This website uses cookies to ensure you have the best experience. Learn more

Security Essay

9492 words - 38 pages

Chapter 1

An Introduction to Strategic Human Resource Management

Pawan Budhwar and Samuel Aryee

The objectives of this chapter are to:
• Summarise the developments in the field of human resource management (HRM)
• Examine what strategy is
• Highlight the growth and nature of strategic human resource management (SHRM)
• Examine the linkages between organisational strategy and HRM strategy
• Match HRM to organisational strategy
• Discuss the main perspectives on SHRM and organisational performance.

What is HRM?
Developments in the field of HRM are now well documented in the management literature (see e.g. Boxall, 1992; Legge, 1995; Schuler and ...view middle of the document...

The debate relating to the nature of HRM continues today although the focus of the debate has changed over time. It started by attempting to delineate the differences between ‘Personnel Management’ and ‘HRM’ (see e.g. Legge, 1989; Guest, 1991), and moved on to attempts to incorporate Industrial Relations into HRM (Torrington et al., 2005), examining the relationship of HRM strategies, integration of HRM into business strategies and devolvement of HRM to line managers (Lengnick-Hall and Lengnick-Hall, 1989; Brewster and Larson, 1992; Budhwar and Sparrow, 1997) and then the extent to which HRM can act as a key means to achieve competitive advantage in organisations (Barney, 1991). Most of these developments have taken place over the last couple of decades or so, and have precipitated changes in the nature of the HR function from being reactive, prescriptive and administrative to being proactive, descriptive and executive (Boxall, 1994; Legge, 1995). At present then, the contribution of HRM in improving a firm’s performance and in the overall success of any organisation (alongside other factors) is being highlighted in the literature (see e.g. Guest, 1997; Schuler and Jackson, 2005; 2007). In relation to the last debate, three perspectives emerge from the existing literature: universalistic, contingency, and configurational (Katou and Budhwar, 2006; 2007).
The ‘universalistic’ perspective posits the ‘best’ of HR practices, implying that business strategies and HRM policies are mutually independent in determining business performance. The ‘contingency’ perspective emphasises the fit between business strategy and HRM policies and strategies, implying that business strategies are followed by HRM policies in determining business performance. The ‘configurational’ perspective posits a simultaneous internal and external fit between a firm’s external environment, business strategy and HR strategy, implying that business strategies and HRM policies interact, according to organisational context in determining business performance.

|Activity |Briefly discuss with your colleagues: (1) the main factors responsible for developments in the field of HRM/SHRM; and |
| |(2) the main debates in the field of HRM. |

Emergence of strategic human resource management (SHRM)
The above developments in the field of HRM highlight the contribution it can make towards business success and an emphasis on HRM to become an integral part of business strategy (Lengnick-Hall and Lengnick-Hall, 1988; Brewster and Larsen, 1992; Bamberger and Meshoulam, 2000; Schuler and Jackson, 2007). The emergence of the term ‘strategic human resource management’ (SHRM) is an outcome of such efforts. It is largely concerned with ‘integration’ of HRM into the business strategy and ‘adaptation’ of HRM at all levels of the organisation (Guest, 1987; Schuler, 1992).

What...

Other assignments on Security

Security Awareness Essay

2691 words - 11 pages Information Security - Security Awareness Abstract: 3 Security Awareness 4 Regulatory Requirements for Awareness and Training 7 References 13 Abstract: Information security means protecting information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. A policy can be described as a set of principles intended to manage

Cyber Security Essay

317 words - 2 pages Why Hire Me? _____________________________________________________________ I am a highly motivated and professional Security Engineer with (Linux Professional Institute (LPI 102) certification and willing to pass CEH Certified Ethical Hacking). Capable of delivering at the highest level. With excellent interpersonal skills, I am confident in my ability to become the most valuable member of your company. I have developed expertise in networks

Biometrics Security

665 words - 3 pages BIOMETRICS SCANNING BY ADAM RUDDY AIU ONLINE 05 MAY 2012 Biometrics creates a digital copy of identifing markers in your finger prints, signature and voice commands. without these markes being detected the system will not open up or allow the user to access any information until they meet the security requirements. Biometrics uses a 348 byte sensory system to help store and generate the required sensory log needed to operate at full

Wan Security

1341 words - 6 pages Executive Summary This document describes the security plan for a WAN (wide area network) that has been setup for an organization to work in an efficient manner. The WAN connects many different locations scattered across a wide area. The WAN is an important feature of the organization and has to play an important role in its working. Huge amount of information is transferred everyday and is crucial for the organization. A network crash due to

Security Breach

558 words - 3 pages Cyber Attacks and Security: The Problem and The Solution Shamika A. Woumnm BIS/221 February 16, 2015 Gregorio Chavarria Cyber Attacks and Security: The Problem and The Solution In December of 2013, Target reported that up to 70 million customers worldwide were affected by a major security breach. It was reported that thieves stole massive amounts of credit and debit card information during the holiday season which also swept

Information Security

253 words - 2 pages information security context? It refers to how the info supplied by users will be protected. Is the data confidential, or will it be accessed by anyone? Will it be protected from others? Can you expect reasonably that your personal/confidential information will be protected? 3. (Whitman & Mattord, 2011, p. 114) How does the Sarbanes-Oxley Act of 2002 affect information security managers? 4. (Whitman & Mattord, 2011, p. 114) How is due

Data Security

8305 words - 34 pages I. ------------------------------------------------- Chapter 2: Context and Background I n this chapter, we introduce the main concepts related to the problem we are addressing, in order to provide the casual reader with the necessary background information for this dissertation. As the title of this thesis is “Analysis of Security and QoS in Network with time constraints”, it is clear that our work requires a deep understanding of three main

Rfid Security

3358 words - 14 pages RFID SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express permission of the Government of the HKSAR. Disclaimer: Whilst the Government endeavours to ensure the accuracy of the information in this paper, no express or implied warranty is given by the Government as to the accuracy

Homeland Security Committee

764 words - 4 pages Homeland Security Committee (House of Representatives) Who are the Members? Congressman Peter King is serving his tenth term in the U.S. House of Representatives and is the chairman of the Homeland Security committee a position he has held for 6 years. King has been a leader in the ongoing effort to have Homeland Security funding based on threat analysis and is a strong supporter of the war against international terrorism, both at home

Principles Of Information Security

953 words - 4 pages Every organization is different in the way that it communicates internally and with its vendors and customers and in the kinds of information that it sends over the Internet. Practicing strong computer security is a nonnegotiable requirement for organizations doing business today. However, building security into an existing corporate culture is a complex undertaking. Every organization has a security culture, and each is as unique as the

Social Security Paper

987 words - 4 pages History The U.S. Social Security program is designed to aid residents in need through welfare subsidies. The programs are provided by organizations on federal, state, local, and private levels; and help to provide eligible residents with food, shelter, healthcare, education and money. Aid is provided through financial aid for college education, unemployment disability insurance, food stamps, pensions for eligible low-wage workers, subsidies

Similar Documents

Security Essay

1066 words - 5 pages Security Students Name Institutions Name How to resolve a security issue in a situation where the need for security is great but the available funds are limited Community participation is a very important aspect in enhancing security. Through the community’s leaders individuals can be sensitized on the need to protect each other and also help them to create a ‘we’ feeling in the management of the important resources in a region

Security Essay

765 words - 4 pages numerous security issues and risks. The problem statement that Team INFINITY has come up with is identifying various security risks that lead to increased theft on campus. There are plenty of solutions to prevent this problem from happening. However, strategically placing security features will help prevent crime and theft from occurring on ITT Technical Institutes campus. Team INFINITY’s solution statement for this problem is using cameras

Security Policy Essay

304 words - 2 pages Riordan Manufacturing Security Policy Smith Systems Consulting has been hired to evaluate and consult on the creation of a new information technology security policy to span the complete enterprise infrastructure. This document will serve as a recommendation for Riordan Manufacturing as it pertains to the enterprise wide information security strategy. Riordan Manufacturing currently has three locations within the United States and one

Database Security Essay

281 words - 2 pages * Security in Database System * GROUP 5: * Chandra Muthineni Marat Talantov Bharath Rao Sinan Albayrak * Agenda * Introduction * Threats Of DataBase Security * Classification of Database Security * Process of Creating Database Architecture * Advantages * Conclusion * Q & A * References * Introduction * Database security is a crucial area that a firm should enhance in order to