Introduction to Security, 3e addresses public and private security operations and management all in a single text. The history, threats to, and legal aspects of security are included, as well as global considerations. This edition features unprecedented coverage of budgeting; planning; homeland security; career opportunities and future trends. New case studies have been added to each chapter and numerous examples tackle issues encountered in the field. With a focus on career preparation, this edition can be used as a prep tool for the ASIS International Certified Protection Professional (CPP) exam and introduces readers to 18 of the most popular security sectors.
Preface xiiOrganization of the Book xiiiAcknowledgments xiiiAbout the Author xivIntroduction: Security's Role in Society 1History and Overview 3Learning Objectives 3The Context for Security 4Theoretical Foundation 4Defining Security's Role 5Security's Impact 5The Contemporary Security Environment 7Security: A Brief History 8Ancient Traditions 8English Common Law 8The American Experience 10Private Police and Public Law Enforcement 14Security: Essential Functions 17Security Organizations 19Contract Security Services 19Proprietary Security 21Hybrid Security Organizations 21The Virtual Security Organization 22Roles of the Security Manager 22Regulation of the Security Industry 23Professional Certification and Education Programs 27Summary 28Key Terms 29Discussion Questions andExercises 30Case Study: Law Enforcement-Security Partnerships 30Threats to Safety and Security 31Learning Objectives 31Introduction 32Accidents 32Human Error 33The Threat from Fire 33Natural Disasters 35Environmental Disasters 35Civil Liability 36Substance Abuse 37Civil Disorder 40Crime 41Scope of Crime 42Economic Crime 44Organized Crime 48Street Crime 49Terrorism 50Victimless Crime 50Workplace Violence 50Causes of Crime and Prevention Strategies 51Summary 53Key Terms 54Discussion Questions and Exercises 54Case Study: Analyzing Crime Trends 55Legal Aspects of Security 56Learning Objectives 56Introduction 57Judicial Systems 57Burden and Degrees of Proof 61The Judicial Process 62Criminal Cases 62Civil Cases 64Tort Law 65Contract Law 67Administrative Law 70Property Law 71Employment Law 73Criminal Law 74Sources, Definitions, and Classifications of Crime 74Specific Crimes 75Preliminary (Preparatory) Crimes 76Crimes against Property 76Crimes against Persons 77Obstruction of Justice 78Crimes against Children 79Sex Crimes 79Controlled Substance Crimes 79Liquor Law Violations 79Driving under the Influence 79Weapons Violations 79Crimes against the Public Peace 79Laws of Arrest 80Evidence Law 82Search and Seizure 83Courtroom Presentation 85Attitude 85Appearance 85Demeanor 86Testimonial Technique 86Summary 87Key Terms 88Discussion Questions and Exercises 88Case Study: Legal Research and Writing 89Security Operations: Essential Functions 91Physical Security: Structural, Electronic, and Human Protection Systems 93Learning Objectives 93Introduction 94Basics of Defense and Levels of Protection 94Perimeter Controls 95Building Exteriors and Interiors 96Lighting 97Fences 98Locks 99Other Access Controls 102Visual Assessment and Surveillance Systems 104Alarm Systems 106Alarm System Management 109Fire Prevention and Protection 112Fire Prevention 112Fire Protection Systems 114Human Protection Systems 116Summary 117Key Terms 117Discussion Questions and Exercises 118Case Study: Physical Security 118Personnel Security Through Leadership and Ethics 119Learning Objectives 119Introduction 120Personnel Recruitment and Selection 120Recuritment 120Selection 121Negligent Hiring and Retention 126Personnel Management 127Training and Scheduling 127Supervision and Leadership 128Motivation and Management 132Behavioral Assumptions and Leadership Style 133Performance Appraisal 138Promotion 139Discipline 139Human Resource Policies and Procedures 140Employer-Employee Relations Laws 141Employee Retention 143Personnel Integrity 144ASIS International Code of EthicsSummary 148Key Terms 149Discussion Questions and Exercises 149Case Study: Ethical Leadership 150Information and Computer Security 151Learning Objectives 151Introduction 152INFOSEC Risk Assessment and Analysis 153Information Protection Strategies 154Communications Security 160Computer Security 162Threats to Computers 162Computer Protection Strategies 167Summary 169Key Terms 170Discussion Questions and Exercises 171Case Study: Preventing Cybercrime 171Security Management 173Risk Assessment, Security Surveys, and Planning 175Learning Objectives 175Introduction 176The Concept of Risk 176Risk Defined 176Types of Risk 176Risk Assessment and Management Techniques 177Elimination, Reduction, Mitigation 178Vulnerability, Probability, Criticality 178Risk Assessment and the Security Survey 180Planning and Budgeting 183Plan Types and Elements 183Budgeting 186Selling the Plan 189Contingency Planning 190Disaster and Emergency Planning 191Crime Prevention Through Environmental Design 193Summary 195Key Terms 196Discussion Questions and Exercises 197Case Study: Planning 197Program Implementation and Administration 198Learning Objectives 198Introduction 199The Administrative Process 199Public Versus Private Administration 199Principles of Organization and Management 200Ethical Leadership 204Staffing 204Workforce Planning 205Training and Education 208Teaching and Learning Strategies 211Educational Program Development 211Equipment, Facilities, Supplies, and Maintenance 214Policies and Procedures 215Contract Services (Outsourcing) 218Evaluation (Assessment) 219Performance Measurements 219Quality Assurance 221Summary 224Key Terms 224Discussion Questions and Exercises 225Case Study: Security Program Evaluation 225Investigations, Intelligence Operations, and Reporting 226Learning Objectives 226Introduction 227Investigations 227The Basics 227Types of Investigations 227Human Resource Investigations 228Personal Injury and Property Damage Investigations 230Criminal Investigations 230Business Crime Investigations 232Information Gathering and Analysis 235Role of Forensic Science 237Impermissible Investigative Conduct 238Intelligence Operations 242Business Intelligence 242Criminal Intelligence 244National Intelligence 244Counterespionage 244Reporting 247Documentation Methods 247Notes 247Reports 248General Writing Principles 248Summary 250Key Terms 251Discussion Questions and Exercises 251Case Study: Investigating With Online Resources 252Security Applications and Solutions 253Institutional Security, Disaster Recovery, and Executive Protection 255Learning Objectives 255Introduction 256Banking and Financial Institution Security 256Computer Security 257Contract Services 257Courthouse and Courtroom Security 257Disaster Recovery 258Educational Institution Security 260Schools 260Colleges and Universities 266Entertainment Security 268Executive Protection 272Healthcare Security 273Hospitality Security 276Summary 278Key Terms 279Discussion Questions and Exercises 279Case Study: The Virginia Tech Incident 279Industrial Security, Retail Loss Prevention, and Workplace Violence 281Learning Objectives 281Introduction 282Industrial Security 282Library and Museum Security 282Office Building Security 284Privatization of Public Services 286Residential Security 287Retail Loss Prevention 288Introduction 288Internal Theft 289External Sources of Loss 290Workplace Violence Prevention 293Zoo and Aquarium Security 297Summary 300Key Terms 300Discussion Questions and Exercises 300Case Study: Workplace Violence 301Homeland Security: Confronting Terrorism and Domestic Threats 302Learning Objectives 302Introduction 303Homeland Security: A Historical Perspective 303Terrorism 304Bombs, Bomb Threats, and Weapons of Mass Destruction 308Nuclear Weapons 309Biological Weapons 310Chemical Weapons 310Radiological Weapons 310Natural Disasters 310Environmental Disasters 312Government Security 314The U.S. Department of Homeland Security (DHS) 316DHS Components 318Office of the Secretary (DHS) 319Advisory Panels and Committees 320The 9/11 Commission 321Airline and Airport Security 323Transportation and Cargo Security 329Trucking Industry Security 331Railroad Security 332Maritime Security 332Critical Infrastructure and Utility Security 333Summary 337Key Terms 337Discussion Questions and Exercises 338Case Study: Responding to a Catastrophe 338Trends and Challenges 339Career Opportunities 341Learning Objectives 341Introduction 342Career Preparation 342Resume Preparation Do's 343Resume Preparation Don'ts 343Career Opportunities 344Airport/Airline Security 345Banking/Financial Services Security 345Contract Services 345Computer/Information Security 346Casino/Gaming Security 346Chief Security Officer 346Educational Institution Security 347Healthcare Security 347Hospitality Security 347Industrial Security 347Investigations 348Museum and Library Security 348Residential/Commercial Real Estate Security 348Retail Loss Prevention 349Security Sales and Service 349Systems Design and Engineering 349Transportation Security 349Utility Security 350Summary 350Key Terms 350Discussion Questions and Exercises 350Case Study: Careers in Security 351The Future 352Learning Objectives 352Introduction 353The Future of Security: Growth and Challenges 353Impact of Globalization 354Legislative Trends in Security 358Terrorism 359The Global Landscape in 2020 361New Global Players 362New Challenges to Governance 363Pervasive Insecurity 365Transmuting International Terrorism 366Policy Implications 367Summary 368Key Terms 369Discussion Questions and Exercises 369Case Study: The Big Picture 369Glossary 370Correlation of ASIS International Syllabus for Introduction to Security for Business Students with Introduction to Security: Operations and Management, 3rd edition 386Safety and Security Survey Instrument 387References 398Index 413