SlideShare a Scribd company logo
Running head: RESEARCH PROPOSAL
Introduction
This paper intends to investigate the measures of enhancing
security in learning institutions. In the previous decades, most
universities and colleges have appeared much unique
environmental position in terms of security provisions. The
security provisions are mainly based significant features which
are mainly changing. The university hence can be held
accountable for individual functions it is committed as an
autonomous body concerning the rules and regulation. Public
learning institutions have a supreme equivalence of any other
government parastatals that has a duty to protect its clients and
employees
Thesis Statement
This paper seeks to discuss the current statistics which indicates
clearly that there is upsurging of numerous crimes which
happen in colleges and universities on a continuous basis. It has
been discovered that, in the year 2001, there were 11,659
robberies reported from the universities and colleges.
Additionally, there have also been 610 murders. Similarly, more
than 10,000 compulsory sexual assaults were also described in
the college campuses over this same period.
Hypothesis
Security enhancement leads to a reduction in crimes in Learning
Institutions.
The universities and schools in this country are prone to the
violence. If the plight of violence in this country is not
sufficiently addressed, it will lead to a rise in a number of the
casualties and victims of murder in the learning institutions
(Prenzler, 2012). This is considered to be evident of the
challenges that take place in Virginia Tech. Even after the
perilous and hazardous occurrence, the country ends up going to
normal business, this must not be the case.
The federal government and other stakeholders have made the
decision to take a stand and commit itself on just what it takes
to ensure there is safety in the learning institutions.
The first step is to file the bill of installing security measures in
learning institutions. Last year the report indicated that over
450 bills were filed but they have never been debated. Based on
that, it should be noted that the university and school
management do not have an obligation to be blamed with the
government on certain aspects of safety and security measures.
The second step is to involve all learning institutions
stakeholders in the decision making. This requires all teachers,
the college management, the parents, board of governors and
local communities to come up with diverse and practical
strategies to put in place so as to save the students.
The third and final step is implementation. Since it has been
noted that safe environment is basic to the success of the
institution, and it is part and parcel of the school management.
The management must execute all strategies discussed including
all the bills regarding security. The much-required quality
education hence ought to be stressed in all possible situations
with the same enthusiasm that is bestowed to different academic
issues which the students engage in.
These learning institutions, in this case, ought to endeavor to
implement the campus security practices which have been
considered to be effective in other private colleges and
campuses. In addition, it is significant that there must be a
stringent evaluation of the execution of the emergency reaction
strategies that have to be piloted, where there are numerous
crime incidences which take place (Heizer & Render, 2014).
This will assist in guaranteeing that the ongoing cycle of
mitigation, preparation, response and recovery, is adhered to
(Prenzler, 2012).
Measurement and Analysis Approach
Some of the approaches that will be applied in order to carry
out the appropriate and effective study to put in place stringent
security measures to the students include a collection of data
from the students especially those who have been victims. There
will be the use of questionnaires, where questions will be
drafted regarding insecurity incidences and what the main
causes were. The questionnaires will give feedback on the
safety or security measures that have been in place before to
curb insecurity issues and were a general impact on the lives of
the students. Finally, there will be the use of interviews. The
students will be interviewed on the matters concerning security.
The interview will be on individual basis. The victims will be
given priority in the interview because they have life
experience.
Ethical Standards
Data integrity: falsification and fabrication of research data is
misconduct. It is my role as a researcher to avoid some of the
omission and false statements that misrepresents research
record. Hence I will ensure that I report what has been observed
at the time of submission. On issue of publication I will
communicate to the scholarly world to help the readers to be
more informed of the research findings by making them
accessible in continuous manner with pertinent publication
standards. The data to be reported must be detailed to help me
duplicate the result (Herlihy &Corey, 2014).
Applicable Resources
Heizer, J. H., & Render, B. (2014). Operations Management:
Sustainability and supply chain
management. Boston: Prentice Hall
This source discusses the designing, overseeing and controlling
of the research process to effectively deliver appropriate study.
Jones, C., & Kennedy-Pipe, C. (2000). International security in
a global age: Securing the
Twenty-first century. London: F. Cass.
This source provides details regarding international security and
management of learning institutions safety measures.
Prenzler, T. (2012). Policing and security in practice:
Challenges and achievements. Houndmills, Basingstoke,
Hampshire: Palgrave Macmillan.
This source provides some guidelines and policing strategies
that can help to minimize insecurity.
Weiss, L. (2003). States in the global economy: Bringing
domestic institutions back in. Cambridge, U.K: Cambridge
University Press.
This source provides an overview of bringing institutions
together and establishing organized structure of dealing with
insecurity.
Herlihy, B., & Corey, G. (2014). ACA ethical standards
casebook. John Wiley & Sons.
This source provides ethical standards that must be applied
during and presentation of the research
3

More Related Content

Similar to Running head RESEARCH PROPOSAL IntroductionThis pap.docx

INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
AIRCC Publishing Corporation
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
ijcsit
 
JJCCJ Peer Review Report - CIS SPO Program
JJCCJ Peer Review Report - CIS SPO ProgramJJCCJ Peer Review Report - CIS SPO Program
JJCCJ Peer Review Report - CIS SPO ProgramJeff Ezell
 
Assigment # 1Discuss about a few human Bacterial and vira.docx
Assigment # 1Discuss about a few human  Bacterial and vira.docxAssigment # 1Discuss about a few human  Bacterial and vira.docx
Assigment # 1Discuss about a few human Bacterial and vira.docx
jane3dyson92312
 
Driving Age Essay. Should the driving age be raised to 21 Essay Example Topi...
Driving Age Essay. Should the driving age be raised to 21 Essay Example  Topi...Driving Age Essay. Should the driving age be raised to 21 Essay Example  Topi...
Driving Age Essay. Should the driving age be raised to 21 Essay Example Topi...
Chelsea Cote
 
Driving Age Essay.pdf
Driving Age Essay.pdfDriving Age Essay.pdf
Driving Age Essay.pdf
Evelin Santos
 
Student data privacy manifesto
Student data privacy manifestoStudent data privacy manifesto
Student data privacy manifesto
Caitlin Sharp
 
Introduction.pdf
Introduction.pdfIntroduction.pdf
Introduction.pdf
study help
 
Disciplinary Hearing Request Report
Disciplinary Hearing Request ReportDisciplinary Hearing Request Report
Disciplinary Hearing Request Report
Patty Buckley
 
2023 Semester 2 Academic Integrity.pdf
2023 Semester 2 Academic Integrity.pdf2023 Semester 2 Academic Integrity.pdf
2023 Semester 2 Academic Integrity.pdf
Martin McMorrow
 
Career And Educational Goals Research Paper
Career And Educational Goals Research PaperCareer And Educational Goals Research Paper
Career And Educational Goals Research Paper
Stacey Wilson
 
A Scale Development Study about School Safety
A Scale Development Study about School SafetyA Scale Development Study about School Safety
A Scale Development Study about School Safety
inventionjournals
 
Journal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docxJournal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docx
tawnyataylor528
 
School Safety And Security
School Safety And SecuritySchool Safety And Security
School Safety And Security
National Crime Prevention Council
 
Responsible Conduct of Research: A Framework for Research Administrators and ...
Responsible Conduct of Research: A Framework for Research Administrators and ...Responsible Conduct of Research: A Framework for Research Administrators and ...
Responsible Conduct of Research: A Framework for Research Administrators and ...
Office of Research Information Services @ the University of Washington
 
chapter 9 interprofessional practice, education, and research1. .docx
chapter 9 interprofessional practice, education, and research1. .docxchapter 9 interprofessional practice, education, and research1. .docx
chapter 9 interprofessional practice, education, and research1. .docx
christinemaritza
 
Addressing Academic Integrity In Education And Innovation
Addressing Academic Integrity In Education And InnovationAddressing Academic Integrity In Education And Innovation
Addressing Academic Integrity In Education And Innovation
Jessica Thompson
 
Guardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low ResGuardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low ResJeff Ezell
 
Terrorism awareness in kenya schools
Terrorism awareness in kenya schoolsTerrorism awareness in kenya schools
Terrorism awareness in kenya schools
Amb Steve Mbugua
 
Analysis Essay Template
Analysis Essay TemplateAnalysis Essay Template
Analysis Essay Template
Buy Cheap Essay Omaha
 

Similar to Running head RESEARCH PROPOSAL IntroductionThis pap.docx (20)

INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
JJCCJ Peer Review Report - CIS SPO Program
JJCCJ Peer Review Report - CIS SPO ProgramJJCCJ Peer Review Report - CIS SPO Program
JJCCJ Peer Review Report - CIS SPO Program
 
Assigment # 1Discuss about a few human Bacterial and vira.docx
Assigment # 1Discuss about a few human  Bacterial and vira.docxAssigment # 1Discuss about a few human  Bacterial and vira.docx
Assigment # 1Discuss about a few human Bacterial and vira.docx
 
Driving Age Essay. Should the driving age be raised to 21 Essay Example Topi...
Driving Age Essay. Should the driving age be raised to 21 Essay Example  Topi...Driving Age Essay. Should the driving age be raised to 21 Essay Example  Topi...
Driving Age Essay. Should the driving age be raised to 21 Essay Example Topi...
 
Driving Age Essay.pdf
Driving Age Essay.pdfDriving Age Essay.pdf
Driving Age Essay.pdf
 
Student data privacy manifesto
Student data privacy manifestoStudent data privacy manifesto
Student data privacy manifesto
 
Introduction.pdf
Introduction.pdfIntroduction.pdf
Introduction.pdf
 
Disciplinary Hearing Request Report
Disciplinary Hearing Request ReportDisciplinary Hearing Request Report
Disciplinary Hearing Request Report
 
2023 Semester 2 Academic Integrity.pdf
2023 Semester 2 Academic Integrity.pdf2023 Semester 2 Academic Integrity.pdf
2023 Semester 2 Academic Integrity.pdf
 
Career And Educational Goals Research Paper
Career And Educational Goals Research PaperCareer And Educational Goals Research Paper
Career And Educational Goals Research Paper
 
A Scale Development Study about School Safety
A Scale Development Study about School SafetyA Scale Development Study about School Safety
A Scale Development Study about School Safety
 
Journal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docxJournal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docx
 
School Safety And Security
School Safety And SecuritySchool Safety And Security
School Safety And Security
 
Responsible Conduct of Research: A Framework for Research Administrators and ...
Responsible Conduct of Research: A Framework for Research Administrators and ...Responsible Conduct of Research: A Framework for Research Administrators and ...
Responsible Conduct of Research: A Framework for Research Administrators and ...
 
chapter 9 interprofessional practice, education, and research1. .docx
chapter 9 interprofessional practice, education, and research1. .docxchapter 9 interprofessional practice, education, and research1. .docx
chapter 9 interprofessional practice, education, and research1. .docx
 
Addressing Academic Integrity In Education And Innovation
Addressing Academic Integrity In Education And InnovationAddressing Academic Integrity In Education And Innovation
Addressing Academic Integrity In Education And Innovation
 
Guardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low ResGuardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low Res
 
Terrorism awareness in kenya schools
Terrorism awareness in kenya schoolsTerrorism awareness in kenya schools
Terrorism awareness in kenya schools
 
Analysis Essay Template
Analysis Essay TemplateAnalysis Essay Template
Analysis Essay Template
 

More from charisellington63520

in addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxin addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docx
charisellington63520
 
In an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxIn an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docx
charisellington63520
 
In American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxIn American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docx
charisellington63520
 
In addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxIn addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docx
charisellington63520
 
In addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxIn addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docx
charisellington63520
 
In Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxIn Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docx
charisellington63520
 
In a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxIn a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docx
charisellington63520
 
In a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxIn a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docx
charisellington63520
 
In a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxIn a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docx
charisellington63520
 
In a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxIn a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docx
charisellington63520
 
In a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxIn a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docx
charisellington63520
 
In a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxIn a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docx
charisellington63520
 
In a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxIn a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docx
charisellington63520
 
In a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxIn a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docx
charisellington63520
 
In a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxIn a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docx
charisellington63520
 
In a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxIn a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docx
charisellington63520
 
In a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxIn a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docx
charisellington63520
 
In a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxIn a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docx
charisellington63520
 
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxIn a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
charisellington63520
 
In a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxIn a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docx
charisellington63520
 

More from charisellington63520 (20)

in addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxin addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docx
 
In an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxIn an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docx
 
In American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxIn American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docx
 
In addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxIn addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docx
 
In addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxIn addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docx
 
In Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxIn Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docx
 
In a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxIn a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docx
 
In a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxIn a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docx
 
In a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxIn a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docx
 
In a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxIn a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docx
 
In a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxIn a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docx
 
In a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxIn a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docx
 
In a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxIn a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docx
 
In a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxIn a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docx
 
In a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxIn a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docx
 
In a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxIn a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docx
 
In a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxIn a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docx
 
In a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxIn a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docx
 
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxIn a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
 
In a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxIn a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docx
 

Recently uploaded

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 

Recently uploaded (20)

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 

Running head RESEARCH PROPOSAL IntroductionThis pap.docx

  • 1. Running head: RESEARCH PROPOSAL Introduction This paper intends to investigate the measures of enhancing security in learning institutions. In the previous decades, most universities and colleges have appeared much unique environmental position in terms of security provisions. The security provisions are mainly based significant features which are mainly changing. The university hence can be held accountable for individual functions it is committed as an autonomous body concerning the rules and regulation. Public learning institutions have a supreme equivalence of any other government parastatals that has a duty to protect its clients and employees Thesis Statement This paper seeks to discuss the current statistics which indicates clearly that there is upsurging of numerous crimes which happen in colleges and universities on a continuous basis. It has been discovered that, in the year 2001, there were 11,659 robberies reported from the universities and colleges. Additionally, there have also been 610 murders. Similarly, more than 10,000 compulsory sexual assaults were also described in the college campuses over this same period. Hypothesis Security enhancement leads to a reduction in crimes in Learning Institutions.
  • 2. The universities and schools in this country are prone to the violence. If the plight of violence in this country is not sufficiently addressed, it will lead to a rise in a number of the casualties and victims of murder in the learning institutions (Prenzler, 2012). This is considered to be evident of the challenges that take place in Virginia Tech. Even after the perilous and hazardous occurrence, the country ends up going to normal business, this must not be the case. The federal government and other stakeholders have made the decision to take a stand and commit itself on just what it takes to ensure there is safety in the learning institutions. The first step is to file the bill of installing security measures in learning institutions. Last year the report indicated that over 450 bills were filed but they have never been debated. Based on that, it should be noted that the university and school management do not have an obligation to be blamed with the government on certain aspects of safety and security measures. The second step is to involve all learning institutions stakeholders in the decision making. This requires all teachers, the college management, the parents, board of governors and local communities to come up with diverse and practical strategies to put in place so as to save the students. The third and final step is implementation. Since it has been noted that safe environment is basic to the success of the institution, and it is part and parcel of the school management. The management must execute all strategies discussed including all the bills regarding security. The much-required quality education hence ought to be stressed in all possible situations with the same enthusiasm that is bestowed to different academic issues which the students engage in. These learning institutions, in this case, ought to endeavor to
  • 3. implement the campus security practices which have been considered to be effective in other private colleges and campuses. In addition, it is significant that there must be a stringent evaluation of the execution of the emergency reaction strategies that have to be piloted, where there are numerous crime incidences which take place (Heizer & Render, 2014). This will assist in guaranteeing that the ongoing cycle of mitigation, preparation, response and recovery, is adhered to (Prenzler, 2012). Measurement and Analysis Approach Some of the approaches that will be applied in order to carry out the appropriate and effective study to put in place stringent security measures to the students include a collection of data from the students especially those who have been victims. There will be the use of questionnaires, where questions will be drafted regarding insecurity incidences and what the main causes were. The questionnaires will give feedback on the safety or security measures that have been in place before to curb insecurity issues and were a general impact on the lives of the students. Finally, there will be the use of interviews. The students will be interviewed on the matters concerning security. The interview will be on individual basis. The victims will be given priority in the interview because they have life experience. Ethical Standards Data integrity: falsification and fabrication of research data is misconduct. It is my role as a researcher to avoid some of the omission and false statements that misrepresents research record. Hence I will ensure that I report what has been observed at the time of submission. On issue of publication I will communicate to the scholarly world to help the readers to be more informed of the research findings by making them accessible in continuous manner with pertinent publication
  • 4. standards. The data to be reported must be detailed to help me duplicate the result (Herlihy &Corey, 2014). Applicable Resources Heizer, J. H., & Render, B. (2014). Operations Management: Sustainability and supply chain management. Boston: Prentice Hall This source discusses the designing, overseeing and controlling of the research process to effectively deliver appropriate study. Jones, C., & Kennedy-Pipe, C. (2000). International security in a global age: Securing the Twenty-first century. London: F. Cass. This source provides details regarding international security and management of learning institutions safety measures. Prenzler, T. (2012). Policing and security in practice: Challenges and achievements. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. This source provides some guidelines and policing strategies that can help to minimize insecurity. Weiss, L. (2003). States in the global economy: Bringing domestic institutions back in. Cambridge, U.K: Cambridge University Press. This source provides an overview of bringing institutions together and establishing organized structure of dealing with insecurity. Herlihy, B., & Corey, G. (2014). ACA ethical standards
  • 5. casebook. John Wiley & Sons. This source provides ethical standards that must be applied during and presentation of the research 3