jurweek3
.docx
keyboard_arrow_up
School
Keiser University *
*We aren’t endorsed by this school
Course
3140
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
3
Uploaded by KidKnowledge9246
Kadian Brooks
Keiser University
Private Security Week Three Journal
Professor Flowers
03/24/24
1.
Discuss the sanctions which have been put into place and are imposed when offenders are apprehended. The sanctions put into place or imposed when offenders are apprehended are penalties for
individuals or corporations, depending on the situation. Individuals may bear the weight of confinement and/ or monetary sanctions. Corporations receive mainly financial penalties, forced closings, and forfeitures, and fines are imposed against their businesses for environmental, health, and safety violations (Maggio, 2009, pp. 170-171).
2.
Discuss corporate fraud, embezzlement, and insider trading. Give an example of each. Corporate fraud can encompass the loss of assets by businesses, acts perpetrated by the corporation to take funds from others or falsifying its reported results and financial position (Maggio, 2009, p. 174). For example, for personal purchases, an employee can divert funds to buy goods or services on his behalf. This is usually done by someone who approves their expense reports or supplier invoices. Enron is a famous case of corporate fraud. Enron was an energy company that used accounting fraud to hide its losses and inflate its profits.
Embezzlement occurs when a person steals or misuses assets that a company or person has entrusted to them (Maggio, 2009, p. 174). An example is the Tyco corporate scandal.
Insider trading involves buying and selling company stock or securities for a profit based on information not readily available to the public. In the Martha Stewart case, for example, after receiving advance notice that the FDA rejected the new cancer drug, Martha Stewart sold her holdings in the company’s stock when the shares were trading in the $50 range, and the stock subsequently fell to $10 in the following months.
3.
How involved should a private security guard be with the emergency services team of the business they work for? Be specific and provide examples. I believe private security guards should be very involved with the emergency service team for the business they work for; there should be an open line of communication
between the two. The private security guard should help the business' emergency services
team. The security guard should be trained with the emergency service team so they can be familiar with their protocols and procedures. If an emergency presents itself, for example, inside a hospital on a maternity ward, there is a color code for when a baby goes missing. Someone on the emergency service team would relay the color code over the intercom, and all the security in the hospital would know precisely what the emergency is. For Alarm services, if a business is getting robbed and there is a secret alarm button, the security should know where it is located, or if there is a robbery with a hostage situation inside of a bank or jewelry store and the robbers ordered the security to turn the alarm off, there should be a code that does silent the alarm but also send a message that there is still a robbery in progress, etc. all that has to be done between the two teams ( the security company and the emergency service teams).
4.
What is cyberterrorism? Give a brief overview of this crime and provide examples.
Cyberterrorism is any premeditated, politically motivated attack against information, computer systems, computer programs, networks, or any data that results in violence, disruption of, or damage of noncombatant targets by subnational groups or clandestine agents (Maggio, 2009, p. 224). Cyberterrorism is the use of computers, the Internet, and networks to carry out acts of terrorism. This includes using malicious software, phishing, viruses, and computers to attack or corrupt a system. Many different software and hardware tools can be used to commit acts of cyberterrorism. Many times, terrorists use the internet to hack into government systems and cause a security breach. This can create a wave of terror and fear amongst the citizens. Acts of cyberterrorism like hacking can be
avoided by using different precautionary measures like freezing information by locking accounts and fraud alerts using theft detection services. This allows the authorities to protect all the confidential and sensitive information the terrorists can access. CIA and FBI have put forward many efforts to hinder the acts of cyberterrorism (Anderson et al., 1977). An example of cyberterrorism I've seen in movies is hackers placing a virus on FBI servers in return for wanting them to release someone from prison. Or taking over the computers in a hospital so the personnel won't have access to the patient files to see what and how much medication is needed, etc. 5.
Explain the difference between left and right-wing terrorists. What is special interest terrorism?
Right-wing terrorism is associated with opposition to the established government to
disrupt government operations and replace elected leaders with fascists. This ideology
originated in Europe in the 1970s and re-emerged after the dissolution of the Soviet
Union. Examples of right-wing terrorism have occurred in countries like Columbia,
Germany, France, Norway, and Russia. On the other hand, left-wing terrorism aims to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help