• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 15
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 25
  • 25
  • 15
  • 13
  • 12
  • 11
  • 8
  • 7
  • 7
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Competitive Strategy Analyses for Security Industry - the case of China Steel Security Corp

Chen, Lien-Pao 09 September 2008 (has links)
ABSTRACT This research aims to understand the influence of work values on job efficiency through an investigation on the cognitive recognition of work values on private security guards. The main purpose of the research is to understand if personal variables will have a tremendous effect on job performance, and secondly to explore if work values are related to job performance. This text takes winning steel security company(CSS) as a case study target.Because it is 100% enterprises that the Chinese Steel Corp. invests, the steel female subsidiary is all to keep intact business in the catcher and have efficient scale in operating business. This text adoption observation method and interview investigate a method, the basis competition strategy model launches to become a questionnaire, and in person interview medium steel security company 18 members, carry on income data analysis research, and according to medium the steel keep intact object and advantage factor of strategy to carry on analysis, with the standpoint of SWOT"the model of the competitive advantage environment" by outside and inside analyze, with the standpoint of "the mode of the resource foundation" by inside and outside analyze, will analysis conclusion sorting explanation, keep intact an industry competition to provide measure to promote to organize the progress of the organization results. After halting Jing to withdraw from government operated unit, the security company stations in organizations, such as each state-owned company, bank and school...etc. and completely starts to undertake originally the Wei work of halting of public security police, close because of the ability and the police of the concert developed good effect and subsidized the shortage of police strength and stop a crime to contain notable contribution towards guarding against crime. Key words: Security industry, Strategy of Competition
2

The Study Based on Knowledge Management Strategies for Improving Service Quality ¡V The Case Study of C Company

Wu, Chih-ching 26 August 2005 (has links)
In this study, we research the relationships between knowledge management and service qualities. We try to found the concept and processes of applying knowledge management strategies to advance service qualities. The research is case study. The case company belongs to the service industry and is a local security company. The result of research shows that companies can apply knowledge management strategies to advance service qualities. Especially, the security or service industry offer product and service by ¡§people¡¨. They should apply knowledge management strategies more effectually. The companies can execute knowledge management eight-step of feedback system. They will create competitive advantage by advancing service qualities continually. Finally, we give case company and the security or service industry advice about advancing service qualities.
3

Cultural theory and the security fraternity

Kokt, Desere, Chadinha, Jos G. January 2005 (has links)
Published Article / There is an ongoing debate on the importance and meaning of organisational culture. Comprehending the prevailing organisational culture is crucial for organisations that need to change and/or launch new projects. This especially applies to the security industry which is constantly faced with new challenges in a national and international realm. This paper uses an anthropological approach to propose an organisational structure best suited for the private security industry. A major South African security company is analyzed in terms of the grid group (GG) or cultural theory. This framework originated in the study of anthropology, originally developed by the British anthropologist Mary Douglas (1970, 1978).
4

The team leader and cultural diversity

Kokt, Desere, Vermeulen, Werner January 2004 (has links)
Published Article / In a diverse working environment such as the South African situation, it is imperative that issues surrounding cultural diversity, and its impact on employees should be examined. This article reflects on a study conducted in the South African security industry, as one of the few industries that utilise diverse work teams as part of their operational success. The rational for using work teams will be explained, with an emphasis on the team leaders. The model of Eales-White (1996: 26) was applied to the development of the team member questionnaire, and the subsequent results will be reported.
5

Implementing Balance Scorecard - Using Security Surveillance Manufacturer as an Example

Ho, Wei-jie 16 January 2009 (has links)
Balanced scorecard is a management system, which can be used for implementing organized strategy. Balanced scorecard, originated in America in 1990, emphasizes four-dimension performance appraising should be measured by strategy and be linked to business compensation and reward system. Likewise, Balanced scorecard is not only a performance measurement system, but also a management system linking with the strategy planning and reward system. This research is positioned as a case study focusing on one stock-published company in Security Industry and trying to analyze industry environment. In this research, Balanced scorecard can be considered as strategy-base carrying out BSC model by interview and case study . The purposes are listed as below: 1. Using Balanced Scorecard system in Security Industry company 2. Planning Key Performance Index in Security Industry company. 3. Discussing the necessity for Security Industry and suggest future direction for case company and researchers.
6

Viljan att prestera : En kvalitativ studie om motivation i ett företag inom säkerhetsbranschen

Hellgren, Mikaela, Kadir, Rustam January 2020 (has links)
The purpose with this study has been to examine what motivates employees working in the security industry. Further, the aim has been to examine managers view on motivation within the same industry and find out how they work to motivate their employees. Finally, the study aimed to compare how employees and managers look at motivation and how they look at the way it is created, to see if they have the same opinions about the subject. Following research questions have been examined and answered: Which factors have the biggest impact on employees’ motivation within one company in the security industry? How do managers design the job in the security industry to create motivated employees? Do managers and employees within one company in the security industry have the same opinions about how motivation is created? The theoretical reference frame has consisted of the two classic theories Herzberg’s Two-Factor Theory and Hackman and Oldham’s Job Characteristics Model, and the more modern Self-Determination Theory. A qualitative research method in the form of semi structured interviews has been used to deeply investigate the topic. The results showed that the factor that had the biggest positive impact on the employees’ motivation was performance, linked to the wish to perform, but relationships, in terms of getting along with one’s colleges, was also associated with motivation. Performance was also the factor that could have the biggest negative impact on motivation, since the employees experienced themselves being the least motivated when they had not performed. Also, relationships, when these do not work out, and salary that does not live up to expectations could adversely affect motivation. Both of the interviewed managers thought it is important to find the right person for the job, where the personality matches the tasks. To create a motivating job, focus is being put-on well-made business plans and development plans, regular follow-ups, and distribution of tasks between groups to create variation. The managers were aware of that performance is an important factor for creating motivation. When it came to factors that have a negative impact on motivation, the managers had different thoughts than the employees, besides from that salary could matter.The managers did not know how their employees experience their own growth need, but they did know that their employees were generally satisfied with their jobs and with the work context. The results also showed that the employees had a more optimistic approach towards their jobs than their managers had, and all of the employees were both extrinsically and intrinsically motivated, in different forms and combinations.
7

An exploratory research : Fear and the need of security interplay as a business mechanism

Beltrán Alanis, Martha Alicia, Cruz Sánchez, Javier Arnulfo January 2011 (has links)
Background: Humanity builds and writes its history. Overtime the need of feeling secure has been present originated from an emotion, a condition and reaction: the fear of threats or danger. The impact of human fear over the humanity behaviour leads for searching ways of reducing such fear. Consequently, security companies have a potential opportunity for fulfilling this human need reducing the phenomenon of fear. Some organisations and companies discovered that human fear can be used as tool for influencing the individual behaviour and for consumption purposes. Aim: Developing a research and discussing some of the issues that concerns today‟s societies and business organisations as well as the managerial consequences arising by exploring the global fear and necessity of security trends as a critical issue for the decades to come. Therefore, the purpose of this study explores the extent to which companies can use human fear that an individual perceives as a potential strategy within the security industry to increase and expand their market. Definitions: When companies use fear in advertising influence human behaviour known in marketing as fear appeal. In this research, mass media does not use fear as a conscious way to manipulate or persuade human behaviour. However, the usage of fear messages in mass media has an impact on human fear perception. Then, there is evidence of a positive relationship between marketing fear appeal and mass media spreading information of threats, violence and crime. Both create fear on humans‟ perception but marketing in a direct conscious way and mass media in an indirect unconscious way, what we have identified and called „unacquainted-indirect fear appeal‟. Results: The findings in this exploratory thesis show a functional relationship between the phenomenon of fear and the phenomenon of the need of security which are persistent variables overtime. Therefore, it is possible for security companies to take advantage of this trend and to develop a potential strategy to increase and expand their market while taking into account that fear appeal needs a very specific treatment and testing along this process due to the several results that can be achieved from such a strategy. The results can vary depending on the circumstances of the individual and the environment not always controllable by the companies within business in a constant changing world.
8

”...det är så normaliserat med åren så det bryr man sig inte om. Man bara flinar åt det...” : En kvalitativ intervjustudie om hot och våld i arbetslivet inom bevakningsbranschen / “...it’s so normal over the years that you do not care. You just laugh about it...” : A qualitative interview study on threats and violence in working life in the security industry.

Axelsson, Ida, Höglund, Sofia January 2021 (has links)
Syftet med studien var att undersöka hur arbetstagare inom bevakningsbranschen i en storstadsregion i Sverige definierade hot och våld i arbetslivet, hur utsattheten och omfattningen såg ut samt hur det yrkesrelaterade våldet förebyggs och hur det kan utvecklas. Semistrukturella intervjuer har använts som analyserades genom tematisering. Studiens teoretiska utgångspunkter har varit hermeneutisk tillsammans med krav- och kontrollmodellen samt normaliseringsprocess. Resultatet visade att utsatthet för hot och våld var ett förekommande inslag i arbetet, där hot var mest frekvent. Orsaker till hot och våld som beskrevs hade både strukturell och situationell karaktär. Föreslagna åtgärder innefattar dels ökat stöd från ledning men även mer specifika åtgärder som OC-spray och utbildning. Sammanfattningsvis visade studien att anmälningsbenägenheten var låg då hoten och våldet normaliseras genom normaliseringsprocesser där de anställda tenderade att socialiseras i en kultur med förväntningar om att tåla förekomsten av hot och våld. / The purpose of this study was to investigate how workers in the security industry in a metropolitan region in Sweden defined workplace violence and threats, how the vulnerability and extent looked like, how workplace violence is prevented and how it can be developed. Semistructural interviews have been used which have been analyzed through thematization. The study's theoretical ground has been hermeneutic together with the demand and control model and the normalizationprocess. The results showed that exposure to threats and violence was a common feature of the work, where threats were most frequent. Causes of threats and violence were both structural and situational. Proposed preventions include increased support from management but also more specific measures such as OC-spray and education. In summary, the study showed that the propensity to report was low as threats and violence are normalized through normalizationprocesses and employees tended to be socialized in a culture with expectations of tolerating threats and violence.
9

Strategic location modelling for reaction vehicles of the private security industry in South Africa

Kellerman, Rikus 08 1900 (has links)
Since the early 1960s location problems have been used throughout various industries and in various countries. During recent years the field of location problems has become increasingly popular due to the fact that it is applicable in real life situations – especially in emergency services such as hospital, police station and ambulance locations to name a few. Despite the fact that location problems are so widely used with great success, it is still not being used to full potential in industries where it can have a major impact. One of these industries is the private security industry in South Africa. This dissertation addresses various mathematical models that can assist the management of privately owned security companies to determine strategic locations for their reaction vehicles, these locations will increase both resource utilization and improve the level of service they provide to customers. These models are used in different scenarios to see how the models adapt to input changes. / Dissertation (MSc)--University of Pretoria, 2014. / Industrial and Systems Engineering / MSc / Restricted
10

網格運算在證券業之應用研究 / The Application Study of Grid Computing on Security Industry

劉繕源, Liu,Shan- Yuan Unknown Date (has links)
證券市場商品種類、參與者及交易方式既多且複雜,在實際交易中,常形成系統尖峰負載,但硬體設備往往無法適時進行調配。本研究利用網格計算技術,提供一個在商業環境中可行及可用性的驗證。 驗證程序,首先建構網格計算環境,再者進行驗證項目測試,最後結論與建議。步驟先採IBM公司所提供中介軟體(Middleware)- IBM Grid ToolBox V3-進行測試,惟系統因軟、硬體版本問題無法安裝成功;再採用另一中介軟體-IBM WebSphere Extend(WebSphere XD)-多次調整軟、硬體版本後,建構完成測試環境。為測試不同廠牌之硬體是否可以在相同之網格環境中正常運作,分別採用IBM及HP各四部刀鋒伺服器為硬體架構。本研究測試驗證項目共計兩項,第一項測試網格技算解決硬體調配問題;第二項測試網格計算解決交易尖峰負載量問題。經測試驗證,第一項部份,分別以手動及自動之動態調整測試,WXD系統確實可依服務負載來動態調整可用Node來服務,亦即,網格技術可用來解決硬體調配問題。第二項部份,經模擬進行需長時間計算之批次工作(Batch Job),觀察是否由多部主機同時分工運算完成整個計算工作,WXD系統確實可在系統部份Node失效後,其他Node仍可保持其服務之水準,與一般網路Load Balance設計,盲目的將服務負載導向存在之伺服器,在部份硬體失效後,可能會導致整體系統當掉之情形,驗證網格技術是較符合企業實務運作之要求。 / There are a lot of complicated type of merchandize, investors and trading methods on security market. It is often the prime cause of transaction peak load and hardware resource allocation problem. This research utilizes grid computing technology to offer a feasible and usable verification in business environment. The verification procedure, at first, build and construct the grid computing environment; moreover, the project is tested and conclusion and suggestion is made, finally. The step adopts IBM middleware, IBM Grid ToolBox V3, first. The system is unable to install successfully because of the edition question of the software and hardware. And then adopt another IBM middleware, IBM WebSphere Extend (WebSphere XD). After adjusting the software and hardware edition many times, we build and construct the testing environment. In order to test the different factories hardware that can normal operate in the same grid computing environment, this study adopts four server of IBM and HP respectively. There are two test items in this research. The first test wants to solve the allocation problem of hardware. The second test wants to solve the problem of transaction peak load. The first part, test with manual and automatic dynamic adjustment separately. We find WXD system can adjust idle Node dynamically in accordance with serve load. The second part, the test uses batch job which need to calculate for a long time and observe whether the whole calculation can finish by dividing the work operation for many host computers at the same time. We also prove that WXD system can really keep the level of its service while some Node systems lose efficiency. In a word, according to the traditional Load Balance design, system will lead its peak load to other server after some hardwares lose its efficiency, but it may cause the whole system to shot down. From this study, we prove that grid computing technology is comparatively conforms to the requirement of enterprise's practice operation.

Page generated in 0.044 seconds