Security Management Is About Protection Information Technology Essay
Security is traditionally defined as one of the most pervasive problems that a campus or university must address. There is rarely has a campus issue, problem, or challenge that requires the recruitment of everyone in the university to solve.
Security Management is about protection of a building and other assets of the building. Security management is encompasses a field of management related to asset management, physical security and human resource safety functions. It entails the identification of an organization's information assets and the development, documentation and implementation of policies, standards, procedures and guidelines.
Security is an essential issue for every organisation i.e. government, private, commercial or educational institution. Thus, university security personnel such as campus security officers and campus security guard need to have a strong understanding of campus security.
There are many important responsibilities are being brought out in running a university. One of the most important is proper security management. Campus security is necessary in order to keep employees and their belongings safe.
All students and university community members are encouraged to be fully aware of the safety issues on campus and to take action to prevent and to report illegal and inappropriate activities. Personal awareness and applying personal safety practices are the foundation of a safe community.
Pursuant to the Student Right to Know and Campus Security Act, university monitors criminal activity and publishes the security report, maintaining a three-year statistical history on the campus, on the adjunct campus, and at off-campus facilities used. University also distributes information about the report to students and employees. A copy of this report is also available to prospective students and employees upon request.
Various policies and procedures relating to campus security is needed and it expressly reserves the right to modify or adopt additional policies or procedures at any time without notice. Such changes may appear in successive issues of the security report. (Saint Paul College, 2009)
To determine the current security system in University of Malaya (UM).
To identify the level of satisfaction among students towards current security system in UM.
To conclude and make appropriate recommendations to improve on the current security system.
1.3 Statement of research problems
For universities, it is always a challenge in balancing the desire to welcome the public to campus events with the need to protect the safety of the university community. It is exposed to physical risks and vulnerabilities as well as the vandalism because there are many people pass in and out to the campus include the students who stay off-campus. University community such as students and staffs as well as workers who work in the campus area will feel unsecure or unsafe. Unsecure environment will also affect the students’ academics. However, according to the statistics, the people attitude always makes sense that “it will never happen here.”
Thus, due to the lack of awareness on the security among the students, staffs and visitors of the university, this research study is to get a better understanding on the security management and to know how important are the security management.
Besides that, this research will identify the satisfaction level toward security management of University of Malaya among the students and the staffs.
The security is always an issues concerned by community. In the campus, n even there is a security system, many students may still not satisfy with the current security system in the universities because, for example, the theft cases still happen make loss on the students and staffs.
Thus, a good and efficient security management of a university is important so that to ensure all aspects and assets of the building are kept safe and defended from danger or injury or loss. Security covers all the devices, technologies and specialist materials for perimeter, external and internal protection. This covers everything from sensors and closed-circuit television to barriers, lighting and access controls.
1.5 Significance of Study
This study will show an overview of Security Management system to those security administrators and other security personnel as well as the staffs and students about protecting campus assets.
Through this study, students and staffs will more understand the current security system in University of Malaya and thus the administrator and security personnel could more concern on the current security system problem so that will gives awareness to them so that safety of students and the campus more secure. By managing well in campus security, not only the university community will feel more secure, the visitors will also enjoy the benefits because the probability to face will be lower. The students also can enjoy the safe and secure academic environment.
1.6 Scope of Study
This case study will only focus on University of Malaya. There will be a focus group of people in this study which includes the campus administrators, security personnel such as security guard and security officers, university staffs, students, and visitors.
1.7 Research Methodology
In carrying out this study, understanding of the definition of security and Security Management of campuses and universities will be carried out from secondary data such as magazines, newspapers, encyclopedia, journal articles and abstracts as well as the data mainly collected from internet. Besides that, the current security system of University of Malaya can also be studied.
In addition, questionnaire surveys data will be collected from the administrators, security personnel, staffs and students so that can know the satisfaction level on security management in University of Malaya among them.
The data collection and information gathered will be put into chart in the most proper way. Thus, every data and information gathered will be analyzed before the study can reach the conclusion.
1.8 Structure of the study
The first chapter provides a concise introduction to the topic of this study. It consists of statement of research problems, objectives of the study, scope of study, research methodology, significance of the study and the structure of the study.
In the chapter two, the Literature Review, provide information to better understanding on the Security Management of university including the implementation of security and types of security. Besides that, this chapter will also study the importance of the security policy and the devices used in implementation of campus security.
Next, the Chapter 3 is the research methodology. The research will carry out in two ways, that is quantitative research (questionnaire) and statistical analysis from data collected and information gathered. The related articles, journals, research papers and reference books will be collected and studied. In addition, the definition and related issues to the research topic will be further discussed and explained
Chapter 4 is the Findings and Analysis of the research methodology. The quantitative research will provides the tabulation of the quantity survey through questionnaire survey. The result will base on the analysis of the data collected as well as observation.
Last, Chapter 5 is the Conclusion and Recommendation. The conclusion of the study will be derived from the findings and analysis done in previous chapter. After that, the suggestion and recommendation for future study can be made.
If you are the original writer of this essay and no longer wish to have the essay published on the UK Essays website then please click on the link below to request removal:
More from UK Essays
- Free Essays Index - Return to the FREE Essays Index
- More Information Technology Essays - More Free Information Technology Essays (submitted by students)
- Information Technology Essay Writing Service -find out more about how we can help you
- Example Information Technology Essays - See examples of Information Technology Essays (written by our in-house experts)