Introduction to Security: Operations and Management

Paperback
from $0.00

Author: P.J. J Ortmeier

ISBN-10: 0135129273

ISBN-13: 9780135129272

Category: Industry Profiles - Management

Search in google:

Introduction to Security, 3e addresses public and private security operations and management all in a single text. The history, threats to, and legal aspects of security are included, as well as global considerations. This edition features unprecedented coverage of budgeting; planning; homeland security; career opportunities and future trends. New case studies have been added to each chapter and numerous examples tackle issues encountered in the field. With a focus on career preparation, this edition can be used as a prep tool for the ASIS International Certified Protection Professional (CPP) exam and introduces readers to 18 of the most popular security sectors.

Preface     xiiOrganization of the Book     xiiiAcknowledgments     xiiiAbout the Author     xivIntroduction: Security's Role in Society     1History and Overview     3Learning Objectives     3The Context for Security     4Theoretical Foundation     4Defining Security's Role     5Security's Impact     5The Contemporary Security Environment     7Security: A Brief History     8Ancient Traditions     8English Common Law     8The American Experience     10Private Police and Public Law Enforcement     14Security: Essential Functions     17Security Organizations     19Contract Security Services     19Proprietary Security     21Hybrid Security Organizations     21The Virtual Security Organization     22Roles of the Security Manager     22Regulation of the Security Industry     23Professional Certification and Education Programs     27Summary     28Key Terms     29Discussion Questions andExercises     30Case Study: Law Enforcement-Security Partnerships     30Threats to Safety and Security     31Learning Objectives     31Introduction     32Accidents     32Human Error     33The Threat from Fire     33Natural Disasters     35Environmental Disasters     35Civil Liability     36Substance Abuse     37Civil Disorder     40Crime     41Scope of Crime     42Economic Crime     44Organized Crime     48Street Crime     49Terrorism     50Victimless Crime     50Workplace Violence     50Causes of Crime and Prevention Strategies     51Summary     53Key Terms     54Discussion Questions and Exercises     54Case Study: Analyzing Crime Trends     55Legal Aspects of Security     56Learning Objectives     56Introduction     57Judicial Systems     57Burden and Degrees of Proof     61The Judicial Process      62Criminal Cases     62Civil Cases     64Tort Law     65Contract Law     67Administrative Law     70Property Law     71Employment Law     73Criminal Law     74Sources, Definitions, and Classifications of Crime     74Specific Crimes     75Preliminary (Preparatory) Crimes     76Crimes against Property     76Crimes against Persons     77Obstruction of Justice     78Crimes against Children     79Sex Crimes     79Controlled Substance Crimes     79Liquor Law Violations     79Driving under the Influence     79Weapons Violations     79Crimes against the Public Peace     79Laws of Arrest     80Evidence Law     82Search and Seizure     83Courtroom Presentation     85Attitude     85Appearance     85Demeanor     86Testimonial Technique     86Summary     87Key Terms     88Discussion Questions and Exercises     88Case Study: Legal Research and Writing     89Security Operations: Essential Functions     91Physical Security: Structural, Electronic, and Human Protection Systems     93Learning Objectives     93Introduction     94Basics of Defense and Levels of Protection     94Perimeter Controls     95Building Exteriors and Interiors     96Lighting     97Fences     98Locks     99Other Access Controls     102Visual Assessment and Surveillance Systems     104Alarm Systems     106Alarm System Management     109Fire Prevention and Protection     112Fire Prevention     112Fire Protection Systems     114Human Protection Systems     116Summary     117Key Terms     117Discussion Questions and Exercises     118Case Study: Physical Security     118Personnel Security Through Leadership and Ethics     119Learning Objectives     119Introduction     120Personnel Recruitment and Selection      120Recuritment     120Selection     121Negligent Hiring and Retention     126Personnel Management     127Training and Scheduling     127Supervision and Leadership     128Motivation and Management     132Behavioral Assumptions and Leadership Style     133Performance Appraisal     138Promotion     139Discipline     139Human Resource Policies and Procedures     140Employer-Employee Relations Laws     141Employee Retention     143Personnel Integrity     144ASIS International Code of EthicsSummary     148Key Terms     149Discussion Questions and Exercises     149Case Study: Ethical Leadership     150Information and Computer Security     151Learning Objectives     151Introduction     152INFOSEC Risk Assessment and Analysis     153Information Protection Strategies     154Communications Security     160Computer Security     162Threats to Computers     162Computer Protection Strategies      167Summary     169Key Terms     170Discussion Questions and Exercises     171Case Study: Preventing Cybercrime     171Security Management     173Risk Assessment, Security Surveys, and Planning     175Learning Objectives     175Introduction     176The Concept of Risk     176Risk Defined     176Types of Risk     176Risk Assessment and Management Techniques     177Elimination, Reduction, Mitigation     178Vulnerability, Probability, Criticality     178Risk Assessment and the Security Survey     180Planning and Budgeting     183Plan Types and Elements     183Budgeting     186Selling the Plan     189Contingency Planning     190Disaster and Emergency Planning     191Crime Prevention Through Environmental Design     193Summary     195Key Terms     196Discussion Questions and Exercises     197Case Study: Planning     197Program Implementation and Administration     198Learning Objectives      198Introduction     199The Administrative Process     199Public Versus Private Administration     199Principles of Organization and Management     200Ethical Leadership     204Staffing     204Workforce Planning     205Training and Education     208Teaching and Learning Strategies     211Educational Program Development     211Equipment, Facilities, Supplies, and Maintenance     214Policies and Procedures     215Contract Services (Outsourcing)     218Evaluation (Assessment)     219Performance Measurements     219Quality Assurance     221Summary     224Key Terms     224Discussion Questions and Exercises     225Case Study: Security Program Evaluation     225Investigations, Intelligence Operations, and Reporting     226Learning Objectives     226Introduction     227Investigations     227The Basics     227Types of Investigations     227Human Resource Investigations     228Personal Injury and Property Damage Investigations      230Criminal Investigations     230Business Crime Investigations     232Information Gathering and Analysis     235Role of Forensic Science     237Impermissible Investigative Conduct     238Intelligence Operations     242Business Intelligence     242Criminal Intelligence     244National Intelligence     244Counterespionage     244Reporting     247Documentation Methods     247Notes     247Reports     248General Writing Principles     248Summary     250Key Terms     251Discussion Questions and Exercises     251Case Study: Investigating With Online Resources     252Security Applications and Solutions     253Institutional Security, Disaster Recovery, and Executive Protection     255Learning Objectives     255Introduction     256Banking and Financial Institution Security     256Computer Security     257Contract Services     257Courthouse and Courtroom Security     257Disaster Recovery      258Educational Institution Security     260Schools     260Colleges and Universities     266Entertainment Security     268Executive Protection     272Healthcare Security     273Hospitality Security     276Summary     278Key Terms     279Discussion Questions and Exercises     279Case Study: The Virginia Tech Incident     279Industrial Security, Retail Loss Prevention, and Workplace Violence     281Learning Objectives     281Introduction     282Industrial Security     282Library and Museum Security     282Office Building Security     284Privatization of Public Services     286Residential Security     287Retail Loss Prevention     288Introduction     288Internal Theft     289External Sources of Loss     290Workplace Violence Prevention     293Zoo and Aquarium Security     297Summary     300Key Terms     300Discussion Questions and Exercises     300Case Study: Workplace Violence      301Homeland Security: Confronting Terrorism and Domestic Threats     302Learning Objectives     302Introduction     303Homeland Security: A Historical Perspective     303Terrorism     304Bombs, Bomb Threats, and Weapons of Mass Destruction     308Nuclear Weapons     309Biological Weapons     310Chemical Weapons     310Radiological Weapons     310Natural Disasters     310Environmental Disasters     312Government Security     314The U.S. Department of Homeland Security (DHS)     316DHS Components     318Office of the Secretary (DHS)     319Advisory Panels and Committees     320The 9/11 Commission     321Airline and Airport Security     323Transportation and Cargo Security     329Trucking Industry Security     331Railroad Security     332Maritime Security     332Critical Infrastructure and Utility Security     333Summary     337Key Terms     337Discussion Questions and Exercises     338Case Study: Responding to a Catastrophe     338Trends and Challenges     339Career Opportunities     341Learning Objectives     341Introduction     342Career Preparation     342Resume Preparation Do's     343Resume Preparation Don'ts     343Career Opportunities     344Airport/Airline Security     345Banking/Financial Services Security     345Contract Services     345Computer/Information Security     346Casino/Gaming Security     346Chief Security Officer     346Educational Institution Security     347Healthcare Security     347Hospitality Security     347Industrial Security     347Investigations     348Museum and Library Security     348Residential/Commercial Real Estate Security     348Retail Loss Prevention     349Security Sales and Service     349Systems Design and Engineering     349Transportation Security     349Utility Security     350Summary     350Key Terms      350Discussion Questions and Exercises     350Case Study: Careers in Security     351The Future     352Learning Objectives     352Introduction     353The Future of Security: Growth and Challenges     353Impact of Globalization     354Legislative Trends in Security     358Terrorism     359The Global Landscape in 2020     361New Global Players     362New Challenges to Governance     363Pervasive Insecurity     365Transmuting International Terrorism     366Policy Implications     367Summary     368Key Terms     369Discussion Questions and Exercises     369Case Study: The Big Picture     369Glossary     370Correlation of ASIS International Syllabus for Introduction to Security for Business Students with Introduction to Security: Operations and Management, 3rd edition     386Safety and Security Survey Instrument     387References     398Index     413