Project #76537 - Security planning

Must reference something from my class book I chose to add shoplifting but if you want something else specific to reference from my book just message me. The file is attatched.

 

 

Final Project: Case Study

The student will design a comprehensive Security Plan for:

1 of the following-

  • a local public library. 
    • If the library is contained within another building or structure, then the Security Plan should address the structure in general, and the library in particular as the security target.
  • a full-service grocery store
    • Acceptable: national/regional food store chain (e.g., Giant, Kroger, Win-Dixie, military base commissary, etc.)
    • Not acceptable: local mini-mart (e.g., 7-Eleven, Wa-Wa, Highs, etc.)
  • A full-service department store
    • Acceptable: national/regional department store (e.g., Macys, Sears, Wal-Mart, military base PX,etc.)
  • A full-service hardware store
    • Acceptable: national/regional chain hardware/lumber retailer (e.g., Lowes, Home Depot, 84 Lumber, military base PX, etc.)

 NOTE: If ALL of these proposed sites are impossible, contact your instructor for an alternate project located in the "Instructor Only" area of the classroom .

Write an 1,600 (minimum) to 2.000 (maximum) word report that addresses the issues and problems listed. References must include the text and at least three (3) external (not class instructional material) scholarly sources that support the points made in the report. 

Address the following general topic areas:

· Physical plant intrusion (e.g., burglary)

· Property damage, interior and exterior (e.g., vandalism, theft, etc.)

· Personal security (e.g., assault, personal property loss/damage, etc.)

· Information/records security

· Emergency planning and response

· OSHA standards and violations

· Hiring practices

· Training practices

· Legal issues unique to the site

· Recommended policies and procedures (topics only)

You must also apply the risk management principles learned in class; namely,  identification of assets, identification of risks or threats, assessment of probability of individual threat occurrence and the criticality of those threats.  


Any comprehensive security plan should consider the least expensive strategy that effectively and efficiently addresses the identified need. 

Format Requirements

  • Include an introductory section that explains the purpose of the paper; provides brief summary of the facility being reviewed; and details the crime prevention and security measures currently in place.
  • Include your overview of security issues that will be addressed in your security plan
  • Paper should be a minimum of  1,600 to a maximum of 2,000 words in narrative  text
  • Include (upload) a minimum of 4 photographs or sketches capturing security concerns and references in the Security Plan
  • References must include the text and at least three (3) external scholarly sources (not course instructional material)
    • The best source for "scholarly" references in the UMUC Library ...see RESOURCES on our Classroom page.
  • Double space, 12 pt. font, 1” margins
  • Use American Psychology Association  (APA) content citation format for all sources
  • Include a reference page using APA format guidelines (not included in page count)


Additionally -

· Create a cover page for your assignment (not included in word count)

· Include your name

· Course title and number

· Project title

· Date of submission

 

 
 

 

Rubric Name: Project 3 Rubric 4-1-15

 
Criteria

 Content of the paper demonstrates acomprehensiveunderstanding of how the organization operates, its complexities, and identifies all organizational assets at risk to a variety of hazards.

 

Range  9.0 - 10.0

Content of the paper demonstrates a goodunderstanding of how the organization operates, its complexities, and identifies all organizational assets at risk to a variety of hazards. 

Range 8.0 - 8.9

Content of the paper demonstrates asuitableunderstanding of the organization/premises and identifies several organizational assets at risk to a variety of hazards.

Range 7.0 - 7.9

Content of the paper demonstrates no or little understandingof the organization/premises and identifies limited or no organizational assets at risk to a variety of hazards.

Range   D = 6.0 - 6.9   F = 0.0 - 5.9

Content of the paper identifies all the possible loss events and vulnerabilities.

Range  9.0 - 10.0

Content of the paper identifies most of the possible loss events and vulnerabilities

Range 8.0 - 8.9

Content of the paper describes severalpossible loss events and vulnerabilities.

Range 7.0 - 7.9

Content of the paper describes limited or no

possible loss events and vulnerabilities.

Range   D = 6.0 - 6.9   F = 0.0 - 5.9

Content of the paper assesses the probability and the impact of all loss risk events. 

Range  9.0 - 10.0

Content of the paper assesses the probability and the impact of most loss risk events.  

Range 8.0 - 8.9

 Content of the paper assesses the probability and the impact of several loss risk events.

Range 7.0 - 7.9

Content of the paper includes limited or noassessment of the probability and the impact of loss risk events. 

 

  Range   D = 6.0 - 6.9   F = 0.0 - 5.9

 Content of the paper assesses all the options to manage risks, including the potential security controls to be employed and the feasibility of implementing the options.

 

Points available: 9-10

 

Content of the paper assesses mostoptions to manage risks, including the potential security controls to be employed and the feasibility of implementing the options.

Range 8.0 - 8.9

Content of the paper assesses severaloptions to manage risks, including the potential security controls to be employed and the feasibility of implementing the options.

Range 7.0 - 7.9

Content of the paper includes limited or noassessment of the options to manage risks, including the potential security controls to be employed and the feasibility of implementing the options.

Range   D = 6.0 - 6.9   F = 0.0 - 5.9

 

Content of the paper presents a comprehensivecost/benefit analysis of the proposed security program.

Range  13.5 - 15

 

Content of the paper presents a goodcost/benefit analysis of the proposed security program.

Range  12.0 - 13.4

 

Content of the paper presents a suitablecost/benefit analysis of the proposed security program.

Range   10.5 - 11.9

Content of the paper presents a limited or no cost/benefit analysis of the proposed security program.

Range   D= 9.0 - 10.4   F= 0.0 - 8.9

Assignment is formatted exactly as required, all required citations and references are present and APA standards are followed in every respect. 

Range  9.0 - 10.0

Assignment is formatted as required with minor/ inconsequential deviations, resource requirements are met, citations and references are present and APA standards are followed. 

Range 8.0 - 8.9

Assignment mostly formatted as required but missing some required elements/ sources or some APA errors are evident.  

Range 7.0 - 7.9

Assignment is missing major elements, lacks required sources or APA is not followed however a different citation method is used correctly. 

Range   D = 6.0 - 6.9   F = 0.0 - 5.9

No or minor English and grammar usage errors.  

Range  9.0 - 10.0

A few minor/ inconsequential mistakes in English and grammar.  

Range 8.0 - 8.9

A few minor/ inconsequential mistakes in English and grammar.  

Range 7.0 - 7.9

Many mistakes evident in English/grammar usage.  

Range   D = 6.0 - 6.9   F = 0.0 - 5.9

Overall Score
         

Subject English
Due By (Pacific Time) 07/24/2015 12:00 am
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy