StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

An evaluation of the effectiveness of security program for sensitive government buildings - Dissertation Example

Cite this document
Summary
Security Program for Sensitive Government Buildings Introduction The purpose of this paper is to research security program model for sensitive government buildings. By reviewing all relevant existing literature on the subject and was concluded that the contemporary threats and risk management are related to the terrorism attacks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
An evaluation of the effectiveness of security program for sensitive government buildings
Read Text Preview

Extract of sample "An evaluation of the effectiveness of security program for sensitive government buildings"

Download file to see previous pages

Some interesting cases studies as National Assembly for Wales, Cardiff , Corporation of London and Cabot Circus Shopping Center. Those examples proved the efficiency of the RIBA guidance in counter-terrorism measures. As recommended by RIBA architects and engineers should develop efficient security features with minimal cost extra. Therefore is important to valuate the security program costs. Kovacich and Halibozek in their book: “ Security Management: How to manage the cost of an assets protection program” developed a powerful tool for security professionals setting out to design cost-effective programs.

Finally and based on the previous research were suggested recommendations to improve the security of sensitive government buildings in OMAN. Risk Factors Abkowitz defines risk factors as the elements which are at the source of the disasters. These elements are classified in 10 basic risk factors: . Design and construction flaws: these flaws are related to the design specification in building or major facilities construction. . Deferred maintenance: related to the use of the operation/building.

Flaws during this stage should be prevented. Unfortunately it doesn’t happen so often. . . Schedule constraints: the control of the project schedule is also very important. Sometimes in order to accomplish a deadline some tasks are eliminated or some details are devalued. It can lead to error and sometimes to destructive outcome. . Inadequate training: In some kind of tasks the individual training is critical for a correct performance. Some organizations don’t invest as they should in the training of the employees.

Therefore some flaws can occur. . Not following the procedures: this risk factor relates to the failing to follow procedure. In some organization the individual task is very well defined and documented by a procedure. When the procedure is not accomplished it can cause operational flaws. . Communication failure: this flaw is related to the communication between members of the same organization, between different organizations or between the organization and the public. . Arrogance: can lead into human flaw by underestimating the risk and can drive to insecure situations.

Arrogance can appear also at the institutional level. At this level the arrogance is reflected in the culture of the organization. . Stifling political agendas: The governmental policies can lead into some risk. The political agendas are associated with the Terrorism. But the risk is not limited to the terrorist attacks. (Abkowitz, 2008). Contemporary Threats and Risk Management Nowadays the concept of security has been developed to a complex arena, including issues of health and safety, and components of risk evaluation and management, paying attention to a broader array of risks (forgeries, terrorism, emergency situations).

Button in his work identifies the the pluralisation of security as one of the main trends security management ( Button, 2008).

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“An evaluation of the effectiveness of security program for sensitive Dissertation”, n.d.)
An evaluation of the effectiveness of security program for sensitive Dissertation. Retrieved from https://studentshare.org/management/1403739-an-evaluation-of-the-effectiveness-of-security
(An Evaluation of the Effectiveness of Security Program for Sensitive Dissertation)
An Evaluation of the Effectiveness of Security Program for Sensitive Dissertation. https://studentshare.org/management/1403739-an-evaluation-of-the-effectiveness-of-security.
“An Evaluation of the Effectiveness of Security Program for Sensitive Dissertation”, n.d. https://studentshare.org/management/1403739-an-evaluation-of-the-effectiveness-of-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF An evaluation of the effectiveness of security program for sensitive government buildings

Effectiveness Of Federal Information Security

The paper "effectiveness of Federal Information Security" discusses whether the risk to information technology systems in Federal Agencies and the IT industry between 2002 and 2005 has been decreased as a result of implementing the Federal Information Security Management Act of 2002.... ) takes a deep look at the impact of FISMA in federal government agencies and departments and compliance efforts.... We examine a few case studies and then move on to look at the private sector compliance initiatives, including software produced by the private sector software industry to help government agencies and departments achieve compliance easily We link how the various policies, circulars and presidential executive orders shaped management of information and information systems in the federal government....
36 Pages (9000 words) Research Paper

Prevention: Human Factors

This system is very data sensitive and requires extensive security policies to gain credit with international customers.... This system is very data sensitive and requires extensive security policies to gain credit with international customers.... Customer identity and safety are ensured with passwords and login procedures. The employee training for the use of systems is There is a lack in the security training which we have observed.... The employee training for the use of systems is adequate but there is a lack in the security training which we have observed....
35 Pages (8750 words) Essay

Information Security Implementation Plan

This essay "Information security Implementation Plan" is a preparation of MEMATECH Solutions Limited Information security Implementation Plan.... The essay covers and discusses the areas of ISCBK (Information security Common Body of Knowledge) that incorporate the various groups of information security....   … In addition, the paper outlines the planning guidelines towards the aims, security policies, and standard taxonomy....
38 Pages (9500 words) Essay

Can Successful SSR Programmes be Locally-Owned

The concept of security Sector Reform (SSR) programme acquires a collective recognition across the global communities owing to its evident contributions to the international governance system (Security Council Report, 2006).... It is in this context that extensive appraisal of the… SR programmes by global strategists has been the result of its ability to be flexibly aligned with the goals of other security programmes in association with intergovernmental agencies or institutions....
12 Pages (3000 words) Essay

Promoting Information Security in Banking Solutions Inc

he organization's DR/BC programs have been organized in such a way that each program's center serves as the host site and processing location for the other center.... This case study "Promoting Information security in Banking Solutions Inc" focuses on the major information security issue faced by Bank Solutions Inc.... Skipping some item processing facilities poses an information security risk to both customers and the institution....
5 Pages (1250 words) Case Study

Building Regulation and Fire Safety Management

The strategy needs approval from the government through Approved Documents B- volume 2 buildings other than dwelling houses or other codes including relevant applicable building legislations.... Part 1: Fire Safety Strategy The Fire Safety strategy has been designed while keeping in view the population density in the building during the time of fire with an adequate number of exit units as required to meet the minimum requirements of the buildings equipped with an efficient information network system....
10 Pages (2500 words) Case Study

National Risk Register for India

Conclusion19The government of India, (2016).... Conclusion19The government of India, (2016).... Indian government is investing in disaster management in order to minimize harmful effects on the society, environment and economy.... The top most risk that would be put into priority by the government of India include corruption and frauds, droughts, floods, earthquakes, cyclones, tsunami, epidemics, landslide, civil conflicts and forest fires....
13 Pages (3250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us