Verified Document

Criminal Justice - Crisis Management Thesis

e. physical layout, security procedures and vulnerabilities), in most cases, a non-employee is not. In principle, many of the standard procedures in work environments with established security at access points are already effective at vetting strangers, either via requiring real-time confirmation at remote (i.e. lobby) access points or via manually activated intercoms or digital displays. However, with respect to potential violence perpetrated by family members of employees, many standard security systems are ineffective without specific personnel training addressing the risk. For example, security training for employees should address the fact that employees responsible for granting physical access to non-employees - typically, the reception staff - must remember that they are probably not going to be privy to very much information about the private lives and relationships of all of their co- workers.

Recognizing spouses of co-workers, for instance, is simply not a valid reason to grant access. At the very least, standard access protocol must require the announcement of unscheduled visitors to the employee to be notified first of the identity of any individuals seeking access by virtue of their association with them. In environments with separated greeting areas (or lobbies), visitors must not be granted building access without confirmation from the employee, regardless of how well recognized they may be to security...

Appropriate signage prohibiting exceptions to these types of security procedures may help minimize tension or impatience, in general, as well.
In the case of non-employees, to the extent security protocols are effective with respect to building access, they necessarily "funnel" the greatest likelihood of violence on the premises to the external environment immediately adjacent to the workplace itself. In many cases, violent attacks on employees by non-employee spouses, for example, occur in parking facilities or external areas such as pathways leading to secure areas from which non-employees are excluded (Larsen, 2007). Understanding this reality means that security procedures should include routine surveillance of external grounds, particularly where access is unrestricted. In all likelihood, surveillance cameras are relatively ineffective to be relied upon for this purpose; it requires foot patrols in conjunction with identification stickers issued to all vehicles authorized to enter the facility. Otherwise, secure building access points increase the chance of violence by ambush outside instead.

References

Larsen, R.J. (2007) Our Own Worst Enemy: Asking the Right Questions About Security to Protect You, Your Family, and America. New York: Grand Central Publishing

Schmalleger, F. (2001) Criminal Justice Today: An Introductory Text for the 21st Century. New Jersey: Prentice Hall

Sources used in this document:
References

Larsen, R.J. (2007) Our Own Worst Enemy: Asking the Right Questions About Security to Protect You, Your Family, and America. New York: Grand Central Publishing

Schmalleger, F. (2001) Criminal Justice Today: An Introductory Text for the 21st Century. New Jersey: Prentice Hall
Cite this Document:
Copy Bibliography Citation

Related Documents

Criminal Justice - Risk Management
Words: 892 Length: 3 Document Type: Thesis

Other specific risks to patrol officers, including those operating in pairs, include standard procedures suggested by past studies of the circumstances in which attacks on officers have occurred. For example, interviews with prisoners who assaulted officers during their arrests disclosed that many such attacks were initiated by the subject upon realization that their arrest was imminent. In many cases, it was the radio transmission alerting the officers of the subject's

Criminal Justice/Security Management Research Article. Add Article...
Words: 769 Length: 3 Document Type: Essay

criminal justice/security management research article. Add article post (hyperlink attachment). Provide a summary research (Do recopy abstract. Use words). Explain "qualitative." Be identify discuss elements research: Units Analysis Hypothesis Variables Operationalization: variables operationalized? Time dimension what conclusions made research? How conducted experiment differently? Criminal justice and security management: Article summary Dorn, N., & Levi, M. (2009). Private-public or public-private? strategic dialogue on serious crime and terrorism in the EU. Security Journal, 22(4),

Criminal Justice Management and Administration
Words: 2074 Length: 8 Document Type: Research Paper

Criminal Justice Management and Administration The objective of this work in writing is to describe the historical and theoretical development of organizational management and to list and summarize the most common positions, functions and positions in various Criminal Justice Organizations. The work of Stojkovic, Kalinich, and Klofas (2008) reports that criminal justice administration Management "has come a long way since the President's Commission in 1967 called for a closer look at the

Managing a Criminal Justice Organization
Words: 701 Length: 2 Document Type: Term Paper

This ownership of the issue will ensure that any changes that need to be implemented will not be met with resistance as well as ensuring their motivation toward the potentially changing tasks (Wagner & Gooding, 1987). A leader in this environment will need to continue to reinforce the level of achievement motivation in each employee, emphasizing department excellence and pride in job performance (Sing, 2002). Reminders about the goal of

Criminal Justice System Normally Refers to the
Words: 1488 Length: 5 Document Type: Essay

Criminal justice system normally refers to the compilation of the prevailing federal; state accompanied by the local public agencies those pacts with the crime problem. These corresponding agencies procedure suspects, defendants accompanied by the convicted offenders and are normally mutually dependent insofar as the prevailing decisions of the single agency influence other supplementary agencies (Cole & Smith, 2009). The fundamental framework of the underlying system is normally granted through the

Criminal Justice Trends the Trends of the
Words: 1924 Length: 6 Document Type: Essay

Criminal Justice Trends The trends of the past, present and future that outline the borders connecting the criminal justice system components and their links adjoining the society is, beyond doubt, an authentic relationship that the law and society have established. Criminal justice has been affected by various trends in the times gone by. This is because trends keep changing with the passage of time. Therefore, it is exceedingly important for the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now