Wednesday, August 28, 2019

Successful security management Research Paper Example | Topics and Well Written Essays - 2250 words

Successful security management - Research Paper Example Since security is a mission to protect the people, property and the business, an integrated approach in policy making is essential for successful security management. A formal security frame work in an organization incorporates various security controls which need continuous review for an efficient functioning of the security system. A good security management model envisages security standards for effective practice which increases confidence level of the various stakeholders of the organization. The structure for security management in an organization should be established with clear-cut authority and clarity in reporting system since coordination during the times of exigencies and emergencies will be very crucial. This ensures proper communication at all levels, improves coordination and avoids delays Talbot & Jackman (p. 10) state, â€Å"The term â€Å"security† can of course be a much broader term. For example, if we consider security as a â€Å"state of being protected from hazards, danger, harm, loss of injury,† it also includes elements of protection from natural disasters and concepts of organizational resilience.† Security management is closely related to risk management. Risk could emanate due to various factors, such as accidents in work place, damages due to acts of god, eruption of fire, wars, political and communal violence, theft and loss of confidential information and business secrets. Combination of one or more factors may lead to loss of financial resources and bankruptcy. Also, risks involve health and safety of people and property. Liberalization and globalization drive in various countries have actually increased the risk profile of the projects and businesses considerably due to innovations in information technology and telecommunications and pose threats to the lives of industrialists and politicians. Industrial espionage which is aided by sophisticated

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.