The Effectiveness of Jantro as Security Provider

In: Social Issues

Submitted By alleyhon
Words 12620
Pages 51

A Thesis
Presented to
The Faculty

In Partial Fulfillment of the Requirements for the Degree
Bachelor of Science in


March 2014


The researcher would like to thank the following individuals and organizations for making this thesis possible. His instructor, Mr. , for refreshing the researchers’ minds regarding the value of research; The JANTRO Security Agency, for their assistance in the providing the data for this research; The librarians, for the use of available materials related to the study; Their loving friends and classmates, for their continued support and guidance; More importantly to the ABSOLUTE SPIRIT, who is the source of his constant inspiration, knowledge and wisdom.

The Researcher

Chapter 1


Background of the Study Security is essential for both residential property and commercial property in this day and age – and many people are turning to security guards. Security guards are not police, they work for private companies, usually to provide 24/7 protection of assets, and occasionally, people. They are able to focus their entire effort to this task, as they are not patrolling, checking drivers for various infractions or anything else that police do. Businesses would be wide open to criminal activity without security officers, because there would be little protection from the police. Security officers are citizens, and as such, may detain someone until the police arrive to transport them. The police may have the security officer place the person under citizen's arrest, since the detainee did not commit a crime in the presence of the police officer. Security officers work hand in hand with the police to provide another level of protection.
The security…...

Similar Documents

Effectiveness of Marine Logistics

...A COMPREHENSIVE PROJECT REPORT On Effectiveness of Marine Logistics Submitted to S.R. LUTHRA INSTITUTE OF MANAGEMENT IN PARTIAL FULFILLMENT OF THE REQUIREMENT OF THE AWARD FOR THE DEGREE OF MASTER OF BUSINESS ADMINISTRATION In Gujarat Technological University UNDER THE GUIDANCE OF Faculty Guide: Company Guide: Ms. Parinaz Todiwala Mr.Pravin Dixit Assistant Professor MD (Kshitij Marine Services Pvt. Ltd.) Submitted by Ms. Harshita Kakar [Batch No. 2011-13, Enrollment No. 118050592001] Ms. Nupur Mishra[Batch No. 2011-13, Enrollment No. 118050592005 ] MBA SEMESTER III S.R. LUTHRA INSTITUTE OF MANAGEMENT - 805 MBA PROGRAMME Affiliated to Gujarat Technological University Ahmedabad December, 2012 Company Certificate (For Sem. 3) (On Company Letterhead) This is certified that Ms. Harshita Kakar and Ms. Nupur Mishra from S.R. LUTHRA INSTITUTE OF MANAGEMENT, are carrying out the research on the subject titled “ ” at this company / organisation under the supervision of Mr. Pravin Dixit, from Sep, 2012 to Dec, 2012. I also certify that, the above mentioned students have carried the research work satisfactorily. Place: - Surat Date: - _________ ( to be announced later on) ________________ (Name & Designation) Students’ Declaration We, Ms. Harshita Kakar......

Words: 10028 - Pages: 41

Internet Security

...improve the efficiency and effectiveness of the health care system, the health insurance portability and accountability Act of 1996 (HIPAA), law 104-191, enclosed administrative Simplification provisions that needed Department of Health and Human Services to adopt national standards for electronic health care transactions and code sets, distinctive health identifiers, and security. At the same time, Congress recognized that advances in electronic technology may erode the privacy of health data. Consequently, Congress incorporated into HIPAA provisions that mandated the adoption of Federal privacy protections for identifiable classifiable health data. HHS published a final Privacy rule Dec 2000 that was later modified in August 2002. This Rule set national standards for the protection of individually identifiable health data by three types of covered entities: health plans, health care clearinghouses, and health care providers who conduct the quality health care transactions electronically. Compliance with the Privacy Rule was needed as of April 14, 2003 (April 14, 2004, for little health plans). HHS published a final Security rule in 2003. This Rule sets national standards for safeguarding the confidentiality, integrity, and availability of electronic protected health data. Compliance with the protection Rule was needed as of Apr 20, 2005 (April 20, 2006 for little health plans). OCR administers and enforces the Privacy Rule and also the Security Rule. other HIPAA......

Words: 424 - Pages: 2

Data Security

...Data Security and Privacy Act Data security & privacy has varies of roles and responsibilities to prevent financial crimes. Financial crimes can include telemarketing scams, investment or pension fraud, credit card fraud, and insurance fraud. However, it is the company decision on how much personal protection is needed to secure its customers financial investments. Moreover as who is suppose to make this decision for financial protection falls under corporate security. These decisions are very important because businesses, as well as individuals, can be victims of financial crimes and face serious financial loss. In this recent ongoing decade because of the fear of big government and the fear of privacy intrusions through the internet and internet commerce, across all enforcement agencies, data security and privacy are high priorities. The Obama Administration has made enforcement of data security and privacy a top priority. In this modern day age, updating the Healthcare Insurance portability & Accountability Act is recently now highly recommended. The healthcare industry is already familiar with data security and privacy restrictions. We the people in the United States of America is living in an information technology era, with increasing automation of electronic medical records, clinical systems, and medical imaging, as well as growing regulatory pressures, it is a challenge for healthcare providers to protect the privacy of patient data and secure their......

Words: 601 - Pages: 3


...Michigan Technological University Information Security Plan The Information Security Plan establishes and states the policies governing Michigan Tech’s IT standards and practices. These policies define the University’s objectives for managing operations and controlling activities. These top-level policies represent the plans or protocols for achieving and maintaining internal control over information systems as well as compliance with the requirements imposed on the University. INFORMATION SECURITY PLAN Approval by Information Security Board of Review Members Information Security Plan Rev: 3 – 10/13/2011 Page 1 Information Security Plan Table of Contents 1 2 3 4 5 6 7 8 EXECUTIVE SUMMARY ................................................................................................................. 4 PURPOSE............................................................................................................................................. 4 SCOPE .................................................................................................................................................. 5 DEFINITIONS ..................................................................................................................................... 5 IT GOVERNANCE COMMITMENTS & RESPONSIBILITIES .................................................. 6 UNIVERSITY POLICY STATEMENT .........................................................................................

Words: 10423 - Pages: 42

Information Security Policy for E-Government in Saudi Arabia: Effectiveness, Vulnerabilities

...Information Security Policy for E-government in Saudi Arabia: Effectiveness, Vulnerabilities and Threats [Name of the Writer] [Name of the Institute] Executive Summary Introduction: In many countries, the implementation of the E-Government has proved to be useful in providing efficient services to the consumers. This increases the speed of the work and does not cause any unnecessary delays. All these aspects matters for the efficient service of the Government work. In the end, it proves to be beneficial for both Government and the citizens living in Saudi Arabia. Therefore, in this study, all the issues related to the Information Security Policy will be discussed in detail. The research study is worth for a number of reasons. Firstly, it will help in assessing the degree of effectiveness of the present security policy, security holes in the policy, and threats not addressed by the policy. It, in turn, would help in coming up with measures of ensuring that the policy is security-oriented, which increases citizens’ confidence in using e-government services. Literature Review: The primary purpose of producing literature review is to support the findings of this study via the theoretical justifications obtained from literature. The review revealed that in Saudi Arabia, there is the absence of agencies to monitor the accountability of e-government services. Most of the workers of offices in Saudi Arabia lack professionalism, and this is a great weakness in the......

Words: 10327 - Pages: 42

Katniss the Provider

...Name Teacher English IV 29 April 2013 Katniss the Provider Katniss Everdeen has quickly become famous heroine. She had a large amount of factors that helped her win the hunger games. Her role as a provider in her family helped her in many ways. Not only did she have the knowledge to be able to thrive, and survive in the wild; she also knew she had to win the games to return to district twelve, and protect her sister, Primrose Everdeen, and their mother. Since her father died when she was the age of twelve, she knew that she would have to take his place in the family. Before he died her father taught her all he knew about hunting. This is where she received all of her skills (SparkNotes Editors). Katniss’ role in her family was just as a father would be. She was the provider, caretaker, and essentially the backbone of the family. Katniss would hunt and gather food to either feed her family or sell to earn money. With her being a hunter, she had amazing archery skills. This gave her a huge advantage in the games (Bethune 1). This allowed her to get food for herself. Also, with her knowledge of nature, she knew what was edible and what was not edible (Bethune 1). This saved her and Peeta from eating poisonous berries, unlike their counter-parts who lost their life this way. So in a way, she was also a provider for Peeta. Since Katniss and Peeta were from the same District, they had a naturally formed bond, or alliance. Alliances also played a huge role in helping Katniss...

Words: 1001 - Pages: 5

Security and Compliance

...Security regulation compliance is intended to help institutions comply with the interagency guidelines that establish information security standards. By compliance, an organization summarizes its obligations to protect customer information and illustrate how certain provisions of the security guidelines apply to its particular situations. Some organizations still receive little management support or funding for a sound information security policy program. Over the last few years several Federal, State, and international guidelines have been approved about the security of information. Numerous establishments are now enhancing their information security procedures in reply to legal and regulatory necessities. In particular cases, these guidelines are very precise about the requirements for transcribed security and privacy policies. In other instances a law merely necessitates precautions that are suitable for the size and type of organizations (Gross, 1964). In these cases, enforcement agencies and auditors must accede to admit best practices for control all of which entail written policies. Illustrations of these are the Accepted Information Security Principles (GAISP), Control for Information Technology (COBIT) and ISO/IEC 17799. At the heart of the regulation is the intent of guarding the privacy, integrity and availability of information that influences corporate stakeholders. These laws can be narrowed down to their essential goals that include the establishment and......

Words: 2408 - Pages: 10

Providers and Patients

...Can we talk, please? June 19, 2013 HCS 320 Professor Peter Maybrey With most relationships, effective communication is key. Wither having a conversation with a spouse, a child, a friend, a family member or a health care provider, it is very important to communicate efficiently. Things that are discussed can change many actions in the future. If someone is talking to a health care provider, they should be open and honest about their issues and expectations. Health care providers are not there to judge a person and their actions, they are there to help with the situation at hand. Being able to communicate with another person about your health is important. It is not just about physical health, but your overall well-being. Effective communication can take practice. It is not an easy concept to learn, and even though you may be trying to communicate, it can sometimes still come across unclear. You should pay attention to the speaker, watch their body language, facial expressions, and make eye contact. This lets the speaker know you are listening and they can see if you are understanding what they are trying to explain. “Effective communication helps us better understand a person or situation and enables us to resolve differences, build trust and respect, and create environments where creative ideas, problem solving, affection, and caring can flourish. As simple as communication seems, much of what we try to communicate to others—and what others try to communicate......

Words: 751 - Pages: 4

Effectiveness of the Aircraft Movement Areas Security Screening Procedures of the Airport Police Department at the Ninoy Aquino International Airport

...recorded terrorist act was on September 9, 1949, when a bomb was placed and exploded in a Quebec Airways flight in Canada. Since that first recorded aviation security breach, security experts had been trying to be one step ahead of the terror groups in hardening aircraft and airport targets against all forms of terrorist attacks. However, on July 22, 1968, three gunmen from the Popular Front for the Liberation of Palestine (PFLP), hijacked a passenger airliner of the Israeli airline El Al, on a flight from Rome to Tel-Aviv, and demanded the release of their comrades-in-arms who were imprisoned in Israel. While this may not be the first case of civilian aircraft seizure during that year, this operation was qualitatively different in its content and ultimate aim. It was the first time that an aircraft had been hijacked not out of criminal motivation or for personal reasons, but with the specific goal of politically pressuring an opponent and using the incident as a propaganda message to bring a political cause to the world’s notice. Since the first recorded aviation security breach, security experts had been trying hard to harden aircraft and airport targets against all forms of terrorists acts. However, it took the World Trade Center terror act to make nation-states re-assess the threat situation against aviation security. Past incidents of attacks by disgruntled groups as well as by organized terror groups against airports and the rest of the airline industry has proven that......

Words: 17180 - Pages: 69

Develop Own Effectiveness and Performance

...| Develop Own Effectiveness And Professionalism | OCR Assignment | Phil Ayres4/4/2014 | Contents 1.0 Performance and Personal Goals 2 1.1 Obtain and review feedback from others on performance 2 1.2 Agree personal goals and participate in development activities to meet them 2 2.0 Teamwork Evidence 2 2.1 Effectively manage own time 2 2.2 Recognise and respect diversity, individual differences and perspectives 3 2.3 Accept and provide feedback in a constructive and considerate manner 4 2.4 Understand the responsibilities of colleagues 5 2.5 Identify obstacles to effective teamwork 6 3.0 Report 6 3.1 Identify the implications and applicability for the IT professionals of: 6 3.1.1 Data Protection 6 3.1.2 Computer misuse Act 9 3.2 List the professional bodies for IT 10 4.0 Legislation (Identify the impact on an IT organisation of legislation) 11 4.2 Processing of financial transactions 11 4.3 Health & Safety 11 4.4 Privacy, Confidentiality and Security 13 4.5 Copyright and Intellectual Property Rights 14 5.0 Organisation 15 5.1 list the aims and objectives of the organisation 15 5.2 State the organisation brand or image 15 5.3 Identify the organisation’s structure roles and responsibilities 17 5.4 identify potential improvements to working practices 19 Appendix A1 – Copy of Appraisal 21 1.0 Performance and Personal Goals 2.1 Obtain and review feedback from others on performance See appendix A1 for......

Words: 1969 - Pages: 8


...Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Systems Owners Have Security Responsibilities Outside Their Own......

Words: 93588 - Pages: 375

Effeciency and Effectiveness

...Efficiency and Effectiveness What is efficiency in comparison to efficient? Efficiency is the quality or property of being efficient in extent to which the quality is exercised. Efficiency is often about process improvements within the organization but also efficiency for citizens. Whereas, efficient is the acting or producing effectively with a minimum of waste, expense, or unnecessary effort (Rentzepopoulos, P. & Vassilia, O. 2010). How efficient and effective have E-government been over the past few years serving its peoples’ needs? When measuring the efficiency and effectiveness of E-government, there are many factors in determining how satisfied are customers, businesses, and administration employees when using technology to accomplish the job or receive assistance over the Internet. In terms of efficiency and effectiveness, there are three areas that have been emphasized on, such as it reduces administrative burden for citizens and businesses, it improves the organizational processes, and it reduces the carbon footprint of government output. From a citizen’s prospective, it eliminates the necessity for physical travel to government waiting in line to speak to a government worker. The processing time is quicker and the type of information or form a person is trying to pick up can be accessed from the government website at any location or time of the day. For example the people in Australia no longer have to contact their government in person or by telephone......

Words: 1086 - Pages: 5


...Effectiveness Susan Doan MGT/330 July 16, 2012 Cedrina Charbonnet M.A. Effectiveness Wal-Mart uses controls to effectively meet the needs of its customers, employees and supplies. They enable Wal-Mart to keep its edge in the business world as well as creating confidence among suppliers, employees and their customers. Effective management audits enable Wal-Mart to reduce prices and keep an edge over their competition. The effectiveness of this mechanism results in a decrease in audit risks. Internal and external audits are used to maintain audit compliance. Internal audits evaluate performance in the organization by using all functions of management. External audits involve external vendors performing an evaluation. (Bateman & Snell 2007) The creation of an internal auditing system using quality assurance methods helps to lessen the risk for each store. Market control involves pricing mechanisms that regulate activities in an organization: similar to economic transactions. (Bateman & Snell 2007). Market control involves pricing mechanisms that regulate activities in an organization. The use of this mechanism helps organizations establish market controls on a corporate and business level. Wal-Mart uses markets controls in its organization in order for their managers to set prices. Wal-Mart also uses market control as a way to show they can effectively show positive and negative effects in the marketplace... Performance standards are the first steps in......

Words: 398 - Pages: 2


...Abstract This paper compares the effectiveness of online forum discussion between quantitative and qualitative subjects offered to learners of Open University Malaysia (OUM). OUM adopted by OUM for its open and distance learning (ODL) comprises three components; self-managed learning, face-to-face interactions and online learning through myLMS to facilitate teaching and learning process. The nature of online learning requires high commitment from the learners, especially self-managed learning and collaborative online learning. Learning quantitative subjects such as mathematics or finance in a conventional environment is very demanding and it is difficult to grasp by a majority of learners compared to learning qualitative subjects such as management or marketing. The same problem existed in learning these subjects through e-learning. Therefore, interactions between the academic staff or tutors with the learners and also amongst learners are important. Thus, it is critical that quality and effective teaching and learning progression take place in online forum discussion. Community of Inquiry (CoI) is the most accepted model for online learning. The model as suggested by Garrison, Anderson and Archer (2000) stated that online learning occurs through the interaction of three domains: teaching presence, social presence and cognitive presence. Research findings indicate that there the mean score for all the three domains of CoI are relatively the same for both quantitative and......

Words: 2844 - Pages: 12

It Providers

... by managing all your asset types on a single platform.  Gain access to your applications from anywhere, at any time.  Energy Management  Turn your mainframe into an enterprise-wide service management hub.  Network and Service Assurance  Security, Risk and Compliance Management  Service and Infrastructure Analytics  Service Availability and Performance Management  Service Delivery and Process Automation  Manage composite applications and optimize application performance and service levels.  Storage Management  Virtualization Management  Tivoli has over 22,000 Tivoli clients worldwide, over 7,000 employees, and more than 2000 business partners XpertRule delivers advanced Business Rules Engine and Expert System software that helps organisations: • Automate Business Decisions, Strategies and Processes to improve the agility and performance of their operations. • Comply with regulations, policies, laws and legislations. • Deliver intelligent user......

Words: 850 - Pages: 4