Verified Document

Security Management The Statement That Essay

Security managers must also pay attention to regulatory compliance with voluntary, self-regulation, and statutory considerations (Options for the development of the security industry). Voluntary regulation is self-imposed and may include the establishment of a professional regulatory body. Self-regulation occurs where the regulated profession has a majority on the regulating body; for example, medical professionals regulating the medical industry. Legal regulation entails legal requirements that must be followed in order to practice or operate.

In Organizational resilience: Security, preparedness, and continuity management systems -- requirements with guidance for use (2009), a process approach is described for achieving effective security management. A process approach, according to this source, involves:

Understanding an organization's risk, security, preparedness, response, continuity, and recovery requirements

Establishing a policy and objectives to manage risks

Implementing and operating controls to manage an organizations' risks within the context of the organization's mission

Monitoring and reviewing the performance and effectiveness of the organizational resilience management system

Continual improvement based on objective measurement

Security managers must also be capable at invoking change when things simply aren't working the way they should. Professional practices for security managers seeking to improve security within their organizations (2005) advises the creation of a working group to quickly initiate needed change, "one month to settle the "big picture" in a realistic way and identify a strategy to follow." The working group should include security professionals as well as other stakeholders such as non-security employees and customers. Further, to increase uniformity and appropriateness of protection, it is useful to establish threat levels, high medium and low, based on the type of business activity, population...

Parts of this document are hidden

View Full Document
svg-one

To succeed in appropriate identification of these factors, security managers will have to master a process approach to security assessment and implementation and will need to work in the confines of regulatory requirements. Finally, security managers will have to acquire change management skills to understand what needs to change and how to change it.
Bibliography

Options for the development of the security industry. Security Management Bulletin No: 2. The Security Institute.

Organizational resilience: Security, preparedness, and continuity management systems -- requirements with guidance for use (2009, March 12). American National Standards Institute, Inc.

Professional practices for security managers seeking to improve security within their organizations (2004). Security Business Practices Reference, Volume 7. ASIS Council on Business Practices.

Professional practices for security managers seeking to improve security within their organizations (2005). Security Business Practices Reference, Volume 6. ASIS Council on Business Practices.

Rachel Briggs, R. And Edwards, C. The business of resilience. DEMOS.

Risk management and the role of security management (2009, January). Security Management Bulletin No: 4. The Security Institute.

Security management stage 1 (core skills). Security Operations Management. ARC Training.

The principles of security. Security Management Bulletin No: 3. The Security Institute.

The role of the security manager. Security Management Bulletin No: 3. The Security Institute.

Sources used in this document:
Bibliography

Options for the development of the security industry. Security Management Bulletin No: 2. The Security Institute.

Organizational resilience: Security, preparedness, and continuity management systems -- requirements with guidance for use (2009, March 12). American National Standards Institute, Inc.

Professional practices for security managers seeking to improve security within their organizations (2004). Security Business Practices Reference, Volume 7. ASIS Council on Business Practices.

Professional practices for security managers seeking to improve security within their organizations (2005). Security Business Practices Reference, Volume 6. ASIS Council on Business Practices.
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology in Film Fred Ott Was the
Words: 1898 Length: 6 Document Type: Essay

Technology in Film Fred Ott was the very first movie star that every existed. His brief starring role in the five-second film that showed him sneezing started the use of technology to make films. Since then, technology both in and out of film has changed immeasurably and what technology is used and is said about technology in these same films has evolved quite a lot and the statements sometimes made are

Technology Proposal Social Networking and
Words: 1070 Length: 4 Document Type: Term Paper

Creating an effective library social networking platform needs to start with a view of how to create a content management system (CMS) first (Dickson, Holley, 2010). The CMS serves as the system of record of all catalog and collection items, providing valuable statistics on how each book, content and collection item is being used (Shapira, Zabar, 2011). This is extremely valuable information for each department in the library to

Technology for Students With Disabilities
Words: 3214 Length: 11 Document Type: Research Paper

These benefits arise because of implementing both assistive technologies and Information Communication technology (ICT). The implementation of technology in classrooms usually has benefits to both the disabled students as well as the teachers (Kirk, Gallagher, Coleman, & Anastasiow, 2012, p.240). The general benefits of use of assistive technologies and ICT in teaching students with learning disabilities include greater learner autonomy and unlocking hidden potential with those with communication difficulties.

Technology in the Workplace the
Words: 2715 Length: 9 Document Type: Research Paper

Instead, organizations must strike a balance between the autonomy and independence offered by technology in the workplace and the need for employees to have some level of formal and informal commitment to the organization as a whole. Just as seemingly counterproductive activities such as doodling, daydreaming, or, in the information age, surfing the internet, can actually contribute to efficiency by offering employees productive mental stimulation, so too can the

Technology in the Classroom in Today's Society,
Words: 3260 Length: 10 Document Type: Research Paper

Technology in the Classroom In today's society, technology has become an accepted medium for communication. From email correspondence that has taken the place of mail, to texting instead of talking, advances in technology have become integrated into our daily lives. However, the line should be drawn when it comes to technology impeding academics and being incorporated into the classroom. Although many support the notion of technology in the class, others see

Technology Acceptance Model Tam and Information Systems Success...
Words: 4229 Length: 15 Document Type: Literature Review

Technology Acceptance Model Using Technology Acceptance Model (TAM) to Assess User Intentions and Satisfaction on Software as a Service (SaaS): The Value of SaaS Software as a Service (SaaS) was researched by Benlian and Hess (2011) in an effort to determine its value to companies. Among the arguments was that SaaS is already declining in popularity even though it is very new. The majority of the arguments that lean in that direction have

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now