StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Most Effective Way of Managing Security Systems for VIPs - Research Proposal Example

Cite this document
Summary
The paper "The Most Effective Way of Managing Security Systems for VIPs " is an outstanding example of a management research proposal. Managing security systems for very important persons is in itself a very essential venture. Each and every nation normally has very important persons. They include members of parliament, ministers, and the president among others…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful

Extract of sample "The Most Effective Way of Managing Security Systems for VIPs"

Title of topic area This research deals with the most effective way of managing security systems for very important persons. Abstract Managing security systems for very important persons is in itself a very essential venture. Each and every nation normally has very important persons. They include members of parliament, ministers, and the president among others. Such very important people normally require tight security because they are quite susceptible to attacks from the public. The entire research concerning the most effective way of managing security systems for VIPs will be carried out with two major methodologies. They include the quantitative and the qualitative methodologies. Different methods will be used in the whole process of data collection. After the data is collected, in-depth analysis of the data will be carried out. Introduction Managing security systems for very important people in the nation remains to be one of the top priorities of any government. This is due to the fact that without proper systems of security for the VIP’s then their lives will ultimately be in danger. Generally, this research aims at finding out the most effective way of managing security systems for very important people within the nation. (Denscombe, 2003, p. 310:315) It further aims at checking out the existing systems to know whether they are effective in managing security or not. This research proposal paper has the various methodologies that will be incorporated in the entire research. The methods that will be used in data collection will also be incorporated into the paper. (Denscombe, 2003, p. 310:315) Hypothesis The following hypotheses will be used in the research concerning most effective way of managing security systems for very important persons. There are different methods of managing security systems for very important persons Some methods of managing security systems for very important persons are me effective than others Security systems for very important persons are usually managed Managing security systems for very important people in the nation is very important. (Dooley, 2001, p.385:400) Methodology Data collection methodologies are very essential in any research. These will enhance maximum collection of essential information that is related to the research. Quantitative and qualitative methodologies will be incorporated in this research. With the incorporation of both methodologies, there will be high chances of collecting reliable information related to the research topic. (Dooley, 2001, p.385:400) Methods to be used Research concerning the most effective ways of managing security systems will be carried out using the following methods. They include records and any relevant documents in VIP’s security department, interviews and questionnaires. Through these the necessary information will be accumulated. Security records Security department in any nation normally keeps records that are related to managing VIP’s safety. These will be used to get the relevant data in relation to the research topic. The first step will be to identify the security departments that are attached to VIP’s safety. Through the relevant authority in these departments, records will be accessed and analysed. (Denzin, 2005, p. 30:45) First of all, the different methods available for managing VIP’s safety will be noted. Those that have not been effective in the past will be noted too. Comparisons will be made to know those that have been quite effective. It is quite essential to note that it is not very easy to access such records. It will warrant a clear explanation to relevant authority on the intention of carrying out this research. (Denzin, 2005, p. 30:45) Interviews An interview can be described as a one on one communication between two or more individuals. In the research fraternity, interviews are carried out with the aim of getting important information that is related to the research topic. In this case, the researcher prepares questions before hand that have to be asked to the target group of people. The target group has to have wide knowledge in the area of research. (Fowler, 1993, p. 12:54) In this case, the security personnel that are linked to very important people in the nation will be the best target group. Plans will be made to have them in small focus groups during the interviews. The respondents always have to be informed of the meeting prior to the date. This enables them to plan and be prepared with the right information so that time is not wasted. They can even be informed of the general overview of what is expected of them. (Fowler, 1993, p. 12:54) Questionnaires Questionnaires will also be used in collecting information related to the most effective way of managing security systems for VIP’s. Questionnaires normally consist of research questions related to the topic that are given to the chosen respondents to answer. They can sometimes be posted, or be given directly to respondents. This research will involve the questionnaires given directly to respondents and collected after they finish. (Rossi, 1983, p. 165-200) This will help avoid cases where respondents forget about the questionnaires r even fail to send them back. Five research assistants will be chosen to help administer the questionnaires. The following are examples of questions that will be included in the questionnaires; (Rossi, 1983, p. 165-200) What methods are available for managing VIP’s security systems? Have any of the methods been ineffective in any way? YES, NO If the answer to the above question is yes, in which ways have they been ineffective? Are there any effective methods of managing VIP’s security systems? Which are they? Are the effective ways of managing VIP’s security systems being utilised? Is there anything that can be done to enhance effectiveness of the methods that are in operation? YES, NO If yes, what can be done? Methods of analysing data After collecting data, it is quite essential that it be analysed. All the information that will be collected using different methods will be analysed. These are the methods that are illustrated above like security records, interviews and questionnaires. Graphs will be drawn in relation to the overall effectiveness of each method that is used to manage VIP’s security systems. (Gray, 2004, p. 24:31) The graphs will be compared and contrasted. The most effective method of managing security for very important people will then be ascertained. The relative standard curve method will also be used in data analysis. Through this method, the final information will be very reliable. In this method curves are used to analyse the overall effectiveness of each method. Ethical considerations Ethics are values or principle by which a person acts basing on those principles. Ethical values are main beliefs for instance duty, respect and integrity that inspire actions and attitudes of a person. Some values are unethical, ethical values do relay what is considered right and what is seen as wrong. Thus, ethical values do take priority above none ethical values. There are various ethical considerations that have to be put in mind in relation to this research. (Morgan, 1988, p. 62:87) It is very essential to consider this information as of high confidentiality. That is why the research assistants have to be morally upright people who will not leak out the information to morally immoral people. These are people who can affect the security of VIP’s and the nation at large. Therefore research assistants should not be linked to any criminal actions whatsoever. This includes the people who will have access to the final report after data collected is analysed. (Morgan, 1988, p. 62:87) Research population The research population that will be used in this research will include security personnel that deal with very important people. The reason why these people were chosen is because they have the relevant information concerning methods of managing security systems for VIP’s Timescale/research planning Any research has to be planned. This research concerning effective methods of managing security systems for VIP’s will be carried out in a span of three months, then analysed within one month. (Patten, 2004, p. 22:27) Dissemination and outcome The report will not be disseminated to any person who wishes to know. This is due to the ethical considerations in relation to the topic. The information will be disseminated to security personnel through reports which will be given to them in hard and soft copies. (Patten, 2004, p. 22:27) Conclusion Security systems for very important persons usually have to be managed. There are different methods that are used in the entire process. In researching concerning the most effective method of managing the security systems, two methodologies will be used. These are both qualitative and quantitative. The methods that will be used to collect data include interviews, questionnaires and records in the security department. The data will then be analysed using relative standard curve method among other methods. The research population will mainly consist of security systems personnel in charge of VIPs. There are various ethical considerations that will be taken into account in relation to this topic. This includes having research assistants that are not linked to any criminal activities. The entire research will take approximately four months where information will be collected and analysed. The information will be disseminated to security personnel and any other person who deserves to know. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Most Effective Way of Managing Security Systems for VIPs Research Proposal, n.d.)
The Most Effective Way of Managing Security Systems for VIPs Research Proposal. https://studentshare.org/management/2031728-security-systems
(The Most Effective Way of Managing Security Systems for VIPs Research Proposal)
The Most Effective Way of Managing Security Systems for VIPs Research Proposal. https://studentshare.org/management/2031728-security-systems.
“The Most Effective Way of Managing Security Systems for VIPs Research Proposal”. https://studentshare.org/management/2031728-security-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Most Effective Way of Managing Security Systems for VIPs

The Possibilities for the Integration Security Department

Therefore, the majority of global organizations have invested in management systems.... Management systems are structures of work processes and operational procedures utilized by an organization to achieve its anticipated set goals (Wright, 2000, p.... Examples of management systems include quality management, corporate social responsibility, environmental management, and occupational health and safety management among others.... Integration of management systems which is a process of assimilating concepts, which initiate and create sustainable quality in work processes, operations, programs and systems, workforces, outputs, inputs and in the management, help organizations to effectively satisfy the needs of the internal and external stakeholders (Asif, 2010, p....
12 Pages (3000 words) Coursework

Change Management at BAE Systems Saudi Arabia

… The paper "Change Management at BAE systems Saudi Arabia" is a delightful example of a case study on management.... BAE systems Saudi Arabia is a subsidiary of BAE systems Inc which is a high technology multinational firm based in the UK dealing in defense, security, and aerospace services and products.... The paper "Change Management at BAE systems Saudi Arabia" is a delightful example of a case study on management....
11 Pages (2750 words) Case Study

Measures for Improving the Quality of Information within Organizations Systems

Giving research in the realm of information systems for the progression of business enterprises is worthwhile scholarly rationality, especially in addressing the various measures required to ensure the quality of information within an organization.... Although many firms have identified the importance of information for the success of their business operations, very few have established effective ways of managing the quality of the information (Stair, Reynolds & Reynolds, 2008)....
6 Pages (1500 words) Coursework

Morgan Accesss Mobile Banking

IT managers ensure the implementation of high levels of security through a broad range of measures.... Most customers will not use mobile banking due to concerns for security.... This feature allows the company to improve the security of downloads from the bank's servers by the use of a unique ID.... Device ID guarantees the security of downloads by making sure each download has a unique ID.... This measure manages the security of the bank's network in terms of authenticating transactions (Donner and Tellez 2008)....
12 Pages (3000 words) Case Study

Information System Model for Managing Information Technology Resources in Hospitality Industries

Kin to carry out research regarding Property Management Systems and come up with the most suitable one that is efficient, user friendly, and more economical.... Kin to carry out research regarding Property Management Systems and come up with the most suitable one that is efficient, user friendly, and more economical.... To whom it is addressed Colonel Kin, the Managing Director of Highway Hotel Scope Findings E-Commerce Impacts of E-commerce Risks involved in E-commerce Competitive Advantages of E-commerce Costs Brand Management & Marketing Business Application Analysis of the Property Management systems/comparison of the PMS The chief objective of this study is to look into the E-commerce, Lodging Touch Property Management, and the paragon systems, their involvement in; rapid deliverance in Information Technology service, the value of the service, Information Technology Resource management....
6 Pages (1500 words)

How Business Continuity Management Can Help an Organization Manage Risks and Challenges

ow BCM Can Help an Organization Manage Risks and ChallengesBCM has been variously described as a combination of efforts aimed at identifying and evaluating probable threats, both internal and external, to an organization's continuity, and providing a framework for the development of resilience and effective operations....
14 Pages (3500 words) Essay

Overview of My Professional Development

Other important skills I gained and that are highly applicable nowadays include; Web Design and Production; Knowledge Management systems, systems Analysis and Modeling, Business Intelligence and Business Informatics Case Studies.... Of particular interest and pertinent with my specific skills were the areas of systems, Project and Quality Management; systems Analysis and Modeling; and Database Design.... My roles revolved around IT systems Maintenance: upgrading, organizing for the procurement and installation of new servers and computers....
8 Pages (2000 words) Coursework

Technology of Intelligent Building Management Systems

The building owners nowadays face various challenges as they face way of reducing carbon footprint and energy consumption, protecting tenants using security methods that are non-intrusive, lowering operating costs, maintaining buildings and complying with regulations, managing modern buildings' systems and technology, and repeating maximum return on investment (So & Chan, 2012).... … The paper "Technology of Intelligent Building Management systems" is an outstanding example of management coursework....
11 Pages (2750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us