Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

An evaluation of the effectiveness of security program for sensitive government buildings - Dissertation Example

Comments (0) Cite this document
Security Program for Sensitive Government Buildings Introduction The purpose of this paper is to research security program model for sensitive government buildings. By reviewing all relevant existing literature on the subject and was concluded that the contemporary threats and risk management are related to the terrorism attacks…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
An evaluation of the effectiveness of security program for sensitive government buildings
Read TextPreview

Extract of sample "An evaluation of the effectiveness of security program for sensitive government buildings"

Download file to see previous pages Some interesting cases studies as National Assembly for Wales, Cardiff , Corporation of London and Cabot Circus Shopping Center. Those examples proved the efficiency of the RIBA guidance in counter-terrorism measures. As recommended by RIBA architects and engineers should develop efficient security features with minimal cost extra. Therefore is important to valuate the security program costs. Kovacich and Halibozek in their book: “ Security Management: How to manage the cost of an assets protection program” developed a powerful tool for security professionals setting out to design cost-effective programs. Finally and based on the previous research were suggested recommendations to improve the security of sensitive government buildings in OMAN. Risk Factors Abkowitz defines risk factors as the elements which are at the source of the disasters. These elements are classified in 10 basic risk factors: . Design and construction flaws: these flaws are related to the design specification in building or major facilities construction. . Deferred maintenance: related to the use of the operation/building. Flaws during this stage should be prevented. Unfortunately it doesn’t happen so often. ...
. Schedule constraints: the control of the project schedule is also very important. Sometimes in order to accomplish a deadline some tasks are eliminated or some details are devalued. It can lead to error and sometimes to destructive outcome. . Inadequate training: In some kind of tasks the individual training is critical for a correct performance. Some organizations don’t invest as they should in the training of the employees. Therefore some flaws can occur. . Not following the procedures: this risk factor relates to the failing to follow procedure. In some organization the individual task is very well defined and documented by a procedure. When the procedure is not accomplished it can cause operational flaws. . Communication failure: this flaw is related to the communication between members of the same organization, between different organizations or between the organization and the public. . Arrogance: can lead into human flaw by underestimating the risk and can drive to insecure situations. Arrogance can appear also at the institutional level. At this level the arrogance is reflected in the culture of the organization. . Stifling political agendas: The governmental policies can lead into some risk. The political agendas are associated with the Terrorism. But the risk is not limited to the terrorist attacks. (Abkowitz, 2008). Contemporary Threats and Risk Management Nowadays the concept of security has been developed to a complex arena, including issues of health and safety, and components of risk evaluation and management, paying attention to a broader array of risks (forgeries, terrorism, emergency situations). Button in his work identifies the the pluralisation of security as one of the main trends security management ( Button, 2008). ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“An evaluation of the effectiveness of security program for sensitive Dissertation”, n.d.)
An evaluation of the effectiveness of security program for sensitive Dissertation. Retrieved from
(An Evaluation of the Effectiveness of Security Program for Sensitive Dissertation)
An Evaluation of the Effectiveness of Security Program for Sensitive Dissertation.
“An Evaluation of the Effectiveness of Security Program for Sensitive Dissertation”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF An evaluation of the effectiveness of security program for sensitive government buildings

Review and evaluation of information security program

...? Review and evaluation of information security program In this essay, it is pointed out what information security governance is in a banking software company, how it has been implemented and its purpose in the company. It details an information security policy that provides total control, hence compliance, to ensure effective information security governance. Information is a main asset for any institution and measures to ensure security of assets is of key importance. A well implemented information security governance framework should direct and control security policies that are implemented at all levels of decision making Table of Contents 1. Introduction 3 2. Information security governance and its strategy 4 3. Regulations... motivated...
13 Pages(3250 words)Term Paper

PROGRAM EVALUATION both the local and non-local people as well as the government. For the government it helps is creation and updating of the existing policies and laws governing the introduction of health insurance in the republic (UAE). In order to determine the consumer satisfaction with the insurance program initiated in the country it would be better conducted in the following ways: I. The program contribution to the people of UAE and application nature of the Program II. The effects of the consumer satisfaction on the development of the country Before accessing the consumer satisfaction of the program it was wise...
8 Pages(2000 words)Research Paper

Program evaluation

...and summative evaluation (Cheyenne, Wyo .1993). Formative evaluation will include assessment of needs and evaluability. It will also include structured conceptualization and evaluation of process and implementation. Summative evaluation will include evaluation of outcome and impact. It will also include analysis of secondary data, meta-analysis, its cost-effectiveness and cost-benefit Project Identification This program to evaluate the effectiveness of the practicum experience of the social work program was carried out in Northeastern State University...
4 Pages(1000 words)Research Paper

Program Evaluation

...and not outcomes. This is because the results have not been attained, as these are the procedures and recommendations on how the program will be evaluated. The budget I presented includes funds for evaluation, but they are not enough. The budget needs to be an increase the funds such that they will be enough to meet the task. The budget includes some funds for health education where the community will be tipped on the strategies for reducing the effects of obesity and diabetes (Schalock & Thornton, 2008, p. 243). Conclusion It is important to note that program evaluation should be performed in every activity carried out either in the...
3 Pages(750 words)Essay

Security Program

...Running Head Security Program Security Program Security planning is one of most important risk management initiatives in modern organizations. Security planning must be seen in the context of wider organizational policies. Many aspects of security planning will be taken care of by, for example, the IT department or its equivalent. However, high level security provision on its own is not enough; the systems have to work in practice. The Data Protection Principle makes this clear, by requiring that security measures be 'technical and organizational'. Technical measures are relatively easy to provide: password systems, back-up systems for computers, locks on filing cabinets, and access control either to the building or to key parts... making...
7 Pages(1750 words)Case Study

Prevention: Human Factors

.... Recommendations It is first needed that a system be installed in place preferably with a professional security based agency to create an employee- security system course. It is recommended that this course be comprehensive, with visuals, and movies and what-if scenarios. This is the first recommendation made to ensure that a consistent view of information security among employees. The program must result in grading the employee providing a distinct status for the one who passed the evaluation. Ranging from certificates, mementos, and gifts to pay hikes. Security policies should be introduced over a long time like school semesters. The...
35 Pages(8750 words)Essay

Program Evaluation

...Background Program evaluation is a scientific approach to assess the value of core managed programs. Formal evaluation programs are applied to the healthcare, social welfare and deferral government programs. Such evaluation programs involve measuring costs and outcomes. It includes a scientific research design and statistical analysis to identify and measure program effects (Grannemann, n.d.). As program evaluation focuses on measuring program effects, it goes beyond measuring simple...
7 Pages(1750 words)Essay

Program Evaluation

...Program Evaluation Gamble Total Environments, Health, and Safety Management Lecturer: This report covers the evaluation of management’s commitment & leadership, employee participation and accountability at Procter & Gamble keeping in view their management of environments, health & safety. It involves careful observation and collection of data, information and actions of the organization that contributes towards their effort for sustainable and high quality environment, health & safety management. This includes matching their actions with set standards and best practices known in texts and all over the world. The report would identify their programs strengths and...
4 Pages(1000 words)Research Paper

Program evaluation

...Evaluation Program Program evaluation is a procedural method of data collection, analysis and use to respond to the needs about the project policies, efficiency and its effectiveness in the society. The people in the society both the private and governmental sector will always demand to know the usefulness of the system they have voted in and funded for it both directly and indirectly. There are various methods of evaluation. These include process; impact, outcome, formative and among others. Evaluation helps to give solutions to problems such as how the program will be developed, the alternative to the...
4 Pages(1000 words)Research Paper

Nursing Sensitive Indicators and Health Care Evaluation

...Nursing Sensitive Indicators and Health Care Evaluation Along with reforms in health-care, the desperate need for quality of care and cost effectiveness as well as sophisticated growth of systems of health-care has become an amplified emphasis on outcomes and evidence. Such elements, plus the growing concern on changes in skill-mix, encouraged nursing to focus much on identification of outcome indicators that are sensitive to indicators nursing inputs as well as staffing levels. The first part of this paper looks at nursing-sensitive analysis and its importance in improving the effectiveness in nursing...
10 Pages(2500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Dissertation on topic An evaluation of the effectiveness of security program for sensitive government buildings for FREE!

Contact Us