Security management - Research Paper Example

Comments (0) Cite this document
Recognize and critically analyze the various forms of liability associated with the security management industry. Provide cost effective measures for architectural security design for facilities, airport security, and critical in fractures. Introduction Security is an issue that has and continues to gain prominence even at the global level…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Security management
Read TextPreview

Extract of sample "Security management"

Recognize and critically analyze the various forms of liability associated with the security management industry. Provide cost effective measures for architectural security design for facilities, airport security, and critical in fractures. Introduction Security is an issue that has and continues to gain prominence even at the global level. It is not surprising and it is actually for this reason that there are universally accepted bodies in charge for for ensuring global security at the world level. Mention can be made of bodies and agencies such as the United Nation Security Council and NATO. At the national and other regional levels, there are also agencies and organization that are tasked with security management. Without missing words, the tasks of these security management organizations are tedious, cost involving and challenging. It is not surprising therefore that day in and out; there have been strategies and means of ensuring that the general running of security organizations is done at a relatively cost effective manner. Complexities and Liabilities associated with today’s security industry – The need to protect the security of the world has undoubtedly taken new trends today. Unlike years past, there were very little worries about terrorism and other forms of social violence against humanity. The absence of these social cankers left global and national security organizations with very little to work about other than protecting nations in times of war and against invasion by enemies (Koduah, 2001). However today, global and national security has taken very complex and dynamic trends. This is perhaps because security agencies have pretty much to worry about than in years past. Such complexities have also brought about untold cost and liability associated with the handling of security issues. There have also been new approaches to security management. Carlton (2011) for instance notes that “In Regina, crime prevention programs focus on changing the behavior of both offenders and potential victims.” Charlton (2011) again comments on new complexities that the White House has had to adopt saying “the strategy brings new tools to the table in combating the cartels in the Southwest, which have been a growing problem.” Such complexities, though has an effect of bringing about positive results in security management, leaves security management with liabilities that run among other things, cost of staffing and human personnel, cost of sophisticated equipment and technologies, cost of infrastructural holdings and cost of gathering and keeping intelligence. Parts of the world where such liabilities and standards are not met are considered as risky and not up to par. It is not surprising therefore that comparing India’s security to America’s Captain Percy Jokhi states that “the average security guard in this country is often underscreened, undertrained, undersupervised, and underpaid, just as was reported to be the case in the U.S. in a 1971 RAND Corp. study” (Berrong, 2011). Financing today’s Security Liabilities As the complexities associated with security management today seem to be unavoidable and necessary, there remains one important discussion for players in the security management industry. This point of discussion has to do with workable ways of financing the security liabilities. In most developed and some developing nations, government take the responsibility of financing the security industry’s liabilities. This is done by giving budgetary allocation to public security agencies and subsidizing the budget of registered private security organization. In the absence of this, government provides enabling environment for primate financial institutions to finance the cost of security. It is not surprising therefore that the Investorideas (2011) states that , “The financing, led by Gemini Strategies LLC provides capital for Visualant to continue with the execution of its strategic plans, including the funding of its planned acquisitions and the market development of its Spectral Pattern Matching Technology.” Where such support is lacking, Vermon (2005) fears that “companies can only take reactive measures against external security threats, like patches and firewalls. These systems do not anticipate attacks but respond to known attacks. So the unexpected is always a risk”. In brief, it is worth reiterating that the financing of security liabilities must be done from a national level and in a holistic approach that ensures that at no point in time would there be lapses that would put the management of security at risk. Ensuring cost effectiveness in financing security industry Apart from personnel, staff, equipment and logistics, architectural security design for facilities, airport security, and critical in fractures are other areas of extreme liability and cost to the security industry. There is however some hope as far as the desire to cut down on cost is concerned. Such cost effectiveness is even more crucial in today’s global economic recession. As noted by Sachoff (2009), “According to VB/Research, private companies in the security (IT and homeland) and defense sector saw investment of just over USD 2bn in 1Q 2009, a 20 percent decline from 4Q 2008 and a 79 percent decline from 1Q 2008.” To cut down on cost on architectural security design for facilities, airport security, and critical in fractures therefore, the security industry can rely on any of the following four measures: 1. Relying on the works of ideas, designs and inventions of armature university and student specialists for onward development rather than consulting experts right from the go. 2. Integrating the responsibility of airport security into the regular work of the army, instead of overreliance on private security agencies as this costs so much to do. 3. Empowering the activities of volunteers by giving them up to speed training on how to takeover some of the duties of the security agencies that would have been done by highly paid experts. 4. Practicing quality control programs at both internal and external levels to ensuring that the efforts of the security agencies are not jeopardized by mediocrity and shoddiness. 5. Encouraging joint venture participation with companies such as banks and other financial institutions to ensure that there is already security and guarantee even for credit financing. To this end, Stuart and Webb state that "Pinnacle enjoys a solid partnership with Golden Gate Capital and together we have built a strong, growing company with the potential and the means to move forward as a leading security company in the industry." Conclusion Empowering the security industry is important and unavoidable. However, there should continue to be measures and ideas on how to cut down on cost, yet not compromising on perfection and standardization. REFERNCE LIST By Carlton Purvis (2011). Canada’s Drop in Crime Attributed to Holistic Crime Prevention Strategies By Carlton Purvis (2011) White House Announces Transnational Organized Crime Strategy. accessed July 19, 2011 from By Stephanie Berrong (2011). India’s growing security industry. accessed July 19, 2011 from By Steven Sachoff (2009). Global recession rocks financing for security industry. accessed July 19, 2011 from Investorideas (2011). ‘Security Industry News; Visualant (OTCBB:VSUL) Closes $1.0 Million Financing; Plans to Accelerate Its Growth Strategy. Accessed July 19, 2011 from Koduah I (2001), The Changing Face of World Security, PrintMark Group Publishers, Kumasi Mark Vermon (2005) Security in the financial industry: Best practices for protection. Accessed July 19, 2011 from Stuart Dean, Jennifer Webb (2011)‘Pinnacle Security Closes $275 Million Financing Package’ accessed July 19, 2011 from Read More
Cite this document
  • APA
  • MLA
(“Security management Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from
(Security Management Research Paper Example | Topics and Well Written Essays - 750 Words)
“Security Management Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security management

Successful information security management

...? Full Paper Introduction Successful information security management involves an amalgamation of prevention, detection and response in order to deploy a strong security defense. Security has become an encircling issue for designers and developers of the digital world (Conklin, White, Cothren, Williams, & Davis, 2004). A system should also be able to counter incidents and raise proper procedures in case an information security incident occurs. Information security incident handling takes a stride forward in the information security management procedure. The aim is to provide a reference for the...
9 Pages(2250 words)Research Paper

Homeland Security Management

...Homeland Security Management This essay is a based on self understanding of the references I gathered. The topic Homeland Management Security or simply known as Emergency Management. It talks about the 4 phases of emergency management and the process involves within each phases. It also delves into the importance of emergency managers in the success of emergency management effort and the personal attributes that a good emergency managers should have to possess. It also discusses some basic but significant functions of some government & private sectors. 1. The four phases of emergency...
6 Pages(1500 words)Essay

Security Management

...Assertion that security managers should be managers first and security specialists second Security programs differ in scope, complexity, and purpose. The security is needed for material, equipment, machinery tools, people, money, documents, technical and nuclear information, weapons, fuels, medical supplies, Research and development property, intellectual property, concepts, ideas etc., All these elements need to be protected under the security management program. The protection program can be executed against intrusion, trespass, acts of violence, theft, or fire. The principal purpose of the...
14 Pages(3500 words)Essay

Criminology (Risk & Security Management)

...Running Head: Criminology – Risk & Security Management Criminology – Risk & Security Management [Institute’s Criminology – Risk & Security Management Federal Trade Comission’s reports suggest that of all the types of identity theft, credit card fraud is the most common one. AARP analyzed the complaint data from FTC and concluded that complainants who were under 50 years of age were much less likely to be victimized by credit card fraud; however, people aged 50 and over were victimized much more. Hence, it was important to develop technologies and techniques for the protection of older customers. (Neal Walters, 2006) In order to deal with...
9 Pages(2250 words)Essay

Security Management (

...SM <Security Management> and Section # of The report presents a short ofhow security cover can be efficiently provided to a high profile event. The job of a security manager or a security head while the event is on as well as the time to its build-up has been effectively laid out in this report. Several security threats like crowd control, traffic management and terrorism threats have been covered. Also to add to the authenticity of the control, measures to sustain any kind of known or unknown incident have been mentioned along the course of the report. Special emphasis on the VIPs attending the event has been covered as well in this security management report. All in all a complete security picture has been painted through this report... ...
7 Pages(1750 words)Essay

The Founding Docs of the U.S. Government

2 Pages(500 words)Essay

Information security management

...TMA02- M886 Information Security Management Table of Contents Part A: Presentation of Findings for the Organizational Assessment of Information Security Risks- Report to Accounting Company Senior Manager 3 A. Description of Process 3 B. Explanation/Justification for Choices 5 C. Threats and Vulnerabilities Analysis 5 D. Gap Analysis 7 E. Treatment of Threats/Risks 7 Part B: Critical Assessment of the Process Used to Arrive at Assessment of Information Security Risks, and the Information the Process Has Provided About the Organization 9 A. Evaluation of Process 9 B. Evaluation of Results 10 C. Process Improvement Suggestions 11 D. Suggestions for Further Work 12 Works Cited 14 Part A: Presentation of Findings for the Organizational... ...
10 Pages(2500 words)Essay

Security Management

...Security Management Affiliation: Security functions specializing in safeguarding sensitive assets Loughlin, J. (2009). “Security through Transparency: An Open Source Approach to Physical Security.” Journal of Physical Security, vol. 3(1), pp. 1‐5. According to Loughlin, (2009), there are various ways of safeguarding the assets of people depending on what kind of asset it is. In cases of documents, they are locked away in vaults, locked rooms and other locked buildings which also have various security measures such as security fences, security guards and even identification...
1 Pages(250 words)Annotated Bibliography

Security Management

...Security Management Security Management Executive Summary Over the past few years, surveys have indicated that security has become one of the top issues in many organizations. Following attacks of 9/11 and other series of attacks and threats of attacks, security features in buildings and sites have become important. While architects and engineers endeavor to use the best skills that ensure optimum building and site security, Information Technology is the other area that IT experts spend a lot of time and resources trying to protect organization information. In all private and public institutions, budget investment has to be justified and the effectiveness of the investment be evaluated afterwards. This evaluation is often referred... sector...
17 Pages(4250 words)Research Paper

Security Management

...Security management Introduction Security training for both security and non-security personnel Security management entails protection of physical assets, property, economic opportunities and intellectual property (McCrie, 2007). Security operations aim at costs savings through access controls and risk mitigation through having CCTV systems that deter crime. Some of the private security services that have experienced high growth in demand include guarding, armored transport, pre-employment screening, security consulting, private investigations, and alarm monitoring....
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Security management for FREE!

Contact Us