Focus of Organization
Every day individuals come in contact with minor situations that are often over-looked until the situation goes array and left wondering what could have been done to prevent this from happening. An effective risk management approach as it relates to security can have three elements; assessment of threat, pin pointing the vulnerabilities, and a plan of action to succeed. For instance, to avert potential terrorist’s acts against America and worldwide, other nations must collaborate in forming a unit to oppose activist threats; however the key issue in creating a worldwide counter-terrorist center of operations the inability in establishing a sole characterization of “terrorism”, due to a majority of countries description of terrorism is built solely towards political posture. Likewise, organizations like the United Nations, whose mission is to promote peace and mutual aid international, should establish a clear and precise definition to support the foundation of an international counter-terrorist organization. Moreover, the United States can improve relations with countries by embracing and continuing to work with North Atlantic Treaty Organization (NATO) and its international community in order to protect the U.S. territories. Organization risk management requires a sound understanding of the principles of risk as it combines the product of a possibility of loss, misfortune or catastrophe. Market & Exercise of Power
In 2013, an estimated $415.53 billion was expended in Global Homeland Security market; with an expectation by 2018 $544.02 billion will be spent to combat the risk of cybercrimes, domestic dispute, cross border terrorism, piracy, drug and human trafficking. Security threats against businesses and other organizations different, as security research and development are the basis of defense managing for businesses and global bureaus. In most cases, organizations and worldwide institutes have reacted towards protecting its surroundings, enhancing planning and security research. When the Department of Homeland Security was formed, based on the Act of 2002, which required the incorporation of mass agencies and organizations under one agency created numerous obstacles due to the administrative and operational each organization impose amalgamation of non-terrorism oriented programs to anti-terrorism strategies. Security Planning Arrangements
Security planning arrangements is essential in strengthening America’s defense through prevention and preparation of threats that risk the safety of the nation. The acts of terrorist attacks, natural disasters, and cyber attacks threaten public safety domestically and internationally. Security planning arrangements and national preparedness require responsibility from different levels of government, which contribute to the actions needed to safeguard the nation from harm. Security planning arrangements protect, respond, and provide strategies to diminish and recuperate from terrorization which impose the utmost danger in threatening homeland security. Security planning arrangements develop objectives to coordinate with local, state, federal, tribal governments, private and public sector organizations in assisting in the efforts of counterterrorism strategies. The security planning arrangements and the domestic efforts of the government build and sustain domestic capabilities as an approach to training, organization, and equipment designed to help planning frameworks and recovery. The frameworks coordinate structure and responsibilities to maintain a unified system with the support of levels of government and relevant actions from private and nonprofit sectors. Security planning arrangements share an operational plan to support the planning framework and the concept of operations and integration of resources. Security planning includes national training to sustain the ability to provide operational procedures, equipment, and facilitate exercise...
References: Bickel, K. (2007). Planning and managing for major special events: Best practices for law enforcement administrators. The Police Chief the Professional Voice of Law Enforcement, Retrieved December 7, 2014, from http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1347&issue_id=122007
Connors, E. (2007) Planning and managing security for major special events: Guidelines for law enforcement and private sector. U.S. Department of Justice, Retrieved December 5, 2014, from http://www.cops.usdoj.gov/Publications/e07071299_web.pdf
Cyber Threat Source Descriptions. (n.d.). Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). Retrieved December 4, 2014, from: https://ics-cert.us-cert.gov/content/cyber-threat-source-descriptions
Freedman, David H. (2011). What Has Technology Fixed Since 9/11? Technology Review. Retrieved December 4, 2014, from: http://www.technologyreview.com/article/425380/what-has-technology-fixed-since-911/http://www.technologyreview.com/article/425380/what-has-technology-fixed-since-911/
Nacos, B. L., Bloch-Elkon, Y., Shapiro, R. Y. (2008). Prevention of Terrorism in Post-9/11 America: News Coverage, Public Perceptions, and the Politics of Homeland Security. Terrorism & Political Violence, 20(1), 1-25.
Otto, Kate. (2013). Three post-9/11 social changes we have yet to achieve. Everyday Ambassador. Retrieved December 4, 2014 from: http://everydayambassador.org/2013/09/11/three-post-911-social-changes-we-have-yet-to-achieve/
(n.d.). Presidential policy directive/ppd 8: National preparedness. Department of Homeland Security, Retrieved from http://www.dhs.gov/presidential-policy-directive-8-national-preparedness
Rabkin, N. J. (2004, September 22). Homeland Security: Observations on the National Strategies Related to Terrorism: GAO-04-1075T GAO Reports, 1.
Talbot, J. & Jakeman, M. (2009). Security risk management body of knowledge. Hoboken, NJ: John Wiley & Sons.
Please join StudyMode to read the full document