¶ … Crime
Workplace is not safe from numerous types of crimes. These crimes can range anywhere from burglary to homicides and from discrimination on the basis of sex to even rape for that matter. But these crimes are physical crimes and it is easy to avoid them or keep them at bay by making use of physical barriers, security cameras and a few sensible risk/security management tactics. For instance, if only 3 or 4 people work at night-time, it is easy to target anyone of them but if a considerable amount of people work together and have no hostility towards each other, these types of situations can be avoided. Use of security systems is a pre-requisite for the protection of material wealth and belongings. These types of systems can help avoid theft and burglary but if somehow these do occur, it will inform the managers of the incident at the earliest and also make it hard for the offenders to flee the scene of crime.
There are quite a few expressive crimes which occur at place but these are usually the result of bottled-up anger and frustration in the staff or clients. If customers do not get proper service and customer care, they will end up being violent and this may result in violence, arson or even vandalism for that matter. If there is any kind of discrimination in the staff, promotions get offered on personal preference rather than professional capability, this will provoke the staff to the highest degree possible and crime will definitely be a repercussion of that.
There should be no discrimination of any kind in the workplace. Promotions and perks should be awarded on merit and everyone should get equal opportunity in every sense of the word. This is the root cause of violence which is usually done by insiders and goes on to become an incident of crime. Customers should be given the highest priority and they should be given highest level of respect and consideration. Other crimes can be avoided if there is a proper check at entrance at all times. If anyone enters or leaves the workplace, it should be recorded and a proper record should be maintained. Security systems and surveillance cameras are very important in this time and age. Access to the staff of organization should be given carefully, if anyone can enter, the security will become compromised.
However, cyber crime is the most challenging crime for any security manager to deal with. There is no physical evidence of it occurring and neither the perpetrators are nearby. It is not easy to track these criminals and the kind of damage they can do to an organization, person or the government, it becomes imperative to be technologically equipped, legally prepared and internationally permitted to deal with these kinds of criminals and their crimes. Cyber crime is inclusive of a range of different crimes. I have discussed about ways to avoid them, legally check them and confront them.
Identity theft occurs when virtual criminals gain access to private information of people; for instance place of residence, DOB and/or details of bank accounts). They take advantage of it by attempting to create fake accounts. Online scams occur when virtual offenders gain access to monetary or other kinds of important information by deceitful methods, typically by fooling people through frauds such as purchase deceit (wherein individuals are made to pay for goods which will not even be delivered to them).
'Phishing' is another fraudulent activity in which cyber criminals send fake money transfer requests from foreign countries to innumerable email accounts for the purpose of deceitfulness. 'Spear phishing' is a more specific approach in which a single individual is targeted with personalized fake emails. Virtual offenders also attempt to make people enter details into a bogus website and this is known as 'spoofing.' Pharming' is another tactic used by cyber criminals in which they re-direct website traffic from genuine website to a fake/bogus website.
Scareware is another such method of fooling people wherein cyber criminals make people download fake software into their computer. This can be any software but instead of performing the task it was created with, it proves detrimental to the computers where it has been downloaded; for instance, counterfeit anti-virus software) by making use of fright tactics or other immoral advertising practices. This aforementioned software is usually unsuccessful but it may seem to tackle some kind of virus prior to infecting the system with the viruses it contains. Later, the victims have an undeniable need to give payments to these offenders so as to get rid of the virus and any impact it might have had on the entire system.
Financial or monetary deception occurs when cyber lawbreakers can refuse to outstanding dues or make deceptive assertion through the means...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now