcement personnel have a better understanding of the
issue, their approach will be reactive in nature. Their impact
would be limited to responding to citizen concerns regarding
human trafficking. Certainly city, state, and the federal
government will encourage community-policing initiatives,
public awareness campaigns, and will encourage police agencies
to increase their awareness of human trafficking, but ultimately
law enforcement will primarily fulfill a reactive role in
combating this issue. Unfortunately, even if they try to be
proactive, law enforcement professionals will have a difficult
time impacting human trafficking due to the covert nature in
which it is conducted. Criminal gangs or other organized
criminal groups are often responsible for the human trafficking
that occurs internationally and within the United States. These
gangs exercise excellent operational security; which makes it
difficult for law enforcement to counteract them. Additionally,
many corporations’ supply chains originate overseas, outside of
the jurisdictional boundaries of U.S. based law enforcement
agencies. As a result, even if U.S. law enforcement agencies
were competent in battling human trafficking, these
corporations would have to depend on foreign police forces to
identify issues in the international supply chain locations. It is
presumed many foreign governments and their law enforcement
entities are replete with corruption and thus can’t be trusted to
enforce anti trafficking protocols within their jurisdictions. For
these reasons, security managers must develop and rely on their
own proactive programs in order to identify human trafficking
within their ranks.
At first glance, human trafficking can appear as solely a law
enforcement issue, but human trafficking is not only a national
security concern but also a concern for businesses and their
security managers. In fact, international companies actually
benefit from contributing to the fight against human trafficking
by collaborating with international government entities, non-
governmental agencies, and other private organizations.
Security managers can make sure their corporations benefit by
maintaining a proactive anti-trafficking program. A few of
these benefits include avoiding criminal investigations,
sanctions, and fines. An added benefit of a strong anti-
trafficking program is the positive public image portrayed by
showing proactive measures toward this increasingly well
known global and social issue. Because human trafficking is
seen as a human rights issue, a company who takes proactive
measures to combat it would likely receive positive press,
which would influence marketability and hopefully increase
sales and profit. According to Fields (2013), “By taking action
against human trafficking, companies protect their financial
interests and promote themselves as being socially responsible”
(para 3). A great example of this comes from a 2007 scandal
involving allegations of child labor at a Gap clothing
corporation’s sub-contracted facility in India. The incident
resulted in poor publicity; but Gap used the media attention as
an opportunity to publicly restate their zero tolerance policy
regarding child labor and restructure procedures. Fields (2013)
said of Gap’s response “This resulted in improved supply chain
tracking, enhanced monitoring, and education and awareness-
raising…Certainly, Gap was motivated in large part by the need
to protect its brand name” (para 7). While globally publicized
trafficking scandals can be harmful to business, a proactive,
preventative and publicized corporate policy against trafficking
and forced labor can benefit a company in the private sector.
Until recent years, corporations only addressed human
trafficking of their own free will and were not dictated by
anyone. Some companies maintained these efforts in order to
guard against liability while others truly wanted the positive
public relations that would result from contributing to non-
governmental organization efforts to combat human trafficking.
This structure, since it was completely voluntary, resulted in
some companies addressing the concerns while other companies
did nothing. In an effort to create consistency in business
practices, and force more compliance with emerging industry
anti-trafficking standards, some states authored legislation that
allowed the state government to begin monitoring corporate
anti-trafficking efforts. According to Altschuller (2013):
New statutes, including the California Transparency in Supply
Chains Act and the proposed Business Transparency on
Trafficking and Slavery Act have focused attention on corporate
efforts to address human trafficking risks. The California
statute, which went into effect on January 1, 2012, requires
companies to make public disclosures of their efforts, if any, to
ensure that their supply chains are free from forced labor and
human trafficking (para 3).
It is easy to see that creating corporate anti-trafficking efforts is
of increasing importance to many executives in the private
sector. Consolidating these new anti-trafficking efforts under a
corporate social responsibility program is becoming a popular
practice. The goal of a corporate social responsibility program
is to create and participate in initiatives that benefit society.
The hope for these programs would be that by improving
society, especially local communities in which the company
operates, the company would increase its public image while
also contributing to societal improvements likely to reduce risk
of loss to the company. The challenge for corporate executives
was in aligning the corporate social responsibility program
initiatives within existing corporate constructs. Would a new
program manager be created, resulting in additional payroll
expenses, or could an existing position incorporate corporate
social responsibility efforts within their current duties? While
the idea of having a corporate social responsibility program is
generally a new initiative, there are strong trends emerging that
suggest it is becoming an industry standard. According to Kane
(2011), “The Security Executive Council has noticed an uptick
in the number of security executives being asked to run
corporate social responsibility (CSR) programs for their
organizations” (p.54). There are many possibilities as to why
the corporate social responsibility programs are being delegated
to security executives, but one possible reason is due to the
implied security benefits of such a program. Kane (2011)
explained this when he said, “Security acts as an enabler for
CSR programs…The security of an organization really depends
on how it is perceived” (p. 54). In other words, if a corporation
is seen as being proactive against crime, involved positively in
the community, and is perceived as being focused on risk
analysis, then they are more likely to have a strong security
posture as a result of their efforts. Developing and
implementing a corporate social responsibility program could
aid in reducing a corporations risk, but in spite of all corporate
social responsibility efforts, all businesses still assume some
level of risk toward becoming associated with human
trafficking. This could occur regardless of whether the
company is unwitting or complicit. A previous example
discussed human trafficking within the supply chain of the
retail-clothing company GAP. This example fits the stereotype
often evoked when one thinks of child labor in sweat shops
producing products for commercial sale. The retail industry is
often viewed as the most susceptible to forced labor or child
labor; both of which benefit from human trafficking. A closer
examination of several industries shows some industries are at a
higher risk of exposure to human trafficking than others. In
fact, in 2014, the Interfaith Centre on Corporate Responsibility
(ICCR) initiated a campaign focusing on two specific
industries: hospitality and food agriculture. The hospitality
sector, which includes hotels, food service, retailers, and
airlines, assumes great risk due to their extensive, international
operations and large employee populations. Of these hospitality
industries, hotels are especially at risk. One prominent example
of a human trafficking scandal involving a hotel came against
the Marriott hotel chain in 2006. According to Biron (2014), in
2006:
“Scandinavian investors began pressuring the Marriott hotel
chain over reports of child prostitution rings making use of the
some of the company's facilities in Costa Rica. Within a year,
Marriott had rolled out a new, pointed policy on the issue, and
has since engaged in annual shareholder disclosure” (para 12).
There is a very important lesson learned in this scenario.
Marriott International Incorporated was never found to have
been knowledgeable or otherwise complicit in the human
trafficking and prostitution occurring on their facility. The
corporation could have claimed ignorance, publically denounced
the practice of child prostitution, and moved past the scandal,
but instead they created new policy on the issue and started
providing shareholders with information. So, why did Marriot
International Incorporated go to such great lengths when they
were not found culpable of any wrongdoing in the first place?
As Biron (2014) noted, “the lack of stated policy was seen as
detrimental to broader anti-trafficking efforts” (para 12).
Overall, this goes to support the theory that if a company does
not have programs and policies prohibiting and combating
human trafficking, they face the likelihood of being viewed as
complicit in its perpetration. No longer can companies afford to
sit idly by and hope to stay above the fray. Instead, companies
must have active anti-trafficking programs, often run by
security executives, or they will be viewed as indifferent or
even supportive of the crime. Obviously being seen in such a
way would be unfavorable for corporate reputation and brand
integrity. As mentioned previously, another industry
susceptible to human trafficking and forced labor is agriculture.
Agriculture workers are often uneducated, come from poverty,
and are often isolated from the public as a result of the rural
locations they work in or come from. In an example of a
particularly egregious agriculture related incident, in 2006 the
Justice Department brought, what was at the time, the largest
human trafficking case in the history of the U.S. federal
government. According to the New York Times (2006), six
contractors, who worked for a Los Angeles based company,
were indicted for conspiracy after they were accused of holding
400 workers from Thailand on farms in the U.S. The company
lured workers to the U.S. utilizing the federal guest worker
program and promises of good salaries. Once the workers
arrived, they were forced to pay high recruiting fees, had their
passports taken and were coerced with threats of deportation if
they complained (para 2). In most of these previous examples,
the company was not held legally liable for the human
trafficking incidents they were associated with; however, their
public image and corporate security were adversely affected.
While the U.S. and other international governments are
attempting to address this issue through legislation and
prosecution, it is clear that their efforts are predominately
reactive in nature. Only through a proactive approach can
security professionals protect their companies from increased
risk of human trafficking related incidents.
All companies manage a certain level of risk exposure.
Managing the risk of human trafficking related scenarios is no
different than managing other risks. A security manager must
identify the threat, assess the level of risk, and implement
policies to combat the threat. Many highly regarded companies
have already begun making human trafficking and forced labor
a priority in their overall security posture. According to
Meinert (2012), several global businesses, including Microsoft,
LexisNexis, Carlson, The Coca-Cola Co., Exxon Mobil, Delta
Air Lines, Manpower Group, NXP and Travelport, formed the
Global Business Coalition Against Human Trafficking in an
effort to join their resources on “eliminating forced labor that
may be present in corporate supply chains, as well as sex
trafficking that relies on facilities in the travel and tourism
industries” (para 2). While forming coalitions may be good for
public relation campaigns, the task is worthless if there is no
true impact or risk mitigation. The aforementioned law
enforcement surveys revealed law enforcement officers are not
fully educated on their agency’s human trafficking enforcement
policies. This lack of education and awareness is likely present
in a larger scale within many corporate employee populations.
Organizational risk exposure can be greatly reduced through a
comprehensive human trafficking education program put in
place by the security executive. The approach has to be
multidisciplinary in order to be effective. Security managers
must successfully incorporate cyber security, physical security,
human resources, law enforcement, government agencies,
multilateral organizations, civil society, and non-governmental
organizations into their strategy. At the company level, senior
level corporate executives must first be shown the corporate
liabilities of human trafficking and forced labor. This is
important because an effective anti-trafficking program or
corporate social responsibility program must be well funded in
order to be effective and funding won’t come without buy in
from senior corporate leaders. Simply understanding the
symptoms of human trafficking can help executives to better
understand the problem. In an effort to assist leaders in
combating this issue, the International Labour Office (2008)
developed the following 10 Principles for Business Leaders to
Combat Forced Labour and Trafficking:
· Have a clear and transparent company policy, setting out the
measures taken to prevent forced labour and trafficking.
Clarify that the policy applies to all enterprises involved in a
company’s product and supply chains;
· Train auditors, human resource and compliance officers in
means to identify forced labour in practice, and seek
appropriate remedies;
· Provide regular information to shareholders a potential
investors, attracting them to products and services where there
is a clear and sustainable commitment to ethical business
practice including prevention of forced labour;
· Promote agreements and codes of conduct by industrial sector
(as in agriculture, construction and textiles), identifying the
areas where there is risk of forced labour, and take appropriate
remedial measures;
· Treat migrant workers fairly. Monitor carefully the agencies
that provide contract labour, especially across borders,
blacklisting those known to have used abusive practices and
forced labour;
· Ensure that all workers have written contracts, in language
that they can easily understand, specifying their rights with
regard to payment of wages, overtime, retention of identity
documents, and other issues related to preventing forced labour;
· Encourage national and international events among business
actors, identifying potential problem areas and sharing good
practice;
· Contribute to programmes and projects to assist through
vocational training and other appropriate measures, the victims
of forced labour and trafficking;
· Build bridges between governments, workers, law enforcement
agencies and labour inspectorates, promoting cooperation in
action against forced labour and trafficking;
· Find innovative means to reward good practice, in conjunction
with the media.
Once a corporate vision is born and policy is created to support
that vision, then security managers must focus on educating
human resources professionals. The means by which human
trafficking affects businesses is primarily through the hiring
processes of sub contracted employment agencies. Security
managers should support human resources in vetting contracted
hiring companies in order to confirm they are conducting sound
hiring practices and are not committing human trafficking
violations only to have the parent company unwittingly
perpetrate forced labor practices. As previously mentioned,
security managers must exercise cyber security in combating
human trafficking as well. Security professionals must
coordinate with human resources to examine any company job
advertisements or descriptions, which may be on the web.
Could third party companies use information within legitimate
job advertisements to lure in workers only to limit their
freedoms upon arrival? Could the company unwittingly be
contributing to human trafficking as a result of not exercising
information or cyber security? Additionally security managers
must focus on corporate hiring practices even when third party
agencies are not used. There still exists a threat that a small
group of like-minded employees within the company could
commit human trafficking and forced labor violations, so it is
important for a security professionals to take a holistic approach
to risk assessment.
Findings/Conclusions
Human trafficking is a pervasive and developing challenge for
corporate security executives. Human trafficking includes the
transportation of people for use in criminal schemes such as
child labor, prostitution, forced labor, and debt-bondage; just to
name a few. Companies in all industries are at some level of
risk for liability associated with human trafficking.
Corporations operating exclusively within the U.S., to include
their supply chain, are exposed to less risk than corporations
operating globally. This is not to say that U.S. companies are
not at risk of having human trafficking related issues as was
evidenced by the aforementioned federal indictment for human
trafficking related crimes in Hawaii and the continental U.S.
Corporations must establish clear hiring policies and implement
checks and balances into their processes in order to flesh out
any conspiracies that may be present within the workforce.
This challenge is more difficult for corporations with foreign
supply chains. These companies must attempt to incorporate
their anti-trafficking values to their foreign contractors.
Whether a company utilized foreign manufacturing or uses third
party hiring agencies, the corporation must take measured
actions toward ensuring their direct employees and employees
of contracted companies are there of their own free will and
have not been subjected to human trafficking. Research has
shown several examples of U.S. companies who have fallen
victim to human trafficking scandal and how the poor publicity
could affect the overall viability of the company. This research
proves that corporations not only have to avoid any perception
of involvement with human trafficking, but they must also take
proactive steps toward creating robust anti-trafficking and
corporate social responsibility programs. Casual observers are
likely to view a company without an anti-trafficking program as
apathetic or even supportive of the crime, so having a well-
publicized anti-trafficking campaign is of utmost importance to
the protection of the brand and avoidance of liability. Part of
developing an anti-trafficking program is to conduct a risk
analysis and threat assessment. One factor that increases a
company’s risk is the industry in which the company operates.
Agriculture and hospitality industries are currently at higher
risks of human trafficking. The agriculture industry is at risk
primarily due to the fact it often employees poor, unskilled
workers from foreign countries. Often a third party hires these
workers and if the third party is not trustworthy, he or she could
manipulate workers into a position of debt-bondage or other
manifestation of human trafficking. The hospitality industry is
also at great risk of human trafficking related offenses due
primarily to its global exposure and large employee populations.
Hospitality companies, such as hotels, could have solid hiring
practices and still become involved in human trafficking
scandal if their facilities are found to be used to transport or
house victims. For these reasons it is very important for
corporations to develop sound policies and guidelines
denouncing the practice of human trafficking and placing their
company in a morally superior position in the event there are
allegations of misconduct. Another way corporations can
increase their positive public relations regarding human
trafficking is by developing a corporate social responsibility
program to positively influence the communities in which it
works. One of the primary concerns of human trafficking is a
lack of training and awareness within the employee population;
to include senior level executives. Educating human resource
personnel and others in key positions will increase a
corporation’s defensive posture and will aid in proactively
looking for signs of human trafficking. Additionally, security
executives can take a proactive, anti-trafficking stance by hiring
an auditor responsible for examining company practices and
employee pools for signs of human trafficking. Security
executives can create an environment of transparency by sharing
audit results with shareholders, government agencies, and non-
governmental organizations. By partnering with other industry
corporations, international governments, and non-governmental
organizations corporations can share experiences, develop best
practices in combating human trafficking, and most importantly
can build their brand’s reputation as being serious about anti-
trafficking efforts.
Corporate security executives must realize the reality of the risk
human trafficking presents to their corporate interests. The
liability of employing victims of human trafficking go well
beyond lost revenue damaged corporate identity, and poor
publicity. Becoming involved with human trafficking obviously
has civil liability risks but also presents criminal liabilities as
well. By creating clear policies and practices and
incorporating those into daily business, security executives can
decrease their risk and increase positive branding at the same
time.
References
Altschuller, S. (2013, January 10). Corporate responsibility for
human trafficking & five steps that your company can take right
now. Retrieved from
http://www.mondaq.com/unitedstates/x/215116/Corporate+Com
mercial+Law/Corporate+Responsibility+For+Human+Traffickin
g+Five+Steps+That+Your+Company+Can+Take+Right+Now.
Biron, C. L. (2014, January 03). U.S.: Hospitality, industrial
farming at risk for human trafficking. Global Information
Network. Retrieved from
http://search.proquest.com/docview/1474382911?accountid=828
9.
Farrell, A, McDevitt, J, and Fahy, S. (2010). Where are all the
victims? Understanding the determinants of official
identification of human trafficking incidents. Criminology &
Public Policy 9(2), 201-233.
Fields, S. (2013). Combating human trafficking: Engaging the
private sector. Retrieved from
http://www.stimson.org/spotlight/combating-human-trafficking-
engaging-the-private-sector/.
Forced Labor. (2010, September 8). The New York Times, p.26.
Retrieved from
http://www.lexisnexis.com.ezproxy1.apus.edu/lnacui2api/api/ve
rsion1/getDocCui?lni=50YT-GV11-DXY4-
X0NF&csi=6742&hl=t&hv=t&hnsd=f&hns=t&hgn=t&oc=00240
&perma=true.
Grubb, D and Bennett, K. (2012). The readiness of local law
enforcement to engage in U.S. anti-trafficking efforts: an
assessment of human trafficking training and awareness of
local, county, and state law enforcement agencies in the State of
Georgia. Police Practice and Research, 13(6), 487-500.
International Labour Office (2008) Combating forced labour: A
handbook for employers & business. Geneva: International
Labour Organization. Retrieved from
http://site.ebrary.com/lib/apus/reader.action?docID=10512144.
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx

More Related Content

Similar to Womens Reproductive RightsWomens reproductive rights are contr.docx

· Avoiding Unauthorized Practice of LawIt is widely known that u.docx
· Avoiding Unauthorized Practice of LawIt is widely known that u.docx· Avoiding Unauthorized Practice of LawIt is widely known that u.docx
· Avoiding Unauthorized Practice of LawIt is widely known that u.docxLynellBull52
 
Course SyllabusCourse DescriptionExamines relationship.docx
Course SyllabusCourse DescriptionExamines relationship.docxCourse SyllabusCourse DescriptionExamines relationship.docx
Course SyllabusCourse DescriptionExamines relationship.docxvanesaburnand
 
Week Seven Homework ExercisePSYCH610 Version 21University.docx
Week Seven Homework ExercisePSYCH610 Version 21University.docxWeek Seven Homework ExercisePSYCH610 Version 21University.docx
Week Seven Homework ExercisePSYCH610 Version 21University.docxphilipnelson29183
 
20161028161952psy_850.r.assignment_requirements (1).docxBackgr.docx
20161028161952psy_850.r.assignment_requirements (1).docxBackgr.docx20161028161952psy_850.r.assignment_requirements (1).docxBackgr.docx
20161028161952psy_850.r.assignment_requirements (1).docxBackgr.docxfelicidaddinwoodie
 
Task Description Developing CapabilityAssessment details for .docx
Task Description Developing CapabilityAssessment details for .docxTask Description Developing CapabilityAssessment details for .docx
Task Description Developing CapabilityAssessment details for .docxssuserf9c51d
 
1 Kaplan University School of Health Sciences H.docx
1  Kaplan University School of Health Sciences H.docx1  Kaplan University School of Health Sciences H.docx
1 Kaplan University School of Health Sciences H.docxmercysuttle
 
Assignment 2 LASA Ethical Decision Making Case Study PaperMan.docx
Assignment 2 LASA Ethical Decision Making Case Study PaperMan.docxAssignment 2 LASA Ethical Decision Making Case Study PaperMan.docx
Assignment 2 LASA Ethical Decision Making Case Study PaperMan.docxrock73
 
Human Growth & Development Advocacy ProjectAssignmentEDPS 210 co
Human Growth & Development  Advocacy ProjectAssignmentEDPS 210 coHuman Growth & Development  Advocacy ProjectAssignmentEDPS 210 co
Human Growth & Development Advocacy ProjectAssignmentEDPS 210 coNarcisaBrandenburg70
 
Course SyllabusCourse DescriptionExplores strategies f
Course SyllabusCourse DescriptionExplores strategies fCourse SyllabusCourse DescriptionExplores strategies f
Course SyllabusCourse DescriptionExplores strategies fCruzIbarra161
 
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docxIDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docxalanrgibson41217
 

Similar to Womens Reproductive RightsWomens reproductive rights are contr.docx (10)

· Avoiding Unauthorized Practice of LawIt is widely known that u.docx
· Avoiding Unauthorized Practice of LawIt is widely known that u.docx· Avoiding Unauthorized Practice of LawIt is widely known that u.docx
· Avoiding Unauthorized Practice of LawIt is widely known that u.docx
 
Course SyllabusCourse DescriptionExamines relationship.docx
Course SyllabusCourse DescriptionExamines relationship.docxCourse SyllabusCourse DescriptionExamines relationship.docx
Course SyllabusCourse DescriptionExamines relationship.docx
 
Week Seven Homework ExercisePSYCH610 Version 21University.docx
Week Seven Homework ExercisePSYCH610 Version 21University.docxWeek Seven Homework ExercisePSYCH610 Version 21University.docx
Week Seven Homework ExercisePSYCH610 Version 21University.docx
 
20161028161952psy_850.r.assignment_requirements (1).docxBackgr.docx
20161028161952psy_850.r.assignment_requirements (1).docxBackgr.docx20161028161952psy_850.r.assignment_requirements (1).docxBackgr.docx
20161028161952psy_850.r.assignment_requirements (1).docxBackgr.docx
 
Task Description Developing CapabilityAssessment details for .docx
Task Description Developing CapabilityAssessment details for .docxTask Description Developing CapabilityAssessment details for .docx
Task Description Developing CapabilityAssessment details for .docx
 
1 Kaplan University School of Health Sciences H.docx
1  Kaplan University School of Health Sciences H.docx1  Kaplan University School of Health Sciences H.docx
1 Kaplan University School of Health Sciences H.docx
 
Assignment 2 LASA Ethical Decision Making Case Study PaperMan.docx
Assignment 2 LASA Ethical Decision Making Case Study PaperMan.docxAssignment 2 LASA Ethical Decision Making Case Study PaperMan.docx
Assignment 2 LASA Ethical Decision Making Case Study PaperMan.docx
 
Human Growth & Development Advocacy ProjectAssignmentEDPS 210 co
Human Growth & Development  Advocacy ProjectAssignmentEDPS 210 coHuman Growth & Development  Advocacy ProjectAssignmentEDPS 210 co
Human Growth & Development Advocacy ProjectAssignmentEDPS 210 co
 
Course SyllabusCourse DescriptionExplores strategies f
Course SyllabusCourse DescriptionExplores strategies fCourse SyllabusCourse DescriptionExplores strategies f
Course SyllabusCourse DescriptionExplores strategies f
 
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docxIDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
 

More from helzerpatrina

Most patients with mental health disorders are not aggressive. H.docx
Most patients with mental health disorders are not aggressive. H.docxMost patients with mental health disorders are not aggressive. H.docx
Most patients with mental health disorders are not aggressive. H.docxhelzerpatrina
 
MotivationExplain your motivation for applying to this prog.docx
MotivationExplain your motivation for applying to this prog.docxMotivationExplain your motivation for applying to this prog.docx
MotivationExplain your motivation for applying to this prog.docxhelzerpatrina
 
Most public policy is made from within government agencies. Select a.docx
Most public policy is made from within government agencies. Select a.docxMost public policy is made from within government agencies. Select a.docx
Most public policy is made from within government agencies. Select a.docxhelzerpatrina
 
Mr. Smith brings his 4-year-old son to your primary care office. He .docx
Mr. Smith brings his 4-year-old son to your primary care office. He .docxMr. Smith brings his 4-year-old son to your primary care office. He .docx
Mr. Smith brings his 4-year-old son to your primary care office. He .docxhelzerpatrina
 
Mrs. Walsh, a woman in her 70s, was in critical condition after rep.docx
Mrs. Walsh, a woman in her 70s, was in critical condition after rep.docxMrs. Walsh, a woman in her 70s, was in critical condition after rep.docx
Mrs. Walsh, a woman in her 70s, was in critical condition after rep.docxhelzerpatrina
 
Much has been made of the new Web 2.0 phenomenon, including social n.docx
Much has been made of the new Web 2.0 phenomenon, including social n.docxMuch has been made of the new Web 2.0 phenomenon, including social n.docx
Much has been made of the new Web 2.0 phenomenon, including social n.docxhelzerpatrina
 
MSN 5550 Health Promotion Prevention of Disease Case Study Module 2.docx
MSN 5550 Health Promotion Prevention of Disease Case Study Module 2.docxMSN 5550 Health Promotion Prevention of Disease Case Study Module 2.docx
MSN 5550 Health Promotion Prevention of Disease Case Study Module 2.docxhelzerpatrina
 
MSEL Strategy Mid-term Instructions Miguel Rivera-SantosFormat.docx
MSEL Strategy Mid-term Instructions Miguel Rivera-SantosFormat.docxMSEL Strategy Mid-term Instructions Miguel Rivera-SantosFormat.docx
MSEL Strategy Mid-term Instructions Miguel Rivera-SantosFormat.docxhelzerpatrina
 
Much of the focus in network security centers upon measures in preve.docx
Much of the focus in network security centers upon measures in preve.docxMuch of the focus in network security centers upon measures in preve.docx
Much of the focus in network security centers upon measures in preve.docxhelzerpatrina
 
Mt. Baker Hazards Hazard Rating Score High silic.docx
Mt. Baker   Hazards Hazard Rating Score High silic.docxMt. Baker   Hazards Hazard Rating Score High silic.docx
Mt. Baker Hazards Hazard Rating Score High silic.docxhelzerpatrina
 
Motivation and Cognitive FactorsQuestion AAlfred Hit.docx
Motivation and Cognitive FactorsQuestion AAlfred Hit.docxMotivation and Cognitive FactorsQuestion AAlfred Hit.docx
Motivation and Cognitive FactorsQuestion AAlfred Hit.docxhelzerpatrina
 
Motivation in OrganizationsMotivation i.docx
Motivation in OrganizationsMotivation i.docxMotivation in OrganizationsMotivation i.docx
Motivation in OrganizationsMotivation i.docxhelzerpatrina
 
Motivations to Support Charity-Linked Events After Exposure to.docx
Motivations to Support Charity-Linked Events After Exposure to.docxMotivations to Support Charity-Linked Events After Exposure to.docx
Motivations to Support Charity-Linked Events After Exposure to.docxhelzerpatrina
 
Mrs. Walsh, a woman in her 70s, was in critical condition after.docx
Mrs. Walsh, a woman in her 70s, was in critical condition after.docxMrs. Walsh, a woman in her 70s, was in critical condition after.docx
Mrs. Walsh, a woman in her 70s, was in critical condition after.docxhelzerpatrina
 
MOVIE TITLE IS LIAR LIAR starring JIM CARREYProvide the name o.docx
MOVIE TITLE IS LIAR LIAR starring JIM CARREYProvide the name o.docxMOVIE TITLE IS LIAR LIAR starring JIM CARREYProvide the name o.docx
MOVIE TITLE IS LIAR LIAR starring JIM CARREYProvide the name o.docxhelzerpatrina
 
mple selection, and assignment to groups (as applicable). Describe.docx
mple selection, and assignment to groups (as applicable). Describe.docxmple selection, and assignment to groups (as applicable). Describe.docx
mple selection, and assignment to groups (as applicable). Describe.docxhelzerpatrina
 
More and more businesses have integrated social media into every asp.docx
More and more businesses have integrated social media into every asp.docxMore and more businesses have integrated social media into every asp.docx
More and more businesses have integrated social media into every asp.docxhelzerpatrina
 
Module Five Directions for the ComparisonContrast EssayWrite a.docx
Module Five Directions for the ComparisonContrast EssayWrite a.docxModule Five Directions for the ComparisonContrast EssayWrite a.docx
Module Five Directions for the ComparisonContrast EssayWrite a.docxhelzerpatrina
 
Monica asked that we meet to see if I could help to reduce the d.docx
Monica asked that we meet to see if I could help to reduce the d.docxMonica asked that we meet to see if I could help to reduce the d.docx
Monica asked that we meet to see if I could help to reduce the d.docxhelzerpatrina
 
Module 6 AssignmentPlease list and describe four types of Cy.docx
Module 6 AssignmentPlease list and describe four types of Cy.docxModule 6 AssignmentPlease list and describe four types of Cy.docx
Module 6 AssignmentPlease list and describe four types of Cy.docxhelzerpatrina
 

More from helzerpatrina (20)

Most patients with mental health disorders are not aggressive. H.docx
Most patients with mental health disorders are not aggressive. H.docxMost patients with mental health disorders are not aggressive. H.docx
Most patients with mental health disorders are not aggressive. H.docx
 
MotivationExplain your motivation for applying to this prog.docx
MotivationExplain your motivation for applying to this prog.docxMotivationExplain your motivation for applying to this prog.docx
MotivationExplain your motivation for applying to this prog.docx
 
Most public policy is made from within government agencies. Select a.docx
Most public policy is made from within government agencies. Select a.docxMost public policy is made from within government agencies. Select a.docx
Most public policy is made from within government agencies. Select a.docx
 
Mr. Smith brings his 4-year-old son to your primary care office. He .docx
Mr. Smith brings his 4-year-old son to your primary care office. He .docxMr. Smith brings his 4-year-old son to your primary care office. He .docx
Mr. Smith brings his 4-year-old son to your primary care office. He .docx
 
Mrs. Walsh, a woman in her 70s, was in critical condition after rep.docx
Mrs. Walsh, a woman in her 70s, was in critical condition after rep.docxMrs. Walsh, a woman in her 70s, was in critical condition after rep.docx
Mrs. Walsh, a woman in her 70s, was in critical condition after rep.docx
 
Much has been made of the new Web 2.0 phenomenon, including social n.docx
Much has been made of the new Web 2.0 phenomenon, including social n.docxMuch has been made of the new Web 2.0 phenomenon, including social n.docx
Much has been made of the new Web 2.0 phenomenon, including social n.docx
 
MSN 5550 Health Promotion Prevention of Disease Case Study Module 2.docx
MSN 5550 Health Promotion Prevention of Disease Case Study Module 2.docxMSN 5550 Health Promotion Prevention of Disease Case Study Module 2.docx
MSN 5550 Health Promotion Prevention of Disease Case Study Module 2.docx
 
MSEL Strategy Mid-term Instructions Miguel Rivera-SantosFormat.docx
MSEL Strategy Mid-term Instructions Miguel Rivera-SantosFormat.docxMSEL Strategy Mid-term Instructions Miguel Rivera-SantosFormat.docx
MSEL Strategy Mid-term Instructions Miguel Rivera-SantosFormat.docx
 
Much of the focus in network security centers upon measures in preve.docx
Much of the focus in network security centers upon measures in preve.docxMuch of the focus in network security centers upon measures in preve.docx
Much of the focus in network security centers upon measures in preve.docx
 
Mt. Baker Hazards Hazard Rating Score High silic.docx
Mt. Baker   Hazards Hazard Rating Score High silic.docxMt. Baker   Hazards Hazard Rating Score High silic.docx
Mt. Baker Hazards Hazard Rating Score High silic.docx
 
Motivation and Cognitive FactorsQuestion AAlfred Hit.docx
Motivation and Cognitive FactorsQuestion AAlfred Hit.docxMotivation and Cognitive FactorsQuestion AAlfred Hit.docx
Motivation and Cognitive FactorsQuestion AAlfred Hit.docx
 
Motivation in OrganizationsMotivation i.docx
Motivation in OrganizationsMotivation i.docxMotivation in OrganizationsMotivation i.docx
Motivation in OrganizationsMotivation i.docx
 
Motivations to Support Charity-Linked Events After Exposure to.docx
Motivations to Support Charity-Linked Events After Exposure to.docxMotivations to Support Charity-Linked Events After Exposure to.docx
Motivations to Support Charity-Linked Events After Exposure to.docx
 
Mrs. Walsh, a woman in her 70s, was in critical condition after.docx
Mrs. Walsh, a woman in her 70s, was in critical condition after.docxMrs. Walsh, a woman in her 70s, was in critical condition after.docx
Mrs. Walsh, a woman in her 70s, was in critical condition after.docx
 
MOVIE TITLE IS LIAR LIAR starring JIM CARREYProvide the name o.docx
MOVIE TITLE IS LIAR LIAR starring JIM CARREYProvide the name o.docxMOVIE TITLE IS LIAR LIAR starring JIM CARREYProvide the name o.docx
MOVIE TITLE IS LIAR LIAR starring JIM CARREYProvide the name o.docx
 
mple selection, and assignment to groups (as applicable). Describe.docx
mple selection, and assignment to groups (as applicable). Describe.docxmple selection, and assignment to groups (as applicable). Describe.docx
mple selection, and assignment to groups (as applicable). Describe.docx
 
More and more businesses have integrated social media into every asp.docx
More and more businesses have integrated social media into every asp.docxMore and more businesses have integrated social media into every asp.docx
More and more businesses have integrated social media into every asp.docx
 
Module Five Directions for the ComparisonContrast EssayWrite a.docx
Module Five Directions for the ComparisonContrast EssayWrite a.docxModule Five Directions for the ComparisonContrast EssayWrite a.docx
Module Five Directions for the ComparisonContrast EssayWrite a.docx
 
Monica asked that we meet to see if I could help to reduce the d.docx
Monica asked that we meet to see if I could help to reduce the d.docxMonica asked that we meet to see if I could help to reduce the d.docx
Monica asked that we meet to see if I could help to reduce the d.docx
 
Module 6 AssignmentPlease list and describe four types of Cy.docx
Module 6 AssignmentPlease list and describe four types of Cy.docxModule 6 AssignmentPlease list and describe four types of Cy.docx
Module 6 AssignmentPlease list and describe four types of Cy.docx
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Womens Reproductive RightsWomens reproductive rights are contr.docx

  • 1. Women's Reproductive Rights Women's reproductive rights are controlled in a myriad of ways through both pro-natalist and anti-natalist policies. Pro-natalist polices prohibit use of birth control and abortion in an attempt to grow populations. Romania is a perfect example. Anti-natalist policies put restrictions on women's ability to have children. China's one child policy is a good example of an anti- natalist policy. Women from marginalized and historically oppressed groups in many cultures are sterilized in an attempt at controlling those populations seen as undesirable. This happened so frequently to black women in the U.S., that it was called the "Mississippi Appendectomy." Latinas, Puerto Rican women and Native American Indian women were also sterilized against their will in large numbers. Answer the following questions 2 pages 1). In Kligman's Political Demography: The Banning of Abortion in Ceacescu's Romania, how were women's bodies tied to reproduction and pro-natalism? 2). How were women's bodies policed under these policies? What did women do when abortion was criminalized? 3). How does reproduction serve as an opportunity to control women's bodies across cultures including here in the U.S.? School of Security and Global Studies Program Name: Security Management Course Number: SCMT498 Course Name: Senior Seminar in Security Management
  • 2. Credit Hours: 3 Credit Hours Length of Course: 8 Weeks Prerequisite: Completion of all other program requirements Instructor Information Instructor: See information provided in the Syllabus link in the classroom Email: Please use internal classroom messaging system Table of Contents Course Description (Catalog) The Capstone course is a senior level course designed to allow the student to review, analyze and integrate the work the student has completed toward a degree in Security Management. The student will complete an approved academic project or paper that demonstrates mastery of their program of study in a meaningful culmination of their learning and to assess their level of mastery of the stated outcomes of their degree requirements. NOTE: All required, core, and major courses must be completed prior to enrollment in this course. Student must have SENIOR standing to register. Table of Contents Course Scope This coursere-examines core program concepts, principles, and best practices. The student will synthesize, integrate, and apply program learning into a capstone paper or project. Students will be required to participate in class discussions, complete an annotated bibliography per APA Publication Manual, submit a formal research proposal for professor approval, complete a research paper or project, present the research to the class, and critically comment on classmate’s papers and projects. Table of Contents Course Objectives After completing this course, the student will be able to: · Examine security management theory, concepts, principles, techniques, and practices.
  • 3. · Apply academic knowledge to identify and counter organizational security risks and vulnerabilities. · Identify strategic and tactical security solutions as part of a broad based organizational protection plan. · Describe and detail organizational security programs. Table of Contents Course Delivery Method This final B.A. in Security Management course delivered via distance learning will enable students to complete academic work in a flexible manner, completely online. Course materials and access to an online learning management system will be made available to each student. Weekly assignments (submitted for review by the Faculty Member) are posted on the discussion board or are uploaded in assignments. Discussion assignments are due on Thursdays. Research proposal, bibliography, research paper/project, and classmate discussion responses are due by the last day of the class week, Sunday. Assigned faculty will support the students throughout this eight-week course. Table of Contents Course Resources Required Course Textbooks: Publication manual of the American Psychological Association (6th ed.). (2009). Washington, D.C.: American Psychological Association. Required Readings: See Announcements Additional Resources: See Announcements and Resources Web Sites In addition to the required course texts, the following public domain web sites are useful. Please abide by the university’s academic honesty policy when using Internet sources as well. Note web site addresses are subject to change.
  • 4. Site Name Web Site URL/Address How to Write a Bachelor’s Capstone Paper http://www.ehow.com/how_5126546_write-bachelors-capstone- paper.html Writing in Third Person in APA Style http://www.ehow.com/how_7232506_writing-third-person-apa- style.html The Difference between Formal and Informal Writing http://www.word- mart.com/html/formal_and_informal_writing.html Guide to Grammar and Writing http://grammar.ccc.commnet.edu/grammar/ Table of Contents Evaluation Procedures Grading will be based on three essay assignments, three forum assignments (and six classmate responses – two in each of the three weeks), a formal research proposal, an extended or annotated bibliography per APA, a paper/project outline and thorough summary, a research paper/project, and a forum presentation of your paper/project (with “four” classmate responses in week eight). Reading Assignments: See Announcements and Lessons Supplemental Readings: See above Forum Assignments: 1. Introduction Forum – due by Sunday of week 1. Students will introduce themselves in the Introduction Forum. The goal of the forum is to accomplish two things 1) to build peer-to-peer relationships by sharing introductions and background information with classmates and 2) to express learning goals and expectations for the class. This assignment requires 200 – 250 words and is a non-graded assignment.
  • 5. 2. Forums (posted in forums “only”) are due in weeks one, four and six. The assignments, to allow time for students to respond, must be “posted” by midnight EST Thursdays each of these weeks. Two classmate responses are also required and scored in “each” of these three weeks. Post only during the assigned course week (do “not” post in advance). Assignments must reflect some new or original information – do not just regurgitate data or opinion posted by previous students. Scoring Notes: Ensure your forum postings are “on time and substantive.” Keep in mind that substantive means fully answering and developing your assignment answers and classmate responses. In the forum, do “not” be concise or brief (however, do not add “fluff”). Failing to address assignment questions will cause point deductions from your weekly assignment scores. This includes not thoroughly explaining your positions. Most assignments that receive full credit will be answered with multiple and extensive paragraphs (depending on the assignment, 500 to 1000 words is within the normal range. At a minimum, “classmate responses” – opposed to assignment answers, will be five “exceptional” sentences (not simply stating agreement and/or a reiteration of the student’s post) – usually much more. Homework Assignments: 3. Assignments– There are three essay assignments due in weeks two, four and six. The first essay in week two must be 750 words, and the essays in weeks four and six must be 500 words each. The essays will discuss “HOW” the capstone project will address the seven undergraduate security management program learning objectives listed below under “research proposal”. The essays are NOT intended to discuss the objective itself, only HOW the objective will be incorporated into the project. The essays are due by Sunday of each week. 4. Research proposal – a formal research proposal is due by the conclusion (Sunday) of week two. The professor will approve, disapprove or approve with modifications all proposals.
  • 6. Your research proposal will be based on an “issue or problem” aligned with the requirements and criteria for obtaining the BA Degree in Security Management. The essential criteria include the seven undergraduate security management program learning outcome objectives: · Identify organizational security risk exposure; identify cost- effective mitigation strategies; and prepare for recovery strategies. · Employ the use of risk analysis and vulnerability assessment processes. · Critically examine the variety and extent of losses from criminal acts, natural disasters, and security breaches facing society. · Analyze or compare and contrast concepts of information security, personnel security, and physical security and determine the planning approaches to prevent business losses. · Analyze the trends affecting security and loss prevention and determine the approaches to reduce losses facing businesses and institutions. · Evaluate, from a multi-disciplinary approach, non-traditional approaches to crime prevention. · Distinguish between traditional criminal justice roles, function, theories, and concepts as a reactive institution to the security roles a preventive societal institution. Your research application will propose an examination of a current issue or problem in security management. You are to compare and contrast the selected issue or problem with past, present and potential future trends or solutions. Alternatively, you may compare and contrast the experience of
  • 7. organizations affected by a security industry trend or whom have developed solutions to the problem and conduct analysis of their success or failure. Topic Selection: Topic selection may be difficult. Typically, a capstone research candidate has a general idea of an area within the discipline of security management they wish to explore. Students are encouraged to select a topic they are interested in, but which also has applicability to their organization. In this instance, personal enjoyment is combined with the satisfaction of potentially improving the security posture of your organization. Research Topic: Conduct a review of previous studies: Begin your research with the tools and capable librarian/archivists available to you in the APUS Online Research Center. IRB Guidance for the Capstone The capstone study program does not require primary research for publication although it is an option (pending your faculty advisor’s approval). In the case of primary research for publication involving human subjects, the APUS/AMU Institutional Review Board (IRB) located at: http://www.apus.edu/community-scholars/institutional-review- board/ must approve your research plan prior to beginning any such research. As the Capstone is only four months in length, this option is highly discouraged. Four months is not truly commensurate with primary research for publication, which traditionally requires a longer time period for a successful study. Ensure the availability of ample research resources: Initially, conduct research to ensure your proposed topic is one, which benefits from ample research resources. These may be in many forms including: books, papers, manuscripts, theses, doctoral dissertations, magazine and professional journal articles, Web-
  • 8. based resources, interviews, etc. Feasibility assessment: Ensure the research study goal is attainable within the established parameters. Typically, students initially decide on a capstone research topic that is too broad. Conducting preliminary research should serve to narrow the focus considerably. Proceed to: http://library.weber.edu/ref/guides/howto/topicselection.cfm and read the information on research topic selection. Proceed to: http://www.indiana.edu/~educy520/sec5982/week_2/hypothesis_ 3.pdf#search=%27Writing%20a%20problem%20statement%20% 20hypothesis and read the information on writing a problem statement. Topic Guidance:Security-focused: Ensure the topic is focused on some aspect of security in the post-9/11 environment. The topic can be management focused. For example, you may focus on the utility to a security department of initiating a skill-based compensation program. The topic may be focused on rapidly- changing technologies. For example, you may select the topic of how IT security professionals are using technologies to secure complex systems based on wireless networks. The topic could focus on the challenges of managing a cross-cultural security force in hazardous regions such as Iraq or Afghanistan. You have a high degree of flexibility bounded only by your interest, enthusiasm, and the agreement between yourself and your capstone professor. Take a multi-disciplinary approach: Convergence of many disciplines and approaches is a key factor in the 21st Century
  • 9. security environment. You will find yourself incapable of writing a capstone study on a security-related topic without some discussion of related disciplines such as homeland security, counter-terrorism, intelligence analysis, law enforcement, etc. Seek innovation and unorthodox solutions: It is normal, while researching a topic, to find “school solutions” based on prevailing trends, thought processes, analysis, etc. The key to a great capstone study is to apply your research outcome, your personal experiences and background, and your analysis to create a new and innovative solution or outcome. This is the true essence of exciting learning and the highest attainable goal in writing a great capstone study. Research study statement: The research study statement is composed once you have selected a topic and narrowed your focus to a useful degree. It is a clear and concise statement of the purpose of the capstone study. It must be a statement capable of being proved or disproved through your research and the capstone study process. It is, in effect, the path for your journey through the capstone study experience. · Example: You are writing on the pros and cons of outsourcing security services in a war zone. The capstone study statement (proposition) is that while outsourcing of security services is cost-effective over the short-term, the long-term effect is the destabilization of military manpower and a return to large-scale mercenary operations lacking government oversight. · Example: You are interested in security measures necessary to secure wireless networks. The capstone study statement (proposition) might be that wireless networks are inherently less secure than other communications means. A security system design to achieve wireless network security consists of the following components. Examples of Acceptable Topics
  • 10. Aviation security system design in the post-9/11 environment; are we there yet? The impact of the convergence of public and private sector security operations and constructs in the post-9/11 environment Management under fire: creating and managing a cross-cultural security force in harm’s way. Case studies emphasizing the validity, or lack thereof, of certain concepts, constructs, equipment, designs, management concepts, etc. such as the proliferation of closed circuit television systems and the privacy issues involved, achieving successful integration of complex security system designs, zero-based budgeting for security departments, implementing Crime Prevention Through Environmental Design (CPTED) concepts for protective services operations. Examples of Unacceptable Projects Over-generalized topics such as “homeland security” This topic is highly relevant if not so generalized. Topic conflict: for example, a discussion of both Crime Prevention through Environmental Design (CPTED) and Targeted Crime Reduction (TCR) - they are not the same, but similar enough that they should be avoided (in tandem). Small technical topics, for example, a comparison of the utility of the .40 S&W cartridge with the .38 S&W Special Cartridge for use on protective services details. Topics that do not require challenging and innovative research, i.e., over-generalized - for example, the history of private security in America. In this instance, there is no point to be proven or disproved. MANDATORY PROPOSAL COMPONENTS The following sections must be included in your proposal (3 page minimum body - not including cover page, abstract or references):
  • 11. 1. Title Page with proposed title 2. Abstract – separate page 3. A concise capstone study statement for your proposed research paper/project and a brief descriptive statement a. Problem Statement b. Significance of the Study c. Research Question(s) 3. Paper/project components and key points to be covered in your paper/project. 4. Proposed Methodology/Research Strategy – If you intend to conduct primary research for publication, you must indicate the scope of your proposed research, methodologies, estimate of materials required for a successful effort, etc. Primary research studies for publication are not recommended (see comments in reference to the IRB process below) a. Assumptions (if any) b. Scope and Limitations 5. A preliminary, but detailed schedule of your plan to complete the research study 6. Preliminary research sources There will be 100 possible points for the proposal (15% of your final grade) DUE ON Thursday OF WEEK 2. 5. An “annotated” research bibliography of a minimum of “six” references (no older than seven years) to be used in your paper/project is due in week three. Examples include “credible” WWW reports and sites, books, manuscripts, theses, dissertations, journals, newspapers, magazines, etc. Submit/upload in a MS Word document. Ensure you follow the
  • 12. APA style and each reference is thoroughly “summarized and evaluated.” Conducting Research: Upon topic approval conduct research before proposal submission. Your starting point is the APUS Online Research Center and the talented staff of librarians and archivists available to assist you in your efforts. Resources include: · Bibliographic resources · Web-based resources · Web search engines · Other resources · Databases Your search strategy focuses your search efforts and makes efficient use of your time. You must discuss search strategies first with your professor and secondly, with the experts in the APUS Online Research Center. There will be 100 possible annotated bibliography points (10% of your final grade). Late submitters will be penalized 10 points per day. 6. Extended paper/project outline, thorough summary and four additional APA annotated references(total of 10 references) is due in week five. This submission should be a significant expansion of your research proposal and can be similar to a rough draft. The body of this assignment should be a “minimum of five pages.” Submit/upload this assignment in a MS Word document. There will be 100 possible points for the extended outline and summary (10% of your final grade). Late submitters will be penalized 10 points per day.
  • 13. Exams/Quizzes: None Field Experience Assignments: Optional (contact instructor) Capstone Project: 7. Final capstone is due in week “seven”. MANDATORY PROJECT COMPONENTS: See final capstone template located in Resources Sources from Wikipedia are “NOT” to be used as they have been deemed unreliable. ANY VIOLATIONS OF THE UNIVERSITY PLAGIARISM POLICY WILL RESULT IN AN AUTOMATIC “F.” There will be 100 possible points for your paper/proposal (40% of your final grade 8. A formal presentation of your paper (and “four” classmate responses) is due on Friday of week eight. You are required to present your project to the class “in the forum area “only” – “no” submission/uploading via Assignments. Your presentation should provide a comprehensive overview and highlight the key sections and points of your paper. A Microsoft PowerPoint slide presentation is required. Do “not” attach and MS Word document or copy your entire paper/project in the forum area. Presentation/Classmate Response Scoring Notes: I will score your presentation in “two parts.” Your presentation assignment will be 80% of your possible grade. The remaining 20% of your weekly assignment score will be based on the quality of your “four” (5% each) forum “responses” to your classmates. The excellence of your effort will be considered when grading your presentation and classmate responses. Finally, there will be 100 total possible points for the presentation and classmate responses (10% of your final grade). Late posters will be penalized 10 points per day. Grade Instruments
  • 14. Points Possible Forums 4 (weighted 40%) 100 / 400 Assignments – 6 (weighted 40%) 100 / 600 Capstone final (weighted 20%) 100 TOTAL 1100 Table of Contents Course Outline Please see the Student Handbook to reference the University’s grading scale. Week Topic(s) Learning Objectives Readings Assignment(s) 1 Autobiography & Response (1) / B.A. in Security Management Program Objectives / Paper-Project Topic & Responses (2) Develops potential topics, conducts preliminary research, assesses various resources, research tools, libraries, etc. Identifies and discusses “three” research topics and discusses their viability with classmates and professor
  • 15. Conducts research to identify and evaluate appropriate academic and legitimate sources See Announcements/Lessons Autobiography & Response (1): Post to Introduction Forum only - This is mandatory with a 250-word minimum Week 1 Forum - post to Forum only 2 Research Proposal Develops and submits a formal proposal Validate a research plan. Conducts research to identify and evaluate appropriate academic and legitimate sources Identify organizational security risk exposure; identify cost- effective mitigation strategies; and prepare for recovery strategies Analyze concepts of information security, personnel security, and physical security, and determine the planning approaches to prevent business losses Distinguish between traditional criminal justice roles, functions and concepts as a reactive institution to the security roles as a preventive societal institution See Announcements/Lessons Assignment 1 - Post to Assignments only - Capstone proposal - Submit via Assignments using the Capstone proposal template
  • 16. located in Resources Assignment 2 – Post to Assignments only 3 Annotated Bibliography Create an annotated bibliography Conducts research to identify appropriate academic and legitimate sources See Announcements/Lessons Assignment 3 - Post to Assignments only 4 Research Topic, Purpose/Problems Statements, Progress & Responses (2) Identifies and discusses the paper/project topic, thesis statement, main points/sections with classmates and professor Analyze the trends affecting security and loss prevention and determine the approaches to reduce losses facing businesses and institutions Evaluate from a multi-disciplinary approach, non-traditional approaches to crime prevention See Announcements/Lessons Week 4 Forum - Post to Forum only Assignment 4 – Post to Assignments only
  • 17. 5 Outline, Summary & Additional Annotated Bibliographic References Revise the preliminary proposal into an acceptable first research study draft Conducts research to identify and evaluate appropriate academic and legitimate sources Employ the use of risk analysis and vulnerability assessment processes Identify organizational security risk exposure; identify cost- effective mitigation strategies and prepare for recovery strategies See Announcements/Lessons Assignment 5: Post to Assignments only – use the original Capstone proposal form you used in Assignment 1 – just expand on it (this is also the final Capstone template). 6 Research Topic / Responses (2) Reports paper/project topic progress with classmates and professor Conducts research to identify and evaluate appropriate academic and legitimate sources Critically examine the variety and extent of losses from criminal acts, natural disasters, and security breaches facing society See Announcements/Lessons
  • 18. Week 6 Forum – Post to Forum only Assignment 6 – Post to Assignments only 7 Research Paper/Project Designs and submits research paper/project Analyze the trends affecting security and loss prevention and determine the approaches to reduce losses facing businesses and institutions Evaluate from a multi-disciplinary approach, non-traditional approaches to crime prevention See Announcements/Lessons Assignment 7: Final Capstone – post to Assignments only 8 Paper-Project Presentation / Responses (4) Presents paper/project to classmates and professor; and critically/substantively comments on four classmate’s papers/projects. . See Announcements/Lessons Week 8 Forum - PowerPoint Presentation Assignment & Forum Responses (2):Capstone Presentation - Post to Forums only Policies Please see theStudent Handbook to reference all University policies. Quick links to frequently asked question about policies are listed below.
  • 19. Drop/Withdrawal Policy Plagiarism Policy Extension Process and Policy Disability Accommodations Writing Expectations All written submissions should be submitted in a font and page set-up that is readable and neat. It is recommended that students try to adhere to a consistent format, which is described below. · Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor). · Times New Roman, 12-point font is the only acceptable font IAW APA (6th. ed.) guidance. · Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances. Citation and Reference Style Attention Please: Students will follow the APA sixth edition as the sole citation and reference style used in written work submitted as part of coursework to the University. Assignments completed in a narrative essay or composition format must follow the citation style cited in the: Publication manual of the American Psychological Association (2009). (6th ed.). Washington, D.C.: American Psychological Association. Late Assignments Students are expected to submit classroom assignments by the posted due date and to complete the course according to the published class schedule. As adults, students, and working professionals, I understand you must manage competing demands on your time. Should you need additional time to
  • 20. complete an assignment, please contact me before the due date so we can discuss the situation and determine an acceptable resolution. Routine submission of late assignments is unacceptable and may result in points deducted from your final course grade. Netiquette Online universities promote the advancement of knowledge through positive and constructive debate – both inside and outside the classroom. Forums on the Internet, however, can occasionally degenerate into needless insults and “flaming.” Such activity and the loss of good manners are not acceptable in a university setting – basic academic rules of good behavior and proper “Netiquette” must persist. Remember that you are in a place for the rewards and excitement of learning which does not include descent to personal attacks or student attempts to stifle the Forum of others. · Technology Limitations: While you should feel free to explore the full-range of creative composition in your formal papers, keep e-mail layouts simple. The Sakai classroom may not fully support MIME or HTML encoded messages, which means that bold face, italics, underlining, and a variety of color-coding or other visual effects will not translate in your e-mail messages. · Humor Note: Despite the best of intentions, jokes and especially satire can easily be lost or taken seriously. If you feel the need for humor, you may wish to add “emoticons” to help alert your readers: ;-), : ), ( Disclaimer Statement Course content may vary from the outline to meet the needs of this particular group.
  • 21. Table of Contents Online Library The Online Library is available to enrolled students and faculty from inside the electronic campus. This is your starting point for access to online books, subscription periodicals, and Web resources that are designed to support your classes and generally not available through search engines on the open Web. In addition, the Online Library provides access to special learning resources, which the University has contracted to assist with your studies. Questions can be directed to [email protected]. · Charles Town Library and Inter Library Loan: The University maintains a special library with a limited number of supporting volumes, collection of our professors’ publication, and services to search and borrow research books and articles from other libraries. · Electronic Books: You can use the online library to uncover and download over 50,000 titles, which have been scanned and made available in electronic format. · Electronic Journals: The University provides access to over 12,000 journals, which are available in electronic form and only through limited subscription services. · Tutor.com: AMU and APU Civilian & Coast Guard students are eligible for 10 free hours of tutoring provided by APUS. Tutor.com connects you with a professional tutor online 24/7 to provide help with assignments, studying, test prep, resume writing, and more. Tutor.com is tutoring the way it was meant to be. You get expert tutoring whenever you need help, and you work one-to-one with your tutor in your online classroom on your specific problem until it is done. Request a Library Guide for your course
  • 22. (http://apus.libguides.com/index.php) The AMU/APU Library Guides provide access to collections of trusted sites on the Open Web and licensed resources on the Deep Web. The following are specially tailored for academic research at APUS: · Program Portals contain topical and methodological resources to help launch general research in the degree program. To locate, search by department name, or navigate by school. · Course Lib-Guides narrow the focus to relevant resources for the corresponding course. To locate, search by class code (e.g., SOCI111), or class name. If a guide you need is not available yet, please email the APUS Library: [email protected]. Table of Contents Turnitin.com Turnitin.com is a web-based plagiarism prevention application licensed, for campus use, through the APUS Online Library. The quick submit option lets faculty upload and check suspicious papers, without requiring student to create their own Turnitin.com profiles. Turnitin.com analyzes electronic submissions of student writing, compares them to the contents of a huge online database, and generates a customized Originality Report. The database used to produce this analysis contains a massive collection of documents available on the Internet from both free and commercial sources, as well as the full texts of all other papers that have been previously submitted to Turnitin.com. Similarity index is based on the amount of matching text to a submitted paper:
  • 23. Blue = no matching text Green = one word to 24% matching Yellow = 25 -49% matching text Orange = 50-74% matching text Red = 75-100% matching text Selected BibliographyWeb Based Supplemental Resources The Scientific Research Process http://www.experiment-resources.com/steps-of-the-scientific- method.html Research Strategies – Qualitative, Quantitative, and Mixed Methods https://www.hitpages.com/doc/6596681877422080/1#pageTop Developing a Research Problem Statement http://faculty.washington.edu/ezent/imwps.htm Developing a Purpose Statement http://johnlatham.me/frameworks/research-methods- framework/purpose-statement/ Developing Research Questions http://libguides.mjc.edu/content.php?pid=163460&sid=1380251 The APA Sixth Edition Annotated Bibliography http://libguides.brandonu.ca/content.php?pid=26571&sid=19758 6 Formal Writing Tips (Students must write in the third person
  • 24. formal for the capstone): http://www.quickanddirtytips.com/education/grammar/first- second-and-third-person Table of Contents Last updated 30 October 2016 _1179669944.bin _1179669945.bin School of Security and Global Studies Program Name: Security Management Course Number: SCMT498 Course Name: Senior Seminar in Security Management Credit Hours: 3 Credit Hours Length of Course: 8 Weeks Prerequisite: Completion of all other program requirements Instructor Information Instructor: See information provided in the Syllabus link in the classroom Email: Please use internal classroom messaging system Table of Contents Course Description (Catalog) The Capstone course is a senior level course designed to allow the student to review, analyze and integrate the work the student has completed toward a degree in Security Management. The student will complete an approved academic project or paper that demonstrates mastery of their program of study in a meaningful culmination of their learning and to assess their level of mastery of the stated outcomes of their degree requirements. NOTE: All required, core, and major courses must be completed prior to enrollment in this course. Student must have SENIOR standing to register.
  • 25. Table of Contents Course Scope This coursere-examines core program concepts, principles, and best practices. The student will synthesize, integrate, and apply program learning into a capstone paper or project. Students will be required to participate in class discussions, complete an annotated bibliography per APA Publication Manual, submit a formal research proposal for professor approval, complete a research paper or project, present the research to the class, and critically comment on classmate’s papers and projects. Table of Contents Course Objectives After completing this course, the student will be able to: · Examine security management theory, concepts, principles, techniques, and practices. · Apply academic knowledge to identify and counter organizational security risks and vulnerabilities. · Identify strategic and tactical security solutions as part of a broad based organizational protection plan. · Describe and detail organizational security programs. Table of Contents Course Delivery Method This final B.A. in Security Management course delivered via distance learning will enable students to complete academic work in a flexible manner, completely online. Course materials and access to an online learning management system will be made available to each student. Weekly assignments (submitted for review by the Faculty Member) are posted on the discussion board or are uploaded in assignments. Discussion assignments are due on Thursdays. Research proposal, bibliography, research paper/project, and classmate discussion responses are due by the last day of the class week, Sunday. Assigned faculty will support the students throughout this eight-week course. Table of Contents Course Resources Required Course Textbooks:
  • 26. Publication manual of the American Psychological Association (6th ed.). (2009). Washington, D.C.: American Psychological Association. Required Readings: See Announcements Additional Resources: See Announcements and Resources Web Sites In addition to the required course texts, the following public domain web sites are useful. Please abide by the university’s academic honesty policy when using Internet sources as well. Note web site addresses are subject to change. Site Name Web Site URL/Address How to Write a Bachelor’s Capstone Paper http://www.ehow.com/how_5126546_write-bachelors-capstone- paper.html Writing in Third Person in APA Style http://www.ehow.com/how_7232506_writing-third-person-apa- style.html The Difference between Formal and Informal Writing http://www.word- mart.com/html/formal_and_informal_writing.html Guide to Grammar and Writing http://grammar.ccc.commnet.edu/grammar/ Table of Contents Evaluation Procedures Grading will be based on three essay assignments, three forum assignments (and six classmate responses – two in each of the three weeks), a formal research proposal, an extended or annotated bibliography per APA, a paper/project outline and thorough summary, a research paper/project, and a forum
  • 27. presentation of your paper/project (with “four” classmate responses in week eight). Reading Assignments: See Announcements and Lessons Supplemental Readings: See above Forum Assignments: 1. Introduction Forum – due by Sunday of week 1. Students will introduce themselves in the Introduction Forum. The goal of the forum is to accomplish two things 1) to build peer-to-peer relationships by sharing introductions and background information with classmates and 2) to express learning goals and expectations for the class. This assignment requires 200 – 250 words and is a non-graded assignment. 2. Forums (posted in forums “only”) are due in weeks one, four and six. The assignments, to allow time for students to respond, must be “posted” by midnight EST Thursdays each of these weeks. Two classmate responses are also required and scored in “each” of these three weeks. Post only during the assigned course week (do “not” post in advance). Assignments must reflect some new or original information – do not just regurgitate data or opinion posted by previous students. Scoring Notes: Ensure your forum postings are “on time and substantive.” Keep in mind that substantive means fully answering and developing your assignment answers and classmate responses. In the forum, do “not” be concise or brief (however, do not add “fluff”). Failing to address assignment questions will cause point deductions from your weekly assignment scores. This includes not thoroughly explaining your positions. Most assignments that receive full credit will be answered with multiple and extensive paragraphs (depending on the assignment, 500 to 1000 words is within the normal range. At a minimum, “classmate responses” – opposed to assignment answers, will be five “exceptional” sentences (not simply stating agreement and/or a reiteration of the student’s
  • 28. post) – usually much more. Homework Assignments: 3. Assignments – There are three essay assignments due in weeks two, four and six. The first essay in week two must be 750 words, and the essays in weeks four and six must be 500 words each. The essays will discuss “HOW” the capstone project will address the seven undergraduate security management program learning objectives listed below under “research proposal”. The essays are NOT intended to discuss the objective itself, only HOW the objective will be incorporated into the project. The essays are due by Sunday of each week. 4. Research proposal – a formal research proposal is due by the conclusion (Sunday) of week two. The professor will approve, disapprove or approve with modifications all proposals. Your research proposal will be based on an “issue or problem” aligned with the requirements and criteria for obtaining the BA Degree in Security Management. The essential criteria include the seven undergraduate security management program learning outcome objectives: · Identify organizational security risk exposure; identify cost- effective mitigation strategies; and prepare for recovery strategies. · Employ the use of risk analysis and vulnerability assessment processes. · Critically examine the variety and extent of losses from criminal acts, natural disasters, and security breaches facing society. · Analyze or compare and contrast concepts of information security, personnel security, and physical security and determine the planning approaches to prevent business losses. · Analyze the trends affecting security and loss prevention and
  • 29. determine the approaches to reduce losses facing businesses and institutions. · Evaluate, from a multi-disciplinary approach, non-traditional approaches to crime prevention. · Distinguish between traditional criminal justice roles, function, theories, and concepts as a reactive institution to the security roles a preventive societal institution. Your research application will propose an examination of a current issue or problem in security management. You are to compare and contrast the selected issue or problem with past, present and potential future trends or solutions. Alternatively, you may compare and contrast the experience of organizations affected by a security industry trend or whom have developed solutions to the problem and conduct analysis of their success or failure. Topic Selection: Topic selection may be difficult. Typically, a capstone research candidate has a general idea of an area within the discipline of security management they wish to explore. Students are encouraged to select a topic they are interested in, but which also has applicability to their organization. In this instance, personal enjoyment is combined with the satisfaction of potentially improving the security posture of your organization. Research Topic: Conduct a review of previous studies: Begin your research with the tools and capable librarian/archivists available to you in the APUS Online Research Center. IRB Guidance for the Capstone The capstone study program does not require primary research for publication although it is an option (pending your faculty advisor’s approval). In the case of primary research for publication involving human subjects, the APUS/AMU Institutional Review Board (IRB) located at:
  • 30. http://www.apus.edu/community-scholars/institutional-review- board/ must approve your research plan prior to beginning any such research. As the Capstone is only four months in length, this option is highly discouraged. Four months is not truly commensurate with primary research for publication, which traditionally requires a longer time period for a successful study. Ensure the availability of ample research resources: Initially, conduct research to ensure your proposed topic is one, which benefits from ample research resources. These may be in many forms including: books, papers, manuscripts, theses, doctoral dissertations, magazine and professional journal articles, Web- based resources, interviews, etc. Feasibility assessment: Ensure the research study goal is attainable within the established parameters. Typically, students initially decide on a capstone research topic that is too broad. Conducting preliminary research should serve to narrow the focus considerably. Proceed to: http://library.weber.edu/ref/guides/howto/topicselection.cfm and read the information on research topic selection. Proceed to: http://www.indiana.edu/~educy520/sec5982/week_2/hypothesis_ 3.pdf#search=%27Writing%20a%20problem%20statement%20% 20hypothesis and read the information on writing a problem statement. Topic Guidance:Security-focused: Ensure the topic is focused
  • 31. on some aspect of security in the post-9/11 environment. The topic can be management focused. For example, you may focus on the utility to a security department of initiating a skill-based compensation program. The topic may be focused on rapidly- changing technologies. For example, you may select the topic of how IT security professionals are using technologies to secure complex systems based on wireless networks. The topic could focus on the challenges of managing a cross-cultural security force in hazardous regions such as Iraq or Afghanistan. You have a high degree of flexibility bounded only by your interest, enthusiasm, and the agreement between yourself and your capstone professor. Take a multi-disciplinary approach: Convergence of many disciplines and approaches is a key factor in the 21st Century security environment. You will find yourself incapable of writing a capstone study on a security-related topic without some discussion of related disciplines such as homeland security, counter-terrorism, intelligence analysis, law enforcement, etc. Seek innovation and unorthodox solutions: It is normal, while researching a topic, to find “school solutions” based on prevailing trends, thought processes, analysis, etc. The key to a great capstone study is to apply your research outcome, your personal experiences and background, and your analysis to create a new and innovative solution or outcome. This is the true essence of exciting learning and the highest attainable goal in writing a great capstone study. Research study statement: The research study statement is composed once you have selected a topic and narrowed your focus to a useful degree. It is a clear and concise statement of the purpose of the capstone study. It must be a statement capable of being proved or disproved through your research and the capstone study process. It is, in effect, the path for your
  • 32. journey through the capstone study experience. · Example: You are writing on the pros and cons of outsourcing security services in a war zone. The capstone study statement (proposition) is that while outsourcing of security services is cost-effective over the short-term, the long-term effect is the destabilization of military manpower and a return to large-scale mercenary operations lacking government oversight. · Example: You are interested in security measures necessary to secure wireless networks. The capstone study statement (proposition) might be that wireless networks are inherently less secure than other communications means. A security system design to achieve wireless network security consists of the following components. Examples of Acceptable Topics Aviation security system design in the post-9/11 environment; are we there yet? The impact of the convergence of public and private sector security operations and constructs in the post-9/11 environment Management under fire: creating and managing a cross-cultural security force in harm’s way. Case studies emphasizing the validity, or lack thereof, of certain concepts, constructs, equipment, designs, management concepts, etc. such as the proliferation of closed circuit television systems and the privacy issues involved, achieving successful integration of complex security system designs, zero-based budgeting for security departments, implementing Crime Prevention Through Environmental Design (CPTED) concepts for protective services operations. Examples of Unacceptable Projects Over-generalized topics such as “homeland security” This topic is highly relevant if not so generalized.
  • 33. Topic conflict: for example, a discussion of both Crime Prevention through Environmental Design (CPTED) and Targeted Crime Reduction (TCR) - they are not the same, but similar enough that they should be avoided (in tandem). Small technical topics, for example, a comparison of the utility of the .40 S&W cartridge with the .38 S&W Special Cartridge for use on protective services details. Topics that do not require challenging and innovative research, i.e., over-generalized - for example, the history of private security in America. In this instance, there is no point to be proven or disproved. MANDATORY PROPOSAL COMPONENTS The following sections must be included in your proposal (3 page minimum body - not including cover page, abstract or references): 1. Title Page with proposed title 2. Abstract – separate page 3. A concise capstone study statement for your proposed research paper/project and a brief descriptive statement a. Problem Statement b. Significance of the Study c. Research Question(s) 3. Paper/project components and key points to be covered in your paper/project. 4. Proposed Methodology/Research Strategy – If you intend to conduct primary research for publication, you must indicate the scope of your proposed research, methodologies, estimate of materials required for a successful effort, etc. Primary research studies for publication are not recommended (see comments in
  • 34. reference to the IRB process below) a. Assumptions (if any) b. Scope and Limitations 5. A preliminary, but detailed schedule of your plan to complete the research study 6. Preliminary research sources There will be 100 possible points for the proposal (15% of your final grade) DUE ON Thursday OF WEEK 2. 5. An “annotated” research bibliography of a minimum of “six” references (no older than seven years) to be used in your paper/project is due in week three. Examples include “credible” WWW reports and sites, books, manuscripts, theses, dissertations, journals, newspapers, magazines, etc. Submit/upload in a MS Word document. Ensure you follow the APA style and each reference is thoroughly “summarized and evaluated.” Conducting Research: Upon topic approval conduct research before proposal submission. Your starting point is the APUS Online Research Center and the talented staff of librarians and archivists available to assist you in your efforts. Resources include: · Bibliographic resources · Web-based resources · Web search engines · Other resources · Databases Your search strategy focuses your search efforts and makes efficient use of your time.
  • 35. You must discuss search strategies first with your professor and secondly, with the experts in the APUS Online Research Center. There will be 100 possible annotated bibliography points (10% of your final grade). Late submitters will be penalized 10 points per day. 6. Extended paper/project outline, thorough summary and four additional APA annotated references (total of 10 references) is due in week five. This submission should be a significant expansion of your research proposal and can be similar to a rough draft. The body of this assignment should be a “minimum of five pages.” Submit/upload this assignment in a MS Word document. There will be 100 possible points for the extended outline and summary (10% of your final grade). Late submitters will be penalized 10 points per day. Exams/Quizzes: None Field Experience Assignments: Optional (contact instructor) Capstone Project: 7. Final capstone is due in week “seven”. MANDATORY PROJECT COMPONENTS: See final capstone template located in Resources Sources from Wikipedia are “NOT” to be used as they have been deemed unreliable. ANY VIOLATIONS OF THE UNIVERSITY PLAGIARISM POLICY WILL RESULT IN AN AUTOMATIC “F.” There will be 100 possible points for your paper/proposal (40% of your final grade 8. A formal presentation of your paper (and “four” classmate responses) is due on Friday of week eight. You are required to present your project to the class “in the forum area “only” – “no” submission/uploading via Assignments. Your presentation
  • 36. should provide a comprehensive overview and highlight the key sections and points of your paper. A Microsoft PowerPoint slide presentation is required. Do “not” attach and MS Word document or copy your entire paper/project in the forum area. Presentation/Classmate Response Scoring Notes: I will score your presentation in “two parts.” Your presentation assignment will be 80% of your possible grade. The remaining 20% of your weekly assignment score will be based on the quality of your “four” (5% each) forum “responses” to your classmates. The excellence of your effort will be considered when grading your presentation and classmate responses. Finally, there will be 100 total possible points for the presentation and classmate responses (10% of your final grade). Late posters will be penalized 10 points per day. Grade Instruments Points Possible Forums 4 (weighted 40%) 100 / 400 Assignments – 6 (weighted 40%) 100 / 600 Capstone final (weighted 20%) 100 TOTAL 1100 Table of Contents Course Outline Please see the Student Handbook to reference the University’s grading scale. Week Topic(s)
  • 37. Learning Objectives Readings Assignment(s) 1 Autobiography & Response (1) / B.A. in Security Management Program Objectives / Paper-Project Topic & Responses (2) Develops potential topics, conducts preliminary research, assesses various resources, research tools, libraries, etc. Identifies and discusses “three” research topics and discusses their viability with classmates and professor Conducts research to identify and evaluate appropriate academic and legitimate sources See Announcements/Lessons Autobiography & Response (1): Post to Introduction Forum only - This is mandatory with a 250-word minimum Week 1 Forum - post to Forum only 2 Research Proposal Develops and submits a formal proposal Validate a research plan. Conducts research to identify and evaluate appropriate academic and legitimate sources
  • 38. Identify organizational security risk exposure; identify cost- effective mitigation strategies; and prepare for recovery strategies Analyze concepts of information security, personnel security, and physical security, and determine the planning approaches to prevent business losses Distinguish between traditional criminal justice roles, functions and concepts as a reactive institution to the security roles as a preventive societal institution See Announcements/Lessons Assignment 1 - Post to Assignments only - Capstone proposal - Submit via Assignments using the Capstone proposal template located in Resources Assignment 2 – Post to Assignments only 3 Annotated Bibliography Create an annotated bibliography Conducts research to identify appropriate academic and legitimate sources See Announcements/Lessons Assignment 3 - Post to Assignments only 4 Research Topic, Purpose/Problems Statements, Progress & Responses (2) Identifies and discusses the paper/project topic, thesis
  • 39. statement, main points/sections with classmates and professor Analyze the trends affecting security and loss prevention and determine the approaches to reduce losses facing businesses and institutions Evaluate from a multi-disciplinary approach, non-traditional approaches to crime prevention See Announcements/Lessons Week 4 Forum - Post to Forum only Assignment 4 – Post to Assignments only 5 Outline, Summary & Additional Annotated Bibliographic References Revise the preliminary proposal into an acceptable first research study draft Conducts research to identify and evaluate appropriate academic and legitimate sources Employ the use of risk analysis and vulnerability assessment processes Identify organizational security risk exposure; identify cost- effective mitigation strategies and prepare for recovery strategies See Announcements/Lessons Assignment 5: Post to Assignments only – use the original Capstone proposal form you used in Assignment 1 – just expand on it (this is also the final Capstone template).
  • 40. 6 Research Topic / Responses (2) Reports paper/project topic progress with classmates and professor Conducts research to identify and evaluate appropriate academic and legitimate sources Critically examine the variety and extent of losses from criminal acts, natural disasters, and security breaches facing society See Announcements/Lessons Week 6 Forum – Post to Forum only Assignment 6 – Post to Assignments only 7 Research Paper/Project Designs and submits research paper/project Analyze the trends affecting security and loss prevention and determine the approaches to reduce losses facing businesses and institutions Evaluate from a multi-disciplinary approach, non-traditional approaches to crime prevention See Announcements/Lessons Assignment 7: Final Capstone – post to Assignments only 8 Paper-Project Presentation / Responses (4)
  • 41. Presents paper/project to classmates and professor; and critically/substantively comments on four classmate’s papers/projects. . See Announcements/Lessons Week 8 Forum - PowerPoint Presentation Assignment & Forum Responses (2):Capstone Presentation - Post to Forums only Policies Please see the Student Handbook to reference all University policies. Quick links to frequently asked question about policies are listed below. Drop/Withdrawal Policy Plagiarism Policy Extension Process and Policy Disability Accommodations Writing Expectations All written submissions should be submitted in a font and page set-up that is readable and neat. It is recommended that students try to adhere to a consistent format, which is described below. · Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor). · Times New Roman, 12-point font is the only acceptable font IAW APA (6th. ed.) guidance. · Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances. Citation and Reference Style Attention Please: Students will follow the APA sixth edition as
  • 42. the sole citation and reference style used in written work submitted as part of coursework to the University. Assignments completed in a narrative essay or composition format must follow the citation style cited in the: Publication manual of the American Psychological Association (2009). (6th ed.). Washington, D.C.: American Psychological Association. Late Assignments Students are expected to submit classroom assignments by the posted due date and to complete the course according to the published class schedule. As adults, students, and working professionals, I understand you must manage competing demands on your time. Should you need additional time to complete an assignment, please contact me before the due date so we can discuss the situation and determine an acceptable resolution. Routine submission of late assignments is unacceptable and may result in points deducted from your final course grade. Netiquette Online universities promote the advancement of knowledge through positive and constructive debate – both inside and outside the classroom. Forums on the Internet, however, can occasionally degenerate into needless insults and “flaming.” Such activity and the loss of good manners are not acceptable in a university setting – basic academic rules of good behavior and proper “Netiquette” must persist. Remember that you are in a place for the rewards and excitement of learning which does not include descent to personal attacks or student attempts to stifle the Forum of others. · Technology Limitations: While you should feel free to explore the full-range of creative composition in your formal papers,
  • 43. keep e-mail layouts simple. The Sakai classroom may not fully support MIME or HTML encoded messages, which means that bold face, italics, underlining, and a variety of color-coding or other visual effects will not translate in your e-mail messages. · Humor Note: Despite the best of intentions, jokes and especially satire can easily be lost or taken seriously. If you feel the need for humor, you may wish to add “emoticons” to help alert your readers: ;-), : ), ( Disclaimer Statement Course content may vary from the outline to meet the needs of this particular group. Table of Contents Online Library The Online Library is available to enrolled students and faculty from inside the electronic campus. This is your starting point for access to online books, subscription periodicals, and Web resources that are designed to support your classes and generally not available through search engines on the open Web. In addition, the Online Library provides access to special learning resources, which the University has contracted to assist with your studies. Questions can be directed to [email protected]. · Charles Town Library and Inter Library Loan: The University maintains a special library with a limited number of supporting volumes, collection of our professors’ publication, and services to search and borrow research books and articles from other libraries. · Electronic Books: You can use the online library to uncover and download over 50,000 titles, which have been scanned and made available in electronic format.
  • 44. · Electronic Journals: The University provides access to over 12,000 journals, which are available in electronic form and only through limited subscription services. · Tutor.com: AMU and APU Civilian & Coast Guard students are eligible for 10 free hours of tutoring provided by APUS. Tutor.com connects you with a professional tutor online 24/7 to provide help with assignments, studying, test prep, resume writing, and more. Tutor.com is tutoring the way it was meant to be. You get expert tutoring whenever you need help, and you work one-to-one with your tutor in your online classroom on your specific problem until it is done. Request a Library Guide for your course (http://apus.libguides.com/index.php) The AMU/APU Library Guides provide access to collections of trusted sites on the Open Web and licensed resources on the Deep Web. The following are specially tailored for academic research at APUS: · Program Portals contain topical and methodological resources to help launch general research in the degree program. To locate, search by department name, or navigate by school. · Course Lib-Guides narrow the focus to relevant resources for the corresponding course. To locate, search by class code (e.g., SOCI111), or class name. If a guide you need is not available yet, please email the APUS Library: [email protected]. Table of Contents Turnitin.com Turnitin.com is a web-based plagiarism prevention application
  • 45. licensed, for campus use, through the APUS Online Library. The quick submit option lets faculty upload and check suspicious papers, without requiring student to create their own Turnitin.com profiles. Turnitin.com analyzes electronic submissions of student writing, compares them to the contents of a huge online database, and generates a customized Originality Report. The database used to produce this analysis contains a massive collection of documents available on the Internet from both free and commercial sources, as well as the full texts of all other papers that have been previously submitted to Turnitin.com. Similarity index is based on the amount of matching text to a submitted paper: Blue = no matching text Green = one word to 24% matching Yellow = 25 -49% matching text Orange = 50-74% matching text Red = 75-100% matching text Selected BibliographyWeb Based Supplemental Resources The Scientific Research Process http://www.experiment-resources.com/steps-of-the-scientific- method.html
  • 46. Research Strategies – Qualitative, Quantitative, and Mixed Methods https://www.hitpages.com/doc/6596681877422080/1#pageTop Developing a Research Problem Statement http://faculty.washington.edu/ezent/imwps.htm Developing a Purpose Statement http://johnlatham.me/frameworks/research-methods- framework/purpose-statement/ Developing Research Questions http://libguides.mjc.edu/content.php?pid=163460&sid=1380251 The APA Sixth Edition Annotated Bibliography http://libguides.brandonu.ca/content.php?pid=26571&sid=19758 6 Formal Writing Tips (Students must write in the third person formal for the capstone): http://www.quickanddirtytips.com/education/grammar/first- second-and-third-person Table of Contents Last updated 30 October 2016 _1179669944.bin _1179669945.bin Running Head: Security & Human Trafficking 1 Security & Human Trafficking 2 American Public University System American Military University Title of paper goes here Date:
  • 47. Your name goes here SCMT498 Session # goes here Submitted in partial fulfillment of the degree requirements for the BA in Security Management Abstract The intent of this mixed method capstone is to determine how security professionals can successfully combat human trafficking. The issue of human trafficking produces challenges for law enforcement and security professionals worldwide. This capstone will challenge the reader by further defining human trafficking, identifying the scope and magnitude of this phenomenon, and examining the U.S.’s domestic legislative attempts to combat it. After considering all of these factors, there will be an examination of how human trafficking influences, or should influence, vulnerability assessments, risk analysis, and risk exposure strategies in security management. Problem Statement The problem this mixed method capstone will seek to address is how security managers can identify and implement proactive anti-human trafficking efforts. From a border security and immigration standpoint, the United States (U.S.) and United Nations (U.N.) have taken productive steps toward defining and combating human trafficking through legislation and traditional law enforcement. The threats associated to human trafficking have the potential to adversely effect corporations. If a company were found to support human trafficking through its human resource practices or if company executives are found to contribute to human trafficking through the hiring of undocumented housekeepers, prostitutes, or other individuals
  • 48. held in captivity, the executive’s personal safety and the company’s overall wellbeing could all be at stake. How are security strategies adjusted to account for human trafficking and the associated security and political concerns? Purpose Statement The purpose of this mixed method capstone is first to clearly define human trafficking and identify the steps taken, both nationally and internationally, to address this issue. Finally, there will be an examination of proactive measures being employed, or those that could be taken, by proprietary and contract security professionals to protect their clients from human trafficking concerns. Essentially, the aim is to examine practices employed by security professionals that educate human resources processes in an effort to avoid victims of human trafficking as well as traditional vulnerability and risk management practices aimed at reducing the likelihood of company assets being associated with human trafficking. Research Questions Q1. Which industries are at higher risk to be affected by human trafficking? Q2. How can organizational risk exposure strategies be employed to combat human trafficking? Q3. How do the private security and traditional law enforcement roles differ concerning human trafficking? Q4. How can vulnerability assessment processes be used to identify the presence of human trafficking? Key Points Addressed
  • 49. P1. Human trafficking is a large problem in the United States and the International community. P2. Law enforcement agencies have made steps toward better understanding human trafficking but there is still much progress yet to be made. P3. Human Trafficking is not only a national security concern but also a concern for businesses and their security managers. P4. Organizational risk exposure can be greatly reduced through a comprehensive human trafficking education program put in place by the security manager. Methodology/Research Strategy The research method selected as most appropriate for this study is the mixed method. The qualitative research will focus on gathering data related to the history and evolution of human trafficking both in the United States and abroad. This will provide context for further discussion. The qualitative research method will also be utilized to properly define the terms being utilized, to explore legislation put in place by the United States and the United Nations, and to identify standard security practices designed to combat human trafficking. The quantitative research method will be utilized to gather numerical data supporting the overall impact of human trafficking, to include the estimated number of victims, any adverse financial impacts that can be discovered, and any impact of law enforcement efforts to counter human trafficking. Assumptions One assumption is that quantitative data will be difficult to obtain due to the underground nature of human trafficking. Many non-profit organizations may have estimates, but vetted data may be limited. It is also assumed that data regarding
  • 50. private security approaches to human trafficking may be limited and may result in speculative reporting regarding the security industry’s approach to this phenomenon. Scope The scope of this capstone will focus on the efforts of security managers and will hopefully identify best practices and areas of improvement for security managers. Limitations The only limitation known is the time constraint preventing comprehensive research, which will result in a reduction of comprehensive data for consideration. Human Trafficking: A Security Manager’s Developing Challenge Many challenges face corporate interests and for businesses operating in an international environment, the risks are even greater. One issue that faces international law enforcement and private businesses, and has recently gained notoriety in popular culture, is human trafficking. Human trafficking, or trafficking in persons, is a term used to describe the movement of people for use in various industries. According to the U.S. Department of State (2014),the methodology of human trafficking can include “sex trafficking” of adults and children, “forced labor”, “bonded labor or debt bondage”, “involuntary domestic servitude”, “forced child labor”, and “unlawful recruitment and use of child soldiers” (p.19). Human trafficking is gaining traction as a 21st century epidemic, often noted as modern day slavery, and is even among one of the annual training requirements for U.S. military and Department of Defense employees. Human trafficking and forced labor are terms that are often confused. As noted in the aforementioned definition,
  • 51. human trafficking and forced labor are not the same; although, the term human trafficking is often used as a synonym for forced labor and vice-a-versa. It is important to note that human trafficking only describes the actual transportation of victims and does not address the reason for victim transport or type of captivity enforced thereafter. Forced labor, unlike human trafficking, involves the revocation of the freedoms of employees forced to work. Another common methodology of human trafficking is debt bondage. Debt bondage is similar to forced labor, but debt bondage often involves a scenario where a worker is charged a large monetary fee, often under the ruse being a recruiting fee or hiring fee, and they incur a large debt as a result. The employee starts their work already in a large amount of debt and they often find the salary they earn is far less than the salary they were promised when recruited. This scenario often results in the employee, who has large amounts of unpaid debt, continuing to work for a meager salary while trying to pay off the debt. This situation becomes an endless cycle with no resolution as the workers’ low wages prevent them from ever fully repaying the debt and thus, preventing them from being granted their freedom to leave. To further control their victims, the perpetrators of forced labor and debt bondage will often illegally sneak workers into a country and then threaten them with deportation or, in the event of a legal immigrant, they will hold their passport until their debt is paid, thus eliminating their ability to leave. There are several methods in which workers are denied basic freedoms and held in captivity, but regardless of how the act is committed, it is still detrimental. When considering the methodologies used in human trafficking, it is easy to mistakenly assume this is a rare phenomenon, is an uncommon issue, or at least an issue that does not occur within the boundaries of the United States. All of these assumptions would be incorrect. In fact, Miko (2006) reported, “there are an estimated two to four million people victimized by transnational human trafficking each year. Of those two to four million victims, it is estimated that 17,500 of
  • 52. them are smuggled into the United States annually” (para 2). While these statistics show that human trafficking within the United States accounts for less than one percent of global human trafficking, the epidemic still adversely affects American interests even when it occurs abroad. As participants in the global marketplace, corporations and their security managers must be keenly aware of the vulnerabilities and liabilities associated with human trafficking. Corporations are not the only entities that have had to develop systems for combating human trafficking; the issue has especially challenged law enforcement agencies and non-governmental organizations worldwide. As human trafficking has become more wide spread and publicized, law enforcement agencies at all levels have been challenged with creating effective education programs, agency enforcement policies, and comprehensive mitigation strategies. While modest advances have been made toward creating a more educated police force, the progress has proven to be extremely slow. According to Farrell, McDevitt, and Fahy (2010), a national survey of law enforcement agencies revealed, “Less than one fifth of the agencies responding to the national survey had conducted any type of human trafficking training” (p.222). Farrell et al. (2010) went on to say, of those agencies that did conduct human trafficking training, “most (47%) used brief, in- service training sessions or only offered specialized regional training for a few investigators (43%)” (p.222). The results of this national survey establish a concern that traditional law enforcement is not trained nor equipped to fully combat human trafficking. To put it more plainly, law enforcement personnel are not currently able to combat human trafficking because they have ill-equipped training. A more current national survey could not be found so there is a possibility in more recent years police agencies have increased their focus toward human trafficking, but further research suggests otherwise. More comprehensive examination revealed an additional survey was
  • 53. taken a couple of years after the aforementioned national survey, yet it yielded similar results. In fact, the concern of inadequate training and preparation of police forces was more so substantiated as a result of this survey administered to law enforcement agencies in the State of Georgia. According to Grubb & Bennett (2012), “The Georgia Law Enforcement Survey [determined] that over 75% of all respondents reported that no human trafficking training took place within their agencies in the last four years” (p.496). Additionally, the survey found that in addition to a lack of proper training, most law enforcement agencies failed to establish specific protocols or polices focused on human trafficking. To wit, Grubb & Bennett (2012) reported “Only 6% of the respondents in the current study reported that their departments had such protocols or policies in place” (p.496). These results show that while law enforcement agencies have taken steps toward a better understanding this problem, there is still much progress yet to be made. With only one-fourth of the police population receiving training, it is easy to see how police are still unprepared. More recently, the U.S. Congress passed a bill titled, the Justice for Victims of Trafficking Act of 2015. This bill directly addressed the inadequate law enforcement training issue by requiring the Department of Justice to provide specific, technical anti-trafficking training to Federal, State, and local law enforcement. The training will include effective methods for investigating covered offenders. Additionally the Justice for Victims of Trafficking Act of 2015 requires an annual report be produced, and provided to the U.S. Senate Committee on the Judiciary. The annual report will show arrest, prosecution, and conviction data for trafficking related crimes. The President has not yet signed this bill, but in the event it is signed, there will presumably be a delay in enacting its requirements. Unfortunately, because of the ill preparedness evident in these surveys and in the need for Congress to formally hold law enforcement accountable, private security managers cannot trust traditional law enforcement alone to protect their businesses
  • 54. from the threats associated with human trafficking. Even when law enforcement personnel have a better understanding of the issue, their approach will be reactive in nature. Their impact would be limited to responding to citizen concerns regarding human trafficking. Certainly city, state, and the federal government will encourage community-policing initiatives, public awareness campaigns, and will encourage police agencies to increase their awareness of human trafficking, but ultimately law enforcement will primarily fulfill a reactive role in combating this issue. Unfortunately, even if they try to be proactive, law enforcement professionals will have a difficult time impacting human trafficking due to the covert nature in which it is conducted. Criminal gangs or other organized criminal groups are often responsible for the human trafficking that occurs internationally and within the United States. These gangs exercise excellent operational security; which makes it difficult for law enforcement to counteract them. Additionally, many corporations’ supply chains originate overseas, outside of the jurisdictional boundaries of U.S. based law enforcement agencies. As a result, even if U.S. law enforcement agencies were competent in battling human trafficking, these corporations would have to depend on foreign police forces to identify issues in the international supply chain locations. It is presumed many foreign governments and their law enforcement entities are replete with corruption and thus can’t be trusted to enforce anti trafficking protocols within their jurisdictions. For these reasons, security managers must develop and rely on their own proactive programs in order to identify human trafficking within their ranks. At first glance, human trafficking can appear as solely a law enforcement issue, but human trafficking is not only a national security concern but also a concern for businesses and their security managers. In fact, international companies actually benefit from contributing to the fight against human trafficking by collaborating with international government entities, non-
  • 55. governmental agencies, and other private organizations. Security managers can make sure their corporations benefit by maintaining a proactive anti-trafficking program. A few of these benefits include avoiding criminal investigations, sanctions, and fines. An added benefit of a strong anti- trafficking program is the positive public image portrayed by showing proactive measures toward this increasingly well known global and social issue. Because human trafficking is seen as a human rights issue, a company who takes proactive measures to combat it would likely receive positive press, which would influence marketability and hopefully increase sales and profit. According to Fields (2013), “By taking action against human trafficking, companies protect their financial interests and promote themselves as being socially responsible” (para 3). A great example of this comes from a 2007 scandal involving allegations of child labor at a Gap clothing corporation’s sub-contracted facility in India. The incident resulted in poor publicity; but Gap used the media attention as an opportunity to publicly restate their zero tolerance policy regarding child labor and restructure procedures. Fields (2013) said of Gap’s response “This resulted in improved supply chain tracking, enhanced monitoring, and education and awareness- raising…Certainly, Gap was motivated in large part by the need to protect its brand name” (para 7). While globally publicized trafficking scandals can be harmful to business, a proactive, preventative and publicized corporate policy against trafficking and forced labor can benefit a company in the private sector. Until recent years, corporations only addressed human trafficking of their own free will and were not dictated by anyone. Some companies maintained these efforts in order to guard against liability while others truly wanted the positive public relations that would result from contributing to non- governmental organization efforts to combat human trafficking. This structure, since it was completely voluntary, resulted in some companies addressing the concerns while other companies did nothing. In an effort to create consistency in business
  • 56. practices, and force more compliance with emerging industry anti-trafficking standards, some states authored legislation that allowed the state government to begin monitoring corporate anti-trafficking efforts. According to Altschuller (2013): New statutes, including the California Transparency in Supply Chains Act and the proposed Business Transparency on Trafficking and Slavery Act have focused attention on corporate efforts to address human trafficking risks. The California statute, which went into effect on January 1, 2012, requires companies to make public disclosures of their efforts, if any, to ensure that their supply chains are free from forced labor and human trafficking (para 3). It is easy to see that creating corporate anti-trafficking efforts is of increasing importance to many executives in the private sector. Consolidating these new anti-trafficking efforts under a corporate social responsibility program is becoming a popular practice. The goal of a corporate social responsibility program is to create and participate in initiatives that benefit society. The hope for these programs would be that by improving society, especially local communities in which the company operates, the company would increase its public image while also contributing to societal improvements likely to reduce risk of loss to the company. The challenge for corporate executives was in aligning the corporate social responsibility program initiatives within existing corporate constructs. Would a new program manager be created, resulting in additional payroll expenses, or could an existing position incorporate corporate social responsibility efforts within their current duties? While the idea of having a corporate social responsibility program is generally a new initiative, there are strong trends emerging that suggest it is becoming an industry standard. According to Kane (2011), “The Security Executive Council has noticed an uptick in the number of security executives being asked to run corporate social responsibility (CSR) programs for their
  • 57. organizations” (p.54). There are many possibilities as to why the corporate social responsibility programs are being delegated to security executives, but one possible reason is due to the implied security benefits of such a program. Kane (2011) explained this when he said, “Security acts as an enabler for CSR programs…The security of an organization really depends on how it is perceived” (p. 54). In other words, if a corporation is seen as being proactive against crime, involved positively in the community, and is perceived as being focused on risk analysis, then they are more likely to have a strong security posture as a result of their efforts. Developing and implementing a corporate social responsibility program could aid in reducing a corporations risk, but in spite of all corporate social responsibility efforts, all businesses still assume some level of risk toward becoming associated with human trafficking. This could occur regardless of whether the company is unwitting or complicit. A previous example discussed human trafficking within the supply chain of the retail-clothing company GAP. This example fits the stereotype often evoked when one thinks of child labor in sweat shops producing products for commercial sale. The retail industry is often viewed as the most susceptible to forced labor or child labor; both of which benefit from human trafficking. A closer examination of several industries shows some industries are at a higher risk of exposure to human trafficking than others. In fact, in 2014, the Interfaith Centre on Corporate Responsibility (ICCR) initiated a campaign focusing on two specific industries: hospitality and food agriculture. The hospitality sector, which includes hotels, food service, retailers, and airlines, assumes great risk due to their extensive, international operations and large employee populations. Of these hospitality industries, hotels are especially at risk. One prominent example of a human trafficking scandal involving a hotel came against the Marriott hotel chain in 2006. According to Biron (2014), in 2006:
  • 58. “Scandinavian investors began pressuring the Marriott hotel chain over reports of child prostitution rings making use of the some of the company's facilities in Costa Rica. Within a year, Marriott had rolled out a new, pointed policy on the issue, and has since engaged in annual shareholder disclosure” (para 12). There is a very important lesson learned in this scenario. Marriott International Incorporated was never found to have been knowledgeable or otherwise complicit in the human trafficking and prostitution occurring on their facility. The corporation could have claimed ignorance, publically denounced the practice of child prostitution, and moved past the scandal, but instead they created new policy on the issue and started providing shareholders with information. So, why did Marriot International Incorporated go to such great lengths when they were not found culpable of any wrongdoing in the first place? As Biron (2014) noted, “the lack of stated policy was seen as detrimental to broader anti-trafficking efforts” (para 12). Overall, this goes to support the theory that if a company does not have programs and policies prohibiting and combating human trafficking, they face the likelihood of being viewed as complicit in its perpetration. No longer can companies afford to sit idly by and hope to stay above the fray. Instead, companies must have active anti-trafficking programs, often run by security executives, or they will be viewed as indifferent or even supportive of the crime. Obviously being seen in such a way would be unfavorable for corporate reputation and brand integrity. As mentioned previously, another industry susceptible to human trafficking and forced labor is agriculture. Agriculture workers are often uneducated, come from poverty, and are often isolated from the public as a result of the rural locations they work in or come from. In an example of a particularly egregious agriculture related incident, in 2006 the Justice Department brought, what was at the time, the largest human trafficking case in the history of the U.S. federal government. According to the New York Times (2006), six
  • 59. contractors, who worked for a Los Angeles based company, were indicted for conspiracy after they were accused of holding 400 workers from Thailand on farms in the U.S. The company lured workers to the U.S. utilizing the federal guest worker program and promises of good salaries. Once the workers arrived, they were forced to pay high recruiting fees, had their passports taken and were coerced with threats of deportation if they complained (para 2). In most of these previous examples, the company was not held legally liable for the human trafficking incidents they were associated with; however, their public image and corporate security were adversely affected. While the U.S. and other international governments are attempting to address this issue through legislation and prosecution, it is clear that their efforts are predominately reactive in nature. Only through a proactive approach can security professionals protect their companies from increased risk of human trafficking related incidents. All companies manage a certain level of risk exposure. Managing the risk of human trafficking related scenarios is no different than managing other risks. A security manager must identify the threat, assess the level of risk, and implement policies to combat the threat. Many highly regarded companies have already begun making human trafficking and forced labor a priority in their overall security posture. According to Meinert (2012), several global businesses, including Microsoft, LexisNexis, Carlson, The Coca-Cola Co., Exxon Mobil, Delta Air Lines, Manpower Group, NXP and Travelport, formed the Global Business Coalition Against Human Trafficking in an effort to join their resources on “eliminating forced labor that may be present in corporate supply chains, as well as sex trafficking that relies on facilities in the travel and tourism industries” (para 2). While forming coalitions may be good for public relation campaigns, the task is worthless if there is no true impact or risk mitigation. The aforementioned law enforcement surveys revealed law enforcement officers are not fully educated on their agency’s human trafficking enforcement
  • 60. policies. This lack of education and awareness is likely present in a larger scale within many corporate employee populations. Organizational risk exposure can be greatly reduced through a comprehensive human trafficking education program put in place by the security executive. The approach has to be multidisciplinary in order to be effective. Security managers must successfully incorporate cyber security, physical security, human resources, law enforcement, government agencies, multilateral organizations, civil society, and non-governmental organizations into their strategy. At the company level, senior level corporate executives must first be shown the corporate liabilities of human trafficking and forced labor. This is important because an effective anti-trafficking program or corporate social responsibility program must be well funded in order to be effective and funding won’t come without buy in from senior corporate leaders. Simply understanding the symptoms of human trafficking can help executives to better understand the problem. In an effort to assist leaders in combating this issue, the International Labour Office (2008) developed the following 10 Principles for Business Leaders to Combat Forced Labour and Trafficking: · Have a clear and transparent company policy, setting out the measures taken to prevent forced labour and trafficking. Clarify that the policy applies to all enterprises involved in a company’s product and supply chains; · Train auditors, human resource and compliance officers in means to identify forced labour in practice, and seek appropriate remedies; · Provide regular information to shareholders a potential investors, attracting them to products and services where there is a clear and sustainable commitment to ethical business practice including prevention of forced labour;
  • 61. · Promote agreements and codes of conduct by industrial sector (as in agriculture, construction and textiles), identifying the areas where there is risk of forced labour, and take appropriate remedial measures; · Treat migrant workers fairly. Monitor carefully the agencies that provide contract labour, especially across borders, blacklisting those known to have used abusive practices and forced labour; · Ensure that all workers have written contracts, in language that they can easily understand, specifying their rights with regard to payment of wages, overtime, retention of identity documents, and other issues related to preventing forced labour; · Encourage national and international events among business actors, identifying potential problem areas and sharing good practice; · Contribute to programmes and projects to assist through vocational training and other appropriate measures, the victims of forced labour and trafficking; · Build bridges between governments, workers, law enforcement agencies and labour inspectorates, promoting cooperation in action against forced labour and trafficking; · Find innovative means to reward good practice, in conjunction with the media. Once a corporate vision is born and policy is created to support that vision, then security managers must focus on educating human resources professionals. The means by which human trafficking affects businesses is primarily through the hiring processes of sub contracted employment agencies. Security managers should support human resources in vetting contracted hiring companies in order to confirm they are conducting sound hiring practices and are not committing human trafficking violations only to have the parent company unwittingly perpetrate forced labor practices. As previously mentioned, security managers must exercise cyber security in combating human trafficking as well. Security professionals must coordinate with human resources to examine any company job
  • 62. advertisements or descriptions, which may be on the web. Could third party companies use information within legitimate job advertisements to lure in workers only to limit their freedoms upon arrival? Could the company unwittingly be contributing to human trafficking as a result of not exercising information or cyber security? Additionally security managers must focus on corporate hiring practices even when third party agencies are not used. There still exists a threat that a small group of like-minded employees within the company could commit human trafficking and forced labor violations, so it is important for a security professionals to take a holistic approach to risk assessment. Findings/Conclusions Human trafficking is a pervasive and developing challenge for corporate security executives. Human trafficking includes the transportation of people for use in criminal schemes such as child labor, prostitution, forced labor, and debt-bondage; just to name a few. Companies in all industries are at some level of risk for liability associated with human trafficking. Corporations operating exclusively within the U.S., to include their supply chain, are exposed to less risk than corporations operating globally. This is not to say that U.S. companies are not at risk of having human trafficking related issues as was evidenced by the aforementioned federal indictment for human trafficking related crimes in Hawaii and the continental U.S. Corporations must establish clear hiring policies and implement checks and balances into their processes in order to flesh out any conspiracies that may be present within the workforce. This challenge is more difficult for corporations with foreign supply chains. These companies must attempt to incorporate their anti-trafficking values to their foreign contractors. Whether a company utilized foreign manufacturing or uses third party hiring agencies, the corporation must take measured
  • 63. actions toward ensuring their direct employees and employees of contracted companies are there of their own free will and have not been subjected to human trafficking. Research has shown several examples of U.S. companies who have fallen victim to human trafficking scandal and how the poor publicity could affect the overall viability of the company. This research proves that corporations not only have to avoid any perception of involvement with human trafficking, but they must also take proactive steps toward creating robust anti-trafficking and corporate social responsibility programs. Casual observers are likely to view a company without an anti-trafficking program as apathetic or even supportive of the crime, so having a well- publicized anti-trafficking campaign is of utmost importance to the protection of the brand and avoidance of liability. Part of developing an anti-trafficking program is to conduct a risk analysis and threat assessment. One factor that increases a company’s risk is the industry in which the company operates. Agriculture and hospitality industries are currently at higher risks of human trafficking. The agriculture industry is at risk primarily due to the fact it often employees poor, unskilled workers from foreign countries. Often a third party hires these workers and if the third party is not trustworthy, he or she could manipulate workers into a position of debt-bondage or other manifestation of human trafficking. The hospitality industry is also at great risk of human trafficking related offenses due primarily to its global exposure and large employee populations. Hospitality companies, such as hotels, could have solid hiring practices and still become involved in human trafficking scandal if their facilities are found to be used to transport or house victims. For these reasons it is very important for corporations to develop sound policies and guidelines denouncing the practice of human trafficking and placing their company in a morally superior position in the event there are allegations of misconduct. Another way corporations can increase their positive public relations regarding human trafficking is by developing a corporate social responsibility
  • 64. program to positively influence the communities in which it works. One of the primary concerns of human trafficking is a lack of training and awareness within the employee population; to include senior level executives. Educating human resource personnel and others in key positions will increase a corporation’s defensive posture and will aid in proactively looking for signs of human trafficking. Additionally, security executives can take a proactive, anti-trafficking stance by hiring an auditor responsible for examining company practices and employee pools for signs of human trafficking. Security executives can create an environment of transparency by sharing audit results with shareholders, government agencies, and non- governmental organizations. By partnering with other industry corporations, international governments, and non-governmental organizations corporations can share experiences, develop best practices in combating human trafficking, and most importantly can build their brand’s reputation as being serious about anti- trafficking efforts. Corporate security executives must realize the reality of the risk human trafficking presents to their corporate interests. The liability of employing victims of human trafficking go well beyond lost revenue damaged corporate identity, and poor publicity. Becoming involved with human trafficking obviously has civil liability risks but also presents criminal liabilities as well. By creating clear policies and practices and incorporating those into daily business, security executives can decrease their risk and increase positive branding at the same time. References Altschuller, S. (2013, January 10). Corporate responsibility for human trafficking & five steps that your company can take right now. Retrieved from
  • 65. http://www.mondaq.com/unitedstates/x/215116/Corporate+Com mercial+Law/Corporate+Responsibility+For+Human+Traffickin g+Five+Steps+That+Your+Company+Can+Take+Right+Now. Biron, C. L. (2014, January 03). U.S.: Hospitality, industrial farming at risk for human trafficking. Global Information Network. Retrieved from http://search.proquest.com/docview/1474382911?accountid=828 9. Farrell, A, McDevitt, J, and Fahy, S. (2010). Where are all the victims? Understanding the determinants of official identification of human trafficking incidents. Criminology & Public Policy 9(2), 201-233. Fields, S. (2013). Combating human trafficking: Engaging the private sector. Retrieved from http://www.stimson.org/spotlight/combating-human-trafficking- engaging-the-private-sector/. Forced Labor. (2010, September 8). The New York Times, p.26. Retrieved from http://www.lexisnexis.com.ezproxy1.apus.edu/lnacui2api/api/ve rsion1/getDocCui?lni=50YT-GV11-DXY4- X0NF&csi=6742&hl=t&hv=t&hnsd=f&hns=t&hgn=t&oc=00240 &perma=true. Grubb, D and Bennett, K. (2012). The readiness of local law enforcement to engage in U.S. anti-trafficking efforts: an assessment of human trafficking training and awareness of local, county, and state law enforcement agencies in the State of Georgia. Police Practice and Research, 13(6), 487-500. International Labour Office (2008) Combating forced labour: A handbook for employers & business. Geneva: International Labour Organization. Retrieved from http://site.ebrary.com/lib/apus/reader.action?docID=10512144.