E-Book, Englisch, 480 Seiten
Fay Contemporary Security Management
3. Auflage 2010
ISBN: 978-0-12-381951-2
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
E-Book, Englisch, 480 Seiten
ISBN: 978-0-12-381951-2
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Mr. Fay was a special agent of the U.S. Army Criminal Investigation Division (CID) and later the Director of the National Crime Prevention Institute at the University of Louisville. He has held security management positions in the petroleum industry while teaching at the university level. He holds the Master of Business Administration degree from the University of Hawaii, and is a well-known and respected author of many books, including Butterworth's Security Dictionary: Terms and Concepts, Drug Testing, Encyclopedia of Security Management: Techniques and Technology, and Model Security Policies, Plans, and Procedures, all by Butterworth-Heinemann.Was a special agent of the U.S. Army Criminal Investigation Division (CID) and later the Director of the National Crime Prevention Institute. Former manager of security for British Petroleum's operations in the Gulf of Mexico. He was previously an adjunct professor at the University of North Florida and the University of Houston.
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;Contemporary Security Management;4
3;Copyright;5
4;Table of Contents;6
5;About the Author;18
6;About the Contributor;18
7;Chapter 1. Historical Roots;20
7.1;Introduction;20
7.2;The Industrial Revolution;20
7.3;Scientific Management;22
7.4;Operations Research;23
7.5;Project Management;23
7.6;Age of Technology;25
7.7;Human Relations;26
7.8;Business Today;27
7.9;Security Industry;28
7.10;Review Questions;32
7.11;References;32
8;Chapter 2. Organizing;34
8.1;Introduction;34
8.2;Staffing;34
8.3;Independent Contractors and Consultants;41
8.4;Practices;42
8.5;Establishing Objectives;43
8.6;Organizing Consistent with Policies;45
8.7;Organizing Outside of the Security Group;46
8.8;Terminating Unacceptable Employees;49
8.9;Organizational Structures;52
8.10;Review Questions;55
8.11;References;55
9;Chapter 3. Managing People;56
9.1;Introduction;56
9.2;Maslow’s Theory;56
9.3;Maslow in the Security Environment;58
9.4;People Development;59
9.5;Performance Appraisal;62
9.6;Performance Appraisal Cycle;65
9.7;Upward Feedback;68
9.8;Position Evaluation;72
9.9;Review Questions;74
9.10;References;74
10;Chapter 4. Leadership and Management Skills;76
10.1;Introduction;76
10.2;Leadership in the Management of Security;76
10.3;Build a Vision;77
10.4;Empowerment;79
10.5;Followers;80
10.6;Leaders Add Value;81
10.7;Competition among Leaders;81
10.8;Price of Leadership;82
10.9;Leading in the Twenty-First Century;82
10.10;Conclusion;84
10.11;Review Questions;85
10.12;References;85
11;Chapter 5. Strategy;86
11.1;Introduction;86
11.2;Business Strategy;86
11.3;Core and Support Activities;87
11.4;Outsourcing and the Security Group;87
11.5;Effect of Strategy on Security Management;90
11.6;Technical Knowledge;91
11.7;Strategy and Risk;92
11.8;Imperatives;92
11.9;Strategic Planning;95
11.10;Conclusion;100
11.11;Review Questions;100
11.12;References;100
12;Chapter 6. Budget Management;102
12.1;Introduction;102
12.2;Budget Preparation;103
12.3;Authorization;103
12.4;Execution;104
12.5;Audit;104
12.6;The Budget Director;105
12.7;Zero-Based Budgeting;105
12.8;Controlling Costs;109
12.9;Overspending;110
12.10;Conclusion;115
12.11;Review Questions;115
12.12;References;115
13;Chapter 7. Managing Change;116
13.1;Introduction;116
13.2;Adjusting to Change;119
13.3;Technology and Change;121
13.4;Politics and Change;122
13.5;Change on a Personal Level;124
13.6;Review Questions;126
13.7;References;127
14;Chapter 8. Making Decisions;128
14.1;Introduction;128
14.2;A Decision-Making Strategy;129
14.3;Implications for the CSO;132
14.4;Conclusion;134
14.5;Review Questions;134
14.6;References;134
15;Chapter 9. Managing Risk;136
15.1;Introduction;136
15.2;Risk Analysis;136
15.3;Risk Assessment versus Threat Assessment;142
15.4;Self-Assessment;143
15.5;Security Review;144
15.6;Security Audit;145
15.7;Project Review;151
15.8;Security Incident Causation Model;154
15.9;SICM Standards;156
15.10;Management Failures;157
15.11;Applying the SICM Technique;157
15.12;Conclusions;158
15.13;Review Questions;158
15.14;References;159
16;Chapter 10. Managing Guard Operations;160
16.1;Introduction;160
16.2;Security Officer Selection and Training;160
16.3;Needs Assessment;163
16.4;Life-Safety Program;165
16.5;Proprietary versus Contract Security;167
16.6;Assurance;171
16.7;Value of Guard Services;172
16.8;Conclusions;174
16.9;Review Questions;175
16.10;References;175
17;Chapter 11. Managing Physical Security;176
17.1;Introduction;176
17.2;Types of Protected Assets;176
17.3;Safeguards;177
17.4;Factors in Selecting Safeguards;177
17.5;Concentric Protection;180
17.6;Security Lighting;182
17.7;Sensors;183
17.8;Intrusion Detection Systems;189
17.9;Lock and Key Systems;191
17.10;Conclusions;196
17.11;Review Questions;198
17.12;References;198
18;Chapter 12. Managing Access Control;200
18.1;Introduction;200
18.2;Employee Badges and Visitor Passes;201
18.3;Types of Identification Cards;201
18.4;Traffic Control;203
18.5;Materials Control;204
18.6;Access Control Barriers;205
18.7;Biometrics;207
18.8;Closed-Circuit Television (CCTV);208
18.9;Intrusion Detection;213
18.10;Threat Individuals;214
18.11;Conclusions;217
18.12;Review Questions;218
18.13;References;218
19;Chapter 13. Managing Investigations;220
19.1;Introduction;220
19.2;Case Management;220
19.3;Private Investigation;222
19.4;Investigation Types;223
19.5;Physical Evidence;235
19.6;Forensics;236
19.7;Polygraph Testing;244
19.8;The Deposition;246
19.9;Discovery;246
19.10;Pretrial Preparation;247
19.11;Trial Procedures;248
19.12;Conclusions;250
19.13;Review Questions;251
19.14;References;251
20;Chapter 14. Pre-Employment Screening;252
20.1;Introduction;252
20.2;Negligent Hiring;253
20.3;Employment Application Form;253
20.4;Verifying Application Information;254
20.5;Employee Release;260
20.6;Reference Checks;261
20.7;Records of Interest;262
20.8;Database Searches;265
20.9;Cost Avoidance;265
20.10;Fair Credit Reporting Act;265
20.11;Freedom of Information Act;267
20.12;Privacy Act of 1974;267
20.13;The Gramm-Leach Bliley Act;269
20.14;Health Insurance Portability and Accountability Act;270
20.15;Applicant Testing;270
20.16;Review Questions;274
20.17;References;274
21;Chapter 15. Emergency Management;276
21.1;Introduction;276
21.2;Emergency Management Process;276
21.3;Dealing with the Media;283
21.4;National Incident Management System (NIMS);284
21.5;Incident Command System (ICS);285
21.6;Bomb Incidents;287
21.7;Fire Emergencies;296
21.8;Natural Disasters;301
21.9;Medical Emergencies;305
21.10;Conclusions;309
21.11;Review Questions;309
21.12;References;309
22;Chapter 16. Business Continuity;310
22.1;Introduction;310
22.2;Policy;310
22.3;Risk Assessment;312
22.4;Thinking Ahead;314
22.5;Continuation and Resumption;315
22.6;Business Impact Analysis;316
22.7;Recovery Program;317
22.8;Conclusion;319
22.9;Review Questions;319
22.10;References;320
23;Chapter 17. Managing Information Security;322
23.1;Introduction;322
23.2;Management Intention;323
23.3;IT Governance;326
23.4;The Importance of Transparency;329
23.5;Threat Assessment;332
23.6;Estimating Costs of Exposure: Quantitative versus Qualitative Risk Assessment;334
23.7;How Management Can Respond to Risk;335
23.8;Security Management;337
23.9;Intellectual Property;344
23.10;Activities to Secure Intellectual Property;345
23.11;The Risk of Scale;349
23.12;Review Questions;351
23.13;References;351
24;Chapter 18. Substance Abuse;352
24.1;Introduction;352
24.2;Role of the Chief Security Officer;353
24.3;Testing for Illegal Drugs;354
24.4;Alcohol Testing;355
24.5;Employee Awareness and Cooperation;357
24.6;Intervention;359
24.7;Investigation;365
24.8;The Health Insurance Portability and Accountability Act of 1996 (HIPAA);366
24.9;Review Questions;368
24.10;References;368
25;Chapter 19. Executive Protection;370
25.1;Introduction;370
25.2;The Protected Persons;371
25.3;Program Size, Equipment, and Objectives;372
25.4;Protection at the Office and at Home;373
25.5;The Threat;373
25.6;Adversary Attempts at the Residence or Office;374
25.7;Event Protection in the United States;374
25.8;Event Protection Overseas;376
25.9;Operational Plan;377
25.10;Antikidnap Plan;378
25.11;Abduction;380
25.12;Proof of Life;381
25.13;Countermeasures;384
25.14;Conclusions;386
25.15;Review Questions;386
25.16;References;386
26;Chapter 20. Workplace Violence;388
26.1;Introduction;388
26.2;Policy;388
26.3;Characteristics of Workplace Violence;393
26.4;Assessment;396
26.5;Readiness;397
26.6;Response;398
26.7;Intervention;400
26.8;Psychological Profiling;401
26.9;Liability;402
26.10;Conclusion;405
26.11;Review Questions;405
26.12;References;406
27;Chapter 21. Employee Awareness Program;408
27.1;Introduction;408
27.2;Goals;408
27.3;Awareness Program;409
27.4;The Message;410
27.5;Workforce Culture;412
27.6;Conclusion;413
27.7;Review Questions;414
27.8;References;414
28;Chapter 22. Vulnerability Assessment;416
28.1;Introduction;416
28.2;The Process;417
28.3;Exit Briefing;425
28.4;Final Report;425
28.5;Management Actions;426
28.6;Conclusions;429
28.7;Review Questions;429
28.8;References;429
29;Chapter 23. Security Program Design;430
29.1;Introduction;430
29.2;Three Pillars;431
29.3;Training;433
29.4;Testing the Design;434
29.5;Full-Program Testing;436
29.6;Revising;437
29.7;Security Program Design and the External Environment;438
29.8;Conclusion;439
29.9;Review Questions;439
29.10;References;439
30;Chapter 24. Critical Infrastructures and Key Resources;440
30.1;Introduction;440
30.2;Presidential Directive;440
30.3;The Patriot Act;441
30.4;Critical Infrastructure and Key Resources;441
30.5;Attack Possibilities;442
30.6;The World Trade Center as a CIKR;442
30.7;Vulnerability;443
30.8;Threat Probability;444
30.9;The Office of Infrastructure Protection (IP);445
30.10;The National Counterterrorism Center (NCTC);445
30.11;The National Intelligence Program (NIP);446
30.12;Fusion Centers;446
30.13;The National Strategy for Information Sharing (NSIP);447
30.14;The National Criminal Intelligence Resource Center (NCIRC);447
30.15;National Infrastructure Advisory Council (NIAC);447
30.16;Federal Bureau of Investigation (FBI);447
30.17;Central Intelligence Agency (CIA);448
30.18;Intelligence Operations;448
30.19;Defense Intelligence Agency (DIA);449
30.20;U.S. Coast Guard (USCG);449
30.21;U.S. Secret Service (USSS);450
30.22;Law Enforcement;450
30.23;DHS Private Sector Office;451
30.24;Conclusions;451
30.25;Review Questions;452
30.26;References;452
31;Chapter 25. The Terrorist Threat;454
31.1;Introduction;454
31.2;Terrorist Groups;454
31.3;The Evolution of Terrorism;455
31.4;Motives;457
31.5;Evaluation;459
31.6;Tactics;460
31.7;Terrorist Preparation;463
31.8;Conclusions;465
31.9;Review Questions;465
31.10;References;466
32;Index;468




