Friday, November 20, 2009
Gaining in-depth insight on this process is a valuable knowledge-base of an organization’s emphasis on continual security training of heightened security discernment. Comprehending the needs of the client(s) in conjunction with the proper application of expectations versus reality renders successful goal attainment. A security professional must continuously demonstrate clarity and relevancy of the current sate in order to manage tactical situations. Moreover, it is just as vital to communicate to the client(s) what is functionally appropriate for the level of security desired.
When evaluating this method, it becomes essential that the more enlightened the security professional is to the environmental dynamics, the increased probability that sound decision making will be the end result. The consequences of failed or inadequate SA techniques can be detrimental to an individual and/or group’s ability to appropriately function within a given environment, thus its ramifications can be irreversible. To posses comprehensive, error free and the most up to date SA is critical when engaging technological and situational perplexities and decision making becomes the focal point.
When new information or situations arise, professionals must be able to be flexible in delivering solutions and understand consequences of decisions in order to take appropriate action in critical situations. For the security professional the application of SA can be a difference maker and a developer of loyal consumers for quality service.
Dostal, B. C. (2007). Enhancing situational understanding through the employment of unmanned aerial vehicles. Army Transformation Taking Shape ...Interim Brigade
Combat Team Newsletter, No. 01-18. Retrieved November 7, 2007, from http://www.globalsecurity.org/military/library/report/call/call_01-18_ch6.htm
Fracker, M. L. (1991b). Measures of situation awareness: Review and future directions (Report No. AL-TR-1991-0128). Wright-Patterson Air Force Base, OH: Armstrong Laboratories.
Moray, N. (2004). Ou sont les neiges d'antan? ("Where are the snows of yesteryear?"). In D. A. Vincenzi, M. Mouloua & P. A. Hancock (Eds), Human performance, situation awareness and automation: Current research and trends (pp. 1–31). Mahwah: LEA.
Monday, July 27, 2009
In the video, clearly ALL staff members were too trusting that could have been potentially fatal in both cases. But, not only is hotel staff (housekeeping, valet, bellman, etc.) should be trained, but executives and top managers so that all understand the importance of security, not only for our guests, but for employees and the company. Marketing should be aware of such incidents to advertise or communicate security efforts to existing and loyal customers. Front office could perhaps emphasize safety upon check-in and communicate hotel policy for requesting entrance without a key. If everyone is involved, exercising security processes will not only benefit the guests, but will encourage safety stewardship.
Re-examine your security procedures and perhaps hold quarterly/semi-annual refresher courses for everyone. Better Safe than sorry!
Hotel Security GMA video
Wednesday, July 8, 2009
Security operations in unfamiliar jurisdictions require the forging of commonality with the lead organization’s interest in extending to the client sound security practices. Therefore, garnishing support with partners becomes a must. Accomplishing this endeavor will call upon the lead security organization’s ability to value the contributions of those organizations in their expertise. Remember, the organization spearheading the effort toward ascertaining data about this venue and the most efficient application of S.W.O.T. (Strengths, Weakness, Opportunities, and Threats) analysis, must do so to avoid scenarios of ambiguity and complexity. In conclusion, the most effective methodology of addressing the venue and the needs of the client is providing services rendered in a unified methodology, appreciating the collective contributions of local or state law enforcement and/or security organizations that can facilitate a successful conclusion or preclude an unforgettable debacle.
1. Daniels, Rhianna. Securing History. July 7, 2009. http://www.securitydirectornews.com/?p=article&id=sd200907dy1s2V
2. Long, Josh. Political Protection: Securing the 2004 Conventions. http://www.publicvenuesecurity.com/articles/451feat1.html
3. Hall, Stacey. Effective Security Management of University Sport Venues. http://www.thesportjournal.org/article/effective-security-management-university-sport-venues
Friday, July 3, 2009
One key component of security operations and its efficiency regarding service delivery is documentation. This area directly and indirectly impacted by documentation and its contents are not only protecting information deemed proprietary; the documentation generated can be used in civil and criminal court proceedings. Therefore we must assure its accuracy and thoroughness for recalling incidents and abnormalities that impact operations of the department, division, and/or organization as a whole. A point of emphasis to note, in order for security operations to be a vital component of business operations, processes directed toward problem resolution must be redirected from the reactive methodology often observed, to cultivating and fostering a proactive philosophy in all aspects of conceptualization, planning, training and implementation. This point of emphasis is especially vital in the area of documentation.
Monday, June 29, 2009
High-Tech gadgets helping secure your assets and give you peace of mind.
Sunday, June 21, 2009
Stay tuned and stay safe!