Security has become one of the primary concerns in the transport sector, not only for the motorist but also for the pedestrians. The goal of traveling is to reach your destination. However, safety in transportation comes first, where many individuals have failed to comply with the regulations imposed by the government. As a result, it is the responsibility not only for the federal government but also for the mass participation of the communities in helping improve safety in our transport sector in the United States.
Reckless driving has remained to be one of the threatening conditions in public transport safety. Each year The United States loses hundreds of people due to road accidents. While this continues to be a human error, safety issues are not widely considered. Today the US is one of the technology giants, a step that has extensively improved the safety of public transport. Yet, technology has failed to record zero accidents and deaths on numerous occasions. Human error remains to be the leading cause of the increased number of accidents, a concept that has increased panic in public transport.
On the contrary, public transportation has become the brewing stage of many terrorist activities, a concept that has slipped between the fingers of the federal government. Since the 9/11 incident, the United States has paid a strong emphasis on fighting against terrorism (Fischer, & Halibozek, 2008). However, not all public transportation has widely implemented the concept. The subways in the nations seem to be at an advanced stage in using different screening and scanning methods, to detect weapons. However, this has not been the case, widely observed in public bus services in the US. The community and most bus services seem to have forgotten the 9/11 incident that brought the nation to its knees.
The change in Information Technology (IT) infrastructure remains to be one of the primary considerations that homeland security and other related bodies should focus on. While traditional methods of improving public safety are mostly dependent on conventional methods to combat security threats, technology infrastructure is one of the most effective ways of dealing with security threats.
The Measures Taken by Governments and Companies in Response to Terrorism.
Since the 9/11 incident, security measures on the fight against terrorism have become a significant concern, with practical steps being considered across the nation. Bothe, the privet and public sector have joined the fight in numerous ways, which have produced useful results. The US government has worked on comparting terrorism in distinctive ways, some of which have been socially accepted, while others have been criticized by the privet sector on the powers of the government to tap and listen to the citizens' communication. According to the research conducted by (James, & Smith, 2017), nearly 95% of American citizens are concern with the issue of privacy that has been breached by the government. While the American citizens continue to enjoy a terrorism free nation, the entire country has been forced to pay with their privacy being on the frontline, a concept that many still differ with the government steps. The American government has gone to extreme measures in not only taping the communication but also furthered its combating standards on the social media investigation and opinion polls of suspected members.
On the other hand, despite the privacy issue being a primary concern to many Americans, and how the government gets their privet information, it is essential for the national security, and safety of every American citizen. Poor intelligence gathering is one of the leading causes of the 9/11 incident that lest the world in great shock.
Companies in the United States have taken the responsibility of fighting terrorism in conjunction with the federal state. Among the preliminary steps that companies have heavily implemented is security screening to help reduce the ferrying of weapons and improvised explosives. Companies undertake this process fairly and openly, to help create a safer working environment for every employee within the organization's premises. The integration of facial recognition technology, with the federal government and homeland security database, has taken the fight against terrorism in companies to another level. According to James, and Smith, (2017), the use of facial recognition software in a company helps to send vital data of the workers, such as their social security numbers, and their facial recognition data to the federal government database, for further analysis. Through this, the company acts on best interest of promoting security, without being highly involved in the employees' privacy.
The point of sale (register) Theft and the best way to reduce the opportunity for this loss.
The issue of cash theft on the point of sale has remained to be one of the hardest puzzles to solve for many years. The thieves have employed different techniques, with some being tradition yet effective. Among one of the leading causes of theft at the point of sales is due to poor training of the cashers. Cashers do not have a great sense of reading customers' and robbers' behaviors. The number of cases identified in robberies are widely increasing due to the inadequate physical measures employed by the shopkeepers. Hurst, (2018) observed that nearly 30% of the reported cases on theft in point of sale register is due to inadequate security measures employed at the physical level. As a result, the thief widely takes advantage of this loophole to ensure that exploitation is at the highest degree. On the contrary, large keeping amount of money is one of the leading factors that promise higher profits to the thief, if they succeed in their operation. As a result, most cash registers do not consider the concept of emptying their cash registers hourly, an idea that may limit or even discourage theft due to the limited amount.
Among the preliminary concepts, one can employ to identify a thief at the point of sales register is linked to the behaviors and the unease of the suspect. While many understand the power of closed-circuit television (CCTV), they tend to fully cover their identity, with more emphasis employed on covering their head and face. More so, they tend to survey the shop without the intention of buying but rather robing. Their actions are justified by surveying the potential threat the other buyers can pose to them, especially physical resistance, and fighting against them. Once the thieves are confident that there is minimal physical resistance from the cashier, and the other shoppers, it becomes apparent and a go-ahead for their actions.
How Cashless is Affecting the Theft
As we move towards cashless transacting, there is limited motivation towards the point of sale theft we are going to experience. Most of the thieves are motivated by the higher amount of physical cash readily available in the cash register, hence making it easier to escape with. However, the adoption of a cashless transaction culture that is being ushered by the advancement in technology is playing a vital role. As Hurst, (2018) observed, stores with integrated and sophisticated technology, that helps customers shop faster, and securely, have a better chance of increasing their sales since most of the customers are moving towards a cashless transaction process. In the long run, this has fostered and reduced theft issues, which may result in injuries not only to the cashier but also to the innocent customers present at the store.
Other Security Techniques for Ms. Smith to Employ to Curb Shoplifting Losses
The use of radiofrequency ids is among the conventional techniques in the market that is used to curb security issues, especially where extensive inventories are used. Moreover, the use of RFIDs is more accurate as compared to the employment of the detectives to help detect shoplifting. Additionally, Ms. Smith should ensure that inventor store employees have minimal access to the storage area as a way of minimizing accountability. Workers should use particular ideas controlled by the level of their privileges. Through this, the storage area can be accessed by only authorized employees.
Other shrink Options That Ms. Smith should Consider.
After Ms. Smith implemented new methods of curbing theft in the store, it was expected that inventory shrinking was to reduce drastically. However, over the past six months, the situation has not changed yet, to the desired figure or meeting zero inventory shrinking. As a result, it is now time for her to review different other considerations, that she might have turned a blind eye, which is affecting the security in the firm. One of the areas that Ms. Smith should highly focus on is the delivery of the inventory, through assessing their quantity and quality. There is a higher possibility of the inventory shrinking emanating from short supplies, which are not fully accounted for. As a result, Ms. Smith should turn her attention to the records of the inventory to ensure that the miss matching figures are solved.
Where to Concentrate Based on the Shrinking Statistics
My main concern will be geared towards the storage sector, and the quantity of the inventory, since the detectives and the surveillance video system, are working to eliminate shoplifting. On the other hand, Ms. Smith should pay special attention to the volume of the inventory, being added, and deducted to help curb any inventory shrink.
References
Fischer, R. J., & Halibozek, E. (2008). a Gion GREEN. Introduction to security.
Hurst, M. (2018). Project EJECT: A Whole Different Ballgame in Fighting Violent Crime in the City of Jackson. US Att'ys Bull., 66, 13. https://heinonline.org/HOL/LandingPage?handle=hein.journals/usab66&div=100&id=&page=
James, A., & Smith, B. (2017). There will be blood: Crime rates in shale-rich US counties. Journal of Environmental Economics and Management, 84, 125-152. doi.org/10.1016/j.jeem.2016.12.004
Cite this page
Essay Example on Safety First: Improving Transportation Security Together. (2023, Apr 24). Retrieved from https://proessays.net/essays/essay-example-on-safety-first-improving-transportation-security-together
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Enterprise Risk Management
- Management Decision Problem for Increasing Share of the Athletic Shoe Market
- Program Planning: Optimizing Resources for Goal Attainment
- Operational Management: Roles, Techniques & Strategies - Essay Sample
- Paper Example on Maximizing Performance in Healthcare: Why Project Portfolio Management Matters
- Essay Example on IT Governance: A Necessity for Effective Business Strategies
- Organizational Scenario Paper Example