Security management
1. In a civil action, how can a claim of negligent hiring have a greater chance of succeeding?
Jurisdictions have been increasingly putting laws in place pertaining to what makes organizations a potential target for a lawsuit on negligent hiring. Though in most instances, claims of negligent hiring may be effectively fended off, it proves increasingly tricky in the following cases:
· If the individual harming or injuring another is an employee of the company.
· If the employee is found guilty of harming, injuring or doing any… Continue Reading...
Security Management
1. While some people may be better leaders than others, all people can lead and all people can learn to lead better. Discuss some ideas of how leadership skills may be improved.
Development and education
Leaders need to develop in their position. Owing to managerial tasks’ knowledge-based nature, the word “development” has been used to describe the continuous growth in skills and cognition of executives and managers. Managerial development is promoted via education that they may acquire in various settings (Fernandez et al., 2015). Attending and taking part… Continue Reading...
“Checking in for Safety,” Security Management, 1 Aug 2018 https://sm.asisonline.org/Pages/Checking-in-for-Safety.aspx] [4: Holly Gilbert Stowell, “Checking in for Safety,” Security Management, 1 Aug 2018 https://sm.asisonline.org/Pages/Checking-in-for-Safety.asp]
Training and Development for High Performance
Two ideas that McCrie tackles when it comes to training and development of workers and managers for high performance with respect to security are a) the need to measure for effectiveness, and b) the need for non-security personnel to have security training. Each of these are important for their own reasons. Measuring effectiveness is crucial because too many assumptions can be made about a… Continue Reading...
Factors to Consider in Security Management
1. On meeting new workers assigned to the unit, what topics would the supervisor discuss first? Why?
Regardless of the supervisor’s precise role, many of the problems that occur following the hiring of new employees relate to misunderstandings concerning organizational expectations and the failure to identify optimal candidates (McCrie, 2016). Therefore, supervisors at every level should focus on accurately communicating organizational expectations based on a timely and accurate job description, accident reporting requirements, what safety protocols and procedures are in place and the name and contact information of… Continue Reading...
Security Management
1. Some operational contingencies are considered core because the operation could not function without it. A core operational contingency is one that must remain functioning. This is important for contingency planning, so that when you plan for the more common risks that the operation faces, you ensure that the core ones are taken care of, and will continue to run. If you run an e-commerce site, for example, you would consider the ability to keep your website running and continue taking orders as a core contingency. Everything else… Continue Reading...
Security Management: The 1968 Bank Protection Act
In the 1960s, all banking was primarily done in person and in-house—i.e., a customer had to literally walk into a bank to make a transaction. This was well before the era of digital cash, when money could be moved from one place to another with the click of a few buttons on a keyboard. In the 60s, cash had to be on hand at the bank in sufficient quantities to meet demand—and that meant banks were a big target for robbers.
The 1968… Continue Reading...
international professional organizations and governing bodies that ensures the integrity of contract security worldwide, along with the International Security Management Association (ISMA, 2018). When organizations in the public or private sector consider using contract security, they can go through appropriate safeguarding channels.
Contract security companies also enter into complex legal agreements with the clients they serve. Many municipalities are turning towards contract security, which is far more common than many people in the general public realize, often replacing or at least operating contiguously with public law enforcement. For example, the City of San Jose (2013) uses contract security for many of its public works facilities. Doing so helps… Continue Reading...
and security networks need to be regular updated and maintained. Technology can be employed specifically for the purposes of security management, training, and consistent monitoring of all essential services. Likewise, technology can be used as a means of interfacing with the public during crisis scenarios. Each agency can establish its own channel of communication, providing the public and other external stakeholders with access to multiple messages via many media channels. Social media and other new media can also be leveraged for informing the public about critical infrastructure breakdowns and updates.
Current types of technology used in the protection of critical infrastructure and during interagency interactions are generally effective but… Continue Reading...
Security Management
1. The appropriate budget allocation will vary by organization based on what?
The appropriate budget allocation will vary based on the specific profiles of the organization, its needs and the extent to which resources are actually available. In an economic downturn, supply chains can become tight. With tariffs going up or a trade war worsening, obtaining cheap resources becomes more difficult. This has to be taken into consideration when determining a budget--i.e., that organization must look at the macro as well as the micro. The micro in this… Continue Reading...
In their survey, which involved 21 shipping companies in Korea, Lee, Tongzon and Kim (2012) found that the use digital technologies in container port management positively influenced customer satisfaction as well as port competitiveness. The port in question employed digitalization by installing an e-workplace, a security management system, and a customer relationship management system. This study provides important empirical evidence relating to the impact of port digitalization on customer satisfaction. However, generalizing the study beyond the context in which it was undertaken may be quite difficult.
On the whole, the connection between digitalization and customer satisfaction remains a largely under-researched area, particularly within the context of the port industry. Much of the literature in this area focuses on organizational metrics such as container capacity, output, and cost savings, giving little or no attention to customer… Continue Reading...