Martinakom

Not Rated (0)

$12/per page/Negotiable

About Martinakom

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Applied Sciences See all
Accounting,Applied Sciences,Architecture and Design,Biology,Business & Finance,Calculus,Chemistry,Computer Science,Geology Hide all
Teaching Since: Jul 2017
Last Sign in: 303 Weeks Ago, 5 Days Ago
Questions Answered: 5023
Tutorials Posted: 5024
Category > Law Posted 18 Mar 2018 My Price 10.00

ORTH Abstract Is the inmate contact visitation procedures at USP Leavenworth the leading cause for contraband introduction into the inmate population?

Abstract

Is the inmate contact visitation procedures at USP Leavenworth the leading cause for contraband introduction into the inmate population?  This thesis project looks at the most viable source for contraband through a number of qualitative sources.  Upon further investigation of primary research articles, Bureau of Prison (BOP) statistics, a security survey, a risk assessment, and one-on-one interviews with BOP staff, the primary source of contraband does come from contact visitation.  This data supports the hypothesis by agreeing with the original argument of contact visitation being the number one source of contraband introduction.  With a thorough understanding of the primary source of contraband, it is important to implement the appropriate mitigation techniques, in the proper format, to target harden this weakness.  Upon finding commonalities amongst each source of research, it is safe to begin the implementation of alternative, or various new programming approaches, to contact visitation throughout all federal prisons to reduce the levels of contraband.  

 

 

 

 

 

 

 

 

 

 

Methodology

This project utilized many forms of qualitative, primary research.  By using qualitative research, subjective data was utilized, no limit was placed by rigidly variables, and new theories were easily developed, which provided the study with a more in depth approach to personal opinions and assessments.  This type of data analysis would be impossible with the use of strictly quantitative data – therefore, this research was not utilized.  One of the first tools used was a Security Survey Analysis, a correctional study form of research.  The security analysis utilized eight different aspects: Facility Security Legislation, Strategic Planning, Standard Operating Procedures, Security Force Management, Perimeter Fence Line, Parking, Access Points, Lighting, and Buildings (See Survey Report 1.0).  Many of these components were irrelevant to the contraband introduction through contact visitation, but were necessary in order to give the reader more extensive knowledge of the institution.  Also, it increased validity and reliability of the survey.  In regards to the physical structure of the visiting area, the security survey mainly focused on the Access Points, and Standard Operating Procedures, which could provide loopholes to contraband introduction.

After conducting the security survey, the possible security risks related to the visitation center and procedures was developed.  This was completed with a thorough risk assessment, which is a casual-comparative design of research.  It analyzed any particular risk with relation of how visitors manage to bring contraband inside, from the outside.  A further detailed description of the risk assessment can be found in the appendix, Risk Assessment 1.0.  To begin the risk assessment of visitation security, determining the criticality of contraband being introduced to inmates was needed.  The next step of the risk analysis was to determine the probability of having visitors introduce contraband to inmates.  Because the hypothesis focused strictly on visitation procedures and illegal contraband, this was the main focus on the probability portion of the assessment.  Finally, a determination of the vulnerability of contraband introduction was assessed.  A search for the most important threats that visitation provides to USP Leavenworth was essential; it attempts to dissect the components which are at fault.  This tool also allowed the information to be converted to a single, numerical value of the risk of visitation procedures at the institution.  The security survey and risk assessment were not the only forms of primary research however. 

Attachments:

Answers

Not Rated (0)
Status NEW Posted 18 Mar 2018 03:03 PM My Price 10.00

Hel-----------lo -----------Sir-----------/Ma-----------dam----------- Â-----------  -----------Tha-----------nk -----------you----------- fo-----------r y-----------our----------- in-----------ter-----------est----------- an-----------d b-----------uyi-----------ng -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll -----------be -----------qui-----------ckl-----------y

Not Rated(0)