Asset Protection Module
Asset Protection Module
TOPICS
1. The Management Function
2. Asset Protection- A Historical Perspective
3. Definition Of Assets Protection
4. Relation To Security and Other Disciplines
5. Influences in Assets Protection
LEARNING OUTCOMES
At the end of the lesson, you should be able to:
1. explain the function of management in the assets protection;
2. discuss the history of asset protection;
3. describe the assets protection;
4. distinguish the relationship of asset protection to other discipline;
and
5. explain the influences of assets protection.
Asset protection is the basis for everything that a protection officer does. It is the core
function of the protection officer’s job. Asset protection can have different meanings and functions
depending on the approach to protecting the asset, its location, and even the type of asset. Asset
protection has been practiced for millennia, whether it was protecting the Roman city with night
sentries patrolling the streets, to placing valuables into a modern safe. The most visible and easily
recognizable form of asset protection was the medieval castle. The castle was built to protect an
asset, be it the king or ruler, a precious metal such as gold, or as a point from which to help protect
the empire. Castles initially were quite basic, but as the risks escalated, they came to employ
additional layers of protection such as a moat, drawbridge, or defensive positions.
Protecting the assets of any corporation, institution or public interest today is a daunting
task -such efforts transcend traditional brick and mortar security concerns to include securing vital
intellectual property used in e-commerce and Internet applications in a global economy. Clearly,
the Web is redefining how we live our lives and how we need to secure the assets entrusted to
employees. In fact, the definition of what constitutes an employee is also changing and evolving at
a rapid rate. Temporary workers, contractors and joint venture employees are required to have
significant access to information, resources and various other tools previously reserved for full time
employees — exploding previous concepts of protecting assets and people. The role of the security
professional is rapidly changing in this environment and requires a combination of strategic
thinking, process management and the ability to implement programs and initiatives in increasingly
shorter periods of time to match the incredible pace of today’s business.
Macroeconomics teaches us that resources in any given situation are limited; thus, choices
must be made regarding the trade-off between the resources necessary to generate products, profits
and market share, and the assets required to protect them. The successful security practitioner
strikes the appropriate balance between these competing demands.
ASSET PROTECTION- A HISTORICAL PERSPECTIVE
From the earliest of times, humans have recognized the need to protect themselves, their
family and their property. Individuals or small groups living together provided the protection
until loosely organized tribes developed into more formal groups. As civilization began to
trace outlines of government in the sense that we would recognize it today, the need for forces
to maintain order was recognized. These forces were usually created to deal with the threat of
attack from other groups and not with problems of order within the primary group itself. The
raising of armies and their deployment to territorial borders was the initial method of establishing
group defense.
As local communities were further removed from the seat of central power and as more
individuals in those communities were strangers to each other, rather than close relatives, the
need became clear for some form of local order. This was done to preserve peace and enforce
laws made at distant regional or central capitals. Primitive forms of night watch and patrol
were developed, again to protect the community against outside attack. The idea of public
protection for purely private property did not take hold until after the industrial revolution
and even today is a concept of limited application. The proprietor of a private enterprise or the
owner of private assets is and always has been largely self-dependent for adequate protection
against all but major threats to the public peace.
Asset protection is a set of legal techniques and a body of statutory and common law dealing
with protecting assets of individuals and business entities from civil money judgments. The goal of
asset protection planning is to insulate assets from claims of creditors without perjury or tax
evasion.
For many people, the term assets protection suggests finance. Security professionals,
however, think of assets protection in a different, broader sense. In the security arena, one often
speaks of protecting three types of assets: people, property, and information. The larger view of
assets protection, however, also considers intangible assets, such as an organization’s reputation,
relationships, and creditworthiness.
In considering all of an organization’s assets and all potential hazards, both natural and
man-made, the security function should take the lead on some matters and play a supporting role
in others. This approach helps ensure that the security function is, and is seen to be, a value-adding
element of the organization. The greatest protection of corporate assets occurs when an appropriate
mix of physical, procedural, and electronic security measures is in place in relation to the assets
being protected. This creates an effective defense-in-depth asset protection program.
To security professionals, the terrorist attacks of September 11, 2001, represented the most
significant turning point in assets protection around the world. That attack
• led to increased security budgets and reduced constraints on security policies and
procedures,
• fostered communication between security officials and front-office executives, and
• enhanced threat awareness and vigilance by business managers and employees
In some cases, knee-jerk reactions to 9/11 wasted valuable resources. For example, one
company with facilities in several countries ordered each site to post a security officer at its
entrance. However, the new security officers had no idea of their roles and responsibilities and had
no way to communicate with other security staff at the sites. At best they were able to provide a
false sense of security. Similarly, after 9/11 many organizations spent much more than necessary
on security technology.
The shock of 9/11 also caused an overemphasis in terms of security solutions - on terrorist
attacks instead of the broader spectrum of realistic security risks. Even now, resources that could
have been dedicated to information technology (IT) security, information asset protection, and
traditional crime or loss prevention are being diverted to antiterrorism measures, such as blast-
resistant materials, stand-off zones, bollards, chemical/biological hazard sensors, and similar items.
Even in school security, interest in traditional, comprehensive assets protection has often given way
to preparation for terrorist attacks.
Over time, the 9/11 attacks have partly redefined assets protection. The following are some of the
beneficial changes:
• a change in public expectations and an increase in the level of security measures that the
public will tolerate
• an ongoing examination of personal privacy versus public protection
• more serious study of security and protective services budgets and strategies
• better information sharing within and between the security and law enforcement
communities, leading to improved crime-fighting capabilities.
• greater application of advanced technologies to threat analysis, vulnerability assessment,
information sharing, and protective measures
• more widespread discussion of strategic protection concepts incorporating risk management
and comprehensive assets protection
• more emphasis on security and assets protection research
Similarly, the 2001 anthrax scare in the United States led to much greater emphasis on the security
of mailroom operations. In addition, the Sarbanes-Oxley Act in the United States has required
publicly traded corporations to perform more extensive assessment and reporting.
LESSON 2
CURRENT PRACTICE OF ASSETS PROTECTION
TOPICS
1. Underlying Principles.
2. Practice of Assets Protection in Various Industry Sectors.
LEARNING OUTCOMES
At the end of the lesson, you should be able to:
1. understand the underlying principles in the current practice of
assets protection; and
2. compare the different practices of assets protection in various
industry sectors.
This section discusses two important issues in assets protection: the field’s underlying principles
and the practice of assets protection in various industry sectors.
UNDERLYING PRINCIPLES
One framework for viewing the underlying principles of assets protection states that three
concepts form a foundation for any assets protection strategy. Those concepts are known as the five
avenues to address risk, balancing security and legal considerations, and the five Ds.
1. Five Avenues to Address Risk
This concept contends that there are five distinct avenues for addressing identified risks to
assets: risk avoidance, risk transfer, risk spreading, risk reduction, and risk acceptance. Care-
fully considering these avenues is an effective way for assets protection professionals and
management to think creatively in designing ways to protect assets.
2. Balancing Security and Legal Considerations
Organizations need to find the right balance between a security approach and a “legal”
approach. Some enterprises rely entirely on legal measures, such as patents, copyrights,
trademarks, and service marks, to protect their critical information. They mistakenly believe
that with these legal protections in place, they do not need stringent security programs.
Alternatively, some executives believe a strong security program eliminates the need for legal
measures. Of course, both types of measures are needed. The legal approach must also consider
when and how incidents will be litigated, what preliminary measures must be in place for
successful litigation, and how litigation costs will be managed.
3. The Five Ds
This security approach complements the “legal”
approaches discussed above. In this concept, the first
objective in protecting assets is to deter any type of
attack. The second objective is to deny the adversary
access to the asset, typically through traditional security
measures. The third objective, if the first two fail, is to
detect the attack or situation, often using surveillance and
intrusion detection systems, human observation, or a
management system that identifies short- ages or
inconsistencies. Once an attack or attempt is in progress, the fourth objective
is to delay the perpetrator through the use of physical security and target
hardening methods, or use of force. Finally, in today’s terrorist environment
with more violent criminals, it may become necessary to destroy the aggressor
if the situation warrants it.
In short, assets protection should involve a comprehensive strategy not just piecemeal
elements (officers, close- circuit television, access control system, etc.)
PRACTICE OF ASSETS PROTECTION IN VARIOUS INDUSTRY SECTORS.
Many security principles and procedures are common across sectors,
geographic areas, and various sizes and types of organizations. However,
each particular industry has its own culture, environment, and issues that
influence assets protection.
Health Care Sector
Hospitals are open to the public 24/7 and tend to have an open environment.
Patients are vulnerable, and hospitals can be a high- stress environment for all concerned: patients,
visitors, and staff.
The most serious threats in health care involve workplace and domestic violence, threats,
harassment, internal theft, vandalism, extremist activity, fraud, threats to high-risk or high- profile
patients, and violence in emergency departments.
Health care security professionals can gain management support through these means (Stewart,
2006):
demonstrating a knowledge of hospital management issues and respecting the business
aspects of the enterprise maintaining a dialogue with management to ensure they
understand the hospital’s risks and vulnerabilities, as well as the assets protection program
itself
Whether security officers in health care settings should be armed is the subject of ongoing debate.
Educational Sector
Educational institutions range from preschools to universities and include both public and
private institutions. Schools at all levels have historically been viewed as somewhat insulated from
the ills of society, but in recent years more attention has been paid to school security.
At the lower academic levels, security responsibility may fall under the school board,
county or city, or local police department. Most colleges and universities maintain their own
security function, which may or may not be connected to the campus police department.
Educational institutions face a wide range of threats, such as assaults against students and
staff, facility damage, vandalism, theft of goods (computers, equipment, supplies, etc.), theft of
private information, attacks against IT, white-collar crime, liability, and natural disasters.
Universities also face the theft of research information.
At most schools, much of a security director’s time is spent on crisis management.
Evacuation planning, preparations for shelter-in-place situations, liaison with first responders,
awareness, training, and exercises are all critical in that environment. In addition, schools may be
called on to serve as community shelters or medical triage centers during disasters.
Universities include more than classrooms- they may also feature dormitories, restaurants,
stores, libraries, entertainment venues (clubs, theaters, bowling alleys, fitness centers, game rooms,
etc.), sporting facilities, worship centers, conference centers, and hospitals. Further security issues
are raised by the fact that some students may be living away from home for the first time and may
not behave as well as they should or show the right level of safety and security consciousness.
Universities also host many students from other countries, who may violate bans on certain exports
or may overstay their visas.
High crime rates, high-profile incidents, and a questionable campus safety record can harm
a university’s image and lead to a loss of students, revenue, grant money, and research projects.
Level Considerations
Preschool Health and safety Teacher/staff backgrounds Constant
student oversight
Potential for parental/stranger abduction
Because of the high employee turnover rate and the geographic dispersion of stores, security
training is both essential and difficult. Modern IT can enhance the company’s ability to conduct
safety and security training—for example, by facilitating distance learning. One focus of employee
training is simply teaching whom to call and how to report suspicious activity. Most companies
maintain toll-free hot lines. In addition, employee awareness can be bolstered using security
posters, changed regularly.
Telecommunication Sector
Assets protection in the telecommunications sector has changed in the wake of industry
deregulation; the boom in wireless, Internet, fiber optic, and other telecommunications
technologies; and, in the United States, the designation of the telecommunications system as a
national critical infrastructure. Assets protection in the telecom sector now encompasses four major
areas:
• Information security: protecting competitive and proprietary
information; protecting information about the telecommunication
infrastructure; and protecting voice and data signals
• Network and computer security: protecting networks from hacking
and other forms of cyber attacks; protecting computers and other
equipment from viruses
• Fraud prevention: protecting the company from toll fraud, calling card
misuse, and other frauds
• Physical security: protecting the people, places, and things that make
telecommunications networks function
Assets protection in telecommunications is greatly affected by government
regulation. Some jurisdictions mandate specific security practices, limiting the
ability of assets protection
Aerospace Sector
TOPICS
1. Technology and Touch
2. Globalization in Business
3. Standards and Regulation
4. Convergence of Security Solutions
5. Homeland Security and the International Security Environment
LEARNING OUTCOMES
At the end of the lesson, you should be able to:
1. explain the purpose of technology and globalization in assets
protection;
2. classify the standards and regulation;
3. demonstrate the convergence of security solutions; and
4. describe the homeland security and the International Security
environment.
This lesson examines five forces that are shaping the practice of assets protection:
• technology and touch
• globalization in business
• standards and regulation
• convergence of security solutions
• homeland security and the international security environment
Some of these forces are at least partially within an assets protection manager’s ability to influence,
while others are not. In either case, security professionals should study and leverage these forces
as they formulate tomorrow’s protective strategies.
Security solutions are often implemented haphazardly. Decision makers may buy
surveillance cameras or install card readers without an independent assessment or clear
understanding of the real needs. That approach addresses only the symptoms, not the cause.
Through advance planning and meaningful dialogue, the security professional can guide the
corporate decision makers on the best long term security solution for the company.
Security professionals should take the time to ask questions and determine what the actual
problem is and then create a comprehensive assets protection strategy, not a short-sighted quick
fix.
On the other hand, some people see technology as the solution to everything. Most common
functions today consist of several layers of technology. If something does not work, the tendency
is to add another layer of technology (Naisbitt, 2006). Careful examination of the problem might
show that a solution blending technology and other solutions (training, policies, or personnel) is
best.
The quality and quantity of electronic images (on television and in video games) tends to
desensitize people to real situations. Frequently seeing people attacked or killed may make those
events seem commonplace. The ramifications for security include a potential dampening of reaction
by security officers and others. For example, console operators might react less quickly to events
shown on their monitors because they see such things all the time in games or on television. The
delay may be aggravated by information overload as security staff are expected to monitor more
and more images.
When violence is considered normal, employees may not bother to report incidents or
suspicions to corporate security officials. Failure to report such matters promptly can make it more
difficult to stop such situations as workplace violence, terrorism, sexual harassment, and hate
crimes.
The perception of violence as normal can also affect the reaction of security officials. If
they become desensitized to crime and violence, they may take incidents less seriously or react
more slowly than they should.
Viewing technology as a toy can lead to a neglect of sound, risk-based assets protection
strategies. For example, one company installed biometric access controls on the entrance to each
of its office suites, even though there was no obvious need for high security. When asked why the
equipment was installed, a manager replied, “We thought it was cool.”
High technology plays an important role in assets protection, but it exacts ongoing costs,
such as training and maintenance. In many situations it makes sense to step back and take a “back
to basics” approach. For example, “Given a specific security challenge, imagine how you would
develop a solution if you had no access to technology at all. You can then think outside the box and
interject some traditional creativity into the problem-solving process” (Naisbitt, 2006).
We Live Our Lives Distanced and Distracted
Being surrounded by technology changes our relationship to other people. Assets protection
professionals must never lose sight of the people factor in identifying and protecting critical assets
(Naisbitt, 2006):
Any security issue involves human psychology—and always will. The issues of safety and security
are simply fundamental to every human being.
When planning for security, the professionals should always consider the culture of the
organization. … Does the corporate culture foster a sense of community? Do employees respect
and care for one another? Does the nature of their work allow them to develop relationships, or do
they work in a vacuum? How much human interaction is there?
In addition to the six preceding symptoms of high-tech intoxication, two other issues are worth
considering:
• whether the prevalence of security technology leads employees to shirk their
responsibility for protecting the organization’s assets because they think technology
will take care of those assets
• whether a high-tech environment depersonalizes the workplace and leads employees
to feel it is acceptable to commit pilferage, industrial espionage, fraud, embezzlement,
and other workplace crimes
The bottom line is that human factors must always be considered in the development of security
strategies. For example, the security approach called crime prevention through environmental
design (CPTED) uses psychology, architecture, and other measures to encourage desirable behavior
and discourage undesirable behavior. Some critics claim that CPTED does not show a conclusive
link between the design concept and a reduction in crime. However, where CPTED has been used,
the recording agencies claim that there are fewer reported incidents when compared to similar
structures or developments within their jurisdiction.
GLOBALIZATION IN BUSINESS
Globalization brings a wider range of goods, services, vendors, suppliers, capital, partners,
and customers within a company’s reach. It also brings threats closer and may increase
vulnerabilities. Risks related to business transactions, information assets, product integrity,
corporate ethics, and liability, as well as far-flung people and facilities, expand and evolve with
increasing globalization. As the director of the U.S. Defense Intelligence Agency notes (Wilson,
2002):
Values and concepts such as political and economic openness, democracy and individual
rights, market economics, international trade, scientific rationalism, and the rule of law…
are being carried forward on the tide of globalization- money, people, information,
technology, ideas, goods and services moving around the globe at higher speeds and with
fewer restrictions.
Our adversaries increasingly understand this link. … They are adept at using globalization
against us—exploiting the freer flow of money, people, and technology … attacking the
vulnerabilities presented by political and economic openness … and using globalization’s
“downsides.”
Globalization makes it necessary for assets protection managers to consider a wider variety
of customs, cultures, laws, business practices, economic factors, language issues, workforce
characteristics, and travel requirements. A more radical vision of the impact on organizational
structures is described in William Davidow and Michael Malone’s The Virtual Corporation. They
argue that the centerpiece of the new economy is a new kind of product: the virtual product where
major business functions are outsourced with hardly any internal departmentalization. This will
give the corporate security manager even more challenges in the protection of proprietary
information, product security, supply chain security, and business continuity. As in all cases the
dissemination of sensitive or proprietary information should be on a need-to- know basis. Security
professionals should not erect barriers to international business but instead should help their
organizations overcome those challenges and comply with the many regulations and standards that
apply around the world (Heffernan, 2006).
STANDARDS AND REGULATION
Security standards are becoming increasingly important, and their development is the subject of
much interest. The establishment of standards and guidelines has been described as the centerpiece
of a comprehensive assets protection program, especially in today’s global society (Dalton, 2003,
p. 185). This section discusses standard-setting bodies; statutory, voluntary, and mixed standards;
the use of certification and licensing as a form of standards; and the impact of regulation.
Voluntary Standards
Standards from the well-known International Organization for Standardization (ISO) and the
American National Standards Institutes (ANSI) are voluntary but widely adopted. Some have been
integrated into various countries’ regulatory frameworks. ISO standards that are relevant to assets
protection involve such issues as safety and security lighting, identification cards, radio frequency
identification), protection of children, and IT and information security. In the United States,
voluntary standards are also set by the National Fire Protection Association (NFPA). Many NFPA
standards are incorporated into regulations, such as building codes.
Several standards from Underwriters Laboratories (UL) relate to security equipment, such as locks,
alarms, and access control systems. Other standards are set by trade and professional associations,
such as the Illuminating Engineering Society (lighting standards and practices) and the Electronic
Industries Association (electronic components and products).
Statutory or Regulatory Standards
Unlike voluntary standards, statutory or regulatory standards are binding under the law and can be
enforced by formal authorities. In the United States, binding security standards are promulgated in
various sources:
• Code of Federal Regulations
• National Industrial Security Program Operating Manual
• Executive Orders, Presidential Directives, and Homeland Security Policy Directives
• regulations of the Occupational Safety and Health Administration, Nuclear Regulatory
Commission, Federal Energy Regulatory Commission, and Federal Trade
Commission
An international source of binding standards is the International Maritime Organization.
Mixed Standards
The distinction between statutory and voluntary standards becomes blurred when voluntary
standards are incorporated into laws or regulations. For example, many of the requirements in
Occupational Safety and Health Administration directives are verbatim references to standards
from such organizations as the NFPA.
In other situations, a standard may remain technically voluntary but practically obligatory. For
example, security standards from UL or Factory Mutual may be used as criteria by insurers. In other
words, they may determine the availability and cost of casualty insurance based on the use of UL-
approved materials or UL-standardized practices. Contracts, too, may incorporate standards as
requirements.
INTERNATIONAL
UNITED STATES
Figure 3
Selected Standard- Setting Bodies
Figure 4
Selected Security Certification Web Sites
CONVERGENCE OF SECURITY SOLUTIONS
In assets protection, convergence generally means the integration of traditional and IT
security functions. A broader definition might consider convergence to be the merging of
disciplines, techniques, and tools from various fields for the purpose of protecting critical assets.
It is widely accepted that “companies’ assets are now increasingly information-based and
intangible, and even most physical assets rely heavily on information” (ASIS International, 2005).
An approach using only physical or IT security measures is insufficient. Assets protection managers
must also employ traditional information security, personnel security, technical security, and public
relations and other external communications to protect intangible assets. A true convergence
approach would also employ security architecture and design, crime prevention through
environmental design, investigations, policies and procedures, and awareness training.
HOMELAND SECURITY AND THE INTERNATIONAL SECURITY ENVIRONMENT
The terrorist attacks of September 11, 2001, made it “crystal clear that the risks and threats
of global terrorism … were no longer vague or unlikely, but rather a genuine reality” (Sennewald,
2003, p. 19). Sennewald contends that 9/11 elevated the corporate security professional to a higher
plateau of respect and recognition within the enterprise.
From an assets protection perspective, reactions to the attack have been a mixed
development. On the positive side, 9/11 raised awareness of security among decision makers and
increased the respect paid to the security profession. It also made resources available for security
enhancements and led to increased interaction among security officials, first responders, emergency
planners, and the communities they serve. On the negative side, 9/11 caused knee-jerk reactions
that resulted in wasteful spending, unnecessary security measures, misdirection of needed funds,
and the surfacing of dishonest or unqualified vendors.
Assets protection professionals should study those reactions and apply what they learn to
comprehensive assets protection strategies. That way, they can leverage the awareness and
resources available to improve their organizations’ security posture.
Still, there is a danger of overemphasizing the threat of terrorism and the practice of
homeland security. Assets protection professionals must address the broader security issues
relevant to their particular environment.
ASSESSMENT 3
LESSON 4
MANAGEMENT OF ASSETS PROTECTION
TOPICS
1. Concepts in Organizational Management.
2. Management Applications in Assets Protection.
3. Security Organization Within the Enterprise.
LEARNING OUTCOMES
At the end of the lesson, you should be able to:
1. Understand concepts of organizational management and
management applications.
Figure 5
Three Managerial Dimensions
Figure 6
Assets Protection Customers
Taking a more comprehensive view of who the customers are and how best to meet their needs can
result in greater security team effectiveness. The large view also demonstrates the assets protection
manager’s commitment to the business mission as a whole, not just to the security mission. That
commitment often leads to greater respect for the assets protection function and ultimately greater
influence throughout the enterprise.
Quality
Some managers may think that quality is something in a plan on the shelf, something that is done
once, or something that belongs to the quality assurance experts. That view is wrong. Quality
“belongs to everyone, all the time” (Dalton, 2003, p.240).
Although a quality program may begin with tools, measures (metrics), and special processes, the
culture of quality should ideally become a part of the organization and be integrated into all business
practices.
A culture of quality can be developed in any type of security organization. For example, security
service providers are increasingly formalizing and standardizing their quality programs.
TOPICS
1. Behavioral Science Theories in Management
2. Applications Of Behavioral Studies in Assets Protection
LEARNING OUTCOMES
At the end of the lesson, you should be able to:
1. explain the importance of behavioral science theories in
Management; and
2. apply behavioral studies in assets protection.
Behavioral science, the study of people and their relationships to each other, is important in assets
protection for three key reasons:
• Many security risks are the result of human threats, and behavioral science can yield
insights into human threat sources.
• Security management requires effective interaction with other people, including
collaboration, education, influence, supervision, and the most important, excellent
communication skills.
• An effective security manager must also have trust in his or her staff members and have
the ability to delegate to them not only the responsibility but also the authority to act
within their functional area.
BEHAVIORAL SCIENCE THEORIES IN MANAGEMENT
The following theories in behavioral science are widely accepted as relevant and useful in many
management applications.
Maslow’s Hierarchy of Needs
Abraham Maslow’s theory, commonly known as the hierarchy of needs, asserts that people’s
behavior is driven by basic needs at different levels. It is often depicted as a pyramid, as Figure 7
shows.
Figure 7
Maslow’s Hierarchy of Needs
The levels of the hierarchy are:
• self-actualization need: self-fulfillment, realizing one’s full potential
• esteem or recognition needs: respect from others and self
• affiliation or love needs: affectionate social and family relationships
• security or safety needs: protection from perceived harm
• physiological or survival needs: food, drink, shelter
Basic or lower-level needs must be met before a person is motivated by the next higher level of
needs.
Maslow’s theory is still widely recommended to analyze individual employee motivation strategies
and establish tailored rewards, such as pay, recognition, advancement, and time off (Buhler, 2003).
The first set is job content (motivators), such as achievement, recognition, responsibility, and
satisfaction derived from the work itself.
The second set is job context (hygienes), such as the surroundings, physical work conditions, salary,
coworkers, and other factors that are external to the work itself.
Hygiene factors (such as a fresh coat of paint on the wall) will be able to move an individual from
a state of dissatisfaction to no satisfaction, but only motivation factors can move that person from
no satisfaction to satisfaction.
The lesson is that managers should avoid quick fixes. Manipulating hygiene factors may alleviate
dissatisfaction but will not result in a state of satisfaction. Allowing an individual to reach a state
of satisfaction requires changes in the work content itself, such as increased autonomy or
responsibility (Buhler, 2003).
Incident Management
Motivation theories may be useful in developing emergency plans, business continuity plans, and
incident response plans. A major factor in any incident is how people will react— those directly
involved in the incident, bystanders, indirectly affected persons, security forces, and first
responders.
Some data can be gathered from exercises and drills through documentation and after- action
reports. Interpreted through human motivation theories, that information may aid in the
development of plans and procedures that will help ensure a smooth response to a real incident.
Motivation theories should also be considered when developing larger-scale incident management
plans. Such theories may help in predicting how people will react when they are ordered to shelter
in place at the workplace or school—for example, whether they will accept their separation from
their family or instead evacuate immediately, regardless of the directions given.
Motivation theory can contribute to the planning and development of a QA/QC program, a
department organizational structure, an advancement plan, assessment or evaluation criteria,
awards programs, discipline procedures, communications venues, and even dress codes. Behavioral
science plays a role in almost every aspect of personnel management.
Behavioral theories can guide both content and delivery methods for security training and
awareness, which has been recognized as one of the most cost-effective assets protection tools
(Webster University, 2006). In addition, security training and awareness efforts should take account
of adult learning styles and current instructional design methods. When employees can relate to the
information presented and the way it is presented, the training is more effective. Managers need to
set direction and establish a professional setting, but through training they need to avoid making
operating decisions that should be made by their supervisors and officers. As an example, when a
subordinate requests advice about a routine operational problem, the supervisor should avoid giving
a specific solution, opting instead to guide the subordinate, through an open exchange of
information, toward identifying the solution himself or herself.
Corporate Ethics
One of the first questions that comes to mind after a large-scale corporate scandal is “What could
have possibly motivated those people to do that?” Behavioral science theories may help answer
that question. They can be applied to help prevent, respond to, and recover from major white-collar
crime incidents and can also contribute to programs that address smaller-scale, everyday ethical
lapses.
Collaboration is especially valuable and challenging in a global environment that includes a wide
range of cultures, customs, and perspectives (Buhler, 2003):