Nobody downloaded yet

Successful security management - Research Paper Example

Comments (0) Cite this document
Summary
In a nutshell, security is a collection of various processes and procedures put in place within an organization to ensure that the overall objectives and…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
Successful security management
Read TextPreview

Extract of sample "Successful security management"

Download file to see previous pages The various area of security that needs attention include:
Dalton (2003) traces the roots of contemporary corporate security back to the role of the night watchman prior to the 1960s. In this guise the job of security personnel within businesses entailed little more than acting as a lookout with a primary role of early warning in case of incidents such as fire. Throughout the 1960s and into the latter half of the 20th century this limited early role began to expand and fire watches began to take on more classical security duties including controlling access and egress from properties, patrolling and maintaining perimeter fences and general guarding duties (Gill, 2006). Dalton terms this the ‘Green Shack Era’ as activities were typically based out of such shacks located by the main gate (Gill, 2006).
While security management progressed at varying speeds within industries different and between individual organizations a growing role for security departments within the corporate world was apparent. For the most part it moved out of the so-called green shacks and into offices embarking on what Dalton describes as the ‘Physical Security Era’ (Gill, 2006). With the arrival of the physical security era corporate security continued to perform duties such as security patrols but in addition took on responsibilities for responding to medical emergencies, controlling traffic, monitoring equipment, escorting employees and staffing front desks (Gill, 2006). This entirely defensive approach to corporate security could be considered the trademark of the physical security era and to an extent it remains the ethos behind security departments in many large businesses today (Gill, 2006).
One of the effects of globalization has been a proliferation in the number of threats which face large organizations with exposure to operational risks all over the world. This in turn has made the job of protecting businesses much more complicated and means the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Successful security management Research Paper Example | Topics and Well Written Essays - 2250 words - 1”, n.d.)
Successful security management Research Paper Example | Topics and Well Written Essays - 2250 words - 1. Retrieved from https://studentshare.org/miscellaneous/1607849-successful-security-management
(Successful Security Management Research Paper Example | Topics and Well Written Essays - 2250 Words - 1)
Successful Security Management Research Paper Example | Topics and Well Written Essays - 2250 Words - 1. https://studentshare.org/miscellaneous/1607849-successful-security-management.
“Successful Security Management Research Paper Example | Topics and Well Written Essays - 2250 Words - 1”, n.d. https://studentshare.org/miscellaneous/1607849-successful-security-management.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Successful security management

Successful Project Management

...an official approval for running the event and offering suitable capability to manage any un-certain event or some security issues. Festival Equipment Suppliers In case of music festival execution, basic equipment providers are also one of the important stakeholders of the project. Their dedication and on time delivery of required items need to be ensured in order to make this event a success. In case of any delay by any project stakeholder overall event can suffer. In the above section I have outlined some of the key stakeholders those need to be managed for the improved performance of the project. In this scenario we need to take care of every stakeholder’s needs and...
11 Pages(2750 words)Essay

Security management

...?Recognize and critically analyze the various forms of liability associated with the security management industry. Provide cost effective measures for architectural security design for facilities, airport security, and critical in fractures. Introduction Security is an issue that has and continues to gain prominence even at the global level. It is not surprising and it is actually for this reason that there are universally accepted bodies in charge for for ensuring global security at the world level. Mention can be made of bodies and agencies such as the United Nation Security Council and NATO. At the national and other...
3 Pages(750 words)Research Paper

Communication and successful management

...?Running head: Communication and successful management Table of Contents Introduction ……………………………………………………………………………… 3 Significance of the study ………………………………………………………………… 3 Research questions ……………………………………………………………………… 4 Scope …………………………………………………………………………………… 4-5 Background …………………………………………………………………………… 5-6 Definition of terms ……………………………………………………………………. 6 Research methodology …………………………………………………………………. 6-7 Research methods ……………………………………………………………………… 7-8 Validity and reliability ………………………………………………………………… 8-9 Analysis and discussion ……………………………………………………………… 9 Format ………………………………………………………………………………… 9-11 Time line ……………………………………………………………………………… 11 Budget and resources …………………………………………………………………… 11 References... ...
8 Pages(2000 words)Research Paper

Successful information security management

...? Full Paper Introduction Successful information security management involves an amalgamation of prevention, detection and response in order to deploy a strong security defense. Security has become an encircling issue for designers and developers of the digital world (Conklin, White, Cothren, Williams, & Davis, 2004). A system should also be able to counter incidents and raise proper procedures in case an information security incident occurs. Information security incident handling takes a stride forward in the information security management procedure. The aim is to provide a reference...
9 Pages(2250 words)Research Paper

Security Management

...with the individual human behavior. Just like as organizational behavior gives an integrated and contingency approach to management, it also gives an edge to perform the security activity to the security specialists. The understanding of organizational behavior will enhance the chances of successful implantation of the security project. The organizational and group behavior dynamics will highlight the areas of concentration basing on scientific foundations. Organization behavior coordinates the diversified range of disciplines. Management in other terms is doing the job in a well-organized, efficient manner, making good use of all...
14 Pages(3500 words)Essay

Security Management (

...SM <Security Management> and Section # of The report presents a short ofhow security cover can be efficiently provided to a high profile event. The job of a security manager or a security head while the event is on as well as the time to its build-up has been effectively laid out in this report. Several security threats like crowd control, traffic management and terrorism threats have been covered. Also to add to the authenticity of the control, measures to sustain any kind of known or unknown incident have been mentioned along the course of the report. Special emphasis on the VIPs attending the event has been covered as well in this security management report. All in all a complete security picture has been painted through this report... ...
7 Pages(1750 words)Essay

Successful security management

...Successful Security Management Introduction Security is associated with risk and uncertainty. The ment ‘Successful security management in any organizational context must be driven by an agenda to enhance the financial viability of the organization’ is based on the fact that risk is all pervasive and therefore, the financial viability of an organization depends upon avoiding risks at all stages by resolving uncertainties. Risk is not completely unavoidable in a business organization and security planning is essential to create secure environment. Perception of risk at various levels varies according to the awareness among the people at different levels. Since security is a mission to protect the people, property and the business... , an...
9 Pages(2250 words)Research Paper

Security Management

.../palgrave.sj.8340129 According to Hayes, (2003) the traditional methods of loss prevention seem not to be working and especially in multi-million dollar companies hence putting the security of their assets in jeopardy. The senior management in these companies has decided on using technology as a contemporary measure to prevent further loss and protect the assets of the customers. This technology as a contemporary measure requires linkage with other managers in the business for it to be successful. Historical and economic perspectives of security measures Calder, J. (2002) “Security Operations Management.”...
1 Pages(250 words)Annotated Bibliography

Security Management

...Security Management Security Management Executive Summary Over the past few years, surveys have indicated that security has become one of the top issues in many organizations. Following attacks of 9/11 and other series of attacks and threats of attacks, security features in buildings and sites have become important. While architects and engineers endeavor to use the best skills that ensure optimum building and site security, Information Technology is the other area that IT experts spend a lot of time and resources trying to protect organization information. In all private and public institutions, budget investment has to be justified and the effectiveness of the investment be evaluated afterwards. This evaluation is often referred... sector...
17 Pages(4250 words)Research Paper

Security Management

...Security management Introduction Security training for both security and non-security personnel Security management entails protection of physical assets, property, economic opportunities and intellectual property (McCrie, 2007). Security operations aim at costs savings through access controls and risk mitigation through having CCTV systems that deter crime. Some of the private security services that have experienced high growth in demand include guarding, armored transport, pre-employment screening, security consulting, private investigations, and alarm monitoring....
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Successful security management for FREE!

Contact Us