Verified Document

Security Analysis In The UK Essay

Corporate Security Challenges Critically discuss the assertion by Briggs and Edwards (2006, p.21) that corporate security departments face the same challenges as any other business function: "they must keep pace with their company's changing business environment and ensure that how they work, what they do and how they behave reflect these realities

The world has become a global village through globalization. Business undertakings have come to be more and more intricate. This in turn has altered and transformed the structure and the strides being taken in the corporate realm (Tipton and Krause, 2003). This is owing to a number of aspects. To start with, the inundation of traditional markets is causing organizations to move towards risky directions. For instance, in the contemporary, the advancement of business strategies, such as having offshore companies, enable the management of organizations from afar (McGee, 2006). In addition, the rise of accountability of organizations through corporate social responsibility and corporate governance have forced companies to make sure their proclamations and actions are in tandem, irrespective of their business operation locations. At the present moment, there is the interrelation between the manner in which a business operates and its risk portfolio. Other kinds of organizational behavior can undercut the license of operation. For this reason, security has grown to become a significant element in the corporate realm in the contemporary. Companies are seeking new strategies for risk management and the security management division has protracted its scope to include: information assurance, repute, corporate social responsibility and corporate governance and regulation (Briggs and Edwards, 2006).

To begin with, corporate security departments have to comprehend that security in overall is attained through the actions undertaken by personnel everyday across the company. This is not an aspect that can be wholly partaken by the corporate security department on behalf of the company. As a result, its success and effectiveness as a business function is reliant on its capacity to persuade and influence others to function differently. In turn, this lays emphasis on communication and necessitates the corporate security department to appreciate and see the importance of the perspective of non-security professionals as much as the views of the specialists. Secondly, corporate security departments have to be aware of the restrictions of command and control methods to change management (Purser, 2004). Organizational behavior is transformed and altered simply by influencing, coaxing, convincing, and elucidating why this new manner of operation works in the interest of every individual. This necessitates departments to function through principal social networks, which places concentration and focus on individuals, management and social talents than security understanding. The supremacy of the corporate security function in this day and age is directly proportional to the quality of its associations, not the profundity of its content knowledge (Whitman and Mattord, 2010).

One other aspect is that corporate security departments have to fully comprehend that they play a significant role for the corporation as a whole. In particular, they have to understand that they help the corporation to undertake risks rather than doing away with them, and having emergencies in place to decrease harm and damage at the time when incidents go wrong. Being a risk taker is a vital characteristic to successful and prosperous companies. Taking this into account, corporate security departments ought not to act as security conformists and traditionalists whose undertakings take away from, rather than add towards, the goals and objectives of the company (Raggard, 2010). In addition, corporate security departments have to clinch and make a contribution towards the core business concerns of the corporations, and for that reason, have to increase the security portfolio in a significant manner. In the contemporary, these corporate security departments have accountabilities in different areas, for instance, business continuity, brand management, and corporate governance. These responsibilities bring about several parties to inquire the significance of the term, security, to outline what they undertake. According to Briggs and Edwards (2006), the word resilience offers a more precise and comprehensive reflection of the variation of the responsibilities of the corporate security departments.

It is imperative for a corporate security department to make a clear and vivid distinction between the operational and strategic elements of security management. This will enable the corporate security department to take a central lean with respect to strategy and this lets the other business units within the corporation to undertake operational work. This allows all units to have a clear viewpoint to direct and guide their attitude towards security. This provides a bearing...

Another important aspect is that in order for corporate security departments to be trailblazers, they have to do away with old and obsolete suppositions, regarding where their supremacy and rightfulness emanate from. It is imperative to ensure that their stance does not hinge on or depend on that which makes them dissimilar, which is their content knowledge, but rather on business insight, people skills, and management capacity and communication proficiency (Brooks, 2013). To make it more simple, corporate security departments have to compete and operate on similar aspects as every other function within the corporation. This is causing several organization to concentrate and focus more on these skills in comparison to the context of security and a number of people have been operating on security, who actually do not have any expertise in security at all (Cavanagh, 2005).
Critically discuss the main ingredients of an effective procurement strategy with reference to the contracting of manned guarding services

In definition, procurement is referred to as the acquisition of supplies, material as well as services that an organization or project needs so as to effectively function and operate. A procurement strategy basically refers to the strategic and intended approach of cost-effectively buying a corporation's needed supplies, taking into account numerous aspects and factors, for instance, the time period for procurement, the capital and budget, the anticipated risks and prospects and more (Procurement Academy, 2015). The following section will discuss the key elements for an affective procurement strategy with regard to the contracting of manned guarding services. The procurement strategy defines a plan, which makes the most of the external expenditure, procurement processes and other value contributions in a way that backs up the general agenda of the corporation.

One of the key ingredients is the development of the goals and objectives of the project. In this case, the main objective is to attain manned guarding services at a cost-effective rate. This is taking into account the accessible and prevailing resources and supplies, the budget available for the organization and the timeline predetermined for the procurement. In this case, it is imperative to ensure that the strategy for procurement or the manned guarding services is in tandem with the established goals and objectives of the company (Albano et al., 2006). Another important element is the relationship analysis. To begin with, the supplier has to be identified and ascertain whether they have the capacity of contributing to the business strategy of the organization. More so, in the contracting of manned guarding services, it is imperative for the corporation to ensure that a partnership has been created with the supplier. Having a healthy relationship with the supplier of the services will in fact be beneficial to the procurement process in the future (Procurement Academy, 2015).

Briggs and Edwards (2006, p.38-39) assert that "corporate security departments can learn a lot from the ways in which nongovernmental organizations (NGOs) manage their security, based on 'the security triangle' which has three elements: acceptance, protection and deterrence." Critically discuss this assertion taking into account the relationship between corporate security and the wider community in which their organizations operate

The corporate security departments can learn a lot from nongovernmental organizations (NGOs) and the manner in which they manage their security. This is for the reason that when an organization is effectively incorporated into the communities and societies within which they operate, then they cease becoming a target and become a partner (Briggs and Edwards, 2006). The security triangle mentioned continues to be relevant for companies and can be employed successfully. However, this can only be attained if the corporate security department has a proper comprehension of the local settings and the influence they can have on such an environment. Attaining this sort of method in practice depends on a longstanding, sustainable business strategy reinforced by changed business practices and a number of all-encompassing operative values (Briggs and Edwards, 2006).

More so, corporate security departments have to learn from NGOs that in order to realize this vision, it is imperative for them to transform the manner in which they perceive threats and challenges and adjust from an approach of immense cautiousness to security that is centered on incorporation and candidness. This is for the reason that, the security of a corporation faces threat at the time when communities do not perceive any sort of individual or mutual constructivism from their presence. More so, this can be…

Sources used in this document:
References

Albano, G. L., Calzolari, G., Dini, F., Iossa, E., & Spagnolo, G. (2006). Procurement Contracting Stategies. Available at SSRN 908220.

Briggs, R. and Edwards, C. (2006). The Business of Resilience: Corporate Security for the 21st Century. London: Demos.

Brooks, D. J. (2013). Corporate Security: Using knowledge construction to define a practising body of knowledge. Asian journal of criminology, 8(2), 89-101.

Cavanagh, T. E. (2005). Corporate Security Measures and Practices: An overview of security management since 9/11. New York: The Conference Board.
Procurement Academy. (2015). Procurement Strategy Development. Retrieved 17 December 2015 from: http://www.procurement-academy.com/procurement-competences/procurement-strategy-development/
Cite this Document:
Copy Bibliography Citation

Related Documents

UK Immigration and European Convention
Words: 8560 Length: 27 Document Type: Research Proposal

In the event that the analysis of records of telephone, e-mail and internet use was considered to amount to an interference with respect for private life or correspondence, the Government contended that the interference was justified. First, it pursued the legitimate aim of protecting the rights and freedoms of others by ensuring that the facilities provided by a publicly funded employer were not abused. Secondly, the interference had a

Security Analysis in the UK
Words: 2541 Length: 8 Document Type: Essay

Security Report In the present day, organizations are reliant on information in order to continue being relevant and not become obsolete. To be specific, organizations are reliant on the controls and systems that have been instituted in place, which provide the continuing privacy, veracity, and accessibility of their data and information (Lomprey, 2008). There is an increase and rise in threats to information contained within organizations and information systems (Lomprey, 2008).

United Kingdom's War Against Terrorism
Words: 3453 Length: 11 Document Type: Essay

United Kingdom Government Response to Post-9/11 Attacks of Islamic Terrorism Terrorism, in the context of the United Kingdom, is not new. Developed through the past century in response to the increasing rates of terrorism, the United Kingdom's modern counter-terrorism strategies encompass elements of continuity and change. Despite the significant development, there is no change to its fundamental structure as its terrorism agencies carry out similar functions in response to the challenges

UK Decline How Many Times
Words: 4091 Length: 13 Document Type: Term Paper

Carrabine, Lee and South 193) Industrial/Infrastructural Decline As has been said before, the UK no longer makes anything, builds anything or sells anything tangible. The decline in industrial production has resulted in an overall decline in employment of industrial workers, who have not been aided by a failing system to transition to other work. Some would say that the changes occurring in the UK, at this time with the increased importance of service

UK's Emergency Response and Recovery Plan on
Words: 3681 Length: 10 Document Type: Essay

UK's emergency response and recovery plan on statutory guidance accompanying the Civil Contingencies Act 2004 (last updated October 2013, version 5) which is intended to improve the country's ability to absorb, respond to and recover from manmade and natural disasters and various types of emergency situations. Although many analysts believe the UK's emergency response and recovery plan is adequate for its purposes, some critics charge that it fails to

United Kingdom Freedom of Expression Within the Social Media
Words: 2770 Length: 8 Document Type: Essay

The Positive and Negative Effects of Freedom of Expression within the Social Media in the U.K. Introduction In essence, social media in the UK provides an amazing platform for people to freely express their views, share information, and interact. Indeed, as McGoldrick (2013, p. 49) observes, “Facebook and other internet-based social networking sites (SNSs) have revolutionized modern communications.” Some of the most popular social media platforms in the country include, but that

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now