StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Security Domain in Australia - Annotated Bibliography Example

Cite this document
Summary
This paper 'The Security Domain in Australia' tells that Security is essential in all aspects of life for effective and efficient progression and growth.Five job categories are critically analyzed according to prevailing theories. The names of the job titles in the analyzed firms are as follows, assistant security advisor…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful

Extract of sample "The Security Domain in Australia"

Security Domain in Australia Student’s Name Institutional Affiliation Security Domain in Australia Introduction Security is essential in all aspects of life for effective and efficient progression and growth. In the paper, five job categories are critically analyzed according to prevailing theories. The names of the job titles in the analyzed firms are as follows; assistant security advisor, Precinct Security Manager, Security sector reform officer, senior consultant security as well as senior transport security officer. The paper shows five annotated bibliographies each showing job description. At the same time, the paper analyzes the relationship between the security employment and academic setting. The findings of each task description are then identified and discussed in details. There is evidence that for one to hold those respective positions he or she must hold relevance skills and knowledge. Annotated Bibliographies Job description 1 http://www.csiro.au This website is composed of commonwealth scientific and industrial research organization. The site keeps updating the members as well as public of the upcoming events. At the same time, there is a clear definition of the purposes and functions of the commonwealth scientific and industrial research organization.  choosing the biography is the reason that it is written and recommended by the Australian government entity. A board member of the organization who is well known for all ongoing projects of the organ keep adverting the site. The source is usually visited by many people thereby it validity can be proved on the basis. Job description 2 https://inspira.un.org/psc/UNCAREERS/EMPLOYEE/HRMS/c/UN_CUSTOMIZATIONS.UN_JOB_DETAIL.GBL?Page=UN_JOB_DETAIL&Action=A&JobOpeningId=40780&SiteId=1&PostingSeq=1& The analyses of origin on how job evaluation are done by the United Nations organizations in different fields. The source outlines clearly various responsibilities and roles of different personnel. In case of security sector reform officer, there is a clear definition of the applicants. Some of the qualifications that one must meet include been ready to work in harsh conditions as well as the harsh environment met education qualifications, work experience, among others. The validity of the source is that the writer is a well-recognized person in the united nation department of security. Meanwhile, the United Nations suggests to those applying the jobs first to seek help from the site. The site as well provides relevant information for those seeking employment in the United nations. Job description 3 Stratton, J. (2013). The Western Australian Police headquarters building: Surveillance, power, and the authoritarian state. Cultural Studies Review, 19(2), 261-89. The source indicates all security issues in the western part of Australia. Management and property assessment is well elaborated in the site. It is shown that the security manager governs all operations as per provisions of the services. Accountabilities of the security manager are as well outlined. Areas, where the security manager is involved, include risk management as well as safety management among others. The skills and experience of the officer are shown to be of importance. Terms and condition of pre-employment are indicated in the document. The document is valid since all the necessary information required is presented. Job description 4 http://career center.asisonline.org/jobs/6805741/senior-consultant-security The site shows a prominent firm that deals with technical profession known as Jacobs located in Australia. The site demonstrates that the firm is in need of security consultant and individual from various Australian cities are called to apply. The purpose of the company is to ensure the safety in all market sectors all over Melbourne. One of the purposeful roles is to control communication as well as management. The site shows that for one to hold the position he or she must hold Bachelor of Science or Bachelor of Engineering. Teamwork is the most relevant issue in the field to run efficiently. Job description 5 C:\Users\amy.wright\Desktop\Amy\Job Descriptions\Security Manager - Dumas House.doc The site talks about the department of infrastructure and how it helps the government in investing in infrastructure. The division is further divided into the office of transport security. Compliance manager is the head of the carriage security and helps in the arrangement of industries. Duties of the department are as well outlined. The criteria for selection are as well emphasized. For one to be an employer he or she must be an Australian. The site was selected since the information came direct from the department management team. The validity of the information is as well recognized since it contains relevant information. Method There is a description and analysis of top security positions in various firms, particularly in Australia. For on to achieve the findings there must be certain criteria or path that must be followed. In this case, five fields are to be critically analyzed. To have successful results all of the required career field assessment is done for each and every firm. The period of evaluations between one firm to the other differs according to policies and requirements of the same. In CISRO, assessment has to take time since it is a scientific field that requires analysis and at the same time testing is a necessity. After the evaluation results are then recorded in the form of tables as indicated below. Findings Table 1 Title description of the table Job description Eligibility CSIRO CBIS Duties and responsibilities Security clearance Future on innovation Managing directors Salary Job experience Services to government and community Operations maintenance Location Ability to undertake research freely Divisions Facilities The above table shows findings CSIRO statutory authorities and their job description. After the assessment all the above indicated results were recognized. Table 2 Job opening Mission of the job Responsibilities Competencies Missions Political missions Management and administration Academic qualifications Locations Peacekeeping operations Coordinate budget activities Experiences Vacant position Hard working conditions Coordinates meetings Communication The united nations have various fields related to security. Some of the above information was abducted during the assessment period. Table 3 Consultant security officer Roles Competences Purpose of the business Location - Melbourne Security provision Excellent knowledge Attract industries Open salary Pipeline growth for security Relevant technical management experience Maintaining clients Posted on January, 27 2015 Communication maintenance and control Familiar with security policies in Australia Locations of more than 200 offices in approximately 25 countries The Jacob security domain is recognized one of the prominent businesses globally. The requirements of the applicants were identified as well as some of the duties and responsibilities. Table 4 Transport security Transport security inspector Business division Duties and responsibilities Department of regional development Full time employment Concentrate on security matters Transport assessments Promote the infrastructure Location-Perth Different localities Conducting inspection and audits Ensuring security in transport system Branch –transport operations Responsible for maritime and aviation Maintenances of productive relationship with related industries Transport agency security handles security in various fields to ensure safety of the society. Some of the above findings were identified to be part of the agency. Table 5 Precinct Security Manager Responsibilities Accountabilities Management competency areas Unit- commercial management Overall security management Updating security measures Business continuity Department- property assess management Operation managements Maintaining awareness of Duma house Risk analytics Matrix manager Training of new members Maintaining management policy Security management Discussion The Commonwealth Scientific and Industrial Research Organization (CSIRO) I Australia is announcing a job vacancy in the security sector (Gilmour, & Milligan, 2012). The business and infrastructure services are in need of an assistant security advisor. The firm is located in Campbell. If one is capable of securing the job he she shall be in a position to earn a range of $ 78479- $88787. The said officer has several roles and responsibilities to ensure the firm is safe from internal and external threats. At the same time, he or she advises all the other staff members concerning property protection (Board, 2012). The main agenda of the job is to conduct the implementation of the security framework in the firm. For one to be eligible for the position he or she must be sound in mind since vetting must be done accordingly. One must have the appropriate skills since the position is very in influential. For the person to work appropriately he or she must be in a position to take both internal and external security analysis (Gilmour, & Milligan, 2012). He or she must as well be equipped with training to undertake the investigation in accordance. The department owns some properties while they lease others. In career field in United Nations they are announcing a vacant position in the security sector reform. There is an anticipated job that the secretariat keeps maintaining that the qualified and available individual should apply. Assessment of approximately six months is conducted for the qualified persons. The interview for the qualified persons is conducted either by use of written materials or done orally. The person under the appointment performs some of the following tasks such as assisting in administration managements, provision of technical advices, as well as coordinating international security agencies (Kelly, Male, & Graham, 2014). The profession of the appropriate person is considered with the knowledge and skills that he or she possess. One should be in a position to identify technical issues and at the same time coming up with the solutions. Another factor that is considered is that the person should be able to speak eloquently and write proficiently. One should be in a position to organize and arrange activities and assignment in the right way. Apart from been a holder of bachelor’s degrees in various fields one must as well have an experience of minimum two years in a similar field. One should be as well be involved in peacekeeping in recognized areas. For the secretariat position, one should be familiar with English and French languages. One should as well be in a position to protect human rights violations. For one to the position must show a high level of competence, as well as integrity in human resource (Petrick, 2012). One should as well be familiar with the international humanitarian law. In the department of property asset management – Dumas house government precinct the security manager is the sole provider and organizer of safety issues. The manager should be accountable I providing training to any new member in the field (Denzer, et al 2015). He or she is mandated in updating and upgrading security safety methods in the firm. Also enforces those responsible for providing the services to undertake their duties effectively and efficiently. Provide supervision of safety to physical properties. The person should have an experience of at least five years in the security field and two years in other fields. For one to prove his or her skills and knowledge must produce a degree certificate in the related field. One's skills should as well be tested by use assessment for a couple of months. Still in the same field risk management should be approached wisely by the human resource manager (Dainty & Loosemore, 2013). For the organization to run efficiently it must compliance with the government. There should be strategies and plans set aside to deal with potential disasters. Data should be in a position to show risks in management. The principal may interchange duties from time to time according to the policy of the department. The principal should keep checking whether the security personnel have relevant skills and knowledge. Should manage and be familiarized with all surveillances in respective places. During the committee of emergency planning, the security manager should be in a position to provide support as well as making a sound decision. On the other hand, Jacob group Australia provides technical profession on markets globally. The firm as well determines the fee proposal to clients. For effective running the department maintains and control communications within the budgeted project cost. For one to be considered a successful member of the team he or she must possess a management experience in the field or a minimum of ten years. Within that period, one is expected tom familiar with every procedure there with the required skills and experience. Furthermore, if one is a holder of bachelor of engineering or that of science there is added advantage (Gibb, Haskins, & Robertson 2013). Teamwork led to one gaining more skills in handling more of the emerging issues. Since this one as scientists does not have to keep his thought but has to share. During sharing of ideas, one must be cooperated with new skills as well as knowledge. Lastly, the transport security operation is under the department of infrastructure and regional infrastructure. For efficiency, stable, safe and secure transport system the department with the help of Australian government must be involved (Reggiani, 2013). The department as well fosters external territories administration to boost the countries’ economy as well as social dividends. The department offers help to all people in regardless of their social backgrounds. For transparency matters, the department provides policy advice concerning security to the government. For effective and efficient progression, the department works in the team under the compliance manager. Some of the important tasks of the department include, transport security assessments, conducting compliance activities, as well as maintaining good relationships in industries (Reidy, Kumar & Kajewski, 2014). One should as well possess appropriate knowledge, skills as well as experiences in conducting audits, investigations, and inspections. Further in the transport security there are some procedures and criteria followed in selection. In criteria one the team must be productive in working relationships (Kelly, Male, & Graham, 2014). Individual differences, as well as diversity, are valued during monitoring the members of the department. To be clear one must be excellent in communication that is both oral and written. Another considered factor is that one must be in a position to deliver to the industry positively. One must as well show the ethical behavior of the highest level as well as the code of conduct in decision making. One should be in a position to think creatively and positively without interferences of external factors (Reidy, A., Kumar, A., & Kajewski, 2014). For one to hold the position he she must show the appropriate skills and knowledge in the field. Conclusion It is evidence that all industries require safety while running their activities. From all the above firms, the most important themes are those of knowledge and compliance. For the security issues to be handled effectively one should be educated up to the university level. Technical bits of advice are another important element that is usually considered while selecting senior security officers. Experience as well should be considered at a very high rate. Assessing of the members is done to have the appropriate person. References Board, Y. J. (2012). Local Security Assistants. Bryant, L. (2012). An assessment of development funding for new housing post GFC in Queensland, Australia. International Journal of Housing Markets and Analysis, 5(2), 118-133. C:\Users\amy.wright\Desktop\Amy\Job Descriptions\Security Manager - Dumas House.doc Jackson, D., & Chapman, E. (2012). Non-technical skill gaps in Australian business graduates. Education+ Training, 54(2/3), 95-113. Dainty, A., & Loosemore, M. (Eds.). (2013). Human Resource Management in Construction Projects. Routledge. Denzer, R., Argent, R. M., Schimak, G., & Hřebíček, J. (Eds.). (2015). Environmental Software Systems. Infrastructures, Services and Applications: 11th IFIP WG 5.11 International Symposium, ISESS 2015, Melbourne, VIC, Australia, March 25-27, 2015, Proceedings (Vol. 448). Springer. Gibb, A., Haskins, G., & Robertson, I. (2013). Leading the entrepreneurial university: Meeting the entrepreneurial development needs of higher education institutions. In Universities in Change (pp. 9-45). Springer New York. Gilmour, T., & Milligan, V. (2012). Let a hundred flowers bloom: Innovation and diversity in Australian not-for-profit housing organizations. Housing Studies, 27(4), 476-494. http://career center.asisonline.org/jobs/6805741/senior-consultant-security https://inspira.un.org/psc/UNCAREERS/EMPLOYEE/HRMS/c/UN_CUSTOMIZATIONS.UN_JOB_DETAIL.GBL?Page=UN_JOB_DETAIL&Action=A&JobOpening Id=40780&SiteId=1&PostingSeq=1& http://www.csiro.au Kelly, J., Male, S., & Graham, D. (2014). Value management of construction projects. John Wiley & Sons. Petrick, J. A. (2012). Enhancing Ethical US HRM Education and Practice: Integrity Capacity and HRM Professionalism. SAM Advanced Management Journal, 77(4), 42. Reggiani, A. (2013). Network resilience for transport security: Some methodological considerations. Transport policy, 28, 63-68. Reidy, A., Kumar, A., & Kajewski, S. L. (2014). Sustainability in infrastructure investment: building the business case. Stratton, J. (2013). The Western Australian Police headquarters building: Surveillance, power, and the authoritarian state. Cultural Studies Review, 19(2), 261-89. Read More

The purpose of the company is to ensure the safety in all market sectors all over Melbourne. One of the purposeful roles is to control communication as well as management. The site shows that for one to hold the position he or she must hold Bachelor of Science or Bachelor of Engineering. Teamwork is the most relevant issue in the field to run efficiently. Job description 5 C:\Users\amy.wright\Desktop\Amy\Job Descriptions\Security Manager - Dumas House.doc The site talks about the department of infrastructure and how it helps the government in investing in infrastructure.

The division is further divided into the office of transport security. Compliance manager is the head of the carriage security and helps in the arrangement of industries. Duties of the department are as well outlined. The criteria for selection are as well emphasized. For one to be an employer he or she must be an Australian. The site was selected since the information came direct from the department management team. The validity of the information is as well recognized since it contains relevant information.

Method There is a description and analysis of top security positions in various firms, particularly in Australia. For on to achieve the findings there must be certain criteria or path that must be followed. In this case, five fields are to be critically analyzed. To have successful results all of the required career field assessment is done for each and every firm. The period of evaluations between one firm to the other differs according to policies and requirements of the same. In CISRO, assessment has to take time since it is a scientific field that requires analysis and at the same time testing is a necessity.

After the evaluation results are then recorded in the form of tables as indicated below. Findings Table 1 Title description of the table Job description Eligibility CSIRO CBIS Duties and responsibilities Security clearance Future on innovation Managing directors Salary Job experience Services to government and community Operations maintenance Location Ability to undertake research freely Divisions Facilities The above table shows findings CSIRO statutory authorities and their job description.

After the assessment all the above indicated results were recognized. Table 2 Job opening Mission of the job Responsibilities Competencies Missions Political missions Management and administration Academic qualifications Locations Peacekeeping operations Coordinate budget activities Experiences Vacant position Hard working conditions Coordinates meetings Communication The united nations have various fields related to security. Some of the above information was abducted during the assessment period.

Table 3 Consultant security officer Roles Competences Purpose of the business Location - Melbourne Security provision Excellent knowledge Attract industries Open salary Pipeline growth for security Relevant technical management experience Maintaining clients Posted on January, 27 2015 Communication maintenance and control Familiar with security policies in Australia Locations of more than 200 offices in approximately 25 countries The Jacob security domain is recognized one of the prominent businesses globally.

The requirements of the applicants were identified as well as some of the duties and responsibilities. Table 4 Transport security Transport security inspector Business division Duties and responsibilities Department of regional development Full time employment Concentrate on security matters Transport assessments Promote the infrastructure Location-Perth Different localities Conducting inspection and audits Ensuring security in transport system Branch –transport operations Responsible for maritime and aviation Maintenances of productive relationship with related industries Transport agency security handles security in various fields to ensure safety of the society.

Some of the above findings were identified to be part of the agency.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Security Domain in Australia Annotated Bibliography Example | Topics and Well Written Essays - 2250 words, n.d.)
The Security Domain in Australia Annotated Bibliography Example | Topics and Well Written Essays - 2250 words. https://studentshare.org/information-technology/2053629-the-security-domain
(The Security Domain in Australia Annotated Bibliography Example | Topics and Well Written Essays - 2250 Words)
The Security Domain in Australia Annotated Bibliography Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/information-technology/2053629-the-security-domain.
“The Security Domain in Australia Annotated Bibliography Example | Topics and Well Written Essays - 2250 Words”. https://studentshare.org/information-technology/2053629-the-security-domain.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Security Domain in Australia

XYZ Corporation in the Field of Security Services

hellip; The new product is being introduced for the first time in australia, and it gives seamlessly integrated solution from product level to service level.... This has resulted in building up of largest customer base in australia with a very high brand recall and brand loyalty in market.... With already existing customer base, which is having latent demand for more advanced security appliance as well as high potential new customer base, XYZ Corp has decided to have technological tie up with ABC International, the market leader in US and UK market in Security Appliance, for diversifying into the security appliance sales in australia....
13 Pages (3250 words) Case Study

Business Relationships between Australia and India in 2014

This paper "Business Relationships between australia and India in 2014" aimed at addressing the current trade relations between India and australia.... nbsp; From a historical perspective, the study thus assesses the changes observed in the relationship of India and australia for the past 10 years, projecting the future of such relationship for the upcoming few years until 2024.... The existing business relationship between australia and India has ignited many benefits in building communication with different cultures....
8 Pages (2000 words) Research Paper

Sustainable water in Austrialia

opic Sentence 1: Even with growing and water shortage issues by the 1980s, Sustainable Water in australia Affiliation Introduction Water is vital for all aspects of life on earth.... here are many factors influencing water security in australia.... Many factors influence water security in australia.... ustainable water management in australia will necessitate technological innovation driving increased productivity and efficiency and heightened environmental outcomes in order to balance economic, social, and environmental issues....
2 Pages (500 words) Assignment

Domestic Violence in Australia

This research proposal "Domestic Violence in australia " deals with topics linked to Safe Homes provided for battered women in australia.... in australia as well, there are specific activities adopted by the government and organization which protects women from domestic violence and provide them with various intervention and Safe Home provisions.... There have been many admissions to this refuge owing to domestic violence in the aboriginal areas of australia....
5 Pages (1250 words) Research Proposal

Indigenous Australian Housing Problem

in australia, despite the resources allocated to targeted programmes, and despite the technical sophistication of experts engaged in service delivery efforts, concrete improvements in some key areas of Aboriginal health, education, employment, self-determination, incarceration, housing and rights have remained elusive.... or much of the period of white occupation of australia the failure of indigenous people to take up opportunities to assimilate was generally viewed in racist terms, as demonstrating their biological/genetic unsuitability for 'civilised life'....
9 Pages (2250 words) Essay

Making Foreign Policy: Maritime Asylum Seekers in Australia

This literature review "Making Foreign Policy: Maritime Asylum Seekers in australia" presents the making of foreign policy with reference to maritime asylum seekers in australia.... The purpose of this is to examine the making of foreign policy with reference to maritime asylum seekers in australia.... This is an issue of security in australia with regard to the protection of the borders.... 157), the issue of maritime asylum seekers in australia gained publicity after the MV Tampa case which ensued in 2001....
7 Pages (1750 words) Literature review

The Policy of Mandatory Detention of Asylum Seekers in Australia

The author of "The Policy of Mandatory Detention of Asylum Seekers in australia" paper seeks to provide a discussion about the policy of mandatory detention of asylum seekers informed by a critical understanding of human rights and community development.... Asylum seekers who find their way in australia via boats or otherwise without due authorization from Australian authorities have been disproportionally affected by the law.... 0) postulates that the Migration Act 1958 makes it an offense to be in australia unlawfully or rather without authorization from Australian immigration officials....
9 Pages (2250 words) Essay

Ethics of Metadata Retention

It has been established that although scores of people are against metadata retention, the scheme can be justified by its value in rooting out terrorism in australia.... hellip; Proponents of metadata argue that it promotes the security and wellbeing of civilians while opponents maintain that it violates the right to privacy.... This report "Ethics of Metadata Retention" discusses the ethics of metadata retention as reported in the public domain....
10 Pages (2500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us