2 Discussion Questons

0 comments

1. Why do you think
businesses invest in high tech security surveillance systems and then fail to
man them during critical hours? This is a common practice in retail which
commonly uses their system to investigate after the fact. Is it due to one of
the five methods of risk management? Justify the company’s actions for this
behavior.

Participation Requirements for Each Forum:

Consult the grading rubric in the Faculty & Course Info
section for the grading criteria.

Original discussion board posts:

Create a thread for your original post identified with your
name

250 words long with proper punctuation, capitalization,
and grammar

Include three (3) different sources

2.Given the basis of
the “Theft Triangle”, why don’t employers implement processes and safeguards to
keep theft from occurring? Pretend you are the Chief Security Manager, what can
be done to eliminate completely the elements of the theft triangle?

Participation Requirements for Each Forum:

Consult the grading rubric in the Faculty & Course Info
section for the grading criteria.

Original discussion board posts:

Create a thread for your original post identified with your
name

250-350 words long with proper punctuation, capitalization,
and grammar

Include three (3) different sources

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}