Fill in Order Details

  • Submit paper details for free using our simple order form

Make Payment Securely

  • Add funds to your account. There are no upfront payments. The writer will only be paid once you have approved your paper

Writing Process

  • The best qualified expert writer is assigned to work on your order
  • Your paper is written to standard and delivered as per your instructions

Download your paper

  • Download the completed paper from your online account or your email
  • You can request a plagiarism and quality report along with your paper

Seminar in Security Management

Seminar in Security Management (10 pages, 10 references)
Instructions:
Each question is worth 20 points. This exam is worth 25% of the final grade.
1. Each answer should be a minimum of 2 pages, double – spaced with one-inch margins. State your assumptions. Please do not repeat the question as a part of your answer; it’s not necessary.
2. Draw your answers from course readings, session notes (lectures), discussions, exercises and your personal insights. Students may use any academic resource and industry resources, so long as they are properly cited and referenced.
Question 1.
What elements would you include in providing a layered security system for a three-building corporate campus that includes a five-story building housing, which is the headquarters office for a major pharmaceutical company in the following scenario? (HINT – start by identifying what you believe are the critical assets and their locations and work from there . . .) (Assume that there have been “Moderate” threat’s made against this company – however not too specific- employees are worried, and executives somewhat cautious in their daily activities.) There have been major protests in and around the facility, however only a few arrests have been made.
The campus is located adjacent to a river that flows into Chesapeake Bay and sits on ground 8 feet above sea level. The building is in a suburban location, sited on approximately five acres adjacent to an interstate highway ramp. Parking is included within the campus boundary and approximately 750 employees are present daily, plus approximately 50 visitors. The loading docks can be accessed from the parking lot via side roads.
Building 1 contains the headquarters offices and is where all of the company’s executives work; all field administrative operations (human resources etc.) are coordinated from this building. Building 2 is where sensitive research is conducted (scientist, and research) and computer – information technology is coordinated. Building 3 has what may be considered as the overflow operations for the company; sensitive training (laboratories), conference rooms and storage. The computer room is in the basement of Building 2 essentially to provide a cool operating environment. The storage facilities hold equipment and supplies used to maintain the grounds.
See the map below for the company. Light poles are indicated by the “+” symbol.
Question 2.
Your security firm is hired to provide recommendations for crime prevention for a renovated three four story 50-year-old brick apartment buildings located in Detroit, Michigan. Each building has twenty apartments priced in the upper-middle class range. There is a fairly large overflow parking lot exposed to the city streets. Each apartment is afforded one parking slot in a garage under the building.
This apartment complex is part of a project to renovate the near downtown area and it is placed in an area where there is significant amount of crime about a quarter mile away. The adjacent streets have old businesses, some empty buildings, liquor store, a couple of bars and a popular corner café.
There will be a green landscaped buffer area that extends fifty yards all around the apartment complex to a new sidewalk; an exact landscape plan has not been furnished until you provide your ideas.
However, there are several large old oak trees and mature purple and white flowered lilac shrubbery that has been preserved on the campus kept from a portion of an old inner city park.
In your security plan what would you recommend in terms of crime prevention and target hardening security measures for this new residence complex?
1. Explain the security measures recommended in terms of critical assets considering likely threats, vulnerabilities, risks and crime theories.
2. Consider also what must be done prior to any recommendations being made.
3. Note your opinions, and what options may be available for the client to consider. E. What are your recommendations?
4. Describe an appropriate security and risk assessment for this scenario.
Question 3.
As a security consultant you are asked to review a recent armed robbery and rape case that happened on State University, USA, associated with the athletic complex. The crime happened at night when Doris Franklin finished her late work out for the gymnastic team. She showered and dressed and ready to leave she noticed the last evening bus left at 10 PM. She just missed it.
The janitor told her she would have to leave the building because he had to lock up the complex. She told him the bus had left and she did not want to walk back to the dorm in the dark and asked if she could call the campus police? He agreed and even stayed with her while she made a call to the campus police.
She called the campus police and asked for an escort. The campus police said they could have a campus security officer come by in about 20 minutes if she could wait. She agreed.

She told the janitor and he had her leave the building and wait immediately in front.
After 30 minutes Doris got tired of waiting so she started to walk back in the direction of the dorm when a car approached her, two males brandished a weapon, at gunpoint forced her into the car, stole her purse and she was later raped twice at another location. Fortunately, she was not killed, during the incident and was left severely hurt on the roadside.
The security officer showed up 35 minutes after the call and could not find her. He had stopped for a coffee at McDonald’s before coming. He left the athletic building never calling in the fact she had not been escorted. The procedure is that security must always report the outcome of escort service in terms of person, time of pick up, when the person was safely delivered to their dorm and mileage.
The campus police and security said they are not responsible since Doris chose to leave and not wait for the escort. The security officer was somewhat delayed arriving, however, he picked up his coffee at a drive-through window and had already missed his break since they were short a security officer.
What are the premise liability issues in this case? As a security consultant, what are your findings?
Question 4:
You are a newly appointed administrator of a large public school district that has been experiencing high crime rates among the student population, both on and around campus buildings and facilities. Thefts of property, vandalism and assaults are reported on a daily basis.
The local PTA is upset that the school district has not addressed these problems adequately in the past, and now it appears that these longstanding problems are out of control.
Recently, two students were shot in the hallway of the local high school during an altercation between two rival groups of gang members. Some students have reported observing drug transactions occurring in the bathrooms and in the parking lots, before, during, and after school hours.
Your job is to develop a short-term and long-term strategy to effectively deal with these problems. As with most public agencies, your school system is operating on a very limited budget, so you must choose your interventions wisely.
Assume that there are no programs in place to effectively deal with these problems, but the PTA wants answers now! According to the evidence, which programs work, and which programs do not appear to work? Which ones would you consider using?
Consider the pros and cons of whatever program/procedure you suggest or implement.

Question 5:
You are the appointed leader/supervisor of a group representing the office of a newly appointed Chief of Police for a large city experiencing high crime rates, which have been directly associated with gun violence on the street. (All of you are considered by the public as being police executives, and are equally responsible for the powers of the Chief of Police.) Street-level violence within the community has existed for years but the numbers of reported robberies, burglaries, murders, assaults, and theft have become increasingly prevalent in more recent times.
The mayor’s office and various members of the community are demanding “answers” because you were hired to help reduce these types of crimes based on your expertise in the policy-making process.
In order to make a difference in overall crime rates, you must address all serious issues relating to crime and its prevention. You have to address the crime problems mentioned above, but what does the research tell you?
Your job is to develop a short-term and long-term strategy to effectively deal with these problems. As with most localities, the various agencies working within your jurisdiction are operating under tight budgets, so you must choose your interventions wisely. Assume there are no programs in place to deal with the challenges that you are now facing. (You may want to consider what security tools you should, or may what to use in your evaluation.)
Assignment # 1: Vulnerability Assessment (5 pages, 5 references) – Course Objectives # 2 – 4
Develop and complete a vulnerability assessment tool to be used to conduct a survey of a home, business, faith institution or other physical facility of your choice.
The paper should include:
1) Cover page with student’s name, course title and number, and date submitted.
2) Body of paper:
1. Introduction that provides the purpose of the paper;
2. Discussion of the site selection and the rationale for the site selected;
3. Components of the vulnerability assessment; and
4. Suggestions and recommendations of security counter-measures to mitigate and reduce the risk of identified vulnerabilities to an acceptable level.
3) Reference list.
4) Appendix that provides a copy of the vulnerability assessment tool that you assembled and used for the project.
All papers should be submitted to the assignment folder and adhere to APA guidelines. It should be a minimum of five (5) to ten (10) computer-generated, double-spaced pages and use a 12-point font. Margins are to be 1 inch (top, bottom, right, and left). This does NOT include the vulnerability assessment tool that will be added as an appendix.
Assignment #2: Risk Assessment Tool (5 pages, 5 references) – Course Objectives # 1 – 5
Develop a risk assessment tool to be used to conduct a survey of a home, business, faith institution, or other physical facility of your choice.
The paper should include:
1) Cover page with name, course title and number, and date submitted.
2) Body of paper:
1. Introduction that provides the purpose of the paper;
2. Discussion of the site selection and the rationale for the site selected; and
3. Components of the risk assessment tool.
3) Reference List.
4) Appendix that provides a copy of the risk assessment tool that you assembled and used for the project.
All papers should be submitted to the assignment folder and adhere to APA guidelines. It should be a minimum of five (5) to ten (10) computer-generated, double-spaced pages and use a 12-point font. Margins are to be 1 inch (top, bottom, right, and left). This does NOT include the risk assessment tool that will be added as an appendix.
Assignment #3 Shared Security Issue/Topic Paper (5 pages, 5 references) – Objectives #1 – 12
Write a paper on one of the following topics while following the below instructions. Select one of the over twenty (20) topics below and research no less than three (3) academic articles (preferably five (5)), regarding the selected topic. The articles should be academic or professional articles of substance. Use of newspaper articles and other such secondary sources should be avoided.
If you have another security issue, or topic that is of special interest to you, please request permission from the instructor about your proposal.
As a general outline, the paper should address all of the following items:
1) Introduce the importance of the security topic. This should include your reasons for selecting the topic. Provide a clear purpose statement.
2) What is the different authors’ perspectives, evidence, or claims regarding the topic?
3) Compare and contrast the articles. Where do they agree, or do NOT agree? If there is some uncertainty, please state the reasons why while discussing any implications.
4) How does your analysis align with what we have learned thus far in the course?
As a final step, include a one page summary of your papers in the discussion area and explain your topic by sharing your perspective, critical analysis, and opinions. Provide sufficient logical reasoning and data to support your position. .
All papers should adhere to APA guidelines. Papers should be a minimum of five (5) to ten (10) double-spaced pages and use a 12-point font. Margins are to be 1 inch (top, bottom, right, and left).

List of Topics:
• Home Protection, What You Should Know
• Preventing and Responding to Workplace Violence
• Preventing and Responding to Insider Threats.
• Security Alarm Systems, (or subtopic and issues like the Problem of False Alarms).
• The Role of Security in Relation to National Disasters (i.e. Katrina).
• Private Security and the Use of Force.
• Selecting and Training Qualified Security Personnel.
• Information Protection.
• Professionalizing Security, Dream, or Reality?
• Current Security Liability Issues (You can choose one, or cover several Court case reviews are a good source of information).
• Raising Security Awareness, Can it make a Difference?
• Security Licensing.
• Bomb Threat and Hazardous Material Response.
• Effective Policies, Procedures and Practices for Handling Disgruntled Employees, (and/or Customers).
• Effective Control Access Technologies.
• Surveillance Technologies.
• Security and Police Relations.
• CPTED (Crime Prevention through Environmental Design), when does it, or doesn’t work?
• The Threat Terrorism and Role of Security.
• Private Security and Customer Relations.
• Using Crime Analysis to Improve Security.
• Sex Offender Programs (maps indicating community location) and Alerts, how, and do they work?
• Security topic/issue of your choice submitted for approval.

WHAT OUR CURRENT CUSTOMERS SAY

  • Google
  • Sitejabber
  • Trustpilot
Zahraa S
Zahraa S
Absolutely spot on. I have had the best experience with Elite Academic Research and all my work have scored highly. Thank you for your professionalism and using expert writers with vast and outstanding knowledge in their fields. I highly recommend any day and time.
Stuart L
Stuart L
Thanks for keeping me sane for getting everything out of the way, I’ve been stuck working more than full time and balancing the rest but I’m glad you’ve been ensuring my school work is taken care of. I'll recommend Elite Academic Research to anyone who seeks quality academic help, thank you so much!
Mindi D
Mindi D
Brilliant writers and awesome support team. You can tell by the depth of research and the quality of work delivered that the writers care deeply about delivering that perfect grade.
Samuel Y
Samuel Y
I really appreciate the work all your amazing writers do to ensure that my papers are always delivered on time and always of the highest quality. I was at a crossroads last semester and I almost dropped out of school because of the many issues that were bombarding but I am glad a friend referred me to you guys. You came up big for me and continue to do so. I just wish I knew about your services earlier.
Cindy L
Cindy L
You can't fault the paper quality and speed of delivery. I have been using these guys for the past 3 years and I not even once have they ever failed me. They deliver properly researched papers way ahead of time. Each time I think I have had the best their professional writers surprise me with even better quality work. Elite Academic Research is a true Gem among essay writing companies.
Got an A and plagiarism percent was less than 10%! Thanks!

ORDER NOW

CategoriesUncategorized

Consider Your Assignments Done

“All my friends and I are getting help from eliteacademicresearch. It’s every college student’s best kept secret!”

Jermaine Byrant
BSN

“I was apprehensive at first. But I must say it was a great experience and well worth the price. I got an A!”

Nicole Johnson
Finance & Economics

Our Top Experts

See Why Our Clients Hire Us Again And Again!


OVER

10.3k
Reviews

RATING
4.89/5
Average

YEARS
13
Mastery

Success Guarantee

When you order form the best, some of your greatest problems as a student are solved!

Reliable

Professional

Affordable

Quick

Using this writing service is legal and is not prohibited by any law, university or college policies. Services of Elite Academic Research are provided for research and study purposes only with the intent to help students improve their writing and academic experience. We do not condone or encourage cheating, academic dishonesty, or any form of plagiarism. Our original, plagiarism-free, zero-AI expert samples should only be used as references. It is your responsibility to cite any outside sources appropriately. This service will be useful for students looking for quick, reliable, and efficient online class-help on a variety of topics.