please be sure to fully answer each question and support your answers with sources.
BOOK: Curtis, G. & McBride, R. (2011). Proactive Security Administration, 2nd. Ed.; ISBN-
13: 9780135071502
MIDTERM SCC3311 | FALL 2023
NAME: _____________________________________ DATE: ___________
1. How have the changes in security affected your daily life? Have you recently used air transportation? If so, how were you screened at the airport?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
2. Under what circumstances can a law enforcement officer be held criminally responsible for the death of an individual?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
3. What is the meaning of vicarious liability and what must be shown to impose it on an employer?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
4. Select a major agency or organization in your community that has a security service to protect human and material assets. Define their client area as discussed in Chapter 3.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
5. What is the purpose of a fusion center and how does it assist in interagency law enforcement efforts?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
6. What is negligence and how can it be mitigated by businesses?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
7. What is a strict liability crime? Please provide examples, which can be found within Florida State Statutes.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
8. Describe what a SWOT analysis is and provide an example related to the security profession.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
9. Describe the four major planning phases to address risk.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
10. Describe the term “cost benefit analysis” and provide an example found within the security profession.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
11. Describe the term “enterprise security risk management” and provide an example found within the security profession.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
12. Describe the term “Crime Prevention Through Environmental Design” and provide an example found within the security profession.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
13. Describe the term “layering” and provide an example found within the security profession.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
14. Describe the information assets possessed by security service agencies and methods that could be used to secure those assets.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
15. What countermeasures could be employed to curtail the incidents of identity fraud resulting from the theft of identification information from databases of online merchants, third-party consultants, or affiliated companies?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
16. Should spyware be able to detect whether law enforcement agents are monitoring the use of your computer? Please explain.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
17. Why is it important that casinos have a viable security services program?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
18. Describe the Clery Act and its importance especially within the college and university communities.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
19. Describe the Hearsay Rule and provide some exceptions of the rule to include why such exceptions exist.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
20. Why is the chain of custody important when collecting and processing evidence?
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________
