Essay Example on Security After 9/11: Coping with Increased Terror Threats

Paper Type:  Essay
Pages:  7
Wordcount:  1795 Words
Date:  2023-04-24

Security is now a central theme identified by the majority of individuals in every nation. The repercussions that transpired on September 11, 2001, after the attack of the World Trade Center in New York and the Pentagon in Washington, has dazed the entire security industry, both for the private and government institutions (Fischer, Edward & Walter, 2012). Attached to the security industry' s retort to the increasing threat of global terrorism, is the requirement of coping with the speedily changing technology used by criminals and pirates. Traditionally, information protection was done by putting it in cupolas and designating its proprietary or top secret, although today, it is more complex. The various security threats in the 21st century include White-Collar Crime, burglary and robbery, labor disputes, espionage, and piracy (Belleflamme & Peitz, 2010). This paper aims to discuss piracy or illegal copying of products by highlighting why piracy is a concern, how it differs with bootlegging in the recording industry, who is responsible in maintaining security, and why security managers should become instructors and salespeople for security programs.Reasons for having Concern Over the Illegal Copying of Products

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Illegal copying of products, especially DVDs and CDs, is a form of piracy and, thus, a security crime. It involves illegal duplication that includes the distribution of recordings. The Recording Industry Association of America (RIAA) reports that illegal copying has been growing rapidly and has been costing the US more than $200 billion annually (Belleflamme & Peitz, 2010). Its impact in the recording industry is such great and thus should concern every individual. Regrettably, many young people and adults contemplate that when they share software, games, music, eBooks and pictures is helping them reduce charges. Another reason why individuals need to be concerned with illegal copying is the fact that it is often depicted as a victimless crime, which is a false portrayal because it has been impacting the recording industry negatively.

Illegal copying affects negatively every individual who works in recording industries, as well as the supply chains. Although it is only large corporations incur small losses, individuals, particularly artists, are highly affected due to loss of income. Furthermore, illegal copying threatens American jobs and has a negative impact on the economy (Belleflamme & Peitz, 2010). Besides, it brings serious health as well as safety risks to consumers, and in most cases, it triggers international systematized crimes.

The current laws of illegal copying of products have always been there, although they are less known to the public. There is a copyright law that protects the value of creative work. Whenever an individual creates unauthorized copies of somebody's creative work, he is simply taking an object of value from the owner illegally. For instance, the FBI warns against unauthorized copying at the commencement of any movie DVD. However, copyright messages are not in every CD or download music from the Internet, and the similar laws are still applicable. Federal law offers serious civil as well as criminal penalties for any illegal copying, circulation, rental or digital broadcast of all copyrighted recordings. Criminal charges are capable of leaving a felony record to an individual, together with five years of imprisonment as well as fines amounting to $250,000 (Belleflamme & Peitz, 2010).

Difference Between Piracy and Bootlegging in the Recording Industry

Piracy refers to the unauthorized duplication or illegal copying of sound or images only from a legitimate recording. On the other hand, bootlegging refers to the illegal recording of musical broadcasting on radios, televisions, or even live concerts. Bootlegs can also be referred to as underground recordings (Stout, 2014). Bootlegs are, in many cases, taped when an individual goes in smuggling a recorder into a concert.

Pirate recordings do not necessarily mimic genuine or original works. In most cases, they are compiled or repackaged into other versions of the original product. Countless buyers are not mostly too ornate, and a few may hurdle at a chance of buying an album that is new to them from their favorite artist. Pirate recordings comprise reproductions of the original studio or any authorized live recording. However, bootlegs, on the other hand, encompass content that is dishonestly recorded at concerts. Occasionally the recorded material is of very poor quality due to the restrictions brought by the repositioning of the microphone.

Therefore, ethically, it is true that pirate recordings and products are worse since the buyer will get a substandard product while the producer obtains no recompense. However, since many live performances go unrecorded, which makes bootlegs the only record of significant events. Undeniably, there are numerous eminent bootleg recordings of popular artists like Jimi Hendrix and The Beatles. However, it is not practically possible to pay such artists, which makes the moral ground of bootlegs to be unquestionably shaky.

The Party Responsible for Providing Security: Government or Individuals

Although there have been many efforts from law enforcement agencies, community plans, and private security, the issue of security is still a major concern for most people in America. As a result, although maintaining an individual's security is a measure of efforts done by the government and the individual, there is still a question of who is essentially responsible. However, the government should have the full responsibility of providing security to every individual in the country for several reasons. It all starts by examining the main purpose of a government. That is the reason why it exists. Firstly, the major reason why the government should offer security is that it is the one which creates rules. It is the government that decides the necessary as well as the desirable rules. It is an open query since many types of governments have created a wide variety of rules that facilitate the provision of security.

Secondly, governments virtually were as a result of emerging the need for protecting people from various conflicts as well as the enactment of law and order. Many conflicts amongst people transpired throughout history. Therefore, having the government responsible for providing security will be most effective since individuals are always in conflicts and require a neutral body, the government, to protect them.

Probably, human nature commands egocentricity, since individuals are inescapably coming to blow over the one who will get certain property or even other privileges. Still, just as Karl Marx elucidates, it is due to the sole impression of "property" that is making people self-centered and avaricious, thus not suit of providing even their own security. Moreover, this choice will bring as well as enhance the spirit of sovereignty. In this case, governments initially advanced as people realized that their security was easily provided only when they remain together in assemblies in agreement that one party within the group should possess greater powers than the rest. This is an indication that individuals were unable to provide enough security and were limited in capacity.

Besides, some security measures are beyond the powers of an individual. Therefore, the government needs to take full responsibility for protecting individuals from each other. Thus, when the government is the one responsible, the security of the individual will be enhanced, including even the outside attacks. There are cases when the government will thus decide to build great walls and then guarding them prudently from attackers as well as other agents of security threats towards the individuals. Another positive consequence of choosing the government will be if the security is critically threatened, then all the individuals can be led to safer areas under the protection of government agencies. Furthermore, one of the most notable consequences of government responsibilities in providing security is the extended economy and public service.

Reasons why Security Managers Should Become Instructors and Salespeople for Security ProgramsSecurity managers are supposed to be capable of predicting and managing change. Though top managers are always entrusted with adequate authority to be operative security managers as well as instructors, it is rather likely that they do not have the technical knowhow essential for the job. However, security managers are in control of all operationalizing facets of organization security. These tasks primarily need substantial technical competence and knowledge.

Furthermore, the tasks of instructing about security programs and managing the security in an organization may claim much more time, which the policy-makers, together with other top administrators, are not essentially able to dedicate since they have many other indispensable obligations. It is still imperious that other top administrators are actively devoted to the effectiveness of the overall security. However, numerous scenarios make sense that the everyday administration of security programs to be allocated to a security manager because they possess the dynamics of security. Still, security programs are under their dockets; thus, it will be very operative.

Besides, every business continues to give emphasis on the gains of cost containment handling. It is paramount to improve the profit margins, which pressurizes the security department to offer its fair share too. As a result, the security manager is supposed to take the role of a security program educator as well as a salesperson. Since they have the capacity, security managers should advocate in selling security as is it was just like other products. Since the CEOs perceive things terms of profit, a productive security manager will thus be able to get the strategies of selling security programs as one of the cost-effective ventures.

For instance, maybe there is a need for effective lighting within a particular part of the workplace, the security manager will present the lighting program to the CEO. The most probable reaction from the CEO sees the costs to be incurred to install new lighting. However, the selling points to offer as the security manager suggesting that installing the new lightings can reduce theft, vandalism, as well as various accidents. The security manager can further convince the CEO that the possible savings emanating from the installations in the said areas will offset the costs incurred. If the reaction will be negative, the security manager should not try to prove the CEO wrong, but will rather turn it into a positive engagement by reviewing the process.

Conclusion

Illegal copying of products, especially DVDs and CDs, is a form of piracy and thus a security crime with serious consequences. Illegal copying has been growing rapidly, leading to losses of billions annually in the US. There is a copyright law that protects the value of creative work. Piracy refers to the unauthorized duplication of sound or images only from a legitimate recording while bootlegging refers to the illegal recording of musical broadcasting on radios, televisions, or even live concerts. The government should be responsible for providing individual security since it creates rules. The security managers should take the roles of the instructors and salespeople for security programs so as to help the business attain cost containment management.

References

Belleflamme, P., & Peitz, M. (2010). Digital piracy: theory. https://www.econstor.eu/bitstream/10419/46520/1/639573924.pdf

Cite this page

Essay Example on Security After 9/11: Coping with Increased Terror Threats. (2023, Apr 24). Retrieved from https://proessays.net/essays/essay-example-on-security-after-911-coping-with-increased-terror-threats

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism