Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Management One Protective Security - Essay Example

Comments (0) Cite this document
Management One Protective Security BY YOU YOUR SCHOOL INFO HERE DATE HERE Management One Protective Security 1. Improving Performance Interactions with high profile and valuable clients requires both a humanistic approach and a logical approach to supporting ongoing relationships and ensuring the security and integrity of the company’s financial expectations…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Management One Protective Security
Read TextPreview

Extract of sample "Management One Protective Security"

Download file to see previous pages In this particular Iraqi private security company, the structure that guides leadership and follower hierarchies include positions of Country Manager, Regional Manager, Operations Manager, Team Leader, 2ic Deputy, driver support staff and a translation expert. Reis & Pena (2007) identify that vertical hierarchies are ill-prepared for empowering workers and will not be ready to accept change. Therefore, to improve performance, it is first necessary to examine the structure that guides interoffice activities and also those impacting client relationships to determine which type of structure is most effective in gaining support from the team members and also at the individual level. Communication, in this type of industry, requires a 360 degree movement, therefore establishing a structure where information moves across the entire employee and manager network instead of merely being elicited from the highest layers of leadership. Delegating is not a difficult managerial task for fostering more support for a project initiative or the basic routine of ensuring quality customer relationship management. Reinstein (2007) identifies that there are three types of individuals that will either support or resist change practices. There is a small support group at 25 percent, undecided varieties that sit on the proverbial fence on issues at 50 percent, and another at 25 percent who are adamantly against change efforts. The key is to first understand the cultural dimensions that drive each member of the team and understand their personality type. In some cases, this can be accomplished through consultation with generic human resources staff to locate or distribute a personality profile testing using reputable models for this research effort. Further showing the inter-linkage between motivation and knowledge, support for more team-based efforts can be accomplished by creating an interpersonal relationship with team members to build support for future efforts involving client relationships. Delegating in the face of change resisting personalities requires an authoritarian approach whilst delegating with undecideds or supporters is merely creating a team-focused environment with a quality blend of social and authoritarian skills. “The first phase of development in teams is membership” (Bushe & Coetzer, 2007, p.187). Delegation occurs effectively when members are already committed to achieving a project or client-related goal. 2. Teams Having already identified the structure of this particular team, there are three specific features that create the need for a progressive and transformational manager to gain support and commitment: 1. It is exposed to conflicting and radically unique cultures with each client interaction. 2. Job roles change significantly with each client scenario, thus it requires flexibility from group members. 3. Management and subordinates are empowered to innovate and work independently from the group. A key player in this group is the translator who functions as a logical and cultural bridge to clients of all varieties. This individual is relied upon by each member of the team as a liaison for client needs and there runs the risk of much being lost in translation both verbally and in terms of expressive body language. “The study of business is afflicted by confusion between the results of a survey of what ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Management One Protective Security Essay Example | Topics and Well Written Essays - 2750 words”, n.d.)
Retrieved from
(Management One Protective Security Essay Example | Topics and Well Written Essays - 2750 Words)
“Management One Protective Security Essay Example | Topics and Well Written Essays - 2750 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Management One Protective Security

Can One Person Make a Difference in an Organization

Each individual has something to contribute but at times one person can make a difference to an organization.
Technology today has made it possible to retain and conserve knowledge and transmit it to other people in an organization. The knowledge that has been created by a single individual can be a powerful weapon when retained, transmitted, disseminated and applied. According to Nonaka, new knowledge begins with an individual (Chaston, Badger & Sadler-Smith, 1999). When the new knowledge is generated it is merged with the existing knowledge and new knowledge from other sources and provides the basis for new products and processes. Thus knowledge has been classified into two categories – explicit and tacit. Explici...
6 Pages(1500 words)Case Study

Customer Relationship Management

 Consumers started looking for variety and lower prices. Through the use of technology, such customer tradeoff against variety and prices is not necessary. The US life insurance industry is large, mature and dominated by a number of large companies and this industry has been one of the early adopters of computer technology (Subramanian & Chatterjee, 2007). The advent of the CRM systems changed the landscape of the insurance industry.

The health insurance organizations use CRM to prepare health proposals and process applications in a much faster and accurate way. The organizations are better able to understand the needs and habits of the customer and provide more efficient service. Companies are able to integrat...
9 Pages(2250 words)Case Study

Diversity Management in Organisations

... column. Superior staff’s as well as clientele satisfaction results in increased productivity. Diversity goes ahead of worker’s equity to cultivate office surroundings that values the dissimilarities and capitalizes on the latent of all workers, one that encourages worker’s inventiveness and innovativeness. (POLLITT, David, 2006) Diversity management enable individuals to act upon up to their utmost potential as it emphasizes on modifying the company‘s ethnicity and infrastructure so that people may attain the peak output efficiency feasible. Efficiently administration of diversity manoeuvres the “operating overheads and workforce attitudes, recruitment of human resources, sales and market share, creativity and innovation, group problem...
6 Pages(1500 words)Case Study

The Relationship Between Security, Risk and Health in a Large Organisation

...The relationship between Security & Risk and Health & Safety in a large organisation "Assess the relationship between Security & Risk and Health & Safety in the context of a large organisation. Are they complimentary or the demands of one conflict with or inhibit the realisation of the other? Identify and discuss the implications of your assessment for the roles of the security manager". 1. Introduction The development of commercial activities worldwide has been extremely rapid; firms operating in various industrial sectors need to confront a series of challenges in order to ensure the limitation of risk related with their strategic initiatives. Within this context, the issues of security, risk, health and safety are very likely to appear...
9 Pages(2250 words)Coursework

The Management, Leadership and Teamwork Competencies Required by a Small Business Owner

On the other hand organizational leadership is defined as the ability based on the specific skill of an individual to lead his/her subordinates in a manner that pre-planned organizational goals could be achieved within the defined time-frame.

According to Burns (1978) and Bass (1985), transformational leadership has a set of category constructs such as values, morals, farsightedness, long term goals, principles, acute awareness about the dividing line between causes and symptoms, mission statements, strategic perspectives, and human resources. Similarly, they identify a set of category constructs in the transactional leadership also. For instance concentration on the task at hand, short term goals and tactics, confusion co...
6 Pages(1500 words)Coursework

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

Role of the Police and Private Security

... and private detective agencies) it would be a good idea to use these agencies and individuals to provide information to government security agencies on other areas as well. It could provide some relief to an over-worked security force in many parts of the country. Federal funding: Crime in its various forms has always existed in many parts of the United States. In addition criminal activities like terrorism have seen an increase over the years. This has put a lot of pressure on the resources of the state and local police departments across the country. The available resources collected through taxes and other duties may now be insufficient to manage an efficient police force that is capable of providing adequate protection to its citizens...
8 Pages(2000 words)Case Study

Self Assessment: Conflict Management Style

The assessment also indicated that second to collaborating attitude, I also tend to compromise just to be at peace with the conflict arising and be over it after knowing I had done everything I am supposed to do.

The results of the assessment did not surprise me a bit. And I should say I couldn’t agree more. When presented with random situations that may arise in conflicting ideas or viewpoints, I can say that I am the type of person who approaches issues emphasizing systematic approaches. I usually hear both sides of the discussion and evaluate the issue before I make my own judgment. I am not easily swayed with other people’s opinions even when a lot of them think in the opposite way that I do. When making...
7 Pages(1750 words)Essay

Management Theory and Practice in the Early Childhood Education Industry

As pointed out in a study by Osgood and Halsall (2007) where they carried out research to examine the position of women in leadership or management positions, a “glass ceiling” exists for women in the academic setting, which could significantly impair motivation. Since many of the individuals employed in the early education sector are women, addressing this issue is even more important because these individuals are faced with the difficult task of shaping young minds while also dealing with the problems associated with the actual physical care of very young children. The quality of professionals in this sector is vital because it impacts the growth and development of the children that they care for. The degree of invol...
6 Pages(1500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Management One Protective Security for FREE!

Contact Us