Security Dispatch Process: by Erfan Bathaei & Alexandru-Costin Baroiu
Security Dispatch Process: by Erfan Bathaei & Alexandru-Costin Baroiu
Security Dispatch Process: by Erfan Bathaei & Alexandru-Costin Baroiu
Process
For each alarm received, the dispatcher processes it. This means he identifies its type, if it is a burglary or
an emergency. Usually, burglaries can be false alarms. After the dispatcher has identified the alarm type,
he notifies the according security teams. If necessary, or in case of an emergency, back up is required. When
the teams reach the objective, they search the area to see if it is a false alarm. Most of the times this is the
case. If the alarm is real, they will intervene and the dispatcher will notify the police. Most of the times the
culprits are caught and handed over to the police. After each activity of this sort, a report is made by the
security manager, to notify his superiors of the decisions made and the order of events.
The three sub-process that are included in Security Dispatch are: System check-up, Process Alarm and
Dispatch coordination and Coordinate Remotely.
Next up, we will see from what activities is each sub-process composed of:
1
- System check-up:
o Fix problem remotely
o Settle appointment
o Fix on site
o Fix the problem
o Order new parts
o Settle second appointment
o Install new parts
- Process alarm:
o Identify alarm type
o Dispatch team1
o Dispatch team2
o Dispatch reinforcements
o Notify client
- Dispatch coordination:
o Contact Security Manager
o Contact dispatched teams
o Coordinate remotely
o Offer back-up
- Coordinate remotely:
o Check teams status
o Select action plan
o Provide feedback
o Make adjustments
Next up, we will have the models of the process and sub-processes:
2
Figure 2. Security Dispatch Process
3
Figure 3. Security Check-up Sub-process
4
Figure 5. Dispatch coordination Sub-process
For each of the activities there have been established 3 defining times, as following:
- Execution time: the actual time during which the activity takes place; measured in hours or minutes,
depending on the situation.
- Waiting time: represents the waiting time until finalization of current activity. Its length depends of the
activity.
- Resting time: represents the actual time during which the executor of the action is resting.
For example, for the activity Notify Client, under Process Alarm Sub-process, we have set the following
times:
5
- Waiting time: 00:000:00:00:30
For the other activities presented in the project, the times were set in accordance with the above presented
activity.
The Working Environment is used to define the Human Resources used in the processes, and it is as follows:
We have assessed that the Security Dispatch process requires: 2 Dispatchers, 2 Security Agents, a
Technician and a Security Manager.
- The Dispatcher works 12hrs/day, 4days/week, and has a hourly wage of 10RON
- The Security Agent works 12hrs/day, 4days/week, and has a hourly wage of 12RON
- The Technician works 8hrs/day, 5days/week, and has a hourly wage of 13RON
- The Security Manager works 8hrs/day, 5days/week, and has a hourly wage of 15RON
There are 2 resources in the model, the Computer, EDP system type, used by the Dispatcher and the Radio
Station, Communication system type, used by the Security Agent.
6
Evaluating the Security Dispatch process – Analysis and Simulation
Consistency Check
Analysis - Queries on Business Process Models - Consistency Check on business process models, option:
Perform all queries above.
Result:
The results were also saved under the CSV extension. It is under the name Consistency Check.csv.
Relation Tables
Result:
7
The results were also saved under the CSV extension. It is under the name Responsible Table.csv.
Analytic Evaluation
Result:
The results were also saved under the CSV extension. It is under the name Analytic Evaluation Volume
1.csv.
8
This type of Evaluation was conducted considering a volume of 10.
Result:
The results were also saved under the CSV extension. It is under the name Analytic Evaluation Volume
10.csv.
Queries/Reports
We have used a pre-defined query, analyzing the activities conducted by the Dispatcher.
Result:
The results were also saved under the CSV extension. It is under the name Pre-defined query.csv.
Path Analysis
We have considered two simulations (for path 4 and path 7), the results of both of them being exported
under the files: Path Analysis Results_Path4.txt and Path Analysis Results_Path7.txt.
9
Following the simulation, we have also realized a query to see how many of the activities take less than 5
hours. The results can be seen in the below figure:
Capacity Analysis
Process related
Result:
10
Figure 14. Capacity Analysis Process Related
The results were also saved under the CSV extension. It is under the name Capacity Analysis - Process
Related.csv.
Person related
Result:
11
Figure 15. Capacity Analysis - Person Related
The results were also saved under the CSV extension. It is under the name Capacity Analysis - Person
Related.csv.
12
From the Capacity Analysis, it can be seen that the Technician doesn’t play a big part in the process. Also,
he has the highest cost, amassing over 90% of the entire cost for the Security Dispatch process. Also, two
security agents may be too much, seeing how one should do the job just fine.
1. The company should seek better ways to utilize its Technicians, seeing how they have such a huge
cost and aren’t involved too much in the main process.
2. The company should find ways to better distribute its security agents, seeing how one could easily
do the job that two are doing at the moment.
3. The company should look to hire new dispatchers, as they have the lowest cost and at the moment
are the most overworked.
4. Also, even if it isn’t urgent, the company should find ways to better utilize the Security Manager,
maybe find new things for him to do, seeing how he has pretty big cost compared to the more
efficient employees.
Taking into account the recommendations made, the company should see a boost in its productivity,
response time and cost reduction. Also, a regularly process analysis should be made, in order to detect
problems and offer better solutions to known activities.
13