10 Oct How have the changes in security affected your daily life? Have you recently used air transportation? If so, how were you screened at the airport?
please be sure to fully answer each question and support your answers with sources.
BOOK: Curtis, G. & McBride, R. (2011). Proactive Security Administration, 2nd. Ed.; ISBN-
13: 9780135071502
MIDTERM SCC3311 | FALL 2023
NAME: _____________________________________ DATE: ___________
1. How have the changes in security affected your daily life? Have you recently used air transportation? If so, how were you screened at the airport?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
2. Under what circumstances can a law enforcement officer be held criminally responsible for the death of an individual?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
3. What is the meaning of vicarious liability and what must be shown to impose it on an employer?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
4. Select a major agency or organization in your community that has a security service to protect human and material assets. Define their client area as discussed in Chapter 3.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
5. What is the purpose of a fusion center and how does it assist in interagency law enforcement efforts?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
6. What is negligence and how can it be mitigated by businesses?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
7. What is a strict liability crime? Please provide examples, which can be found within Florida State Statutes.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
8. Describe what a SWOT analysis is and provide an example related to the security profession.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
9. Describe the four major planning phases to address risk.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
10. Describe the term “cost benefit analysis” and provide an example found within the security profession.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
11. Describe the term “enterprise security risk management” and provide an example found within the security profession.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
12. Describe the term “Crime Prevention Through Environmental Design” and provide an example found within the security profession.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
13. Describe the term “layering” and provide an example found within the security profession.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
14. Describe the information assets possessed by security service agencies and methods that could be used to secure those assets.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
15. What countermeasures could be employed to curtail the incidents of identity fraud resulting from the theft of identification information from databases of online merchants, third-party consultants, or affiliated companies?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
16. Should spyware be able to detect whether law enforcement agents are monitoring the use of your computer? Please explain.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
17. Why is it important that casinos have a viable security services program?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
18. Describe the Clery Act and its importance especially within the college and university communities.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
19. Describe the Hearsay Rule and provide some exceptions of the rule to include why such exceptions exist.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
20. Why is the chain of custody important when collecting and processing evidence?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
