{"title":"Public and Private Policing in Retail?","authors":"T. Zalewski","doi":"10.1300/J460v02n02_03","DOIUrl":"https://doi.org/10.1300/J460v02n02_03","url":null,"abstract":"Abstract The encroachment of alternative or private policing entities within public safety and community crime prevention has expanded to the point that private personnel greatly outnumber public police. As public resources continue to be thinly dispersed and their focus prioritised across communities, modern security providers now assume responsibility for many traditional policing functions such as surveillance of public space, protection of public buildings and “mass private property” and the investigation of internal corporate crime. Although public policing agencies tend to embrace partnerships and the concept of multi-agency approaches to prevent crime, there appears an inherent resistance to the transfer of traditional policing functions to alternative providers. This article explores the possibility whether private security personnel are able to perform traditional public policing functions including offender processing. This research considers the processing of first-offender adult shopstealers. The method adopted involved a literature review, analysis of contemporary policing practices and a descriptive case study. Findings determined the majority of respondents supported the concept, with caution. A number of system and operational considerations were identified and discussed should the transfer of any public policing function be contemplated.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interview with Dennis M. Giever, PhD, Indiana University of Pennsylvania","authors":"John Kostanoski","doi":"10.1300/J460v02n02_06","DOIUrl":"https://doi.org/10.1300/J460v02n02_06","url":null,"abstract":"Dennis M. Giever is currently Professor and Chairperson of the Department of Criminology at Indiana University of Pennsylvania. Prior to coming to IUP he was Assistant Professor of Criminal Justice at New Mexico State University. He has been exploring various security education issues at the Academic/Practitioner Symposia hosted by the American Society for Industrial Security and held in various universities throughout the United States.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123612221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/J460v02n02_01","DOIUrl":"https://doi.org/10.1300/J460v02n02_01","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128887982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trying to Be a Hero and Winding Up a Zero","authors":"H. Cooper","doi":"10.1300/J460v02n02_02","DOIUrl":"https://doi.org/10.1300/J460v02n02_02","url":null,"abstract":"Abstract Personal safety and security is, in the last resort, the responsibility of the individual. The wise do not rely on providence to shield them from the dangers and unpleasantness of modern life. This article explores the phenomenon of victimization and why some seem singled out for harm that others avoid. There are natural defenses and those that can be developed through assessment and training. Some clearly lead more hazardous lives than others. Training, even for those whose fate is placed in the hands of personal protection specialists, is still a necessity and can make all the difference in terms of survival.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134481073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Justice and Ethics","authors":"Philip S. Holt, A. Basden","doi":"10.1300/J460v02n02_05","DOIUrl":"https://doi.org/10.1300/J460v02n02_05","url":null,"abstract":"Abstract “Unauthorized network intrusions affect us all. Worse yet, certain classes of unauthorized network intrusions are a very serious matter; ones in which there are minimal defensive actions to prevent such attacks.” Denial-Of-Service (DoS) and Distributed Denial-Of-Service (DDoS) attacks are the class of attack vectors this paper examines and demystifies. We will examine certain aspects (multi/polyaspectuality) of these class-attacks by investigating the following: • The online statement from Carnegie Mellon's Computer Emergency Response Team (CERT/CC Timeline, May 2001). The interplay of three types of justice: Legal Justice (Jus Ad Rem), Social Justice (Jus Civile), and Natural-Moral Justice, or Ethics (Jus Naturalis), while asking the reasonable question, “Can these three types of justice co-exist?” The application of Lonergan's ethics, whose employment allows for the examination of the good, obligation, and value. • In doing so, we hope to arrive at some preliminary answers that will (1) serve as a concrete foundation that will verify the authenticity of positions and further develop those positions; and (2) serve to undermine and destroy weak positions, the ones which are in fact counterpositions and reverse them to concrete positions that are attentive, intelligent, reasonable, and responsible to the individual, the group that said person is a member of, and the society in which they are situated.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126537649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SECURITY ACADEMIC PROGRAMS","authors":"S. Lancaster","doi":"10.1300/j460v02n01_10","DOIUrl":"https://doi.org/10.1300/j460v02n01_10","url":null,"abstract":"The methodology that we employed in developing this English language-based international academic program list involved gathering information directly from college websites. Many sites did not have a distinct classification for security-related degree programs. Often information was buried under computer science programs or other program listings. There is no single, comprehensive site that displays all the degrees offered in security. Information about the listed institutions was taken from their respective websites. We do not claim that these descriptions are an original creation, nor does this information necessarily reflect our opinions. Also we cannot guarantee that the list is free of errors. This list only provides information on accredited degree programs.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114087233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interview with Todd Stewart, PhD","authors":"John Kostanoski","doi":"10.1300/J460V02N01_07","DOIUrl":"https://doi.org/10.1300/J460V02N01_07","url":null,"abstract":"Todd Stewart is Director for Program for International and Homeland Security, at The Ohio State University, from April 2002. In this capacity, he is responsible for promoting research and study into the homeland-security challenges facing Ohio and the nation, particularly those associated with terrorist activities. His responsibilities include identifying and responding to the research, technology, education, training and","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125626438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/j460v02n01_01","DOIUrl":"https://doi.org/10.1300/j460v02n01_01","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"291 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131691486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Negotiation Tactics in Organizations Applied to Hostage Negotiation","authors":"Jonathan Matusitz, Gerald-Mark Breen","doi":"10.1300/J460v02n01_05","DOIUrl":"https://doi.org/10.1300/J460v02n01_05","url":null,"abstract":"Abstract The purpose of this paper is to take negotiation and its related concepts from the realm of organizational conflict and apply the current communication principles, strategies, and tactics used in organizations to the realm of hostage negotiation in a constructive rather than destructive manner. Another goal of this paper is to show that whether a third-party intervention or a problem-solving method is used, the ultimate goal of negotiation remains identical: to reach cooperation or peace. Yet, the authors inform the readers about the drawbacks and risks of hostage negotiation (i.e., failed manipulative endeavors, lack of effective language use, etc.). Finally, this paper offers suggestions for future research, namely the use of technological aspects that can contribute to a better teaching of negotiation in organizations and better tactics on how to bargain with hostage takers.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115836310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Global Business, Transportation, Trade, and the Concept of Unacceptable Danger","authors":"Lawrence A. Howard","doi":"10.1300/J460V02N01_04","DOIUrl":"https://doi.org/10.1300/J460V02N01_04","url":null,"abstract":"Abstract The purpose of security is to ward off unacceptable danger. Narrowed in translation to cargo security, it means to keep the goods, merchandise, or passengers transported in domestic and international commerce free of unacceptable dangers. Sounds reasonable, correct? But, there is an issue begged: what constitutes “unacceptable danger” when it comes to commercial goods, merchandise, or passengers? It is a question no less thorny than and directly related to the question of what constitutes unacceptable danger in a larger cultural, economic, and political context. How a person answers the question of what constitutes “unacceptable” danger, in any context, is dependent upon his or her perceptions derived from the different layers of culture in which he is embedded. People strike a balance in their own minds among competing priorities and probabilities of disaster. Collectively this balancing act is the basis for how we determine public and private policy, including policy on cargo security. There is a real problem with this general approach when we realize that it isn't the probability of an event that matters, but whether or not it can actually happen, whatever the unlikelihood of it. The implications of a nuclear bomb being hidden in the cargo hold of a ship anchored in New York harbor make most nightmares wimpy things in comparison; such an event may be unlikely, but it can happen. The question is whether the improbable event is an unacceptable danger that is worthy of being warded off by a significant investment of time, money, and human resources.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128914248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}