Sunday, December 21, 2008

Introduction to Security or Rockdale

Introduction to Security: Operations and Management

Author: P J Ortmeier

Introduction to Security, 3e addresses public and private security operations and management all in a single text. The history, threats to, and legal aspects of security are included, as well as global considerations. This edition features unprecedented coverage of budgeting; planning; homeland security; career opportunities and future trends. New case studies have been added to each chapter and numerous examples tackle issues encountered in the field. With a focus on career preparation, this edition can be used as a prep tool for the ASIS International Certified Protection Professional (CPP) exam and introduces readers to 18 of the most popular security sectors.



Table of Contents:
Preface     xii
Organization of the Book     xiii
Acknowledgments     xiii
About the Author     xiv
Introduction: Security's Role in Society     1
History and Overview     3
Learning Objectives     3
The Context for Security     4
Theoretical Foundation     4
Defining Security's Role     5
Security's Impact     5
The Contemporary Security Environment     7
Security: A Brief History     8
Ancient Traditions     8
English Common Law     8
The American Experience     10
Private Police and Public Law Enforcement     14
Security: Essential Functions     17
Security Organizations     19
Contract Security Services     19
Proprietary Security     21
Hybrid Security Organizations     21
The Virtual Security Organization     22
Roles of the Security Manager     22
Regulation of the Security Industry     23
Professional Certification and Education Programs     27
Summary     28
Key Terms     29
Discussion Questions andExercises     30
Case Study: Law Enforcement-Security Partnerships     30
Threats to Safety and Security     31
Learning Objectives     31
Introduction     32
Accidents     32
Human Error     33
The Threat from Fire     33
Natural Disasters     35
Environmental Disasters     35
Civil Liability     36
Substance Abuse     37
Civil Disorder     40
Crime     41
Scope of Crime     42
Economic Crime     44
Organized Crime     48
Street Crime     49
Terrorism     50
Victimless Crime     50
Workplace Violence     50
Causes of Crime and Prevention Strategies     51
Summary     53
Key Terms     54
Discussion Questions and Exercises     54
Case Study: Analyzing Crime Trends     55
Legal Aspects of Security     56
Learning Objectives     56
Introduction     57
Judicial Systems     57
Burden and Degrees of Proof     61
The Judicial Process      62
Criminal Cases     62
Civil Cases     64
Tort Law     65
Contract Law     67
Administrative Law     70
Property Law     71
Employment Law     73
Criminal Law     74
Sources, Definitions, and Classifications of Crime     74
Specific Crimes     75
Preliminary (Preparatory) Crimes     76
Crimes against Property     76
Crimes against Persons     77
Obstruction of Justice     78
Crimes against Children     79
Sex Crimes     79
Controlled Substance Crimes     79
Liquor Law Violations     79
Driving under the Influence     79
Weapons Violations     79
Crimes against the Public Peace     79
Laws of Arrest     80
Evidence Law     82
Search and Seizure     83
Courtroom Presentation     85
Attitude     85
Appearance     85
Demeanor     86
Testimonial Technique     86
Summary     87
Key Terms     88
Discussion Questions and Exercises     88
Case Study: Legal Research and Writing     89
Security Operations: Essential Functions     91
Physical Security: Structural, Electronic, and Human Protection Systems     93
Learning Objectives     93
Introduction     94
Basics of Defense and Levels of Protection     94
Perimeter Controls     95
Building Exteriors and Interiors     96
Lighting     97
Fences     98
Locks     99
Other Access Controls     102
Visual Assessment and Surveillance Systems     104
Alarm Systems     106
Alarm System Management     109
Fire Prevention and Protection     112
Fire Prevention     112
Fire Protection Systems     114
Human Protection Systems     116
Summary     117
Key Terms     117
Discussion Questions and Exercises     118
Case Study: Physical Security     118
Personnel Security Through Leadership and Ethics     119
Learning Objectives     119
Introduction     120
Personnel Recruitment and Selection      120
Recuritment     120
Selection     121
Negligent Hiring and Retention     126
Personnel Management     127
Training and Scheduling     127
Supervision and Leadership     128
Motivation and Management     132
Behavioral Assumptions and Leadership Style     133
Performance Appraisal     138
Promotion     139
Discipline     139
Human Resource Policies and Procedures     140
Employer-Employee Relations Laws     141
Employee Retention     143
Personnel Integrity     144
ASIS International Code of Ethics
Summary     148
Key Terms     149
Discussion Questions and Exercises     149
Case Study: Ethical Leadership     150
Information and Computer Security     151
Learning Objectives     151
Introduction     152
INFOSEC Risk Assessment and Analysis     153
Information Protection Strategies     154
Communications Security     160
Computer Security     162
Threats to Computers     162
Computer Protection Strategies      167
Summary     169
Key Terms     170
Discussion Questions and Exercises     171
Case Study: Preventing Cybercrime     171
Security Management     173
Risk Assessment, Security Surveys, and Planning     175
Learning Objectives     175
Introduction     176
The Concept of Risk     176
Risk Defined     176
Types of Risk     176
Risk Assessment and Management Techniques     177
Elimination, Reduction, Mitigation     178
Vulnerability, Probability, Criticality     178
Risk Assessment and the Security Survey     180
Planning and Budgeting     183
Plan Types and Elements     183
Budgeting     186
Selling the Plan     189
Contingency Planning     190
Disaster and Emergency Planning     191
Crime Prevention Through Environmental Design     193
Summary     195
Key Terms     196
Discussion Questions and Exercises     197
Case Study: Planning     197
Program Implementation and Administration     198
Learning Objectives      198
Introduction     199
The Administrative Process     199
Public Versus Private Administration     199
Principles of Organization and Management     200
Ethical Leadership     204
Staffing     204
Workforce Planning     205
Training and Education     208
Teaching and Learning Strategies     211
Educational Program Development     211
Equipment, Facilities, Supplies, and Maintenance     214
Policies and Procedures     215
Contract Services (Outsourcing)     218
Evaluation (Assessment)     219
Performance Measurements     219
Quality Assurance     221
Summary     224
Key Terms     224
Discussion Questions and Exercises     225
Case Study: Security Program Evaluation     225
Investigations, Intelligence Operations, and Reporting     226
Learning Objectives     226
Introduction     227
Investigations     227
The Basics     227
Types of Investigations     227
Human Resource Investigations     228
Personal Injury and Property Damage Investigations      230
Criminal Investigations     230
Business Crime Investigations     232
Information Gathering and Analysis     235
Role of Forensic Science     237
Impermissible Investigative Conduct     238
Intelligence Operations     242
Business Intelligence     242
Criminal Intelligence     244
National Intelligence     244
Counterespionage     244
Reporting     247
Documentation Methods     247
Notes     247
Reports     248
General Writing Principles     248
Summary     250
Key Terms     251
Discussion Questions and Exercises     251
Case Study: Investigating With Online Resources     252
Security Applications and Solutions     253
Institutional Security, Disaster Recovery, and Executive Protection     255
Learning Objectives     255
Introduction     256
Banking and Financial Institution Security     256
Computer Security     257
Contract Services     257
Courthouse and Courtroom Security     257
Disaster Recovery      258
Educational Institution Security     260
Schools     260
Colleges and Universities     266
Entertainment Security     268
Executive Protection     272
Healthcare Security     273
Hospitality Security     276
Summary     278
Key Terms     279
Discussion Questions and Exercises     279
Case Study: The Virginia Tech Incident     279
Industrial Security, Retail Loss Prevention, and Workplace Violence     281
Learning Objectives     281
Introduction     282
Industrial Security     282
Library and Museum Security     282
Office Building Security     284
Privatization of Public Services     286
Residential Security     287
Retail Loss Prevention     288
Introduction     288
Internal Theft     289
External Sources of Loss     290
Workplace Violence Prevention     293
Zoo and Aquarium Security     297
Summary     300
Key Terms     300
Discussion Questions and Exercises     300
Case Study: Workplace Violence      301
Homeland Security: Confronting Terrorism and Domestic Threats     302
Learning Objectives     302
Introduction     303
Homeland Security: A Historical Perspective     303
Terrorism     304
Bombs, Bomb Threats, and Weapons of Mass Destruction     308
Nuclear Weapons     309
Biological Weapons     310
Chemical Weapons     310
Radiological Weapons     310
Natural Disasters     310
Environmental Disasters     312
Government Security     314
The U.S. Department of Homeland Security (DHS)     316
DHS Components     318
Office of the Secretary (DHS)     319
Advisory Panels and Committees     320
The 9/11 Commission     321
Airline and Airport Security     323
Transportation and Cargo Security     329
Trucking Industry Security     331
Railroad Security     332
Maritime Security     332
Critical Infrastructure and Utility Security     333
Summary     337
Key Terms     337
Discussion Questions and Exercises     338
Case Study: Responding to a Catastrophe     338
Trends and Challenges     339
Career Opportunities     341
Learning Objectives     341
Introduction     342
Career Preparation     342
Resume Preparation Do's     343
Resume Preparation Don'ts     343
Career Opportunities     344
Airport/Airline Security     345
Banking/Financial Services Security     345
Contract Services     345
Computer/Information Security     346
Casino/Gaming Security     346
Chief Security Officer     346
Educational Institution Security     347
Healthcare Security     347
Hospitality Security     347
Industrial Security     347
Investigations     348
Museum and Library Security     348
Residential/Commercial Real Estate Security     348
Retail Loss Prevention     349
Security Sales and Service     349
Systems Design and Engineering     349
Transportation Security     349
Utility Security     350
Summary     350
Key Terms      350
Discussion Questions and Exercises     350
Case Study: Careers in Security     351
The Future     352
Learning Objectives     352
Introduction     353
The Future of Security: Growth and Challenges     353
Impact of Globalization     354
Legislative Trends in Security     358
Terrorism     359
The Global Landscape in 2020     361
New Global Players     362
New Challenges to Governance     363
Pervasive Insecurity     365
Transmuting International Terrorism     366
Policy Implications     367
Summary     368
Key Terms     369
Discussion Questions and Exercises     369
Case Study: The Big Picture     369
Glossary     370
Correlation of ASIS International Syllabus for Introduction to Security for Business Students with Introduction to Security: Operations and Management, 3rd edition     386
Safety and Security Survey Instrument     387
References     398
Index     413

Read also Rethinking Marketing or Essentials of Business Driven Information Systems

Rockdale: The Growth of an American Village in the Early Industrial Revolution

Author: Anthony F C Wallac

A celebrated triumph of historiography, Rockdale tells the story of the Industrial Revolution as it was experienced by the men, women, and children of the cotton-manufacturing town of Rockdale, Pennsylvania. The lives of workers, managers, inventors, owners, and entrepreneurs are brilliantly illuminated by Anthony F. C. Wallace, who also describes the complex technology that governed all of Rockdale’s townspeople. Wallace examines the new relationships between employer and employee as work and workers moved out of the fields into the closed-in world of the spinning mule, the power loom, and the mill office. He brings to light the impassioned battle for the soul of the mill worker, a struggle between the exponents of the Enlightenment and Utopian Socialism, on the one hand, and, on the other, the ultimately triumphant champions of evangelical Christianity.



No comments: