SlideShare a Scribd company logo
Question 1
1. Thoroughly discuss all of the elements associated with
developing a budget for a security action plan. Include a
discussion about why budgets should be developed during the
planning process and the possible consequences associated with
developing an erroneous budget.
This assessment should be a minimum of 300 words.
Question 2
2. Detail the differences between performance measurement and
quality assurance. Include a discussion of the various
techniques for measuring performance and a discussion of the
difficulties associated with assessing quality assurance..
This assessment should be a minimum of 300 words.
GENERAL OVERVIEW
There are various types of risks (pure, dynamic, speculative,
static, inherent) that are associated with the protection of one’s
assets. It is important that organizations are aware of the risks
that exist and take action to control known risks. As a result,
organizations should utilize the various risk assessment and
management tools that are available. When managing risk, the
focus should be on the elimination of risk, the reduction of risk,
and the mitigation of risk. There are three factors that influence
risk management: vulnerability, probability, and criticality. All
three factors are equally important, and once assessed,
resources should be allocated so that the maximum amount of
risk is reduced.
Conducting a risk assessment is a very detailed procedure
which requires security managers to consider several factors
such as the human, physical and information assets at risk, the
probability or of loss, the frequency of loss, the impact of loss
(financial, psychological, and other), options available to
prevent or mitigate loss, feasibility of implementing options,
and cost-benefit analysis. One way to assist organizations in
conducting a risk assessment is to utilize a security survey
which identifies an organization’s assets, all potential threats to
those assets, and existing vulnerabilities that could be exposed
by the threats to the assets. Security survey results are not only
useful for risk assessments, but are also useful for the current
maintenance of safety and future security planning.
Planning and budgeting for implementing security strategies
that result from risk assessment is not a simple task. First, there
are several types of plans that one must choose from: single-
use, repeat-use (standing), tactical, strategic, and contingency.
All plans are comprised of three elements that flow in the
cyclical manner: needs or risk assessment, alternative courses of
action, and action plan selection. There are also several
planning and management tools (CompStat, GIS) that can assist
in the development of a plan. Once the plan is drafted a budget
must be developed which includes a cost-benefit analysis that
can help planners determine possible consequences associated
with plan-related expenditures, the monetary value of those
consequences, and any anticipated future costs and revenues
associated with the initial expenditures. Budgets can be
presented in traditional, line item, performance-base, and zero-
formats. All budgets should account for personnel services,
operating, supplies and materials, capital, and miscellaneous
expenses. Once the budget has been completed security
professionals are ready to sell the plan to all involved parties
(organization, community, supporting agencies, etc.).
Another important component of security planning is often
not considered until the need arises for backup and/or
emergency plans. Contingency plans are as important as the
initial plan itself. Such plans are designed to respond to changes
that would impact normal business operations if they were
disrupted by disasters, emergencies, crisis, etc. Contingency
plans can be in the form of a business contingency plan or an
operations contingency plan and should be developed at the
organizational level in conjunction with contingency plans that
also exist at the individual, local community, state, and federal
levels.
Assessments, surveys, and planning are not strategies that
were created out of thin air. There are theories that have
contributed to the development of such strategies. Crime
prevention through environmental design (CPTED) is a theory
that has contributed to risk assessment and security planning.
CPTED asserts “that the environment can be protected, and
crime prevented, through the proper design of facilities and
communities” (Ortmeier, 2013, p.173). Safe and secure
environmental designs are achieved through territorial
reinforcement, access control, and surveillance. This can be
accomplished in a variety of ways such as relocating gathering
areas, developing safe activities in unsafe locations, creating
natural barriers, and reducing the amount of isolation and
distance in places. CPTED strategies have been successful when
implemented with the collaboration of organizations,
communities, community policing programs, and security
agencies.
Once an action plan is selected, the next step in security
management is implementing and administering the program.
Administration is conducted in the public and private spheres.
Public administration is characterized by being public affairs
oriented, impartial and fair, apolitical, public source service
oriented, publicly funded and documented, accountable to the
public, selectively staff, and how. In contrast private
administration is characterized by being private enterprise
oriented, private or corporate ownership, competitive, profit
incentive-based, having its financing regulated by market price,
private information and records, accountable to owners and
stakeholders, exercising some freedom in selection and
termination of employees, and free to regulate work methods
and organizations. Regardless of the differences that exist
between public and private administration there are principles
of organization and management which, if followed, can result
in the development of organized organizations.
First, the organizational structure must be established.
Oftentimes we see an organizational chart but do not realize the
steps involved in the developmental process. Usually similar
tasks are grouped together and specialized units or departments
are only created when necessary. The demarcation of the lines
represents responsibilities and channels of communication. The
organizational structure is not just a picture. It also exemplifies
the expectation of completion of tasks associated with assigned
roles and the supervisory chain of command.
Second, ethical leadership must be established. In the past it
was believed that an integral part of the administration process
or human resources was control. Researchers now argue that
leadership should now be focused on allowing managers to use
their own judgment, which should be grounded in ethics.
Third, the organization must be staffed with qualified
personnel. This involves workforce planning which outlines
full-time equivalents, identifies job tasks and clearly specifies
those expectations in the job description. In the background
there should also be risk assessments and security surveys that
identify when and where human resources will be required in an
organization. The training and education of organizational
personnel should also be considered during the workplace
planning process. Personnel enter an organization at various
entry levels, with various levels of education. Job descriptions
and associated technologies are constantly changing
necessitating the continued training and education of previously
and newly hired employees.
Fourth, equipment facilities and supplies must be both
acquired and maintained. Ensuring that these resources are
purchased at the best quality and maintained will enhance
durability and longevity of required resources.
Fifth, policies and procedures associated with the action plan
must be developed. Policies and procedures should be clearly
detailed and provide (uniform guidelines) for addressing various
types of situations that will arise in the organization or agency.
For example, policies can address topics and issues such as
affirmative action, drug and alcohol abuse, ethics, firearms,
general practices, human resources, Internet use, security, travel
and entertainment, and workplace violence. For another
example, procedures can address more specific topics and issues
such as AIDS contact, bomb threats, civil process acceptance,
clear desk, duress alarm, electronic mail protection, employee
access control, guess security, hazardous identification, intranet
protection, medical emergencies, office inspections, password
protection, rape avoidance, substance abuse program audit, and
telephone answering.
Sixth, performance measures and quality assurance must be
evaluated or assessed. Performance management is based on
standards (tangible, numerical, and intangible) and can be
measured through personal observation, written and oral
reports, automatic recording systems, inspections, tests, and
surveys. Quality assurance is more difficult to measure because
quality improvement is continual and “total quality management
(TQM) initiatives involve approaches to administration that
attempt to maximize effectiveness of an organization through
the continued improvement of the quality of its people,
processes, products, and environment” (Ortmeier, 2013, p.198).
In addition, TQM initiatives must be interwoven into all
elements of an organization and such initiatives are unique to
the organization. There is not a one-size-fits-all TQM strategy.
Security personnel, like most humans, are often resistant to
change. Thus, providing evidence of the benefits of TQM
initiatives can often assist security personnel in accepting
proposed changes.
As a final caveat, organizational evaluation and assessment
must be controlled by ethical managers. Organizations are
shifting from the use of traditional financial and statistical
indicators, which often resorted in data distortion, to the use of
the nationally and internationally accepted Baldrige criteria for
performance excellence. These criteria are based on a system
perspective and contain validated measures with which an
organization can measure its performance

More Related Content

Similar to Question 11. Thoroughly discuss all of the elements associated w.docx

PROJECT REPORT ACHIEVEMENTS HITESH
PROJECT REPORT ACHIEVEMENTS HITESHPROJECT REPORT ACHIEVEMENTS HITESH
PROJECT REPORT ACHIEVEMENTS HITESH
HITESH RATHOD
 
Human Factors Presentation
Human Factors PresentationHuman Factors Presentation
Human Factors Presentation
The Windsdor Consulting Group, Inc.
 
Financial Management Of Head Starts.1.Qa
Financial Management Of Head Starts.1.QaFinancial Management Of Head Starts.1.Qa
Financial Management Of Head Starts.1.Qa
Reginald Walker
 
Management of risk introduction
Management of risk introductionManagement of risk introduction
Management of risk introduction
Spyros Ktenas
 
Chapter 5 Environmental Safety, Security and Compliances(FASS)
Chapter 5  Environmental Safety, Security and Compliances(FASS)Chapter 5  Environmental Safety, Security and Compliances(FASS)
Chapter 5 Environmental Safety, Security and Compliances(FASS)
Md Shaifullar Rabbi
 
An Investigation Of Risk Management Strategies In Projects
An Investigation Of Risk Management Strategies In ProjectsAn Investigation Of Risk Management Strategies In Projects
An Investigation Of Risk Management Strategies In Projects
Nancy Ideker
 
Causes of Accidents in Industries SHE.docx
Causes of Accidents in Industries SHE.docxCauses of Accidents in Industries SHE.docx
Causes of Accidents in Industries SHE.docx
swapnil pupulwad
 
GRC_AStepaheadtomeetgrowingStakeholderExpectations.pptx
GRC_AStepaheadtomeetgrowingStakeholderExpectations.pptxGRC_AStepaheadtomeetgrowingStakeholderExpectations.pptx
GRC_AStepaheadtomeetgrowingStakeholderExpectations.pptx
PaulClark519402
 
Risk And Threat Assessment
Risk And Threat AssessmentRisk And Threat Assessment
Risk And Threat Assessment
Jessica Cannella
 
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Editor IJCATR
 
Human Factors - Driver for Safety Management, Engineering and Risk Governance
Human Factors - Driver for Safety Management, Engineering and Risk GovernanceHuman Factors - Driver for Safety Management, Engineering and Risk Governance
Human Factors - Driver for Safety Management, Engineering and Risk Governance
The Windsdor Consulting Group, Inc.
 
ISO 31000_2018 . Risk Management process .pdf
ISO  31000_2018 . Risk Management process .pdfISO  31000_2018 . Risk Management process .pdf
ISO 31000_2018 . Risk Management process .pdf
osamatqm9
 
Management of risks and implication on the nigerian manufacturing sector
Management of risks and implication on the nigerian manufacturing sectorManagement of risks and implication on the nigerian manufacturing sector
Management of risks and implication on the nigerian manufacturing sector
Alexander Decker
 
51_operational_risk
51_operational_risk51_operational_risk
51_operational_risk
Hafeez Farooq
 
CYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfCYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdf
Hari319621
 
In the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdfIn the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdf
annaelctronics
 
Discussion 1Improving Risk Management Capabilities        To .docx
Discussion  1Improving Risk Management Capabilities        To .docxDiscussion  1Improving Risk Management Capabilities        To .docx
Discussion 1Improving Risk Management Capabilities        To .docx
charlieppalmer35273
 
Risk Mgt
Risk Mgt Risk Mgt
Risk Mgt
Morris Muhwezi
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
Beji Jacob
 
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITY
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITYRISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITY
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITY
Ashim Sharma
 

Similar to Question 11. Thoroughly discuss all of the elements associated w.docx (20)

PROJECT REPORT ACHIEVEMENTS HITESH
PROJECT REPORT ACHIEVEMENTS HITESHPROJECT REPORT ACHIEVEMENTS HITESH
PROJECT REPORT ACHIEVEMENTS HITESH
 
Human Factors Presentation
Human Factors PresentationHuman Factors Presentation
Human Factors Presentation
 
Financial Management Of Head Starts.1.Qa
Financial Management Of Head Starts.1.QaFinancial Management Of Head Starts.1.Qa
Financial Management Of Head Starts.1.Qa
 
Management of risk introduction
Management of risk introductionManagement of risk introduction
Management of risk introduction
 
Chapter 5 Environmental Safety, Security and Compliances(FASS)
Chapter 5  Environmental Safety, Security and Compliances(FASS)Chapter 5  Environmental Safety, Security and Compliances(FASS)
Chapter 5 Environmental Safety, Security and Compliances(FASS)
 
An Investigation Of Risk Management Strategies In Projects
An Investigation Of Risk Management Strategies In ProjectsAn Investigation Of Risk Management Strategies In Projects
An Investigation Of Risk Management Strategies In Projects
 
Causes of Accidents in Industries SHE.docx
Causes of Accidents in Industries SHE.docxCauses of Accidents in Industries SHE.docx
Causes of Accidents in Industries SHE.docx
 
GRC_AStepaheadtomeetgrowingStakeholderExpectations.pptx
GRC_AStepaheadtomeetgrowingStakeholderExpectations.pptxGRC_AStepaheadtomeetgrowingStakeholderExpectations.pptx
GRC_AStepaheadtomeetgrowingStakeholderExpectations.pptx
 
Risk And Threat Assessment
Risk And Threat AssessmentRisk And Threat Assessment
Risk And Threat Assessment
 
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
 
Human Factors - Driver for Safety Management, Engineering and Risk Governance
Human Factors - Driver for Safety Management, Engineering and Risk GovernanceHuman Factors - Driver for Safety Management, Engineering and Risk Governance
Human Factors - Driver for Safety Management, Engineering and Risk Governance
 
ISO 31000_2018 . Risk Management process .pdf
ISO  31000_2018 . Risk Management process .pdfISO  31000_2018 . Risk Management process .pdf
ISO 31000_2018 . Risk Management process .pdf
 
Management of risks and implication on the nigerian manufacturing sector
Management of risks and implication on the nigerian manufacturing sectorManagement of risks and implication on the nigerian manufacturing sector
Management of risks and implication on the nigerian manufacturing sector
 
51_operational_risk
51_operational_risk51_operational_risk
51_operational_risk
 
CYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfCYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdf
 
In the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdfIn the risk prioritization step, the overall set of identified risk .pdf
In the risk prioritization step, the overall set of identified risk .pdf
 
Discussion 1Improving Risk Management Capabilities        To .docx
Discussion  1Improving Risk Management Capabilities        To .docxDiscussion  1Improving Risk Management Capabilities        To .docx
Discussion 1Improving Risk Management Capabilities        To .docx
 
Risk Mgt
Risk Mgt Risk Mgt
Risk Mgt
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITY
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITYRISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITY
RISK MANAGEMENT: ISSUES, CHALLENGES AND OPPORTUNITY
 

More from IRESH3

PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docxPreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
IRESH3
 
Practice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docxPractice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docx
IRESH3
 
PrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docxPrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docx
IRESH3
 
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docxPowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
IRESH3
 
PowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docxPowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docx
IRESH3
 
preferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docxpreferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docx
IRESH3
 
Precedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docxPrecedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docx
IRESH3
 
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docxPredictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docx
IRESH3
 
Pre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docxPre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docx
IRESH3
 
Pre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docxPre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docx
IRESH3
 
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docxPre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
IRESH3
 
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docxPre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
IRESH3
 
PowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docxPowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docx
IRESH3
 
Practice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docxPractice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docx
IRESH3
 
PPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docxPPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docx
IRESH3
 
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docxPpt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docx
IRESH3
 
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docxPrejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
IRESH3
 
Preparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docxPreparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docx
IRESH3
 
PowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docxPowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docx
IRESH3
 
PowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docxPowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docx
IRESH3
 

More from IRESH3 (20)

PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docxPreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
PreparationGo to httpwww.excelsior.edumediaoelstutoringSm.docx
 
Practice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docxPractice Nurses will be comfortable having discussions about dea.docx
Practice Nurses will be comfortable having discussions about dea.docx
 
PrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docxPrejudiceAlthough related, stereotypes and prejudice are separ.docx
PrejudiceAlthough related, stereotypes and prejudice are separ.docx
 
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docxPowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
PowerPoint1.Apple effects on Samsung·8 slides·Refe.docx
 
PowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docxPowerPoint with 10 slides and speaker notes with 75-150 words per .docx
PowerPoint with 10 slides and speaker notes with 75-150 words per .docx
 
preferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docxpreferencesDocument ViewerTurnitinOriginality ReportProces.docx
preferencesDocument ViewerTurnitinOriginality ReportProces.docx
 
Precedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docxPrecedents Set By George WashingtonGeorge Washington was aware tha.docx
Precedents Set By George WashingtonGeorge Washington was aware tha.docx
 
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docxPredictors of Abusive Supervision Supervisor Perceptions of Deep.docx
Predictors of Abusive Supervision Supervisor Perceptions of Deep.docx
 
Pre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docxPre-Lab QuestionsWhat major event occurs during interphase.docx
Pre-Lab QuestionsWhat major event occurs during interphase.docx
 
Pre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docxPre-Lab QuestionsUse the following classificatio.docx
Pre-Lab QuestionsUse the following classificatio.docx
 
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docxPre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
Pre-Lab QuestionsNitrogen fixation is a natural process by whi.docx
 
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docxPre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
Pre-AssignmentWrite a 3-4 page paper (not counting cover page and .docx
 
PowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docxPowerPoint  Length 6 slides (excluding title and reference slid.docx
PowerPoint  Length 6 slides (excluding title and reference slid.docx
 
Practice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docxPractice Before IRS Please respond to the followinghttpwww..docx
Practice Before IRS Please respond to the followinghttpwww..docx
 
PPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docxPPT about fair use advertisement case in bisiness law.Introduce pr.docx
PPT about fair use advertisement case in bisiness law.Introduce pr.docx
 
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docxPpt data warehouse tasks First Style1-Dimensions2- The fact.docx
Ppt data warehouse tasks First Style1-Dimensions2- The fact.docx
 
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docxPrejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
Prejudice, Stereotypes, and DiscriminationIn many cases, prejudice.docx
 
Preparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docxPreparation•Review the document titled City of Charlottesville 20.docx
Preparation•Review the document titled City of Charlottesville 20.docx
 
PowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docxPowerPoint presentationImagine that you are a consultant for a.docx
PowerPoint presentationImagine that you are a consultant for a.docx
 
PowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docxPowerPoint PresentationImagine that you are at your job discussi.docx
PowerPoint PresentationImagine that you are at your job discussi.docx
 

Recently uploaded

IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
Amin Marwan
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
spdendr
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 

Recently uploaded (20)

IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 

Question 11. Thoroughly discuss all of the elements associated w.docx

  • 1. Question 1 1. Thoroughly discuss all of the elements associated with developing a budget for a security action plan. Include a discussion about why budgets should be developed during the planning process and the possible consequences associated with developing an erroneous budget. This assessment should be a minimum of 300 words. Question 2 2. Detail the differences between performance measurement and quality assurance. Include a discussion of the various techniques for measuring performance and a discussion of the difficulties associated with assessing quality assurance.. This assessment should be a minimum of 300 words. GENERAL OVERVIEW There are various types of risks (pure, dynamic, speculative, static, inherent) that are associated with the protection of one’s assets. It is important that organizations are aware of the risks that exist and take action to control known risks. As a result, organizations should utilize the various risk assessment and management tools that are available. When managing risk, the focus should be on the elimination of risk, the reduction of risk, and the mitigation of risk. There are three factors that influence risk management: vulnerability, probability, and criticality. All three factors are equally important, and once assessed, resources should be allocated so that the maximum amount of risk is reduced. Conducting a risk assessment is a very detailed procedure which requires security managers to consider several factors such as the human, physical and information assets at risk, the probability or of loss, the frequency of loss, the impact of loss (financial, psychological, and other), options available to
  • 2. prevent or mitigate loss, feasibility of implementing options, and cost-benefit analysis. One way to assist organizations in conducting a risk assessment is to utilize a security survey which identifies an organization’s assets, all potential threats to those assets, and existing vulnerabilities that could be exposed by the threats to the assets. Security survey results are not only useful for risk assessments, but are also useful for the current maintenance of safety and future security planning. Planning and budgeting for implementing security strategies that result from risk assessment is not a simple task. First, there are several types of plans that one must choose from: single- use, repeat-use (standing), tactical, strategic, and contingency. All plans are comprised of three elements that flow in the cyclical manner: needs or risk assessment, alternative courses of action, and action plan selection. There are also several planning and management tools (CompStat, GIS) that can assist in the development of a plan. Once the plan is drafted a budget must be developed which includes a cost-benefit analysis that can help planners determine possible consequences associated with plan-related expenditures, the monetary value of those consequences, and any anticipated future costs and revenues associated with the initial expenditures. Budgets can be presented in traditional, line item, performance-base, and zero- formats. All budgets should account for personnel services, operating, supplies and materials, capital, and miscellaneous expenses. Once the budget has been completed security professionals are ready to sell the plan to all involved parties (organization, community, supporting agencies, etc.). Another important component of security planning is often not considered until the need arises for backup and/or emergency plans. Contingency plans are as important as the initial plan itself. Such plans are designed to respond to changes that would impact normal business operations if they were disrupted by disasters, emergencies, crisis, etc. Contingency plans can be in the form of a business contingency plan or an operations contingency plan and should be developed at the
  • 3. organizational level in conjunction with contingency plans that also exist at the individual, local community, state, and federal levels. Assessments, surveys, and planning are not strategies that were created out of thin air. There are theories that have contributed to the development of such strategies. Crime prevention through environmental design (CPTED) is a theory that has contributed to risk assessment and security planning. CPTED asserts “that the environment can be protected, and crime prevented, through the proper design of facilities and communities” (Ortmeier, 2013, p.173). Safe and secure environmental designs are achieved through territorial reinforcement, access control, and surveillance. This can be accomplished in a variety of ways such as relocating gathering areas, developing safe activities in unsafe locations, creating natural barriers, and reducing the amount of isolation and distance in places. CPTED strategies have been successful when implemented with the collaboration of organizations, communities, community policing programs, and security agencies. Once an action plan is selected, the next step in security management is implementing and administering the program. Administration is conducted in the public and private spheres. Public administration is characterized by being public affairs oriented, impartial and fair, apolitical, public source service oriented, publicly funded and documented, accountable to the public, selectively staff, and how. In contrast private administration is characterized by being private enterprise oriented, private or corporate ownership, competitive, profit incentive-based, having its financing regulated by market price, private information and records, accountable to owners and stakeholders, exercising some freedom in selection and termination of employees, and free to regulate work methods and organizations. Regardless of the differences that exist between public and private administration there are principles of organization and management which, if followed, can result
  • 4. in the development of organized organizations. First, the organizational structure must be established. Oftentimes we see an organizational chart but do not realize the steps involved in the developmental process. Usually similar tasks are grouped together and specialized units or departments are only created when necessary. The demarcation of the lines represents responsibilities and channels of communication. The organizational structure is not just a picture. It also exemplifies the expectation of completion of tasks associated with assigned roles and the supervisory chain of command. Second, ethical leadership must be established. In the past it was believed that an integral part of the administration process or human resources was control. Researchers now argue that leadership should now be focused on allowing managers to use their own judgment, which should be grounded in ethics. Third, the organization must be staffed with qualified personnel. This involves workforce planning which outlines full-time equivalents, identifies job tasks and clearly specifies those expectations in the job description. In the background there should also be risk assessments and security surveys that identify when and where human resources will be required in an organization. The training and education of organizational personnel should also be considered during the workplace planning process. Personnel enter an organization at various entry levels, with various levels of education. Job descriptions and associated technologies are constantly changing necessitating the continued training and education of previously and newly hired employees. Fourth, equipment facilities and supplies must be both acquired and maintained. Ensuring that these resources are purchased at the best quality and maintained will enhance durability and longevity of required resources. Fifth, policies and procedures associated with the action plan must be developed. Policies and procedures should be clearly detailed and provide (uniform guidelines) for addressing various types of situations that will arise in the organization or agency.
  • 5. For example, policies can address topics and issues such as affirmative action, drug and alcohol abuse, ethics, firearms, general practices, human resources, Internet use, security, travel and entertainment, and workplace violence. For another example, procedures can address more specific topics and issues such as AIDS contact, bomb threats, civil process acceptance, clear desk, duress alarm, electronic mail protection, employee access control, guess security, hazardous identification, intranet protection, medical emergencies, office inspections, password protection, rape avoidance, substance abuse program audit, and telephone answering. Sixth, performance measures and quality assurance must be evaluated or assessed. Performance management is based on standards (tangible, numerical, and intangible) and can be measured through personal observation, written and oral reports, automatic recording systems, inspections, tests, and surveys. Quality assurance is more difficult to measure because quality improvement is continual and “total quality management (TQM) initiatives involve approaches to administration that attempt to maximize effectiveness of an organization through the continued improvement of the quality of its people, processes, products, and environment” (Ortmeier, 2013, p.198). In addition, TQM initiatives must be interwoven into all elements of an organization and such initiatives are unique to the organization. There is not a one-size-fits-all TQM strategy. Security personnel, like most humans, are often resistant to change. Thus, providing evidence of the benefits of TQM initiatives can often assist security personnel in accepting proposed changes. As a final caveat, organizational evaluation and assessment must be controlled by ethical managers. Organizations are shifting from the use of traditional financial and statistical indicators, which often resorted in data distortion, to the use of the nationally and internationally accepted Baldrige criteria for performance excellence. These criteria are based on a system
  • 6. perspective and contain validated measures with which an organization can measure its performance