Preface | p. xiii |
Acknowledgments | p. xv |
Introduction and Security's Function | p. 1 |
Homeland Security--Changing the Emphasis on Security in the United States | p. 3 |
Introduction | p. 3 |
Private Enterprise Response | p. 4 |
Federal Response in the United States | p. 11 |
State/Local Response | p. 15 |
Public/Private Joint Initiatives | p. 17 |
Concerns | p. 17 |
Origins and Development of Security | p. 21 |
Introduction | p. 21 |
Security in England | p. 21 |
Security in the United States | p. 25 |
Defining Security's Role | p. 37 |
Introduction | p. 37 |
What Is Private Security? | p. 37 |
Security Services | p. 39 |
Contract versus Proprietary Services | p. 40 |
Hybrid Systems | p. 45 |
Private Security and Public Law Enforcement | p. 48 |
Relationships after September 11, 2001 | p. 51 |
The Proprietary Security Organization | p. 55 |
Introduction | p. 55 |
Determining the Need | p. 55 |
Security's Place in the Organization | p. 56 |
Organizing the Security Function | p. 63 |
Career Opportunities in Loss Prevention | p. 75 |
Introduction | p. 75 |
Factors Increasing Security Opportunities | p. 75 |
The Security/Loss-Prevention Occupation | p. 76 |
Security Education, Training, Certification, and Regulation | p. 89 |
Introduction | p. 89 |
Adequacy of Private Security Training | p. 90 |
Proposed Federal Regulation | p. 90 |
The Role of Higher Education | p. 91 |
Training | p. 93 |
Certification and Regulation | p. 94 |
Magazines and Periodicals | p. 97 |
Basics of Defense | p. 101 |
Security and the Law | p. 103 |
Introduction | p. 103 |
Security, Public Police, and the U.S. Constitution | p. 104 |
Sources of Law | p. 104 |
Classes of Crimes | p. 106 |
Private Security Powers | p. 108 |
Civil Law: The Controller for Private Security | p. 114 |
Security and Liability | p. 118 |
Duty to Protect from Third-Party Crime | p. 119 |
Recent Trends in Liability | p. 123 |
Recent Trends in Privacy | p. 124 |
New Laws | p. 124 |
The Courts | p. 124 |
Development of Case Law | p. 125 |
Risk Analysis and the Security Survey | p. 129 |
Introduction | p. 129 |
Risk Management | p. 130 |
The Security Survey | p. 131 |
Alternatives for Optimizing Risk Management | p. 141 |
The Outer Defenses: Building and Perimeter Protection | p. 147 |
Introduction | p. 147 |
Barriers, Fences, and Walls | p. 148 |
Gates and Other Barrier Breaches | p. 152 |
Barrier Protection | p. 153 |
Inside the Perimeter | p. 156 |
Lighting | p. 157 |
Planning Security | p. 164 |
Interior and Exterior Security Concerns | p. 167 |
Introduction | p. 167 |
Buildings on or as the Perimeter | p. 167 |
Windows and Doors | p. 167 |
Locks and Keys | p. 170 |
Roofs and Common Walls | p. 184 |
Surveillance Devices | p. 184 |
Old Construction | p. 188 |
New Construction | p. 189 |
Security at the Building Design Stage | p. 189 |
Security Principles in Design | p. 190 |
The Inner Defenses: Intrusion and Access Control | p. 193 |
Introduction | p. 193 |
Doors to Sensitive Areas | p. 194 |
Office Area Doors | p. 194 |
Traffic Patterns | p. 194 |
Traffic Control | p. 195 |
Employee Identification | p. 196 |
Package Control | p. 198 |
Files, Safes, and Vaults | p. 198 |
Inspections | p. 203 |
Alarms | p. 203 |
Fire Protection, Safety, and Emergency Planning | p. 215 |
Introduction | p. 215 |
Fire Prevention and Protection | p. 216 |
Safety and Loss Control | p. 228 |
Emergency Planning | p. 236 |
Insurance | p. 241 |
Introduction | p. 241 |
The Value of Insurance in a Total Loss-Prevention Program | p. 241 |
Types of Insurance | p. 242 |
Insuring against Crime | p. 247 |
Insuring Property | p. 248 |
Internal Theft Controls | p. 253 |
Introduction | p. 253 |
What Is Honesty? | p. 253 |
The Dishonest Employee | p. 254 |
Management Responsibility in Loss Prevention | p. 257 |
Program for Internal Security | p. 259 |
Procedural Controls | p. 261 |
When Controls Fail | p. 269 |
Personnel Policies for Internal Security | p. 273 |
Introduction | p. 273 |
Human Resources Screening | p. 273 |
Employment History and Reference Checking | p. 274 |
Backgrounding | p. 281 |
Integrity and Lie Detection Tests | p. 282 |
Americans with Disabilities Act | p. 285 |
Drug Screening | p. 288 |
Other Screening Options | p. 288 |
Hiring Ex-convicts and Parolees | p. 289 |
Morale | p. 289 |
Specific Threats and Solutions | p. 295 |
Transportation/Cargo Security | p. 297 |
Introduction | p. 297 |
The Role of Private Security | p. 298 |
Accountability Procedures | p. 298 |
Theft and Pilferage | p. 300 |
Planning for Security | p. 304 |
Cargo in Transit | p. 307 |
Suggested Sealing Systems and Procedures | p. 309 |
Special Issues in Airline Security | p. 314 |
Other Transportation Industry Responses to Terrorism | p. 316 |
Workplace Violence: Prevention and Intervention | p. 319 |
Introduction | p. 319 |
Threat | p. 320 |
Harassment | p. 320 |
Attack | p. 320 |
Sabotage | p. 320 |
The Phenomenon of Workplace Violence | p. 320 |
The Work Environment and Violence | p. 322 |
Profiling Violent Behavior | p. 323 |
Basic Levels of Violence | p. 325 |
Preventing Workplace Violence | p. 326 |
The Violence Intervention and Contingency Team | p. 327 |
Perpetrators' Rights | p. 328 |
Intervention Strategy | p. 329 |
Drugs in the Workplace | p. 333 |
Introduction | p. 333 |
Impact of Drug Use | p. 334 |
Drug Testing | p. 336 |
Spotting Drug Use | p. 338 |
The Components of a Comprehensive Substance Abuse Program | p. 339 |
Retail Security | p. 345 |
Introduction | p. 345 |
Shoplifting | p. 346 |
Checks and Credit/Debit Cards | p. 356 |
Internal Theft | p. 362 |
Terrorism and Other Tools of Destruction | p. 369 |
Introduction | p. 369 |
Current Issues | p. 371 |
Historical Background | p. 372 |
Implications of a Changing World | p. 375 |
In Search of a Definition for International Terrorism | p. 376 |
Terrorism as a Tactic, Instrument, or Method | p. 378 |
Characterizing Modern Terrorism | p. 380 |
Specific Threats and Responses | p. 389 |
Other Specific Response Issues in the United States | p. 392 |
The Future/Summary | p. 395 |
Computer and Information Security | p. 399 |
Introduction | p. 399 |
Types of Computer Systems | p. 402 |
Networks | p. 404 |
The Database Problems | p. 406 |
The Need for Computer Security | p. 406 |
Computer Systems Protection | p. 411 |
Content Monitoring and Filtering | p. 418 |
Dealing with Identity Theft | p. 420 |
Other Data Resources Vulnerabilities | p. 422 |
Specific Security Threats | p. 427 |
Introduction | p. 427 |
Economic/White-Collar Crime | p. 427 |
Burglary and Robbery | p. 429 |
Labor Disputes | p. 436 |
Espionage | p. 438 |
Piracy | p. 439 |
Security: Its Problems, Its Future | p. 443 |
Introduction | p. 443 |
The Aftermath of September 11, 2001 | p. 443 |
Private Security Resources | p. 444 |
Interaction and Cooperation | p. 444 |
Limitations of Security | p. 445 |
Trends | p. 446 |
The Future | p. 447 |
Security Journals, Magazines, and Newsletters | p. 453 |
World Wide Web Sites | p. 455 |
Security Surveys | p. 457 |
Index | p. 465 |
Table of Contents provided by Rittenhouse. All Rights Reserved. |