Security System & Human Management: My Reflection
()
About this ebook
Stephen B. Oladipo (Ph.D)
Stephen B. Oladipo holds a doctorate degree in criminology from the University of Calabar, Cross River State, Nigeria. He is a profound researcher and a season writer with a number of international awards at his kitty. He has written over twenty books in the bid to contribute his quota to the development of knowledge especially on security-related issues. Some of his books are accessible online and are retailed on Amazon and Barnes & Noble, among other international retail links. He is a young man in favour and blessed.
Related to Security System & Human Management
Related ebooks
Industrial Security Operations Book Two: The Security Officers Handbook Rating: 0 out of 5 stars0 ratingsBuilding a Cybersecurity Culture in Organizations: How to Bridge the Gap Between People and Digital Technology Rating: 0 out of 5 stars0 ratingsSecurity: The Human Factor Rating: 0 out of 5 stars0 ratingsCybersecurity in China: The Next Wave Rating: 0 out of 5 stars0 ratingsCybersecurity in Digital Transformation: Scope and Applications Rating: 0 out of 5 stars0 ratingsMobile Security Fundamentals: A Guide for CompTIA Security+ 601 Exam Rating: 0 out of 5 stars0 ratingsElectronic Security Systems: Better Ways to Crime Prevention Rating: 0 out of 5 stars0 ratingsModern Concepts of Security Rating: 0 out of 5 stars0 ratingsCybersecurity and Infrastructure Protection Rating: 0 out of 5 stars0 ratingsGuardians of the Virtual Realm: From Protection to Penetration: Navigating Cybersecurity and Ethical Hacking Techniques Rating: 0 out of 5 stars0 ratingsThe Psychology of Information Security: Resolving conflicts between security compliance and human behaviour Rating: 5 out of 5 stars5/5Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Rating: 0 out of 5 stars0 ratingsInformation and Knowledge Security Governance and Management Rating: 0 out of 5 stars0 ratingsCYBER SECURITY HANDBOOK Part-1: Hacking the Hackers: Unraveling the World of Cybersecurity Rating: 0 out of 5 stars0 ratingsThor's Microsoft Security Bible: A Collection of Practical Security Techniques Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Mindset: Cultivating a Culture of Vigilance Rating: 0 out of 5 stars0 ratingsSecurity Technology Convergence Insights Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsWhat You Should Know About Cybersecurity Rating: 0 out of 5 stars0 ratingsCyber Attacks: Protecting National Infrastructure Rating: 4 out of 5 stars4/5Advances in Cyber Security: Technology, Operations, and Experiences Rating: 0 out of 5 stars0 ratingsMetrics and Methods for Security Risk Management Rating: 5 out of 5 stars5/5A Primer in Private Security Rating: 0 out of 5 stars0 ratingsCybersecurity Jobs & Career Paths: Find Cybersecurity Jobs, #2 Rating: 0 out of 5 stars0 ratingsFortifying Digital Fortress: A Comprehensive Guide to Information Systems Security: GoodMan, #1 Rating: 0 out of 5 stars0 ratingsBlue Team Operations: Operatonal Security, Incident Response & Digital Forensics Rating: 0 out of 5 stars0 ratingsThe Survival Guide to Maintaining Access and Evading Detection Post-Exploitation Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Certification The Ultimate Study Guide to Practice Questions With Answers and Master the Cybersecurity Analyst Exam Rating: 0 out of 5 stars0 ratingsInformation Security Science: Measuring the Vulnerability to Data Compromises Rating: 0 out of 5 stars0 ratings
Teaching Methods & Materials For You
From 150 to 179 on the LSAT Rating: 4 out of 5 stars4/5The Three Bears Rating: 5 out of 5 stars5/5Fluent in 3 Months: How Anyone at Any Age Can Learn to Speak Any Language from Anywhere in the World Rating: 3 out of 5 stars3/5Becoming Cliterate: Why Orgasm Equality Matters--And How to Get It Rating: 4 out of 5 stars4/5Speed Reading: Learn to Read a 200+ Page Book in 1 Hour: Mind Hack, #1 Rating: 5 out of 5 stars5/5How To Be Hilarious and Quick-Witted in Everyday Conversation Rating: 5 out of 5 stars5/5How to Take Smart Notes. One Simple Technique to Boost Writing, Learning and Thinking Rating: 4 out of 5 stars4/5Speed Reading: How to Read a Book a Day - Simple Tricks to Explode Your Reading Speed and Comprehension Rating: 4 out of 5 stars4/5Grit: The Power of Passion and Perseverance Rating: 4 out of 5 stars4/5Financial Feminist: Overcome the Patriarchy's Bullsh*t to Master Your Money and Build a Life You Love Rating: 5 out of 5 stars5/5Easy Spanish Stories For Beginners: 5 Spanish Short Stories For Beginners (With Audio) Rating: 3 out of 5 stars3/5Jack Reacher Reading Order: The Complete Lee Child’s Reading List Of Jack Reacher Series Rating: 4 out of 5 stars4/5Conversational Spanish Dialogues: Over 100 Spanish Conversations and Short Stories Rating: 4 out of 5 stars4/5Weapons of Mass Instruction: A Schoolteacher's Journey Through the Dark World of Compulsory Schooling Rating: 4 out of 5 stars4/5The Call of the Wild and Free: Reclaiming the Wonder in Your Child's Education, A New Way to Homeschool Rating: 4 out of 5 stars4/5A study guide for Frank Herbert's "Dune" Rating: 3 out of 5 stars3/5Personal Finance for Beginners - A Simple Guide to Take Control of Your Financial Situation Rating: 5 out of 5 stars5/5Principles: Life and Work Rating: 4 out of 5 stars4/5A Study Guide for S.E. Hinton's The Outsiders Rating: 0 out of 5 stars0 ratingsSummary of The Dawn of Everything by David Graeber and David Wengrow Rating: 4 out of 5 stars4/5The Chicago Guide to Grammar, Usage, and Punctuation Rating: 5 out of 5 stars5/5The 5 Love Languages of Children: The Secret to Loving Children Effectively Rating: 4 out of 5 stars4/5Everything You Need to Know About Personal Finance in 1000 Words Rating: 5 out of 5 stars5/5Lies My Teacher Told Me: Everything Your American History Textbook Got Wrong Rating: 4 out of 5 stars4/5Who Gets In and Why: A Year Inside College Admissions Rating: 4 out of 5 stars4/5The Teenage Liberation Handbook: How to Quit School and Get a Real Life and Education Rating: 4 out of 5 stars4/5
Reviews for Security System & Human Management
0 ratings0 reviews
Book preview
Security System & Human Management - Stephen B. Oladipo (Ph.D)
Copyright © 2016 by Stephen B. Oladipo (Ph.D).
ISBN: Softcover 978-1-5144-9395-3
eBook 978-1-5144-9394-6
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the copyright owner.
Any people depicted in stock imagery provided by Thinkstock are models, and such images are being used for illustrative purposes only.
Certain stock imagery © Thinkstock.
Rev. date: 05/17/2016
Xlibris
800-056-3182
www.Xlibrispublishing.co.uk
734317
Contents
Chapter One
Introduction
Chapter Two
Security As A Form Of Resistance And Separation
Chapter Three
Security System And Personnel Integration
Physical Security System
Biometric Security System
Electronic Security System
Chapter Four
Integrated Security System And Security Personnel
Guidelines For Effective Security System.
Security Personnel
Chapter Five
The Human Factor Analysis
Human Factor Security In Proper Security Management
Chapter Six
Security Management And Personnel Guidelines In Security System
A Life-Cycle Management
Approach For A Robust Personnel Involving Security System.
Guidelines To Personnel Interrelationship (Both With
Management And Co-Employees):
Personnel’s Responsibilities And Basic Procedures In Proper Security Management:
Chapter Seven
Intelligence Network And National Security Agencies Acts In Nigeria
Chapter Eight
Types Of Intelligence
Intelligence Support For Government Activities
Chapter Nine
Intelligence Agencies In Nigeria
Intelligence Network And Security Agencies’
Notion Of Responsibility
Chapter Ten
Challenges Of Border Security In Africa
Border Security In The West African
Sub-Region
Policy Measures Towards Effective Border Management In Africa
LIST OF TABLES, FIGURES & PICTURES
Picture 1: High Barbed Iron Security Fence
Picture 2: Razor Wire Barbed Metal
Picture 3: Barbed Wire Protective Barriers.
Picture 4: Security Lighting
Picture 5: Barricade Bollard Safety Road Chain-Link
Picture 6: Spikes Atop A Barrier Acting As A Deterrent To People Trying To Climb Over The Barrier.
Picture 7: Door-Way Accessibility Lock
Picture 8: Closed-Circuit Television Cameras
Picture 9: Air-Monitoring Hexacopter/ Quadcopter Drone
Picture 10: Electronic Access Control Systems
Picture 11: Electronic Digital Safe
Picture 12: Electric Barbed Wire-Fence
Picture 13: Code Control Alarm System
Picture 14: Geographical/Biometric Finger Print Scanner
Security For Access Control
Picture 15: Finger Biometric Scanner/Reader
Picture 16: Eye Security Iris Scanner
Picture 17: Magnifying Glass/ Finger Print Detection Gadget
Picture 18: Biometric Protected Vault Safe
Figure 1: – A Cognitive Hierarchy
Figure 2: – The Intelligence Cycle
Figure 3: A Typical West African Map
Table 1: Functional Types of Intelligence
Table 2: Three Levels of Intelligence
Table 3: Identification Of National Security Intelligence Agencies In Nigeria.
Table 4: Domestic Security Intelligence and Its Sub-categories
Table 5: Defence Intelligence and Its Subcategories
Table 6: Foreign Intelligence and Its Subcategories
Dedication
To God Be the Glory.
Acknowledgements
Acknowledging the family of Anny-Best Chukwu who graciously made available the facilities towards actualizing the dream of making this book a reality. His wife, Ifeoma Chukwu and his entire household, which include: Soomto Chukwu, Ugo Chukwu, Consoler Chukwu, Goodness and Patience Aleje.
The management of the Nigeria Security and Civil Defence Corps and scholars whose works are cited in the book are deeply acknowledged for contributing to the success of this study.
Foreword
Effective human management plays critical roles in an ideal security system. These roles cannot be undermined. They cannot be trivialized and their importance cannot be over emphasized in every establishment, setting or institution that is less prone to security breaches.
Governments around the world devote huge sum of money, streaming in billions in every budget year to acquire, maintain, procure and install heavy and state-of-the-art security equipment. These security devices are often in the form of soft and hard wares. The commonest of such devices or security equipment include: Ammunitions and weapons of all sorts, ranging from hand-held pistols to heavy artilleries. Some build high fences around critical assets, they purchase razor wire and procure metal spikes, protective barriers, guard towers, security lighting, trenches, planters used as vehicle barriers to increase the standoff distance among others, which are classified as physical security devices. The electronic ones may include: intruders’ alarms, closed-circuit television cameras (CCTV) systems, electronic access control systems, space saver drop arm optical turnstiles, hermetically sealed reed switches, passive infrared detectors, ultrasonic detectors, compact surveillance radar, photo-electric beams, taut wire fence systems etc. While the biometric devices have equally been recognized to include: geometry scanner for access control, fingerprint residential/office lock, geographical access control and so on.
The policy discretion of every responsive and trend conscious government which fortifies her security environment by acquiring these electro-biometrical and physical security mechanism is usually commendable. However, the coordinate of effectiveness and sustainability in every security system so set up remains the human element there in. These are the foot-soldiers manning or operating the million dollar artilleries in the military formation. They are the rank and file and/or officers operating the police aircrafts, surveillance drones or armored tanks towards effective policing. They are the personnel in all other paramilitary formations as well as the private security guards that are in charge of coordinating and maintaining all of the physical, mechanical, biometrical or electronic security devices so deployed in Ministries, Departments and Agencies (MDAs) of both government and private corporations in Nigeria and anywhere in the world. This is why issue of effective human management in every security system is imperative and must not be tendered with gloves-hands.
The book: security system and human management therefore reflects its title. It appraises the use of the modern day/state-of-the-art equipment in effective security system with emphasis on PROPER deployment of security personnel. Having identified the security personnel as the human factor in the entire security system so set up; hence, the demand for attention need, which bothers on improved welfare, forms the focal issue of the book’s discourse. The book as a research piece also suggests the integration of the informal-formal control approach to issues of border security in Nigeria and indeed, in West African sub-region.
The book: security system and human management is therefore recommended for use as a guide in the field of human management within the security sector. Its usage is also appraised as manual for owners of Private