Here is the synopsis of our sample research paper on Fraud. theft and the use of technology. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
A 10 page paper which considers the use of technology in security systems, and how effective these methods are in comparison to research into offender motivation and the causes of crime. Bibliography lists 11 sources.
Page Count:
10 pages (~225 words per page)
File: JL5_JLsecmansoc.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
of fraud and theft; these are not mutually exclusive by any means, but one relies primarily on addressing the root causes of crime and offender motivation, whereas the other is
mainly concerned with fortification and the development of situational methods of combating crime. Technologies which focus on observation (CCTV) or verifying identification (chip-and-PIN) are part of the latter model. They
acknowledge that attempts will be made to commit crime, and seek to fortify the organization against those attempts being successful. The reasons why crime exists, or why particular individuals are
motivated towards crime, are less important than the establishment of effective preventative measures. There is, of course, a persuasive body of evidence to
suggest that situational security methods are successful: many retail stores report a fall in shoplifting after the implementation of CCTV, security tagging, receipt checking and so on. Similarly, the use
of high-profile security staff as well as undercover store detectives has also been shown to help reduce losses. However, it is logistically impossible to monitor all shoppers all the time,
even with the aid of technology, and the use of profiling - identifying common features of individuals most likely to commit crimes - also has its shortcomings.
In addition, these security measures are not particularly effective against fraud which makes use of social engineering: the scams or con-tricks which rely on persuasion
or deliberately-created confusion to fool employees into handing over goods or money. A checkout operator who has been scammed into giving the criminal twice as much change as they should
have received may not even realize, until their cash drawer is counted at the end of the day, that the con-trick has even taken place; at that point, there is
...