Security is a key issue in the management of the entire United States. The citizens of the country have to feel protected and secure in their homes and workplaces. The army, military, air force and the navy are all tasked with protecting the United States. It is because of this that program and faculty directors with numerous professional and academic backgrounds teach theories from various disciplines and fields in order to prepare students for field work and solving homeland problems that deal with security. The students are taught various topics such as terrorism, risk management and security (Comiskey, 2018). In spite of the rigorous training that they undergo, the country still faces numerous criminal activities and not many are sure of their security especially those in the ‘ghetto’ neighborhoods.
In order to ensure students are able to deliver in their profession as security officers, they are trained on how to detect and interpret risks. They are also given equipment that allows them to act on scene such as radio calls which they can use to call for back-up or report crimes. These skills are developed in stages where after developing, they are integrated and lastly demonstrated (Wukich et al. (2016). These skills are meant to ensure that they are capable of making appropriate decision when in the middle of a crisis.
Delegate your assignment to our experts and they will do the rest.
Currently, criminal activities come in various forms such as bioterrorism and cybercrimes. Cyber-crimes are on the rise because of the advancing technology. Presently, there is a lot of cyberbullying that is done online which affects people emotionally and psychologically. Flowers et al. (2013), stated in their research that the deficiencies experienced in cyber security may as well be considered as the greatest threat to national security that the United States faces. This is also supported by Brady (2016) who stated that homeland is not fully developed to secure the roles it has been given to perform because of the deficiencies experienced across the management.
Various forms of technology have been put in place to ensure security. Cyber security, for example is had developed from a discipline that is technical to a concept that is more strategic and geopolitical. This is to ensure that the cyberspace is secure as it plays a pivotal part in many of the sectors in the country and is an integral part of the lives of many people (Flowers et al., 2014). Vermeulen (2017), suggests that individuals who grew up after 9/11 were exposed to a sense of insecurity and fear. They also grew up knowing disasters are inevitable and that they need security at all times. This has made it easier for recruits to be obtained for the sake of national security.
In order to deal with risks that may arises, there has to be the identification of attributes that have to be dealt with when describing disaster hazards and terrorisms in a comprehensive form. Concise summaries have to be made and proper decisions will them be generated (Lundberg et al., (2016). Proper decision making ensures lives are saved in the midst of tragedy. In an organization, security is key in order to ensure employees are in a secure environment as they work. Those employed also have be thoroughly vetted to ensure they are who they claim to be. Sennewald et al., (2016) also discusses the importance of background checks in any organization to ensure security in his book.
Security is described by Newsome (2016), as liberty from risks that are negative. Employees need to work in an environment free from every form of dangers. Risk and security management are considered practical skills that everyone can access. Land (2013), mentions the approach of critical thinking an instrument that can be used to provide effective work-related safety management. The critical thinking is used to build a safety management structure that is comprehensive.
Security is essential for everyone in any place. It is because of this that it is important for every country to have a security management that is effective and one that delivers.
References
Brady, K., R., (2016). Comprehensive Homeland Security: Developing a Domestic Protection Force for the United States. Journal of Homeland Security and Emergency Management, 13 (2), 219-229
Comiskey, J. (2018). Theory for homeland security. Journal of Homeland Security Education , 7, 29-45. http://www.journalhse.org/v7-comiskey.html
Flowers, A. & Zeadally, S. (2014). US Policy on Active Cyber Defense. Journal of Homeland Security and Emergency Management, 11(2), pp. 289-308. Retrieved 19 Jun. 2018, from doi: 10.1515/jhsem-2014-0021
Flowers, A., Zeadally, S. & Murray, A. (2013). Cybersecurity and US Legislative Efforts to address Cybercrime. Journal of Homeland Security and Emergency Management, 10(1), pp. 29-55. Retrieved from doi:10.1515/jhsem-2012-0007
Land, M., (2013). Security Management for Occupational Safety . CRC Press
Lundberg, R., and Willis, H., H., (2016). Deliberative Risk Ranking to Inform Homeland Security Strategic Planning. Journal of Homeland Security Management, 13 (1), 3-33. Retrieved from https://doi.org/10.1515/jhsem-2015-0065
Newsome, B., (2016). A Practical Introduction to Security and Risk Management. SAGE Publications. Retrieved from http://dx.doi.org/10.4135/9781506374437.n1
Sennewald, C., A., and Baillie, C., (2015). Effective Security Management 6 th Edition. Butterworth-Heinemann Newton, USA.
Vermeulen, K., (2017). Young Adults’ Security Perceptions: Troubling, but an Opportunity for the Response Field, 13(4). Retrieved from doi: https://doi.org/10.1515/jhsem-2016-0062
Wukich, C., Frew, S. L. & Steinberg A. (2016). Teaching key elements of decision making online for homeland security and emergency management. Journal of Homeland Security Education, 5, 8-24.