• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7
  • Tagged with
  • 7
  • 7
  • 7
  • 7
  • 5
  • 5
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Employee Theft: The Relationship of Shrinkage Rates to Job Satisfaction, Store Security, and Employee Reliability

LaFosse, W. Greg 08 1900 (has links)
The correlation between employee theft and various employee attitudes is investigated with 489 subjects from a large discount store chain located in the southeastern United States. Subjects completed two tests: Personnel Decisions, Inc. 's Employment Inventory/Customer Service Inventory which measures employee reliability and orientation toward providing customer service; and the Organization Responsiveness Questionnaire which measures satisfaction and perceived store security. Individual scores on the tests were correlated with a performance rating form completed by the subject's supervisor. Scores were computed for each store and correlated with inventory shrinkage rates. Results revealed relatively weak correlations for some variables. The multiple regression analysis was unable to significantly predict any of the criterion variables.
2

The implementation of integrated security systems: case study of the industrial sector of Harare-Zimbabwe

Musonza, Dimax 02 1900 (has links)
Text in English / Industrial sites in Harare contribute significantly to the economy of Zimbabwe. Harare is the capital city of Zimbabwe and therefore has significant manufacturing and commercial activity. The protection of industrial sites is very important because of the presence of valuable assets and operations. Therefore the main purpose of deploying security measures at industry premises is to create a safe and secure environment for the business functions. Security management is consequently an important element of an industrial organisation’s continuity. The implementation of integrated security systems was examined to some extent within this study. The size and nature of industrial facilities influenced this study to view integrated security systems as more effective than stand-alone security measures. The study sought to investigate the various aspects associated with the implementation. The purposes of the research included the following: • Examine current practices, benefits, shortcomings in the implementation of integrated security systems; • Critically evaluate the security management aspects required for the implementation ofintegrated security systems; • Investigate successes and failures associated with integrated security systems and how implementation can be improved; • Examine and identify factors necessary for a best practice approach to integrated security systems; and • Determine a methodology for the effective implementation of integrated security systems. Additionally the study briefly examined how security systems integration can assist in reducing the problem of connivance to theft at receiving and dispatch points at industrial facilities. The report is divided into five chapters. Chapter 1 covers the research problem, Chapter 2 deals with the research methods while Chapter 3 has insightful information from literature review. Chapter 4 presents the data and how it was analysed. Lastly Chapter 5 has findings, recommendations and conclusions. The study used the mixed-method approach. This approach includes both qualitative and quantitative research in order to gain a more in-depth understanding of the research problem. The methods of data collection were site visits, interviews and questionnaires. The sample was drawn from a cross-section of sites within the industrial areas of Workington, Southerton, Willowvale, Graniteside, Msasa and few outside industries in the vicinity of Harare. A total of 11 sites were observed. The interviews consisted of 30 participants who were mainly security practitioners at management level as well as some non-security managers. In addition, a total of 102 respondents participated in this study by completing the questionnaire. The majority of the respondents were security practitioners who were the main focus of the study. The findings support the various aspects of the implementation of integrated security systems. The conclusions emanating from the statistical analysis of the collected data included the following: • The critical assets for protection at industrial facilities are infrastructure, products, revenue, people and other movable items or equipment; • The main threat sources are from outsiders, crime syndicates and employees; • Security systems suitable for integration are CCTV, electronic access control, alarms, personnel, policies and procedures backed by information communication technologies. • Security should be functionally integrated with other departments which include Information Technology, Human Resources, Finance, Operations and Marketing; • The preferred mode of linkage was established to be fibre optic on a local area or wide area network using intranet or internet; • The key players in the integration were found to be security practitioners, top management, IT specialist, system suppliers, installers and operators; • The implementation process consists of security policy, survey, system design, procurement, installation, training, operating, review and upgrade; • Factors necessary for best practice include system purpose, availability of resources, top management commitment, skills, and feasibility to implement; • The benefits are mainly improved effectiveness, easy of monitoring, improved outlook and record keeping; • The most significant challenges are system breakdown, sabotage and power outage; and • Connivance to theft can be mitigated by a combination of staff rotation, dedicated CCTV, spot checks, undercover surveillance and functional integration. area network using intranet or internet; • The key players in the integration were found to be security practitioners, top management, IT specialist, system suppliers, installers and operators; • The implementation process consists of security policy, survey, system design, procurement, installation, training, operating, review and upgrade; • Factors necessary for best practice include system purpose, availability of resources, top management commitment, skills, and feasibility to implement; • The benefits are mainly improved effectiveness, easy of monitoring, improved outlook and record keeping; • The most significant challenges are system breakdown, sabotage and power outage; and • Connivance to theft can be mitigated by a combination of staff rotation, dedicated CCTV, spot checks, undercover surveillance and functional integration. / Security Risk Management / M. Tech. (Security Management)
3

Safety as a priority at shopping centres in Gauteng: an assessment of existing security measures

Lutchminarain, Natasha 02 1900 (has links)
Text in English / Violent crime and more specifically armed robberies constitute a growing threat to shopping centres in terms of their vulnerability to such criminal acts. These violent crimes are becoming ever more organised and sophisticated. Shopping centres across South Africa have become the latest targets for these syndicates. Due to the increasing number of armed robberies and violent crimes at shopping centres and the nature of violence used in these attacks, it points to a need for improvements to be made to the security measures that are in place at shopping centres. This study explored the risks and vulnerabilities at shopping centres that have led to the phenomenon of armed robberies at shopping centres in Gauteng; evaluated the current physical protection systems that are in place at shopping centres in Gauteng in order to assist with the reduction of shopping centre armed robberies; and recommendations were made for the implementation of effective security risk control measures at shopping centre’s across South Africa and specifically the province of Gauteng. Self-administered questionnaire surveys were used to explore the phenomenon from the perspectives of both retail employees and customers. The data collected from the questionnaires, utilising the non-experimental research design, were quantitatively analysed. Based on the findings from the study recommendations for the improvement of shopping centre security were formulated along with recommendations for future research. / Security Risk Management / M.Tech. (Security Management)
4

Safety as a priority at shopping centres in Gauteng: an assessment of existing security measures

Lutchminarain, Natasha 02 1900 (has links)
Text in English / Violent crime and more specifically armed robberies constitute a growing threat to shopping centres in terms of their vulnerability to such criminal acts. These violent crimes are becoming ever more organised and sophisticated. Shopping centres across South Africa have become the latest targets for these syndicates. Due to the increasing number of armed robberies and violent crimes at shopping centres and the nature of violence used in these attacks, it points to a need for improvements to be made to the security measures that are in place at shopping centres. This study explored the risks and vulnerabilities at shopping centres that have led to the phenomenon of armed robberies at shopping centres in Gauteng; evaluated the current physical protection systems that are in place at shopping centres in Gauteng in order to assist with the reduction of shopping centre armed robberies; and recommendations were made for the implementation of effective security risk control measures at shopping centre’s across South Africa and specifically the province of Gauteng. Self-administered questionnaire surveys were used to explore the phenomenon from the perspectives of both retail employees and customers. The data collected from the questionnaires, utilising the non-experimental research design, were quantitatively analysed. Based on the findings from the study recommendations for the improvement of shopping centre security were formulated along with recommendations for future research. / Security Risk Management / M.Tech. (Security Management)
5

Safety and security of consumers at retail stores in the Gauteng province : an assesment of security measures

Mahambane, Misaveni Abel 27 July 2018 (has links)
Retail stores rely on consumers to maintain their businesses and growth. Much of their success depends on the safety and security of consumers. The more people come and buy the products, the more profitable the stores become. If the safety and security of consumers (or their perceptions thereof) at a shopping centre where a retail store is sited is in question, consumers may well stop frequenting such centres and do their shopping at other retail centres at which they perceive to be more safe and secure to do their shopping. Consumers’ ‘peace-of-mind’ plays a vital role in their selection of which retail store(s) to frequent and will often determine whether a repeat visit will occur. The extent of incidents of crime of whatever nature at a particular shopping centre will also impact negatively on shoppers’ perceptions of ‘how safe it is to shop’ at particular centres. Security measures differ from one retail store to another and also between the size and layout, as well as the location of the retail store. The rate at which criminal offences take place at retail stores is currently vague or unknown. Therefore, it is vital that specific risks confronting these retail stores should be identified and analysed with the intention of recommending specific security measures. Business crime and violence present significant threats to consumers’ safety and security in South Africa. High levels of business associated crimes have compelled communities and business bodies such as retail stores to provide their own security for the protection of their assets, as well as consumers. Effective security measures are a prerequisite at retail stores to ensure the safety and security of consumers whilst visiting retail stores. Precaution ought to be taken when dealing with any crime problem that affects consumers at any business environment, in this study more precisely: retail stores. The study explored the existing security measures at retail stores for the protection of consumers. The researcher employed qualitative methods: one-on-one interviews with participants and site observations at selected retail stores. There were 30 participants (20 consumers and 10 security officers). The study found the following:  Retail stores were exposed to security risks such as theft; shoplifting; common robbery; armed robbery; fraud; arson and assaults (grievous bodily harm) and burglary.  The security measures that are currently in place are not adequate to protect retail stores. These security measures differ from one retail store to the next.  In order to improve safety and security at retail stores there should be a security standard that is applicable to the retail stores. Based on the findings, some of the recommendations were as follows:  Retail stores should be protected in line with the level of risk of the area where the retail store is situated: low risk; medium risk; and high risk.  Security managers should conduct security awareness regularly.  Threat assessments should be conducted regularly as well.  Consumers are encouraged to report to the Security manager at the retail store any suspicious actions; persons; objects; and vehicles. / Criminology and Security Science / M. Tech. (Security Management)
6

Examining the unique security features of a credit card with the aim of identifying possible fraudulent use

Budhram, Trevor 09 1900 (has links)
The use of credit cards has become a way of life in many parts of the world. Credit cards have also created many new opportunities for criminal activity. It is in this light that organizations such as VISA International have explored a variety of security alternatives by constantly reviewing security measures that may be applied to cards and devote considerable resources to the maintenance of security systems and programmes. These programmes mandated by the association, include uniform card standards, security standards for manufactures, embossing and encoding of cards, standards for mailing the cards and credit background investigations of applicants. These standards assist investigators in examining counterfeit cards and distinguish a counterfeit card from a genuine card. The constant reviewing of security features and methods by the association is to create a card that is technically difficult to alter or counterfeit. / Criminology / M.Tech. (Forensic Investigation)
7

Examining the unique security features of a credit card with the aim of identifying possible fraudulent use

Budhram, Trevor 09 1900 (has links)
The use of credit cards has become a way of life in many parts of the world. Credit cards have also created many new opportunities for criminal activity. It is in this light that organizations such as VISA International have explored a variety of security alternatives by constantly reviewing security measures that may be applied to cards and devote considerable resources to the maintenance of security systems and programmes. These programmes mandated by the association, include uniform card standards, security standards for manufactures, embossing and encoding of cards, standards for mailing the cards and credit background investigations of applicants. These standards assist investigators in examining counterfeit cards and distinguish a counterfeit card from a genuine card. The constant reviewing of security features and methods by the association is to create a card that is technically difficult to alter or counterfeit. / Criminology and Security Science / M.Tech. (Forensic Investigation)

Page generated in 0.1126 seconds