Free

Proposal-Cultures of corporate security: corporate management of terrorist risk - Research Paper Example

Comments (0) Cite this document
Summary
PROPOSAL PREPARATION Cultures of corporate security: corporate management of terrorist risk Research Topic Corporate Management of Terrorist Risk Description of Research Topic Terrorism is a global canker that is gradually growing to become a problem of not just one nation but all nations of the world…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Research proposal-Cultures of corporate security: corporate management of terrorist risk
Read TextPreview

Extract of sample "Proposal-Cultures of corporate security: corporate management of terrorist risk"

PROPOSAL PREPARATION Cultures of corporate security: corporate management of terrorist risk Research Topic Corporate Management of Terrorist Risk Description of Research Topic Terrorism is a global canker that is gradually growing to become a problem of not just one nation but all nations of the world. According to the Red Cross (2007), “Terrorism is the use of force or violence against persons or property for the purpose of intimidation, coercion, or ransom.” As approaches to terrorism becomes more and more complex and advanced, it becomes imperative that approaches to managing and assessing terrorism risk become equally advancing and detailed. It is against this backdrop that security experts and terrorism researchers the world over recommend corporate management approaches towards terrorism risk. A Concise and Spare capstone study statement. The Role of Corporate World in Managing Terrorism Descriptive outline establishing the specific limits of the proposed research study. This research study shall be guided by the following delimitations: 1. The research shall focus on terrorism as a global security threat and not other forms of security threats such as natural disasters, wars and drugs. 2. Though there are several components of terrorism and terrorism control, the researcher shall be limited only to the management of terrorism risk. This means that other components of terrorism such as approaches to attack, threats associated with terrorism and response to terrorists attacks shall not be considered. 3. As an approach or intervention for checking and analyzing terrorist risk, the researcher shall focus on corporate management instead of other available approaches and interventions even though the researcher admits there are equally workable approaches to analyzing security risk. A clear description of what the Researcher’s contribution to the project will be The role of the researcher shall be a three-fold contribution towards the research. Firstly, the researcher shall play the very vital role of a qualitative data analyst. This qualitative data analysis shall give the researcher the opportunity to contribute personal judgments and analysis on issues that will be discussed through secondary data collection. Secondly, the researcher shall be the facilitator and leader of all primary data collection that shall be needed for the research work. This means that the researcher shall be responsible for the gathering and collection of data from the field where data collection shall be conducted. Finally, the researcher shall give out constructive and achievable recommendations and suggestions at the end of the research work. These recommendations and suggestions shall be put forward based on the trend of data that shall be gathered or collected. Research strategy, the estimated number of sources used. Larger portion of data collection and for that matter research conduct shall be based on secondary data collection. This means that the researcher shall depend largely on ideas and facts that already exist in literature. This is going to be so because the subject of management of terrorism risk is widespread in literature through books, internet sources, articles and journals. To this effect, there shall be at least twenty (20) different secondary sources where data shall be collected. This not withstanding, there shall be room for primary data collection where by the researcher shall create a sample size made up experts in the field of corporate security management. Ideas shall be solicited from these people on their mode of operations and how the collaborative approach to terrorism risk management has succeeded so far in helping curb the threat associated with terrorists attacks. A short annotated bibliography representative of materials surveyed (five sources minimum). Red Cross (2007). Terrorism. Retrieved July 26, 2011 from http://www.redcross.org/images/pdfs/code/terrorism.pdf This source defines what terrorism is and brings readers closer to current trends that are associated with terrorism in today’s contemporary world. Asamoah J. (2009). Constant Reflections on Terrorism – Past and Current. Macmillan Publication: Washington D.C This book as the name implies casts readers back to major terrorists’ attacks that plagued the world in times past. For each of these attacks, ways of preventing future occurrences are suggested. Appiah K.R (2010) Risk Management in the Corporate Way. University Printing Press: Kumasi This book looks at risk management as a corporate task that should be carried out through collaborative efforts by all stakeholders in the security management industry. Willis, H.H, Morral A. R., Kelly T. K., & Medby J. J (2005). Estimating Terrorism Risk. RAND Center for Terrorism Risk Management Policy. (CTRMP). Available from http://www.rand.org/pubs/monographs/2005/RAND_MG388.pdf This article is more of an assessment tool for the task of terrorism risk assessment that takes place in the United States. In the opinion of the writers, the United States as a nation is underestimating the needed resources needed to successfully complete the all important tasks of terrorism risk management. Gould N. C. 2004 Managing Terrorism Risk. Retrieved July 27, 2011 from http://www.irmi.com/expert/articles/2004/gould07-a.aspx According to the writer, corporate terrorism risk management involves “a three-tiered terrorism risk management plan, which includes initial and detailed assessments and a variety of risk management techniques, can effectively reduce the terrorism risk.” REFERENCE LIST Gould N. C. 2004 Managing Terrorism Risk. Retrieved July 27, 2011 from http://www.irmi.com/expert/articles/2004/gould07-a.aspx Willis, H.H, Morral A. R., Kelly T. K., & Medby J. J (2005). Estimating Terrorism Risk. RAND Center for Terrorism Risk Management Policy. (CTRMP). Available from http://www.rand.org/pubs/monographs/2005/RAND_MG388.pdf Appiah K.R (2010) Risk Management in the Corporate Way. University Printing Press: Kumasi Asamoah J. (2009). Constant Reflections on Terrorism – Past and Current. Macmillan Publication: Washington D.C Red Cross (2007). Terrorism. Retrieved July 26, 2011 from http://www.redcross.org/images/pdfs/code/terrorism.pdf A complete guide for templating your capstone paper is located at: ://www.hamline.edu/gsm/pdf_files/APA_Basics.pdf NOTE: PLEASE NOTE THAT IN ADDITION TO THE FORMAT PROVIDED, YO MUST INCORPORATE THE FOLLOWING SECTIONS TO MEET DEGREE PROGRAM CAPSTONE REQUIREMENTS. SECTION: Liability, Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research proposal-Cultures of corporate security: corporate management Paper”, n.d.)
Retrieved from https://studentshare.org/other/1428571-research-proposal-cultures-of-corporate-security
(Research Proposal-Cultures of Corporate Security: Corporate Management Paper)
https://studentshare.org/other/1428571-research-proposal-cultures-of-corporate-security.
“Research Proposal-Cultures of Corporate Security: Corporate Management Paper”, n.d. https://studentshare.org/other/1428571-research-proposal-cultures-of-corporate-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Research proposal-Cultures of corporate security: corporate management of terrorist risk

Cultures of corporate security: corporate management of terrorist risk. (security management)

...?Cultures of Corporate Security: Corporate Management of Terrorist Risk. (Security Management) The topic can be sub-discussed in three major parts, which are terrorism as a whole, terrorism risk management and the use of corporate security management. Barrett (2010), notes that “whether the reasons are economic, psychological, or social—or some combination thereof—terrorism has been an entrenched part of human activity since ancient times.” The issue of terrorism is undeniably a great source of worry to...
2 Pages(500 words)Research Paper

Corporate Financial Risk Management

...? Corporate Financial Risk Management Executive summary Financial derivates helps firms to mitigate risk, futures contracts are one such derivatives which help the firm hedge against potential losses as well as isolate opportunities for investment. This report is aimed at demonstrating how futures contracts can be used as a hedging strategy that would also isolate profitable opportunity for the firm. This been achieved by taking a long position on futures contracts, and the hedging strategy turn out to be profitable for the firm. Therefore, it is recommendable for the firm to hedge against price volatility by buying futures contract. Table of contents Introduction……………………………………………………………………………… 4 Designing of the hedging strategy... ...
3 Pages(750 words)Essay

Corporate Risk Management

...in managing the Research and Development costs. Every firm engages in Research and Development as a way to develop new products which will make the firm to remain in the market. Research and Development is one of the most costly investments that an organisation can have and this exposes the firm to huge financial risk if the results of the Research and Development don’t end up giving the firm a product that is accepted by the market. These costs associated with Research and Development need to be hedged in at least one method of hedging. To be able to minimise the risk, the firm can have two options. The...
9 Pages(2250 words)Assignment

CORPORATE RISK MANAGEMENT

...and Miller et al., 1998, pp. 26-38). This can be an investment in a security or in a project that the company is opting. The value that is at risk is ascertained and the management of risk is done on this basis regarding long term and short term where the time value of money is considered along with the risk of recovery of the amount and the benefits attached with the options. The risk management technique of determining the value at risk elaborates the financial loss that can be incurred to the company at maximum ad thus incurs cost for the company (Mars & Weir, 2000). The benefits of the...
4 Pages(1000 words)Essay

Corporate risk management

...? Corporate risk management Topic: 6) Risk manager for a fleet of motor vehicles Contents Introduction 3 Discussion 3 Conclusion 6 Reference 8 Introduction Motor insurance is one important category of general insurance and it is also known as car insurance or auto insurance. This is the insurance which is purchase by individuals who owns cars, trucks, motorcycles etc. The primary use of this insurance is to provide financial protection against any damage from traffic collisions that occurs when in operation. It can result from physical damage caused by traffic collision. Each region or country has their own rules and regulations to be followed. There are...
6 Pages(1500 words)Essay

Corporate Risk Management

...? Corporate Risk Management Contents Contents 2 Introduction 3 Firm’s exposure to physical risk 3 Physical Risk consideration in Capital budgeting 5 Physical Risk measurement in Capital Budgeting 6 Conclusion 7 References 8 Introduction The firms should considers the physical risk factor in the business while applying the capital budgeting techniques for evaluating the net present value or the internal rate of return of the business. The consideration of the physical risk of the business to the fullest extent would help the companies to calculate the rational value of business and decide on the...
5 Pages(1250 words)Essay

Network and computer intrusion threats

...in the network security – such as the ISO 27001:2005 Information Security Management System, the NIST recommendations of Information Risk Management, the COBIT framework of IT Governance, etc [ISACA. 2007. pp4-16; Ross, Ron and Katzke et al. 2007. pp3-4]. However, no researcher has yet addressed the mapping of Intrusion Detection & Prevention systems with such best practice frameworks. This dissertation, proposes to develop a collaborative IDPS framework with the help of such best practice frameworks by choosing the most appropriate process steps and controls from them. This research hereby...
39 Pages(9750 words)Essay

Corporate Risk Management

..., the type of risk existing in the business and what are the organization's priorities are to be considered here. Risk Identification: The second step involved is risk identification. It is referred to as the process of identifying organization's exposure to uncertainty. The essential feature that a corporate risk manager must possess is that he must have deep knowledge of the organization such as market in which it operates, the legal, political, social and cultural environment in which the organization exists, and also the sound understanding of strategic and operational objectives, factors that play as a critical...
9 Pages(2250 words)Essay

Corporate risk management

...Swarna1 P.Swarnalatha ID 5448 Order # 139084 15.11.2006. Corporate risk management The management of any corporate project must concentrate on strategic control of risks involved. Successful project management certainly aims at reducing and minimizing risks. The understanding the original meaning and nature of risk is very much needed for any corporate entity. Risk can be defined as uncertainty of outcome after the task is performed (FN 1). It may be in the form of positive opportunity or negative threat. It is opined that some amount of...
7 Pages(1750 words)Essay

Corporate risk management

...a) What are the real-world components of Ct, I and k for evaluating the following types of risk management activities at NPV? i) Risk retention ii) Risk transfer iii) Risk control, and iv) Risk avoidance Answer: 1) Risk Retention: Risk retention is a form of Risk management strategy wherein the organization determines that the cost of transferring risk to outside entities and third parties is greater than retaining the risk of loss and offsetting it through their own emergency funds and allowances. In a...
8 Pages(2000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Research proposal-Cultures of corporate security: corporate management of terrorist risk for FREE!

Contact Us