fbpx
Wikipedia

Total security management

Total Security Management (TSM) is the business practice of developing and implementing comprehensive risk management and security practices for a firm’s entire value chain. This business process improvement strategy seeks to create added value for companies by managing security and resilience requirements as core business functions rather than as reactionary expenditures. TSM implementation involves a thorough evaluation of key internal and external stakeholders, distribution channels, and policies and procedures in terms of a firm’s level of preparedness for a variety of disruptive events.

TSM particularly takes into account aspects of quality, safety, environmental protection and occupational health, whether for products, for internal company processes or for the education and training of people. TSM is the first system that covers the curve from management system to end product, irrespective of the industry sector. TSM is fostering standardization as well as innovation power. Today, it is time to place such a process in the spot-light and to make use of the possibilities it contains for a broad circle of applications. [1]

TSM encourages companies to manage security initiatives as investments with a measurable return and seeks to transform security from a net cost to a net benefit. In applying TSM, the theory holds that companies may be able to realize cost savings, improve business processes, reduce theft, enhance asset management, increase brand equity and goodwill, and improve preparedness and resiliency.[2]

Formulation edit

The term Total Security Management was first introduced in the book Security for Healthy Growth: From Occidental perception and risk awareness to TSM Total Security Management concept, published by ART-TECH AG, Switzerland in 2002. This title was authored by Dr. Edmond Jurczek; the book has been published in German, English and in Chinese (Mandarin). [3]

In 2006, the term Total Security Management was additionally introduced in the book Securing Global Transportation Networks: A Total Security Management Approach, published by McGraw Hill in 2006. This title was co-authored by Luke Ritter, J Michael Barrett, and Rosalyn Wilson, with the Foreword written by Governor Tom Ridge, the first U.S. Secretary of Homeland Security. According to Secretary Ridge, the book offers a, “comprehensive solution for approaching security in the context of sound business practices.”[4]

According to Dr. Kent N. Gourdin of the National Defense Transportation Association, "This book reflects the changing view of management regarding security. Still seen by many as both an additional cost and an impediment to good service, security is emerging as another competitive variable that firms can use to add customer value."[5]

The TSM approach built upon scholarly research on the issue that stressed the importance of security as a key component of the supply chain. An April 2004 report for the IBM Center for The Business of Government noted, "Just as a chain is no stronger than its weakest link, a supply chain is only as secure as its weakest link, which includes the suppliers, manufacturers, wholesalers, retailers, carriers, terminals, and governmental institutions that plan, manage, facilitate, and monitor the global movement of goods.[6] Additionally, the conclusions in a July 2006 Stanford Graduate School of Business report titled, “Supply Chain Security: Better Security Drives Business Value,” state that, “…when properly leveraged, investments in supply chain security may not only be offset to some extent by benefits…but, in fact,…can overall have a positive impact on a company’s bottom line.”[7]

Relation to Total Quality Management edit

The TSM name borrows from the management concept Total Quality Management (TQM), an approach made famous by the work of W. Edwards Deming. The TQM concept revolutionized the manner in which quality was perceived in industry, encouraging it to be integrated into the core business processes of a firm.[8]

In the foreword to Securing Global Transportation Networks, Secretary Tom Ridge writes: "The paradigm that now exists in transportation security is similar to the paradigm that existed when the now revered Dr. W. Edwards Deming tried to convince the business world in the 1960s that quality mattered. The now well-accepted theory of Total Quality Management was not initially met with open arms in the United States. I suspect that there are many professionals in the transportation industry today who may not endorse security management as a core business function that can create value. My hope is that readers will embrace the concepts of the TSM approach offered within Securing Global Transportation Networks and act upon them."[9]

Companies employing TSM edit

A company using the TSM methodology is meant to be able to establish a framework of focus points, metrics and feedback loops in order to elevate risk management from a non-core objective to an essential business function. This process includes establishing and creating a compliance management plan, implementing operational processes, evaluating the effectiveness of those operational plans, making appropriate changes as necessary, sharing successful lessons learned with internal and external stakeholders, and pursuing continual, incremental improvement.[10]

Securing Global Transportation Networks details case studies of many large companies that benefited from the implementation of aspects of the TSM approach, including FedEx, Home Depot, Hutchison Port Holdings, Maersk, Procter & Gamble, and Target, amongst others.[11]

Criticism edit

Some suggest that the TSM approach, while containing merit, may be too complicated for companies to put into practice. “The difficulty of TSM is that it relies on a level of commitment and coordination that may be difficult to achieve…Reluctance to adopt TSM is not capitulation to mediocrity but rather an acceptance that the role that security plays within a company should not be any more than is needed. There are some useful ideas in the book, but the overall program may be too ambitious for many corporations to realistically consider,” writes Ross Johnson in a 2007 Security Management review.[12]

Other developments edit

On December 16, 2009, the U.S. Securities and Exchange Commission (SEC) approved Rule No. 33-9089, which went into effect on February 28, 2010. This rule requires companies to increase their reporting of risk management practices, including details about the manner in which risk oversight is administered. The ruling has generated increased interest in implementing the TSM approach to ensure compliance with the updated SEC guidelines.[13] In January 2010, ISO 28000 (ISO/PAS 28000 – Specification for security management systems for the supply chain) was updated to include an explicit reference to the Plan-Do-Check-Act model of quality management popularized by Deming.[14]

See also edit

References edit

  1. ^ Jurczek Edmond, Security for healthy growth, 2002, " https://www.helveticat.ch/discovery/fulldisplay?docid=alma991003663529703976&context=L&vid=41SNL_51_INST:helveticat&lang=de&search_scope=Helveticat&adaptor=Local%20Search%20Engine&tab=LibraryCatalog&query=any,contains,Edmond%20jurczek&offset=0"
  2. ^ Luke Ritter, J Michael Barrett, and Rosalyn Wilson, Securing Global Transportation Networks, 2007, "https://books.google.com/books?id=8LhHTuCjzzcC&printsec=frontcover&dq=securing+global+transportation+networks&cd=1#v=onepage&q&f=false", 5/5/10
  3. ^ Jurczek Edmond, Security for healthy growth, 2002, " https://www.helveticat.ch/discovery/fulldisplay?docid=alma991003663529703976&context=L&vid=41SNL_51_INST:helveticat&lang=de&search_scope=Helveticat&adaptor=Local%20Search%20Engine&tab=LibraryCatalog&query=any,contains,Edmond%20jurczek&offset=0"
  4. ^ Luke Ritter, J Michael Barrett, and Rosalyn Wilson, Securing Global Transportation Networks, 2007, "https://books.google.com/books?id=8LhHTuCjzzcC&printsec=frontcover&dq=securing+global+transportation+networks&cd=1#v=onepage&q&f=false", 5/5/10
  5. ^ Dr. Kent N. Gourdin, National Defense Transportation Association Book Review, 2007, "http://www.thefreelibrary.com/Securing+Global+Transportation+Networks-a0160265053", 5/5/10
  6. ^ David J. Closs and Edmund F. McGarrell, Enhancing Security Throughout the Supply Chain, April 2004, " (PDF). Archived from the original (PDF) on 2008-11-27. Retrieved 2010-05-05.{{cite web}}: CS1 maint: archived copy as title (link)", 5/5/10
  7. ^ Barchi Peleg-Gillai, Gauri Bhat, and Lesley Sept, Innovators in Supply Chain Security: Better Security Drives Business Value, July 2006, "http://www.docstoc.com/docs/24441560/Innovators-in-Supply-Chain-Security-Better-Security-Drives-Business", 5/5/10
  8. ^ Luke Ritter, J Michael Barrett, and Rosalyn Wilson, Securing Global Transportation Networks, 2007, "https://books.google.com/books?id=8LhHTuCjzzcC&printsec=frontcover&dq=securing+global+transportation+networks&cd=1#v=onepage&q&f=false", 5/5/10
  9. ^ McGraw Hill, Book Release, October 2006, ". Archived from the original on 2011-06-22. Retrieved 2010-05-05.", 5/5/10
  10. ^ Luke Ritter, J Michael Barrett, and Rosalyn Wilson, Securing Global Transportation Networks, 2007, "https://books.google.com/books?id=8LhHTuCjzzcC&printsec=frontcover&dq=securing+global+transportation+networks&cd=1#v=onepage&q&f=false", 5/5/10
  11. ^ McGraw Hill, Book Release, October 2006, ". Archived from the original on 2011-06-22. Retrieved 2010-05-05.", 5/5/10
  12. ^ Ross Johnson, Security Management: Book Review, October 2007, ". Archived from the original on 2010-01-15. Retrieved 2010-05-05.", 5/5/10
  13. ^ Securities and Exchange Commission, Rule No. 33-9089, 2009, "https://www.sec.gov/rules/final/2009/33-9089.pdf", 5/5/10
  14. ^ Continuity Compliance, ISO 28002 – What’s The Buzz About?, October 2009, "http://www.continuitycompliance.org/information/organizational-resiliency/iso-28002-whats-the-buzz-about/", 5/5/10

total, security, management, total, security, management, business, practice, developing, implementing, comprehensive, risk, management, security, practices, firm, entire, value, chain, this, business, process, improvement, strategy, seeks, create, added, valu. Total Security Management TSM is the business practice of developing and implementing comprehensive risk management and security practices for a firm s entire value chain This business process improvement strategy seeks to create added value for companies by managing security and resilience requirements as core business functions rather than as reactionary expenditures TSM implementation involves a thorough evaluation of key internal and external stakeholders distribution channels and policies and procedures in terms of a firm s level of preparedness for a variety of disruptive events TSM particularly takes into account aspects of quality safety environmental protection and occupational health whether for products for internal company processes or for the education and training of people TSM is the first system that covers the curve from management system to end product irrespective of the industry sector TSM is fostering standardization as well as innovation power Today it is time to place such a process in the spot light and to make use of the possibilities it contains for a broad circle of applications 1 TSM encourages companies to manage security initiatives as investments with a measurable return and seeks to transform security from a net cost to a net benefit In applying TSM the theory holds that companies may be able to realize cost savings improve business processes reduce theft enhance asset management increase brand equity and goodwill and improve preparedness and resiliency 2 Contents 1 Formulation 2 Relation to Total Quality Management 3 Companies employing TSM 4 Criticism 5 Other developments 6 See also 7 ReferencesFormulation editThe term Total Security Management was first introduced in the book Security for Healthy Growth From Occidental perception and risk awareness to TSM Total Security Management concept published by ART TECH AG Switzerland in 2002 This title was authored by Dr Edmond Jurczek the book has been published in German English and in Chinese Mandarin 3 In 2006 the term Total Security Management was additionally introduced in the book Securing Global Transportation Networks A Total Security Management Approach published by McGraw Hill in 2006 This title was co authored by Luke Ritter J Michael Barrett and Rosalyn Wilson with the Foreword written by Governor Tom Ridge the first U S Secretary of Homeland Security According to Secretary Ridge the book offers a comprehensive solution for approaching security in the context of sound business practices 4 According to Dr Kent N Gourdin of the National Defense Transportation Association This book reflects the changing view of management regarding security Still seen by many as both an additional cost and an impediment to good service security is emerging as another competitive variable that firms can use to add customer value 5 The TSM approach built upon scholarly research on the issue that stressed the importance of security as a key component of the supply chain An April 2004 report for the IBM Center for The Business of Government noted Just as a chain is no stronger than its weakest link a supply chain is only as secure as its weakest link which includes the suppliers manufacturers wholesalers retailers carriers terminals and governmental institutions that plan manage facilitate and monitor the global movement of goods 6 Additionally the conclusions in a July 2006 Stanford Graduate School of Business report titled Supply Chain Security Better Security Drives Business Value state that when properly leveraged investments in supply chain security may not only be offset to some extent by benefits but in fact can overall have a positive impact on a company s bottom line 7 Relation to Total Quality Management editThe TSM name borrows from the management concept Total Quality Management TQM an approach made famous by the work of W Edwards Deming The TQM concept revolutionized the manner in which quality was perceived in industry encouraging it to be integrated into the core business processes of a firm 8 In the foreword to Securing Global Transportation Networks Secretary Tom Ridge writes The paradigm that now exists in transportation security is similar to the paradigm that existed when the now revered Dr W Edwards Deming tried to convince the business world in the 1960s that quality mattered The now well accepted theory of Total Quality Management was not initially met with open arms in the United States I suspect that there are many professionals in the transportation industry today who may not endorse security management as a core business function that can create value My hope is that readers will embrace the concepts of the TSM approach offered within Securing Global Transportation Networks and act upon them 9 Companies employing TSM editA company using the TSM methodology is meant to be able to establish a framework of focus points metrics and feedback loops in order to elevate risk management from a non core objective to an essential business function This process includes establishing and creating a compliance management plan implementing operational processes evaluating the effectiveness of those operational plans making appropriate changes as necessary sharing successful lessons learned with internal and external stakeholders and pursuing continual incremental improvement 10 Securing Global Transportation Networks details case studies of many large companies that benefited from the implementation of aspects of the TSM approach including FedEx Home Depot Hutchison Port Holdings Maersk Procter amp Gamble and Target amongst others 11 Criticism editSome suggest that the TSM approach while containing merit may be too complicated for companies to put into practice The difficulty of TSM is that it relies on a level of commitment and coordination that may be difficult to achieve Reluctance to adopt TSM is not capitulation to mediocrity but rather an acceptance that the role that security plays within a company should not be any more than is needed There are some useful ideas in the book but the overall program may be too ambitious for many corporations to realistically consider writes Ross Johnson in a 2007 Security Management review 12 Other developments editOn December 16 2009 the U S Securities and Exchange Commission SEC approved Rule No 33 9089 which went into effect on February 28 2010 This rule requires companies to increase their reporting of risk management practices including details about the manner in which risk oversight is administered The ruling has generated increased interest in implementing the TSM approach to ensure compliance with the updated SEC guidelines 13 In January 2010 ISO 28000 ISO PAS 28000 Specification for security management systems for the supply chain was updated to include an explicit reference to the Plan Do Check Act model of quality management popularized by Deming 14 See also editISO 28000 Enterprise Risk Management Process Management Risk Management Security Risk Supply Chain Security Total Quality ManagementReferences edit Jurczek Edmond Security for healthy growth 2002 https www helveticat ch discovery fulldisplay docid alma991003663529703976 amp context L amp vid 41SNL 51 INST helveticat amp lang de amp search scope Helveticat amp adaptor Local 20Search 20Engine amp tab LibraryCatalog amp query any contains Edmond 20jurczek amp offset 0 Luke Ritter J Michael Barrett and Rosalyn Wilson Securing Global Transportation Networks 2007 https books google com books id 8LhHTuCjzzcC amp printsec frontcover amp dq securing global transportation networks amp cd 1 v onepage amp q amp f false 5 5 10 Jurczek Edmond Security for healthy growth 2002 https www helveticat ch discovery fulldisplay docid alma991003663529703976 amp context L amp vid 41SNL 51 INST helveticat amp lang de amp search scope Helveticat amp adaptor Local 20Search 20Engine amp tab LibraryCatalog amp query any contains Edmond 20jurczek amp offset 0 Luke Ritter J Michael Barrett and Rosalyn Wilson Securing Global Transportation Networks 2007 https books google com books id 8LhHTuCjzzcC amp printsec frontcover amp dq securing global transportation networks amp cd 1 v onepage amp q amp f false 5 5 10 Dr Kent N Gourdin National Defense Transportation Association Book Review 2007 http www thefreelibrary com Securing Global Transportation Networks a0160265053 5 5 10 David J Closs and Edmund F McGarrell Enhancing Security Throughout the Supply Chain April 2004 Archived copy PDF Archived from the original PDF on 2008 11 27 Retrieved 2010 05 05 a href Template Cite web html title Template Cite web cite web a CS1 maint archived copy as title link 5 5 10 Barchi Peleg Gillai Gauri Bhat and Lesley Sept Innovators in Supply Chain Security Better Security Drives Business Value July 2006 http www docstoc com docs 24441560 Innovators in Supply Chain Security Better Security Drives Business 5 5 10 Luke Ritter J Michael Barrett and Rosalyn Wilson Securing Global Transportation Networks 2007 https books google com books id 8LhHTuCjzzcC amp printsec frontcover amp dq securing global transportation networks amp cd 1 v onepage amp q amp f false 5 5 10 McGraw Hill Book Release October 2006 Securing Global Transportation Networks A Total Security Management Approach Archived from the original on 2011 06 22 Retrieved 2010 05 05 5 5 10 Luke Ritter J Michael Barrett and Rosalyn Wilson Securing Global Transportation Networks 2007 https books google com books id 8LhHTuCjzzcC amp printsec frontcover amp dq securing global transportation networks amp cd 1 v onepage amp q amp f false 5 5 10 McGraw Hill Book Release October 2006 Securing Global Transportation Networks A Total Security Management Approach Archived from the original on 2011 06 22 Retrieved 2010 05 05 5 5 10 Ross Johnson Security Management Book Review October 2007 Securing Global Transportation Networks A Total Security Management Approach Security Management Archived from the original on 2010 01 15 Retrieved 2010 05 05 5 5 10 Securities and Exchange Commission Rule No 33 9089 2009 https www sec gov rules final 2009 33 9089 pdf 5 5 10 Continuity Compliance ISO 28002 What s The Buzz About October 2009 http www continuitycompliance org information organizational resiliency iso 28002 whats the buzz about 5 5 10 Retrieved from https en wikipedia org w index php title Total security management amp oldid 1105532211, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.