Discuss about the Principles of Security and Crime Prevention.
According to the given case study, during the winter of 2016, complaints of trespass and burglary were been received from the businesses at Mokia Dr. The complaints were against the street youths who had been breaking into the office building and using the bathrooms as well as the office buildings to sleep. They were found sleeping in the common hallway. Many of the times, the street youths had been doing uncivilised activities. The employees felt threatened as they arrived in the office in the morning. Though the youths left as soon as the employees arrived, however, they were terrified. The key challenges included that the youths were putting some ridges in the backdoor that prevented from locking. Moreover, the employees who left last failed to check whether the backdoor was locked, thus leave a vulnerability for the street youths.
Five options to solve the challenges
The five options that could possibly solve the challenges are as follows:
- Ensure that the back door is locked. Since the backdoor opened in a dark alley, hence arrangements of lights could be made in the alley, such that it is well-lit and the employees who stay back late are not afraid to check whether the back door is locked (Tseloni et al., 2017).
- CCTV cameras could be installed in the building including the common hallway. This will ensure that the trespassers could be tracked easily (Collins, Ricks & Meter, 2015). The installation of the CCTV cameras will act as warning for the trespassers as well.
- The lock at the back door could be replaced with a one-way lock, that could only be opened from inside and not from outside. This will prevent trespassers (Sathishkumar & Rajini, 2015).
- Appoint a security guard for guarding the buildings at night, such that the trespassers will not be able to go inside the building.
- Install burglar alarms inside the building, which will go off, alerting the locals as well as the police as soon as trespassers enter the premises (Tseloni et al., 2017).
Details of the options and its impact on the issues
The chosen options are useful and are likely to have a positive impact on the issues. The locking of the backdoor will ensure that the trespassers will not be able to enter the building. The installation of the CCTV camera will ensure that the images of the trespassers are captured and they are identified. The replacement of the lock at the back door, with a one-way lock will ensure that the trespassers will not be able to open the lock from outside the building (Collins, Ricks & Meter, 2015). Appointment of a security guard for guarding the building at night will ensure that trespassers are prosecuted. Installation of burglar alarms inside the building will ward off the trespassers as soon as the alarm goes off.
Two options those are most significant
The options that are most important and significant in preventing the trespassers are the installation of the CCTV cameras and appointing security guards (Collins, Ricks & Meter, 2015). These are most significant. Installation of the CCTV cameras will record the movement of the trespassers and the local police could be given a copy to identify them and punish those (Sennewald & Baillie, 2015). Appointing security guards is also a significant solution, as they will be placed in the vulnerable entry points, thus preventing the trespassers.
Explanation of keeping two options and discarding the rest
The two options mentioned above are kept, since these are the most feasible options. The others are discarded. The option of lighting up the alley near the backdoor is not feasible, since the employees leaving last might not be responsible enough to ensure that the back door is closed, each day (Ortmeier, 2017). The option of the lock at the back door being replaced with a one-way lock, that could only be opened from inside and not from outside, is not chosen since in case of emergency, the backdoor could be used to open from outside (Collins, Ricks & Meter, 2015). The option of the burglar alarms inside the building is not feasible, since an individual has to be appointed to ensure that all the employees have left and the alarm has to be switched on.
It is recommended that the CCTV cameras be installed in the hallway and in the office premises, such that all the activities could be recorded and the trespassers could be traced. Moreover, the CCTV camera footages have to be monitored regularly, such that the trespassers could be identified and arrested by the police. It is also recommended that security guards be appointed to the office building at night, such that the trespassers could be prevented.
Justification of the recommendations
These recommendations are justified since these will ensure the safety of the office premises. Moreover, these recommendations and feasible and can be easily implemented.
Role of the 5 members
The roles of each of the five members are significant and equally important. One of the members completed the review of the case study and comprehended it successfully. One of them highlighted the challenges, while the other recommended solutions to resolve the challenge. Another member framed the recommendations while the fifth member compiled the whole assignment. Each of the members completed their assigned task successfully and with perfection, thus completing the task even before the deadline. Moreover, with the effort of all the members, task 1 has been completed successfully. We learned cooperation and team work, by completing this assignment successfully.
Reflection of the capabilities
Our capabilities include the comprehension skills and understanding of the case study. Moreover, our writing skills also improved while completing the assignment. The enhancements in these academic skills ensure that the future assignments will be completed with diligence and perfection. The writing skills and the communication skills could be further improved, for the future endeavours. Time management skills have to be improved, to distribute the given time equally among all the tasks. Effective planning has to be practiced, such that the tasks are completed with better understanding and perfection.
Evaluation of 5 key strengths and weaknesses
The strengths include comprehensive skills, high levels of understanding, efficient academic writing, increased vocabulary and cooperation among the group members. These skills have been used effectively in the completion of the assignments. With high comprehensive skills, the case study has been understood and analysed. With efficient academic writing skills, simple English with grammatically correct sentences have been used in task 1. With increased vocabulary, the answers are enriched. With successful cooperation among the team members, all the tasks have been completed successfully.
However, the weaknesses include the lack of experience, ineffective communication among the group members, ineffective time management, lack of effective planning and inefficient task distribution among the group members. This task helped in identifying the skills and weaknesses of all the team members and hence each of us can work towards improvement of the skills. Time management is essential and has to be improved such that in future, the assignments could be done successfully with effective time management. Planning is an essential activity. Effective planning ensures that the tasks will be completed successfully. The planning skills have to be enhanced. Thus, with enhancement of the strengths and working on the weaknesses, academic and professional skills will be developed.
Collins, P. A., Ricks, T. A., & Van Meter, C. W. (2015). Principles of security and crime prevention. Routledge.
Ortmeier, P. J. (2017). Introduction to Security. Pearson.
Sathishkumar, M., & Rajini, S. (2015). Smart surveillance system using pir sensor network and gsm. International Journal of Advnced Research in Computer Engineering & Technology, 4(1).
Sennewald, C. A., & Baillie, C. (2015). Effective security management. Butterworth-Heinemann.
Tseloni, A., Thompson, R., Grove, L., Tilley, N., & Farrell, G. (2017). The effectiveness of burglary security devices. Security Journal, 30(2), 646-664.