| |
| |
| |
Introduction | |
| |
| |
Learning Objectives | |
| |
| |
The Context for Security | |
| |
| |
Security: A Brief History | |
| |
| |
Private Police and Public Law Enforcement | |
| |
| |
Security Management: Essential Elements | |
| |
| |
Security Organizations | |
| |
| |
Roles of the Security Manager | |
| |
| |
Regulation of the Security Industry | |
| |
| |
Professional Certification and Education Programs | |
| |
| |
Impact of Globalization | |
| |
| |
The Future of Security Management | |
| |
| |
Summary | |
| |
| |
Key Terms | |
| |
| |
Discussion Questions and Exercises | |
| |
| |
| |
Threats to Safety and Security | |
| |
| |
Learning Objectives | |
| |
| |
Introduction | |
| |
| |
Accidents | |
| |
| |
Human Error | |
| |
| |
The Threat from Fire | |
| |
| |
Natural Disasters | |
| |
| |
Environmental Disasters | |
| |
| |
Civil Liability | |
| |
| |
Substance Abuse | |
| |
| |
Civil Disorder | |
| |
| |
Crime | |
| |
| |
Summary | |
| |
| |
Key Terms | |
| |
| |
Discussion Questions and Exercises | |
| |
| |
| |
Legal Aspects of Security Management | |
| |
| |
Learning Objectives | |
| |
| |
Introduction | |
| |
| |
Judicial Systems | |
| |
| |
Burden and Degrees of Proof | |
| |
| |
The Judicial Process | |
| |
| |
Tort Law | |
| |
| |
Contract Law | |
| |
| |
Administrative Law | |
| |
| |
Property Law | |
| |
| |
Employment Law | |
| |
| |
Criminal Law | |
| |
| |
Laws of Arrest | |
| |
| |
Evidence Law | |
| |
| |
Search and Seizure | |
| |
| |
Legislative Trends in Security Management | |
| |
| |
Summary | |
| |
| |
Key Terms | |
| |
| |
Discussion Questions and Exercises | |
| |
| |
| |
Risk Assessment, Planning, and Program Administration | |
| |
| |
Learning Objectives | |
| |
| |
Introduction | |
| |
| |
The Concept of Risk | |
| |
| |
Risk Assessment and the Security Survey | |
| |
| |
Planning | |
| |
| |
Contingency Planning | |
| |
| |
Crime Prevention through Environmental Design | |
| |
| |
Program Implementation and Administration | |
| |
| |
Evaluation | |
| |
| |
Summary | |
| |
| |
Key Terms | |
| |
| |
Discussion Questions and Exercises | |
| |
| |
| |
Physical Security | |
| |
| |
Learning Objectives | |
| |
| |
Introduction | |
| |
| |
Basic of Defense and Levels of Protection | |
| |
| |
Perimeter Controls | |
| |
| |
Building Exteriors and Interiors | |
| |
| |
Lighting | |
| |
| |
Fences | |
| |
| |
Locks | |
| |
| |
Visual Assessment and Surveillance Systems | |
| |
| |
Alarm Systems | |
| |
| |
Alarm System Management | |
| |
| |
Fire Prevention and Protection | |
| |
| |
Human Protection Systems | |
| |
| |
Summary | |
| |
| |
Key Terms | |
| |
| |
Discussion Questions and Exercises | |
| |
| |
| |
Personnel Security.Learning Objectives | |
| |
| |
Introduction | |
| |
| |
Personnel Recruitment and Selection | |
| |
| |
Personnel Management | |
| |
| |
Personnel Integrity | |
| |
| |
Summary | |
| |
| |
Key Terms | |
| |
| |
Discussion Questions and Exercises | |
| |
| |
| |
Information Security | |
| |
| |
Learning Objectives | |
| |
| |
Introduction | |
| |
| |
Infosec Risk Assessment and Analysis | |
| |
| |
Information Protection Strategies | |
| |
| |
Communications Security | |
| |
| |
Computer Security | |
| |
| |
Summary | |
| |
| |
Key Terms | |
| |
| |
Discussion Questions and Exercises | |
| |
| |
| |
Investigations, Intelligence Operations, and Reporting | |
| |
| |
Learning Objectives | |
| |
| |
Introduction | |
| |
| |
Investigations | |
| |
| |
Intelligence Operations | |
| |
| |
Counterespionage | |
| |
| |
Reporting | |
| |
| |
Summary | |
| |
| |
Key Terms | |
| |
| |
Discussion Questions and Exercises | |
| |
| |
| |
Specific Security Applications | |
| |
| |
| |
Learning Objectives | |
| |
| |
Introduction | |
| |
| |
Airline and Airport Security | |
| |
| |
Banking and Financial Institution Security | |
| |
| |
Computer Security | |
| |
| |
Contract Services | |
| |
| |
Courthouse and Courtroom Security | |
| |
| |
Disaster Recovery | |
| |
| |
Educational Institution Security | |
| |
| |
Entertainment Security | |
| |
| |
Executive Protection | |
| |
| |
Government Security | |
| |
| |
Healthcare Security | |
| |
| |
Hospitality Security | |
| |
| |
Summary | |
| |
| |
Key Terms | |
| |
| |
Discussion Questions and Exercises | |
| |
| |
| |
Specific Security Applications | |
| |
| |
| |
Learning Objectives | |
| |
| |
Introduction | |
| |
| |
Industrial Security | |
| |
| |
Library and Museum Security | |
| |
| |
Office Building Security | |
| |
| |
Privatization of Public Services | |
| |
| |
Residential Security | |
| |
| |
Retail Loss Prevention | |
| |
| |
Transportation Security | |
| |
| |
Utility Security | |
| |
| |
Workplace Violence Prevention | |
| |
| |
Zoo and Aquarium Security | |
| |
| |
Summary | |
| |
| |
Key Terms | |
| |
| |
Discussion Questions and Exercises | |
| |
| |
Glossary | |
| |
| |
| |
Correlation of ASIS International Syllabus for Introduction to Security for Business Students with Security Management: An Introduction, 2nd Edition | |
| |
| |
| |
Safety and Security Survey Instrument | |
| |
| |
References | |
| |
| |
Index | |