ΤΙ ΣΗΜΑΙΝΕΙ ROI for ROI

ROI for ROI σημαίνει Risk Observers International for Return on Investment.

Κάνει πράξη τη διαχρονική οδηγία του επιτυχημένου πολιτικού και στρατιωτικού ηγέτη της Μυτιλήνης και ενός των 7 σοφών της Αρχαίας Ελλάδος. Του Πιττακού του Μυτιληναίου.

<<Συνετών είναι πριν γενέσθαι τα δυσχερή προνοείσαι όπως μη γένοιτο, ανδρείων δε γενόμενα, εύ θέσθαι>>.

Και για το  << προνοείσαι>> αλλά και το  <<εύ θέσθαι>>, εμπιστευθείτε και επωφεληθείτε από τους Διεθνείς Παρατηρητές και (Αναλυτές) των Κινδύνων, της ROI, σε όλον τον πλανήτη, προκειμένου να  έχετε Επιστροφή στην Επένδυση, που κάνετε δηλ. ROI.

SECURITY MANAGEMENT:

 A. Security Management Process.

1. It is transacted, due four Basic Functions, supported by six Additional Functions.

The four (4) Basic Functions, are: the Planning- the Leading- the Organizing and the Controlling.

The six (6)   Additional Functions, are: Decision making – Communication- Coordination- Motivation – Delegation- Disciplining.

 B. The Risk Management Process,  is carried out through a process, which is comprised of four components, namely risk identification, risk financing, risk control and risk evaluation.

The relationship between SECURITY MANAGEMENT and RISK MANAGEMENT is that, of Zeus and Athena.

 C. Risks can be dealt with the following ways.

Terminate (or Avoid).

Tolerate  (i.e Accept).

Treat (i.e. Reduce).

Transfer.

The above mentioned ways, constitute the “4 T” method of the risk control, according Prof. Girt Du Preez, (1991-University of South Africa).  

D. Risk and Security relate to and influence, each other.

E. The 18 Basic Principles of Security (Risk or Loss Control). Or the 18 Basic Principles of Security Managing.

1. Avoidance.

2. Transfer.

3. Hoodwinking.                   

4. Deterrence.                      

5. Deflection.                        

6. Detection.                         

7. Delay.                                .

8. Assessment.      .

9. Reaction.

10. Location.

11. Surprise.                

12. Control.

13. Absorption of Losses.

14. Recovery of Losses.

15. Resuming Business Activities

16. Reporting.

17. Rectification of weaknesses.

18. Learning from the experience – Lifelong post training.

F. Bibliography.

1. G.T.Du PREEZ. <<Security Forum>>, Durban, BUTTERWORTHS, 1991.

2. Sp. KYRIAKAKIS. <<Lessons Strategic Command Security Course>> , New YorkCollege, 2011.

3. T.  LENHOFF . <<Risk Management>>, SECURITY TODAY, November 1995. 

TRAINING

Objective: The ability on choosing a suitable learning method and the implementation of a training model.

   A. A type of training like the mentioned on the title, consists an operative training and development procedure. There are three categories, of  an operative training and  development, strategies, according Sonja Swanepoel, (Human Resource Department, Technikon Pretoria- <<Interpersonal skills>> in  UNISA’s <<Security: An operational Introduction>>- 1999).

1st. On the job training. 2nd. Off the job training. 3rd. Various methods, that can be utilized effect organization development, where improvement in the enterprise’s, effectiveness is achieved, through modifications in individual and group, behavior. 

1st. On the job training.

The trainee receives training within his/her work environment and the training is usually directly related, to their job. Learning is by doing. It includes the next four (4) tactics.        

a. The  Coaching, also known, as counseling.

b. Job Rotation, under close supervision.

c. “Junior Boards”.

d. Apprenticeship Training.

The First one mentioned, (a. Coaching), includes 5 steps as next:

a. Instructor’s self preparation.

b. Trainee preparation with the relation of the  concrete training, to trainee’ s needs.

c. Presentation  of the tasks.

d. Try-out performance.

e. Follow-up.

2nd. Off the job training and development. It is  consisted of seminars or classroom activities, in  College or VocationalTrainingCenters or Laboratories  of Liberal Studies, non-degree programs. Universities’ non-degree programs.

The relevant tactics include:

a. The case study.

b. The Incident method.

c. Role-playing.

d. In- basket training.

e.Kepner-Tregoe,  technique.

f. Management Games.

g. Syndicate Training.

h. Conference Method.

i. Brainstorming.

j. Vestibule Training .

k. Lectures.

l. Computer –assisted instructions.

m. Assessments.

 3rd. Organization Development.

The present strategy include the techniques of:

a. Team Development.

b. Survey feedback.

c. Intergroup sessions.

B. Nadler’s Model.

It is a general model for training. (It has been introduced, by Nadler in  1982). The model contains nine – stages.

Sp. Kyriakakis added a tenth and an eleventh stage  

1st. Identification of the enterprise needs.

2nd. Evaluation and feedback.

3rd. Specification  performance.

4th. Identification of the training needs.

5th. Formulation of the training objectives.

6th. Compilation of a syllabus.

7th. Selection of the instructional strategy.

8th. Acquisition of  instructional resources.

9th. Presentation  of  training

10th. Evaluation.

11th. Post training circumstantial   guidance.

 

ΚΑΤΑΝΟΩΝΤΑΣ ΤΙΣ ΔΙΑΣΤΑΣΕΙΣ ΤΟΥ ΦΑΙΝΟΜΕΝΟΥ ΤΗΣ ΤΡΟΜΟΚΡΑΤΙΑΣ HΘΙΚΟΣ

ΚΩΔΙΚΑΣ ΕΠΙΧΕΙΡΗΣΙΑΚΟΥ ΠΡΟΣΩΠΙΚΟΥ ΑΣΦΑΛΕΙΑΣ

Visit Us On Facebook