Security Operations Management -  Robert McCrie

Security Operations Management (eBook)

eBook Download: PDF
2011 | 2. Auflage
416 Seiten
Elsevier Science (Verlag)
978-0-08-046949-2 (ISBN)
Systemvoraussetzungen
59,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The second edition of Security Operations Management continues as the seminal reference on corporate security management operations. Revised and updated, topics covered in depth include: access control, selling the security budget upgrades to senior management, the evolution of security standards since 9/11, designing buildings to be safer from terrorism, improving relations between the public and private sectors, enhancing security measures during acute emergencies, and, finally, the increased security issues surrounding the threats of terrorism and cybercrime. An ideal reference for the professional, as well as a valuable teaching tool for the security student, the book includes discussion questions and a glossary of common security terms. Additionally, a brand new appendix contains contact information for academic, trade, and professional security organizations.

* Fresh coverage of both the business and technical sides of security for the current corporate environment
* Strategies for outsourcing security services and systems
* Brand new appendix with contact information for trade, professional, and academic security organizations
The second edition of Security Operations Management continues as the seminal reference on corporate security management operations. Revised and updated, topics covered in depth include: access control, selling the security budget upgrades to senior management, the evolution of security standards since 9/11, designing buildings to be safer from terrorism, improving relations between the public and private sectors, enhancing security measures during acute emergencies, and, finally, the increased security issues surrounding the threats of terrorism and cybercrime. An ideal reference for the professional, as well as a valuable teaching tool for the security student, the book includes discussion questions and a glossary of common security terms. Additionally, a brand new appendix contains contact information for academic, trade, and professional security organizations. Fresh coverage of both the business and technical sides of security for the current corporate environment Strategies for outsourcing security services and systems Brand new appendix with contact information for trade, professional, and academic security organizations

Front cover 1
Title page 4
Copyright page 5
Table of Contents 6
Preface 8
Acknowledgments 10
Part I: General Fundamentals and Competencies 12
Chapter 1: Security Operations in the Management Environment 14
ORGANIZATIONS AND MANAGERS 15
A POINT ABOUT TITLES 16
WHAT IS THE PURPOSE OF AN EXECUTIVE? 16
WHAT IS THE STRATEGY OF MANAGEMENT? 17
THE CHARACTERISTICS OF MODERN ORGANIZATIONS 22
HOW ORGANIZATIONS ARE STRUCTURED 28
GOVERNMENT SECURITY OPERATIONS 34
LAYERS OF MANAGEMENT 34
SECURITY IN THE ORGANIZATIONAL HIERARCHY 34
STRUCTURE OF A COMPLEX SECURITY DEPARTMENT 35
ETHICS AND SECURITY OPERATIONS 36
SUMMARY 38
DISCUSSION AND REVIEW 38
ENDNOTES 39
ADDITIONAL REFERENCES 39
Chapter 2: Core Competencies to Initiate Effective Protection Programs 40
CORE COMPETENCIES OF SECURITY OPERATIONS 40
HOW CONTEMPORARY SECURITY SERVICES HAVE EVOLVED 43
WHAT DRIVES SECURITY OPERATIONS? 45
A BRIEF HISTORY OF A GROWING FIELD 48
THE GROWTH OF THE MODERN PROTECTIVE INDUSTRY 54
HOW SECURITY EXECUTIVES RANK PRIORITIES 59
SPECIFIC CONCERNS FOR DIFFERENT INDUSTRIES 62
SUMMARY 63
DISCUSSION AND REVIEW 64
ENDNOTES 64
ADDITIONAL REFERENCES 66
Chapter 3: Staffing to Meet Protective Goals 68
PERSONNEL PLANNING 68
JOB DESCRIPTIONS 71
NEGLIGENT HIRING LITIGATION 73
THE VETTING PROCESS 76
SUMMARY 101
DISCUSSION AND REVIEW 101
ENDNOTES 102
ADDITIONAL REFERENCES 103
Chapter 4: Training and Development for High Performance 106
WHY TRAIN, ANYHOW? 106
THE TRAINING MANAGER OF OFFICER 109
PLANNING TRAINING AND DEVELOPMENT REQUIREMENTS 109
THE ORIENTATION 110
TRAINING TECHNIQUES 117
FIREARMS TRAINING 123
ONGOING “IN-SERVICE” TRAINING 124
SECURITY TRAINING FOR NONSECURITY PERSONNEL 124
TRAINING FOR TRAINERS AND SUPERVISORS 125
DEVELOPMENT AND EDUCATION FOR MANAGERS AND EXECUTIVES 125
MEASURING EFFECTIVENESS 127
SUMMARY 129
DISCUSSION AND REVIEW 130
ENDNOTES 130
ADDITIONAL REFERENCES 131
Chapter 5: Supporting and Motivating Supervisors and Staff 132
SUPPORTING SUPERVISORS AND STAFF 132
SAFETY AT WORK: THE RESPONSIBILITY OF SUPERVISORS 146
WHY BE A SUPERVISOR, ANYWAY? 148
DUTIES OF EMPLOYEES TO SUPERVISORS AND THE WORKPLACE 149
MOTIVATING SUPERVISORS AND STAFF 150
TIME MANAGEMENT FOR SUPERVISORS AND MANAGERS 150
THE COMPLEXITY OF MOTIVATION 154
THE LIMITATIONS OF MOTIVATION RESEARCH 160
SUMMARY 161
DISCUSSION AND REVIEW 162
ENDNOTES 162
ADDITIONAL REFERENCES 163
Chapter 6: Appraising and Promoting People in Security Programs 166
THE DIFFICULTIES OF PERFORMANCE APPRAISAL 166
WHO SHOULD BE APPRAISED AND WHEN? 167
APPRAISAL FOR ALL LEVELS AND BY ALL LEVELS 167
WHAT TYPES OF EVALUATION DO WORKERS PREFER? 169
WHAT NEEDS TO BE EVALUATED? 169
USING A FORMAL APPRAISAL DOCUMENT 172
JOB PERFORMANCE RATING 175
THE NEED FOR APPRAISAL DOCUMENTATION 177
OTHER WRITTEN APPRAISAL TECHNIQUES 179
THE APPRAISAL INTERVIEW 180
ASSESSING PERFORMANCE AMONG DIFFERENT EMPLOYMENT LEVELS 183
REVIEWING MANAGEMENT STRATEGY 183
PERFORMANCE REVIEWS FOR SENIOR MANAGEMENT 191
THE LIMITATIONS OF APPRAISALS 192
THE PROMOTION PROCESS 192
WHAT’S WRONG WITH PROMOTION? 193
WHY PROMOTIONS ARE IMPORTANT 194
SUMMARY 195
DISCUSSION AND REVIEW 195
ENDNOTES 196
ADDITIONAL REFERENCES 196
Part II: Special Issues in Security Management 198
Chapter 7: Discipline and Discharge 200
WHY SOME EMPLOYEES FAIL TO ACHIEVE DESIRED STANDARDS 200
THE PSYCHOLOGICAL BASIS OF NONCOMPLIANCE 202
WHY SOME SUPERVISORS DO NOT DISCIPLINE WELL 202
HUMAN RELATIONS–ORIENTED MANAGERS 204
PROGRESSIVE DISCIPLINE TO SAVE WEAK WORKERS 205
WHY EMPLOYEES ARE DISCIPLINED 208
LEGAL ISSUES FOR WRONGFUL DISCHARGE 209
SPECIAL DEFENSES AGAINST DISCHARGE 214
LEGAL CASES OF PROPER AND IMPROPER DISCHARGES 216
INSURANCE AGAINST WRONGFUL TERMINATION 218
PROCEDURES AT THE TIME OF DISMISSAL 218
THE EXIT INTERVIEW 221
DISMISSAL AND THE DISGRUNTLED EMPLOYEE 221
T.I.M.E. IS NOT ON YOUR SIDE 225
SUMMARY 225
DISCUSSION AND REVIEW 226
ENDNOTES 226
ADDITIONAL REFERENCES 227
Chapter 8: Accounting Controls and Budgeting 228
FINANCIAL CONTROLS IN THE ORGANIZATION 228
BUDGETING FOR A SECURITY DEPARTMENT 241
THE GOALS OF THE CORPORATION: PROFITS 245
BUDGET DOWNFALLS 252
SECURITY AS A PROFIT CENTER 253
FORENSIC SAFEGUARDS TO INTERNAL FRAUD 253
SUMMARY 257
DISCUSSION AND REVIEW 258
ENDNOTES 258
ADDITIONAL REFERENCES 259
Chapter 9: Operating Personnel-Intensive Programs 260
THE PROPRIETARY/CONTRACT EMPLOYEE DEBATE 260
CORE EXPECTATIONS OF SECURITY OFFICERS 264
PROPRIETARY SECURITY STRATEGY 271
CONTRACT SECURITY SERVICES 274
SELECTING CONTRACT SECURITY SERVICES 275
LARGE, COMPLEX SECURITY PROGRAMS 276
RETAINING SERVICES OF PRIVATE INVESTIGATORS AND CONSULTANTS 290
CONTRACTING FOR ALARM MONITORING SERVICES 291
PURCHASING SECURITY SERVICES THROUGH INTERNET PROPOSALS 293
SUMMARY 293
DISCUSSION AND REVIEW 294
ENDNOTES 294
ADDITIONAL REFERENCES 295
Chapter 10: Operating Physical- and Technology-Centered Programs 296
SITUATIONAL CRIME PREVENTION: A PHILOSOPHY OF CRIME REDUCTION 296
THE RISK VERSUS COST RATIO 299
WHY PHYSICAL SECURITY IS IMPORTANT 301
SELECTING SECURITY COUNTERMEASURES TO REDUCE LOSS 303
DESIGNING SECURITY SYSTEMS 324
SUMMARY 326
DISCUSSION AND REVIEW 326
ENDNOTES 327
ADDITIONAL REFERENCES 328
Chapter 11: Leadership for Optimal Security Operations 330
LEARNING ABOUT LEADERSHIP 330
WHAT IS DISTINCTIVE ABOUT LEADERSHIP FOR SECURITY OPERATIONS? 337
CRITICAL LEADERSHIP ISSUES FOR SECURITY OPERATIONS MANAGERS 338
THE FUTURE DIRECTION OF SECURITY OPERATIONS 363
DISCUSSION AND REVIEW 364
ENDNOTES 364
ADDITIONAL REFERENCES 367
Appendix A Contact Information for Security Organizations 368
ACADEMIC, TRADE, AND PROFESSIONAL ASSOCIATIONS 368
FEDERAL CONTACTS 369
Appendix B Code of Ethics of the American Society for Industrial Security 370
PREAMBLE 370
CODE OF ETHICS 370
ARTICLE I 370
ARTICLE II 371
ARTICLE III 371
ARTICLE IV 371
ARTICLE V 372
ARTICLE VI 372
CENSURE, SUSPENSION, AND EXPULSION 373
Appendix C Report of the Task Force on Private Security 374
INTRODUCTION 374
Glossary 386
Index 394

Erscheint lt. Verlag 31.3.2011
Sprache englisch
Themenwelt Sozialwissenschaften Politik / Verwaltung
Wirtschaft Betriebswirtschaft / Management Logistik / Produktion
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
ISBN-10 0-08-046949-3 / 0080469493
ISBN-13 978-0-08-046949-2 / 9780080469492
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 2,5 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Manufacturing Excellence in der Smart Factory

von Jürgen Kletti; Jürgen Rieger

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
69,99
Grundlagen – Use-Cases – unternehmenseigene KI-Journey

von Ralf T. Kreutzer

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
42,99