28 Jul 2022

155

Handling Workplace Violence

Format: APA

Academic level: College

Paper type: Research Paper

Words: 1552

Pages: 6

Downloads: 0

Incident Review 

The incident occurred at my workplace on a Monday morning with all staff members at their workplace station. I used to work in a state ministry handling tourism and wildlife-related issues. My employees had designated my workstation on the 15th floor, which housed the finance, accounts, human resource, and information technology departments. On this day, five men came from the staircase walk, all groomed in black leather jackets and caps that covered their faces, and one would not recognize their identity. They walked in my direction, ordered me to remain put and silent. The thieves left one gentleman in my cubicle, which was just adjacent to the door leading to the offices. The other three went inside, and I could hear them ordering individuals to sit on the floor and remain silent. Every person on the floor was ordered to submit their phone, and no movement was allowed. They demanded money and would grab any asset that seemed valuable. Laptops, office telephones, kitchenware, and photocopiers were among the items stolen on that day. Everyone was scared; no one made any alarm as this seemed a well-orchestrated robbery as the men knew all the directions and departments on the floor. They tied everyone with dark tapes on the eyes and hands. They left through the lifts and were long gone within minutes. We were rescued by an intern who had come to print and make copies at the human resource department, who called upon staff members from the 16th floor. 

Role of Private Security in Relation to Public Security 

Being the security manager of the floor, the application of a private security system would have prevented such an incident. According to Lazarus (2020), the growth of insecurity has led to more individuals turning to the private security system to guarantee their safety, including that of their relatives and personal possessions. In this incident, they would have detected the five gentlemen from their entry point since it was later discovered that they had used a car parked in the basement. Private security firms are usually engaged in providing patrol and guard services using security, parking, dogs, and human guards who have undergone special training for advanced security tactics (Moricova, 2017). With the presence of a private security firm guarding the building, events of the unforgettable Monday morning would have been averted. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Additionally, private security agencies would have access and control of the entire building using surveillance cameras. They would have spotted the thieves right before the theft o ccurred. The use of roving patrol techniques, bodyguards, and the dog service unit would help identify the assets carried by the thieves. This is contrary to public security that was in charge of security during that fateful day. The public security system is not always alert due to its application of traditional methods in security measures. The policemen at the gate failed to ask for any identity cards from the gentlemen, nor did they bother to question where the men were going. On exiting the building, the gate police did not also check the thieves' vehicle that they used to get away, an action that would have led to their arrest. Public security mostly ensures citizens' protection against extremists or terror acts, leaving out bare criminal acts such as theft, burglary, and pickpocketing (Choudhury, 2017). Public security remains exposed due to lack of funds to run their security, lack of motivation, and bribery from citizens who end up running away from justice. 

Telltale Signs and how to Avoid Theft in the Workplace 

During the past few weeks before the workplace incident, I was working on a project that led me to question myself about the authentic nature of the security around our organization. I realized that it was quite hard to notice intruders from the staircase walk. Most guards were designated on the lift's entourages and the gentlemen coming through the staircase walk, which was rarely used to indicate that they knew the organization setting. When I was on my leave days, a colleague had called me and informed me that some individuals had walked on the 15th floor and did not communicate with anyone. The colleague mentioned three suspicious people entered the floor looking lost but walked around as if looking for a certain office. They barely talked to my colleague at the security cubicle, and since they were all in ironed suits, they were allowed to enter. After the thieves had left, I was left wondering if the three suited men were among the five thieves. 

A security manager can anticipate security mishaps by carefully evaluating and monitoring suspected individuals' movements on a particular floor or department in an organization. By carefully recording each person's attendance with their personal information on an attendance register would help in averting such incidents. Any person visiting an organization should provide information about who they are, where they are going, and the reason for the visit. Recording personal mobile numbers and identity card numbers would also help track down any person who had access to the building on any day. Organizations that observe such guidelines are likely to avoid cases of theft and burglary. 

Measures in Handling Theft in Organizations 

They are various measures that can be used to enhance security by use of a private security approach. The use of information technology tactics to augment security in firms is one of the most resourceful methods in tackling crime incidents. Information technology in security helps implement procedures to safeguard corporate information and unauthorized access, disclosure, or modification, whether intentional or accidental (Reuter, 2019). It does not only safeguard documents but also individuals from exploitation by crime offenders. The breach of security in many organizations has caused formidable losses that lead to the decline or collapse of an entire organization. The use of CCTV cameras, passwords on computers, and staff-only access restrictions are some of the information technology tactics that will revolutionize the security industry. 

Subsequently, an organization can engage in security consulting, benchmarking, or outsourcing relevant personnel to handle security matters of the firm. Security consultants operate in diverse fields comprising crisis and security management, engineering, and information systems management. Consultancy in security management is essential as it assists in designing security systems, offering specifications for physical and technological security measures, and conducting training to security personnel in the organization. Additionally, the consultants can advise firms on handling polygraphs, psychological stress assessments, and provision of expertise on avoidance of loss and risk control. With the relevant skills and knowledge of effective security management, firms can safeguard their interests and the interest of the employees, stakeholders, and the general public. 

Factors to Consider in Security management 

Various aspects ought to be considered to achieve effective and efficient security management. The first aspect to consider is the purpose of the security approach. The company's reason to protect itself against any threat and the techniques used are vital in ganging the number of resources required. Prevention of undesirable security incidents is critical in safeguarding individuals and assets found within the organizational setting. Developing a policy that serves as a purpose to the security issues will help create an overall strategy to maintain sufficient security. The policy's purpose is to help set up the rules and regulations that will guide individuals on how to go about their personal and organizational security (Howard, 2019). Creating an efficient security plan and adhering to the set rules helps to offer compliance and mitigating security breaches. Firms should effectively strengthen their security policies through conducting routine updates in response to any changes occurring in the organization, conclusions from previous breaches, new threats, and any other change in the security posture scope. 

Organizations should set targets, goals, and objectives of the security measures that should be put in place for the security agents' awareness. For instance, the security system should be confidential in that only the people with authorization should have access to an organization's mainframe. Employees should be the only ones able to have access to alarms and security details. The organization should only permit the employees to know where the surveillance is located to prevent other intruders' access. Staying confidential with the security approach will help in keeping the firm safe from crime offenders. Organizations that expose their security details are at risk of security attacks as all the details can be breached. 

Administrative Challenges to a Security Manager 

Organizations should always value the security management function in an organization, one tasked with protecting lives and assets from unforeseen theft or damage. However, a security manager suffers from an administrative challenge such as poor communication from the organization's management. Security managers are mistakenly taken to be semi-skilled employees lacking relevant knowledge or expertise. They are mostly ignored in the process of decision-making. The human resource managers are likely to disapprove of any suggestion from the security manager. Making informed decisions on security matters without the security manager's consent culminates in security ineffectiveness and inefficiency. An organization's management should always put the views of the security manager and the staff members. Communication is an essential tool in an organization that determines its success or failure. 

Security managers also suffer from inadequate working facilities. The administration does not usually facilitate these managers in many ways. For instance, my working cubicle was too small that only two people would fit. Lack of enough working space makes the security manager lower their self-esteem and lack work morale. Some security managers in various firms are not provided with facilitation that assists them in carrying out various tasks. Lack of security tools such as search and frisk gadgets and computers to keep their records lead to security breaches. The security managers should be considered part of the organization and should not be left to improvise independently. During my working days in the state department of tourism and wildlife, the management did not give us any protective work. We demanded gloves and aprons for dirt protection, but the organization ended up giving nothing. The lack of adequate space and proper gadgets for security maintenance is a significant blow to security managers. 

References 

Choudhury, T. (2017). The radicalization of citizenship deprivation. Critical Social Policy 37 (2), 225-244. https://doi.org/10.1177/0261018316684507 

Howard, P. D. (2019). The security policy life cycle: Functions and responsibilities.  Information Security Management , 297-312.  https://doi.org/10.1201/9781351073547-22 

Lazarus, L. (2020). Insecurity and human rights.  Human Rights and 21st Century Challenges , 129-152.  https://doi.org/10.1093/oso/9780198824770.003.0007 

Moricova, V. (2017). Optimization of competencies of personnel positions in private security services.  4th International Multidisciplinary Scientific Conference on Social Sciences and Arts SGEM2017, MODERN SCIENCE https://doi.org/10.5593/sgemsocial2017/15/s05.090 

Reuter, C. (2019). Information technology for peace and security – Introduction and overview.  Information Technology for Peace and Security , 3-9.  https://doi.org/10.1007/978-3-658-25652-4_1 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Handling Workplace Violence.
https://studybounty.com/handling-workplace-violence-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration