Free Essay

Threats, Values and Defense

In:

Submitted By GeneralZOD24
Words 2443
Pages 10
Final

1. In James Turner Johnson’s article ‘Threats, values and defense: does the defense of values by force remain a moral possibility?’ (60) he cites four justifications for war. What are they? From a pacifist’s point of view why are these reasons problematic? In this article the four justifications for going to war are: defense of the innocent, recovery of something wrongly taken, punishment of evil, and defense of aggression in progress. From a pacifist's point of view there are some major problems with these justifications for war. Each and every justification is met with its own singular problem. The defense against the innocent seems like it is justified but there arises two arguments against it. In a war more than just soldiers are killed. Other civilians will be killed and many of the soldiers don’t want to fight, they are just ordered too. That means we are killing innocent civilians and soldiers to protect some innocent. From a utilitarian view we must ask if this the death of the innocent will outweigh the death of the other innocent if we do or don’t go to war. Yet, deontologists would say that killing is bad and that needs to be punished because killing is wrong. So kill people to stop killing. For a pacifist that is just wrong. The other problem from defending the innocent is that violence is key in war and many times over we have been shown that violence is not always the best way. We should try and support people and ideas like Gandhi, to win with non-violence. There is not always a need for full war if we can help these people peacefully. Then there is the problem with the justification of recovery. This can be taken way out of proportion. If you don't believe me just look at fascist Germany in WWII. Hitler wanted the land that was wrongfully taken from them in the Treaty of Versailles. Hitler wanted to take back the Sudetenland and that turned into an entire world at war. This cannot be. We cannot take back things with such deadly force like that. The problem with the punishment of evil also has two things wrong with it. The first is that in today's society it is so muddled as to who is really the evil one. There is such a potential for evils to become blown way out of proportion like in the last justification. A general or even the president could over or under estimate the evil of someone causing a wrongful war. The second problem is that we see the Middle East as the evil ones while they see us as the evil ones. We both seem to be fighting this just war. It is reminiscent of Foucauldian views and Laura Whitt. They say that we shouldn't judge the evils of another because our culture is just too different. We need to understand their culture before we can judge that they are evil and decide to go kill them. The last problem is with the defense of aggression in progress. Again I draw our attention back to WWII. The Allied nations waited for the aggression to happen and that caused millions of people overall to be killed. So, we must decide when it is the right time to intervene in the aggression. This again brings us to blowing things out of proportion, the problem with using violence to stop violence, and the fact that maybe peace can solve it better. Overall these justifications for war seem to be sound, but when you look at them they seems to fall apart. We must draw a line in the sand where evil is too evil or the value of what was taken, etc. but where Johnson is drawing them is not the right place.

2. According to Carol Gilligan’s article ‘In a Different Voice’ (71) what is the major difference between a masculine and a feminine approach to ethics. Refer specifically to her critique of Kohlberg’s study. The major difference between the ethics of men and women is that men are geared towards justice, while women are more towards caring. When faced with Heinz's dilemma, proposed by Kohlberg, men and women tend to answer the question the same as others of their gender. Men look at it like "a math equation" they go through it in their heads and look at the logic of it and conclude that in that situation Heinz should steal the drug to save his wife. Women look at this dilemma and think about the relationship between the people involved and they don't look at it logically like men do. This made Kohlberg conclude that women are lower on the ethical ladder than men. But for Gilligan this just means that they are looking at the problem differently and no one is above or below the other. Both the men and women are actually looking at the problem in a different way. Almost as if it was a different question. "Amy is considering not whether Heinz should act in this situation but, but rather how Heinz should act in this situation" (pg, 342). They see other ways to get the drug rather than stealing. Also they are concentrated on how this will affect the marriage and the store's business. This is different from how men look at it. They just ask themselves should he steal the drug and they conclude that life is more important than property. They don't try and see a way around it like women do. This means that this question is looked at by two genders in two different ways. Almost as if it is another question entirely. According to Gilligan, this does not denote the fact that women are less than men ethically, but that they have a different ethical outlook. Kohlberg's stages of development are therefore wrong in that they neglect the ethics of care. For the ethics of care, it is very nonviolent, nobody should be hurt. An ethic of justice is based on the "the premise of equality", everyone needs to be taken care of similarly. These ethics are reflected on the genders differently and Gilligan argues that one is not above the other, as Kohlberg said, but they are on the same equal grounds. They are just different ways of looking at the same dilemma.

3. According to Paul Taylor’s article ‘The ethics of respect for nature’ (101) what is the difference between a biocentric and an anthropocentric worldview? Outline the four major components of Taylor’s argument for biocentrism. For Taylor, the concept of a anthropocentric ethics revolves around human. "…human action affecting the natural environment and its nonhuman in habitants are right (or wrong) by either two of the criteria: they have consequences which are favorable (or unfavorable) to human well being, or they are consistent (or inconsistent) with the system of norms that project and implement human rights" (pg 501). In other words, what is right and wrong are judged on the consequences it had for humans, not the environment. For instance, global warming is bad because of the negative effects it will have on humans down the line. This is in contrast to the biocentric view of ethics. For biocentrism, the good or bad is judged not off humans, but of all living things. We are animals that need to survive off this planet just like everything else, meaning we are no better than any other living thing. Even if we are to say that humans were made in a god's image, this does not denote that we do not need to respect the life of other organisms. All living things' "well-beings, as well as human well-beings, is something to be realized as an end in itself" (pg. 501). The first component of Taylor's argument is, "humans are thought of as members of the Earth's community of life, holding that membership on the same terms as apple to all nonhuman members" (pg. 503). This means that we should not see ourselves as something apart from the world. We are all living things with the need to live and we must realize that and respect that fact, because we are a part of this world and it's habitat. The second is "The Earth's Natural ecosystem as a totality are seen as a complex web of interconnected elements, with the sound biological functioning of each being dependent on the sound biological functioning of the others" (pg. 503). What Taylor means is that the world and life on it is so complex that we cannot mess with the "web" because if we are to disrupt the functioning of one organism, we would disrupt the functioning of many others. This seems like no big deal for an anthropocentric view, but for a biocentric view, this disruption is immoral. The third concept is "Each individual organism is conceived as a teleological center of life, perusing its own good in its own way" (pg. 503). Each organism, whether we see it or not, is striving to meet some goal in order to live. They are doing good in the way that best helps them to live and grow as a community of organisms. This means that we should consider the good of these organisms as well as the good of humans. We are all striving for a good and we all must be treated as an end. The last component is "Whether we are concerned with standards of merit or with the concept of inherent worth, the claim that humans by their very nature are superior to other species is a groundless claim" (pg. 503). There is no evidence that we are somehow better than any of the other living things on this planet and thus we cannot act like we are somehow better. We have a different brain structure than other creatures, yes, but is it really superior? The only real argument for us being superior is that many believe some god created us and we look like that god. Yet, many times in the Bible, and other texts, it says to take care of the world around us. Not to rape it like we are doing now. We are on the same playing field as all living things. We live and die, just like ants, pigs, and bacteria.

4. Ethical Challenge: Identify 5 farms that produce something you eat on a regular basis within 100 miles of your home. Lewis' Orchard down the road from me produces many fruits that are grown right in this family's own orchard. They sell oranges, peaches, and pears. Their fruits sell for much less than they do at the stores, but they don't have as many. It is run by Rick Lewis, who inherited the land from his father who started the orchard before my neighborhood was ever built. Cornaby's Farm is mostly a strawberry farm. They make "fresh fruit spreads by hand" and they sell just the raspberries also. They are located in Salem Utah. This farm has been in Salem since the early days when Salem was first founded. McBride Briar patch is a farm that is located in Mapleton Utah. "This is a U-Pick raspberry and blackberry farm" (McBride's Facebook). They let you go and pick all of the strawberries that you need. M.J Miller's Farm and Orchard is owned and operated by Mel & Janene Miller. They sell many different kinds of fruits from their orchard and vegetables from their farm. Their mission statement is: M. J. Miller's Farm and Orchard is dedicated to providing fresh, delicious, and nutritious produce at affordable prices. Phelp's Berry farm produces many different berries and vegetables that you can pick yourself or just go buy at their home store. It is a family run farm. In fact, the instructions in the website instruct people to not park in his driveway, meaning there is no big parking lot. You just drive up to this guy's house and pick what you want from his farm in his own yard.

5. Ethical Challenge: Abstain from meat and processed foods for one day eating only fruits, vegetables and grains. Discuss how you felt. Make an ethical argument for or against a vegetarian diet with at least two premises and a conclusion.

As a poor college student that can't afford all this fancy organic stuff. I am not kidding. I can barely have enough money after rent to wipe my own butt. Everything that I eat is processed and/or has meat. When I started this challenge it seemed easy enough to not eat meat or anything that has been processed. But the second I looked at the food I had, I knew I was doomed. I didn't eat for an entire day, except for an apple that was in the fridge. Don't tell my roommate, I think it was his. Everything I wanted to eat was processed in some way, and all the foods that I could find that were not, had meat in them. I felt sick and hungry after that day and it made me realize just how much is processed and/or has meat in it. Was a real eye opener. It made me have a greater appreciation for the people who don't eat meats or processed foods. As for a vegetarian diet I have to say that is not the best thing to do ethically. Yes, we are saving cows from death but as a race of omnivores we must have meat to survive and live a healthy lifestyle. From the days that early man walked on the land, we hunted for food. It is because of this that we developed our brains. The proteins from meat gave man the strength to evolve into homosapiens and we can't deny where we come from. Our bodies have evolved to eat meat and we must do so in order to be healthy. Also, It is said that we are over killing and being brutal to animals to feed us. This is unethical, but the problem is not with killing, the problem is that humans have breed so numerous that it has become unethical. Over population is unethical. To feed all these people, meat is required, and for meat we need dead animals. To kill millions of animals in entirely unethical, so we need to deal with overpopulation and over consumption of meats; and not stop eating meat altogether. Our bodies require proteins and other nutrients from meat, and we must go easy on the meat and our population but becoming vegetarianism does not seem like the best ethics to live by.

Similar Documents

Premium Essay

Cultural Defence

...Assess the view that for the minority ethnic groups, the practice of religion and membership of religious groups is mainly a form of cultural defense (33 marks) Most people would disagree with Bruce’s idea that members from ethnic groups use religion as a cultural defense. The definition of social defense is "a form of resistance, when the group is seen as a threat in a hostile country". Other sociologists disagree with this concept and they believe instead religion offers a psychological function, dual role, cultural identity, social solidarity, value consensus and order and values and norms etc. There are many reasons why immigrants are attracted to religion instead of social defense. Immigrants have put a lot of focus on religion, unlike the wider population in the UK. Weber and Durkheim try to investigate why this is. Weber believes that immigrants had strong religious beliefs before they migrate to the UK, this is because deprived groups such as African and Polish people have strong religious beliefs before they even come to the UK. However Durkheim believes that religion helps to bond the communities together, particularly when under threat, he believes religion allows the 2 different groups to developed shared norms and values. This shows that social defense is not the only reason why immigrants are starting to have strong religious beliefs. Modood looks at religion and social identity. He believes that religion for Asians is intricately connected to their ethnicity...

Words: 1008 - Pages: 5

Premium Essay

Mktg 205 – Principles of Marketing

...Abstract This paper is about marketing the service of self defense training. It will identify, describe, and analyze three marketing environment forces that will impact this service. Strategies to overcome the threats and capitalize on opportunities will also be explored throughout the paper. Self Defense Training and Marketing Forces Introduction These are the impacts of marketing forces on the training services industry. There are so many components involved with marking to make the product or service successful. Identifying the market forces that impact the service is the most important component. There are three forces that impact the training service industry. With self defense training these three forces are social, economy, and competition. Strategies to overcome the threats and capitalize on opportunities will also be discusses for a better understanding of this industry and service. Market Force 1: Description and Analysis of impact on product/service The social force is thought of to focus on buying trends of the population due to the populations values (Kerin, 2013). These forces are the factors that influence what services, at the time, are in the highest demand. They impact the want and need for self defense training because it shows when, who, and why the population is seeking this type of training. With this service it is best to a multicultural marketing method because anyone could be in need for self defense training. Although, women located in bad areas of crime...

Words: 1355 - Pages: 6

Free Essay

Business Analysis

...Business Analysis - Part I MGT/521 September 20, 2012 Business Analysis - Part I This paper describes the results of an examination of L-3 Communications Holdings, Inc. The examination identifies their wants/needs and describes how well the company fulfills those needs. It also includes an analysis of L-3’s strengths, weaknesses, opportunities, and threats (SWOT), and finally, uses that analysis as a basis to form a recommendation for holding the stock as a position in an unnamed mutual fund. Company Overview L-3 Communications Holdings, Inc. (NYSE:LLL) is a Fortune 500 company with reported sales of $15.2B in 2011. Founded in 1997, L-3 maintains headquarters in New York with global locations, including the United Kingdom (UK), North America, Europe, Middle East, Southeast Asia, and Australia. The company is primarily a government contractor in command, control, communications, intelligence, surveillance, and reconnaissance systems (C3ISR). Its services and products also include aircraft maintenance, aircraft modernization, and government services. L-3 also provides numerous electronic systems used in both military and commercial applications. The company has four distinct business segments - Electronic Systems (ESS), National Security Solutions (NSS), Aircraft Modernization & Maintenance (AM&M), and C3ISR. L-3 Business Segmentation Each business segment delivers products and services specific to its market. A brief overview of each segment follows...

Words: 2474 - Pages: 10

Premium Essay

Japanese American Internment Analysis

...Americans were forcibly relocated to concentration camps after the Japanese launched the devastating attack on pearl harbor. Traditionalist historians argued that degree of threat posed posed by Japanese-American was completely unequivalent to the treatment they receive, whereas Revisionists states the opposite. The post-revisionist view, however synthesises both approaches, asserting that the Japanese-American was somewhat equivalent as they view the internment decision to be right, but think the interment conditions was too harsh. Most Orthodox historians would disagree that the degree of threat posed by Japanese Americans during the Second World War as equivalent to the treatment they...

Words: 1368 - Pages: 6

Premium Essay

Persuasive Essay

...US military budget reduction. I’m strongly opposed to the downsizing of the US Army because in order to maintain the defense of the United States of America we need a large strong force to repel our enemies. Also it takes away our ability to ensure the basic human rights that every person has the right to enjoy. The drawdown of the Army will shrink it to its smallest size since before World War II. With the budget for fiscal year 2015 the downsizing is designed to leave the military capable of fulfilling US defense strategy and defending the homeland against strategic threats. Deeper cuts will be made in fiscal year 2016 if the sequestration returns. Chuck Hagel, the Secretary of Defense, and other military officials have commented that some of the budget choices will create additional threats in certain areas. The Army alone will shrink from 520,000 active duty soldiers to 440,000 soldiers. If the budget cuts will create additional threats in certain areas why would the President and our senior military leaders allow it? It’s endangering the lives of the American civilians. Any risk is too big of a risk. The cuts assume that the US will not be involved in any large prolonged stability operations overseas. No other Iraq or Afghanistan scenario will be possible. Many people are opposed to the US helping other countries in need. The US is based on the values that people have basic human rights and that these rights will not be infringed. This is not limited to just American...

Words: 770 - Pages: 4

Premium Essay

Fortune 500 Company

...History The Fortune 500 Company chosen for this paper is the Lockheed Martin Corporation. Lockheed Martin is a global securities and information technology company headquartered in Bethesda, MD. Lockheed Martin employs roughly 126,000 people in several facilities throughout the world. The company's main business is in research, design, development, manufacturing, integration and sustainment of advanced technology systems, products and services. Lockheed consists of four operating units, or business areas, which consist of Aeronautics, Electronic Systems, Information Systems and Global Solutions, and Space Systems (LMC, 2011). Lockheed Martin Corporation was created in 1995 from a merger of two major global technology companies, Lockheed Corporation and Martin Marietta Corporation (LMC, 2011). Lockheed Corporation first began in 1912 when two brothers, Allan and Malcolm Loughead, created the Alco Hydro-Aeroplane Company to manufacture a floatplane. In 1916, the brothers used their own profits to buy out the other investors and organized the Loughead Aircraft Manufacturing Company. In 1921, the company was liquidated because of poor sales. Allan Loughead returned in 1926 to create the Lockheed Aircraft Company, which began to be much more successful. Lockheed is the matching pronunciation of Loughead and used instead (Weiss & Amir, 2009). The Martin Marietta Corporation also had its beginnings in 1912 when Glenn L. Martin, an aviation pioneer, created the company to manufacture...

Words: 3407 - Pages: 14

Free Essay

Deploying Application Firewall in Defense in Depth Principle

...Deploying Application Firewall in Defense in Depth Principle Abstract Information security should be a priority for businesses, especially when they are increasingly involved in electronic commerce. With the understanding that securing an operating system successfully requires taking a systematic and comprehensive approach, security practitioners have recommended a layered approach called defense-in-depth. The cost and complexity of deploying multiple security technologies has prevented many organizations from achieving their information security goal. In view of these constraints and in compliance with recent with recent corporate and industry regulations like Sarbanes-Oxley Act and Payment Card Industry Data Security Standard, businesses now deploy application firewalls as security measures. Based on the foregoing, the author has recommended the use of application firewalls as a single platform for achieving layered security through network protection, application protection and data protection. This paper commences by examining the defense in depth theory and the types of application firewall and the author concludes by citing the Institute for Computing Applications (IAC) of the Italian National Research Council (CNR) as an example of an organization which engaged application firewalls in resolving its network security problem. Research Analysis/ Body The development of Information security is of paramount importance to organizations that have online presence...

Words: 1701 - Pages: 7

Premium Essay

Cis 502 Week 3 Case Study

...RUNNING HEAD: Advanced Persistent Threats Against RSA Tokens 1 Advanced Persistent Threats Against RSA Tokens McQuinda Johnson Dr. Al Oluyomi CIS 502 January 27, 2014 Advanced Persistent Threats Against RSA Tokens 2 An evolution in the goals and sophistication of computer network intrusions has rendered these approaches insufficient for the threats facing many modern networked organizations. A new class of adversaries, appropriately dubbed the “Advanced Persistent Threat” (APT), represents well-resourced and trained adversaries that conduct multi-year intrusion campaigns targeting highly sensitive and valuable data in an attempt to gain a competitive edge, particularly in international business and law, or nation-state political and military affairs. These adversaries accomplish their goals using advanced tools and techniques designed to circumvent most conventional computer network defense mechanisms and remain undetected in their intrusion efforts or presence on networks over long periods of time. Network defense techniques which leverage knowledge about these adversaries can enable defenders to establish a state of information superiority which decreases the adversary’s likelihood of success with each subsequent intrusion attempt. Threat intelligence can be a force multiplier as organizations look to update their security programs and defenses to deal with increasingly sophisticated advanced persistent threats. Security managers need accurate, timely...

Words: 1313 - Pages: 6

Premium Essay

Unsloved

...one with which this paper is concerned—is that of reducing the degree of defensiveness. Defensive behavior is defined as that behavior which occurs when an individual perceives threat or anticipates threat in the group. The person who behaves defensively, even though he or she also gives some attention to the common task, devotes an appreciable portion of energy to defending himself or herself. Besides talking about the topic, he thinks about how he appears to others, how he may be seen more favorably, how he may win, dominate, impress or escape punishment, and/or how he may avoid or mitigate a perceived attack. Such inner feelings and outward acts tend to create similarly defensive postures in others; and, if unchecked, the ensuing circular response becomes increasingly destructive. Defensive behavior, in short, engenders defensive listening, and this in turn produces postural, facial and verbal cues which raise the defense level of the original communicator. Defense arousal prevents the listener from concentrating upon the message. Not only do defensive communicators send off multiple value, motive and affect cues, but also defensive recipients distort what they receive. As a person becomes more and more defensive, he or she becomes less and less able to perceive accurately the motives, the values and the emotions of the sender. The writer's analysis of tape recorded discussions revealed that increases in defensive behavior were correlated positively with losses in efficiency...

Words: 562 - Pages: 3

Premium Essay

Risk Assessment Paper

...Risk Assessment Paper CMGT 579 September 26, 2011 Kyrstal Hall Every organization is faced with some risk or potential threat that could cause an interruption to the organization’s operations. These risks and threats can come from within or outside of the organization. To prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects to the daily operations. Performing a risk assessment is one of the most important steps in the risk management process (eHow, 2011). A Risk Assessment is periodic assessment of the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the organization. A risk assessment should include a consideration of the major factors in risk management: the value of the system or application, threats, vulnerabilities, and the effectiveness of current or proposed safeguards. Many organizations perform risk assessments to measure the amount of risks that could affect their organization, and identify ways to minimize these risks before a major disaster occurs. Department of Defense Information Systems Agency (DISA) follows guidelines and policies governed by processes by which the organization assesses and manages exposure to risks. In this paper the subject to identify...

Words: 1263 - Pages: 6

Premium Essay

Practice Bar Eam

...2/4/2013 Exam Question #1 Dan’s Justification a)Dan’s Pursuit of Al Use of non-deadly force to reclaim one’s property Use of non-deadly force to reclaim one’s property is allowed under the Model Penal Code if the following three conditions are met 1)the third party’s inference is unlawful 2)the intrusion was on property in defendant’s possession or property for which he served as a bailee and 3)use of non-deadly force is immediately necessary. Under common law non-deadly force may be used to protect personal property in one’s lawful possession if this force appears reasonable to prevent or terminate an immediate unlawful intrusion with that property. In this case, Dan would justify his pursuit of Al as his rightful action to reclaim his property, the handgun and ammunition. Dan would also would testify that Al’s tender of counterfeit moneys amounted to an attempt at larceny by trick. The registration papers had not been completed and Dan was still in possession of the property. Al’s attempt to leave with the property justified Dan’s pursuit of Al. The requirement to desist The Model Penal Code requires that for necessary use of non-deadly force to recapture property, the defending party must first request that the defendant desist his trespassory activity unless the defender believes this request would be useless, or put his person or property in greater danger. In this case, Dan did follow the requirement of making a request to desist, telling Al, “If you don’t...

Words: 2570 - Pages: 11

Premium Essay

Drones Pros Cons

...policy of drone warfare is directly correlated with the war on terrorism. The aftermath of 9/11 convinced the U.S. military and intelligence community to target Taliban and al-Qaeda militants by utilizing drone technology. The Authorization for Use of Military Force permits the use of all necessary and appropriate force against terrorism. The U.S government to justify drone strikes without restrictions has used this settlement as a defense mechanism. Drone technology promotes secrecy, governmental power, and a foreign policy that operates without limitations. The issue of drone technology is analyzed using the ethical...

Words: 2160 - Pages: 9

Free Essay

Israel

...willing to set aside its own security and that of many of its allies in order to advance the interests of another state. One might assume that the bond between the two countries was based on shared strategic and interests, or compelling moral imperatives, but neither explanation can account for the remarkable level of economic, military, and diplomatic support that the United States provides to the State of Israel. We’ll also explore how the United States’ strategic military operations in support of Israel, is in America’s national interest. The United States is now the world's only superpower; if it does not exert international leadership, what country will? No other state’s military has the will or the capability to take on such threats as those emanating from rogue states like Iraq, Iran, or North Korea; nor can any other deal with issues such as the spread of weapons of mass destruction, international terrorism, radical Islam, or international narcotics trafficking. In short, American leadership is essential. In order to play this leadership role, the U.S. government must have the resources necessary to construct a network of allies on which it can rely to help counter dangers quickly and effectively. An adequate foreign-aid program is one of these resources. Americans provide assistance not only because they are a generous people but because it is in...

Words: 1760 - Pages: 8

Premium Essay

Embraer

...1 11 Appendix 2 12 Appendix 3 15 1. Strategic Profile Embraer SA is a Brazil-based company which was founded in 1969 and primarily engaged in the manufacture of aircrafts. The company divides its operations into four main segments: Commercial Aviation; Defense and Security, and Executive Aviation. It also offers aircrafts for agricultural use, structural components, mechanical and hydraulic systems, aviation services, and technical activities related to the production and maintenance of aerospace material (www.embraer.com.br). The company’s commercial aviation segment designs, develops, and manufactures various commercial aircraft for regional, low-cost, and mainline airlines and its defense and security segment provides a range of integrated solutions for the defense and security market. The company’s executive aviation segment develops a line of executive jets for fractional ownership companies, charter companies, and high-net-worth individuals. Its aviation services segment offers after-sales customer support services. This segment also provides spare parts, sales, inventory pooling programs, customer training, and other product support services. It has strategic alliances with European Aerospace and Defense Group, AEL Systems, AVIC (China), and Boeing. Within the global air craft industry there are few major competitors. Among them, the large commercial jet aviation market is a duopoly shared by the U.S. aircraft manufacturer Boeing and the European aircraft maker...

Words: 5163 - Pages: 21

Premium Essay

Crime and Deviant Behaviour

...Introduct ion To Security Management TOPIC:- The concept of SECURITY MANAGEMENT from a Military Perspective LECTURER:- Mr. Keen Charles DUE DATE:- 21-May-2015 STUDENT:- Jermaine George DEFINITION OF SECURITY MANAGEMENT Security management is the identification of an organization's assets (including information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets. An organization uses such security management procedures as information classification, risk assessment, and risk analysis to identify threats, categories assets, and rate system vulnerabilities so that they can implement effective controls. Therefore security management from a military perspective means the protection of military assets. CONCEPT OF MANAGEMENT Management is an important element in every organization. It is the element that coordinates currents organizational activities and plans for the future. The management adapts the organization to its environment and shapes the organization to make it more suitable to the organization. DEFINITION OF PHYSICAL SECURITY Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism. There are three main components to physical security. First, obstacles...

Words: 1945 - Pages: 8