100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SEP3701 Assignment 2 (ANSWERS) Semester 1 2025 - DISTINCTION GUARANTEED

Rating
-
Sold
1
Pages
10
Grade
A+
Uploaded on
27-04-2025
Written in
2024/2025

Well-structured SEP3701 Assignment 2 (ANSWERS) Semester 1 2025 - DISTINCTION GUARANTEED. (DETAILED ANSWERS - DISTINCTION GUARANTEED!)..... QUESTION 1 Draft the Unisa Security Risk Management Model and give reasons for the addition of steps 9 and 10 respectively. (10) QUESTION 2 Discuss the sociological factors that causes crime (do not copy examples from your study guide). (15) QUESTION 3 Calculate a risk factor using a matrix on a total scale of 5. Probability factor is 2 and the impact factor is 4. (5) QUESTION 4 Discuss all the secondary sources of obtaining information, which will be used for the crime risk analysis and as supportive evidence. (do not copy examples from your study guide) (15) QUESTION 5 Distinguish between an on-site orientation and a security survey. (10)

Show more Read less
Institution
Module









Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Institution
Module

Document information

Uploaded on
April 27, 2025
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SEP3701
Assignment 2 Semester 1 2025
Unique Number:
Due Date: 29 April 2025
QUESTION 1

The UNISA Security Risk Management Model, adapted from Rogers (2005) and extended
by Olckers (2007) and Kole (2010), consists of the following steps:

Step 1: Factors causing crime

Identify internal and external factors contributing to crime risks.

Step 2: Security policy and mandate

Develop a security policy to guide decisions and activities.

Step 3: Orientation phase

Understand the environment where security risks exist.

Step 4: Risk analysis exercise

Quantify and qualify crime risks to prioritise threats.




DISCLAIMER & TERMS OF USE
 Educational Aid: These study notes are intended to be used as educational resources and should not be seen as a
replacement for individual research, critical analysis, or professional consultation. Students are encouraged to perform
their own research and seek advice from their instructors or academic advisors for specific assignment guidelines.
 Personal Responsibility: While every effort has been made to ensure the accuracy and reliability of the information in
these study notes, the seller does not guarantee the completeness or correctness of all content. The buyer is
responsible for verifying the accuracy of the information and exercising their own judgment when applying it to their
assignments.
 Academic Integrity: It is essential for students to maintain academic integrity and follow their institution's policies
regarding plagiarism, citation, and referencing. These study notes should be used as learning tools and sources of
inspiration. Any direct reproduction of the content without proper citation and acknowledgment may be considered
academic misconduct.
 Limited Liability: The seller shall not be liable for any direct or indirect damages, losses, or consequences arising from
the use of these notes. This includes, but is not limited to, poor academic performance, penalties, or any other negative
consequences resulting from the application or misuse of the information provided.

, For additional support +27 81 278 3372

INTRODUCTION

This assignment addresses key concepts within the field of security risk
management. It begins by presenting the Unisa Security Risk Management Model,
with a particular focus on the significance of the newly added steps 9 and 10. A clear
understanding of the complete model is critical for developing effective risk
management strategies. The assignment further explores the sociological factors
that contribute to criminal behavior, offering insights beyond those discussed in the
prescribed study guide. To deepen the practical application of risk management, a
calculation of a risk factor using a matrix is also included, illustrating how probability
and impact interact in risk evaluation. Additionally, the assignment identifies and
discusses various secondary sources of information that can be used to support
crime risk analyses, reinforcing the importance of reliable data. Lastly, a distinction is
drawn between on-site orientation and security surveys, highlighting their unique
roles in crime prevention and organizational safety strategies.



DEFINITION OF KEY CONCEPTS

1. Security Risk Management Model

A structured and systematic approach used to identify, assess, manage, and monitor
security risks in an organisation. It involves steps such as threat identification, risk
analysis, implementing security measures, and monitoring effectiveness. In the
Unisa model, steps 9 (implementation of security measures) and 10 (monitoring and
review) are added to ensure practical application and ongoing evaluation.



2. Sociological Factors Causing Crime

Social influences that increase the likelihood of criminal behaviour, such as poverty,
inequality, peer pressure, family breakdown, lack of education, and unemployment.
These factors shape individuals' behaviour by affecting their opportunities,
motivations, and values in society.



3. Risk Matrix

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Edge
Follow You need to be logged in order to follow users or courses
Sold
9685
Member since
2 year
Number of followers
4252
Documents
2675
Last sold
1 day ago

4.2

1178 reviews

5
664
4
236
3
178
2
27
1
73

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions