StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security Management - Research Paper Example

Cite this document
Summary
Following attacks of 9/11 and other series of attacks and threats of attacks, security features in buildings and sites have become important. While architects…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Security Management
Read Text Preview

Extract of sample "Security Management"

Download file to see previous pages

This evaluation is often referred to as Return on Investment (ROI) in finance. The Return on Investment is calculated by: The concept of Return on Investment is applicable to all investments in an organization. Security sector of an organization is never an exception. The executive decision makers of organizations often have the interest to know the impact of security on the bottom-line operations of the firm. It is imperative to know how much the lack of security in an organization costs the firm before deciding on the amounts of capital to invest on security.

The firm thereafter decides on the most cost effective solutions to its security woes. When applied to the security sector of the firm, a Return on Security Investment (ROSI) calculation provides quantitative answers to a firm’s essential financial questions. The Return on Security Investment aids the organization to determine if it spends too much on its security bids. It informs the organization on the financial impact on productivity that the lack of security could cause. Additionally, Return on Security Investment calculation aids the firm’s management to know the extent to which the security investment is enough (Bruce, 2008).

Finally, ROSI gives the firm an overview on the benefits of the security product or system. This task looks at security management issues, dissecting aspects of ROSI with reference to Blackberry Company. Blackberry Company is a Canadian wireless equipment and telecommunication company with a reputation of developing Blackberry brands of tablets and hand-held phones. The company was originally known as Research in Motion (RIM). The company’s dominance in the United States market once stood at 43% of the market share.

This dominance has precipitously declined in the recent past due to intense competition from Google’s Android and Apple’s iPhone brands. By 2013, the company’s US

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Management Research Paper Example | Topics and Well Written Essays - 4250 words - 1”, n.d.)
Security Management Research Paper Example | Topics and Well Written Essays - 4250 words - 1. Retrieved from https://studentshare.org/miscellaneous/1626875-security-management
(Security Management Research Paper Example | Topics and Well Written Essays - 4250 Words - 1)
Security Management Research Paper Example | Topics and Well Written Essays - 4250 Words - 1. https://studentshare.org/miscellaneous/1626875-security-management.
“Security Management Research Paper Example | Topics and Well Written Essays - 4250 Words - 1”, n.d. https://studentshare.org/miscellaneous/1626875-security-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Management

Homeland Security Management

An essay "Homeland Security Management" reports that the four phases of emergency management are very important to ensure effective protection for life and property in a community before, during, and after the occurrence of a disaster.... hellip; Homeland management Security or simply known as Emergency management.... It talks about the 4 phases of emergency management and the process involves within each phase.... It delves into the importance of emergency managers in the success of emergency management effort and the attributes that a good emergency manager should have to possess....
6 Pages (1500 words) Essay

Security Management Paper

As stated in the Security Management Practices, control is important to reduce the effects of security threats and vulnerabilities to a level that is tolerable by an organization.... In this paper the following are discussed: the matrix in hiring personnel, policy on… to deal with privacy issues in conducting surveillance and intelligence gathering, analyzing a budget for a security organization, and the policy and procedures for dealing with issues such as sexual harassment, discrimination, physical security, and personal Because of these, several hiring selection matrix are being developed to help employers to choose the appropriate person for the job....
5 Pages (1250 words) Essay

Nokia Siemens: Security Management Challenges

In managing the security challenges, the management must well analyze their responses on the same issue in regards to the effects of their actions on the company's revenue and.... … Nokia is currently facing security challenges.... Nonetheless, like any other company, Nokia is facing numerous managerial challenges including security architecture challenges that will form the main discussion in this essay (Steinbock, 2007)....
4 Pages (1000 words) Essay

Successful Security Management

The statement ‘Successful Security Management in any organizational context must be driven by an agenda to enhance the financial viability of the organization' is based on the fact that risk is all pervasive and therefore,… Risk is not completely unavoidable in a business organization and security planning is essential to create secure environment.... Perception of risk at various levels Since security is a mission to protect the people, property and the business, an integrated approach in policy making is essential for successful Security Management....
11 Pages (2750 words) Research Paper

Your interest in Security Management

Prior to this course, I considered Security Management as the manner in which activities of keeping various aspects of an organizations are conducted to make sure that the organization or aspects of the organization remain protected from outside threats.... This course has made the… definition of Security Management clearer through defining it as the process of identifying the assets of the organization including those that deal with information, then developing, documenting and implementing policies that will safeguard the identified assets (Sennewald, Topic: Security Management Understanding Security Management Prior to this I considered Security Management as the manner in which activities of keeping various aspects of an organizations are conducted to make sure that the organization or aspects of the organization remain protected from outside threats....
1 Pages (250 words) Research Paper

Information Security Management

The writer of the paper "Information Security Management" gives detailed information about the Systems Security Engineering Capability Maturity Model (SSE-CMM) Security Management framework considering and analyzing the diagram giving at the beginning of the paper.... Information Security Management Insert Insert Question Consider the diagram above from the Systems Security Engineering Capability Maturity Model (SSE-CMM) Security Management framework....
1 Pages (250 words) Assignment

Security Management & Marketing

This research describes the importance of Security Management within an organization.... However, the organizational top management hierarchies have long failed to understand that they need to give proper credit where it is due.... The paper will further establish the basis of security managers and how they need to be glorified from a literal sense in order to win back their trust and confidence for the sake of the organizational harmony.... hellip; security is of paramount significance for any organization in the time and age of today yet the security managers are not accorded the same importance as they richly deserve....
10 Pages (2500 words) Research Paper

Information Security Management

"Information Security Management" paper is mainly concerned with the management of the security for the information of the customer.... hellip; This research has presented a comprehensive overview of information security and management.... This research has outlined the main information security vulnerabilities and hazards.... security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer....
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us