Monday, April 22, 2019

Successful security management Research Paper Example | Topics and Well Written Essays - 2250 words - 1

Successful trade protection management - Research report ExampleThe various area of security that needs attention includeDalton (2003) traces the roots of contemporary incorporate security back to the role of the night watchman prior to the 1960s. In this guise the job of security personnel within businesses entailed little more than acting as a lookout with a simple role of early warning in case of incidents such as fire. Throughout the 1960s and into the latter(prenominal) half of the 20th century this limited early role began to expand and fire watches began to take on more classical security duties including controlling access and egress from properties, patrolling and primary(prenominal)taining perimeter fences and general guarding duties (Gill, 2006). Dalton terms this the yard Shack Era as activities were typically based out of such shacks located by the main gate (Gill, 2006).While security management progressed at varying speeds within industries different and between undivided organizations a growing role for security departments within the corporate world was apparent. For the most part it travel out of the so-called green shacks and into offices embarking on what Dalton describes as the Physical Security Era (Gill, 2006). With the arrival of the physical security era corporate security continued to perform duties such as security patrols scarcely in addition took on responsibilities for responding to medical emergencies, controlling traffic, monitoring equipment, escorting employees and staffing front desks (Gill, 2006). This entirely defensive access code to corporate security could be considered the trademark of the physical security era and to an extent it remains the ethos slow security departments in many large businesses today (Gill, 2006).One of the effects of globalization has been a proliferation in the number of threats which face large organizations with exposure to operational risks all over the world. This in turn has make th e job of protecting businesses much more complicated and means the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.