Return to search

The implementation of integrated security systems: case study of the industrial sector of Harare-Zimbabwe

Text in English / Industrial sites in Harare contribute significantly to the economy of Zimbabwe. Harare is the capital city of Zimbabwe and therefore has significant manufacturing and commercial activity. The protection of industrial sites is very important because of the presence of valuable assets and operations. Therefore the main purpose of deploying security measures at industry premises is to create a safe and secure environment for the business functions. Security management is consequently an important element of an industrial organisation’s continuity.
The implementation of integrated security systems was examined to some extent within this study. The size and nature of industrial facilities influenced this study to view integrated security systems as more effective than stand-alone security measures. The study sought to investigate the various aspects associated with the implementation. The purposes of the research included the following:
• Examine current practices, benefits, shortcomings in the implementation of integrated security systems;
• Critically evaluate the security management aspects required for the implementation ofintegrated security systems;
• Investigate successes and failures associated with integrated security systems and how implementation can be improved;
• Examine and identify factors necessary for a best practice approach to integrated security systems; and
• Determine a methodology for the effective implementation of integrated security systems.
Additionally the study briefly examined how security systems integration can assist in reducing the problem of connivance to theft at receiving and dispatch points at industrial facilities.
The report is divided into five chapters. Chapter 1 covers the research problem, Chapter 2 deals with the research methods while Chapter 3 has insightful information from literature review. Chapter 4 presents the data and how it was analysed. Lastly Chapter 5 has findings, recommendations and conclusions.
The study used the mixed-method approach. This approach includes both qualitative and quantitative research in order to gain a more in-depth understanding of the research problem. The methods of data collection were site visits, interviews and questionnaires. The sample was drawn from a cross-section of sites within the industrial areas of Workington, Southerton, Willowvale, Graniteside, Msasa and few outside industries in the vicinity of Harare. A total of 11 sites were observed. The interviews consisted of 30 participants who were mainly security practitioners at management level as well as some non-security managers. In addition, a total of 102 respondents participated in this study by completing the questionnaire. The majority of the respondents were security practitioners who were the main focus of the study.
The findings support the various aspects of the implementation of integrated security systems. The conclusions emanating from the statistical analysis of the collected data included the following:
• The critical assets for protection at industrial facilities are infrastructure, products, revenue, people and other movable items or equipment;
• The main threat sources are from outsiders, crime syndicates and employees;
• Security systems suitable for integration are CCTV, electronic access control, alarms, personnel, policies and procedures backed by information communication technologies.
• Security should be functionally integrated with other departments which include Information Technology, Human Resources, Finance, Operations and Marketing;
• The preferred mode of linkage was established to be fibre optic on a local area or wide area network using intranet or internet;
• The key players in the integration were found to be security practitioners, top management, IT specialist, system suppliers, installers and operators;
• The implementation process consists of security policy, survey, system design, procurement, installation, training, operating, review and upgrade;
• Factors necessary for best practice include system purpose, availability of resources, top management commitment, skills, and feasibility to implement;
• The benefits are mainly improved effectiveness, easy of monitoring, improved outlook and record keeping;
• The most significant challenges are system breakdown, sabotage and power outage; and
• Connivance to theft can be mitigated by a combination of staff rotation, dedicated CCTV, spot checks, undercover surveillance and functional integration.
area network using intranet or internet;
• The key players in the integration were found to be security practitioners, top management, IT specialist, system suppliers, installers and operators;
• The implementation process consists of security policy, survey, system design, procurement, installation, training, operating, review and upgrade;
• Factors necessary for best practice include system purpose, availability of resources, top management commitment, skills, and feasibility to implement;
• The benefits are mainly improved effectiveness, easy of monitoring, improved outlook and record keeping;
• The most significant challenges are system breakdown, sabotage and power outage; and
• Connivance to theft can be mitigated by a combination of staff rotation, dedicated CCTV, spot checks, undercover surveillance and functional integration. / Security Risk Management / M. Tech. (Security Management)

Identiferoai:union.ndltd.org:netd.ac.za/oai:union.ndltd.org:unisa/oai:uir.unisa.ac.za:10500/21012
Date02 1900
CreatorsMusonza, Dimax
ContributorsKole, Olaotse John
Source SetsSouth African National ETD Portal
LanguageEnglish
Detected LanguageEnglish
TypeDissertation
Format1 online resource (xv, 169 leaves) : illustrations

Page generated in 0.0027 seconds