StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Introduction to Private Security by John S Dempsey - Essay Example

Cite this document
Summary
The paper "Introduction to Private Security by John S Dempsey " highlights that there has been a significant investment in software and network security personnel in order to protect the business from internal or external hacking or any form of system compromise…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Introduction to Private Security by John S Dempsey
Read Text Preview

Extract of sample "Introduction to Private Security by John S Dempsey"

According to the author, the issue of security today has become an important concern for business owners, therefore, the need for them to secure their businesses.
In the United States of America, the most popular professional body with members who are interested in retail security is the “Association of Convenience and Petroleum Retailing” (NACS). This body offers a platform for employers, employees, and other interested parties to ensure the security of their work environment through intensive knowledge on security, which they are offered. Business owners and employees have a variety of security measures to choose from. However, in the United States, NACS recommends investment in security measures, which are most likely to alleviate crime and insecurity in the business premises. The main control methods recommended include cash control, visibility in stores, the correct positioning of cash registers in stores, training of employees, especially on how to deter robbery, balanced lighting in stores, alarms, electronic video surveillance, and minimal escape routes. These are some of the ways to ensure security in the business.
The author addresses the business security of a variety of premises, including both public and private facilities. Shopping centers and malls in the United States are prone to robbery and other criminal activity, as many people tend to loiter there. The major security measures employed include contract guards, public policy, as well as electronic surveillance and alarms. Of importance in the malls are the codes of conduct, which shoppers have to adhere to, as this help maintain order and increase the malls’ security.
Banks are a target of robbers, therefore, needs tight security. These mainly employ security measures, which ensure risk assessment and analysis of robbery, and cash control methods. Training of bank employees is also essential, as well as other electronic and digital surveillance methods. In addition, electronic devices, which can detect metal and explosives, are highly used in banks for security measure.
Private and public utility facilities present major security concerns, which include sabotage, terrorism activities, theft, and damage of private and public property, among others. Apart from the clients, these utility facilities, which include telephone, gas, water, oil, electricity, and nuclear pose a security threat to the employees. In such industries, therefore, employee training is the most recommended security method. Different bodies in the United States, including the International Association of Healthcare Security and Safety (IAHSS), among others, offer employee training for such industries.
Entertainment spots including casinos, amusement parks, beaches, and movie theatres, also need strict security measures, as these are prone to rowdy revellers. This case applies to sports facilities, which also pose a threat to security through the rowdy fans. In the United States today, professionals are looking for better ways of preventing violent and patron behaviors in sports and entertainment avenues. Most of such areas in the United States employ public police and security guards to ensure security. This chapter, therefore, addresses security concerns of both private and public spaces and the need for better security measures in future.
Chapter 7
In chapter 7, Dempsey primarily discusses the retail shrinkage problem. It is argued that the retail shrinkage problem is one of the serious issues affecting modern businesses despite the fact that technology has changed the way business is conducted. According to the author, retail shrinkage accounts for approximately $38 billion in losses every year. Retail shrinkage in this case implies the difference between the recorded inventories at the end of the year as compared to what had been recorded at the beginning of the year. Such losses are often attributed to factors such as theft, shoplifting, auditing issues, vendor fraud, as well as administrative errors. As expected, there is a high correlation between the complexity of the stores or business entity with retail shrinkage. It is worth noting that retail shrinkage poses a serious profit threat to businesses that have low-profit margins such as grocery stores. Whereas internal theft accounts for the highest amount of retail shrinkage, external theft such as bank robbery also accounts for appreciable retail shrinkage.
Many businesses have adopted a combination of various measures in their efforts to reduce retail shrinkage. The author highlights crime prevention through environmental design (CPTED), loss prevention technologies, audits, benefit denial systems, among others as some of the most viable measures. For instance, most retail stores, warehouses, and workshops have an architectural layout purposely designed to make it possible to control retail shrinkage. In addition, the invention of auditing technologies has made it possible for businesses to carry out audits in real-time using auditing software. This way, it is possible to tell when retail shrinkage is happening and therefore be in a position to employ necessary measures in time. The use of video technology including 24-hour CCTV surveillance systems has come in handy in addressing the problem at hand.
With the overwhelming improvement in technology, more businesses are using computerized processing systems as a replacement for human labor. In conjunction with the computerized systems are various control subsystems such as electronic article surveillance, radio frequency identification devices. The use of such systems has enabled control of stock movement thereby reducing retail shrinkage significantly. However, the use of such systems has lately been augmented with the use of human resource. For instance, many businesses have employed loss prevention specialists, loss prevention specialists’ agents, store detectives, internal and external auditors. The bottom line is that the synergistic use of these methods can really go a long way in reducing retail shrinkage significantly. 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Summary Essay Example | Topics and Well Written Essays - 1000 words - 2”, n.d.)
Summary Essay Example | Topics and Well Written Essays - 1000 words - 2. Retrieved from https://studentshare.org/law/1466081-summary
(Summary Essay Example | Topics and Well Written Essays - 1000 Words - 2)
Summary Essay Example | Topics and Well Written Essays - 1000 Words - 2. https://studentshare.org/law/1466081-summary.
“Summary Essay Example | Topics and Well Written Essays - 1000 Words - 2”, n.d. https://studentshare.org/law/1466081-summary.
  • Cited: 0 times

CHECK THESE SAMPLES OF Introduction to Private Security by John S Dempsey

9/11 and the effects on western civilization

The airports were closed down for days as security measures were enhanced, leading to increase in cost of air travel system.... In the modern world terrorists' tactics have largely been boosted by the free nature of societies.... his free nature of societies is also attributed to lack of ability by a nation to foresee, prevent or even mitigate the aftermath of terrorists activities....
6 Pages (1500 words) Term Paper

Strategic Issues For Information Security Managers

In the paper “Strategic Issues For Information security Managers” the author focuses on information systems, which are one of the key driving forces in information security.... Most prevalent nowadays is the necessity of information security professionals to be on top of problems.... Without security there could be no systems.... As on can see, there are various physical elements that go into information security....
9 Pages (2250 words) Essay

Introduction to Private Security

introduction to private security.... orks Cited:Dempsey, john s.... Physical abuses towards the women are no new concept and according to studies one out of every three is a victim of domestic violence (dempsey).... In some cases, the men conduct the rulings, while in others women hold the strings together....
2 Pages (500 words) Essay

Technologies Used by Police Forces

For an effective job, the police department has frequently looked towards In order to improve the security as well as reducing police workload at the same time, new technological innovations have come up that are capable of improving the performance of the police.... The driving force for the introduction of forensics was to foresee justice prevail because before, the judicial proceedings were just based on evidence coming from victim statements and coerced confessions....
8 Pages (2000 words) Research Paper

Terroristic Attack and the Effects on Western Civilization

The researcher of this paper states that in the modern world, terrorists' tactics have largely been boosted by the free nature of societies.... This free nature of societies is also attributed to a lack of ability by a nation to foresee or mitigate the aftermath of terrorist activities.... nbsp;… Some of the recent attacks in western nations and America, in particular, are just but a few examples of terrorists' infiltration on western nations and America....
6 Pages (1500 words) Term Paper

Border Protection and Immigration and Customs Enforcement

john Powell opined that “From 1933 to 2003, the Immigration and Naturalization Service (INS) was the agency of the U.... The paper "Border Protection and Immigration and Customs Enforcement" argues creation of Customs and Border Protection and Immigration and Customs Enforcement resulted in the coordination of agencies and effective implementation of policies of border security, immigration, and customs in the US.... hellip; The innovative policies related to border security, immigration, and customs play an important role in safeguarding a nation from internal/external aggressions....
5 Pages (1250 words) Case Study

The Evolution of School and College Campus Security

This research paper "The Evolution of School and College Campus security" highlights that among the most general problems that a university or campus is required to address is Campus security.... Reportedly, security management's concern is the protection of a building and its assets.... security is a critical issue for many organizations such as commercial, private, educational or government institution.... Campus security is necessary so as to keep the staff and their material possessions secure....
8 Pages (2000 words) Research Paper

Rome, an Ancient City of the New York State

This paper "Rome, an Ancient City of the New York State" describes an ancient city in the New York State.... It is 72 square miles situated at the foothills of the Adirondacks.... Because of its location, the city served as a very strategic point for the movement of goods, people, and other services....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us