StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

List and explain the three step risk analysis process and list resources - Personal Statement Example

Cite this document
Summary
This feeling was badly shattered when the terrorists succeeded in penetrating the US defenses without much effort. Nobody at that time had ever conceived the idea of using…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
List and explain the three step risk analysis process and list resources
Read Text Preview

Extract of sample "List and explain the three step risk analysis process and list resources"

SECURITY AND LOSS PREVENTION ID Number: of of School Submission: September 28, 2011SECURITY AND LOSS PREVENTIONBefore the September 11 terrorist attacks, the United States of America had felt a sense of security. This feeling was badly shattered when the terrorists succeeded in penetrating the US defenses without much effort. Nobody at that time had ever conceived the idea of using martyrs in a suicidal attack using passenger jetliners but this idea had a precedent when the Japanese had used it against the U.S. navy during the latter stages of World War II in a desperate attempt to at least delay their inevitable military defeat although kamikaze pilots were not very successful.

At any rate, it is always better to be prepared for any eventuality although admittedly, it is virtually impossible to prepare adequately for anything and everything. However, having good plans in place is better than having no plan at all that can deal with a contingency whenever it so happens. The most crucial part of security planning and loss prevention is critical thinking. This is the ability to think and ask the tough questions other people may hesitate to ask. Further, it is a way to get out of the box-mindset and adopt a different attitude from the business as usual.

In his book, author Philip P. Purpura postulates critical thinking as the cognitive ability of analysis, the interpretation, the explanation and the evaluation of ones own reasoning, to even include ability to question ones conclusions and judgment in a continuous process of assessment (2008, p. 4).In this regard, there is a highly-recommended three-step risk analysis process that is to be followed in order to have a good grasp of the security situation. It is the rational and orderly way of identifying a problem, determining its probability of occurring and finding solutions.

The objective of this process is to also estimate the loss in case of an adverse event happening. This 3 step process is discussed in much greater detail in the next page. Conducting a loss prevention survey – this first step takes into consideration all possible threats, hazards, vulnerabilities and weaknesses that can threaten security and survival. Purpose of this activity is to assess probable adverse events based on certain conditions such as weather, geography, fire protection systems, pending litigation, proximate presence of nearby hazardous materials (nuclear, chemical, biological, etc.) and all other identifiable threats to include social, political and economic conditions.

The survey is actually a questionnaire in the form of checklist to make sure everything is covered during the discussion and assessment of threats. Identifying the vulnerabilities – this is the result of the survey done earlier. By this time, it is now possible to narrow down on the threats most likely to occur based on high probability. This second step is to focus all attention and efforts on the most immediate threat from all other threats which had been considered in the survey questionnaire.

By identifying probable threats, it is now possible to prepare for this threat, such as taking the necessary precautions, stocking up of any materials (food, medicine, water, etc.) in case of natural calamities and inform the people.Determining the probability, frequency and cost – this third and last step is actually the admission that some events cannot be prevented at all but can be mitigated if plans are in place. An example would be a severe drought this year caused by changed weather patterns due to the global warming phenomenon and the resultant climate change.

It might be very unlikely for the same drought to hit next year in the same locality; it may be more probable that next year, there will be floods instead due to the alternating weather phenomena of La Nina and El Nino pattern. So, a security and loss prevention strategy would be to prepare for flooding so that scarce funds and other resources are put to the best use possible and maximized for the greatest benefit. Reference ListPurpura, P. P. (2008). An introduction: security and loss prevention (5th ed.). Burlington, MA, USA: Elsevier Butterworth-Heinemann.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“List and explain the three step risk analysis process and list Personal Statement”, n.d.)
List and explain the three step risk analysis process and list Personal Statement. Retrieved from https://studentshare.org/law/1580792-list-and-explain-the-three-step-risk-analysis-process-and-list-resources
(List and Explain the Three Step Risk Analysis Process and List Personal Statement)
List and Explain the Three Step Risk Analysis Process and List Personal Statement. https://studentshare.org/law/1580792-list-and-explain-the-three-step-risk-analysis-process-and-list-resources.
“List and Explain the Three Step Risk Analysis Process and List Personal Statement”, n.d. https://studentshare.org/law/1580792-list-and-explain-the-three-step-risk-analysis-process-and-list-resources.
  • Cited: 0 times

CHECK THESE SAMPLES OF List and explain the three step risk analysis process and list resources

Discuss the risk management process and its interactions with the project lifecycle

The aim of Risk management is to identify the potential risks that the company might face and develop resources for mitigating the adverse effects of such losses.... Risk management is a process that leads to identification of the uncertainties that may arise in the future and provide remedies and precautions for handling these risks.... The following paper, will throw light on crucial objectives of risk management, the process of risk management and interactions between risk management the project lifecycle....
9 Pages (2250 words) Essay

An Analysis of Supply Risk Assessment Techniques

The paper presents sustainability in the supply chain and risk analysis.... Risk Identification and analysis Over the years, supply chain management has had its fair share of changes providing the need of every business to stay keen on its goals in this highly competitive 21st century.... hellip; risk management is a concept that has existed in the corporate world over the years.... risk management is tied to different aspects of a product supply chain and the organization as a whole and thus determines the fate of the company....
10 Pages (2500 words) Research Paper

Tech Watt Value Risk Management

hellip; The Royal Institute of British Architects (RIBA) has a systemised process that serves as an industry standard to do such projects.... The author of the current case study "Tech Watt Value risk Management" explains that acquiring a new facility means adding value but taking the risk to do it.... This VRM Study is our set of working ideas at TechWatt to use for a smart plan, to optimise value and minimise risk, to foresee some possible problems and consider ways to deal with them, and to lose no value to risks; or lose as little value as possible....
17 Pages (4250 words) Case Study

Information Technology Project

Reasons for the project failures and their sufficient deeds for its avoidance are kept in focus while discussions and consultations with project managers and other resources likes books and Internet. Being an IT student, keeping only objectives in hand don't completes my traits.... This list along with the professional names holds their contacts, their references and name of people they are reference by.... list of samples; Questionnaire, and this document; all three helps to achieve successfully the fourth objective....
4 Pages (1000 words) Research Proposal

Human Resource Management

Describe and explain the role of performance appraisal in administrative decision making.... the three forms of sexual harassment are physical, verbal and visual.... Include a discussion of the three forms of sexualharassment and be sure to name and describe each in detail.... the three forms of sexual harassment are physical, verbal and visual.... list and describe the steps in conducting a job analysis.... Human resources management....
1 Pages (250 words) Research Paper

Managing hospitality and tourism projects

Project management is referred to the activity and process of planning, motivating, organizing, as well as controlling resources, protocols, and procedures to attain specific objectives in daily problems.... Cost benefit analysis involves first totalling the benefits and then evaluating these with costs related with the course of action.... The cost benefit analysis technique can be used in various situations such as in making decision whether to employ new member of team, during making evaluation of a novel project, and in determining the viability of assets or capital purchase (Layard and Glaister, 1994)....
18 Pages (4500 words) Essay

Computer Sciences and Information Technology

nbsp;… This assignment also focuses on what Technology Analysis is, describes and list the required activities for BPA, BPI, and BPR, what Activity Elimination is, what the objectives of Business Process Analysis Techniques are, what Outcome Analysis in BPR is and explains why Requirements Gathering using different techniques is important.... Another step is making effective interviews from various sources in order to acquire information for the requirements document....
12 Pages (3000 words) Assignment

Management and Information Security - Project Management Body of Knowledge

Duncan (2010) describes that PMBoK involves five process groups and nine knowledge areas.... Every process in project management contains a set of inputs and outputs and tools and techniques used in the process.... The process describes the monitoring and control of the time spent on a project.... Project time management enables one to; have a process of recording time within projects, make effective use of timesheets in monitoring staff, and the time they take in every project....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us