Nobody downloaded yet

Management One Protective Security - Essay Example

Comments (0) Cite this document
Management One Protective Security BY YOU YOUR SCHOOL INFO HERE DATE HERE Management One Protective Security 1. Improving Performance Interactions with high profile and valuable clients requires both a humanistic approach and a logical approach to supporting ongoing relationships and ensuring the security and integrity of the company’s financial expectations…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
Management One Protective Security
Read TextPreview

Extract of sample "Management One Protective Security"

Download file to see previous pages In this particular Iraqi private security company, the structure that guides leadership and follower hierarchies include positions of Country Manager, Regional Manager, Operations Manager, Team Leader, 2ic Deputy, driver support staff and a translation expert. Reis & Pena (2007) identify that vertical hierarchies are ill-prepared for empowering workers and will not be ready to accept change. Therefore, to improve performance, it is first necessary to examine the structure that guides interoffice activities and also those impacting client relationships to determine which type of structure is most effective in gaining support from the team members and also at the individual level. Communication, in this type of industry, requires a 360 degree movement, therefore establishing a structure where information moves across the entire employee and manager network instead of merely being elicited from the highest layers of leadership. Delegating is not a difficult managerial task for fostering more support for a project initiative or the basic routine of ensuring quality customer relationship management. Reinstein (2007) identifies that there are three types of individuals that will either support or resist change practices. There is a small support group at 25 percent, undecided varieties that sit on the proverbial fence on issues at 50 percent, and another at 25 percent who are adamantly against change efforts. The key is to first understand the cultural dimensions that drive each member of the team and understand their personality type. In some cases, this can be accomplished through consultation with generic human resources staff to locate or distribute a personality profile testing using reputable models for this research effort. Further showing the inter-linkage between motivation and knowledge, support for more team-based efforts can be accomplished by creating an interpersonal relationship with team members to build support for future efforts involving client relationships. Delegating in the face of change resisting personalities requires an authoritarian approach whilst delegating with undecideds or supporters is merely creating a team-focused environment with a quality blend of social and authoritarian skills. “The first phase of development in teams is membership” (Bushe & Coetzer, 2007, p.187). Delegation occurs effectively when members are already committed to achieving a project or client-related goal. 2. Teams Having already identified the structure of this particular team, there are three specific features that create the need for a progressive and transformational manager to gain support and commitment: 1. It is exposed to conflicting and radically unique cultures with each client interaction. 2. Job roles change significantly with each client scenario, thus it requires flexibility from group members. 3. Management and subordinates are empowered to innovate and work independently from the group. A key player in this group is the translator who functions as a logical and cultural bridge to clients of all varieties. This individual is relied upon by each member of the team as a liaison for client needs and there runs the risk of much being lost in translation both verbally and in terms of expressive body language. “The study of business is afflicted by confusion between the results of a survey of what ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Management One Protective Security Essay Example | Topics and Well Written Essays - 2750 words”, n.d.)
Retrieved from
(Management One Protective Security Essay Example | Topics and Well Written Essays - 2750 Words)
“Management One Protective Security Essay Example | Topics and Well Written Essays - 2750 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Management One Protective Security

Course Work 1 ( Legal Framework of Protective Security)

...? Legal Framework of Protective Security Word Count: 3,000 What criminal offences appear to have been committed and by whom? Advise Carl on his legalposition both with the civil law and criminal law. What criminal charges might Carl face and what defences might he have? Who might be able to take action against Carl under civil law and on what basis? Would any other person or organisation have any legal liabilities under civil law or under criminal law provisions in the UK? I. Criminal Offences Committed and By Whom (600 words) Torts in UK law are very clear in stipulating what is negligence and what is duty of care. “The tort of negligence has developed this century largely as a result of the judgement in...
12 Pages(3000 words)Essay

Child Protective Services

...are to be protected in their homes and in the system, radical new guidelines must be adopted. At the core of the problem is the antifamily mindset of CPS. Removal should be the last resort, not the first one. With insufficient checks and balances, the system that was designed to protect children has become the greatest perpetrator of harm (Scott, 179). The employees of the CPS are not enough in number to adhere to the rising number of cases in a year. The process of registering a complaint or placing the children into a sound custody is lengthy and tedious. A lot of complains even go unattended due to the over burdening of the social worker working in the CPS. The anti-family system has...
4 Pages(1000 words)Essay

Collective Bargaining - Protective Services

...of legislation that create collective bargaining rights for certain public and government employees, however, no constitutional act exists to protect the labor rights of the members of the United States military. For example, the Labor Management Reporting and Disclosure Act (LMRDA) provides labor rights for most public sector employees including postal workers and those covered by the Railway Labor Act which covers railway and airline workers (US Department of Labor 2011). While some may argue that the inability to collective bargaining is a breach of military members rights, there are economic and political implications that gravely hinder the ability to easily grant said rights. Recently several...
5 Pages(1250 words)Research Paper

Federal Protective Service (FPS)

...infrastructure, the FPS uses strategies that enable detection, deterrence, disruption, and investigation of threats using authorities concerned with law enforcement. Additionally, FPS mainly relies on its risk management program, which is supposed to be set to the standards of Interagency Security Committee and the National Infrastructure Protection Plan. Additionally, FPS ensures effective communication and coordination among its law enforcement personnel, by using the MegaCenter, its central communication point (Goldstein, 2009). Although the FPS works to ensure the security of federal buildings, it has not come up with comprehensive measures to address the...
4 Pages(1000 words)Research Paper

Security Management

... responsibilities. Security specialists plan and advise on staff levels, operational policy and plans, budget and related administrative and doctrinal guidance for protective forces. Direct day-to-day administration and supervision over such work is usually the responsibility of police or guard supervisors. The nature of work of the security specialists differ from even to event. It spans across multifunctional, geographical and cross cultural activities. Some times a specific activity may require more than one level of security activity. The kind of activities is as given below: Personnel security management: This requires the careful recruitment of security personnel who are suitable, reliable, loyal and trustworthy to protect... ...
14 Pages(3500 words)Essay

Personal Protective Equipment & Control Measures

...and healthy work environment to employees and protect them from hazards that can cause injury. For the purpose employers plan and execute a Health, Safety and Environmental (HS&E) Policy for its organization that monitors and assesses process, material, product, working environment, premise for identification, elimination and future prevention of a hazard. This is done through elimination of a potential hazard through substitution or reducing its impact through engineering and administrative controls. Controlling a hazard at the source is the best way to protect the employees. Substitution method involves replacing an ingredient / material use in the process or a machine with a less dangerous...
3 Pages(750 words)Literature review

Security Management (

...SM <Security Management> and Section # of The report presents a short ofhow security cover can be efficiently provided to a high profile event. The job of a security manager or a security head while the event is on as well as the time to its build-up has been effectively laid out in this report. Several security threats like crowd control, traffic management and terrorism threats have been covered. Also to add to the authenticity of the control, measures to sustain any kind of known or unknown incident have been mentioned along the course of the report. Special emphasis on the VIPs attending the event has been covered as well in this security management report. All in all a complete security picture has been painted through this report... ...
7 Pages(1750 words)Essay

Management 2 (protective security)

.... The target is to increase our market share from the current 15% to 20% within a period of two years. Another target is to introduce certain changes within the organization such that the overall costs would reduce by 5% within a period of one year. These changes include reducing field managers by 50% and employ more Close protection officers with advanced qualification. The organization had an objective of increasing its market share. The company embarked on a market wide research effort to identify client needs that were not being met. The organization realized that many business entities with huge capital bases required specialized protection service from the...
12 Pages(3000 words)Essay

Security Management

...Security Management Security Management Executive Summary Over the past few years, surveys have indicated that security has become one of the top issues in many organizations. Following attacks of 9/11 and other series of attacks and threats of attacks, security features in buildings and sites have become important. While architects and engineers endeavor to use the best skills that ensure optimum building and site security, Information Technology is the other area that IT experts spend a lot of time and resources trying to protect organization information. In all private and public institutions, budget investment has to be justified and the effectiveness of the investment be evaluated afterwards. This evaluation is often referred... ...
17 Pages(4250 words)Research Paper

Protective equipment

...Protective Equipment An Assignment Submitted by Fall Protective Equipment Handling chemicals is always a difficult job as it poses a high risk factor and sometimes may even lead to fatal consequences, if it is handled with ignorance or carelessness. Chemicals have the property to react when exposed to other chemicals or certain physical conditions. (“Chemical Reactivity Hazards,” n. d). This reactive property of chemicals is employed in a wide range of industries such as food production, material production, pharmaceutical, and others. Conventionally, many such industries do not always categorize the unique behaviour of chemicals used in their respective industries, and may do not provide enough knowledge...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Management One Protective Security for FREE!

Contact Us