Introduction to Security: Operations and Management
Author: P J Ortmeier
Introduction to Security, 3e addresses public and private security operations and management all in a single text. The history, threats to, and legal aspects of security are included, as well as global considerations. This edition features unprecedented coverage of budgeting; planning; homeland security; career opportunities and future trends. New case studies have been added to each chapter and numerous examples tackle issues encountered in the field. With a focus on career preparation, this edition can be used as a prep tool for the ASIS International Certified Protection Professional (CPP) exam and introduces readers to 18 of the most popular security sectors.
Table of Contents:
Preface xiiOrganization of the Book xiii
Acknowledgments xiii
About the Author xiv
Introduction: Security's Role in Society 1
History and Overview 3
Learning Objectives 3
The Context for Security 4
Theoretical Foundation 4
Defining Security's Role 5
Security's Impact 5
The Contemporary Security Environment 7
Security: A Brief History 8
Ancient Traditions 8
English Common Law 8
The American Experience 10
Private Police and Public Law Enforcement 14
Security: Essential Functions 17
Security Organizations 19
Contract Security Services 19
Proprietary Security 21
Hybrid Security Organizations 21
The Virtual Security Organization 22
Roles of the Security Manager 22
Regulation of the Security Industry 23
Professional Certification and Education Programs 27
Summary 28
Key Terms 29
Discussion Questions andExercises 30
Case Study: Law Enforcement-Security Partnerships 30
Threats to Safety and Security 31
Learning Objectives 31
Introduction 32
Accidents 32
Human Error 33
The Threat from Fire 33
Natural Disasters 35
Environmental Disasters 35
Civil Liability 36
Substance Abuse 37
Civil Disorder 40
Crime 41
Scope of Crime 42
Economic Crime 44
Organized Crime 48
Street Crime 49
Terrorism 50
Victimless Crime 50
Workplace Violence 50
Causes of Crime and Prevention Strategies 51
Summary 53
Key Terms 54
Discussion Questions and Exercises 54
Case Study: Analyzing Crime Trends 55
Legal Aspects of Security 56
Learning Objectives 56
Introduction 57
Judicial Systems 57
Burden and Degrees of Proof 61
The Judicial Process 62
Criminal Cases 62
Civil Cases 64
Tort Law 65
Contract Law 67
Administrative Law 70
Property Law 71
Employment Law 73
Criminal Law 74
Sources, Definitions, and Classifications of Crime 74
Specific Crimes 75
Preliminary (Preparatory) Crimes 76
Crimes against Property 76
Crimes against Persons 77
Obstruction of Justice 78
Crimes against Children 79
Sex Crimes 79
Controlled Substance Crimes 79
Liquor Law Violations 79
Driving under the Influence 79
Weapons Violations 79
Crimes against the Public Peace 79
Laws of Arrest 80
Evidence Law 82
Search and Seizure 83
Courtroom Presentation 85
Attitude 85
Appearance 85
Demeanor 86
Testimonial Technique 86
Summary 87
Key Terms 88
Discussion Questions and Exercises 88
Case Study: Legal Research and Writing 89
Security Operations: Essential Functions 91
Physical Security: Structural, Electronic, and Human Protection Systems 93
Learning Objectives 93
Introduction 94
Basics of Defense and Levels of Protection 94
Perimeter Controls 95
Building Exteriors and Interiors 96
Lighting 97
Fences 98
Locks 99
Other Access Controls 102
Visual Assessment and Surveillance Systems 104
Alarm Systems 106
Alarm System Management 109
Fire Prevention and Protection 112
Fire Prevention 112
Fire Protection Systems 114
Human Protection Systems 116
Summary 117
Key Terms 117
Discussion Questions and Exercises 118
Case Study: Physical Security 118
Personnel Security Through Leadership and Ethics 119
Learning Objectives 119
Introduction 120
Personnel Recruitment and Selection 120
Recuritment 120
Selection 121
Negligent Hiring and Retention 126
Personnel Management 127
Training and Scheduling 127
Supervision and Leadership 128
Motivation and Management 132
Behavioral Assumptions and Leadership Style 133
Performance Appraisal 138
Promotion 139
Discipline 139
Human Resource Policies and Procedures 140
Employer-Employee Relations Laws 141
Employee Retention 143
Personnel Integrity 144
ASIS International Code of Ethics
Summary 148
Key Terms 149
Discussion Questions and Exercises 149
Case Study: Ethical Leadership 150
Information and Computer Security 151
Learning Objectives 151
Introduction 152
INFOSEC Risk Assessment and Analysis 153
Information Protection Strategies 154
Communications Security 160
Computer Security 162
Threats to Computers 162
Computer Protection Strategies 167
Summary 169
Key Terms 170
Discussion Questions and Exercises 171
Case Study: Preventing Cybercrime 171
Security Management 173
Risk Assessment, Security Surveys, and Planning 175
Learning Objectives 175
Introduction 176
The Concept of Risk 176
Risk Defined 176
Types of Risk 176
Risk Assessment and Management Techniques 177
Elimination, Reduction, Mitigation 178
Vulnerability, Probability, Criticality 178
Risk Assessment and the Security Survey 180
Planning and Budgeting 183
Plan Types and Elements 183
Budgeting 186
Selling the Plan 189
Contingency Planning 190
Disaster and Emergency Planning 191
Crime Prevention Through Environmental Design 193
Summary 195
Key Terms 196
Discussion Questions and Exercises 197
Case Study: Planning 197
Program Implementation and Administration 198
Learning Objectives 198
Introduction 199
The Administrative Process 199
Public Versus Private Administration 199
Principles of Organization and Management 200
Ethical Leadership 204
Staffing 204
Workforce Planning 205
Training and Education 208
Teaching and Learning Strategies 211
Educational Program Development 211
Equipment, Facilities, Supplies, and Maintenance 214
Policies and Procedures 215
Contract Services (Outsourcing) 218
Evaluation (Assessment) 219
Performance Measurements 219
Quality Assurance 221
Summary 224
Key Terms 224
Discussion Questions and Exercises 225
Case Study: Security Program Evaluation 225
Investigations, Intelligence Operations, and Reporting 226
Learning Objectives 226
Introduction 227
Investigations 227
The Basics 227
Types of Investigations 227
Human Resource Investigations 228
Personal Injury and Property Damage Investigations 230
Criminal Investigations 230
Business Crime Investigations 232
Information Gathering and Analysis 235
Role of Forensic Science 237
Impermissible Investigative Conduct 238
Intelligence Operations 242
Business Intelligence 242
Criminal Intelligence 244
National Intelligence 244
Counterespionage 244
Reporting 247
Documentation Methods 247
Notes 247
Reports 248
General Writing Principles 248
Summary 250
Key Terms 251
Discussion Questions and Exercises 251
Case Study: Investigating With Online Resources 252
Security Applications and Solutions 253
Institutional Security, Disaster Recovery, and Executive Protection 255
Learning Objectives 255
Introduction 256
Banking and Financial Institution Security 256
Computer Security 257
Contract Services 257
Courthouse and Courtroom Security 257
Disaster Recovery 258
Educational Institution Security 260
Schools 260
Colleges and Universities 266
Entertainment Security 268
Executive Protection 272
Healthcare Security 273
Hospitality Security 276
Summary 278
Key Terms 279
Discussion Questions and Exercises 279
Case Study: The Virginia Tech Incident 279
Industrial Security, Retail Loss Prevention, and Workplace Violence 281
Learning Objectives 281
Introduction 282
Industrial Security 282
Library and Museum Security 282
Office Building Security 284
Privatization of Public Services 286
Residential Security 287
Retail Loss Prevention 288
Introduction 288
Internal Theft 289
External Sources of Loss 290
Workplace Violence Prevention 293
Zoo and Aquarium Security 297
Summary 300
Key Terms 300
Discussion Questions and Exercises 300
Case Study: Workplace Violence 301
Homeland Security: Confronting Terrorism and Domestic Threats 302
Learning Objectives 302
Introduction 303
Homeland Security: A Historical Perspective 303
Terrorism 304
Bombs, Bomb Threats, and Weapons of Mass Destruction 308
Nuclear Weapons 309
Biological Weapons 310
Chemical Weapons 310
Radiological Weapons 310
Natural Disasters 310
Environmental Disasters 312
Government Security 314
The U.S. Department of Homeland Security (DHS) 316
DHS Components 318
Office of the Secretary (DHS) 319
Advisory Panels and Committees 320
The 9/11 Commission 321
Airline and Airport Security 323
Transportation and Cargo Security 329
Trucking Industry Security 331
Railroad Security 332
Maritime Security 332
Critical Infrastructure and Utility Security 333
Summary 337
Key Terms 337
Discussion Questions and Exercises 338
Case Study: Responding to a Catastrophe 338
Trends and Challenges 339
Career Opportunities 341
Learning Objectives 341
Introduction 342
Career Preparation 342
Resume Preparation Do's 343
Resume Preparation Don'ts 343
Career Opportunities 344
Airport/Airline Security 345
Banking/Financial Services Security 345
Contract Services 345
Computer/Information Security 346
Casino/Gaming Security 346
Chief Security Officer 346
Educational Institution Security 347
Healthcare Security 347
Hospitality Security 347
Industrial Security 347
Investigations 348
Museum and Library Security 348
Residential/Commercial Real Estate Security 348
Retail Loss Prevention 349
Security Sales and Service 349
Systems Design and Engineering 349
Transportation Security 349
Utility Security 350
Summary 350
Key Terms 350
Discussion Questions and Exercises 350
Case Study: Careers in Security 351
The Future 352
Learning Objectives 352
Introduction 353
The Future of Security: Growth and Challenges 353
Impact of Globalization 354
Legislative Trends in Security 358
Terrorism 359
The Global Landscape in 2020 361
New Global Players 362
New Challenges to Governance 363
Pervasive Insecurity 365
Transmuting International Terrorism 366
Policy Implications 367
Summary 368
Key Terms 369
Discussion Questions and Exercises 369
Case Study: The Big Picture 369
Glossary 370
Correlation of ASIS International Syllabus for Introduction to Security for Business Students with Introduction to Security: Operations and Management, 3rd edition 386
Safety and Security Survey Instrument 387
References 398
Index 413
Read also Rethinking Marketing or Essentials of Business Driven Information Systems
Rockdale: The Growth of an American Village in the Early Industrial Revolution
Author: Anthony F C Wallac
A celebrated triumph of historiography, Rockdale tells the story of the Industrial Revolution as it was experienced by the men, women, and children of the cotton-manufacturing town of Rockdale, Pennsylvania. The lives of workers, managers, inventors, owners, and entrepreneurs are brilliantly illuminated by Anthony F. C. Wallace, who also describes the complex technology that governed all of Rockdale’s townspeople. Wallace examines the new relationships between employer and employee as work and workers moved out of the fields into the closed-in world of the spinning mule, the power loom, and the mill office. He brings to light the impassioned battle for the soul of the mill worker, a struggle between the exponents of the Enlightenment and Utopian Socialism, on the one hand, and, on the other, the ultimately triumphant champions of evangelical Christianity.
No comments:
Post a Comment