Abstract The encroachment of alternative or private policing entities within public safety and community crime prevention has expanded to the point that private personnel greatly outnumber public police. As public resources continue to be thinly dispersed and their focus prioritised across communities, modern security providers now assume responsibility for many traditional policing functions such as surveillance of public space, protection of public buildings and “mass private property” and the investigation of internal corporate crime. Although public policing agencies tend to embrace partnerships and the concept of multi-agency approaches to prevent crime, there appears an inherent resistance to the transfer of traditional policing functions to alternative providers. This article explores the possibility whether private security personnel are able to perform traditional public policing functions including offender processing. This research considers the processing of first-offender adult shopstealers. The method adopted involved a literature review, analysis of contemporary policing practices and a descriptive case study. Findings determined the majority of respondents supported the concept, with caution. A number of system and operational considerations were identified and discussed should the transfer of any public policing function be contemplated.
{"title":"Public and Private Policing in Retail?","authors":"T. Zalewski","doi":"10.1300/J460v02n02_03","DOIUrl":"https://doi.org/10.1300/J460v02n02_03","url":null,"abstract":"Abstract The encroachment of alternative or private policing entities within public safety and community crime prevention has expanded to the point that private personnel greatly outnumber public police. As public resources continue to be thinly dispersed and their focus prioritised across communities, modern security providers now assume responsibility for many traditional policing functions such as surveillance of public space, protection of public buildings and “mass private property” and the investigation of internal corporate crime. Although public policing agencies tend to embrace partnerships and the concept of multi-agency approaches to prevent crime, there appears an inherent resistance to the transfer of traditional policing functions to alternative providers. This article explores the possibility whether private security personnel are able to perform traditional public policing functions including offender processing. This research considers the processing of first-offender adult shopstealers. The method adopted involved a literature review, analysis of contemporary policing practices and a descriptive case study. Findings determined the majority of respondents supported the concept, with caution. A number of system and operational considerations were identified and discussed should the transfer of any public policing function be contemplated.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dennis M. Giever is currently Professor and Chairperson of the Department of Criminology at Indiana University of Pennsylvania. Prior to coming to IUP he was Assistant Professor of Criminal Justice at New Mexico State University. He has been exploring various security education issues at the Academic/Practitioner Symposia hosted by the American Society for Industrial Security and held in various universities throughout the United States.
Dennis M. Giever现任宾夕法尼亚印第安纳大学(Indiana University of Pennsylvania)犯罪学教授和系主任。在加入IUP之前,他是新墨西哥州立大学刑事司法助理教授。他一直在美国工业安全协会主办的学术/从业者研讨会上探讨各种安全教育问题,并在美国各地的多所大学举行。
{"title":"Interview with Dennis M. Giever, PhD, Indiana University of Pennsylvania","authors":"John Kostanoski","doi":"10.1300/J460v02n02_06","DOIUrl":"https://doi.org/10.1300/J460v02n02_06","url":null,"abstract":"Dennis M. Giever is currently Professor and Chairperson of the Department of Criminology at Indiana University of Pennsylvania. Prior to coming to IUP he was Assistant Professor of Criminal Justice at New Mexico State University. He has been exploring various security education issues at the Academic/Practitioner Symposia hosted by the American Society for Industrial Security and held in various universities throughout the United States.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123612221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/J460v02n02_01","DOIUrl":"https://doi.org/10.1300/J460v02n02_01","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128887982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Personal safety and security is, in the last resort, the responsibility of the individual. The wise do not rely on providence to shield them from the dangers and unpleasantness of modern life. This article explores the phenomenon of victimization and why some seem singled out for harm that others avoid. There are natural defenses and those that can be developed through assessment and training. Some clearly lead more hazardous lives than others. Training, even for those whose fate is placed in the hands of personal protection specialists, is still a necessity and can make all the difference in terms of survival.
{"title":"Trying to Be a Hero and Winding Up a Zero","authors":"H. Cooper","doi":"10.1300/J460v02n02_02","DOIUrl":"https://doi.org/10.1300/J460v02n02_02","url":null,"abstract":"Abstract Personal safety and security is, in the last resort, the responsibility of the individual. The wise do not rely on providence to shield them from the dangers and unpleasantness of modern life. This article explores the phenomenon of victimization and why some seem singled out for harm that others avoid. There are natural defenses and those that can be developed through assessment and training. Some clearly lead more hazardous lives than others. Training, even for those whose fate is placed in the hands of personal protection specialists, is still a necessity and can make all the difference in terms of survival.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134481073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract “Unauthorized network intrusions affect us all. Worse yet, certain classes of unauthorized network intrusions are a very serious matter; ones in which there are minimal defensive actions to prevent such attacks.” Denial-Of-Service (DoS) and Distributed Denial-Of-Service (DDoS) attacks are the class of attack vectors this paper examines and demystifies. We will examine certain aspects (multi/polyaspectuality) of these class-attacks by investigating the following: • The online statement from Carnegie Mellon's Computer Emergency Response Team (CERT/CC Timeline, May 2001). The interplay of three types of justice: Legal Justice (Jus Ad Rem), Social Justice (Jus Civile), and Natural-Moral Justice, or Ethics (Jus Naturalis), while asking the reasonable question, “Can these three types of justice co-exist?” The application of Lonergan's ethics, whose employment allows for the examination of the good, obligation, and value. • In doing so, we hope to arrive at some preliminary answers that will (1) serve as a concrete foundation that will verify the authenticity of positions and further develop those positions; and (2) serve to undermine and destroy weak positions, the ones which are in fact counterpositions and reverse them to concrete positions that are attentive, intelligent, reasonable, and responsible to the individual, the group that said person is a member of, and the society in which they are situated.
“未经授权的网络入侵影响着我们所有人。更糟糕的是,某些类别的未经授权的网络入侵是一个非常严重的问题;在这种情况下,防止此类袭击的防御行动最少。”拒绝服务(DoS)和分布式拒绝服务(DDoS)攻击是本文研究和揭示的一类攻击向量。我们将通过调查以下内容来检查这些类攻击的某些方面(多/多方面):•卡内基梅隆大学计算机应急响应小组(CERT/CC Timeline, 2001年5月)的在线声明。三种类型的正义:法律正义(Jus Ad Rem),社会正义(Jus Civile)和自然道德正义或伦理学(Jus Naturalis)的相互作用,同时提出合理的问题,“这三种类型的正义可以共存吗?”朗尼根伦理学的应用,其应用允许对善、义务和价值进行检验。•在这样做的过程中,我们希望得到一些初步的答案,这些答案将(1)作为验证立场真实性的具体基础,并进一步发展这些立场;(2)有助于破坏和摧毁弱势地位,即那些实际上是对立的地位,并将其逆转为具体的地位,这种地位是对个人,对个人所属的群体,对他们所处的社会负责的,明智的,合理的和负责的。
{"title":"Justice and Ethics","authors":"Philip S. Holt, A. Basden","doi":"10.1300/J460v02n02_05","DOIUrl":"https://doi.org/10.1300/J460v02n02_05","url":null,"abstract":"Abstract “Unauthorized network intrusions affect us all. Worse yet, certain classes of unauthorized network intrusions are a very serious matter; ones in which there are minimal defensive actions to prevent such attacks.” Denial-Of-Service (DoS) and Distributed Denial-Of-Service (DDoS) attacks are the class of attack vectors this paper examines and demystifies. We will examine certain aspects (multi/polyaspectuality) of these class-attacks by investigating the following: • The online statement from Carnegie Mellon's Computer Emergency Response Team (CERT/CC Timeline, May 2001). The interplay of three types of justice: Legal Justice (Jus Ad Rem), Social Justice (Jus Civile), and Natural-Moral Justice, or Ethics (Jus Naturalis), while asking the reasonable question, “Can these three types of justice co-exist?” The application of Lonergan's ethics, whose employment allows for the examination of the good, obligation, and value. • In doing so, we hope to arrive at some preliminary answers that will (1) serve as a concrete foundation that will verify the authenticity of positions and further develop those positions; and (2) serve to undermine and destroy weak positions, the ones which are in fact counterpositions and reverse them to concrete positions that are attentive, intelligent, reasonable, and responsible to the individual, the group that said person is a member of, and the society in which they are situated.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126537649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The methodology that we employed in developing this English language-based international academic program list involved gathering information directly from college websites. Many sites did not have a distinct classification for security-related degree programs. Often information was buried under computer science programs or other program listings. There is no single, comprehensive site that displays all the degrees offered in security. Information about the listed institutions was taken from their respective websites. We do not claim that these descriptions are an original creation, nor does this information necessarily reflect our opinions. Also we cannot guarantee that the list is free of errors. This list only provides information on accredited degree programs.
{"title":"SECURITY ACADEMIC PROGRAMS","authors":"S. Lancaster","doi":"10.1300/j460v02n01_10","DOIUrl":"https://doi.org/10.1300/j460v02n01_10","url":null,"abstract":"The methodology that we employed in developing this English language-based international academic program list involved gathering information directly from college websites. Many sites did not have a distinct classification for security-related degree programs. Often information was buried under computer science programs or other program listings. There is no single, comprehensive site that displays all the degrees offered in security. Information about the listed institutions was taken from their respective websites. We do not claim that these descriptions are an original creation, nor does this information necessarily reflect our opinions. Also we cannot guarantee that the list is free of errors. This list only provides information on accredited degree programs.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114087233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Todd Stewart is Director for Program for International and Homeland Security, at The Ohio State University, from April 2002. In this capacity, he is responsible for promoting research and study into the homeland-security challenges facing Ohio and the nation, particularly those associated with terrorist activities. His responsibilities include identifying and responding to the research, technology, education, training and
{"title":"Interview with Todd Stewart, PhD","authors":"John Kostanoski","doi":"10.1300/J460V02N01_07","DOIUrl":"https://doi.org/10.1300/J460V02N01_07","url":null,"abstract":"Todd Stewart is Director for Program for International and Homeland Security, at The Ohio State University, from April 2002. In this capacity, he is responsible for promoting research and study into the homeland-security challenges facing Ohio and the nation, particularly those associated with terrorist activities. His responsibilities include identifying and responding to the research, technology, education, training and","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125626438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/j460v02n01_01","DOIUrl":"https://doi.org/10.1300/j460v02n01_01","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"291 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131691486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract The purpose of this paper is to take negotiation and its related concepts from the realm of organizational conflict and apply the current communication principles, strategies, and tactics used in organizations to the realm of hostage negotiation in a constructive rather than destructive manner. Another goal of this paper is to show that whether a third-party intervention or a problem-solving method is used, the ultimate goal of negotiation remains identical: to reach cooperation or peace. Yet, the authors inform the readers about the drawbacks and risks of hostage negotiation (i.e., failed manipulative endeavors, lack of effective language use, etc.). Finally, this paper offers suggestions for future research, namely the use of technological aspects that can contribute to a better teaching of negotiation in organizations and better tactics on how to bargain with hostage takers.
{"title":"Negotiation Tactics in Organizations Applied to Hostage Negotiation","authors":"Jonathan Matusitz, Gerald-Mark Breen","doi":"10.1300/J460v02n01_05","DOIUrl":"https://doi.org/10.1300/J460v02n01_05","url":null,"abstract":"Abstract The purpose of this paper is to take negotiation and its related concepts from the realm of organizational conflict and apply the current communication principles, strategies, and tactics used in organizations to the realm of hostage negotiation in a constructive rather than destructive manner. Another goal of this paper is to show that whether a third-party intervention or a problem-solving method is used, the ultimate goal of negotiation remains identical: to reach cooperation or peace. Yet, the authors inform the readers about the drawbacks and risks of hostage negotiation (i.e., failed manipulative endeavors, lack of effective language use, etc.). Finally, this paper offers suggestions for future research, namely the use of technological aspects that can contribute to a better teaching of negotiation in organizations and better tactics on how to bargain with hostage takers.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115836310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract The purpose of security is to ward off unacceptable danger. Narrowed in translation to cargo security, it means to keep the goods, merchandise, or passengers transported in domestic and international commerce free of unacceptable dangers. Sounds reasonable, correct? But, there is an issue begged: what constitutes “unacceptable danger” when it comes to commercial goods, merchandise, or passengers? It is a question no less thorny than and directly related to the question of what constitutes unacceptable danger in a larger cultural, economic, and political context. How a person answers the question of what constitutes “unacceptable” danger, in any context, is dependent upon his or her perceptions derived from the different layers of culture in which he is embedded. People strike a balance in their own minds among competing priorities and probabilities of disaster. Collectively this balancing act is the basis for how we determine public and private policy, including policy on cargo security. There is a real problem with this general approach when we realize that it isn't the probability of an event that matters, but whether or not it can actually happen, whatever the unlikelihood of it. The implications of a nuclear bomb being hidden in the cargo hold of a ship anchored in New York harbor make most nightmares wimpy things in comparison; such an event may be unlikely, but it can happen. The question is whether the improbable event is an unacceptable danger that is worthy of being warded off by a significant investment of time, money, and human resources.
{"title":"Global Business, Transportation, Trade, and the Concept of Unacceptable Danger","authors":"Lawrence A. Howard","doi":"10.1300/J460V02N01_04","DOIUrl":"https://doi.org/10.1300/J460V02N01_04","url":null,"abstract":"Abstract The purpose of security is to ward off unacceptable danger. Narrowed in translation to cargo security, it means to keep the goods, merchandise, or passengers transported in domestic and international commerce free of unacceptable dangers. Sounds reasonable, correct? But, there is an issue begged: what constitutes “unacceptable danger” when it comes to commercial goods, merchandise, or passengers? It is a question no less thorny than and directly related to the question of what constitutes unacceptable danger in a larger cultural, economic, and political context. How a person answers the question of what constitutes “unacceptable” danger, in any context, is dependent upon his or her perceptions derived from the different layers of culture in which he is embedded. People strike a balance in their own minds among competing priorities and probabilities of disaster. Collectively this balancing act is the basis for how we determine public and private policy, including policy on cargo security. There is a real problem with this general approach when we realize that it isn't the probability of an event that matters, but whether or not it can actually happen, whatever the unlikelihood of it. The implications of a nuclear bomb being hidden in the cargo hold of a ship anchored in New York harbor make most nightmares wimpy things in comparison; such an event may be unlikely, but it can happen. The question is whether the improbable event is an unacceptable danger that is worthy of being warded off by a significant investment of time, money, and human resources.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128914248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}