CPPSEC5002A Coordinate Security Operations Report Analysis

Verified

Added on  2023/04/06

|11
|2425
|298
Report
AI Summary
This report provides a detailed analysis of security operations, addressing key aspects such as the hierarchy of control for risk minimization in the workplace, legal requirements for security guard dogs, and the use of apprehension powers. It delves into the requirements for security guards, including training and medical certificates, and explores the legal use of restraints and the guidelines for carrying batons and oleoresin capsicum spray. The report also examines the appropriate use of force by security officers, the management of underperforming employees, and strategies for resolving conflicts between employees. Furthermore, it discusses the handling of critical incidents in the workplace, the implementation of emergency procedures, and the steps required to support underperforming team members. This comprehensive overview offers valuable insights into the practical application of security protocols and best practices, making it an essential resource for understanding and improving security operations.
Document Page
Running head: SECURITY OPERATIONS
CPPSEC5002A COORDINATE SECURITY OPERATIONS (Assignment Four)
Name of the student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1SECURITY OPERATIONS
Question 1
The hierarchy of control is generally referred as one of the methods that is generally
utilized by the employees for eliminating or for minimizing the risks within the entire workplace
which is further based on the principle that mainly includes:
Elimination
Substitution
Engineering controls
Various types of administrative procedures
Personal protective based environment
The principle of the elimination that is utilized within of the offices of Shopping center when
the security guard generally gets employment within that organization for resolving that matter
that occurs due to a disruptive customer within the entire building (Jarpey and McCoy 2017). As
the Shopping center manager generally reflects that the security guard helps in escorting
someone and it is generally considered as one of the responsibilities of the managers for
successfully moving within that area that items generally get tripled for ensuring that the security
guard mainly uses a safe path for escorting the person out.
When the security staffs generally work as a crowd controller during the substitution of
various drinking glass containers or for example no drinks in the social events generally helps in
removing the risk tat based on the crowd controllers who are being assaulted by the one such that
the entire audience get broken.
The environmental design that is generally based on the offices of the Shopping center needs
to be properly engineered in a proper way such that it clearly helps in separating the seat of the
Document Page
2SECURITY OPERATIONS
customers. The entire spaces that exists between the sections id helpful in providing easy access
to Shopping center security that further respond to the clients (Koorevaar et al. 2016).
Question 2
Question 2a
As per the Western Australian Dog Act 1976 and Dog Regulations2013, it is found that
security guard dogs are generally needed to wear a proper collar with read as well as white strips
in order to properly determine them being as a dog. When they are generally not working then
the guard dogs generally get confined with the enclosures from which they cannot get escape /
Moreover, it is found that proper utilization of regulations is generally used that generally covers
the proper utilization of the guard dogs as the security dogs.
Question 2b
The power of the apprehension that is mainly utilized within the W.A. Criminal
Investigation Act 2006 in part 3 and part 4. Under this specific act, the police generally need
arrest as well as properly detailed people without the warrant purpose that further helps in
preventing violence. It is analyzed that aby of the lesson can be arrested if they are generally
suspected. Moreover, it found that the security can generally be able to successfully detaining the
person long as it is mainly necessary for the police officers to reach that the situation on time.
Question 2c
In order to carry out security-based activities, the security guards’ meeds to meet the
requirements that are stated below:
Document Page
3SECURITY OPERATIONS
Before making proper license-based application, the security guards generally need to
obtaining proper training-based certificate that is required to be approved with the help of
registered training organizations (Miloslavskaya, Tolstoy and Zapechnikov 2016).
Proper completion of the firearm training that generally required to be approved with the
help of the registered appropriate training-based organization for getting the certificate.
It is found that obtaining proper medical certificate that elaborates physically as well as
psychologically fit.
Question 2d
Guidelines regarding the legal use of restraints are covered in Division 6 of the W.A.
Mental Health Act 2014. It is found that this particular Act generally includes proper definition
of the bodily restraint that means the methods as well as level of force that is generally utilized
for restraining the person who generally can be able to successfully restraints to be utilized for
using restraints that is permitted to be used by another person.
Question 2 e
It is found that in Australia, there is no appropriate rules in context to the utilization of
various handcuffs for proper security staffs that generally works within the role that further
assists in restraining the violent people and additionally for the police the decision of whether to
use the handcuffs to needs to be taken as per the situation needs to be considered (Stein 2018).
Question 2f
The guidelines that are associated with the legal utilization of the security officers that
generally contains the section 26 that further help dib specifying that the security officer needs
for the police license based services that risk needed to be approved to have proper endorsement
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4SECURITY OPERATIONS
in order to place the security license by providing them proper permission to carry out the baton
successfully.
The requirements that are required to be meet by the security officer in order to obtain
baton endorsement are reflected below:
Proper completion of training based on Baton that needs to be successfully approved
with the help of reregistered training (Sundaramurthy et al. 2016).
Proper obtaining the letter of the intent that further helps in stating that proper Barton
needs to be carried as part of the duties that are associated with the security officer.
Question 2g
Within Australia, it is quite necessary to properly carry out oleoresin capsicum spray’ is
referred to in the W.A. Weapons Regulations 1999 where it is falls under the category of
controlled weapons and the W.A. Weapons Act 1999 states that a controlled weapon may not be
carried “...without a lawful excuse”. It is generally permitted by the police of the western
Australia got carrying out the pepper spray such the child is within the various security
employees within the western Australian transit officers.
Question 3
It is found that the security officers generally utilize proper force that is generally needed
for finishing the project objective quite necessary for removing an individual for successfully
preventing from committing an offence.
The security guards are mainly employed for working within the offices that generally
have different types of force-based options that are being used. The examples generally helps in
Document Page
5SECURITY OPERATIONS
reflecting that there are generally three different types of options that are being utilized within
the entire module, if the security guard generally hears that the customers are yelling It is found
that the presence of proper security guard next to them does not generally lead them to yell
however the customers generally change the behaviour and lowers their voice (Williams 2016).
In addition to this, the security can also use second option where they generally ask the
customers to reduce their voice and speak properly and thus, they generally help in managing the
disruptive behaviour.
Question 4
As the project manager, I become very much aware about the underperformance of the
employees then the first and the most important step is to determine the details of the
underperformance. For example, the inability of performing the duties as their position that is
further followed y the regulations as well as rules of the workplace.
After the proper assessing as well as determination of the project, I will be able to
organize a proper meeting with the various employees who are incapable of performing well.
While arranging the proper meeting, I will know the appropriate purpose of the meeting and
generally lead them to know for supporting the person.
I would further as the various employees to provide proper point of view that further lead
them to know that I am happy when they ask questions if they need to know. With them, I can
properly discuss the proper solutions and can be able to encourage them to contribute for
deciding what type of solutions that is generally considered. After proper discussion, the problem
is considered as evident that the underperformance is mainly due to improper skills as well as
training facility.
Document Page
6SECURITY OPERATIONS
Question 5
If an employee faces conflict while communicating with the other employee then it can
be analyzed that one of the employees is generally power over the other employee and the main
reason that is mainly identified for this particular situation is prejudice for the opinions as well as
successful and effective clarity of the roles (Xu, Fortinet Inc2018). The main result of the one of
the employees using the power is mainly that the employee that generally have less power can be
bullied and as a result that person will suffer negatively. It is found that any of the force that is
utilized should be considered reasonable that must be justified as well as proportionate at the
same time of the situation.
Question 6
For resolving the conflict, proper meeting is generally arranged with the two employees
by opening the discussion by properly setting the scene that explains the steps about what are
generally discussed and how in will be able to make it clear with the help of the support of
others. Within the entire discussion, I generally ensure that proper listening skills is generally
important for keeping the issues separate from others. Then I will determine issues by properly
clarifying the feelings of the employees. Before moving forward, I generally want to make sure
that everyone generally agree with the problem that occurs.
By successfully agreeing on the problem, we generally brainstorm some of the best
possible solutions and generally come up with the new solutions that will further be helpful in
resolving the issues (Zhao, Yan and Zhang 2017). The next step that we need to utilize is to
properly evaluate rhea various types of solutions in order to effectively negotiate with the
employees in order to consider the solution that is generally acceptable.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7SECURITY OPERATIONS
Question 7
Within the workplace that is the Shopping center office, a number of critical incidents
can generally create threat for the lives of the customers as well as staffs in order to reach to a
specific goal such that they are generally outside the authority as well as skill level of the staffs
for successfully dealing with the security guards.
The Durres alarms bottoms are generally hardwired with the electrical system of the
building which is considered as one of the robust systems that is considered as one of the
emergency generators that automatically switches off when the problem of power failure
generally occurs (Jarpey and McCoy 2017).
In addition to this, it is reflected that an emergency button is also present at the back of
the office that is generally utilized when the critical incident generally involves. For example,
when a specific person using a weapon then the emergency button should be used that generally
helps in sending immediate signal to the police that further leads the tactical response team is
generally needed. Thus, the emergency button that is generally generally helps in limiting off to
the public as the employee’s ac easily reach to the button.
Question 8
It is identified that in order to provide effective support to the team within the workplace
who are generally not performing well, it is quite necessary to follow different types of steps that
are mainly listed below:
Proper information analysis
Providing proper information
Gathering of effective information
Document Page
8SECURITY OPERATIONS
Utilizing the problem-solving skills
Agreeing on different types of actions
Utilization of follow up techniques
It is analyzed that there are a number of occasions when working as the role of security guard
with the organization Centrelink, it is quite necessary for me to give proper support by
successfully underperforming the guard and further assists them in improving the standards that
are generally based on the performance of the work. For example, the security guards who joined
their duties as security guard within Centrelink, faces a lot of challenges in rostering work and
were quite afraid and due to improper behaviour of the guard, the service of the customer can get
impacted. In such a situation, it is the responsibility of the manager to take proper actions
(Badmus 2015). Then, it is found that one to one conversation with the security guards as well as
proper explanation bout the issues so that they are responding issues. In addition to this, it is
found that I showcase empathy by successfully elaborating that I as a security guard very much
aware about the role and about the steps that are required to be used for responding to the
customers.
Document Page
9SECURITY OPERATIONS
Bibliography
Attinà, F. and Irrera, D., 2016. Multilateral security and ESDP operations. Routledge.
Badmus, I., 2015. The African Union's Role in Peacekeeping: Building on Lessons Learned from
Security Operations. Springer.
Dog Act 1976 (WA). Retrieved from https://www.legislation.wa.gov.au
Find Law Australia. (2018) Are Police Officers Required to Handcuff Every Person Placed
Under
Firearms Act 1973 (WA). Retrieved from https://www.legislation.wa.gov.au
Gordon, K.O., Czekanski, W.A. and DeMeo, J.A., 2016. Assessing the influence of sport
security operations on the guest experience: Using the Delphi method to understand practitioner
perspectives. Journal of Sport Safety and Security, 1(1), p.2.
Jarpey, G. and McCoy, S., 2017. Security Operations Center Guidebook: A Practical Guide for
a Successful SOC. Butterworth-Heinemann.
Koorevaar, T., Pourzandi, M. and Zhang, Y., Telefonaktiebolaget LM Ericsson, 2016. Elastic
enforcement layer for cloud security using SDN. U.S. Patent 9,304,801.
Lemmey, T. and Vonog, S., LENS VENTURES, LLC, 2016. Management of drone operations
and security in a pervasive computing environment. U.S. Patent 9,292,705.
Miloslavskaya, N., Tolstoy, A. and Zapechnikov, S., 2016, August. Taxonomy for unsecure big
data processing in security operations centers. In 2016 IEEE 4th International Conference on
Future Internet of Things and Cloud Workshops (FiCloudW) (pp. 154-159). IEEE.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10SECURITY OPERATIONS
Stein, M., 2018. Integrating unmanned vehicles in port security operations: an introductory
analysis and first applicable frameworks. Ocean Yearbook Online, 32(1), pp.556-583.
Sundaramurthy, S.C., McHugh, J., Ou, X., Wesch, M., Bardas, A.G. and Rajagopalan, S.R.,
2016. Turning contradictions into innovations or: How we learned to stop whining and improve
security operations. In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016) (pp.
237-251).
Williams, P.D., 2016. The African Union's Role in Peacekeeping: Building on Lessons Learned
from Security Operations by Isiaka A. Badmus New York: Palgrave-Macmillan, 2015. Pp. 296.
$100 (hbk). The Journal of Modern African Studies, 54(3), pp.540-542.
Xu, X., Fortinet Inc, 2018. Reducing redundant operations performed by members of a
cooperative security fabric. U.S. Patent Application 10/084,825.
Zhao, X., Yan, H. and Zhang, J., 2017. A critical review of container security
operations. Maritime Policy & Management, 44(2), pp.170-186.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]