Search results

1 – 10 of over 31000
Article
Publication date: 19 August 2009

Mahesh K. Nalla, Joseph D. Johnson and Gorazd Meško

The purpose of this paper is to examine the nature of police‐security relationships in three different continents that are unique in their economic, political, and social culture…

Abstract

Purpose

The purpose of this paper is to examine the nature of police‐security relationships in three different continents that are unique in their economic, political, and social culture. These countries include a developed economy (USA), an emerging economy (South Korea), and a transitional economy (Slovenia). More specifically, it compares the views that private and public police personnel in a diverse set of countries hold about one another on various issues relating to their working relationships and their efforts to improve them.

Design/methodology/approach

Data for the paper came from 1,158 police and security officers from the USA, South Korea, and Slovenia. All three studies employed survey methodology. The English language instruments are translated into the Korean and Slovenian languages and both instruments are back translated from the respective languages into English to check for validity.

Findings

While the findings for all the three countries vary in terms of the degree of personnels' positive attitudes toward one another, the overall levels of support from security professionals toward police officers appear positive in all the three countries. Among the police, personnel from the USA relative to other countries appear to have the most progressive and accepting attitude toward security personnel's role as partners. The varying degree of differences between South Korea and Slovenia may be a reflection of the centralized police structures, cultural and historical characteristics, and variations in the levels of economic liberalization policies. Findings suggest that in all the three countries security personnel are trying to reach out to the police to play their part in community policing compared to the police reaching out to the private sector.

Research limitations/implications

There is a time lag in data collection (seven‐year period) as the data for this paper were not collected at one point in time in these countries. Despite this limitation, the use of many identical questions in surveys in all the three countries offers an opportunity for this comparative research.

Originality/value

Most research on police officers' job satisfaction has been done in relation to individual factors while ignoring the role of organizational culture and environmental factors. Further, this setting offers an opportunity to test if democratization of police organizations influences job satisfaction.

Details

Policing: An International Journal of Police Strategies & Management, vol. 32 no. 3
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 1 July 2006

Mahesh K. Nalla and Eui‐Gab Hwang

The purpose of this study is to investigate the nature of the working relationship between police officers and private security officers in South Korea. More specifically, this…

1699

Abstract

Purpose

The purpose of this study is to investigate the nature of the working relationship between police officers and private security officers in South Korea. More specifically, this study examines how police officers and security personnel perceive the working relationships between the two organizations, their attitudes on the professionalism of security personnel, their views of ways to improve the working relationship, and their perceptions of the future of public and private police relationships.

Design/methodology/approach

Similar to the experience of many developed and developing economies, South Korea has experienced a significant increase in the number of private security personnel employed in the last three decades relative to the employment data on law enforcement officers. To reveal the nature of the working relationship between the two groups, this study utilized a recent survey of 258 police officers and 134 private security officers in South Korea.

Findings

While both law enforcement and private security officers were positive about their relationship with each other, security officers are more optimistic about achieving improvements in police/security relationships. Further, the findings also reveal that both police officers and security professionals believe that the other group could do more to encourage a positive working relationship.

Research limitations/implications

While this research has made modest inroads into assessing the views of street level bureaucrats, further research is also needed to assess the extent to which the administrators of both public and private police organizations consider each other viable partners in addressing citizens' safety concerns.

Practical implications

The level of optimism and support among private security personnel concerning the role of security is greater than that of police officers, which indicated that the police could do more to improve the relationship between the two.

Originality/value

Empirical research on the nature of the relationship between the public and the private professionals in a South Korean context enabled investigation into the aspects inherent to developing countries.

Details

Policing: An International Journal of Police Strategies & Management, vol. 29 no. 3
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 1 June 1992

Andy Gray

Criticizes low standards of personnel selection, training and payand performance limitations in the security industry. Disavows thepopular misconception that such services are…

Abstract

Criticizes low standards of personnel selection, training and pay and performance limitations in the security industry. Disavows the popular misconception that such services are cheaper than comparable in‐house security functions. Posits that higher‐calibre personnel and comprehensive training not only are needed to complement computerized control and surveillance systems but also can add value by enabling personnel to undertake reception, fire inspection, first aid, routine administration and other duties. Describes in detail how security service performance can be assessed and how an intending client should inspect a potential security contractor.

Details

Facilities, vol. 10 no. 6
Type: Research Article
ISSN: 0263-2772

Keywords

Article
Publication date: 31 December 2004

David G. Patterson

This paper provides readers with an in‐depth look at the steps that must be taken to provide the proper planning for the implementation of physical security measures at various…

Abstract

This paper provides readers with an in‐depth look at the steps that must be taken to provide the proper planning for the implementation of physical security measures at various threat levels. Readers will be provided with techniques for developing security operational concepts for various threat levels, developing alarm response procedures for security personnel, developing security patrol response procedures, maintaining operational procedures, and training security staff. This paper is designed for the security or facility manager who wants to confirm that their physical security programme meets their facility’s security needs and is consistent with the threat analysis for each facility. Readers will also receive instruction on how to improve their security systems by concentrating on how the security personnel will use the security systems to mitigate the risks. This paper will be useful for managers who already have physical security systems in place or who are planning to install or upgrade a security system.

Details

Journal of Facilities Management, vol. 3 no. 1
Type: Research Article
ISSN: 1472-5967

Keywords

Article
Publication date: 6 June 2008

H. Mouratidis, H. Jahankhani and M.Z. Nkhoma

The purpose of this study is to explore the rationale that governs implementation of information systems and network security expenditures through a case study approach.

1592

Abstract

Purpose

The purpose of this study is to explore the rationale that governs implementation of information systems and network security expenditures through a case study approach.

Design/methodology/approach

The research method took the form of a mixed‐method assessment of the perceptions of persons of authority in the management and the network security areas of an organization that has implemented network security protocols. Two stages of the research process were completed in order to gather the necessary data for the study. The first stage of the study was the administration of a Likert‐type questionnaire in which respondents answered 30 unique items on network security. In the second phase of the study, a number of responders were contacted to further expand upon the themes presented in the Likert‐type questionnaire.

Findings

Empirical evidence gathered justifies theoretical claims that personnel from general management have different perspectives towards network security than personnel from the network security management. In particular, the study indicates that such differences are demonstrated on a number of areas such as the effectiveness and the efficiency of the networked system; control of network security; security‐related decision‐making processes; and users of the network. The latter being the most controversial issue with one side indicating that users should be allowed to use the network in an efficient manner, and the other side emphasizing that users pose one of the greatest security risks to the system.

Research limitations/implications

The limitations of the study are found in its focus on a specific company and on its perception‐centred nature of risk and risk analysis. No two persons identify and frame risk in an identical manner. This creates potential conflict of interest when the participants within a risk assessment process approach the issues and present their arguments as to how to best identify and respond to risks.

Practical implications

Through comparing and contrasting the perspectives of the two sample populations, the research assists in demonstrating how, why, and to what extent specific problems are recognized by those within management and those within network security. This allowed the analysis of how these problems are defined and what steps can be taken that would help to reduce or eliminate its impact in the organization used in our case study.

Originality/value

It has been argued in the literature that there is lack of empirically based research to explore and effectively analyze the perceptions held by management and by security specialists within organizations with respect to security. This paper presents the results of the application of a novel two‐stage framework on an empirical case study focused on a large national bank. The work allowed the identification of the various perceptions held by management and by security specialists, and the degree to which these perceptions are similar.

Details

Information Management & Computer Security, vol. 16 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 16 November 2015

Charles Crawford and Ronald Burns

Recent highly publicized acts of violence and shootings on campus have prompted numerous crime prevention suggestions including having an armed presence in the schools. The…

3829

Abstract

Purpose

Recent highly publicized acts of violence and shootings on campus have prompted numerous crime prevention suggestions including having an armed presence in the schools. The purpose of this paper is to assess the impact of protective measures, policies, and school/neighborhood characteristics on school violence.

Design/methodology/approach

The data used in this study were part of the School Survey on Crime and Safety collected in 2006. The dependent measures of school violence include reports of violence, threatened attack with a weapon, attack with weapon, and gun possession. The sample was divided into high schools and all other grades to consider differences in levels of school violence among grade levels in relation to various law enforcement security measures, school security measures, and school characteristics.

Findings

Findings revealed mixed and often counterproductive results for law enforcement and school security efforts to control school violence. School characteristics, such as reports of bullying, location, and gang activity yielded numerous statistically significant findings. Policy recommendations and suggestions for future research are provided.

Originality/value

This study differs from much of the previous literature, which typically examines student and administrator attitudes about victimization and crime prevention. The current study examines detailed information on the actual effects of school violence prevention efforts. Furthermore, this study moves beyond most other works (that typically focus on high schools) as it considers school safety approaches by different grade levels.

Details

Policing: An International Journal of Police Strategies & Management, vol. 38 no. 4
Type: Research Article
ISSN: 1363-951X

Keywords

Abstract

Details

Multinational Enterprises and Terrorism
Type: Book
ISBN: 978-1-83867-585-1

Article
Publication date: 11 June 2019

Peace Kumah, Winfred Yaokumah and Eric Saviour Aryee Okai

This study aims to develop a conceptual model and assess the extent to which pre-, during- and post-employment HR security controls are applied in organizations to manage…

Abstract

Purpose

This study aims to develop a conceptual model and assess the extent to which pre-, during- and post-employment HR security controls are applied in organizations to manage information security risks.

Design/methodology/approach

The conceptual model is developed based on the agency theory and the review of theoretical, empirical and practitioner literature. Following, empirical data are collected through a survey from 134 IT professionals, internal audit personnel and HR managers working within five major industry sectors in a developing country to test the organizational differences in pre-, during- and post-employment HR security measures.

Findings

Using analysis of variance, the findings reveal significant differences among the organizations. Financial institutions perform better in employee background checks, terms and conditions of employment, management responsibilities, security education, training and awareness and disciplinary process. Conversely, healthcare institutions outperform other organizations in post-employment security management. The government public institutions perform the worst among all the organizations.

Originality/value

An integration of a conceptual model with HR security controls is an area that is under-researched and under-reported in information security and human resource management literature. Accordingly, this research on HR security management contributes to reducing such a gap and adds to the existing HR security risk management literature. It, thereby, provides an opportunity for researchers to conduct comparative studies between developed and developing nations or to benchmark a specific organization’s HR security management.

Article
Publication date: 13 November 2017

Harrison Stewart and Jan Jürjens

The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be…

6059

Abstract

Purpose

The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be addressed efficiently, especially in organizations in which data are a valuable asset.

Design/methodology/approach

Before developing the instrument for the survey, first, effective measurement built upon existing literature review was identified and developed and the survey questionnaires were set according to past studies and the findings based on qualitative analyses. Data were collected by using cross-sectional questionnaire and a Likert scale, whereby each question was related to an item as in the work of Witherspoon et al. (2013). Data analysis was done using the SPSS.3B.

Findings

Based on the results from three surveys and findings, a principle of information security compliance practices was proposed based on the authors’ proposed nine-five-circle (NFC) principle that enhances information security management by identifying human conduct and IT security-related issues regarding the aspect of information security management. Furthermore, the authors’ principle has enabled closing the gap between technology and humans in this study by proving that the factors in the present study’s finding are interrelated and work together, rather than on their own.

Research limitations/implications

The main objective of this study was to address the lack of research evidence on what mobilizes and influences information security management development and implementation. This objective has been fulfilled by surveying, collecting and analyzing data and by giving an account of the attributes that hinder information security management. Accordingly, a major practical contribution of the present research is the empirical data it provides that enable obtaining a bigger picture and precise information about the real issues that cause information security management shortcomings.

Practical implications

In this sense, despite the fact that this study has limitations concerning the development of a diagnostic tool, it is obviously the main procedure for the measurements of a framework to assess information security compliance policies in the organizations surveyed.

Social implications

The present study’s discoveries recommend in actuality that using flexible tools that can be scoped to meet individual organizational needs have positive effects on the implementation of information security management policies within an organization. Accordingly, the research proposes that organizations should forsake the oversimplified generalized guidelines that neglect the verification of the difference in information security requirements in various organizations. Instead, they should focus on the issue of how to sustain and enhance their organization’s compliance through a dynamic compliance process that involves awareness of the compliance regulation, controlling integration and closing gaps.

Originality/value

The rapid growth of information technology (IT) has created numerous business opportunities. At the same time, this growth has increased information security risk. IT security risk is an important issue in industrial sectors, and in organizations that are innovating owing to globalization or changes in organizational culture. Previously, technology-associated risk assessments focused on various technology factors, but as of the early twenty-first century, the most important issue identified in technology risk studies is the human factor.

Details

Information & Computer Security, vol. 25 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Abstract

Details

Challenges to US and Mexican Police and Tourism Stability
Type: Book
ISBN: 978-1-80382-405-5

1 – 10 of over 31000