Risk Management

Schonfeld, Erick
December 1994
Fortune;12/26/1994, Vol. 130 Issue 13, p23
Presents information on companies operating in dangerous regions and their security concerns. Impact of the withdrawal of Soviet Union and U.S. empires on the Kazakhstan and Columbian firms; Deployment of private firms like Defense Systems, which is a part of British holding company Hambros PLC to guard their facilities; Use of personnel retired from elite military units to protect the U.S. embassy in Abu Dhabi and gold mines in Guyana.


Related Articles

  • Detection or Prevention? Turner, Stephen // Canadian Underwriter;Mar2008, Vol. 75 Issue 3, p36 

    The article discusses risk management dealing with internal affairs of insurance companies. The author points to employee wrongdoing as the number one risk factor for a company. He advises that identifying the risk is not enough and that discovery and probing should be implemented to prevent its...

  • THE BENEFITS OF VIDEO SURVEILLANCE. Wren, Andrew // Risk Management (00355593);Oct2007, Vol. 54 Issue 10, p24 

    The article assesses the impact of video surveillance and closed circuit television security systems on business and public risk and risk management. The author states that managers can use video surveillance to assess the operational, day-to-day functions of a business organization. The article...

  • Choosing Security Wisely. Dordal, Pete // Journal of International Peace Operations;Jul/Aug2010, Vol. 6 Issue 1, p11 

    The article reports that choosing the right private security company (PSC) is the most certain way to minimize or to avoid such problems because selecting a security wisely will assure to have a company that will deliver the services needed in the manner it requires. It states that selecting a...

  • BUCKLE UP FOR SAFETY. HUGHES, PAUL // Athletic Business;May2014, Vol. 38 Issue 5, p57 

    The article highlights risk management for professional security guards designated at sporting venues through the use of non-lethal tools. Some manufacturers of non-lethal technologies advise against deploying their technology from an elevated position because of the risk of eye injuries or...

  • Hand in Hand. Emigh, Jacqueline // Government Security;Feb2004, p40 

    Discusses the relationship between physical security and information security. Dependence of the successful implementation of both on their cooperation and understanding of each other; Recognition of the maturing technology of information security; Dependence of information security on software...

  • Double-edged security. Pereira, Pedro // eWeek;9/19/2005, Vol. 22 Issue 37, pC7 

    The article argues that to succeed in computer security services, VARs and integrators must create a methodology they follow consistently. And when tackling the security needs of customers, they must demonstrate how they will provide value. Channel companies, in the role of trusted advisers to...

  • Record number attend ASHRM conference.  // Business Insurance;11/1/2004, Vol. 38 Issue 44, p26 

    This article reports that a record 1,900 attendees participated in 49 different educational sessions and visited 153 exhibitions and at the 26th annual American Society for Healthcare Risk Management's annual conference and exhibition in Orlando, Florida, October 17-20, 2004. Members also can...

  • What Keeps You Up at Night? ELLIOTT, PETER J. // Rural Telecom;Mar/Apr2010, Vol. 29 Issue 2, p54 

    The article stresses the importance for insurance professionals to understand loss exposure. It states that in order to forecast loss exposure, they should be able to determine realistic events that can affect their risk management efforts. In addition, the author mentions that they should...

  • 15 TIPS TO MANAGE SOCIAL MEDIA RISKS. Savell, Lawrence // Risk Management (00355593);Oct2010, Vol. 57 Issue 8, p26 

    The article presents tips on how companies can minimize their risks from social media. Companies should know the implications of posts by their employees because they are generally responsible for their employees' actions. Companies should also limit posts or comments from outside parties. They...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics