Verified Document

Corporate Risk Management: Terrorist Attack Term Paper

Furthermore, the exact nature of terrorism can be quantified in terms of definitions and key terms. This also mitigates much of the uncertainty surrounding the issue. Terrorism can for example be understood by the definition of threat and/or violence in order to achieve an end. Terrorists generally want to force the hand of those they attack, or to avenge what they perceive as wrongdoing by the victim of their threat. Specifically, there are several ways in which terrorist attacks can manifest themselves. These include kidnapping, hijacking, murder, mass murder, explosive devices, chemical warfare, biological attacks, riots, civil unrest, and the use of hostages. The risk of terrorism can be quantified to a certain degree by assessing the likelihood of each type of terrorism for the business in question. Contingency and emergency actions can then be planned according to such quantifications. This is an especially important part of risk management for significantly...

The increasing awareness of the danger of terrorism has increased the number of agencies and companies providing assessment and mitigation services in terms of terrorist threat. Such companies can the provide valuable input in terms of safeguarding assets against such attacks.
On a more concrete level, physical safety measures such as increasing the integrity of building materials and structure form another important part of mitigating terrorism threats. Such issues during the construction phase can be fortified by workplace security measures such as trained security personnel, electronic building access control, and other such measures.

Most importantly, each personnel member needs to be fully trained in the appropriate actions in the event of a terrorist threat.

Cite this Document:
Copy Bibliography Citation

Related Documents

Corporate Risk Management: Terrorist Attack
Words: 727 Length: 2 Document Type: Term Paper

When the risk is significant, this should be quantified against the risk of not entering the specific country in terms of expansion. When the risk is acceptable, stringent measures, including organizational arrangements, engineering control, and research and development, need to be taken. Research and development are particularly important, as mitigation measures can then be implemented that are particularly targeted towards the measure of possible terrorist attack for the country

Corporate Risk Management: New Horizons
Words: 620 Length: 2 Document Type: Term Paper

All personnel need to be fully informed regarding risk management, particularly in terms of disaster, terrorism, or other unknown factors. Employees and employers therefore need to maintain an open communication system, through which risk management occurs as a dynamic rather than static system. Management should for example provide workers with the opportunity to offer suggestions relating to the current risk management manual. These can be communicated via spoken or

Criminal Justice - Risk Management
Words: 892 Length: 3 Document Type: Thesis

Other specific risks to patrol officers, including those operating in pairs, include standard procedures suggested by past studies of the circumstances in which attacks on officers have occurred. For example, interviews with prisoners who assaulted officers during their arrests disclosed that many such attacks were initiated by the subject upon realization that their arrest was imminent. In many cases, it was the radio transmission alerting the officers of the subject's

Security Risk Management Process -
Words: 3314 Length: 13 Document Type: Term Paper

Microsoft proposes six steps to enable proper reactive management of security risks which include: protecting safety and life, containing and assessing the damage, determining the cause of and repairing damage, reviewing risk response and updating procedures in the hopes of preventing risk in the future (Microsoft, 2004). A proactive approach is much more advantageous however as it enables corporations to prevent threats or minimize risks before negative occurrences happen within an

Risk and Insurance: Aramark Risk
Words: 2953 Length: 10 Document Type: Term Paper

They were just so intense, so focused, so transaction-driven, there literally wasn't time for people to put ideas out and discuss and debate them." These constraints to effective management oversight and innovation were further exacerbated when the company went private in 2001. According to Stopper, "ARAMARK went from a leveraged buyout situation in 1984, with only some 50 people having equity in the company, to an initial public offering (IPO)

Terrorist Groups Use of Cloud Technology
Words: 4606 Length: 15 Document Type: Dissertation or Thesis complete

Terrorist Group's Use Of Cloud Technology After the 1980s there have been changes on a global scale that included post cold war developments. The changes in Eastern Europe and the Soviet Union coupled with the technological change on the nations of the East caused structural and perceptional changes that were needed to make them competitive in high technology; which included everything from military to the service sector. There was advance of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now