Security Management Essay

Total Length: 639 words ( 2 double-spaced pages)

Total Sources: 1

Page 1 of 2

Q1. What are the main reasons why supervisors fail to discipline? To what extent is senior management responsible for supervisors’ failure to discipline? To what extent are supervisors responsible for their own lack of action in appropriate disciplining?

Supervisors are human, and wish to be liked. Disciplining a fellow employee can be profoundly disturbing on a personal level. Also, sometimes there is a fear that senior management will not support the supervisor in his or her decision, even if the supervisor is merely fulfilling his or her obligation to the company. If there is pushback, the supervisor may fear he or she will take the fall. Supervisors may be especially reluctant if the employee is popular, or from a group which could give the appearance that the supervisor is engaged in discrimination. The fault lies with the supervisor, if the supervisor is avoiding disciplining to protect his or her reputation, but management must share blame if they have failed in the past to back up legitimate supervisor objections.

Q2. Describe the steps in the progressive discipline procedures.

First, according to McCrie (2015) an actual infraction must have occurred. Secondly, the supervisor should conduct a thorough investigation into the infraction, to determine why it occurred and if it was the employee’s fault (versus the employee being instructed to do so by another supervisor or a miscommunication).
If it is a first mistake, the employee should be given a verbal warning and instructions to prevent it from occurring again, unless of a very severe and malicious nature. If the problem continues to occur, the discipline then becomes progressive, then taking the form of a written warning. If that proves to be ineffective, then the employee will be given a short suspension. If the suspension fails to curb the behavior, then a longer suspension may be needed.

Q3. What role does insurance play against potential wrongful termination actions? How might an insurer seek to defend itself against such a suit?

If the worker brings forth a legal suit against the company for a case of wrongful termination, in most instances the company’s general liability policy will enable it to fund its defense (McCrie, 2016). Broadly written insurance policies generally make the company responsible for defense costs, pretrial expenses, and any judgement made against the defendant (McCrie, 2016). However, insurance companies may attempt to extricate themselves from the obligation….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


Reference

McCrie, Robert. (2016). Security operations management (3rd ed.). Waltham, MA: Butterworth-Heinemann.
Related Essays

Security Management Civil Action

Security management 1. In a civil action, how can a claim of negligent hiring have a greater chance of succeeding? Jurisdictions have been increasingly putting laws in place pertaining to what makes organizations a potential target for a lawsuit on negligent hiring. Though in most instances, claims of negligent hiring may be effectively fended off, it proves increasingly tricky in the following cases: · If the individual harming or injuring another is an employee of the company. · If the employee is found guilty of harming, injuring or doing any… Continue Reading...

Development and Education of Security Management

Security Management 1. While some people may be better leaders than others, all people can lead and all people can learn to lead better. Discuss some ideas of how leadership skills may be improved. Development and education Leaders need to develop in their position. Owing to managerial tasks’ knowledge-based nature, the word “development” has been used to describe the continuous growth in skills and cognition of executives and managers. Managerial development is promoted via education that they may acquire in various settings (Fernandez et al., 2015). Attending and taking part… Continue Reading...

School Security Management

Security Management, 1 Aug 2018 https://sm.asisonline.org/Pages/Checking-in-for-Safety.aspx] [4: Holly Gilbert Stowell, “Checking in for Safety,” Security Management, 1 Aug 2018 https://sm.asisonline.org/Pages/Checking-in-for-Safety.asp] Training and Development for High Performance Two ideas that McCrie tackles when it comes to training and development of workers and managers for high performance with respect to security are a) the need to measure for effectiveness, and b) the need for non-security personnel to have security training. Each of these are important for their own reasons. Measuring effectiveness is crucial because too many assumptions can be made about a… Continue Reading...

Human Resource Strategies for Security Management

Factors to Consider in Security Management 1. On meeting new workers assigned to the unit, what topics would the supervisor discuss first? Why? Regardless of the supervisor’s precise role, many of the problems that occur following the hiring of new employees relate to misunderstandings concerning organizational expectations and the failure to identify optimal candidates (McCrie, 2016). Therefore, supervisors at every level should focus on accurately communicating organizational expectations based on a timely and accurate job description, accident reporting requirements, what safety protocols and procedures are in place and the name and contact information of… Continue Reading...

How 9/11 Affected Private Security

Security Management 1. Some operational contingencies are considered core because the operation could not function without it. A core operational contingency is one that must remain functioning. This is important for contingency planning, so that when you plan for the more common risks that the operation faces, you ensure that the core ones are taken care of, and will continue to run. If you run an e-commerce site, for example, you would consider the ability to keep your website running and continue taking orders as a core contingency. Everything else… Continue Reading...

The Banking Act and Security

Security Management: The 1968 Bank Protection Act In the 1960s, all banking was primarily done in person and in-house—i.e., a customer had to literally walk into a bank to make a transaction. This was well before the era of digital cash, when money could be moved from one place to another with the click of a few buttons on a keyboard. In the 60s, cash had to be on hand at the bank in sufficient quantities to meet demand—and that meant banks were a big target for robbers. The 1968… Continue Reading...

Differences Between Proprietary and Contract Security

international professional organizations and governing bodies that ensures the integrity of contract security worldwide, along with the International Security Management Association (ISMA, 2018). When organizations in the public or private sector consider using contract security, they can go through appropriate safeguarding channels. Contract security companies also enter into complex legal agreements with the clients they serve. Many municipalities are turning towards contract security, which is far more common than many people in the general public realize, often replacing or at least operating contiguously with public law enforcement. For example, the City of San Jose (2013) uses contract security for many of its public works facilities. Doing so helps… Continue Reading...

Communications Interagency Technology Security

security networks need to be regular updated and maintained. Technology can be employed specifically for the purposes of security management, training, and consistent monitoring of all essential services. Likewise, technology can be used as a means of interfacing with the public during crisis scenarios. Each agency can establish its own channel of communication, providing the public and other external stakeholders with access to multiple messages via many media channels. Social media and other new media can also be leveraged for informing the public about critical infrastructure breakdowns and updates. Current types of technology used in the protection of critical infrastructure and during interagency interactions are generally effective but… Continue Reading...

Cost Efficiency in Cyber Security

Security Management 1. The appropriate budget allocation will vary by organization based on what?  The appropriate budget allocation will vary based on the specific profiles of the organization, its needs and the extent to which resources are actually available. In an economic downturn, supply chains can become tight. With tariffs going up or a trade war worsening, obtaining cheap resources becomes more difficult. This has to be taken into consideration when determining a budget--i.e., that organization must look at the macro as well as the micro. The micro in this… Continue Reading...

Digitalization to Enhance Customer Satisfaction at APM Terminals

involved 21 shipping companies in Korea, Lee, Tongzon and Kim (2012) found that the use digital technologies in container port management positively influenced customer satisfaction as well as port competitiveness. The port in question employed digitalization by installing an e-workplace, a security management system, and a customer relationship management system. This study provides important empirical evidence relating to the impact of port digitalization on customer satisfaction. However, generalizing the study beyond the context in which it was undertaken may be quite difficult. On the whole, the connection between digitalization and customer satisfaction remains a largely under-researched area, particularly within the context of the port industry. Much of the literature in this area focuses on organizational metrics such as container capacity, output, and cost savings, giving little or no attention to customer… Continue Reading...

sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Security Management" (2018, October 03) Retrieved April 18, 2024, from
https://www.aceyourpaper.com/essays/security-management-essay

Latest MLA Format (8th edition)

Copy Reference
"Security Management" 03 October 2018. Web.18 April. 2024. <
https://www.aceyourpaper.com/essays/security-management-essay>

Latest Chicago Format (16th edition)

Copy Reference
"Security Management", 03 October 2018, Accessed.18 April. 2024,
https://www.aceyourpaper.com/essays/security-management-essay