CHANGES IN THE PROFILE OF SECURITY MANAGERS

Similar documents
David Erwin Ritter Associate Professor of Accounting MBA Coordinator Texas A&M University Central Texas

Master s Degree Programme in East Asian Studies

Organising ROSE (The Relevance of Science Education) survey in Finland

Principal vacancies and appointments

HEPCLIL (Higher Education Perspectives on Content and Language Integrated Learning). Vic, 2014.

An Analysis of the El Reno Area Labor Force

Master of Arts in Applied Social Sciences

The recognition, evaluation and accreditation of European Postgraduate Programmes.

Co-operation between Higher Education Institutions in Oulu. 30. September 2015 Jouko Paaso President, CEO

SME Academia cooperation in research projects in Research for the Benefit of SMEs within FP7 Capacities programme

ANALYSIS: LABOUR MARKET SUCCESS OF VOCATIONAL AND HIGHER EDUCATION GRADUATES

Title: Improving information retrieval with dialogue mapping and concept mapping

Education in Armenia. Mher Melik-Baxshian I. INTRODUCTION

Analysing and Understanding the Demand for Schooling

DEPARTMENT OF FINANCE AND ECONOMICS

Impact of Educational Reforms to International Cooperation CASE: Finland

POLICE COMMISSIONER. New Rochelle, NY

Swinburne University of Technology 2020 Plan

European Association of Establishments for Veterinary Education. and the Federation of Veterinarians of Europe

Academic profession in Europe

Submission of a Doctoral Thesis as a Series of Publications

Lincoln School Kathmandu, Nepal

SCHOOL. Wake Forest '93. Count

Linguistics Program Outcomes Assessment 2012

The Netherlands. Jeroen Huisman. Introduction

saimia.fi SAIMAA UNIVERSITY OF APPLIED SCIENCES APPLICANT S GUIDE

HAAGA-HELIA University of Applied Sciences. Education, Research, Business Development

ANNUAL REPORT. The South Australian Law Reform Institute. 1 January December 2012

Simulation in Maritime Education and Training

Developing Flexible Dual Master s Degree Programs at UPAEP (Universidad Popular Autónoma del Estado de Puebla) and OSU (Oklahoma State University)

5.7 Country case study: Vietnam

EU Education of Fluency Specialists

Modern Trends in Higher Education Funding. Tilea Doina Maria a, Vasile Bleotu b

The Finnish Academy for Skills Excellence (FASE)

TOURISM ECONOMICS AND POLICY (ASPECTS OF TOURISM) BY LARRY DWYER, PETER FORSYTH, WAYNE DWYER

What Is a Chief Diversity Officer? By. Dr. Damon A. Williams & Dr. Katrina C. Wade-Golden

Milton Public Schools Fiscal Year 2018 Budget Presentation

Testimony to the U.S. Senate Committee on Health, Education, Labor and Pensions. John White, Louisiana State Superintendent of Education

Matrix for the evaluation of teaching skills in the Faculty of Medicine

2016 School Performance Information

New Project Learning Environment Integrates Company Based R&D-work and Studying

Faculty of Tourism Studies TURISTICA. Portorož, Slovenia

INSTRUCTION MANUAL. Survey of Formal Education

EXECUTIVE SUMMARY. TIMSS 1999 International Science Report

MASTER S COURSES FASHION START-UP

Students representation in institutional governance Case: Finland

Knowledge for the Future Developments in Higher Education and Research in the Netherlands

Did we get to the right train?

UC Irvine Journal for Learning through the Arts

A European inventory on validation of non-formal and informal learning

Visionary Leadership Global Business Excellence Innovation and New Business Creation Personal Growth

Career Series Interview with Dr. Dan Costa, a National Program Director for the EPA

CONCEPT MAPS AS A DEVICE FOR LEARNING DATABASE CONCEPTS

Create A City: An Urban Planning Exercise Students learn the process of planning a community, while reinforcing their writing and speaking skills.

EMPIRICAL RESEARCH ON THE ACCOUNTING AND FINANCE STUDENTS OPINION ABOUT THE PERSPECTIVE OF THEIR PROFESSIONAL TRAINING AND CAREER PROSPECTS

Director, Intelligent Mobility Design Centre

The Isett Seta Career Guide 2010

HE and VET, partnering for ensuring portability of qualifications and permeability among education and training systems

Training Programme for Doctoral Thesis Supervisors in University of Turku

Global MBA Master of Business Administration (MBA)

RECRUITMENT AND EXAMINATIONS

Senior Research Fellow, Intelligent Mobility Design Centre

REQUEST FOR PROPOSALS SUPERINTENDENT SEARCH CONSULTANT

SASKATCHEWAN MINISTRY OF ADVANCED EDUCATION

Childhood; Family background; Undergraduate education; Scholarships opportunities. Family background; Education

Lesson M4. page 1 of 2

TABLE OF CONTENTS. By-Law 1: The Faculty Council...3

A Framework for Articulating New Library Roles

HIGHER EDUCATION IN POLAND

Pharmaceutical Medicine as a Specialised Discipline of Medicine

Post-intervention multi-informant survey on knowledge, attitudes and practices (KAP) on disability and inclusive education

Nottingham Trent University Course Specification

VITA. SHANNON S. LAMB PO BOX 244 CLEVELAND, MS Office: (662) Cell: (662)

Julie Gawrylowicz. Personal Statement and Research Interests

Module Title: Managing and Leading Change. Lesson 4 THE SIX SIGMA

GENERAL INFORMATION STUDIES DEGREE PROGRAMME PERIOD OF EXECUTION SCOPE DESCRIPTION LANGUAGE OF STUDY CODE DEGREE

Use and Adaptation of Open Source Software for Capacity Building to Strengthen Health Research in Low- and Middle-Income Countries

UPPER SECONDARY CURRICULUM OPTIONS AND LABOR MARKET PERFORMANCE: EVIDENCE FROM A GRADUATES SURVEY IN GREECE

A Finnish Academic Libraries Perspective on the Information Literacy Framework

Rethinking Library and Information Studies in Spain: Crossing the boundaries

PROJECT DESCRIPTION SLAM

Launching an International Web- Based Learning and Co-operation Project: YoungNet as a Case Study

CERTIFIED TEACHER LICENSURE PROFESSIONAL DEVELOPMENT PLAN

PROFESSIONAL INTEGRATION

Essex Apprenticeships in Engineering and Manufacturing

Enter Samuel E. Braden.! Tenth President

Institutional repository policies: best practices for encouraging self-archiving

Definitions for KRS to Committee for Mathematics Achievement -- Membership, purposes, organization, staffing, and duties

What You Need to Know About Financial Aid

Sociology. M.A. Sociology. About the Program. Academic Regulations. M.A. Sociology with Concentration in Quantitative Methodology.

Developing Effective Teachers of Mathematics: Factors Contributing to Development in Mathematics Education for Primary School Teachers

Standards and Criteria for Demonstrating Excellence in BACCALAUREATE/GRADUATE DEGREE PROGRAMS

Ekapeli (in Finnish), GraphoGame (internationally)

World Data on Education Données mondiales de l éducation Datos Mundiales de Educación. VII Ed. 2010/11 IBE/2011/CP/WDE/AI

Schenectady County Is An Equal Opportunity Employer. Open Competitive Examination

The proportion of women in Higher Engineering education has increased

Towards sustainability audits in Finnish schools Development of criteria for social and cultural sustainability

Exploring the Development of Students Generic Skills Development in Higher Education Using A Web-based Learning Environment

INTERVIEW FORM FOR DIRECT CARE POSITIONS. Interviewer(s) Name(s)

DEPARTMENT OF SOCIAL SCIENCES

Transcription:

CHANGES IN THE PROFILE OF SECURITY MANAGERS Teemupekka Virtanen Helsinki University of Technology, teemupekka. virtanen@hutfi Abstract: Key words: Twelve years ago a development program for security managers was started in Finland. The first program was designed to fulfil the needs of a security manager in an organization. However, the content was an educated guess. During the second program, in 1993, we made a study on how security managers themselves feel the requirements of their work and which part of their work they felt difficult or easy. We were interested in what kind of education security managers would need. These results were used when the following programs were planned and some extra courses were introduced. However, these results were never really published. Now, we try to improve the development program for security managers again. We took the results of the old study and found out the current situation. We noticed that the requirements for a security manager have changed. The security managers have become a manager of a department instead of a single specialist. They do not need as deep specialized knowledge as nine years ago. Instead they need understanding of business processes and managerial skills. Another finding is that security manager is a long term career. Few security managers have proceeded to higher vacancies. Instead many of those security managers who participated the old study as a security manager are now retiring from that very same position. security education, areas of security, requirements for security manager 1. INTRODUCTION Security as a word has many different meaning and people understand it several different ways. Louise Yngstrom presented these questions (applied to information security) in her thesis (Yngstrom, 1996). She proposed a holistic approach and stated that security is not only collection of technical methods but a way to combine several areas into a system to produce a C. Irvine et al. (eds.), Security Education and Critical Infrastructures Springer Science+Business Media New York 03

42 Changes in the Profile of Security Managers secure system. Another view is presented by Mikko T. Siponen (Siponen, 00). Security in general has the same problems. There are several different areas and it is sometimes difficult to combine security functions to the business processes. Perhaps due to this problem it has been difficult for security to find its place in the scientific world. Layne Hesse and Clifton L. Smith have presented some existing placements for security curricula at universities (Hesse and Smith, 01}. According their study security is closely related to the crime prevention or the law enforcement curricula. In Finland there has been a trend to take some duties from the governmental officers to the private companies. This far there has not been a need for an officially certified education for security professionals since there has been no special duties either. The guards have had in principle the same rights than any citizen have. The change requires a formal education for all levels of security professional and thus the university level education has to be defined properly (Virtanen, 01). In this paper we present some older results, which have been used when the development program for security managers was defined. We also present the current situation; what skills the education security managers think they need to manage their work. 2. TEN YEARS AGO Almost ten years ago we made a small study on background and knowledge of security managers in Finland. Since the results of the study was published only in Finnish (Virtanen, 1994) we introduce here the main results of the study. Engineers Soldiers All 2.1 Background Figure I. The groups in the graphs The study was made in the end of 1993 and published 1994. It was part of the second development program for security managers. We were interested to find out which were the strong areas of security managers and which should have more lectures in the program. We selected the participants of the two first development programs as a target group of our questionnaire. The practical reason was that those people

Teemupekka Virtanen 43 were easily available and they were assumed to be willing to participate the study. However, there was another reason, too. These two development programs were the first higher level education on security in Finland. Thus the participants were extraordinary high level security managers. After the initial need was fulfilled there has been also lower level security professionals in these programs. 2.2 The Results As background information we asked some general questions. Over 75% of people were over 40 years old and about % between and 40. This was quite natural result since in these first development programs the participants were quite high level managers. About half of people had a university level degree when most of the others had polytechnics degree (now this level is a Bachelor's degree when the university level is a Master's degree). The biggest business areas were industry (35%), services (22%), defence (17%) and consulting (%). % 50 40 \ Area Figure 2. The most important duties When we asked the main education areas we noticed that there were two areas which were much more common than the others. 42% of people had a technical and 31 % a military background. The other groups were economics (%), juristic (3%), police (7%) and others or no education (7%). We decided to concentrate on the two biggest groups: engineers and soldiers.

44 Changes in the Profile of Security Managers 0 90 %50 40 2 3 4 5 6 7 8 9 11 121314 15 Figure 3. All duties 0 90 %50 40 Figure 4. Easy duties Figure 2 presents the most important areas of security according the answers (The different areas are listed in Table 1 and the groups are presented in Figure 1). In Figure 3 are all the areas which are part of people work. There are some natural explanation for the differences between engineers and soldiers. Most of the soldiers were working in the governmental organizations where were no products nor production.

Teemupekka Virtanen 45 0 90 %50 40 Figure 5. Difficult duties There were no insurance in those organizations either. In the industry where most of the engineers were working were more technical staff and areas like continuance planning belonged to other than security managers. Table 1. Security areas in the questionnaire Number Area Number Area 1 Working safety 9 Fire and rescue 2 Access control Personnel security 3 Risk management 11 Insurance 4 Product safety 12 Information security 5 Computer security 13 Security of transportation 6 Preparing for war 14 Environmental security 7 Continuance planning 15 Physical security 8 Environmental protection We asked also how people grade their expertise in these areas. In Figure 6 are the answers in scale 0 to. We also asked for easy areas (Figure 4) and difficult areas (Figure 5). The need for education is presented in Figure 7. 9 8 7 6 5 4 3 2 1 1 2 3 4 5 6 7 8 9 11 121314 15 Figure 6. How people grade their expertise

46 Changes in the Profile of Security Managers 0 90 %50 40 2.3 Discussion Figure 7: The need for more education These results present the situation almost ten years ago. In that time there were still many senior officers who didn't use computers at all. However, the process was already going on. Most of the employees at the offices already use personal computers even ifthe integration was not complete. The computer security was something confusing. Also the meaning of information security was changing due to the computer-based systems. The security managers felt they need more information on these areas. There was also a competition that is responsible for these issues. There was a computer department in many organizations and conflicts between computer and security people were common. The engineers and soldiers worked mainly in different types of organizations. The engineers worked in the industry and they typically had some background in the production. They were more familiar with safety in the working places and insurances than the soldiers who worked mainly in the administration. 3. THE CURRENT SITUATION In this section we describe the situation in the end of 02. 3.1 Background In this time we decided to use an interview instead of a questionnaire. We noticed that remarkably many of security managers are still in the same position as nine years ago. These questions were probably familiar to them and thus the interview might give better results.

Teemupekka Virtanen 47 This time the target group was selected more clearly among the managers than nine years ago. That time there were also some people from security related service providers or manufactures and insurance companies. This time we selected only security managers from public companies and central administration organizations. We noticed that there were some changes happening. Several "old boys" either have just retired or will retire in the near future. The situation in this study is like it was in the end of 02. 3.2 The Results When considering security managers (leaving out insurance and security related companies) we notice that about 50% of the security managers are still the same as nine years ago. However, during last year there has been some changes and during the next year there will be several retirements. In general the requirements for formal education is higher than earlier. The big companies require a Master's degree and smaller ones a Bachelor's degree for a security manager. There is only one self-made-man security manager who has changed a company during last year. The background of security managers is almost the same as earlier. The percentage of engineer is the same but the number of military people has decreased. The number of lawyers has increased. However, the changes are small. There are now two Masters of Security in Finland, one with background in engineering and other in military. The first is now working as a professor at the university (security) and the other as the chief security officer of the Finnish Defence Forces. Since Master of Security is not an official degree (yet) we have considered these according their original background. The working areas of security managers have remain mostly the same. The risk management is a tool, which is now understood in more general way than nine years ago. In that time it means merely insurance management while it is now a general tool to manage risk and security. Thus the risk management is now part of every security manager's work. The security managers of the new generation have higher formal education and they feel themselves more familiar with computers and information systems. In the same time the traditional guard-and-dog security is more difficult to manage for them. The older generation people manage computers in personal level but the information systems are not familiar. They have a long experience as a leader and manager but managing the new generation is sometimes difficult.

48 Changes in the Profile of Security Managers 3.3 Discussion The role of security managers has changed during last ten years. When the security manager was a single specialist with perhaps one assistant there is now often a security department with several people in many organizations. The role has changed from a specialist to a manager. Nine years ago security managers felt they need more information in several security related areas. Now it is not so important any more since they have specialists of their own who managed these areas. Instead they need general managing skills and understanding of business management. Ten years ago there was a great economic depression in Finland. However, that had no effect on computer departments since information processing was a way to improve efficiency. After another depression after the millennium this attitude has changed. Now computers are only one department among the others and as mortal as the others. Perhaps this has reduced conflicts between computer and security people. When we compare this results with those Hesse and Smith have presented (Hesse and Smith, 01), we noticed that there are several similarities. Our study concentrates on security managers while they have several different groups. Perhaps our nine years old results are more like their requirements for experts and our current results are more like their security managers. These results suggest that we should continue the current education but target it more to the experts than managers. Perhaps we should introduce a security awareness program, like (Warren and Hutchinson, 01). The security education should be part of normal curricula. In information security area there are such curricula (like (Katsikas, 1999) and (White et ai., 1999» but in security management there are a few curricula (Edith Cowan University, 0l}, (University of Leicester, 01». 4. CONCLUSION Nine years ago we study the background and personal capabilities of security managers in Finland and noticed that there were two main areas of education: engineering and military. Many of the security managers felt that they need more information in several security related areas. Now the situation has changed. Security managers are more managers than specialists and they felt they need more experience in general management than in some specific areas. The changes in the background are small but we assume that there will be changes in that, too. There will be more lawyers and economists in the future.

Teemupekka Virtanen 49 However, security seems to be a long career. Those who have entered this area have stayed there. There have been some movements between industry, insurance, services and education but the area has been the same. This means that it is difficult to get promotion since there is no step after the security manager. Those people who were security managers nine years ago are still in the same position. REFERENCES Edith Cowan University (01). Security Science, Postgraduate studies. PD-3236-04-01-00, Australia, Edith Cowan University. Hesse, L and Smith, C. L. (01). Core curriculum in security science. In Armstrong, H., editor, Proceedings of the 5 th Australian Security Research Symposium, pages 87-4, Australia, Edith Cowan University. Katsikas, S. K. (1999). Academic curricula and curricula developments in Europe - The ERASMUS/SOCRATES Approach. In Yngstron, L. and Fischer-Hubner, S., editors, WISE I, Proceedings of the IFIP TCll WG ll.8, pages 3-17, Sweden, DSV. Siponen, M. T. (01). A paradigmatic analysis of conventional approaches for developing and managing secure IS. In Dupuy, M. and Paradinas, P., editors, Trusted Information, The New Decade Challenge, pages 421-452, USA. Kluwer Academic Publisher. University of Leicester (02). The Scarman Centre: excellence in the study and teaching of community safety, policing, criminology, security, risk and health & safety. GB. Virtanen, T. (1994). Tutkimus turvallisuusjohtajan ominaisuuksista (Study on the capabilities of security managers). In Berg, K.-E., editor, 2. Turvallisuusjohdon kurssi, Kurssijulkaisu, Finland, HUT. Virtanen, T. (01). An information security education program in Finland, In Armstrong, H. and Yngstrom, L., editors, Proceedings ofwise2, Australia, Edith Cowan University. Warren, M. and Hutchinson, W. (01). Teaching small and medium sized enterprises about security. In Armstrong, H., editor, Proceedings of the 5 th Australian Security Research Symposium, pages 7-218, Australia, Edith Cowan University. White, G. B., Marti, W. and Huson, M. L. (1999). Incorporating Security Issues Throughout the Computer Science Curriculum, In Yngstron, L. and Fischer-Hubner, S., editors, WISE I, Proceedings of the IFfP TCI I WG 11.8, pages 19-26, Sweden, DSV. Yngstrom, L. (1996). A systemic-holistic approach to academic programmes in IT security. Sweden, Stockholm University/Royal Institute of Technology.