SlideShare a Scribd company logo
Running head: RESEARCH PROPOSAL
Introduction
This paper intends to investigate the measures of enhancing
security in learning institutions. In the previous decades, most
universities and colleges have appeared much unique
environmental position in terms of security provisions. The
security provisions are mainly based significant features which
are mainly changing. The university hence can be held
accountable for individual functions it is committed as an
autonomous body concerning the rules and regulation. Public
learning institutions have a supreme equivalence of any other
government parastatals that has a duty to protect its clients and
employees
Thesis Statement
This paper seeks to discuss the current statistics which indicates
clearly that there is upsurging of numerous crimes which
happen in colleges and universities on a continuous basis. It has
been discovered that, in the year 2001, there were 11,659
robberies reported from the universities and colleges.
Additionally, there have also been 610 murders. Similarly, more
than 10,000 compulsory sexual assaults were also described in
the college campuses over this same period.
Hypothesis
Security enhancement leads to a reduction in crimes in Learning
Institutions.
The universities and schools in this country are prone to the
violence. If the plight of violence in this country is not
sufficiently addressed, it will lead to a rise in a number of the
casualties and victims of murder in the learning institutions
(Prenzler, 2012). This is considered to be evident of the
challenges that take place in Virginia Tech. Even after the
perilous and hazardous occurrence, the country ends up going to
normal business, this must not be the case.
The federal government and other stakeholders have made the
decision to take a stand and commit itself on just what it takes
to ensure there is safety in the learning institutions.
The first step is to file the bill of installing security measures in
learning institutions. Last year the report indicated that over
450 bills were filed but they have never been debated. Based on
that, it should be noted that the university and school
management do not have an obligation to be blamed with the
government on certain aspects of safety and security measures.
The second step is to involve all learning institutions
stakeholders in the decision making. This requires all teachers,
the college management, the parents, board of governors and
local communities to come up with diverse and practical
strategies to put in place so as to save the students.
The third and final step is implementation. Since it has been
noted that safe environment is basic to the success of the
institution, and it is part and parcel of the school management.
The management must execute all strategies discussed including
all the bills regarding security. The much-required quality
education hence ought to be stressed in all possible situations
with the same enthusiasm that is bestowed to different academic
issues which the students engage in.
These learning institutions, in this case, ought to endeavor to
implement the campus security practices which have been
considered to be effective in other private colleges and
campuses. In addition, it is significant that there must be a
stringent evaluation of the execution of the emergency reaction
strategies that have to be piloted, where there are numerous
crime incidences which take place (Heizer & Render, 2014).
This will assist in guaranteeing that the ongoing cycle of
mitigation, preparation, response and recovery, is adhered to
(Prenzler, 2012).
Measurement and Analysis Approach
Some of the approaches that will be applied in order to carry
out the appropriate and effective study to put in place stringent
security measures to the students include a collection of data
from the students especially those who have been victims. There
will be the use of questionnaires, where questions will be
drafted regarding insecurity incidences and what the main
causes were. The questionnaires will give feedback on the
safety or security measures that have been in place before to
curb insecurity issues and were a general impact on the lives of
the students. Finally, there will be the use of interviews. The
students will be interviewed on the matters concerning security.
The interview will be on individual basis. The victims will be
given priority in the interview because they have life
experience.
Ethical Standards
Data integrity: falsification and fabrication of research data is
misconduct. It is my role as a researcher to avoid some of the
omission and false statements that misrepresents research
record. Hence I will ensure that I report what has been observed
at the time of submission. On issue of publication I will
communicate to the scholarly world to help the readers to be
more informed of the research findings by making them
accessible in continuous manner with pertinent publication
standards. The data to be reported must be detailed to help me
duplicate the result (Herlihy &Corey, 2014).
Applicable Resources
Heizer, J. H., & Render, B. (2014). Operations Management:
Sustainability and supply chain
management. Boston: Prentice Hall
This source discusses the designing, overseeing and controlling
of the research process to effectively deliver appropriate study.
Jones, C., & Kennedy-Pipe, C. (2000). International security in
a global age: Securing the
Twenty-first century. London: F. Cass.
This source provides details regarding international security and
management of learning institutions safety measures.
Prenzler, T. (2012). Policing and security in practice:
Challenges and achievements. Houndmills, Basingstoke,
Hampshire: Palgrave Macmillan.
This source provides some guidelines and policing strategies
that can help to minimize insecurity.
Weiss, L. (2003). States in the global economy: Bringing
domestic institutions back in. Cambridge, U.K: Cambridge
University Press.
This source provides an overview of bringing institutions
together and establishing organized structure of dealing with
insecurity.
Herlihy, B., & Corey, G. (2014). ACA ethical standards
casebook. John Wiley & Sons.
This source provides ethical standards that must be applied
during and presentation of the research
3

More Related Content

PDF
Safety and health at School
DOCX
Clinical Field Experience A Assessment Strate.docx
DOCX
INTS3300 Relevant Artifact - Turnbow_3300_L8-RP
DOCX
Running head CRIME PREVENTION IN HIGH SCHOOLS .docx
DOCX
INTS 3300 Final Research Paper
PDF
School Safety Framework 2016.pdf
PPTX
Exploring-Human-Security-at-School-A-Systematic-Review.pptx
Safety and health at School
Clinical Field Experience A Assessment Strate.docx
INTS3300 Relevant Artifact - Turnbow_3300_L8-RP
Running head CRIME PREVENTION IN HIGH SCHOOLS .docx
INTS 3300 Final Research Paper
School Safety Framework 2016.pdf
Exploring-Human-Security-at-School-A-Systematic-Review.pptx

Similar to Running head RESEARCH PROPOSAL IntroductionThis pap.docx (20)

PDF
Bio130 Syllabus Analysis
PDF
Investigating the Determinants of College Students Information Security Behav...
PDF
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
PDF
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
PDF
JJCCJ Peer Review Report - CIS SPO Program
DOCX
Assigment # 1Discuss about a few human Bacterial and vira.docx
PDF
Driving Age Essay.pdf
PDF
Driving Age Essay. Should the driving age be raised to 21 Essay Example Topi...
DOCX
Student data privacy manifesto
PDF
Introduction.pdf
PDF
Disciplinary Hearing Request Report
PDF
2023 Semester 2 Academic Integrity.pdf
PPTX
Topic Proposal for Research for Thesis Wrting.pptx
PDF
Career And Educational Goals Research Paper
PDF
A Scale Development Study about School Safety
DOCX
Journal of Information Technology Education Volume 11, 2012 .docx
PPT
School Safety And Security
PPT
Responsible Conduct of Research: A Framework for Research Administrators and ...
DOCX
chapter 9 interprofessional practice, education, and research1. .docx
PDF
Addressing Academic Integrity In Education And Innovation
Bio130 Syllabus Analysis
Investigating the Determinants of College Students Information Security Behav...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
JJCCJ Peer Review Report - CIS SPO Program
Assigment # 1Discuss about a few human Bacterial and vira.docx
Driving Age Essay.pdf
Driving Age Essay. Should the driving age be raised to 21 Essay Example Topi...
Student data privacy manifesto
Introduction.pdf
Disciplinary Hearing Request Report
2023 Semester 2 Academic Integrity.pdf
Topic Proposal for Research for Thesis Wrting.pptx
Career And Educational Goals Research Paper
A Scale Development Study about School Safety
Journal of Information Technology Education Volume 11, 2012 .docx
School Safety And Security
Responsible Conduct of Research: A Framework for Research Administrators and ...
chapter 9 interprofessional practice, education, and research1. .docx
Addressing Academic Integrity In Education And Innovation

More from charisellington63520 (20)

DOCX
in addition to these questions also answer the following;Answer .docx
DOCX
In an environment of compliancy laws, regulations, and standards, in.docx
DOCX
In American politics, people often compare their enemies to Hitler o.docx
DOCX
In addition to the thread, the student is required to reply to 2 oth.docx
DOCX
In addition to reading the Announcements, prepare for this d.docx
DOCX
In Act 4 during the trial scene, Bassanio says the following lin.docx
DOCX
In a Word document, please respond to the following questions.docx
DOCX
In a Word document, create A Set of Instructions. (you will want.docx
DOCX
In a two page response MLA format paperMaria Werner talks about .docx
DOCX
In a paragraph (150 words minimum), please respond to the follow.docx
DOCX
In a paragraph form, discuss the belowThe client comes to t.docx
DOCX
In a minimum of 300 words in APA format.Through the advent o.docx
DOCX
In a paragraph form, post your initial response after reading th.docx
DOCX
In a minimum 250-word paragraph, discuss at least one point the auth.docx
DOCX
In a hostage crisis, is it ethical for a government to agree to gran.docx
DOCX
In a double-spaced 12 Font paper  How did you immediately feel a.docx
DOCX
In a follow-up to your IoT discussion with management, you have .docx
DOCX
In a COVID-19 situation identify the guidelines for ethical use of t.docx
DOCX
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
DOCX
In a 600 word count (EACH bullet point having 300 words each) di.docx
in addition to these questions also answer the following;Answer .docx
In an environment of compliancy laws, regulations, and standards, in.docx
In American politics, people often compare their enemies to Hitler o.docx
In addition to the thread, the student is required to reply to 2 oth.docx
In addition to reading the Announcements, prepare for this d.docx
In Act 4 during the trial scene, Bassanio says the following lin.docx
In a Word document, please respond to the following questions.docx
In a Word document, create A Set of Instructions. (you will want.docx
In a two page response MLA format paperMaria Werner talks about .docx
In a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph form, discuss the belowThe client comes to t.docx
In a minimum of 300 words in APA format.Through the advent o.docx
In a paragraph form, post your initial response after reading th.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docx
In a hostage crisis, is it ethical for a government to agree to gran.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docx
In a follow-up to your IoT discussion with management, you have .docx
In a COVID-19 situation identify the guidelines for ethical use of t.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 600 word count (EACH bullet point having 300 words each) di.docx

Recently uploaded (20)

PDF
IGGE1 Understanding the Self1234567891011
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Empowerment Technology for Senior High School Guide
PPTX
Lesson notes of climatology university.
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Introduction to Building Materials
PDF
RMMM.pdf make it easy to upload and study
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Hazard Identification & Risk Assessment .pdf
IGGE1 Understanding the Self1234567891011
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
History, Philosophy and sociology of education (1).pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Cell Types and Its function , kingdom of life
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Chinmaya Tiranga quiz Grand Finale.pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Final Presentation General Medicine 03-08-2024.pptx
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Empowerment Technology for Senior High School Guide
Lesson notes of climatology university.
A systematic review of self-coping strategies used by university students to ...
Introduction to Building Materials
RMMM.pdf make it easy to upload and study
Weekly quiz Compilation Jan -July 25.pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Hazard Identification & Risk Assessment .pdf

Running head RESEARCH PROPOSAL IntroductionThis pap.docx

  • 1. Running head: RESEARCH PROPOSAL Introduction This paper intends to investigate the measures of enhancing security in learning institutions. In the previous decades, most universities and colleges have appeared much unique environmental position in terms of security provisions. The security provisions are mainly based significant features which are mainly changing. The university hence can be held accountable for individual functions it is committed as an autonomous body concerning the rules and regulation. Public learning institutions have a supreme equivalence of any other government parastatals that has a duty to protect its clients and employees Thesis Statement This paper seeks to discuss the current statistics which indicates clearly that there is upsurging of numerous crimes which happen in colleges and universities on a continuous basis. It has been discovered that, in the year 2001, there were 11,659 robberies reported from the universities and colleges. Additionally, there have also been 610 murders. Similarly, more than 10,000 compulsory sexual assaults were also described in the college campuses over this same period. Hypothesis Security enhancement leads to a reduction in crimes in Learning Institutions.
  • 2. The universities and schools in this country are prone to the violence. If the plight of violence in this country is not sufficiently addressed, it will lead to a rise in a number of the casualties and victims of murder in the learning institutions (Prenzler, 2012). This is considered to be evident of the challenges that take place in Virginia Tech. Even after the perilous and hazardous occurrence, the country ends up going to normal business, this must not be the case. The federal government and other stakeholders have made the decision to take a stand and commit itself on just what it takes to ensure there is safety in the learning institutions. The first step is to file the bill of installing security measures in learning institutions. Last year the report indicated that over 450 bills were filed but they have never been debated. Based on that, it should be noted that the university and school management do not have an obligation to be blamed with the government on certain aspects of safety and security measures. The second step is to involve all learning institutions stakeholders in the decision making. This requires all teachers, the college management, the parents, board of governors and local communities to come up with diverse and practical strategies to put in place so as to save the students. The third and final step is implementation. Since it has been noted that safe environment is basic to the success of the institution, and it is part and parcel of the school management. The management must execute all strategies discussed including all the bills regarding security. The much-required quality education hence ought to be stressed in all possible situations with the same enthusiasm that is bestowed to different academic issues which the students engage in. These learning institutions, in this case, ought to endeavor to
  • 3. implement the campus security practices which have been considered to be effective in other private colleges and campuses. In addition, it is significant that there must be a stringent evaluation of the execution of the emergency reaction strategies that have to be piloted, where there are numerous crime incidences which take place (Heizer & Render, 2014). This will assist in guaranteeing that the ongoing cycle of mitigation, preparation, response and recovery, is adhered to (Prenzler, 2012). Measurement and Analysis Approach Some of the approaches that will be applied in order to carry out the appropriate and effective study to put in place stringent security measures to the students include a collection of data from the students especially those who have been victims. There will be the use of questionnaires, where questions will be drafted regarding insecurity incidences and what the main causes were. The questionnaires will give feedback on the safety or security measures that have been in place before to curb insecurity issues and were a general impact on the lives of the students. Finally, there will be the use of interviews. The students will be interviewed on the matters concerning security. The interview will be on individual basis. The victims will be given priority in the interview because they have life experience. Ethical Standards Data integrity: falsification and fabrication of research data is misconduct. It is my role as a researcher to avoid some of the omission and false statements that misrepresents research record. Hence I will ensure that I report what has been observed at the time of submission. On issue of publication I will communicate to the scholarly world to help the readers to be more informed of the research findings by making them accessible in continuous manner with pertinent publication
  • 4. standards. The data to be reported must be detailed to help me duplicate the result (Herlihy &Corey, 2014). Applicable Resources Heizer, J. H., & Render, B. (2014). Operations Management: Sustainability and supply chain management. Boston: Prentice Hall This source discusses the designing, overseeing and controlling of the research process to effectively deliver appropriate study. Jones, C., & Kennedy-Pipe, C. (2000). International security in a global age: Securing the Twenty-first century. London: F. Cass. This source provides details regarding international security and management of learning institutions safety measures. Prenzler, T. (2012). Policing and security in practice: Challenges and achievements. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan. This source provides some guidelines and policing strategies that can help to minimize insecurity. Weiss, L. (2003). States in the global economy: Bringing domestic institutions back in. Cambridge, U.K: Cambridge University Press. This source provides an overview of bringing institutions together and establishing organized structure of dealing with insecurity. Herlihy, B., & Corey, G. (2014). ACA ethical standards
  • 5. casebook. John Wiley & Sons. This source provides ethical standards that must be applied during and presentation of the research 3