Free Essay

Security

In:

Submitted By juscool
Words 2248
Pages 9
Michael Salmon postulates “industrial relations encompass a set of phenomena, operating both within and outside the workplace, concerned with determining and regulating the employment relationship”. J.T. Dunlop states “Industrial relations are the complex interrelations among managers, workers and agencies of the government”
Industrial Relation can arguably be viewed as the “Cinderella” branch or aspect of management, which overtime has emerged with its own high degree of importance. Many reasons surround the emergence of industrial relations as a subject matter and operational activity, both at the organizational level and academic level. Such as, the cost associated with disruptions and dislocations in production processes and systems over time as results of misunderstanding and mishandling of industrial conflict. In industrial relations, there are concepts (abstract ideas) which require subjective, value judgements (based on moral and ethics) for which there are no universally accepted criteria. Some of these concepts are; fairness/equity, power/authority, individualism/collectivism, rights/responsibilities and integrity/trust.
The term fairness in relation to IR allows the worker to challenge the decisions of the employer when they believe they are being treated unfairly. Equity on the other hand requires the employer to treat right with right. The concept of Fairness/Equity has always been raising eyebrows with questions like; A fair day’s wages for a fair day’s work? But wat is a fair day’s work? It is important for managers to recognize that while people are not equal, every employee is entitled to equal opportunity. It’s equally important to recognize the role your personal biases, however subtle, play in influencing the perceptions others form about your actions and behaviors. In decision making pertaining to an employee performance, capabilities, and potential, some would say that asking yourself these questions; it may assist with the outcome: How much of this is about the employee, and how much is about me? Does this employee deserve the benefit of the doubt? Is an extra push needed? Under what circumstances am I making this decision? Is the decision based totally on merit? Who else have I considered? What made me decide in favor of one employee over the other? Do I like or not like this employee? How is my biasness affecting my decision? Take for instance, a cashier that was hired at a prominent wholesale distributing company and is under a three month probationary period before becoming permanent. The employee’s contract is then terminated within one month of employment without a fair and appropriate performance appraisal. This concept of fairness/equity underlies the entire conduct of Industrial Relations and is most frequently related with considerations of pay and dismissals. The concept is so fundamental to IR that the IRA commands the court to use it in the determination of cases like the example given above. The Court can exercise its power by Section 10 (3) of the IRA: Notwithstanding anything in this Act or in any other rule of law to the contrary. Fairness is a relative and variable concept to examine the conduct of human relationships, it is about being free from favoritism and therefore equal treatment is expected. Look at procedural fairness in disciplinary matters. The principles of natural justice are used. These include the right to a fair trial. Thus he/she is presumed innocent until proven guilty. He/she has the right to appeal any decision against her and the right to be heard must be given to every employee by their employer. There are different meanings of fairness. Think about unfair behavior, unfair treatment, unfair statement, unfair action, unfair practice, unfair opportunity, and unfair policy. Where equity is concerned, it can be understood as the ratio of my inputs to the outcome equivalent to those around me.

The employment relationship is essentially a Power/Authority relationship. Power is the ability of a person or group to influence the beliefs and actions of other people. It is the ability to influence events, to get the other party to make a concession etc. Power can be personal power. Personal power most often comes from internal sources, such as person’s special knowledge or personal characteristics. Personal power is the primary tool of the leader. Power can also be legitimate or official power. This power comes from a formal management position in an organization. Authority is the legitimate use of power, in the absence of it there will be chaos and disorder in any institution. It can also be viewed as the right given to a manager to achieve the objective of the organization. A manager can’t do his work without authority. Authority is often legitimized by socialization. We were brought up to accept the orders of those appointed to govern us. To understand negotiations and the relationships (or common ground) that emanate, the study of power and its effect must first be fully understood. In our previous case, the cashier can use the power of her union to meet with her ex-employers with regards to her unfair and unjust dismissal. The power of a union revolves around collective bargaining over wages, benefits, working conditions, and also representing their members in disputes with management over violations of contract provisions, like our cashier. In other related or inter-related sources of power, we have reward power- which is having control/influence over the achievement of some goal/benefit which is desired by another, for example our friend Keshawn Walcott can display this kind of power after winning a goal medal for his achievement at the Olympics. Then there is coercion power- which is the ability to inflict some punitive measure against another, e.g. a judge has the power to determine whether the murder accused is sentenced to the death penalty. Also there’s referent- is having the personal attributes which lead others to defer in their decisions or opinions. A great example of a leader that displays this kind of power is Martin Luther King. And last, we have expertise- that is having particular knowledge which is considered superior to others. E.g. Albert Einstein. Power can only exist if there is reciprocal perception of power – if I feel stronger than you there is no guarantee that you feel weaker than me. The notions of power being legitimized through authority have important implications for IR; the use of power is perceived to be unacceptable while the exercise of authority is acceptable, and the rights or entitlements of workers are closely bound up with the exercise of power and authority: ( right to collective bargaining; right to consultation). The concepts Individualism/Collectivism, may be used to refer to three different aspects of Industrial Relations: management is free to treat employees as it sees fit or trade unions regulate the work situation on an equal footing; employees treated differently even if they are doing the same work or employees receive the same terms and conditions irrespective of their individual abilities or performance; the individual sees their economic well-being as a matter for his/her own efforts or the individual perceives a bond with the fellow employees and believes individual needs can only be met with collective action. This can be seen as the center of debate between ‘human resource management’ and ‘industrial relations’. Individualism allows employees to directly engage corporate management and negotiate wages, salaries and benefits. An employee can negotiate based on her individual merits and values to the company. On the other hand Individualism perspective of employment relationship mainly focuses on individualized rewards for employees and seems to discourage need for collective efforts. The putting of private or individual concerns above the common or collective interests; a theory that nothing exists but the individual self; or the principles that all actions are performed for the advantage of the individual. This action weakens the union’s bargaining power. In terms of the cashier, if she had gone to the union for representation on her own, the union may have problems building a case against the company. But if other people came forward with similar disputes with the same company, they can more than likely present evidential material against management and try the case. This is where collectivism comes in. Under the concept of collectivism, individuals choose to benefit from the collective bargaining power of a union. By combining with others, workers achieve more than when acting alone. Principle of control by people as a whole. Initially, waged work was no more than an extension of the master/servant relationship. The master treated with employees on an individual basis (individualism). Eventually, workers were forced to combine their efforts to better their welfare (collectivism).

The difference between Rights/Responsibilities is, a right is a freedom that is protected, a just or legal claim or title, which is due to anyone by law, tradition or nature. Rights are not absolute- ie freedom of speech but not immune from slander or libel. I have the right to stop work but the work must first pose a threat to life and limb. Management’s right to manage- one of the most fundamental “rights” issues in IR. “This is an area of decision-making over which management believes it should have (and acts as if it does have) sole and exclusive rights of determination” (Storey). It is against this right that the rights of workers have to be judged. Whereas responsibilities, is defined as a duty/ obligation (eg. To take up grievances) or having control over something (I have a responsibility to my superiors). Employers and employees have responsibilities to each other, they should also expect their rights to be upheld. These rights and responsibilities relate to areas such as health and safety, the provision of Terms and Conditions of employment, Equal opportunities and the right to be paid minimum wage. Employees are expected to receive the terms and conditions of their work setting out when their work commences, what their main duties are, who they are accountable to, rates of pay, and other entitlements. Employees also have the right to work in a respectable inclusive work environment free of discrimination. There are many questions surrounding the fact that an employee should or shouldn’t be discredited or dismissed because of their medical or native background. Employers should also exercise their responsibilities to protect their employees against such discriminants. For example, employees should not make offensive jokes or comments based on a co-workers race, gender or any other protected ground under the AHR Act. Employers cannot require employees to ‘sign away’ their human rights. Equal opportunities legislation sets out that all employees should receive the same pay and conditions for carrying out the same or broadly similar work (fairness and equity). If this concept is breached or not carried out in accordance to the law, the employee has the right to consult their union and organize measures to correct the informalities or bring justice to the injustice. Questions like “Must a right carry with it some equal and opposite responsibility? I have the right to strike, but do I have a responsibility not to harm innocent by standers? Would you take away my right if the exercise of this right is deemed unacceptable to others?” plague IR studies everyday.

A workplace that is characterized by suspicion and lack of trust is not likely to be a happy or productive place. A healthier workplace is created when both management and workers are consistent in their actions, open and productive in their attitudes and honest in their dealings with others. With the concepts Integrity/Trust, the phrase “it’s a matter of principle” is often a matter of ad hoc expediency. A solid foundation of trust is necessary of an organization to be effective, especially in today’s work environment. Innovation cannot thrive in places where people are reluctant to share creative ideas in fear of criticism or lack of support. Trust may also be established between people rather than organizational collectives called ‘management’ and ‘unions’. It is difficult to establish trust but easy to lose it. Whereas Integrity, can be defined in terms of the individual acting in accordance with his/her personal values and belief rather than some universally accepted code of conduct. It also means honesty, openness, and transparency. We just have to look at our personal experiences to see how important these factors are in building trust and sustaining relationships. People don’t give their best to someone they don’t trust. Take for example the manager of Shermica’s Wholesale Enterprise, asked employees to work overtime for two weeks to make back productions lost due to system failure the past week. Workers agreed to work the extra hours only if double time was added to their salaries which management signed to. After the one week past, management circulated a memo stating that they are not paying double time, but in fact the employees were to receive regular pay for their overtime work. Due to this move taken by management, employees felt betrayed and had in fact lost trust in their superiors. Management’s integrity was also tarnished. This concept does not imply that management has to keep their word or agreement. It just suggests that it helps with work production and all in all a better work environment. Integrity and Trust are two key ingredients in developing relationships in Industrial Relations. Today’s successful organizations need a performance management system that drives focus and clarity by linking individual performance to strategic priorities and organizational values. This helps create an environment of openness, trust, and involvement, which helps foster personal growth and organizational commitment.

Similar Documents

Free Essay

Security

...Assignment 1 Lee Holland Identify what you see as the main purpose of security management and discuss what is meant by the statement that ‘security measures must be commensurate with the threat’. Within this essay I seek to break down the main assignment into the two phases that are within the title, the first being; What is the main purpose of security management? a role that to some would be undervalued, inconvenient, poorly funded and a hindrance, where to others, it is an effective, well-co-ordinated and highly desirable position, which when funded correctly, will have a positive effect on an organisations financial goals in the aid of preventing the loss of their assets through ways that were not before protected, this both in the corporate business and the commercial world. A reliable and effective security function is an asset to any organisation wishing to protect their tangible and intangible assets from compromise. In the second phase I will discuss what is meant by the statement that “security measures must be commensurate with the threat” In a world where the threats are changing daily, it is imperative that security procedures, policies and counter measures are kept up to date, and in line with the current rules and regulations of the security industry, they must also work within the National law within the county that they might be operating in. With financial constrictions and fierce competition within the business world it is only natural that an organisation...

Words: 685 - Pages: 3

Premium Essay

Security

...the CSO or Chief Security Officer. The CSO reports to the Board of Directors directly, hence cannot be influenced by the CEO or the CFO. According to the guideline by ASIS, this is the best model for a position that is as critical as the Chief Security Officer. Our CSO has been trying to add security to the culture of the company, and so far, it has been working. Being that the department is very new (about 1 year old), the security policies are now part of the human resources new hire packet. During their orientation, every new employee has to listen in on about 30 minutes of presentation that is security related, in addition to the normal company and culture orientation. The policies and procedures are now also embedded in the company intranet, and everyone has to sign a letter that says they read everything about the company’s security policies and procedures. This part also complies with the ASIS CSO guideline of bringing security into the company culture. According to the guideline, there is physical security that is handled by the CSO through his Facilities Director, as well as information security that is handled by the Information Security Director. They both report to the CSO (although the facilities director also reports to the Vice President of Human Resources). The company also has a Legal General Council, but this position reports directly to the CEO. The CSO regularly liaises with the General Council on all legal matters relating to the security department. Since...

Words: 561 - Pages: 3

Premium Essay

Security

...Security policy & standards Name Institution Course Instructor Date Part A In the current system, the following would be threats to the various components. THREATS TO SERVER Hacker Hacker is a general term that has truly been utilized to portray a machine programming master. All the more as of late, this term is regularly utilized as a part of a negative approach to depict a person who endeavors to increase unapproved access to system assets with pernicious plan. Black hat Black is an alternate term for people who utilize their insight into machine frameworks to break into frameworks or systems that they are not approved to utilize. Port Redirection Port redirection assaults are a kind of trust misuse assault that uses a bargained host to pass movement through a firewall that would overall be dropped. Consider a firewall with three interfaces and a host on every interface. The host on the outside can achieve the host on people in general administrations section, however not the host within. This openly open fragment is normally alluded to as a neutral ground (DMZ). The host on people in general administrations fragment can achieve the host on both the outside and within. In the event that programmers had the capacity bargain people in general administrations fragment host Theft of Service The likelihood of maverick utilization of a system association. Numerous hosts run the Dynamic Host Configuration Protocol (DHCP), by which...

Words: 1684 - Pages: 7

Free Essay

Security

...In this age where everything is computerized and or internet based, people spend more time on their pc’s than ever. You can pay your bills, email, perform financial transactions with the bank, social network, shop, get a degree, and the list goes on. These activities involve the transmission of sensitive data over the network and open the door for criminals to steal your valuable personal information. Knowing how to stop these thieves is important. The purpose of this report is to address a few of these security issues and discuss ways to prevent attacks from occurring. Users pose the largest security threat to a pc. Users go out on the internet, haphazardly clicking away on links that could open their pc for an attack. Malware, phishing scams, bot herding, viruses, and worms are just a few of the ways that your pc can be attacked. First and foremost is the user needs to understand that they must use caution when accessing the network. Follow sensible rules such as, don’t open email from strangers, don’t click on strange links, and don’t walk away from the pc without logging out. Never give out passwords, and change passwords often. Every 30-90 days is good and make sure you create strong passwords. As a rule of thumb, only give users access to the specific files and folders that they need. Use common sense when you are on the network and you can prevent malicious attack on your pc and protect sensitive information. Another way to protect your pc from malicious attack...

Words: 693 - Pages: 3

Premium Essay

Securities

...SECURITIES What is meant by ‘Securities’? The definition of ‘Securities’ as per the Securities Contracts Regulation Act (SCRA), 1956, includes instruments such as shares, bonds, scrips, stocks or other marketable securities of similar nature in or of any incorporate company or body corporate, government securities, derivatives of securities, units of collective investment scheme, interest and rights in securities, security receipt or any other instruments so declared by the Central Government. What is the function of Securities Market? Securities Markets is a place where buyers and sellers of securities can enter into transactions to purchase and sell shares, bonds, debentures etc. Further, it performs an important role of enabling corporates, entrepreneurs to raise resources for their companies and business ventures through public issues. Transfer of resources from those having idle resources (investors) to others who have a need for them (corporates) is most efficiently achieved through the securities market. Stated formally, securities markets provide channels for reallocation of savings to investments and entrepreneurship. Savings are linked to investments by a variety of intermediaries, through a range of financial products, called ‘Securities’. Which are the securities one can invest in? Shares Government Securities Derivative products Units of Mutual Funds etc., are some of the securities investors in the securities market can invest in...

Words: 710 - Pages: 3

Premium Essay

Security

...Kudler Fine Foods IT Security Report Area of System | Threat | Potential Vulnerability | IT System | Targeted Attacks – specifically designed to penetrate a particular organization, and focus on gathering specific information. | Used to gather information with monetary value for example, customers personal information. Name, address, phone numbers, and social security numbers. | | Privacy Threats - That puts both personal data at risk and raises bigger questions about the proper use of aggregated data companies use for promotional purposes. | The internet allows users to bank, shop, and socialize online which requires users to disclose customer information putting personal data at risk | | Fake Security Certificates - cybercriminals have been able to issue fake certificates for their malware using so-called self-signed certificates, and they have also been able to successfully breach the systems of various CAs and use stolen certificates to sign their code. | Make a fake website seem like it is a legit service | | Mobile Malware – about 90% of mobile malware is targeted toward Android based devices. Android is widely used, easy to develop for, and users of Android are able to download apps from anywhere they choose. On the other hand, iOS is a closed file system, allowing the download and use of apps from just a single source, the App Store. | Customer using their mobile devices to store their loyalty card must be aware that mobile phones are also targets for...

Words: 327 - Pages: 2

Premium Essay

Security

...Security Students Name Institutions Name How to resolve a security issue in a situation where the need for security is great but the available funds are limited Community participation is a very important aspect in enhancing security. Through the community’s leaders individuals can be sensitized on the need to protect each other and also help them to create a ‘we’ feeling in the management of the important resources in a region. This will enable the community members to identify with the resources and wealth of a region and hence strive to protect it by all means. Governments and administrative officials should also involve the locals in making of decisions that are of utmost importance to the people’s welfare (Bakari, Magnusson, Tarimo, & Yngström, 2006). The benefits if personnel in security management develop skills as educators for their organization's security Having high skilled employees who are given the potential to grow their expertise is a great benefit to any organization. An organizations success can often be attributed to individual expertise and skills of its employees. The benefits are as follows: 1. Cuts on the costs of hiring external consultants; many organizations spend a lot of money in hiring third party consultants to cover essential tasks within the organization such as periodic network vulnerability scans and developing security programs. The cost of sending employees to the requisite training may be relatively cheaper (McCoy & Fowler...

Words: 1066 - Pages: 5

Premium Essay

Security

...Security is an intentional process of securing anything from expected jeopardy. It is a condition in result of various protective measures. There are different aspects of security that ranges from personal life to national security. This is a separate department in large managements.   This is a condition that prevents unauthorized information or people from having access to confidential or personal areas. Writing on this subject matter might not be difficult but writing well is surely. It’s not simple to comprehend a professional paper on such a diverse subject. It has various categories and concepts which need to be researched and studied properly to write an ample document.   Our company has been writing security term papers since long and it has experienced writers who know their job very well. Physical security, information security, computing security, financial security, human security or food security, writers at our company are skilled enough to produce highly authentic term papers on any one of these categories of security. No matter how difficult topic you have for your term paper we guarantee you quality in any case.   Writers at our company follow your given specifications keenly to produce desired papers. With us you don’t need to worry about the quality of your term paper because excellence is never compromised at our company. Just place your order with us and experience it yourself.   Services provided by our company include:   ...

Words: 295 - Pages: 2

Premium Essay

Security

...White Paper IT Security Risk Management By Mark Gerschefske Risk Analysis How do you predict the total cost of a threat? Is it only the cost to restore the comprised system and lost productivity? Or does it include lost revenue, customer confidence, and trust of investors? This paper provides an overview of the risk management process and its benefits. Risk management is a much talked about, but little understood area of the IT Security industry. While risk management has been practiced by other industries for hundreds of years, little historical data exists to support qualitative analysis in the IT environment.1 The industry approach has been to buy technology without really understanding the potential underlying risks. To further complicate matters, new government regulations create additional pressure to ensure sensitive data is protected from compromise and disclosure. Processes need to be developed that not only identify the sensitive data, but also identify the level of risk posed due to noncompliance of corporate security policies. Verizon has developed security procedures based on industry standards that evaluate and mitigate areas deemed not compliant to internal security policies and standards. Through the use of quantitative analysis, Verizon is able to determine areas that present the greatest risk, which allows for identification and prioritization of security investments. Risk Mitigation Process The Risk Mitigation Process (RMP) is a part of risk management...

Words: 2021 - Pages: 9

Premium Essay

Security

...above to submit your assignment. Term Paper: Chief Security Officer Due Week 10 and worth 200 points You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that all information and data assets are not compromised. Knowing the concepts that are presented in the course, you will develop a plan to carry out a security program that deters computer crimes, establishes a process for investigation and outlines which laws are applicable for possible offenders. Write a 8-10 page paper in which you: Research the Internet for recent computer hacker attacks or other crimes that have been committed against higher educational institutions. Analyze the processes put in place by other higher education institutions in order to prevent these crimes from reoccurring. Recommend processes, methodologies, or technology that can be purchased to lower computer crime threats. Include specifics on pricing and the level of support and maintenance that would be required. Research the Internet for current laws and government agencies that exist in your region that address the threat of computer cyber-crimes. Identify the laws that would be effective to convict offenders. Determine what computer crime fighting government programs exist within your region that can complement your security operations. Research the internet for computer forensics...

Words: 317 - Pages: 2

Free Essay

Security

...Raymond D. Jambalos BSIT Physical Security measures every organization should take Lock up the server room Even before you lock down the servers, in fact, before you even turn them on for the first time, you should ensure that there are good locks on the server room door. Of course, the best lock in the world does no good if it isn’t used, so you also need policies requiring that those doors be locked any time the room is unoccupied, and the policies should set out who has the key or keycode to get in. Set up surveillance Locking the door to the server room is a good first step, but someone could break in, or someone who has authorized access could misuse that authority. You need a way to know who goes in and out and when. A log book for signing in and out is the most elemental way to accomplish this, but it has a lot of drawbacks. A person with malicious intent is likely to just bypass it. A better solution than the log book is an authentication system incorporated into the locking devices, so that a smart card, token, or biometric scan is required to unlock the doors, and a record is made of the identity of each person who enters. A video surveillance camera, placed in a location that makes it difficult to tamper with or disable (or even to find) but gives a good view of persons entering and leaving should supplement the log book or electronic access system. Surveillance cams can monitor continuously, or they can use motion detection technology to record only when...

Words: 1226 - Pages: 5

Premium Essay

Security

...Project Part 1 Multi-Layered Security Plan | NT2580 | | James Maus | 8/21/2015 | In the process of emerging a mulit-layered security plan, you will need to see the seven domains of the IT set-up. The security will be increased on each of the domains. Security increase on the seven domains increases complete security of the system and build a mulit-layered security plan. Only the users can negotiate the system in the user domain. Easy passwords can cause a lot of problems so we will need to use difficult passwords with eight characters and up. Passwords will include special characters with capitals and lowercase. A limit to how long you can use the password and to only a one time password use. Workstations will have antivirus and malware protection installed. Since laptops are very weak and easy to get lost or stolen, the companies will have a converted hard drive so only the owner can recover the data. On the LAN domain, you should never open any scam emails when on company systems. To reduce email malware, you should add spam filters to stop junk email and reduce employee mistakes. On the LAN to WAN domain, we should switch the FTP to secure FTP so only our suers can have access to the FTP server. On the WAN domain there should be firewalls put in place on the network to filter inbound traffic. In the case of the Richman investments, network of\ any kind of traffic that is coming in and out is not needed will be stopped by a firewall. Reference Courtesy of...

Words: 444 - Pages: 2

Premium Essay

Security

...Recruiting and Selecting Quality Security Employees for security job position Contemporary Issues in Security Management Abstract For years, recruitment and hiring methods have been deemed by dated by human resource managers but are realizing that different strategies and methods are need to attract millennials. Hiring qualified personnel has become an essential component in an organization foundation. This paper will explore multiple articles that provide techniques on how to recruitment and hire candidates from college graduates, apprentices, and novices to the security profession and presents key components of innovative approaches and traditional human resource techniques, and training policies that will meet any small or large business goal of highly hiring qualified candidates. In addition, it will highlight techniques, practices and, lessons learnt in enhancing a company’s ability to attract, hire, retain, and improve human resource practices, improve human resource development and human resource capabilities in today’s security career field. Keyword: Employees, Hiring, Human Resources (HR), Security Recruiting and Selecting Quality Security Employees in the security field Currently there is a high demand for security professional specializing Cybersecurity, Personnel Security, Physical Security, and Industrial security and many other security jobs. The issue is attracting, hiring, retaining people that have...

Words: 3616 - Pages: 15

Premium Essay

Security

...Security Students Name Institutions Name How to resolve a security issue in a situation where the need for security is great but the available funds are limited Community participation is a very important aspect in enhancing security. Through the community’s leaders individuals can be sensitized on the need to protect each other and also help them to create a ‘we’ feeling in the management of the important resources in a region. This will enable the community members to identify with the resources and wealth of a region and hence strive to protect it by all means. Governments and administrative officials should also involve the locals in making of decisions that are of utmost importance to the people’s welfare (Bakari, Magnusson, Tarimo, & Yngström, 2006). The benefits if personnel in security management develop skills as educators for their organization's security Having high skilled employees who are given the potential to grow their expertise is a great benefit to any organization. An organizations success can often be attributed to individual expertise and skills of its employees. The benefits are as follows: 1. Cuts on the costs of hiring external consultants; many organizations spend a lot of money in hiring third party consultants to cover essential tasks within the organization such as periodic network vulnerability scans and developing security programs. The cost of sending employees to the requisite training may be relatively cheaper (McCoy & Fowler...

Words: 1066 - Pages: 5

Premium Essay

Security

...Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization. As noted by the Institute for Security and Open Methodologies (ISECOM) in the OSSTMM 3, security provides "a form of protection where a separation is created between the assets and the threat." These separations are generically called "controls," and sometimes include changes to the asset or the threat.[1] Perception of security may be poorly mapped to measureable objective security. For example, the fear of earthquakes has been reported to be more common than the fear of slipping on the bathroom floor although the latter kills many more people than the former.[2] Similarly, the perceived effectiveness of security measures is sometimes different from the actual security provided by those measures. The presence of security protections may even be taken for security itself. For example, two computer security programs could be interfering with each other and even cancelling each other's effect, while the owner believes s/he is getting double the protection. Security theater is a critical term for deployment of measures primarily aimed at raising subjective security without a genuine or commensurate concern for the effects of that measure on objective security. For example, some consider the screening of airline passengers based on static databases to have been Security Theater and Computer Assisted...

Words: 436 - Pages: 2