Verified Document

Securing Facilities Research Paper

Reducing Vandalism at Shopping Malls Securing Facilities

Reducing Vandalism at Retail Shopping Malls

What is Perimeter Security?

Perimeter security can be classified as any effort to reduce criminal activity and similar threats to an establishment that concerns the space between the building's exterior wall and adjacent property (National Capital Planning Commission, p. 10). For retail shopping structure perimeter security this would encompass all areas between the mall's exterior walls and entrances, and the adjacent public sidewalks and streets, and public or private property. This typically includes sidewalks to and from parking lots and garages, landscaped areas owned by the mall, public transportation terminals on mall property, mall parking lots and the interior of parking garages, and drives that provide access to parking facilities from public streets.

Contract or Proprietary Security Services?

Choosing between contract and proprietary security services is primarily determined by the security needs of the retail mall and how much it can afford to spend (Allen and Sawhney, p. 433). Contract security services are cheaper, but there is no guarantee that you will have the same guards from day-to-day. In contrast, proprietary guards are assigned to the retail mall for the duration of the contract. The preferred choice would be to hire proprietary...

The five basic elements of CPTED in relation to a retail shopping mall are as follows (Carter, pp. 18-40):
Natural Surveillance: the design of structures, entry ways, landscaping, and any outdoor seating areas in a manner that reduces or eliminates hiding places and increases visibility. Improved lighting would also be a critical element. Wall murals and outdoor artwork would also attract the eyes of customers, providing additional casual surveillance that can help to discourage illegal activity.

Natural Access Management: the design of customer access routes from streets, sidewalks, and public transportation limits the choices they have, thereby increasing the concentration of people in defined areas. This can be accomplished by providing sidewalks, fencing, lighting, landscaping, and signs that control access to the mall. Security personnel could then focus on any activity occurring outside of these access routes, since customers crowded together would tend to serve as a deterrent…

Sources used in this document:
References

Allen, Jennifer M. And Sawhney, Rajeev. (2010). Administration and management in criminal justice: A service quality Approach. Thousand Oaks, CA: SAGE Publications, Inc. p. 33.

Carter, Sherry P. (2001). Surrounded by safety: A crime prevention through environmental design (CPTED) handbook for youth. YCWA Handbook.

Gibbons, Steve. (2004). The costs of urban property crime. Economic Journal, 114, F441-F463.

National Capital Planning Commission. (2001). Designing for security in the nation's capital. Retrieved May 12, 2011 from http://www.ncpc.gov/UserFiles/File/PDF_files/DesigningSec%5B1%5D.pdf
San Diego Police Department. (2005). Crime prevention through environmental design (CPTED) for urban village centers. Retrieved May 12, 2011 from http://www.sandiego.gov/police/pdf/CPTEDvillagesmay2005.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Securing Personal Information to Prevent Theft
Words: 1303 Length: 4 Document Type: Essay

Identity theft is a kind of theft that involves someone stealing the identity of someone else by assuming that person's identity (Lai, Li, & Hsieh, 2012). This is usually a method of gaining access to the person's resources like credit cards and other things in the person's name. This is considered a white-collar crime and it has gained popularity amongst criminals. According to statistics, each year hundreds of thousands of

Future Planning & Change Management
Words: 4427 Length: 13 Document Type: Research Paper

Predicting the future is not easy, but using past and current trends is the right way to go. At least that will allow those who are making the decisions to be sure that they have considered everything in the best light possible before they choose which direction to take. Planning and Change in Rapid Development One of the main issues with change management and future planning for long-term care facilities right

Protection of Information Systems and Data
Words: 2006 Length: 6 Document Type: Other

Security Cryptography In order to maintain information secrecy one would use cryptography. This is intentionally making information unintelligible. This method is mainly employed during the transmission of information. Cryptography ensures that only the intended person would be able to decipher the information (Whitman & Mattord, 2011, p. 339). The process of deciphering encrypted text is referred to as cryptanalysis. Cryptology is the mathematics branch covering cryptography and cryptanalysis. Cryptology has been

Accreditation Costs of Healthcare Organizations
Words: 1729 Length: 5 Document Type: Essay

Experts in the field claim that the activity of accreditation represents a key mechanism to evaluate healthcare facilities' performance and enhance care delivery safety and quality. The term "accreditation" describes the external assessment process for evaluating hospitals' and other healthcare centers' performance by studying their adherence to a number of pre-established, well-defined written performance benchmarks. It aims at encouraging ongoing quality improvements instead of merely upholding least-required performance levels. Accreditation

Identity Management and Security Awareness
Words: 1839 Length: 6 Document Type: Corporate Writing

However, the security awareness training plan highlights the prominence of auditing and security maintenance of the classified information, since data integrity is the key ingredient of existence for any organization. The questions like who, what, when and where with respect to the changes made in the operating system is essential when auditing the operating system. These questions ensure that the employees are accountable to the changes they make, as a

Human Factor in Cargo Security Is Human
Words: 2299 Length: 8 Document Type: Essay

Human Factor in Cargo Security Is Human Factor important Cargo Security Cargo security I one of the major issues handled with priority by Homeland security department in United States of America. It is regarded as a positional facilitator in terrorism activities. Another notable factor in implementing security measures for cargo was theft as a direct business cost for U.S. It is observed that businesses lost $15b to $30 billion as a loss

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now