SlideShare a Scribd company logo
1 of 8
Hello Dr. Aguiar and Classmates,
For this week’s forum we were asked to identify three specific
research topics and examine their viability as a capstone
project. For my three topics I decided to spread the options
across the private and public security industry.
TOPIC 1: The positive and negative effectives of the
implementation of CPTED at public schools.
For this topic, I feel it is a viable subject for security
management, primarily for the reason of how vulnerable our
nation’s schools have become. CPTED is a vital part of
deterrence, and when it pertains to schools, it is an essential
way to camouflage “protection measures.” The capstone project
would answer questions of why CPTED is necessary for a post
9-11 environment. One of the negative factors I would highlight
is how CPTED makes the learning environment less
“welcoming” or “child friendly.” For the analytical aspect, I
would use the data collected for the Department of Education
and Department of Homeland Security. In previous research that
I have done, I have found many studies that show indisputable
evidence on why public school CPTED is beneficial. For
example, CPTED improves deterrence, denies unauthorized
entry, and improves the overall emergency services response
time. Furthermore, I would compare case studies from
Columbine High School and schools that have successful
emergency responses.
SOURCES:
Vagi, K. J., Stevens, M. R., Simon, T. R., Basile, K. C., Carter,
S. P., & Carter, S. L. (2018). Crime Prevention Through
Environmental Design (CPTED) characteristics associated
with violence and safety in middle schools. Journal of school
health, 88(4), 296-305.
Wenzel, R. L. (2007). CPTED: Interpreting contemporary
security practices in the era of homeland security. The
University of Texas at Arlington.
TOPIC 2: The essential need for U.S. maritime port security and
the importance of compatibility between private/government
security functions.
After the 9-11 terrorist attacks, the United States
shifted gear into focusing on securing the port of maritime
entry. This topic would highlight the importance of vigorous
upgrades of screening, logging, and validating cargo. An
NPR.org source states that there are 15 major maritime ports
located around the United States. The economic function of the
United States relies heavily on the security of these ports, and
each port has a unique, comprehensive security plan (CSP).
Research shows the United States Coast Guard is the primary
security function within the waterways of the ports, and
contracted security operation conducts the screening of cargo.
This is a viable capstone topic because it will show how
Intrusion Detection Systems (IDS) and integrated defense
procedures detect harmful cargo entering the United States.
Furthermore, I would compare ports like the Port of Houston
versus security at the Port of Los Angeles.
SOURCES:
Bueger, C. (2015). What is maritime security?. Marine Policy,
53, 159-164.
Stockbruegger, J. (2021). US Strategy and the Rise of Private
Maritime Security. Security Studies.
Downs, B. (2007). The maritime security risk analysis model:
Applying the latest risk assessment techniques to maritime
security. Proceedings of the Marine Safety & Security
Council, 64(1).
TOPIC 3: The required need for adequate training from private
security professionals and how integrated training with law
enforcement would advance security.
The downward trend of the number of law enforcement
officers compared to the increase of emergency response
requires private security professionals to become more versed in
their skillset. This topic would outline the need for adequately
trained security professionals and why private companies hire
additional security resources. Research shows when a law
enforcement officer is well trained, the probability of a mishap
reduces drastically. Security professionals must meet the same
requirements as an LEO in order to ensure their security
function is relevant. For example, Federal Law Enforcement
Training Center (FLETC) teaches tactics and concepts vital in
being a qualified security professional/LEO. Because of the
limited amount of LEOs, security professionals are contracted
as supplement functions. The growing need for companies to
outsource protection help protects their assets. For example,
Allied Universal is the largest employed private security
organization in the United States. Allied Universal helps protect
the large corporate campus and enforces policies within their
contracts. It is paramount for private security professionals to
be trained to the same standard as a law enforcement officer.
SOURCES:
Nalla, M. K., & Crichlow, V. J. (2017). Have the standards for
private security guards become more stringent in the post
9/11 era? An assessment of security guard regulations in the
US from 1982 to 2010. Security Journal, 30(2), 523-537.
Stiernstedt, P., Button, M., Prenzler, T., & Sarre, R. (2021). The
‘three-pillars model of regulation’: a fusion of governance
models for private security. Security Journal, 34(2), 247-260.
Yu, H. H. (2018). Gender and public agency hiring: An
exploratory analysis of recruitment practices in federal
law enforcement. Public Personnel Management, 47(3), 247-
264.
The research topic I will be presenting for this class asks the
question; How important is it to protect your information and
reduce your digital footprint? This topic became a special
interest item for me over the last year. I was like most
Americans who knew that protecting your online profile was s
good thing but never understood just how deep the rabbit hole
went.
I want to ensure that this topic’s perspective is different from
Ryan’s. My focused goal is to provide a graphical
representation and timeline associated with an individual’s
personal recovery from identity theft. Based on those metrics,
the observational approach will continue with surveyed
accounts of victims that have already been published. The more
we move online each decade only provides further emphasis on
Personal Identifiable Information (PII) protection standards and
keeping your online profile outside of the Publicly Available
Information (PAI) sphere.
Topic 1: Protecting yourself.
Why is this important?
I chose this topic for a number of reasons. Primaril y this is to
inform the average citizen understands just how easy it is for
their online life to become a profile for someone to target. PII
such as social security numbers, driver’s license numbers, credit
card numbers and medical records are largely at the forefront of
personnel security, but does the average researcher understand
that even the research they are conducting for school can be
monitored/tracked? Grey literature is the term that encompasses
all of the unpublished publications that institutio ns use to
prevent plagiarism. Turnit databases are just as susceptible to
monitoring as everything else.
Topic 2: Identity theft.
Unauthorized access to online information leads to someone
seeking to masquerade as you for profit. This can be as simple
credit card fraudulent charges to destroying your credit history
or even defaulting on loans in your name. Regardless on what
type of identity theft, this could potentially take years to
recover from.
Who to turn to?
- Https://www.csis.org
- https://notified.idtheftcenter.org/s/
- https://us.norton.com/internetsecurity-how-to-ten-ways-to-
keep-your-data-private.html
Topic 3: Business data breeches & protecting your PII.
The United States has mandated your protection through federal
laws and the US Privacy Act of 1974. All businesses are
required to secure personal identifiers and document all risks
through programs such as the medical industry’s Health
Insurance Portability and Accountability Act (HIPAA),
consumer financial market’s Fair Credit Reporting Act (FCRA),
and the ongoing online regulation disputes with social media.
This regulation ensures the companies themselves strive to
protect your information or be fined by the government, but this
does not stop the motivated offenders. As on early October,
there have been 1,291 breaches with some of the major leaks
effecting millions of Americans in one breech. Compared to the
some 1,108 in 2020. What is worse is these are only the
discovered breeches.
What are some of the recent/biggest data leaks?
- Astoria Company
- Yahoo email intrusion
- Twitch.tv
Initial sources:
Arata, M. J. (2004). Preventing identity theft for dummies.
Wiley.
Collins, J. M. (2005). Preventing identity theft in your business
how to protect your business, customers, and employees (1st
edition). Wiley.
JOHN C. BAKER, BETH E. LACHMAN, DAVID R.
FRELINGER, KEVIN M. O’CONNELL, ALEXANDER C.
HOU, MICHAEL S. TSENG, DAVID ORLETSKY, &
CHARLES YOST. (2004). An Analytical Framework for
Assessing the Homeland Security Implications of Publicly
Accessible Geospatial Information. In Mapping the Risks (1st
ed., p. 93–). RAND Corporation.
https://doi.org/10.7249/mg142nga.14
Describe how security services have evolved?
Security has definitely evolved and has always been crucial for
the protection for the protection of property and land. However,
security has advanced quite a bit since lock and key, especially
taking into consideration how progressive technology has
become. For instance, RFID badges are being used for entry into
buildings for employees, enhanced video surveillance,
fingerprint scanning, IRIS recognition, facial recognition
technology, perimeter systems and that is to just name a few
(Hatchimonji, 2021).
What are the basic differences between private security and law
enforcement when it comes to an arrest?
A private security officer can make an arrest, however, it is
considered an "citizen's arrest", but they must call law
enforcement to handle the arrest or to handle the crime. Which
private security typically deals more with civil matters than
crime matters. Law enforcement on the other hand follow
several guidelines when performing an arrest and have to be
strict and sensitive to any legal ramifications.
What are several functions that fall under the umbrella of
security?
There are several functions that full under security. Physical
deterrence, such as mantraps, barriers, walls. access control
systems, surveillance cameras, etc. There can also be alarms set
to trigger certain events. Another function would be the use of
security personnel with varying responsibilities.
https://www.csoonline.com/article/2134326/the-8-most-
significant-ways-physical-security-has-evolved.html
McCrie, R. D., (2007). Security operations
management. Elsevier Science & Technology.
https://ebookcentral.proquest.com/lib/apus/reader.action?docID
=285823
Week 1 Development of Security in the United States
Q: Describe how security services have evolved?
A: Security has evolved in the past by different encounters to
all parts of the world. This week reading provided information
that explained how some of the first forms of security was the
caveman and the idea being stones in their caves and how they
acted as a security net for personal safety. Different parts of the
world have been experiencing security events for many years.
Different security events such as Pearl Harbor, 9/11, and the
Las Vegas shooting have brought implementations of how to
heighten our state of awareness to prepare with reaction to
possible future events. Training is provided yearly in all aspects
of threat probabilities with past scenario interactions. There is
never a way to really know an exact location or time of future
events, but little things are taught to see signs of what an
incident may look like before it happens.
Q: What are the basic differences between private security and
law enforcement when it comes to an arrest?
A: Private security does not have the jurisdiction to do a legal
arrest but can assist with a citizen’s arrest in certain
circumstances. Law enforcement have the ability to do all arrest
in the area that they are residing in and qualified to do so. All
states have different laws when it pertains to exact rights of the
private security as well as law enforcement officers. In Texas it
seems that arrest can be made for the city you work for but
traffic stops outside of your jurisdiction are not warranted. In
saying that, any type of felony acts or breaches of the peace can
be acted upon as a law enforcement officer. Private security
seems to have less authority but can still be a very valuable
asset to the protection of individuals or places.
Q: What are several functions that fall under the umbrella of
security?
A: Some of the functions that fall under the umbrella of
security include things like personal security, cyber security, as
well as terroristic threats and active shooters. All of these
topics are areas of concern when discussing a plan of action of
response to these types of events. In my opinion, past events
provide us with so much knowledge of how to react to these
events and we have learned from them in many different ways.
The training provided for us to learn is from information
gathered of past occurrences that we have dealt with.
Understanding how we can effectively react to these events is a
crucial step in how we can learn to plan better for security
actions.
-Josh Foster

More Related Content

What's hot

Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the InternetMaurice Dawson
 
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Maurice Dawson
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
A Cyber Security Review
A Cyber Security ReviewA Cyber Security Review
A Cyber Security ReviewSimon Moffatt
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of warMark Johnson
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet useBurkeV
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenCapitolTechU
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
 
Appreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityCiarán Mc Mahon
 

What's hot (20)

Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the Internet
 
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
CorpExecProfile
CorpExecProfileCorpExecProfile
CorpExecProfile
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
A Cyber Security Review
A Cyber Security ReviewA Cyber Security Review
A Cyber Security Review
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of war
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aiken
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
Appreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information Security
 

Similar to Hello dr. aguiar and classmates,for this week’s forum we were as

Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case StudyAngilina Jones
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Concentric rings of security can be one of the best approach metho
Concentric rings of security can be one of the best approach methoConcentric rings of security can be one of the best approach metho
Concentric rings of security can be one of the best approach methoLynellBull52
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxdebishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security PolicyRobot Mode
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?IJCNCJournal
 
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdfTwin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdfSreevalsan V.K.
 
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docxENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docxgidmanmary
 
C H A P T E R 1 4 Risk Management and Worker Protec ti.docx
C H A P T E R  1 4        Risk Management and Worker Protec ti.docxC H A P T E R  1 4        Risk Management and Worker Protec ti.docx
C H A P T E R 1 4 Risk Management and Worker Protec ti.docxRAHUL126667
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 
Read the Case Study at the end of Chapter 7. Perform the following a.docx
Read the Case Study at the end of Chapter 7. Perform the following a.docxRead the Case Study at the end of Chapter 7. Perform the following a.docx
Read the Case Study at the end of Chapter 7. Perform the following a.docxniraj57
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
Journal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docxJournal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docxtawnyataylor528
 
News letter June 11
News letter June 11News letter June 11
News letter June 11captsbtyagi
 
BCJ 4385, Workplace Security 1 Course Learning Outcom.docx
 BCJ 4385, Workplace Security 1 Course Learning Outcom.docx BCJ 4385, Workplace Security 1 Course Learning Outcom.docx
BCJ 4385, Workplace Security 1 Course Learning Outcom.docxaryan532920
 
Week 1&2 intro_ v2-upload
Week 1&2 intro_ v2-uploadWeek 1&2 intro_ v2-upload
Week 1&2 intro_ v2-uploadVinoth Sn
 

Similar to Hello dr. aguiar and classmates,for this week’s forum we were as (20)

Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case Study
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Concentric rings of security can be one of the best approach metho
Concentric rings of security can be one of the best approach methoConcentric rings of security can be one of the best approach metho
Concentric rings of security can be one of the best approach metho
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
 
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdfTwin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
 
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docxENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
 
C H A P T E R 1 4 Risk Management and Worker Protec ti.docx
C H A P T E R  1 4        Risk Management and Worker Protec ti.docxC H A P T E R  1 4        Risk Management and Worker Protec ti.docx
C H A P T E R 1 4 Risk Management and Worker Protec ti.docx
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
Read the Case Study at the end of Chapter 7. Perform the following a.docx
Read the Case Study at the end of Chapter 7. Perform the following a.docxRead the Case Study at the end of Chapter 7. Perform the following a.docx
Read the Case Study at the end of Chapter 7. Perform the following a.docx
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Journal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docxJournal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docx
 
Order 325914012
Order 325914012Order 325914012
Order 325914012
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
 
Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
 
BCJ 4385, Workplace Security 1 Course Learning Outcom.docx
 BCJ 4385, Workplace Security 1 Course Learning Outcom.docx BCJ 4385, Workplace Security 1 Course Learning Outcom.docx
BCJ 4385, Workplace Security 1 Course Learning Outcom.docx
 
Week 1&2 intro_ v2-upload
Week 1&2 intro_ v2-uploadWeek 1&2 intro_ v2-upload
Week 1&2 intro_ v2-upload
 

More from simba35

Symbols of culture are called artifacts. Artifacts are the most visi.docx
Symbols of culture are called artifacts. Artifacts are the most visi.docxSymbols of culture are called artifacts. Artifacts are the most visi.docx
Symbols of culture are called artifacts. Artifacts are the most visi.docxsimba35
 
SYLLABUS ACC423 Intermediate Financial Accounting III Copyrig.docx
SYLLABUS ACC423 Intermediate Financial Accounting III Copyrig.docxSYLLABUS ACC423 Intermediate Financial Accounting III Copyrig.docx
SYLLABUS ACC423 Intermediate Financial Accounting III Copyrig.docxsimba35
 
Synthesis Assignment Instructions and RubricSynthesis Essay..docx
Synthesis Assignment Instructions and RubricSynthesis Essay..docxSynthesis Assignment Instructions and RubricSynthesis Essay..docx
Synthesis Assignment Instructions and RubricSynthesis Essay..docxsimba35
 
Sustainable Development Project OutlineFor the first step in the D.docx
Sustainable Development Project OutlineFor the first step in the D.docxSustainable Development Project OutlineFor the first step in the D.docx
Sustainable Development Project OutlineFor the first step in the D.docxsimba35
 
Sustainable Development Project Rough Draft After the outline, s.docx
Sustainable Development Project Rough Draft After the outline, s.docxSustainable Development Project Rough Draft After the outline, s.docx
Sustainable Development Project Rough Draft After the outline, s.docxsimba35
 
Suppose you work as a human resource (HR) executive at Total Solutio.docx
Suppose you work as a human resource (HR) executive at Total Solutio.docxSuppose you work as a human resource (HR) executive at Total Solutio.docx
Suppose you work as a human resource (HR) executive at Total Solutio.docxsimba35
 
Supreme Court Responsiveness to Public Opinion    Please respond.docx
Supreme Court Responsiveness to Public Opinion    Please respond.docxSupreme Court Responsiveness to Public Opinion    Please respond.docx
Supreme Court Responsiveness to Public Opinion    Please respond.docxsimba35
 
Suppose we have an EOQ model as follows[1]  weekly demand = 100.docx
Suppose we have an EOQ model as follows[1]  weekly demand = 100.docxSuppose we have an EOQ model as follows[1]  weekly demand = 100.docx
Suppose we have an EOQ model as follows[1]  weekly demand = 100.docxsimba35
 
Suppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docxSuppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docxsimba35
 
Suppose the Cincinnati Reds increased the price of their tickets and.docx
Suppose the Cincinnati Reds increased the price of their tickets and.docxSuppose the Cincinnati Reds increased the price of their tickets and.docx
Suppose the Cincinnati Reds increased the price of their tickets and.docxsimba35
 
Suppose that there are two (2) candidates (i.e., Jones and Johns.docx
Suppose that there are two (2) candidates (i.e., Jones and Johns.docxSuppose that there are two (2) candidates (i.e., Jones and Johns.docx
Suppose that there are two (2) candidates (i.e., Jones and Johns.docxsimba35
 
Suppose that the reserve ratio is .25, and that a bank has actual re.docx
Suppose that the reserve ratio is .25, and that a bank has actual re.docxSuppose that the reserve ratio is .25, and that a bank has actual re.docx
Suppose that the reserve ratio is .25, and that a bank has actual re.docxsimba35
 
Supply side Options Quiz #4Requirements Arial 11’ 720 word .docx
Supply side Options Quiz #4Requirements Arial 11’ 720 word .docxSupply side Options Quiz #4Requirements Arial 11’ 720 word .docx
Supply side Options Quiz #4Requirements Arial 11’ 720 word .docxsimba35
 
Suppose a zoo wants a C++ program to keep track of its animals and t.docx
Suppose a zoo wants a C++ program to keep track of its animals and t.docxSuppose a zoo wants a C++ program to keep track of its animals and t.docx
Suppose a zoo wants a C++ program to keep track of its animals and t.docxsimba35
 
Support your statements with examples and scholarly references. Reme.docx
Support your statements with examples and scholarly references. Reme.docxSupport your statements with examples and scholarly references. Reme.docx
Support your statements with examples and scholarly references. Reme.docxsimba35
 
Summer 2014 PHIL 1171 Ethics Final Essay Questions 1 Part One Ess.docx
Summer 2014 PHIL 1171 Ethics Final Essay Questions 1 Part One Ess.docxSummer 2014 PHIL 1171 Ethics Final Essay Questions 1 Part One Ess.docx
Summer 2014 PHIL 1171 Ethics Final Essay Questions 1 Part One Ess.docxsimba35
 
Supply Chain.   The term  is used rather freely these days, but wh.docx
Supply Chain.   The term  is used rather freely these days, but wh.docxSupply Chain.   The term  is used rather freely these days, but wh.docx
Supply Chain.   The term  is used rather freely these days, but wh.docxsimba35
 
SummaryIn your first paper, you will provide the pros and cons of .docx
SummaryIn your first paper, you will provide the pros and cons of .docxSummaryIn your first paper, you will provide the pros and cons of .docx
SummaryIn your first paper, you will provide the pros and cons of .docxsimba35
 
Supported by the readings from Modules 10 and 11 (attached), and a.docx
Supported by the readings from Modules 10 and 11 (attached), and a.docxSupported by the readings from Modules 10 and 11 (attached), and a.docx
Supported by the readings from Modules 10 and 11 (attached), and a.docxsimba35
 
Summarize your financial situation and plans. Be sure to include pla.docx
Summarize your financial situation and plans. Be sure to include pla.docxSummarize your financial situation and plans. Be sure to include pla.docx
Summarize your financial situation and plans. Be sure to include pla.docxsimba35
 

More from simba35 (20)

Symbols of culture are called artifacts. Artifacts are the most visi.docx
Symbols of culture are called artifacts. Artifacts are the most visi.docxSymbols of culture are called artifacts. Artifacts are the most visi.docx
Symbols of culture are called artifacts. Artifacts are the most visi.docx
 
SYLLABUS ACC423 Intermediate Financial Accounting III Copyrig.docx
SYLLABUS ACC423 Intermediate Financial Accounting III Copyrig.docxSYLLABUS ACC423 Intermediate Financial Accounting III Copyrig.docx
SYLLABUS ACC423 Intermediate Financial Accounting III Copyrig.docx
 
Synthesis Assignment Instructions and RubricSynthesis Essay..docx
Synthesis Assignment Instructions and RubricSynthesis Essay..docxSynthesis Assignment Instructions and RubricSynthesis Essay..docx
Synthesis Assignment Instructions and RubricSynthesis Essay..docx
 
Sustainable Development Project OutlineFor the first step in the D.docx
Sustainable Development Project OutlineFor the first step in the D.docxSustainable Development Project OutlineFor the first step in the D.docx
Sustainable Development Project OutlineFor the first step in the D.docx
 
Sustainable Development Project Rough Draft After the outline, s.docx
Sustainable Development Project Rough Draft After the outline, s.docxSustainable Development Project Rough Draft After the outline, s.docx
Sustainable Development Project Rough Draft After the outline, s.docx
 
Suppose you work as a human resource (HR) executive at Total Solutio.docx
Suppose you work as a human resource (HR) executive at Total Solutio.docxSuppose you work as a human resource (HR) executive at Total Solutio.docx
Suppose you work as a human resource (HR) executive at Total Solutio.docx
 
Supreme Court Responsiveness to Public Opinion    Please respond.docx
Supreme Court Responsiveness to Public Opinion    Please respond.docxSupreme Court Responsiveness to Public Opinion    Please respond.docx
Supreme Court Responsiveness to Public Opinion    Please respond.docx
 
Suppose we have an EOQ model as follows[1]  weekly demand = 100.docx
Suppose we have an EOQ model as follows[1]  weekly demand = 100.docxSuppose we have an EOQ model as follows[1]  weekly demand = 100.docx
Suppose we have an EOQ model as follows[1]  weekly demand = 100.docx
 
Suppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docxSuppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docx
 
Suppose the Cincinnati Reds increased the price of their tickets and.docx
Suppose the Cincinnati Reds increased the price of their tickets and.docxSuppose the Cincinnati Reds increased the price of their tickets and.docx
Suppose the Cincinnati Reds increased the price of their tickets and.docx
 
Suppose that there are two (2) candidates (i.e., Jones and Johns.docx
Suppose that there are two (2) candidates (i.e., Jones and Johns.docxSuppose that there are two (2) candidates (i.e., Jones and Johns.docx
Suppose that there are two (2) candidates (i.e., Jones and Johns.docx
 
Suppose that the reserve ratio is .25, and that a bank has actual re.docx
Suppose that the reserve ratio is .25, and that a bank has actual re.docxSuppose that the reserve ratio is .25, and that a bank has actual re.docx
Suppose that the reserve ratio is .25, and that a bank has actual re.docx
 
Supply side Options Quiz #4Requirements Arial 11’ 720 word .docx
Supply side Options Quiz #4Requirements Arial 11’ 720 word .docxSupply side Options Quiz #4Requirements Arial 11’ 720 word .docx
Supply side Options Quiz #4Requirements Arial 11’ 720 word .docx
 
Suppose a zoo wants a C++ program to keep track of its animals and t.docx
Suppose a zoo wants a C++ program to keep track of its animals and t.docxSuppose a zoo wants a C++ program to keep track of its animals and t.docx
Suppose a zoo wants a C++ program to keep track of its animals and t.docx
 
Support your statements with examples and scholarly references. Reme.docx
Support your statements with examples and scholarly references. Reme.docxSupport your statements with examples and scholarly references. Reme.docx
Support your statements with examples and scholarly references. Reme.docx
 
Summer 2014 PHIL 1171 Ethics Final Essay Questions 1 Part One Ess.docx
Summer 2014 PHIL 1171 Ethics Final Essay Questions 1 Part One Ess.docxSummer 2014 PHIL 1171 Ethics Final Essay Questions 1 Part One Ess.docx
Summer 2014 PHIL 1171 Ethics Final Essay Questions 1 Part One Ess.docx
 
Supply Chain.   The term  is used rather freely these days, but wh.docx
Supply Chain.   The term  is used rather freely these days, but wh.docxSupply Chain.   The term  is used rather freely these days, but wh.docx
Supply Chain.   The term  is used rather freely these days, but wh.docx
 
SummaryIn your first paper, you will provide the pros and cons of .docx
SummaryIn your first paper, you will provide the pros and cons of .docxSummaryIn your first paper, you will provide the pros and cons of .docx
SummaryIn your first paper, you will provide the pros and cons of .docx
 
Supported by the readings from Modules 10 and 11 (attached), and a.docx
Supported by the readings from Modules 10 and 11 (attached), and a.docxSupported by the readings from Modules 10 and 11 (attached), and a.docx
Supported by the readings from Modules 10 and 11 (attached), and a.docx
 
Summarize your financial situation and plans. Be sure to include pla.docx
Summarize your financial situation and plans. Be sure to include pla.docxSummarize your financial situation and plans. Be sure to include pla.docx
Summarize your financial situation and plans. Be sure to include pla.docx
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Hello dr. aguiar and classmates,for this week’s forum we were as

  • 1. Hello Dr. Aguiar and Classmates, For this week’s forum we were asked to identify three specific research topics and examine their viability as a capstone project. For my three topics I decided to spread the options across the private and public security industry. TOPIC 1: The positive and negative effectives of the implementation of CPTED at public schools. For this topic, I feel it is a viable subject for security management, primarily for the reason of how vulnerable our nation’s schools have become. CPTED is a vital part of deterrence, and when it pertains to schools, it is an essential way to camouflage “protection measures.” The capstone project would answer questions of why CPTED is necessary for a post 9-11 environment. One of the negative factors I would highlight is how CPTED makes the learning environment less “welcoming” or “child friendly.” For the analytical aspect, I would use the data collected for the Department of Education and Department of Homeland Security. In previous research that I have done, I have found many studies that show indisputable evidence on why public school CPTED is beneficial. For example, CPTED improves deterrence, denies unauthorized entry, and improves the overall emergency services response time. Furthermore, I would compare case studies from Columbine High School and schools that have successful emergency responses. SOURCES: Vagi, K. J., Stevens, M. R., Simon, T. R., Basile, K. C., Carter, S. P., & Carter, S. L. (2018). Crime Prevention Through Environmental Design (CPTED) characteristics associated with violence and safety in middle schools. Journal of school health, 88(4), 296-305. Wenzel, R. L. (2007). CPTED: Interpreting contemporary security practices in the era of homeland security. The University of Texas at Arlington.
  • 2. TOPIC 2: The essential need for U.S. maritime port security and the importance of compatibility between private/government security functions. After the 9-11 terrorist attacks, the United States shifted gear into focusing on securing the port of maritime entry. This topic would highlight the importance of vigorous upgrades of screening, logging, and validating cargo. An NPR.org source states that there are 15 major maritime ports located around the United States. The economic function of the United States relies heavily on the security of these ports, and each port has a unique, comprehensive security plan (CSP). Research shows the United States Coast Guard is the primary security function within the waterways of the ports, and contracted security operation conducts the screening of cargo. This is a viable capstone topic because it will show how Intrusion Detection Systems (IDS) and integrated defense procedures detect harmful cargo entering the United States. Furthermore, I would compare ports like the Port of Houston versus security at the Port of Los Angeles. SOURCES: Bueger, C. (2015). What is maritime security?. Marine Policy, 53, 159-164. Stockbruegger, J. (2021). US Strategy and the Rise of Private Maritime Security. Security Studies. Downs, B. (2007). The maritime security risk analysis model: Applying the latest risk assessment techniques to maritime security. Proceedings of the Marine Safety & Security Council, 64(1). TOPIC 3: The required need for adequate training from private security professionals and how integrated training with law enforcement would advance security. The downward trend of the number of law enforcement officers compared to the increase of emergency response requires private security professionals to become more versed in their skillset. This topic would outline the need for adequately trained security professionals and why private companies hire
  • 3. additional security resources. Research shows when a law enforcement officer is well trained, the probability of a mishap reduces drastically. Security professionals must meet the same requirements as an LEO in order to ensure their security function is relevant. For example, Federal Law Enforcement Training Center (FLETC) teaches tactics and concepts vital in being a qualified security professional/LEO. Because of the limited amount of LEOs, security professionals are contracted as supplement functions. The growing need for companies to outsource protection help protects their assets. For example, Allied Universal is the largest employed private security organization in the United States. Allied Universal helps protect the large corporate campus and enforces policies within their contracts. It is paramount for private security professionals to be trained to the same standard as a law enforcement officer. SOURCES: Nalla, M. K., & Crichlow, V. J. (2017). Have the standards for private security guards become more stringent in the post 9/11 era? An assessment of security guard regulations in the US from 1982 to 2010. Security Journal, 30(2), 523-537. Stiernstedt, P., Button, M., Prenzler, T., & Sarre, R. (2021). The ‘three-pillars model of regulation’: a fusion of governance models for private security. Security Journal, 34(2), 247-260. Yu, H. H. (2018). Gender and public agency hiring: An exploratory analysis of recruitment practices in federal law enforcement. Public Personnel Management, 47(3), 247- 264. The research topic I will be presenting for this class asks the question; How important is it to protect your information and reduce your digital footprint? This topic became a special interest item for me over the last year. I was like most Americans who knew that protecting your online profile was s good thing but never understood just how deep the rabbit hole went.
  • 4. I want to ensure that this topic’s perspective is different from Ryan’s. My focused goal is to provide a graphical representation and timeline associated with an individual’s personal recovery from identity theft. Based on those metrics, the observational approach will continue with surveyed accounts of victims that have already been published. The more we move online each decade only provides further emphasis on Personal Identifiable Information (PII) protection standards and keeping your online profile outside of the Publicly Available Information (PAI) sphere. Topic 1: Protecting yourself. Why is this important? I chose this topic for a number of reasons. Primaril y this is to inform the average citizen understands just how easy it is for their online life to become a profile for someone to target. PII such as social security numbers, driver’s license numbers, credit card numbers and medical records are largely at the forefront of personnel security, but does the average researcher understand that even the research they are conducting for school can be monitored/tracked? Grey literature is the term that encompasses all of the unpublished publications that institutio ns use to prevent plagiarism. Turnit databases are just as susceptible to monitoring as everything else. Topic 2: Identity theft. Unauthorized access to online information leads to someone seeking to masquerade as you for profit. This can be as simple credit card fraudulent charges to destroying your credit history or even defaulting on loans in your name. Regardless on what type of identity theft, this could potentially take years to recover from. Who to turn to? - Https://www.csis.org - https://notified.idtheftcenter.org/s/ - https://us.norton.com/internetsecurity-how-to-ten-ways-to- keep-your-data-private.html Topic 3: Business data breeches & protecting your PII.
  • 5. The United States has mandated your protection through federal laws and the US Privacy Act of 1974. All businesses are required to secure personal identifiers and document all risks through programs such as the medical industry’s Health Insurance Portability and Accountability Act (HIPAA), consumer financial market’s Fair Credit Reporting Act (FCRA), and the ongoing online regulation disputes with social media. This regulation ensures the companies themselves strive to protect your information or be fined by the government, but this does not stop the motivated offenders. As on early October, there have been 1,291 breaches with some of the major leaks effecting millions of Americans in one breech. Compared to the some 1,108 in 2020. What is worse is these are only the discovered breeches. What are some of the recent/biggest data leaks? - Astoria Company - Yahoo email intrusion - Twitch.tv Initial sources: Arata, M. J. (2004). Preventing identity theft for dummies. Wiley. Collins, J. M. (2005). Preventing identity theft in your business how to protect your business, customers, and employees (1st edition). Wiley. JOHN C. BAKER, BETH E. LACHMAN, DAVID R. FRELINGER, KEVIN M. O’CONNELL, ALEXANDER C. HOU, MICHAEL S. TSENG, DAVID ORLETSKY, & CHARLES YOST. (2004). An Analytical Framework for Assessing the Homeland Security Implications of Publicly Accessible Geospatial Information. In Mapping the Risks (1st ed., p. 93–). RAND Corporation. https://doi.org/10.7249/mg142nga.14 Describe how security services have evolved? Security has definitely evolved and has always been crucial for
  • 6. the protection for the protection of property and land. However, security has advanced quite a bit since lock and key, especially taking into consideration how progressive technology has become. For instance, RFID badges are being used for entry into buildings for employees, enhanced video surveillance, fingerprint scanning, IRIS recognition, facial recognition technology, perimeter systems and that is to just name a few (Hatchimonji, 2021). What are the basic differences between private security and law enforcement when it comes to an arrest? A private security officer can make an arrest, however, it is considered an "citizen's arrest", but they must call law enforcement to handle the arrest or to handle the crime. Which private security typically deals more with civil matters than crime matters. Law enforcement on the other hand follow several guidelines when performing an arrest and have to be strict and sensitive to any legal ramifications. What are several functions that fall under the umbrella of security? There are several functions that full under security. Physical deterrence, such as mantraps, barriers, walls. access control systems, surveillance cameras, etc. There can also be alarms set to trigger certain events. Another function would be the use of security personnel with varying responsibilities. https://www.csoonline.com/article/2134326/the-8-most- significant-ways-physical-security-has-evolved.html McCrie, R. D., (2007). Security operations management. Elsevier Science & Technology. https://ebookcentral.proquest.com/lib/apus/reader.action?docID =285823 Week 1 Development of Security in the United States Q: Describe how security services have evolved? A: Security has evolved in the past by different encounters to all parts of the world. This week reading provided information
  • 7. that explained how some of the first forms of security was the caveman and the idea being stones in their caves and how they acted as a security net for personal safety. Different parts of the world have been experiencing security events for many years. Different security events such as Pearl Harbor, 9/11, and the Las Vegas shooting have brought implementations of how to heighten our state of awareness to prepare with reaction to possible future events. Training is provided yearly in all aspects of threat probabilities with past scenario interactions. There is never a way to really know an exact location or time of future events, but little things are taught to see signs of what an incident may look like before it happens. Q: What are the basic differences between private security and law enforcement when it comes to an arrest? A: Private security does not have the jurisdiction to do a legal arrest but can assist with a citizen’s arrest in certain circumstances. Law enforcement have the ability to do all arrest in the area that they are residing in and qualified to do so. All states have different laws when it pertains to exact rights of the private security as well as law enforcement officers. In Texas it seems that arrest can be made for the city you work for but traffic stops outside of your jurisdiction are not warranted. In saying that, any type of felony acts or breaches of the peace can be acted upon as a law enforcement officer. Private security seems to have less authority but can still be a very valuable asset to the protection of individuals or places. Q: What are several functions that fall under the umbrella of security? A: Some of the functions that fall under the umbrella of security include things like personal security, cyber security, as well as terroristic threats and active shooters. All of these topics are areas of concern when discussing a plan of action of response to these types of events. In my opinion, past events provide us with so much knowledge of how to react to these events and we have learned from them in many different ways. The training provided for us to learn is from information
  • 8. gathered of past occurrences that we have dealt with. Understanding how we can effectively react to these events is a crucial step in how we can learn to plan better for security actions. -Josh Foster