Security Management Paper

College
Essay
Miscellaneous
Pages 8 (2008 words)
Download 0
As stated in the Security Management Practices, control is important to reduce the effects of security threats and vulnerabilities to a level that is tolerable by an organization. [2001,p.4]. In this paper the following are discussed: the matrix in hiring personnel, policy on how to deal with privacy issues in conducting surveillance and intelligence gathering, analyzing a budget for a security organization, and the policy and procedures for dealing with issues such as sexual harassment, discrimination, physical security, and personal protection.

Introduction

The matrix is use to be able to provide equal opportunity to all the applicants on lawful job related and non-discriminatory criteria. A pre-designed tool was created by Texas Tech as a hiring selection matrix. The matrix composed of a spreadsheet, which helps to evaluate the applicant. The snapshot of the matrix is shown below (figure 1). To start with this matrix on the upper portion of the matrix just types the required qualification of the person needed for the job. The preferred skills may include education, Clerical experience, MS Office experience, ten key by touch, TTU experience, bookkeeping experience, keyboarding score and spelling score. On the lower part of the preferred skills you can rate the skills from 1 to 5 (with 5 as the highest scale).
Once the application received, the name of the applicant can be inserted on the applicants' column. Opposite to the applicant column are column wherein you can put your rate for a certain applicant (rate 1 to 5 - 5 is the highest). ...
Download paper
Not exactly what you need?

Related papers

Security Administration and Management
From our analysis, by focusing on differentiation strategies in the security industry, Securitas AB success can be attributed to its vast experience in the market, product differentiation, and assorted brands. Securitas AB by using its trademark experience and know how both product differentiation and cost leadership strategy means the company has a focus strategy, focusing on cash on transit and…
The Unification of Information Security Program Management and Project Management
However, converging the two managements has drawbacks as well. More often than not, drawbacks weigh more than success on the first stages of the implementation. In light of the mentioned union, his paper will discuss the risks brought about by the new technology, the tasks to be dealt with in developing the Enterprise Information Security Program, and the adherence to executing risk management.…
Homeland Security Term Paper
Almost any weakness in our infrastructure, social composition, institutions, or economy may be perceived as a threat to out national security. Substandard education, an economic recession, or an aging electrical grid can all place our collective security at risk. However, for the purposes of this discussion, and this paper, the risk to our nation's security will be limited to the threats posed by…
Information Security
There is also a vast body of empirical evidence that demonstrates that general managers ought to be much more involved in the formulation and implementation of information security because they are more able to assess particular types of risks, more attuned to cost-benefit considerations, and better able to integrate information security into a business organization's larger structure than…
Security Management Paper
The matrix is use to be able to provide equal opportunity to all the applicants on lawful job related and non-discriminatory criteria. A pre-designed tool was created by Texas Tech as a hiring selection matrix. The matrix composed of a spreadsheet, which helps to evaluate the applicant. The snapshot of the matrix is shown below (figure 1). To start with this matrix on the upper portion of the…
Change Management Plan Paper
Technology and innovative approaches to business are the main priorities of this company. In order to remain competitive and sustain its strong market position, CrysTel needs effective change models and leadership styles to support current improvements and innovations.…
Knowledge Management paper
Knowledge is, to an enterprise or an individual, the possession of information or the ability to quickly locate it. This is essentially what Samuel Johnson, compiler of the first comprehensive English dictionary, said when he wrote that: "Knowledge is of two kinds: we know a subject ourselves, or we know where we can find information upon it." (Source website…