Emilian Cristian Irimescu ASE Bucuresti - Scoala doctorala

Similar documents
Italia Africa Business Week

THE DIGITALISATION CHALLENGES IN LITHUANIAN ENGINEERING INDUSTRY. Darius Lasionis LINPRA Director November 30, 2018 Latvia

Software Production in Kyrgyzstan: Potential Source of Economic Growth

ACTIVITY REPORT OF THE NATIONAL INDUSTRIAL COMPETITIVENESS COMMISSION PRAMONĖ 4.0 OF 2017

HORIZON 2020 The new Framework Programme for Research and Innovation

EU businesses go digital: Opportunities, outcomes and uptake

Slide 15 The "social contract" implicit in the patent system

NATIONAL STRATEGY FOR THE SPACE SECTOR: PROPOSALS MADE BY PROESPAÇO The Portuguese Association of Space Industries MARCH 19, 2012

ConstantinaMakri. Research Promotion Foundation

Evaluation of the gender pay gap in Lithuania

RESEARCHES ON QUALITY MANAGEMENT IN THE FIELD OF KNITWEAR INDUSTRY

the Companies and Intellectual Property Commission of South Africa (CIPC)

FORUM MEETING #2: JULY 8-9, 2018; SAN FRANCISCO, CA. Forum on Preparing for Automated Vehicles & Shared Mobility

Consumers International

Please send your responses by to: This consultation closes on Friday, 8 April 2016.

Innovation in Europe: Where s it going? How does it happen? Stephen Roper Aston Business School, Birmingham, UK

WIPO Sub-Regional Workshop on Patent Policy and its Legislative Implementation

They all say it is about the economy. It is more than ratio s, percentages, and growth; it is about the Lives of people

ASSESSMENT OF DYNAMICS OF THE INDEX OF THE OF THE INNOVATION AND ITS INFLUENCE ON GROSS DOMESTIC PRODUCT OF LATVIA

KICK-OFF EVENT: A STREAM OF COOPERATION. Improve framework conditions for innovation

Analysing Megatrends to Better shape the future of Tourism

Strategic Roadmapping - Aligning technology, products and markets

"Made In China 2025 & Internet Plus: The 4th Industrial Revolution" Opportunities for Foreign Invested Enterprises in China

Building a Competitive Edge: Protecting Inventions by Patents and Utility Models

Session 4: Effective Governance & Policy Instruments Success Stories. Leslie Vella Malta Tourism Authority Valletta

THE ECONOMICS OF DATA-DRIVEN INNOVATION

Digital Divide and Afghanistan Muhammad Aimal Marjan

Moving to Model-Based Design

Economic Clusters Efficiency Mathematical Evaluation

Operational Objectives Outcomes Indicators

Culture 3.0: The impact of culture on social and economic development, & how to measure it

SMB/5835/SBP. TC13 Scope

Post : RIS 3 and evaluation

Higher Education in the XXI century: challenging everything and also the library role

The 13 th International Conference on Quality and Dependability - CCF an Outstanding Event in the Field

Malta: What is it? Where is it?

(Beijing, China,25 May2017)

Business Clusters and Innovativeness of the EU Economies

Design Constructs for Integration of Collaborative ICT Applications in Innovation Management

12808/16 PG/cb 1 DG G 3 C

Socio-Economic Sciences and Humanities. Preservation for reuse of high quality data

COMPARATIVE STUDY ON THE IMPORTANCE OF THE CIVIL REGISTRATION STATISTICS. Patrick Nshimiyimana

THE DIFFERENCES OF TECHNOLOGICAL ADVANCE IN EUROPEAN COUNTRIES

Management Of Technology Innovation And Value Creation Selected Papers From The 16th International Conference On Management Of Technology

Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytics

Innovation policy mixes and implications on HEIs - emerging conclusions from the OECD innovation policy reviews

PREPARATORY ACTION ON DEFENCE RESEARCH

Overview: Radio Frequency Spectrum

Flexibilities in the Patent System

MODERN CENSUS IN POLAND

The Library: from classic to postmodern

SCIENTIFIC RESEARCH AND INNOVATION - DECISIVE FACTORS OF BUSINESS PERFORMANCE

Nguyen Thi Thu Huong. Hanoi Open University, Hanoi, Vietnam. Introduction

Mainstreaming PE in Horizon 2020: perspectives and ambitions

Colombia s Social Innovation Policy 1 July 15 th -2014

ÓBIDOS CHARTER A PACT FOR CREATIVITY

FELLOWSHIP SUMMARY PAPER. Digital Inclusion in New Zealand A CALL TO ACTION

Public Consultation: Science 2.0 : science in transition

Fintech & Banking: Future of Financial Services and Regulation

Investment Highlights. Revenue Distribution

The Role Of Public Policy In Innovation Processes Brussels - May 4 th, 2011

Digital Industrialisation in Developing Countries - A Review of the Business and Policy Landscape

POSITION PAPER. GREEN PAPER From Challenges to Opportunities: Towards a Common Strategic Framework for EU Research and Innovation funding

DESTINATION FEELGOOD. Minor 30 EC Offered in fall and spring semester. Interested? Get in touch with Timo Derriks for more information

Sixth Management Seminar for the Heads of National Statistical offices in Asia and the Pacific

Protect your ideas. An introduction to patents for students of natural sciences, engineering, medicine and business administration

MEXICO 2030 BEFORE THE FOURTH INDUSTRIAL REVOLUTION: PROPOSALS FOR PRODUCTIVITY, GROWTH AND SOCIAL INCLUSION. Executive Summary

THE INTERNATIONALIZATION OF CORPORATE R&D AND THE DEVELOPMENT OF AUTOMOTIVE R&D IN EAST-CENTRAL EUROPE

Challenges for the New Cohesion Policy nd joint EU Cohesion Policy Conference

Cultivating Entrepreneurial Spirit in Asia

WHITE PAPER. Spearheading the Evolution of Lightwave Transmission Systems

Futures Finnish Style Past, Present and the Future. Making Futures Matter Cardiff, 7 February 2007 Juha Kaskinen

MEGATRENDS THE TREND TOWARDS

DEFENSIVE PUBLICATION IN FRANCE

The SONNETS Innovation Identification Framework

Process Planning - The Link Between Varying Products and their Manufacturing Systems p. 37

L 312/66 Official Journal of the European Union

Industry 4.0: the new challenge for the Italian textile machinery industry

Lithuania: Pramonė 4.0

Scoping Paper for. Horizon 2020 work programme Societal Challenge 4: Smart, Green and Integrated Transport

Use of forecasting for education & training: Experience from other countries

WIPO REGIONAL SEMINAR ON SUPPORT SERVICES FOR INVENTORS, VALUATION AND COMMERCIALIZATION OF INVENTIONS AND RESEARCH RESULTS

SMALL BUSINESS IN INNOVATIVE DEVELOPMENT OF RUSSIA

Goals of the AP World History Course Historical Periodization Course Themes Course Schedule (Periods) Historical Thinking Skills

Empirical Research Regarding the Importance of Digital Transformation for Romanian SMEs. Livia TOANCA 1

Game Mechanics Minesweeper is a game in which the player must correctly deduce the positions of

THE GSMA PRESENTS MINISTERIAL PROGRAMME

KKR & Co. Inc. Goldman Sachs U.S. Financial Services Conference December 4, 2018

WFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN ( )

FINANCING OF THE INNOVATIONS COMPETITIVENESS OF THE COMPANIES AND THE NATIONAL ECONOMY

Research Infrastructures and Innovation

Building Collaborative Networks for Innovation

Socio-Economic Sciences and Humanities. First Call for proposals. Nikos Kastrinos. Unit L1 Coordination and Horizontal Aspects

Fintech in Italy: opportunities and challenges for the digital transformation

The Policy Content and Process in an SDG Context: Objectives, Instruments, Capabilities and Stages

João Cadete de Matos. João Miguel Coelho Banco de Portugal Head of the Current and Capital Accounts Statistics Unit

Ibero-American Engineer Profile

Deregulating Futures: The role of spectrum

Role of Knowledge Economics as a Driving Force in Global World

OECD Science, Technology and Industry Outlook 2010 Highlights

Transcription:

Business Development Challenges for Security Industry The Classical Market and The New Technology Market Emilian Cristian Irimescu ASE Bucuresti - Scoala doctorala emil.irimescu@gmail.com The past years have been dominated by the technology s development in all areas of our social, professional and economic life. Security industry is also an area which is invaded day by day by new technology, like biometric technology or IP video analysis, and which is moving to a new vision and strategic approach. In this context, the Business Development activity for the security industry must be in concordance with the new trends of our society development. Also, Business Development for security industry must face new threats and some new issues raised by big infrastructure networks. This article wants to highlight the key aspect that the security management and the Business Development in the security industry must take into consideration for a successful activity. Which must be the strategy for a successful security business in this context? Which are the implications from the marketing perspective that lay s behind the new technology approach? Is technology for the security industry a necessity or just a caprice? We try to find out and to analyze the technology application in security for our market and also for international markets. Key words: Security, business, development, marketing, management, technology, strategy JEL classification: M31, M10. 1. Introduction Security industry is an industry almost as old as human civilization. If we look to the Maslow s pyramid we will see that safety and security, in different shapes, are on the second place in the human being needs pyramid hierarchy. For that, safety and security was, are and will be permanent needs that should be satisfied. Figure 1. Maslow pyramid Source: http://ro.wikipedia.org/wiki/abraham_maslow But, like in almost any of the active industries from today, also the security industry suffered and is suffering a series of structural and functional transformations. Shown initially as an activity based mostly on the human contribution, security industry s focus was for a long time on the man guarding, in many versions and structures. Then, as a consequence of the technology and electronics, security industry made space to what we call today electronic security systems. These systems, even there are burglary systems, monitoring systems, access control systems or others, completed or replaced the classical ways of approaching security. (Fennelly, 2012). The way these systems work is independent or related with man guarding. In the last years we are the witnesses of a clear trend of the consolidation of what we call Security Solutions. Security solutions approach the covering of the security needs, even if we talk about the human being, an organization or the society by the complete integration of the man guarding with some electronic security technologies, no matter their share is. The integrated approach of different security techniques is also a consequence of the increasing threats complexity. We can have cybernetics threats, terrorist threats, etc. 288

Business Development activity must take into consideration this aspects from an internal organization standpoint (organizations must keep up with the last trends in the industry) and also from the marketing and commercial standpoint (client oriented). 1.1. Security services Being the first manifestations of the security industry, security services and specially man guarding was for many decades the main way of providing this services and always the engine of this activity from a commercial and organizational standpoint. With a variety of forms, like perimeter guarding, access control guarding, intervention teams, escort, etc., all this forms always stand under the shadow of a low quality service, because of the almost exclusive use of the human factor (Fennelly, 2012). Today, we are witnessing the phenomenon of transformation of these services through technology in other ways of covering the same necessities. Obvious, there are still a lot of services that are difficult to translate to technology. For example, we can nominate the reception services or escort and guard services. 1.2. Security systems In comparison to the centuries or millenniums of man guarding in different forms, electronic security systems are just a few decades old. For that, when applied electronic and automation showed up, we also discovered the first forms of electronic security systems (Khairallah, 2006). In different forms, from video security systems to alarm systems or control access systems, all this technologies are based on programmable microcontrollers, devices that evolve step by step to microcomputers exclusively dedicated to security purposes. From the beginning, security systems differed fundamentally of man guarding by high stability and high fidelity. In fact, we talk about the physical and moral resistance, resistance that will always be in technology case higher than in human case. 1.3. Security solutions If until now we clarified what represented and what are representing the classical security services and electronic security systems, next we will define the border that define the Security Solutions and what delineates them by the previous approaches. At this moment we do not have a clear definition of what we call Security Solutions. Like any other term, we can approach it from many standpoints: structural, functional and commercial. From a structural standpoint, the security solution supposes the mandatory existing of a technological component (electronic security system) and also a security service, like man guarding, consultancy or monitoring. The electronic security system can be video based, alarm based (even we talk about closed spaces or perimeter detection), access control or other. From a functional standpoint, the security solution must provide the fulfillment of a security need, even if we talk about a person or an organization. Generally, the kinds of security needs satisfied by security solutions are medium or high difficulty, fact that justify in a way the use of different security techniques. The increased complexity of threats is based on the economic and social phenomenon of the last decades. For that we can mention the critical infrastructure networks (Knapp, 2015), industries globalization, increasing interdisciplinary of the industries, etc. But, we can adopt Security Solutions also in simple situations, like residential areas or small office areas. The third standpoint of these security solutions, very important from the perspective of this paper, is the commercial one. The security industry made a big step to the customer, no matter the nature or the complexity of the subject, to help him and to give him a complete solution for its need. The provider of the solution is fully responsible for the functionality of the solution, because he is choosing and designing it. Because the solutions are more technical and more complex, there are not any more at the hand of any customer to choose and/or evaluate them. For that, from the commercial standpoint, the security industry is now based on the dialog with the client, the need identification and then with the full responsibility of choosing the solution and implementing it. The management of the solution is only the provider responsibility. 289

Figure 2. Security solutions map Another important fact about the security solutions is the capacity of the security companies of approaching these services. For that, all of them must take into consideration the technology implementation in their activity, or if they have this component to modify the weights in technology favor. 1.4. Legal framework Because we do not have a clear Security Solutions definition and because we do not have an official line between the classical methods - like man guarding, electronic security systems and consultancy and what we call security solutions, the legal framework in Romania and also in European Union treats the security activities only on the classical components. Thereby, the 333 Law from 2003 republished in 2014 and the Government Decision number 301 from 2012 approaches separately security aspects like man guarding, risk assessment, electronic security systems and security dispatches. The provider has the freedom to choose the right combination of these services. The only step made by the law in Romania to an integration of these services is by the standpoint of minimal request on some special activities with a high risk level. These requests conduct the beneficiary and the provider to a security approach both in terms of security services and electronic security systems. But, from here to the security solutions there are still few steps to do. 2. State of knowledge About the security industry we have a lot of books and papers, mostly focused on physical security, from the electronic security standpoint and also from the classical man guarding standpoint. Also we have a lot of technical books focused on the applied domain of the security (supply chain, retail, hospitality, etc.). A clear example is The Security Risk Assessment Handbook: A Complete Guide for Performing Risk Assessment published by Douglas J. Landoll in 2006. The book is about risk, treating it in a professional and detailed manner. Another relevant book is Effective Physical Security published by Lawrence Fennelly in 2013. This book approach physical security mostly from the vulnerabilities and their treating standpoint, using modern ways and electronic security systems. There are also some books that besides the technical aspects of security also approach their applications. An example is Biometrics: Identity Verification in a Networked World, published by Samir Nanavati. The book is about applying the biometrics techniques in fields like security, online commerce and telemarketing. About Business Development, the literature is full of books that present techniques of focusing the efforts on the customers or the operational flow less. In all this ways the books indicate the same purpose, the increase of sells, by finding the customer needs and satisfying them. 3. Influence factors of security solutions Aside from the evolution of the complexity and intensity of the threats on the one hand and the technological development on the other hand, there are other some economical resorts on which the transition to the security solution is based. Two of these are the labor costs and maybe the most important the evolution of the medium price of the security equipment. These two components direct us in commercial, sales and business development terms to an acceptable price level of the security solutions, which allows to increase the sales volume maintaining and maybe setting higher the quality level. 3.1. Labor Costs and evolution Labor is a very important and major component in man guarding services. Thereby, the labor costs 290

have a major weight in the fee for these services. To analyze this we will consider the values provided by Eurostat for the medium hourly salary in the past ten years from six European Union countries. We considered six European Union countries relatively symmetrically distributed on European Union territory. Country/year 2004 2008 2012 2013 2014 Romania 1,90 4,20 4,10 4,40 4,60 Bulgaria 1,60 2,60 3,40 3,70 3,80 Germany 26,80 27,90 30,50 31,00 31,40 United Kingdom 21,50 20,90 21,70 20,90 22,30 Italy 22,40 25,20 27,70 28,10 28,30 Finland 24,40 27,10 31,30 31,90 32,30 Table 1. Labor costs per hour in EUR, 2004-2014 whole economy excluding agriculture and public administration Source: Eurostat, http://ec.europa.eu/eurostat/statistics-explained/index.php/hourly_labour_costs Using linear regression, we estimated the values for the next three years, for 2015, 2016 and 2017 for these six countries. The results are: Country/year 2015 2016 2017 Romania 4,97 5,20 5,44 Bulgaria 4,09 4,31 4,53 Germany 31,86 32,34 32,83 United Kingdom 21,67 21,72 21,76 Italy 29,25 29,86 30,47 Finland 33,41 34,25 35,08 Table 2. Forecast for labor costs per hour in EUR, 2015-2017 whole economy excluding agriculture and public administration Graphically, the situation in the range 2004 2017 is as follows: 40.00 35.00 30.00 25.00 20.00 15.00 10.00 5.00 Romania Bulgaria Germany United Kingdom Italy Finland 0.00 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 Figure 3. Labor costs per hour in EUR, 2014-2014 whole economy excluding agriculture and public administration and forecast for 2015-1017 Source: Eurostat, http://ec.europa.eu/eurostat/statistics-explained/index.php/hourly_labour_costs From data analysis for range 2004 2014 and from the forecast for range 2015 2017 we have a 291

clear ascending trend for hourly labor costs in European Union. Country Net increase historical data Romania 242,11% Average increase Net increase forecast data 312,25% Bulgaria 237,50% 279,20% Germany 117,16% 120,14% 159,87% United Kingdom 103,72% 99,49% Italy 126,34% 135,37% Finland 132,38% 140,83% Table 3. Net increase for 2004 2014 and for 2004-2017 Average increase 181,21% Thus, for range 2004 2014 we have an average increase of more than 150% of hourly labor costs in European Union, respectively 159,87%, and for range 2004 2017 (the forecast for three years) we have a forecast increase of more than 180%, respectively 181,21%. In these terms, from an economic standpoint, the security services based on man guarding (services with a major component based on labor costs) do not represent anymore a viable option, because of their ascending price trend. 3.2. Security equipment costs and evolution In the electronic security equipment case is difficult to make a comparison in time. The factors which determine the price level are objective and subjective. Among the objective factors we can mention the technological functions included, functions that are the result of the research and development activity, a very expensive activity. Among the subjective factors we can mention the brand under which the products are manufactured and distributed, factor that can sometimes multiply for several time the price. For all that, the clear trend is of falling prices, in parallel with the increase of functions and technical complexity. We take as an example a Digital Video Recorder, the central element of any analogical video (CCTV). In 2009 2010, a DVR was on market around 900 USD 1000 USD, given that we talk about a simple equipment, PC based, and between 450 USD 500 USD if we talk about a hybrid device. Today, a similar product is under 200 USD. So, on relative similar products, we have differences of hundred percentages, differences that if are amplified at some big systems level goes to thousand or tens of thousands of USD or UERO. In opposition with the trend recorded in the labor cost situation, the medium price of the electronic security systems in descending on ascending quality levels. 4. Directions to follow for the Business Development activity in security industry From what we saw above we can highlight the fact that security systems market is on an technological ascending trend, supported in parallel with a continue price drop. Opposite, the labor market that influence the man guarding market is increasing from the costs standpoint, given that the quality of services remains relative constant. These divergent trends sustain the way that security industry continues to evolve now. The passing of the man guarding to the technology area makes the service to be released by a series of costs that do not reflect a high quality. Graphically, choosing a security solution to the detriment of the classical man guarding or electronic security systems can be presented this way: 292

Figure 4. Man guarding versus Security Systems versus Security Solutions Companies providing services in this field must take into consideration these aspects and must focus their efforts on the integration of the technological components into the solutions provided to their clients or potential clients. This fact will conduct to a durable and sustainable growth of their activity, in concordance with the technological trends and the economical influences from this area. 5. Conclusions From all this from above we can first conclude that the orientation to Security Solutions for the Security Industry is in the first place a general business strategy, which then become a direction for Business Development. Is in fact the base on which we build and organize the rest of the activities, as is the Business Development activity. The main conclusion regarding the Business Development activity for the Security Industry is that the focus at this moment must be on technology and their integration with classical services like man guarding. A Business Development activity focused on Security Solutions can relieve the handicap of still high prices (and which will be also in future high) of man guarding, having also the financial and operational advantages provided by technology. Another big advantage brought to the Business Development activity, going on the previous mentioned solution, is the increasing capability of taking big and complex projects, like critical infrastructure networks or multinational companies with international activities. The classical way of providing security is very difficult and sometimes impossible for this kind of projects. But now, any company which is focused on technology can approach more easily these kinds of big projects. Efectele de mai sus trebuie sa fie vazute cu impact atat pe partea comerciala si de promovare cat sip e cea de reorganziare a structurii si a fluxurilor de activitati ale companiilor de profil, acestea fiind obligate ca de acum incolo sa isi contureze distinct si o component de tehnologie. References BUTLER, D. 2001. Business Development: A Guide to Small Business Strategy, Routledge, 13-44. DOCHERTY, P. & NYHAN, B. 1997. Human Competence and Business Development: Emerging Patterns in European Companies, Springer, 2, 14. EUROSTAT. 2015. Hourly labour costs. [online] Available at: < http://ec.europa.eu/eurostat/statisticsexplained/index.php/hourly_labour_costs> [Accessed 05 April 2015]. FENNELLY, L. 2013. Effective Physical Security, Butterworth-Heinemann, 191-213. FENNELLY, L. 2013. Handbook of Loss Prevention and Crime Prevention, Butterworth-Heinemann, 363-378. KHAIRALLAH, M. 2006. Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems, Butterworth-Heinemann, 83-144. KNAPP, E & LANGILL, J. 2015. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, Elsevier. LANDOLL, D. 2006. The Security Risk Assessment Handbook: A Complete Guide for Performing Risk Assesment, Auerbach Publications. MASLOW, A. 2013. Wikipedia. [online] Available at: <http://ro.wikipedia.org/wiki/abraham_maslow> 293

[Accessed 04 April 2015]. NANAVATI, S., THIEME, M., IANAVATI, R. 2014. Biometrics: Identity Verification in a Networked World. Wiley Computer Publishing. SEMPERE, C. 2011. The European Security Industry. A Research Agenda, Defence and Peace Economics, Volume 22, Issue 2, 2011. SORENSEN, H. 2012. Business Development: a market-oriented perspective. John Wiley & Sons Ltd. 294