Verified Document

Profession Of Security Professional Security Research Paper

Security professionals should know what that kind of cooperation entails and what the possible limitations are, and really what the professional expectations are for investigative cooperation, so as to not impede or otherwise hinder active investigations. While private security as a profession has boomed in many ways, there are some key ways in which the industry still lags behind. One of these ways is accurate data collection, data presentation, and collection of other relevant statistics. This must be a modern issue that security professionals take seriously. Statistics may be dry to some, but that trait does not diminish the value or the necessity of accurate and up-to-date statistics about the industry, including demographics, tools used, success rates, rates of collaboration with other agencies, and more. With modern tools such as data visualization, it is relatively more simple to represent large quantities of data in visually appealing ways in a condensed manner. Gunter and Kidwell speak directly to the disturbing lack of stats, and indirectly express their intention for their research:

In the past four decades, a series of reports and studies have examined private security agencies and personnel. These studies helped redefine the roles of private security and documented the growth and trends in the industry as a whole. However, these studies have become outdated, and there continues to be a significant need for more detailed and timely information, especially when considering the increasing range of roles played by private security. (Gunter & Kidwell, 2004, 9)

In other words, without accurate data and thoroughly compiled data, security professionals have little idea of how effective their work is. This is hard to explain and argue to a potential client. While stats are not the most important...

Security professionals will have more job security when they have and understand relevant stats gathered from reliable and up-to-date data sources.
Professional security is not an industry that looks like it will subside or fall to the wayside any time soon. Yet in order to keep the industry booming, security professionals need superior education and training regarding the most prominent or pressing issues of the profession. Reliable data sources about the security profession and collaboration with law enforcement are two of many interesting issues of the profession that those in and those looking to enter the profession of security should be at least knowledgeable in, if not experts.

Sources used in this document:
References:

Gunter, W., & Kidwell, J. (2004). Law Enforcement and Private Security Liaison: Partnerships for Cooperation. International Foundation for Protection Officers, Web, Available from: http://www.ifpo.com/articlebank/lawprivateliaison.html. 2013 June 28.

Strom, PhD, K., Berzofsky, M., Shook-Sa, B., Barrick, PhD, K., Daye, C., Horstmann, N., & Kinsey, S. (2010). The Private Security Industry: A Review of the Definitions, Available Data Sources, and Paths Moving Forward. United States Department of Justice, the Bureau of Justice Statistics, Web, Available from: https://www.ncjrs.gov/pdffiles1/bjs/grants/232781.pdf. 2013 June 28.

The Law Enforcement-Private Security Consortium. (2009). Operation Partnership: Trends and Practices in Law Enforcement and Private Security Collaborations. United States Department of Justice, Office of Community Oriented Policing Services, Web, Available from: http://ric-zai-inc.com/Publications/cops-p169-pub.pdf. 2013 June 28.
Cite this Document:
Copy Bibliography Citation

Related Documents

Career Goals Setting Clear Career
Words: 1111 Length: 3 Document Type: Essay

My goal is to continuously work as hard and honest as I can to achieve my additional long-term goal, which is to climb the corporate ladder. Opportunities will arise where I have to prove myself and push to the next level, and I am prepared to do this. I have selected this goal because it fits my personality, my ambition, my interests, and is the career that I want

Analyzing the Career Counseling Phenomenon
Words: 4507 Length: 15 Document Type:

Career Counseling Theory statement used to review the case and the accompanying selection rationale Career development is a continuous, ongoing process throughout one's life. It is shaped by the experiences that one acquires through the interactions one encounters. These developmental experiences focus on gaining and processing information regarding the self and occupational or even educational processes (Hansen, 1976). The process allows people to understand themselves in the course of relating to the

Security Management Security Measures Risk Management
Words: 1552 Length: 5 Document Type: Essay

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is

Security and Personal Information the
Words: 638 Length: 2 Document Type: Case Study

There needs to be however more efficiency put into the process of validating just what is personal vs. professional mail, with a more insightful series of policies put in place to define acceptable use of e-mail and communications systems (Breaux, Anton, 2008). Clearly, being able to guard against personal data of employees being accessed, sold or used in any way needs to have even more stringent rules associated with it

Security Manager Leadership Analysis & Assessment of
Words: 2003 Length: 7 Document Type: Essay

Security Manager Leadership Analysis & Assessment of Main Management Skills of Security Managers The role of security managers and their progression to Chief Information Security Officers (CISO) in their careers is often delineated by a very broad base of experiences, expertise, skills and the continual development of management and leadership skills. The intent of this analysis and assessment is to define the most critically important management skills for security managers, including those

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now