From Corporate Security to Commercial Force


Book Description

From Corporate Security to Commercial Force: A Business Leader's Guide to Security Economics addresses important issues, such as understanding security related costs, the financial advantages of security, running an efficient security organization, and measuring the impact of incidents and losses. The book guides readers in identifying, understanding, quantifying, and measuring the direct and economic benefits of security for a business, its processes, products, and consequently, profits. It quantifies the security function and explains the never-before analyzed tangible advantages of security for core business processes. Topics go far beyond simply proving that security is an expense for a company by providing business leaders and sales and marketing professionals with actual tools that can be used for advertising products, improving core services, generating sales, and increasing profits. - Highlights and offers insight on issues such as the role of security in advertising and its actual marketing appeal and sales potential - Features tools that can be implemented by readers in order to improve key business processes - Offers advice for improving key business processes, improving the reputation of the company, the marketing appeal of products, (or services) and helping to increase sales




Corporate Security Management


Book Description

Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible assets, and people. The book merges business and security perspectives to help transform this often conflicted relationship into a successful and sustainable partnership. It combines security doctrine, business priorities, and best practices to uniquely answer the Who, What, Where, Why, When and How of corporate security. Corporate Security Management explores the diverse structures of security organizations in different industries. It shows the crucial corporate security competencies needed and demonstrates how they blend with the competencies of the entire organization. This book shows how to identify, understand, evaluate and anticipate the specific risks that threaten enterprises and how to design successful protection strategies against them. It guides readers in developing a systematic approach to assessing, analyzing, planning, quantifying, administrating, and measuring the security function. Addresses the often opposing objectives between the security department and the rest of the business concerning risk, protection, outsourcing, and more Shows security managers how to develop business acumen in a corporate security environment Analyzes the management and communication skills needed for the corporate security manager Focuses on simplicity, logic and creativity instead of security technology Shows the true challenges of performing security in a profit-oriented environment, suggesting ways to successfully overcome them Illustrates the numerous security approaches and requirements in a wide variety of industries Includes case studies, glossary, chapter objectives, discussion questions and exercises




The Corporate Responsibility Code Book


Book Description

There is no single code or standard, no panacea that will lead to corporate responsibility (CR). Yet, now, more than ever before, corporations are waking up to the fact that they must adopt codes and implement standards to satisfy the growing demands of an ever-wider and ever-less-trustful spectrum of stakeholders. So, where do companies start? Information overload is nowhere more apparent than in the field of CR. There are millions of pages and web pages written on codes and standards, but most of it is spin: organisations punting to sell their code or standard. The reality is that CR is an emerging field, a new terrain for which maps are much needed, but often imprecise. Each company is different, each with its own challenges, corporate culture, unique set of stakeholders, and management systems. Corporate responsibility is a journey for which, today, there is no single map but a multitude of codes and standards that can be combined in new ways for different journeys. In her many lectures around the world, CSR consultant Deborah Leipziger has been asked the same question over and over again: "What are the best standards for companies seeking to be socially responsible?" Over the course of more than a decade, she has analysed hundreds of codes of conduct and standards to answer that question. This indispensable resource is the result. The Corporate Responsibility Code Book is a guide for companies trying to understand the landscape of corporate responsibility and searching for their own, unique route towards satisfying diverse stakeholders. There is no one-size-fits-all approach. A company may face quite different challenges if it operates in more than part of the world. And yet stakeholders, especially consumers and investors, are keen for some degree of comparability with which they can evaluate corporate performance. There are countervailing forces at work within corporate responsibility: on the one hand is the need for convergence in order to simplify the large numbers of codes and standards; and, on the other hand, the need to foster diversity and innovation. Many of the best codes of conduct and standards are not well known while some CR instruments that are well disseminated are not terribly effective. Some comprehensive codes of conduct achieve nothing, while other quite vague codes of conduct become well embedded into the organisation and foster innovation and change. The book explains some of the best CR instruments available, and distils their most valuable elements. The goal of the book is to help companies select, develop and implement social and environmental codes of conduct. It demonstrates how the world's leading companies are implementing global codes of conduct, including the United Nations Global Compact, the OECD Guidelines for Multinational Enterprises, Social Accountability 8000 (SA 8000) and AccountAbility 1000 (AA 1000). The codes in this book cover a wide range of issues, including human rights, labour rights, environmental management, corruption and corporate governance. The book also includes how-to (or process) codes focusing on reporting, stakeholder engagement and assurance. This book is based on interviews with the standard-setters, the implementers of standards, academics, activists and other key stakeholders from around the world; and in many cases includes the full text of the code profiled. Each of the standards and codes described has been shared with the promulgators of the instrument to ensure that the information is as up to date as possible. The Corporate Responsibility Code Book will be an invaluable tool for companies developing their own code, but will also be a key tool for companies with a strong track record in CR, seeking to understand the interrelationships among codes and standards to create their own corporate vision. It will be the key reference text on corporate codes of conduct for many years to come.







Security for Business Professionals


Book Description

Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don't have the resources to hire an in-house security staff. It can also be used for assessing the adequacy of an existing security program. The book provides an overview of the key security objectives and challenges that managers face, such as how to measure the effectiveness of a security program and balance the costs and benefits. It also shows how to develop security procedures that conform to key regulatory requirements, and how to assess an organization's most important risks, vulnerabilities, and threats. Security for Business Professionals addresses key physical and informational security concerns, including areas such as asset protection, loss prevention, and personnel security. It also discusses how to develop emergency and incident response plans, and concludes with suggested safety and security exercises and training recommendations. - Written in an introductory and accessible way for those new to security. - Illustrates key concepts with case studies and real-world examples from a wide variety of industries. - Provides recommended readings and checklists for more in-depth coverage of each topic.




Online Business Security Systems


Book Description

This book applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).




Private Armed Forces and Global Security


Book Description

Through an array of theoretical approaches and empirical material, this comprehensive and accessible volume surveys private armed forces and directly challenges conventional stereotypes of security contractors. Private Armed Forces and Global Security: A Guide to the Issues is the first book to provide a comprehensive yet accessible survey of the private military groups involved in conflicts worldwide. Organized around four themes, it covers the history of private military forces since 1600, the main contemporary actors and their defining characteristics, the environments in which private armed forces operate, and provides an analysis of the logic behind privatizing security. This book goes beyond conventional knowledge, offering both a theoretical approach and a new, practical perspective to advance the understanding of the ongoing climate of global instability and relevant players within it. Numerous examples help the reader grasp the full range of real-world challenges and conceptual facets surrounding this fascinating, yet highly polarizing topic.




Business and Security Sector Reform


Book Description

Challenges to security and human rights involving extractive and other industries gave rise to an evolving framework of policy, standards and good practice generally known as business and human rights (BHR). Problems with inefficient and unaccountable security institutions are addressed by security sector reform (SSR). From an empirical perspective – the view from the often mutual operating grounds of BHR and SSR – both approaches share many challenges, as well as end goals. It is thus striking that only on rare occasions are challenges in governance of the security sector addressed upfront as problems of poor resource governance, and vice versa. This paper describes the grounds where SSR and BHR coincide in principles, actors and activities, and which synergies can be built on that base. It makes the business case for SSR, and the SSR case for business. The paper assesses how SSR can channel resources and know-how from business to address critical challenges related to ownership, capacity and sustainability of reform processes. Opportunities for bridging BHR and SSR are drawn from a broad range of policy and guidance, and by looking at lessons from case studies on Guinea, Colombia and Papua New Guinea. SSR and BHR should not collide; ideally, they should cohere. A variety of multistakeholder initiatives open new opportunities to bring this about, with particular relevance to SSR in extractive environments. The overall conclusion, supported by practical propositions for implementation, is that the existing policies and standards in SSR and BHR already allow, and call for, a less rigid approach to the challenges addressed in both fields.




Between Security Markets and Protection Rackets


Book Description

Security is a social practice, which constitutes different formations of political order. Developing a political economy of security practice, the author distinguishes these formations with a view to the actual exchanges between various providers and receivers of security services. He thus departs from a popular perspective in political science, which charts ongoing transformations in the global security landscape along a series of categorical divisions between state and non-state or between the public and the private. A more rewarding analytical perspective conceives the two most dominant security formations in the contemporary world as either based on commercial or on compulsory relations.




Handbook of e-Business Security


Book Description

There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.