About the Author | p. xvii |
Preface | p. xix |
Acknowledgments | p. xxiii |
Introduction to Security and Loss Prevention | p. 1 |
History of Security and Loss Prevention | p. 3 |
Objectives | p. 3 |
Security and Loss Prevention Defined | p. 3 |
Early Civilizations | p. 5 |
Ancient Greece | p. 6 |
Ancient Rome | p. 7 |
The Middle Ages in Europe | p. 7 |
More Contemporary Times | p. 8 |
Modern England | p. 8 |
Early America | p. 9 |
The Growth of Policing | p. 10 |
The Growth of Security Companies | p. 11 |
Railroads and Labor Unions | p. 14 |
The Great Wars | p. 14 |
The Third Wave | p. 15 |
The Business of Security and Loss Prevention | p. 17 |
Objectives | p. 17 |
The Extent of Losses | p. 17 |
Direct and Indirect Losses | p. 19 |
The Security Industry | p. 20 |
Contract versus Proprietary Security Officers | p. 22 |
Loss Prevention Services and Specialists | p. 24 |
The Limitations of the Criminal Justice System: Implications for Loss Prevention Practitioners | p. 27 |
Problems in the Security Industry | p. 29 |
Cooperation Between Public and Private Police | p. 30 |
Regulation of the Industry | p. 31 |
The Need for Training | p. 32 |
Ethics | p. 33 |
Management Problems | p. 33 |
The False Alarm Problem | p. 33 |
Reducing the Problem of Loss | p. 37 |
Foundations of Security and Loss Prevention | p. 39 |
Objectives | p. 39 |
Risk Analysis | p. 39 |
The Loss Prevention Survey | p. 40 |
Identifying Vulnerabilities | p. 40 |
Determining Probability, Frequency, and Cost | p. 41 |
Planning | p. 41 |
Planning from a Systems Perspective | p. 45 |
Evaluation of Loss Prevention Programs | p. 48 |
Research | p. 49 |
Sources of Research Assistance | p. 50 |
Standards | p. 51 |
Proprietary Security | p. 53 |
Basics of Organization: The Vocabulary | p. 53 |
Basics of Organization: The Practical Management Tools | p. 54 |
Law | p. 59 |
Objectives | p. 59 |
Origins of Law | p. 59 |
Tort Law | p. 60 |
Premises Protection and Negligence | p. 62 |
Contract Law | p. 64 |
Administrative Law | p. 65 |
Compliance Auditing | p. 65 |
Federal Sentencing Guidelines | p. 66 |
Criminal Justice Procedure | p. 67 |
Arrest Law | p. 69 |
Force | p. 71 |
Searches | p. 71 |
Questioning | p. 72 |
Internal and External Relations | p. 77 |
Objectives | p. 77 |
Loss Prevention Relations versus Public Relations | p. 79 |
Benefits of Good Relations | p. 80 |
Internal Relations | p. 81 |
Human Relations on the Job | p. 81 |
Management Support | p. 82 |
Orientation and Training Programs | p. 82 |
Loss Prevention Meetings | p. 83 |
Loss Prevention Bulletins | p. 83 |
Involvement Programs | p. 84 |
External Relations | p. 85 |
Law Enforcement | p. 86 |
Public Service Agencies | p. 87 |
The Community | p. 88 |
The Media | p. 88 |
External Loss Prevention Peers | p. 90 |
Special Problems | p. 90 |
Prosecution Decisions | p. 90 |
Loss Prevention Attire | p. 93 |
Applicant Screening and Employee Socialization | p. 97 |
Objectives | p. 97 |
Legal Guidelines | p. 98 |
Federal Legislation | p. 98 |
U.S. Supreme Court Decisions | p. 99 |
EEO, AA, and Quotas | p. 102 |
Diversity | p. 102 |
Sexual Harassment | p. 103 |
Screening Methods | p. 104 |
Resumes and Applications | p. 104 |
Interview | p. 105 |
Tests | p. 106 |
Background Investigations | p. 108 |
Employee Socialization | p. 112 |
Loss Prevention Orientation for New Employees | p. 113 |
Employee Training | p. 113 |
Planning Training | p. 113 |
Learning Principles | p. 115 |
Wasted Training | p. 116 |
Examples Set by Superiors | p. 116 |
Employee Needs | p. 117 |
Internal Threats and Countermeasures | p. 123 |
Objectives | p. 123 |
Internal Theft | p. 124 |
How Serious Is the Problem? | p. 124 |
Why Do Employees Steal? | p. 126 |
How Do Employees Steal? | p. 128 |
Possible Indicators of Theft | p. 129 |
Management Countermeasures | p. 129 |
Strategies | p. 130 |
Physical Security Countermeasures | p. 135 |
Access Controls | p. 135 |
Locks and Keys | p. 140 |
Intrusion Alarm Systems | p. 149 |
Interior Sensors | p. 149 |
Closed-Circuit Television | p. 154 |
Security Officers | p. 158 |
Safes, Vaults, and File Cabinets | p. 158 |
External Threats and Countermeasures | p. 165 |
Objectives | p. 165 |
Methods of Unauthorized Entry | p. 166 |
Countermeasures | p. 166 |
Construction and Environmental Security Design | p. 167 |
Perimeter Security | p. 168 |
Barriers | p. 169 |
Windows | p. 172 |
Doors | p. 176 |
Intrusion Alarm Systems | p. 178 |
CCTV | p. 185 |
Lighting | p. 186 |
Parking Lot and Vehicle Controls | p. 190 |
Security Officers | p. 191 |
Communications and the Control Center | p. 195 |
Protective Dogs | p. 196 |
The Aura of Loss Prevention | p. 197 |
Additional Strategies | p. 198 |
Services and Devices: Methods Toward Wise Purchasing Decisions | p. 201 |
Objectives | p. 201 |
The Dangers of Purchasing | p. 202 |
Purchasing Services | p. 204 |
Contract Security Officers | p. 204 |
Contract Undercover Investigators | p. 206 |
Consultants | p. 207 |
Certified Protection Professional | p. 208 |
Purchasing or Leasing Security Devices | p. 210 |
Acquiring an Alarm System | p. 210 |
Leasing | p. 210 |
Installation | p. 211 |
Maintenance | p. 212 |
Purchaser's Checklist | p. 213 |
Questions to Ask Before Purchasing a Security Device | p. 213 |
Investigations | p. 217 |
Objectives | p. 217 |
Types of Investigations | p. 218 |
Proprietary and Contract Investigations | p. 219 |
Private and Public Investigations | p. 220 |
Overt and Undercover Private Investigations | p. 221 |
Investigator and Auditor | p. 224 |
Important Considerations | p. 225 |
Law | p. 226 |
Interviewing and Interrogation | p. 227 |
Information Sources | p. 231 |
Databases and Electronic Mail | p. 232 |
Legal Restrictions When Collecting Information | p. 233 |
Investigative Leads | p. 234 |
Surveillance | p. 235 |
Information Accuracy | p. 236 |
Report Writing | p. 237 |
Courtroom Testimony | p. 238 |
Accounting, Accountability, and Auditing: Keys to Survival | p. 245 |
Objectives | p. 245 |
Accounting | p. 246 |
Accountability | p. 247 |
Evidence Collection and Presentation | p. 250 |
Cashier Operations | p. 250 |
Purchasing | p. 250 |
Shipping | p. 253 |
Inventory | p. 254 |
Auditing | p. 255 |
Certified Public Accountants | p. 256 |
Fraud | p. 258 |
Loss Prevention Auditing | p. 259 |
Computerization | p. 260 |
Fires and Other Disasters | p. 263 |
Objectives | p. 263 |
The Problem Posed by Fire | p. 263 |
Private Organizations Involved in Fire Safety | p. 263 |
Fire Department Prevention Efforts | p. 265 |
Fire Prevention and Fire Suppression Strategies | p. 267 |
Fire Prevention Strategies | p. 268 |
Fire Suppression Strategies | p. 272 |
Integrating Fire and Security Systems | p. 282 |
Other Disasters | p. 283 |
Constructed Disasters | p. 283 |
Natural Disasters | p. 287 |
Emergency Planning and Disaster Recovery | p. 289 |
Federal Emergency Management Agency | p. 290 |
Safety | p. 293 |
Objectives | p. 293 |
Accident Statistics and Costs | p. 293 |
Hazards | p. 295 |
History of Safety Legislation | p. 295 |
Workers' Compensation | p. 296 |
The Development of OSHA | p. 297 |
Objectives of OSHA | p. 298 |
The Act's Jurisdiction | p. 298 |
OSHA Standards | p. 298 |
OSHA Record Keeping and Reporting | p. 300 |
Additional OSHA Employer Responsibilities | p. 301 |
OSHA Inspections | p. 302 |
OSHA: Criticism and Controversy | p. 303 |
OSHA's Role in Loss Prevention | p. 304 |
Assistance with Problems | p. 304 |
Safety Strategies | p. 305 |
Socialization | p. 306 |
Safety and Health Committee | p. 306 |
Incentive Programs | p. 307 |
Investigations | p. 307 |
Additional Safety Measures | p. 309 |
Risk Management and Insurance | p. 313 |
Objectives | p. 313 |
Risk Management | p. 313 |
The Role of the Risk Manager | p. 314 |
Insurance | p. 316 |
Crime Insurance and Bonds | p. 317 |
Fire Insurance | p. 320 |
Property and Liability Insurance | p. 321 |
Claims | p. 322 |
Claims for Crime Losses | p. 326 |
Specialized Problems in Loss Prevention | p. 331 |
Retail Loss Prevention | p. 333 |
Objectives | p. 333 |
Shrinkage | p. 333 |
Personnel Problems in Retailing | p. 334 |
Internal Loss Prevention Strategies | p. 335 |
Preventing Losses at the Checkout Counters | p. 337 |
Refunds and Repair Service | p. 338 |
Bad Checks and Credit Card Losses | p. 340 |
Checks: Types and Irregularities | p. 341 |
Credit | p. 344 |
Counterfeiting | p. 345 |
Shoplifting | p. 346 |
Kinds of Shoplifters: Understanding Motivational Factors | p. 346 |
Shoplifting Techniques | p. 348 |
Prevention and Reduction of Shoplifting Through People | p. 349 |
Prevention and Reduction of Shoplifting Through Devices | p. 352 |
Confronting the Shoplifter | p. 358 |
Robbery and Burglary | p. 363 |
Robbery Countermeasures | p. 363 |
Burglary Countermeasures | p. 365 |
Shopping Mall Strategies | p. 366 |
Loss Prevention at Select Facilities | p. 369 |
Objectives | p. 369 |
Computer Facilities | p. 369 |
Losses from Errors | p. 370 |
Losses from Criminal Acts | p. 371 |
Strategies to Combat Computer Crime | p. 374 |
Defense Against Losses from Fire and Other Disasters | p. 378 |
Nuclear Facilities | p. 380 |
Nuclear Security | p. 381 |
Transportation of Fuel and Waste | p. 384 |
Fire and Safety | p. 384 |
Department of Defense Required Security | p. 384 |
Loss Prevention at Select Institutions | p. 389 |
Objectives | p. 389 |
Educational Institutions | p. 389 |
Problems and Losses at Educational Institutions | p. 390 |
Countermeasures | p. 390 |
School Districts | p. 391 |
Colleges and Universities | p. 393 |
Fire Protection at Educational Institutions | p. 395 |
Health-Care Institutions | p. 396 |
Strategies for Health-Care Institutions | p. 397 |
Fire and Other Disasters | p. 403 |
Banks and Financial Institutions | p. 405 |
The Bank Protection Act of 1968 | p. 405 |
Other Legislation Affecting Banking | p. 407 |
Robbery | p. 407 |
Kidnapping and Extortion | p. 408 |
Embezzlement and Fraud | p. 408 |
Automatic Teller Machines | p. 409 |
Crime Follows Technology | p. 409 |
Government Institutions | p. 410 |
Topics of Concern | p. 415 |
Objectives | p. 415 |
Protection of Sensitive Information | p. 415 |
Corporate Intelligence Gathering: Putting It in Perspective | p. 416 |
Espionage Techniques | p. 418 |
Countermeasures | p. 419 |
Communications Security | p. 422 |
Electronic Surveillance and Wiretapping | p. 423 |
Countermeasures | p. 424 |
Terrorism | p. 427 |
Countermeasures | p. 428 |
Executive Protection | p. 430 |
Planning | p. 430 |
Education and Training | p. 431 |
General Protection Strategies | p. 431 |
If Abduction Occurs | p. 435 |
Substance Abuse | p. 436 |
Causes | p. 437 |
Countermeasures | p. 437 |
Alcoholism | p. 439 |
Types of Substances and Abuse | p. 440 |
Workplace Violence | p. 442 |
Your Future in Security and Loss Prevention | p. 447 |
Objectives | p. 447 |
Effects of Technology on Loss Prevention | p. 447 |
Computers and Loss Prevention | p. 447 |
Automatic Factory and Robots | p. 448 |
Research in Behavioral Sciences and Loss Prevention | p. 449 |
Behavior Control | p. 450 |
Civil Liberties | p. 450 |
Education | p. 450 |
Loss Prevention Education: Today and Tomorrow | p. 451 |
Academic Research | p. 451 |
Training | p. 453 |
Trends Affecting Security and Loss Prevention | p. 453 |
Employment | p. 457 |
Sources of Employment Information | p. 459 |
Career Advice | p. 460 |
Index | p. 465 |
Table of Contents provided by Syndetics. All Rights Reserved. |