This document provides information on security operations, including the hierarchy of control in the workplace and regulations for security guard dogs. It also discusses the legal use of restraints and conflict resolution strategies. Additionally, it explores the role of security officers in emergency situations.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:SECURITY OPERATIONS CPPSEC5002A COORDINATE SECURITY OPERATIONS (Assignment Four) Name of the student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1SECURITY OPERATIONS Question 1 The hierarchy of control is generally referred as one of the methods that is generally utilized by the employees for eliminating or for minimizing the risks within the entire workplace which is further based on the principle that mainly includes: Elimination Substitution Engineering controls Various types of administrative procedures Personal protective based environment The principle of the elimination that is utilized within of the offices of Shopping center when the security guard generally gets employment within that organization for resolving that matter that occurs due to a disruptive customer within the entire building (Jarpey and McCoy 2017).As the Shopping center manager generally reflects that the security guard helps in escorting someone and it is generally considered as one of the responsibilities of the managers for successfully moving within that area that items generally get tripled for ensuring that the security guard mainly uses a safe path for escorting the person out. When the security staffs generally work as a crowd controller during the substitution of various drinking glass containers or for example no drinks in the social events generally helps in removing the risk tat based on the crowd controllers who are being assaulted by the one such that the entire audience get broken. The environmental design that is generally based on the offices of the Shopping center needs to be properly engineered in a proper way such that it clearly helps in separating the seat of the
2SECURITY OPERATIONS customers. The entire spaces that exists between the sections id helpful in providing easy access to Shopping center security that further respond to the clients (Koorevaaret al.2016). Question 2 Question 2a As per the Western Australian Dog Act 1976 and Dog Regulations2013, it is found that security guard dogs are generally needed to wear a proper collar with read as well as white strips in order to properly determine them being as a dog. When they are generally not working then the guard dogs generally get confined with the enclosures from which they cannot get escape / Moreover, it is found that proper utilization of regulations is generally used that generally covers the proper utilization of the guard dogs as the security dogs. Question 2b The power of the apprehension that is mainly utilizedwithin the W.A. Criminal Investigation Act 2006 in part 3 and part 4. Under this specific act, the police generally need arrest as well as properly detailed people without the warrant purpose that further helps in preventing violence. It is analyzed that aby of the lesson can be arrested if they are generally suspected. Moreover, it found that the security can generally be able to successfully detaining the person long as it is mainly necessary for the police officers to reach that the situation on time. Question 2c In order to carry out security-based activities, the security guards’ meeds to meet the requirements that are stated below:
3SECURITY OPERATIONS Before making proper license-based application, the security guards generally need to obtaining proper training-based certificate that is required to be approved with the help of registered training organizations (Miloslavskaya, Tolstoy and Zapechnikov 2016). Proper completion of the firearm training that generally required to be approved with the help of the registered appropriate training-based organization for getting the certificate. It is found that obtaining proper medical certificate that elaborates physically as well as psychologically fit. Question 2d Guidelines regarding the legal use of restraints are covered in Division 6 of the W.A. Mental Health Act 2014. It is found that this particular Act generally includes proper definition of the bodily restraint that means the methods as well as level of force that is generally utilized for restraining the person who generally can be able to successfully restraints to be utilized for using restraints that is permitted to be used by another person. Question 2 e It is found that in Australia, there is no appropriate rulesin context to the utilization of various handcuffs for proper security staffs that generally works within the role that further assists in restraining the violent people and additionally for the police the decision of whether to use the handcuffs to needs to be taken as per the situation needs to be considered (Stein 2018). Question 2f The guidelines that are associated with the legal utilization of the security officers that generally contains the section 26 that further help dib specifying that the security officer needs for the police license based services that risk needed to be approved to have proper endorsement
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4SECURITY OPERATIONS in order to place the security license by providing them proper permission to carry out the baton successfully. The requirements that are required to be meet by the security officer in order to obtain baton endorsement are reflected below: Proper completion of training based on Baton that needs to be successfully approved with the help of reregistered training (Sundaramurthyet al.2016). Proper obtaining the letter of the intent that further helps in stating that proper Barton needs to be carried as part of the duties that are associated with the security officer. Question 2g Within Australia, it is quite necessary to properly carry outoleoresin capsicum spray’ is referred to in the W.A.Weapons Regulations 1999where it is falls under the category of controlled weapons and the W.A.Weapons Act 1999states that a controlled weapon may not be carried “...without a lawful excuse”. It is generally permitted by the police of the western Australia got carrying out the pepper spray such the child is within the various security employees within the western Australian transit officers. Question 3 It is found that the security officers generally utilize proper force that is generally needed for finishing the project objective quite necessary for removing an individual for successfully preventing from committing an offence. The security guards are mainly employed for working within the offices that generally have different types of force-based options that are being used. The examples generally helps in
5SECURITY OPERATIONS reflecting that there are generally three different types of options that are being utilized within the entire module, if the security guard generally hears that the customers are yelling It is found that the presence of proper security guard next to them does not generally lead them to yell however the customers generally change the behaviour and lowers their voice (Williams 2016). In addition to this, the security can also use second option where they generally ask the customers to reduce their voice and speak properly and thus, they generally help in managing the disruptive behaviour. Question 4 As the project manager, I become very much aware about the underperformance of the employees then the first and the most important step is to determine the details of the underperformance. For example, the inability of performing the duties as their position that is further followed y the regulations as well as rules of the workplace. After the proper assessing as well as determination of the project, I will be able to organize a proper meeting with the various employees who are incapable of performing well. While arranging the proper meeting, I will know the appropriate purpose of the meeting and generally lead them to know for supporting the person. I would further as the various employees to provide proper point of view that further lead them to know that I am happy when they ask questions if they need to know. With them, I can properly discuss the proper solutions and can be able to encourage them to contribute for deciding what type of solutions that is generally considered. After proper discussion, the problem is considered as evident that the underperformance is mainly due to improper skills as well as training facility.
6SECURITY OPERATIONS Question 5 If an employee faces conflict while communicating with the other employee then it can be analyzed that one of the employees is generally power over the other employee and the main reason that is mainly identified for this particular situation is prejudice for the opinions as well as successful and effective clarity of the roles (Xu, Fortinet Inc2018).The main result of the one of the employees using the power is mainly that the employee that generally have less power can be bullied and as a result that person will suffer negatively. It is found that any of the force that is utilized should be considered reasonable that must be justified as well as proportionate at the same time of the situation. Question 6 For resolving the conflict, proper meeting is generally arranged with the two employees by opening the discussion by properly setting the scene that explains the steps about what are generally discussed and how in will be able to make it clear with the help of the support of others. Within the entire discussion, I generally ensure that proper listening skills is generally important for keeping the issues separate from others. Then I will determine issues by properly clarifying the feelings of the employees. Before moving forward, I generally want to make sure that everyone generally agree with the problem that occurs. By successfully agreeing on the problem, we generally brainstorm some of the best possible solutions and generally come up with the new solutions that will further be helpful in resolving the issues (Zhao, Yan and Zhang 2017).The next step that we need to utilize is to properly evaluate rhea various types of solutions in order to effectively negotiate with the employees in order to consider the solution that is generally acceptable.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7SECURITY OPERATIONS Question 7 Within the workplace that is the Shopping center office, a number of critical incidents can generally create threat for the lives of the customers as well as staffs in order to reach to a specific goal such that they are generally outside the authority as well as skill level of the staffs for successfully dealing with the security guards. The Durres alarms bottoms are generally hardwired with the electrical system of the building which is considered as one of the robust systems that is considered as one of the emergency generators that automatically switches off when the problem of power failure generally occurs (Jarpey and McCoy 2017). In addition to this, it is reflected that an emergency button is also present at the back of the office that is generally utilized when the critical incident generally involves. For example, when a specific person using a weapon then the emergency button should be used that generally helps in sending immediate signal to the police that further leads the tactical response team is generally needed. Thus, the emergency button that is generally generally helps in limiting off to the public as the employee’s ac easily reach to the button. Question 8 It is identified that in order to provide effective support to the team within the workplace who are generally not performing well, it is quite necessary to follow different types of steps that are mainly listed below: Proper information analysis Providing proper information Gathering of effective information
8SECURITY OPERATIONS Utilizing the problem-solving skills Agreeing on different types of actions Utilization of follow up techniques It is analyzed that there are a number of occasions when working as the role of security guard with the organization Centrelink, it is quite necessary for me to give proper support by successfully underperforming the guard and further assists them in improving the standards that are generally based on the performance of the work. For example, the security guards who joined their duties as security guard within Centrelink, faces a lot of challenges in rostering work and were quite afraid and due to improper behaviour of the guard, the service of the customer can get impacted. In such a situation, it is the responsibility of the manager to take proper actions (Badmus2015).Then, it is found that one to one conversation with the security guards as well as proper explanation bout the issues so that they are responding issues. In addition to this, it is found that I showcase empathy by successfully elaborating that I as a security guard very much aware about the role and about the steps that are required to be used for responding to the customers.
9SECURITY OPERATIONS Bibliography Attinà, F. and Irrera, D., 2016.Multilateral security and ESDP operations. Routledge. Badmus, I., 2015.The African Union's Role in Peacekeeping: Building on Lessons Learned from Security Operations. Springer. Dog Act 1976(WA). Retrieved from https://www.legislation.wa.gov.au Find Law Australia. (2018) Are Police Officers Required to Handcuff Every Person Placed Under Firearms Act 1973(WA). Retrieved from https://www.legislation.wa.gov.au Gordon, K.O., Czekanski, W.A. and DeMeo, J.A., 2016. Assessing the influence of sport security operations on the guest experience: Using the Delphi method to understand practitioner perspectives.Journal of Sport Safety and Security,1(1), p.2. Jarpey, G. and McCoy, S., 2017.Security Operations Center Guidebook: A Practical Guide for a Successful SOC. Butterworth-Heinemann. Koorevaar, T., Pourzandi, M. and Zhang, Y., Telefonaktiebolaget LM Ericsson, 2016.Elastic enforcement layer for cloud security using SDN. U.S. Patent 9,304,801. Lemmey, T. and Vonog, S., LENS VENTURES, LLC, 2016.Management of drone operations and security in a pervasive computing environment. U.S. Patent 9,292,705. Miloslavskaya, N., Tolstoy, A. and Zapechnikov, S., 2016, August. Taxonomy for unsecure big data processing in security operations centers. In2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)(pp. 154-159). IEEE.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10SECURITY OPERATIONS Stein, M., 2018. Integrating unmanned vehicles in port security operations: an introductory analysis and first applicable frameworks.Ocean Yearbook Online,32(1), pp.556-583. Sundaramurthy, S.C., McHugh, J., Ou, X., Wesch, M., Bardas, A.G. and Rajagopalan, S.R., 2016. Turning contradictions into innovations or: How we learned to stop whining and improve security operations. InTwelfth Symposium on Usable Privacy and Security ({SOUPS} 2016)(pp. 237-251). Williams, P.D., 2016. The African Union's Role in Peacekeeping: Building on Lessons Learned from Security Operations by Isiaka A. Badmus New York: Palgrave-Macmillan, 2015. Pp. 296. $100 (hbk).The Journal of Modern African Studies,54(3), pp.540-542. Xu,X.,FortinetInc,2018.Reducingredundantoperationsperformedbymembersofa cooperative security fabric. U.S. Patent Application 10/084,825. Zhao,X.,Yan,H.andZhang,J.,2017.Acriticalreviewofcontainersecurity operations.Maritime Policy & Management,44(2), pp.170-186.