Criminal Justice - Crisis Management Thesis

Total Length: 840 words ( 3 double-spaced pages)

Total Sources: 2

Page 1 of 3

e. physical layout, security procedures and vulnerabilities), in most cases, a non-employee is not. In principle, many of the standard procedures in work environments with established security at access points are already effective at vetting strangers, either via requiring real-time confirmation at remote (i.e. lobby) access points or via manually activated intercoms or digital displays.

However, with respect to potential violence perpetrated by family members of employees, many standard security systems are ineffective without specific personnel training addressing the risk. For example, security training for employees should address the fact that employees responsible for granting physical access to non-employees - typically, the reception staff - must remember that they are probably not going to be privy to very much information about the private lives and relationships of all of their co- workers.

Recognizing spouses of co-workers, for instance, is simply not a valid reason to grant access. At the very least, standard access protocol must require the announcement of unscheduled visitors to the employee to be notified first of the identity of any individuals seeking access by virtue of their association with them. In environments with separated greeting areas (or lobbies), visitors must not be granted building access without confirmation from the employee, regardless of how well recognized they may be to security personnel.
Appropriate signage prohibiting exceptions to these types of security procedures may help minimize tension or impatience, in general, as well.

In the case of non-employees, to the extent security protocols are effective with respect to building access, they necessarily "funnel" the greatest likelihood of violence on the premises to the external environment immediately adjacent to the workplace itself. In many cases, violent attacks on employees by non-employee spouses, for example, occur in parking facilities or external areas such as pathways leading to secure areas from which non-employees are excluded (Larsen, 2007). Understanding this reality means that security procedures should include routine surveillance of external grounds, particularly where access is unrestricted. In all likelihood, surveillance cameras are relatively ineffective to be relied upon for this purpose; it requires foot patrols in conjunction with identification stickers issued to all vehicles authorized to enter the facility. Otherwise, secure building access points increase the chance of violence by ambush outside instead......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Criminal Justice - Crisis Management" (2008, September 06) Retrieved April 28, 2024, from
https://www.aceyourpaper.com/essays/criminal-justice-crisis-management-28274

Latest MLA Format (8th edition)

Copy Reference
"Criminal Justice - Crisis Management" 06 September 2008. Web.28 April. 2024. <
https://www.aceyourpaper.com/essays/criminal-justice-crisis-management-28274>

Latest Chicago Format (16th edition)

Copy Reference
"Criminal Justice - Crisis Management", 06 September 2008, Accessed.28 April. 2024,
https://www.aceyourpaper.com/essays/criminal-justice-crisis-management-28274