Running head: A BIZARRE APPLICATION OF APA

advertisement
Introduction to Security
Running head: Introduction to Security
Chapters 16 thru 17 Summary
Michael R. Vest
Tom Prunier
Introduction to Security SMGT 311
September 18, 2009
1
Introduction to Security
2
Abstract
Security is a broad career field and will continue to grow over the next several years. It is
believed that the government will hire over 1110,000 security specialist over the next five years.
Because of the broad berth of the field, there are many areas that people can choose to specialize.
One of the areas to that is increasing in activity is in retail security. Because of the current war of
terrorism, the security specialist must be able to factor in terrorism into security design. We will
look at some of the problems that are encountered in retail security and look at how terrorism
and its methods may be used against the public.
Introduction to Security
3
Chapters 16 thru 17 Summary
Security has a berth of career opportunities. One such opportunity is retail security. In
retail security, one specializes on adversaries that include shoplifters and employee theft. On the
national average, retailers lose over $41.6 million dollars a year in product loss from shoplifting
and employee theft (Fischer, Halibozek, & Green, 2008). According to the International Mass
Retail Association Reports, forty percent of retail losses is from employees while only thirtythree percent retail losses is from shoplifters (Fischer, Halibozek, & Green, 2008).
As security specialist, one must think like a shoplifter to defeat a shoplifter. There are
many methods of shoplifting. Examples include: 1.) The bloomer technique, 2.) Palming, and 3.)
Ticket switching (Fischer, Halibozek, & Green, 2008). To catch a shoplifter, detail recognition
is essential. A cape over the arm or eye movements that appear to be monitoring customers,
associates, and mirrors may indicate a shoplifter. Employees that change receipt tapes before a
roll is empty or charge a “No Sale” may indicate theft.
Professional thieves are hard to catch, but there are countermeasures that can be
implemented to minimize external and internal loss. Surveillance camera, electronic tracking
devices, and checkout clerks are tools used by retail to combat theft (Fischer, Halibozek, &
Green, 2008). Other administrative methods include verifying check and credit card signatures,
requiring a receipt for refunds, and biometric authentication devices. Other areas to monitor
include trash removal, package control, and employee morale. By being aware of surrounding, a
security specialist can help minimize the loss of property and increase the chances of successful
prosecution. All of these factors in the jobs of retail security specialist. Retail security specialist
must also account for one major area that has only been brought to public light within the last
few years. This area is terrorism.
Introduction to Security
4
Understanding terrorism is critical to being an effective security specialist. Terrorism in
the retail is relatively low but is slowly increasing as terrorist from hard targets to soft targets, “It
is worth noting that retailers have been targeted for terror but not by traditional terrorist”
(Fischer, Halibozek, & Green, 2008). Terrorism of today is different from yesteryear. Today’s
terrorists are more lethal, suicidal, ideological, and technologically advanced.
While we constantly hear about Islamic terrorist acts today on the news, only about one
percent of terrorist attacks are Islamic based (Fischer, Halibozek, & Green, 2008). Terrorist tend
to choose targets that will gain them the most media support for their cause. Soft targets, like a
mall full of people, allow for the most impact when attempting sending terroristic ideological
messages to society.
Terrorism started within the European theater in such countries as Russia, Palestine, and
Ireland. The Irish Republican Army is a well know terrorist group. Third world countries such as
Iran are now supporting terrorist by allowing training camps and safe havens for terrorist.
Many of today’s terrorist groups are highly organized, technologically advanced, and
well financed (Fischer, Halibozek, & Green, 2008). This makes them extremely dangerous,
especially with the radical groups. With the advent of the internet, retail industries actually
become prime suppliers for terrorist cells. Groups can use the internet to obtain ingredient lists
that can be purchased locally at stores. This makes tracking them down much harder.
As terrorist start to target public locations such as malls; stores; and theaters, security
must be aware of the surroundings. All it takes to create panic is the release of mustard gas or a
mass distribution of the anthrax virus in a shopping mall to create fear that will affect everyone
within the soft target area and beyond.
Introduction to Security
References
Fischer, R. J., Halibozek, E., & Green, G. (2008). Introduction to Security (8th ed.). Burlington,
MA: Elsevier Butterworth-Heinemann.
5
Download