StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Proposal-Cultures of corporate security: corporate management of terrorist risk - Research Paper Example

Cite this document
Summary
PROPOSAL PREPARATION Cultures of corporate security: corporate management of terrorist risk Research Topic Corporate Management of Terrorist Risk Description of Research Topic Terrorism is a global canker that is gradually growing to become a problem of not just one nation but all nations of the world…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Research proposal-Cultures of corporate security: corporate management of terrorist risk
Read Text Preview

Extract of sample "Proposal-Cultures of corporate security: corporate management of terrorist risk"

PROPOSAL PREPARATION Cultures of corporate security: corporate management of terrorist risk Research Topic Corporate Management of Terrorist Risk Description of Research Topic Terrorism is a global canker that is gradually growing to become a problem of not just one nation but all nations of the world. According to the Red Cross (2007), “Terrorism is the use of force or violence against persons or property for the purpose of intimidation, coercion, or ransom.” As approaches to terrorism becomes more and more complex and advanced, it becomes imperative that approaches to managing and assessing terrorism risk become equally advancing and detailed.

It is against this backdrop that security experts and terrorism researchers the world over recommend corporate management approaches towards terrorism risk. A Concise and Spare capstone study statement. The Role of Corporate World in Managing Terrorism Descriptive outline establishing the specific limits of the proposed research study. This research study shall be guided by the following delimitations: 1. The research shall focus on terrorism as a global security threat and not other forms of security threats such as natural disasters, wars and drugs. 2. Though there are several components of terrorism and terrorism control, the researcher shall be limited only to the management of terrorism risk.

This means that other components of terrorism such as approaches to attack, threats associated with terrorism and response to terrorists attacks shall not be considered. 3. As an approach or intervention for checking and analyzing terrorist risk, the researcher shall focus on corporate management instead of other available approaches and interventions even though the researcher admits there are equally workable approaches to analyzing security risk. A clear description of what the Researcher’s contribution to the project will be The role of the researcher shall be a three-fold contribution towards the research.

Firstly, the researcher shall play the very vital role of a qualitative data analyst. This qualitative data analysis shall give the researcher the opportunity to contribute personal judgments and analysis on issues that will be discussed through secondary data collection. Secondly, the researcher shall be the facilitator and leader of all primary data collection that shall be needed for the research work. This means that the researcher shall be responsible for the gathering and collection of data from the field where data collection shall be conducted.

Finally, the researcher shall give out constructive and achievable recommendations and suggestions at the end of the research work. These recommendations and suggestions shall be put forward based on the trend of data that shall be gathered or collected. Research strategy, the estimated number of sources used. Larger portion of data collection and for that matter research conduct shall be based on secondary data collection. This means that the researcher shall depend largely on ideas and facts that already exist in literature.

This is going to be so because the subject of management of terrorism risk is widespread in literature through books, internet sources, articles and journals. To this effect, there shall be at least twenty (20) different secondary sources where data shall be collected. This not withstanding, there shall be room for primary data collection where by the researcher shall create a sample size made up experts in the field of corporate security management. Ideas shall be solicited from these people on their mode of operations and how the collaborative approach to terrorism risk management has succeeded so far in helping curb the threat associated with terrorists attacks.

A short annotated bibliography representative of materials surveyed (five sources minimum). Red Cross (2007). Terrorism. Retrieved July 26, 2011 from http://www.redcross.org/images/pdfs/code/terrorism.pdf This source defines what terrorism is and brings readers closer to current trends that are associated with terrorism in today’s contemporary world. Asamoah J. (2009). Constant Reflections on Terrorism – Past and Current. Macmillan Publication: Washington D.C This book as the name implies casts readers back to major terrorists’ attacks that plagued the world in times past.

For each of these attacks, ways of preventing future occurrences are suggested. Appiah K.R (2010) Risk Management in the Corporate Way. University Printing Press: Kumasi This book looks at risk management as a corporate task that should be carried out through collaborative efforts by all stakeholders in the security management industry. Willis, H.H, Morral A. R., Kelly T. K., & Medby J. J (2005). Estimating Terrorism Risk. RAND Center for Terrorism Risk Management Policy. (CTRMP). Available from http://www.rand.org/pubs/monographs/2005/RAND_MG388.

pdf This article is more of an assessment tool for the task of terrorism risk assessment that takes place in the United States. In the opinion of the writers, the United States as a nation is underestimating the needed resources needed to successfully complete the all important tasks of terrorism risk management. Gould N. C. 2004 Managing Terrorism Risk. Retrieved July 27, 2011 from http://www.irmi.com/expert/articles/2004/gould07-a.aspx According to the writer, corporate terrorism risk management involves “a three-tiered terrorism risk management plan, which includes initial and detailed assessments and a variety of risk management techniques, can effectively reduce the terrorism risk.

” REFERENCE LIST Gould N. C. 2004 Managing Terrorism Risk. Retrieved July 27, 2011 from http://www.irmi.com/expert/articles/2004/gould07-a.aspx Willis, H.H, Morral A. R., Kelly T. K., & Medby J. J (2005). Estimating Terrorism Risk. RAND Center for Terrorism Risk Management Policy. (CTRMP). Available from http://www.rand.org/pubs/monographs/2005/RAND_MG388.pdf Appiah K.R (2010) Risk Management in the Corporate Way. University Printing Press: Kumasi Asamoah J. (2009). Constant Reflections on Terrorism – Past and Current.

Macmillan Publication: Washington D.C Red Cross (2007). Terrorism. Retrieved July 26, 2011 from http://www.redcross.org/images/pdfs/code/terrorism.pdf A complete guide for templating your capstone paper is located at: ://www.hamline.edu/gsm/pdf_files/APA_Basics.pdf NOTE: PLEASE NOTE THAT IN ADDITION TO THE FORMAT PROVIDED, YO MUST INCORPORATE THE FOLLOWING SECTIONS TO MEET DEGREE PROGRAM CAPSTONE REQUIREMENTS. SECTION: Liability,

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research proposal-Cultures of corporate security: corporate management Paper”, n.d.)
Retrieved from https://studentshare.org/other/1428571-research-proposal-cultures-of-corporate-security
(Research Proposal-Cultures of Corporate Security: Corporate Management Paper)
https://studentshare.org/other/1428571-research-proposal-cultures-of-corporate-security.
“Research Proposal-Cultures of Corporate Security: Corporate Management Paper”, n.d. https://studentshare.org/other/1428571-research-proposal-cultures-of-corporate-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Research proposal-Cultures of corporate security: corporate management of terrorist risk

Clarkes Situational Crime Prevention Theory

The paper describes the nature and methods of social crime prevention approach.... In the United Nations, “social development is considered as one of the three components that define development, together with economic growth and environmental protection”.... hellip; The Social Perspective on Development Branch of the United Nations Department for Social Policy and Development notes that “a social perspective advocates a people-centred and participatory approach to development toward an inclusive, just and stable society”....
12 Pages (3000 words) Research Paper

Research Advantages and Disadvantages to Bring World Cup to US

Emphasis is given on the research of secondary literary resources.... Throughout the twentieth century, the game has gained enormous heights of fan following but America has been an exception in this case lagging behind in the race.... The global popularity of soccer in the United… This can be evident from the quotes of an American book, Offside, “The sport the world made its own was association football, the child of Britain's global presence…....
10 Pages (2500 words) Research Paper

Role of OSCE in Regional Stability

Presently, OSCE is one among the largest and most effective organizations of regional… As of now, there are 57 members in OSCE and these member nations come from Europe, North America, and Central Asia; and the organization engages in a lot of various activities including ‘early warning preparation, conflict prevention, crisis management and A look into the history of OSCE over these years proves that the organization has done much more than any other organization could do in uniting the nations, preventing and mitigating conflicts, increasing mutual trust, and promoting economic and human rights conditions in the region....
18 Pages (4500 words) Research Paper

ABC's Detection, Response, and Control Management

Identification is followed by prioritization and management of risks.... The study “ABC's Detection, Response, and Control Management" consider that company in order to minimize risks and maximize its efficiency should use a business continuity program, disaster recovery plan, computer incident response team, information assurance, and risk management program in place.... We carry out a discussion in light of risk Management, Business Continuity Plan, Disaster Management, Computer Incident Response Team, and Information Assurance....
30 Pages (7500 words) Research Proposal

The Impact of CCTV System in Curbing Theft

In essence, the UNMIL is an ambitious endeavor at peace-keeping requiring massive administrative support in terms of types of equipment, logistics, and management of the contingent with an authorized military strength of 15,000 (Furley and May 2006)....  In the year 2006 alone, the UNMIL suffered losses due to stolen vehicles (seven vehicles), computers, computer accessories, supplies, and engineering equipment, spare parts for vehicles and aircraft as well as information technology equipment (UNMIL security Investigation Unit, 2006)....
16 Pages (4000 words) Research Paper

The Financial Support for the Development of the Tourism Business

Safety and security have become a key issue for traveller choice.... hellip; The safety and security of travellers are critical for the growth of global tourism and recent policies on safety and security have become integral to the development of tourism.... The key challenge and market trend for the tourism industry are for policymakers to balance safety and security measures with the freedom to travel....
16 Pages (4000 words) Research Paper

Financial Industry: the Worst Financial Crisis

hellip; Lend Lease Group is a publicly traded enterprise and is one of the world's leading, fully integrated property management suppliers, providing a worldwide network of clients with the benefits of their strong skills in development, investment management, project and construction management, and asset and property management....
13 Pages (3250 words) Research Paper

Experience of UK Multiculturalism

As per the political process, multiculturalism describes a set of policies that aim at diversity management of different ethnicities.... Following the introduction, there would be a research Question that would signify the research objective.... The research question would also help to identify the desired outcome.... Following the research Question, there would be the Literature Review, which would contain details and evidence about Multiculturalism in the United Kingdom....
12 Pages (3000 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us