• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 20
  • 20
  • 13
  • 11
  • 11
  • 10
  • 7
  • 6
  • 6
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Cultural theory and the security fraternity

Kokt, Desere, Chadinha, Jos G. January 2005 (has links)
Published Article / There is an ongoing debate on the importance and meaning of organisational culture. Comprehending the prevailing organisational culture is crucial for organisations that need to change and/or launch new projects. This especially applies to the security industry which is constantly faced with new challenges in a national and international realm. This paper uses an anthropological approach to propose an organisational structure best suited for the private security industry. A major South African security company is analyzed in terms of the grid group (GG) or cultural theory. This framework originated in the study of anthropology, originally developed by the British anthropologist Mary Douglas (1970, 1978).
2

The team leader and cultural diversity

Kokt, Desere, Vermeulen, Werner January 2004 (has links)
Published Article / In a diverse working environment such as the South African situation, it is imperative that issues surrounding cultural diversity, and its impact on employees should be examined. This article reflects on a study conducted in the South African security industry, as one of the few industries that utilise diverse work teams as part of their operational success. The rational for using work teams will be explained, with an emphasis on the team leaders. The model of Eales-White (1996: 26) was applied to the development of the team member questionnaire, and the subsequent results will be reported.
3

Implementing Balance Scorecard - Using Security Surveillance Manufacturer as an Example

Ho, Wei-jie 16 January 2009 (has links)
Balanced scorecard is a management system, which can be used for implementing organized strategy. Balanced scorecard, originated in America in 1990, emphasizes four-dimension performance appraising should be measured by strategy and be linked to business compensation and reward system. Likewise, Balanced scorecard is not only a performance measurement system, but also a management system linking with the strategy planning and reward system. This research is positioned as a case study focusing on one stock-published company in Security Industry and trying to analyze industry environment. In this research, Balanced scorecard can be considered as strategy-base carrying out BSC model by interview and case study . The purposes are listed as below: 1. Using Balanced Scorecard system in Security Industry company 2. Planning Key Performance Index in Security Industry company. 3. Discussing the necessity for Security Industry and suggest future direction for case company and researchers.
4

Viljan att prestera : En kvalitativ studie om motivation i ett företag inom säkerhetsbranschen

Hellgren, Mikaela, Kadir, Rustam January 2020 (has links)
The purpose with this study has been to examine what motivates employees working in the security industry. Further, the aim has been to examine managers view on motivation within the same industry and find out how they work to motivate their employees. Finally, the study aimed to compare how employees and managers look at motivation and how they look at the way it is created, to see if they have the same opinions about the subject. Following research questions have been examined and answered: Which factors have the biggest impact on employees’ motivation within one company in the security industry? How do managers design the job in the security industry to create motivated employees? Do managers and employees within one company in the security industry have the same opinions about how motivation is created? The theoretical reference frame has consisted of the two classic theories Herzberg’s Two-Factor Theory and Hackman and Oldham’s Job Characteristics Model, and the more modern Self-Determination Theory. A qualitative research method in the form of semi structured interviews has been used to deeply investigate the topic. The results showed that the factor that had the biggest positive impact on the employees’ motivation was performance, linked to the wish to perform, but relationships, in terms of getting along with one’s colleges, was also associated with motivation. Performance was also the factor that could have the biggest negative impact on motivation, since the employees experienced themselves being the least motivated when they had not performed. Also, relationships, when these do not work out, and salary that does not live up to expectations could adversely affect motivation. Both of the interviewed managers thought it is important to find the right person for the job, where the personality matches the tasks. To create a motivating job, focus is being put-on well-made business plans and development plans, regular follow-ups, and distribution of tasks between groups to create variation. The managers were aware of that performance is an important factor for creating motivation. When it came to factors that have a negative impact on motivation, the managers had different thoughts than the employees, besides from that salary could matter.The managers did not know how their employees experience their own growth need, but they did know that their employees were generally satisfied with their jobs and with the work context. The results also showed that the employees had a more optimistic approach towards their jobs than their managers had, and all of the employees were both extrinsically and intrinsically motivated, in different forms and combinations.
5

An exploratory research : Fear and the need of security interplay as a business mechanism

Beltrán Alanis, Martha Alicia, Cruz Sánchez, Javier Arnulfo January 2011 (has links)
Background: Humanity builds and writes its history. Overtime the need of feeling secure has been present originated from an emotion, a condition and reaction: the fear of threats or danger. The impact of human fear over the humanity behaviour leads for searching ways of reducing such fear. Consequently, security companies have a potential opportunity for fulfilling this human need reducing the phenomenon of fear. Some organisations and companies discovered that human fear can be used as tool for influencing the individual behaviour and for consumption purposes. Aim: Developing a research and discussing some of the issues that concerns today‟s societies and business organisations as well as the managerial consequences arising by exploring the global fear and necessity of security trends as a critical issue for the decades to come. Therefore, the purpose of this study explores the extent to which companies can use human fear that an individual perceives as a potential strategy within the security industry to increase and expand their market. Definitions: When companies use fear in advertising influence human behaviour known in marketing as fear appeal. In this research, mass media does not use fear as a conscious way to manipulate or persuade human behaviour. However, the usage of fear messages in mass media has an impact on human fear perception. Then, there is evidence of a positive relationship between marketing fear appeal and mass media spreading information of threats, violence and crime. Both create fear on humans‟ perception but marketing in a direct conscious way and mass media in an indirect unconscious way, what we have identified and called „unacquainted-indirect fear appeal‟. Results: The findings in this exploratory thesis show a functional relationship between the phenomenon of fear and the phenomenon of the need of security which are persistent variables overtime. Therefore, it is possible for security companies to take advantage of this trend and to develop a potential strategy to increase and expand their market while taking into account that fear appeal needs a very specific treatment and testing along this process due to the several results that can be achieved from such a strategy. The results can vary depending on the circumstances of the individual and the environment not always controllable by the companies within business in a constant changing world.
6

”...det är så normaliserat med åren så det bryr man sig inte om. Man bara flinar åt det...” : En kvalitativ intervjustudie om hot och våld i arbetslivet inom bevakningsbranschen / “...it’s so normal over the years that you do not care. You just laugh about it...” : A qualitative interview study on threats and violence in working life in the security industry.

Axelsson, Ida, Höglund, Sofia January 2021 (has links)
Syftet med studien var att undersöka hur arbetstagare inom bevakningsbranschen i en storstadsregion i Sverige definierade hot och våld i arbetslivet, hur utsattheten och omfattningen såg ut samt hur det yrkesrelaterade våldet förebyggs och hur det kan utvecklas. Semistrukturella intervjuer har använts som analyserades genom tematisering. Studiens teoretiska utgångspunkter har varit hermeneutisk tillsammans med krav- och kontrollmodellen samt normaliseringsprocess. Resultatet visade att utsatthet för hot och våld var ett förekommande inslag i arbetet, där hot var mest frekvent. Orsaker till hot och våld som beskrevs hade både strukturell och situationell karaktär. Föreslagna åtgärder innefattar dels ökat stöd från ledning men även mer specifika åtgärder som OC-spray och utbildning. Sammanfattningsvis visade studien att anmälningsbenägenheten var låg då hoten och våldet normaliseras genom normaliseringsprocesser där de anställda tenderade att socialiseras i en kultur med förväntningar om att tåla förekomsten av hot och våld. / The purpose of this study was to investigate how workers in the security industry in a metropolitan region in Sweden defined workplace violence and threats, how the vulnerability and extent looked like, how workplace violence is prevented and how it can be developed. Semistructural interviews have been used which have been analyzed through thematization. The study's theoretical ground has been hermeneutic together with the demand and control model and the normalizationprocess. The results showed that exposure to threats and violence was a common feature of the work, where threats were most frequent. Causes of threats and violence were both structural and situational. Proposed preventions include increased support from management but also more specific measures such as OC-spray and education. In summary, the study showed that the propensity to report was low as threats and violence are normalized through normalizationprocesses and employees tended to be socialized in a culture with expectations of tolerating threats and violence.
7

Strategic location modelling for reaction vehicles of the private security industry in South Africa

Kellerman, Rikus 08 1900 (has links)
Since the early 1960s location problems have been used throughout various industries and in various countries. During recent years the field of location problems has become increasingly popular due to the fact that it is applicable in real life situations – especially in emergency services such as hospital, police station and ambulance locations to name a few. Despite the fact that location problems are so widely used with great success, it is still not being used to full potential in industries where it can have a major impact. One of these industries is the private security industry in South Africa. This dissertation addresses various mathematical models that can assist the management of privately owned security companies to determine strategic locations for their reaction vehicles, these locations will increase both resource utilization and improve the level of service they provide to customers. These models are used in different scenarios to see how the models adapt to input changes. / Dissertation (MSc)--University of Pretoria, 2014. / Industrial and Systems Engineering / MSc / Restricted
8

網格運算在證券業之應用研究 / The Application Study of Grid Computing on Security Industry

劉繕源, Liu,Shan- Yuan Unknown Date (has links)
證券市場商品種類、參與者及交易方式既多且複雜,在實際交易中,常形成系統尖峰負載,但硬體設備往往無法適時進行調配。本研究利用網格計算技術,提供一個在商業環境中可行及可用性的驗證。 驗證程序,首先建構網格計算環境,再者進行驗證項目測試,最後結論與建議。步驟先採IBM公司所提供中介軟體(Middleware)- IBM Grid ToolBox V3-進行測試,惟系統因軟、硬體版本問題無法安裝成功;再採用另一中介軟體-IBM WebSphere Extend(WebSphere XD)-多次調整軟、硬體版本後,建構完成測試環境。為測試不同廠牌之硬體是否可以在相同之網格環境中正常運作,分別採用IBM及HP各四部刀鋒伺服器為硬體架構。本研究測試驗證項目共計兩項,第一項測試網格技算解決硬體調配問題;第二項測試網格計算解決交易尖峰負載量問題。經測試驗證,第一項部份,分別以手動及自動之動態調整測試,WXD系統確實可依服務負載來動態調整可用Node來服務,亦即,網格技術可用來解決硬體調配問題。第二項部份,經模擬進行需長時間計算之批次工作(Batch Job),觀察是否由多部主機同時分工運算完成整個計算工作,WXD系統確實可在系統部份Node失效後,其他Node仍可保持其服務之水準,與一般網路Load Balance設計,盲目的將服務負載導向存在之伺服器,在部份硬體失效後,可能會導致整體系統當掉之情形,驗證網格技術是較符合企業實務運作之要求。 / There are a lot of complicated type of merchandize, investors and trading methods on security market. It is often the prime cause of transaction peak load and hardware resource allocation problem. This research utilizes grid computing technology to offer a feasible and usable verification in business environment. The verification procedure, at first, build and construct the grid computing environment; moreover, the project is tested and conclusion and suggestion is made, finally. The step adopts IBM middleware, IBM Grid ToolBox V3, first. The system is unable to install successfully because of the edition question of the software and hardware. And then adopt another IBM middleware, IBM WebSphere Extend (WebSphere XD). After adjusting the software and hardware edition many times, we build and construct the testing environment. In order to test the different factories hardware that can normal operate in the same grid computing environment, this study adopts four server of IBM and HP respectively. There are two test items in this research. The first test wants to solve the allocation problem of hardware. The second test wants to solve the problem of transaction peak load. The first part, test with manual and automatic dynamic adjustment separately. We find WXD system can adjust idle Node dynamically in accordance with serve load. The second part, the test uses batch job which need to calculate for a long time and observe whether the whole calculation can finish by dividing the work operation for many host computers at the same time. We also prove that WXD system can really keep the level of its service while some Node systems lose efficiency. In a word, according to the traditional Load Balance design, system will lead its peak load to other server after some hardwares lose its efficiency, but it may cause the whole system to shot down. From this study, we prove that grid computing technology is comparatively conforms to the requirement of enterprise's practice operation.
9

The growth and regulation of the private security industry in India and South Africa

Pillay, Krisandren 01 1900 (has links)
The lack of scientific research covering the factors contributing to the growth and regulation of the private security industry (PSI) in India and South Africa gave rise to the study. The study used qualitative research methods, a case study design and documentary analysis techniques, including personal interviews supported by a qualitative questionnaire and e-mailing the questionnaires to participants, to achieve the purpose and objectives of the study. The researcher interviewed seven participants from India personally and eight responded to the qualitative questionnaire sent by e-mail. The researcher conducted eight one-on-one interviews with South African participants and eleven members responded to the qualitative questionnaire sent by e-mail. The researcher carried out a pilot study to identify any shortcomings in the qualitative questionnaire. The study examined various theories on regulations and regulatory frameworks and considered the theoretical aspects of regulating the private security industry. This study confirmed that private security is growing at a rapid pace in India and South Africa, and the common factors encouraging growth include socio-economic factors like rapid growth and infrastructure, increasing urbanisation, growth of the middle class, poverty and unemployment, illegal immigration, growth in private property and increase in personal wealth. Indian participants especially, felt strongly that an increase in terror attacks is a key factor contributing to the rapid growth of the PSI, whilst South African participants confirmed, a fear of political violence and being scared of civil unrest were reasons for the increased presence of the PSI in the country. The participants corroborated that statutory-based legislation imposed by the Private Security Agencies (Regulation) Act 2005 and the Private Security Industry Regulation Act 2001 is not wholly effective in regulating the PSI in India. / Ukusweleka kocwaningo lwesisayense olwengamela izinto ezinomthelela ekukhuleni kanye nemitheshwana yolawulo kwimboni yonogada bezokuvikeleka yangasese i-private security industry (PSI) eNdiya naseNingizimu Afrika kwenze ukuthi kube nalolu cwaningo. Ucwaningo lusebenzise izindlela ze-qualitative research methods, i-case study kanye nethekniki yohlaziyo lwamadokhumende, okubandakanya nama-interview nabantu ziqu, ngokusekelwa wuhla lwemibuzo ebhaliwe ye-qualitative kanye nohla lwemibuzo ebhaliwe (questionnaires) ethunyelwe nge-email kulabo ababambe iqhaza, ukufezekisa izinhloso nezinjongo zocwaningo. Umcwaningi wenze ama-interview nababambi qhaza abayisikhombisa ziqu baseNdiya kanti abayisishagalombili baphendule imibuzo yohla ebhaliwe ye-qualitative oluthunyelwe nge-email. Umcwaningi ubuye waba nama-interview okubhekana ubusu nobuso nababambi qhaza baseNingizimu Afrika abayisishagalombili, kwathi abayishumi nanye baphendula uhla lwemibuzo ebhaliwe ye-qualitative ethunyelwe nge-email. Kwenziwe ucwaningo lokulinga (pilot study) ukubheka ukuntengantenga kohla lwemibuzo ebhaliwe ye-qualitative. Lolu cwaningo luhlole amathiyori ahlukahlukene ngokwenziwa kwemithetho yolawulo kanye nohlaka lwemitheshwana yolawulo, kanye nokubonelela izingxenye zethiyori yemitheshwana yolawulo lwemboni yonogada bezokuvikeleka yangasese. Ucwaningo luqinisekise ukuthi imboni yonogada bangasese bezokuvikeleka ikhula ngokuyisimanga eNdiya kanye naseNingizimu Afrika, kanti okuyixhumanisayo nokufanayo, kubandakanya ukukhula kwezinto eziphathelene nabantu nezomnotho njengokukhula ngesivinini kwezingqalasizinda, ukuya kakhulu kwabantu ezindaweni zamadolobha, ukukhula kwe-middle class, inhlupheko nokusweleka kwemisebenzi, ukungena kakhulu kwabantu ababuya kwezinye izindawo ngokungemthetho (illegal migration), ukukhula kwempahla yangasese kanye nokwanda kokunotha kubantu. Ababambi qhaza baseNdiya bona banemizwa eqinile yokuthi uhlaselo lwamaphekulazikhuni (terror attacks) yinto enomthelela kakhulu ukukhuleni kwemboni ye-PSI. Ababambi qhaza baseNingizimu Afrika bona baqinise ukwesaba udlame lwezepolitiki kanye nokwesaba izivungu-vungu zovukelwano lwabantu, yikho okube yizizathu zokukhula kobukhona be-PSI ezweni. Ababambi qhaza baqinise ukuthi imithetho efakelwe ye-Private Security Agencies (Regulation) Act 2005 kanye nomthetho we-Private Security Industry Regulation Act 2001 ayisebenzi ngokufanele ukulawula kahle imboni ye-PSI eNdiya. / Esi sifundo sibe ngunozala wokunqongophala kophando lobunzululwazi malunga nezinto ezincedisa ekukhuleni nasekulawulweni korhwebo lokhuselo lwabucala, iprivate security industry (PSI), kwilizwe laseIndia naseMzantsi Afrika. Isifundo sisebenzise indlela yophando lomgangatho, uyilo lwenkqubo engumzekelo, uhlalutyo lwemibhalo, udliwano ndlebe lobuso ngobuso nabantu ngabantu, oku kuxhaswa luluhlu lwemibuzo olubhaliweyo noluthunyelwe kubathathi nxaxheba ngeimeyile ukuze kuphunyezwe iinjongo zesi sifundo. Umphandi udlane indlebe nabathathi nxaxheba abasixhenxe abavela eIndia kanti abasibhozo baphendule uluhlu lwemibuzo yomgangatho kwi-imeyile. Umphandi uqhube udliwano ndlebe ubuso ngobuso nabathathi nxaxheba abasibhozo eMzantsi Afrika kanti abalishumi elinanye bona baphendule uluhlu lwemibuzo yomgangatho kwi-imeyile. Kwaqhutywa isifundo sokutshayelela ngenjongo yokuqonda ukuba akukho zikhwasilima na kuluhlu lwemibuzo yomgangatho. Isifundo siphonononge iingcingane okanye iithiyori ezingemigaqo nezakhelo zemigaqo yolawulo kwaza kwaqatshelwa imiba yeengcingane emalunga nokulawulwa norhwebo lokhuseleko lwabucala. Esi sifundo singqine ukuba ukhuselo lwabucala lukhula ngesantya esikhawulezayo eIndia naseMzantsi Afrika, kwaye izinto ezikhuthaza oku kukhula ziquka imiba yezentlalo noqoqosho njengokwanda okukhawulezayo nezibonelelo, ukwanda kweendlela zokuphila budolophu, ukukhula kwezinga loluntu eliphakathi (middle class), ubuhlwempu nentswela ngqesho, ukufudukela kwamanye amazwe ngokungekho mthethweni, ukwanda kokufumaneka komhlaba wabucala nokwanda kobutyebi babantu. Abathathi nxaxheba baseIndia bathi bacinga ukuba ukwanda kohlaselo ngabagrogrisi kuphambili ekuncediseni ukukhula korhwebo lokhuselo lwabucala. AbaseMzantsi Afrika bona bangqina ukuba uloyiko lobundlobogela bezopolitiko nokoyika uvukelo mbuso zizizathu zokwanda kobukho borhwebo lokhuselo lwabucala kweli lizwe. Abathathi nxaxheba bavuma ukuba imigaqo esekelwe emthethweni nebethelelwa nguMthetho Wokhuselo Lwabucala wama-2005, iPrivate Security Agencies (Regulation) Act 2005 kunye nePrivate Security Industry Regulation Act 2001 ayisebenzi ngokufezekileyo ekulawuleni urhwebo lokhuselo lwabucala eIndia. / Criminology and Security Science / Ph. D. (Criminal Justice)
10

台灣地區保全業風險管理暨保險相關問題之研究

楊重正, Yang, Chung-Chang Unknown Date (has links)
企業之興衰可概分為導入期、成長期、成熟期、衰退期。本研究發現,台灣地區保全業目前處於「成熟期」。隨著微利時代之來臨,保全之傳統服務業勢必將面臨極大之挑戰,若無長遠規劃及有效興革,日後將被跨國性大保全公司所併購之可能,最後從而步入「衰退期」。因此,保全業必須重視研發與管理,方能因應市場之快速變遷與挑戰。 由於社會大眾對保全業之運作缺乏正確觀念,總以為安排保全後即無須另行安排保險保障,因此時常有保障缺漏之產生。就現況而言,保全業者素質良莠不齊,常因業務競爭而忽視風險管理之重要性,且普遍未能落實損害防阻之工作,造成保全重大事故時有所聞,甚至引發社會各界之非難與抨擊。再者,法令要求保全業必須利用保險以分散風險。然而因為認知上之差距,時常發生理賠責任界定之糾紛,造成消費者不諒解、保險業不願繼續承保之困窘,影響保全業之形象與聲譽甚鉅。 本研究主要探討台灣地區保全業風險管理與保險之相關問題,架構上係以風險管理原理為基礎,輔以實務運作現況,以求有系統地分析保全業經營管理之相關風險,並藉此歸納保全業風險管理之核心原則。其次,本研究亦針對保全業運用產物保險(保全業責任保險、銀行業綜合保險、員工誠實信用保證保險)時所衍生紛爭,以案例研究方式解析其爭議所在,期能界定消費者、保全業、保險業三方之權利義務關係。最後,根據發現與結論,本研究提出若干建議供相關單位參考,期能全面提升保全業風險管理與保險運用之水平。 / In terms of the life cycle, an enterprise may experience the following stages: introduction stage, growth stage, maturity stage and decline stage. It is observed that the security industry in Taiwan is currently situated in the maturity stage. Due to severe market competition and narrow margin of profits, the security industry is forced to meet the magnificent challenge, locally or internationally. Without a long-term planning and efficient reform, it is likely to see many security companies merged by multi-national security companies in the future. Under such a scenario, the security industry in Taiwan will eventually step into the decline stage. Misunderstanding the operation of security industry, many people ignore the necessity of insurance coverage after security protection is arranged. It leads to the leakage in protection and coverage. In practice, many security companies also take less care of risk management and loss prevention due to business competition. In addition, a security company is required to transfer its risks through insurance. Because of the perceptional gap, many claim disputes arise among the security industry, the insurance industry and the clients. Under such circumstances, all of the above have deteriorated the reputation of security industry and result in many criticisms from the general public. The main theme of this research is to explore the issues related to risk management and insurance of the security industry in Taiwan. Based on the fundamental theories of risk management and market practices, the relevant risks are systematically analyzed and core risk management principles for the industry are developed. In addition, it undertakes several case studies to examine the controversial issues of certain insurance products often associated with the security business. It is hoped to clarify these issues and define the rights and obligations among different players. In the final part, the conclusion and recommendation is submitted to relevant institutions to upgrade and enhance the risk management and insurance arrangement of the security industry.

Page generated in 0.0699 seconds