Table industry The security is defined by theUnited

Table of content:

Task 1

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

1 Introduction

2 Products and services

3 Market target

Task 2

Industry environment

Macro-environment (pestel)

Task 3

Business canvas model

Task 4

Staffing requirement

Recruitment and Selection

Training and Development

Motivation

Conclusion

Referencing and Bibliography

 

 

 

 

 

 

 

 

 

Introduction

PGS(Professional Guard
Security) will launch as a home-based business out of the home office of
Manchester city in UK. Initially, this will reduce the cost of rent and
equipment. Training for security guards will be provided in temporarily rented
office space as needed.

Our
Product and Services

Our business offering are listed below;

Prevention of unauthorized activity or entry in a
specified perimeter
Traffic
regulation services
Access
control services
Fire and theft prevention and detection services
Security
advisory and consultancy services
Roving
patrol services
Bodyguard,
and guard dog services

 

Our
Target Market

Our target market cuts across people of different class and people from all
walks of life, local and international organizations as well. We are coming
into the industry with a business concept that will enable us work with the
highly placed people and companies in the country and at the same with the
lowly placed people and smaller businesses.

Below is a list of the people and organizations that we have specifically
design our products and services for;

Blue
Chips Companies
Corporate
Organizations
Religious
Organizations
Political
Parties / Politicians
Households
/ Families
Estates
and Communities
Celebrities
The
Government (Public Sector)

 

Industry
environment

Security
industry

The security is defined by
theUnited Nations as ‘a broad term used to describe the structures, institution
and personnel responsible for the management, provision and oversight of
security in a country.’It is generally accepted to include defence, law
enforcement, corrections, intelligence services and institution responsible for
border management, customs and civil emergencies.

 

Today, the global security
industry, including private security, turns over in excess of US$1.7
trillion.Interestingly, recent statistics note that private security forces
worldwide and tha globally there are in excess of 20 million private security
guards.(  Jayantee Saha,Chris Rowley)

The market for security guard
services includes building management companies, retail businesses, event
venues, and other businesses. IBISworld.com reports that the security services
industry as a whole was $29.7 billion in 2008. While this number includes
investigative services and armoured car services, it is estimated that security
guards accounted for $22.3 billion. This represents approximately 540,000
employees in the security guard industry.

While market revenue has
dropped 2% in 2008 due to the recession, it is expected that the market will
rise again due to increasing outsourcing of security services by companies who
will delay hiring their own full-time employees as the recession ends. The
continuing and growing concerns about security brought on by international
terrorism are also expected to contribute to growth in the industry.

Of the potential targets
available in Coastalburg Batten-Hatchez Security will focus on building
management companies and retail businesses at the outset. These businesses
require steady security needs and serving them is simpler than serving special
events.

 

As security guard services are sold
business-to-business, marketing and advertisement is generally targeted on the
markets and industries the security companies seek to serve. Businesses
generally search for security guard providers on the Internet or through
referrals from other companies they trust

 

 

 

MACRO ANALYSIS:             

PESTEL
Analysis

Context
and concept

The origin of pest the pestle analysis remains
relatively unclear.However, some authors agree that the first traces of its
appearance can be found in the book by Francis J. Aguilar, Scanning the
business Evironment (1967).At that time , the model was called the PEST
analysis , corresponds to the initial categories of macroeconomic variables:
Politica, economic, socio-culturaland technological.(50minutes…)

 

INTRODUCTION

This chapter identifies the main external influences
on the UK market for private security , using the four headings of a PEST
analysis: political, economic, social and technological. Where such influences
have more than one dimension, they are considered under the heading that is
considered to be the most relevant.

POLITICAL FACTORS

Political factors such as changes in government and
the ramifications of their strategies such as tax levels, pollution policies,
education issues, etc.  Karen Beamish,Ruth Ashford

The
Terrorist Threat

Precautions
against terrorist attacks have been stepped up since the events of 11th
September 2001, and there is strong demand for security services and equipment
in the public sector. The UK, and especially London, has been on a high level
of alert since the war in Iraq. Some of the UK’s export customers are also
concerned about the threat from terrorism. (Masaryk university, is.muni.cz)

 

ECONOMIC FACTORS

Economic factors such as the impact of the trade
cycle, disposable income, inflation, etc.  Karen Beamish,Ruth Ashford

World
Events and Business Confidence

One of the effects of the terrorist attacks of 11th
September 2001 was a setback to the US economy and, to some extent, the world
economy. Business spending became more cautious and some investment plans were
postponed. This led to delays in some of the larger security contracts in the
UK and in UK manufacturers’ export markets. However, confidence appears to have
improved greatly by 2004 — in the UK, at least. (Masaryk university, is.muni.cz)

Tourism

The tourism industry was also affected by the events
of 11th September 2001. A reduction was seen in demand for hotel security
products, such as locking systems and room safes. This demand has now improved.
(Masaryk university, is.muni.cz)

SOCIAL FACTORS

Social/cultural issues such as the ageing consumer,
increases in one-parent families, changing values, attitudes and beliefs – to smoking
for example.  Karen Beamish,Ruth Ashford

Ageing
Population

The UK has a gradually ageing population: the birth
rate has fallen and people are generally living longer than they did in the
past. Since most older people prefer to live in their own homes for as long as
possible, this means that there will be increased demand for personal
protection systems. (Masaryk university, is.muni.cz)

Public
Attitudes to Privacy and Protection

 Local and
national authorities have to strike the right balance between privacy and
protection. In the UK, the general public has been very tolerant of the use of
CCTV cameras, accepting (on the whole) that their benefits justify the
intrusion of privacy. However, public acceptance still has to be borne in mind
when positioning new cameras. The next big area for attention is biometric
security. Again, there seems to have been little objection to the devices that
have been introduced so far. However, more widespread measures, such as the
introduction of compulsory identity cards with fingerprint data, are of much
greater concern. (Masaryk university, is.muni.cz)

ENVIRONMENTAL FACTORS

Environmental issues – such as attitudes towards
pollution, energy use, etc.  Karen Beamish,Ruth Ashford

The
Environmental Impact of Security Products

Security has to be achieved without making public
areas look ugly and depressing. Security decisions that can occasion local
concern include the choice of school security, the type of shutters that shops
are allowed to use, and the style of CCTV cameras and support masts. Another
planning issue concerning security is the desirability, or otherwise, of
private `gated’ communities. (Masaryk university, is.muni.cz)

TECHNOLOGICAL FACTORS

Technological factors such as the increased rate of
computer capability, production methods, etc.  Karen Beamish,Ruth Ashford

Keeping
Ahead of the Criminals

Technical innovation occurs constantly in the security
industry, although much of this goes unnoticed by the public. Locks, safes,
mechanical and electronic vehicle security products, retail security systems
and even fences and barriers are among the products that regularly undergo
development and improvement. (Masaryk university, is.muni.cz)

Data Transmission

The use of electronic security products offering
Internet Protocol (IP) data transmission is increasing, but growth in this
sector is being held back by a lack of understanding among customers and by a
lack of expertise on the part of some installers. (Masaryk university, is.muni.cz)

LEGAL FACTORS

Legal issues – such as changes in advertising
legislation for tobacco, regulations and codes of practice for promotions, etc.  Karen Beamish,Ruth Ashford

Regulation of the Security Industry After at least 8
years of discussion, compulsory regulation of the security industry has begun
in England and Wales. It will take some time to extend registration to all
regions and all the security activities that need to be covered, but the result
should be improved standards and improved customer confidence in the manned
security sector. However, the increase in labour costs caused by regulation is
likely to eliminate some of the lower-cost services and raise the prices of
others. The Scottish security industry is in favour of similar legislation for
Scotland, but it will take some time for this to go through the Scottish
Parliament and for a scheme to be set up. (Masaryk university, is.muni.cz)

EU
Legislation on Services

In July 2004, the Chairman of the British Security
Industry Association (BSIA), David Dickens, expressed concern about a proposed
European Directive on Services in the Internal Market. This Directive would
allow EU nationals to market their services in the UK while complying only with
the regulations that apply in their home countries, regardless of any
additional rules that may exist in the UK. The Directive would cover a very
wide range of services, including security services. Mr Dickens pointed out
that the legislation could cause abuses of competition in the private security
industry and would encourage providers of security services to set up their
operations in the country with the lowest requirements. Anyone seeking to establish
a private security business in the UK would need to obtain authorisation, yet a
firm could be set up elsewhere without authorisation and still operate in the
UK market. The BSIA wants the security industry to be exempted from any such
legislation. (Masaryk university, is.muni.cz)

 

BUSINESS
MODEL CANVAS:

Uses: The Business Model Canvas is a valuable
strategic tool which is used to conceptualise new business models or to
document existing ones , it helps to guide decisions about the launch of a
product, a startup or a new process by illustrating the value and core activity
of a company.(50minutes…)

Osterwalder and Pigneur (2010) have developed what
they call a ‘Business Model Canvas’ or generic business model that has been
used as a model for consultants and trainers across the world. Designed for
established businesses, the Canvas is described in Business model generation: A
Handbook for visionarie, Game changers and Challengers which, the authors
claim, strives ‘ to defy outmoted business models and design tomorrow’s
enterprises’ that will ‘turn visionary ideas into game-changing business models
that challenge the establishment.’ (Paul Burns)

The nine
tools:

The matrix consist of nine interrelated blocks that
illustrate all the activities of a company:

·        
Costumer segment

·        
Value proposition

·        
Channel

·        
Costumer relationship

·        
Revenue stream

·        
Key resources

·        
Key activities

·        
Key partnerships

·        
Cost of structure

Costumer
segment:

In a business model canvas, a costumer segment is the
segment of the the costumer market where customers have common interests or
needs related to products or services . (Fred A.
Cummins)

We will provide different kind of services to our
custumer as:

Prevention of unauthorized activity or entry in a
specified perimeter
Traffic
regulation services
Access
control services
Fire and theft prevention and detection services
Security
advisory and consultancy services
Roving
patrol services
Bodyguard,
and guard dog services

Value
proposition:

In a business model Canvas, a value proposition
represents the values offered to the market .our value proposition is about
security and protection.

Channel:

A channel is a path for sales and distribution of
product and services. (Fred A. Cummins)

Our channels are our agencies, social media journals
etc…

Costumer relationship:

 In Business
Model Canvas, costumer relationship are interactions with costumer leading to
delivery of products or services. (Fred A.
Cummins)

Our relationship with our costomer will be based on
professionalism and trust . 

 

Revenue
stream:

In a
business model canvas, the revenue stream is the income from sale of the
product or service. (Fred A. Cummins)

PGS will generate income by offering  private security services for individuals and
for corporate organizations

 

Key
resources:

Business Model Canvas , Key resources are facilities,
people, raw materials, etc .,that are critical to the success of the business. (Fred A. Cummins)

 Our key
resources are our employees, equipment and technology.

Key
activities:

In a business Model Canvas, key activities are
typically VDML(value delivery modeling language) capabilities that are critical
to the business and may be necessary for differentiation. (Fred A. Cummins)

 Our main
activities are security and protection.

Key
partnerships:

In business model Canvas, key partnership are
relationship with business partners that are critical to the success of the
business. (Fred A. Cummins)

 Our key partners are formatters, recruitment agencies
and police.

Cost structure:

In a business Model Canvas, the cost
structure describes all the cost to operate the business. The cost of structure
will be based on recruiters and formatters services, cost of equipments and the
charge of the office fees. (Fred A. Cummins)

STAFFING REQUIRED

At PGS, we will ensure that we hire people that are qualified, hardworking,
creative, customer centric and are ready to work to help us build a prosperous
business that will benefit all the stake holders (the owners, workforce, and
customers).

As a matter of fact, profit-sharing arrangement will be made available to
all our senior management staff and it will be based on their performance for a
period of five years or more as agreed by the board of trustees of the company.
In view of the above, we have decided to hire qualified and competent hands to
occupy the following positions;

Chief
Executive Officer
Chief
Security Officer / Manager
Security
Consultant
Admin
and HR Manager
Marketing
and Sales Executive
Accountant
Customer
Services Executive
Security
Guards

 

RECRUITMENT AND SELECTION:

The
primary purpose of the recruitment and selection process is to achieve one
desired end; appointing the right person to the right job. This is a critical
task for any manager, and one that is more difficult when there is shortage of
the needed skills and experience in the labour market . (Margaret Dale)

Recruitment:

The recruitment
of most security officers is not very elaborated. Most security companies
obtain the majority of their applicants as a direct result of newspaper
advertising .Qualifications for these positions are normally minimal. Many
Agencies will request that the applicant possess a high school education or
equivalent. A company can request all applicants have a high school diploma or
GED, but they may have to show proof for requiring the diploma. A clean police
record is a typical requirement listed in job advertisements.

 

Selection:

Selection
standards for many security officiers positions are virtually nonexistent.
Intense completion exist within the contract security industry .Often, a
security agency will be willing to pay the security officier at or minimum wage
.In the Professional Security Guard company they will be paid at the normal
wage after selection.

 

TRAINING AND DEVELOPMENT:

 

Outsourcing
training and development :

Outsourcing
involves the use of an external supplier to provide training and development
programs and services. It involves the purchase of training services and
products from external suppliers rather than using in-house services . (Alan Michael Saks,Robert R. Haccoun)

We will
be using this strategy but ethical codes and standards will be our company.

In
principle of security, Ricks, Tillet and VanMeter stated, “There is no more
important issue in private security today than the training received by private
security personnel”( Pamela A. Collins,Truett A.
Ricks,Clifford W. Van Meter).Although there are a number of difference between
private security and public law enforcement, The greatest difference is the
issue of training. Most states require 400 hours of entry-level training for
newly hired police officer but only a few states require any training for
private security personnel. If you are currently employed as private security officer,
recall the amount of training you received when you began your assignment. The
primary purpose for this training manual is to provide comprehensive, yet easy
–to-read and easy-to-understand, course that will provide the security officer
with the basic knowledge required to adequately perform his or her job. To be
effective, training must be continuous and repeated often.As noted earlier,
Standard 2.5 of the official private security Task force report recommends 8
hours of formal pre-assignment training and 32 hours of additional training
within 3 months (Ralph Brislin)

 

MOTIVATION:

Resaerch
in Great Britain on job fatigue by Wyatt, Fraser, and Stock(1929) was a
precursor to enlargement. They found that changing  jobs at specific intervals reduced monotony.
With light repetitive work, emplyemees produce their best output if their task
is changed every 1.5 to 2 hours.In addition they found that piece-rate pay
resulted in fewer symptoms of boredom than hourly pay. This finding predates
Lawler’s (1965) and supports Taylor’s(1911) earlier conclusion that money  can indeed be an incentive for performance if
job performance is the criterion for determining the person’s pay . (Gary P. Latham)

 

 

 

 

 

 

 

PESTLE
Analysis: Understand and plan for your business environment

Par 50MINUTES.COM,

The
Changing Role of the Human Resource Profession in the Asia Pacific Region

Par Jayantee Saha,Chris Rowley

New
Venture Creation: A Framework for Entrepreneurial Start-Ups

Par Paul Burns

Building
the Agile Enterprise: With Capabilities, Collaborations and Values

Par Fred A. Cummins

The
Effective Security Officer’s Training Manual

Par Ralph
Brislin

Managing
Performance Through Training and Development

Par Alan Michael Saks,Robert R. Haccoun

A
Manager’s Guide to Recruitment & Selection

Par Margaret Dale

Work
Motivation: History, Theory, Research, and Practice

Par Gary P. Latham

Principles
of Security and Crime Prevention

Par Pamela A. Collins,Truett A.
Ricks,Clifford W. Van Meter

Marketing Planning 06/09

Par Karen Beamish,Ruth Ashford

is.muni.cz(Masaryk university)

https://is.muni.cz/el/1456/jaro2008/PHMAEU/um/5143745/PEST_20Analysis.pdf