Save up to 30% on Elsevier print and eBooks with free shipping. No promo code needed.
Save up to 30% on print and eBooks.
Security Supervision and Management
Theory and Practice of Asset Protection
4th Edition - June 9, 2015
Author: IFPO
Editors: Sandi J. Davies, Brion P. Gilbride, Chris A. Hertig
Language: English
Paperback ISBN:9780128001134
9 7 8 - 0 - 1 2 - 8 0 0 1 1 3 - 4
eBook ISBN:9780128004890
9 7 8 - 0 - 1 2 - 8 0 0 4 8 9 - 0
Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or managerial positions. Cover…Read more
Purchase options
LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
Security Supervision and Management, Fourth Edition, fillsthe basic training needs for security professionals who want to move into supervisory or managerial positions. Covering everything needed from how to work with today’s generation security force employees to the latest advances in the security industry, Security Supervision and Management, Fourth Edition, shows security officers how to become a more efficient and well-rounded security professional. Security Supervision and Management, Fourth Edition, is also the only text needed to prepare for the Certified in Security Supervision and Management (CSSM) designation offered by International Foundation for Protection Officers (IFPO).
The IFPO also publishes The Professional Protection Officer: Practical Security Strategies and Emerging Trends, now in its 8th edition.
Core text for completing the Security Supervision and Management Program/Certified in Security Supervision and Management (CSSM) designation offered by IFPO
Contributions from more than 50 experienced security professionals in a single volume
Completely updated to reflect the latest procedural and technological changes in the security industry
Conforms to ANSI/ASIS standards
Security officers, supervisors, and managers, whether in-house or contract seeking to obtain the Certified in Security Supervision and Management (CSSM) designation; Students taking Security Management courses
Dedication
List of Authors and Contributors
Foreword
Acknowledgments
Introduction
Protection Officer Code of Ethics
Unit I. Foundations
1. What is Asset Protection?
Mission
Nature of the Asset Protection Professional
2. Legal Aspects of Security
Introduction
Historical Perspectives
Key Terms and Concepts
Arrest and Detention
Interrogation
Search and Seizure
Considerations Regarding the Use of Force
Civil Liability
Criminal Law and Criminal Liability
Trespassing
Labor Law, Discipline, and Dismissal
Employment-at-Will
Discipline
Dismissal/Removal
Legal Standards Regarding Privacy
Employee Background Investigations
Trade Secrets
Administrative Law
Regulations Governing the Security Industry
Standards
Giving Depositions and Testifying in Legal and Quasi-Legal Proceedings
Emerging Trends
3. Theories of Crime and Criminal Behavior and Their Implications for Security
The Classical and Neoclassical Schools of Thought
The Positivist School of Thought
Other Explanations of Criminality
Criminological Theories in the Real World
Appendix: Quick Reference Theory Matrix
4. Ethics, Integrity, and Professional Conduct
Introduction
Definition of Ethics
Code of Ethics
Leadership Commitment for Change
A Model for Establishing a Code of Ethics in a Major Private Security Company
Training to Make Ethical Decisions
Integrity Issues Involving Time or Abuse of Office
When Security Becomes the Enemy
What Can the Security Professional Do About This?
Emerging Trends
Surveillance/Video Systems
Intelligence Gathering
Other Considerations
5. The Theories of Accident Causation
Heinrich’s Domino Theory
Ferrell’s Human Factor Model
Petersen’s Accident/Incident Model
Systems Models
The Integration of Theories and General Safety Program Implications
Emerging Trends
6. An Introduction to the Supply Chain
What Is the Supply Chain?
Time and Cost versus Impacts
Information Is Everything
Unit II. Basics of Supervision
7. Supervisory Characteristics and Expectations
Contract versus Proprietary
The Promotion to Supervisor
The Impact of Poor Supervision
What Employees Expect from Supervisors
Conclusions
8. Company Policy and Procedures: The Security Supervisor’s Primer
What Are Policies, and How Do Procedures and Rules Influence Them?
Planning
Writing Policies
Implementing Policies
Reviewing/Revising Policies
The Security Policy and Procedure Manual
9. Operational Supervision
Relative Information of Faults and Attributes for an Operational Supervisor
Operational Briefing
Challenges: Partnering in a Multi-Service Single Location
Conclusion
10. The Supervisor’s Role in Safety
Supervising Crisis Situations
Safety Committee Meetings
Safety Attitude Development: A Culture of Safety
Supervising Accident Scenes
Enforcement of Safety Regulations
Fire Safety Supervisory Functions
Summary
Emerging Trends
11. The Supervisor’s Role in Improving Customer Service and Tenant Relations
The Role of the Supervisor
Core Philosophy of Parent or Client Organization
The Key Questions
The Customer Service Role of Protection Officers
The Supervisor’s Role in Tenant Relations
12. Supervising During Special Events
Assessment
Access Control
Communications
Traffic Control
Emergency Medical Operations
Evacuation
Fixed Posts
Assignment of Security Officer Posts
Pre-event Briefings
Talking to Crowds
Post-Event Briefing
Selection
Recruitment
Applications/Interviews
Testing/Vetting
Training:
Sports Security: An Emerging Aspect of Special Event Protection
Emerging Trends
13. Training and Development: A Primer for Protection Professionals
Defining Training
Benefits of Training
Three Domains of Learning
Learning over Time
Determining Training Needs
Initiating Curriculum Design
Implement an Instructional Strategy
Types of Training
Role of Supervisory Personnel in Training
Failing to Get It Right
Evaluation of Learning
Testing for Learning Retention
Challenges in Training
Finding the Time
Training Challenges
Emerging Trends
Conclusion
Unit III
Part 1. Human Resource Management
14. Recruitment and Retention of Security Personnel: Understanding and Meeting the Challenge
Introduction
Recruitment
Turnover Costs
Retention Strategies
Emerging Trends
Conclusion
15. Career Development and Professional Growth for Security Professionals
The Career Recipe
Congratulations, You’re Hired
Getting Promoted
Moving On
Career Killers
Emerging Trends
Conclusion
16. Orientation for Security Officers
Introduction
Background Checks/Investigations
Pre-orientation
Personal Appearance and Uniform Maintenance
Within First Week of Arrival
Training
Before a New Staff Member Arrives
First Day of Work
Mentoring
Report Writing
Role of the Security Officer
Other Points to Consider
Conclusion
17. Time and Stress Management
When Is the Best Time for Planning Your Work?
Protecting the Master Plan
Routine Meetings
Politically Charged Meetings
Meeting Deadlines
Prioritizing Your Work
The Demon Phone and Social Media
Delegation Skills That Lead to Success
Dealing with Stress That Is Not Work Related
Handling Fears in Your Professional Life
Follow up and Follow through
Warning about Praising
Conclusion
18. Employee Motivation Theory and Application
Part 1: Theory
Part 2: Application
Summary
19. Supervising Across Generations
The Changing Landscape of Work
Addressing Intergenerational Dynamics
Workplace Characteristics
C-Suite Priorities
Valuing Diversity
Women as Leaders
Managing Generations Successfully
Emerging Trends
Conclusion
20. The Supervisor’s Role in Employee Relations
Processing the Complaint
The Importance of Documenting
Precedents and Privacy
Dealing with Unions
The End of the Investigation
Prevention
Potential Legal Issues
Conclusion
Part 2. Security-Related Business Functions
21. Evaluation of Uniformed Protection Officers
Introduction
Officer Evaluation
22. Statistical Analysis for Security and Supervision
The Collection of Data
Metrics and Data Collection
Staffing Exercise
Analysis of Data
Forecasting
Inventory Exercise
Graphic Presentations
Determining Correlations and Causality
Conclusion
23. Security Officer Scheduling
Define the Mission
Gather Information
Account for Controlled and Uncontrolled Factors
Account for Fatigue
Communication
Time-Off Requests
Contractual Requirements
Challenges
Conclusion
24. Improving Organizational Performance by Employing Total Quality Management
25. Project Management for the Security Professional: A Position in Transition
Project Management: An Overview
History
Transition to Today’s World
Project Management: A Security-Specific Challenge
The People Piece
Communication
Motivation
Leadership
The Program Piece
The System Piece
The Business Piece
The Wrap
Unit IV. Technology in Security
26. Security Technology: A Management Perspective
Chapter Learning Objectives
Introduction
Security, Risk, and Organizational Management Dependencies
Security Measures
Organizational Culture and Types of Security Technology Measures
Closed Circuit Video
Electronic Access Control
Intrusion Detection Systems
Ethical Issues and the Use of Technology
Temptations to Abuse Security Technology
Management’s Obligation
Summary
27. Fire Protection Systems and Special Hazards
Overview
Principles of Fire Science
Building Construction Classification
Requirements and Consensus Standards
Fundamentals of Fire Protection Systems
Other Fire Protection Systems (AFFF, FM220)
Hazardous Materials, Explosives, and CBRNE
CBRNE
Fire Alarm Response
Fire Investigation and Documentation
Conclusion
28. Identity Documentation and Verification
The Breeder Document
The Social Security Card
The Driver’s License
The Passport
Refugee/Asylee Travel Documents
Green Card Residency Permits
Immigrant and Nonimmigrant Visas
Transportation Worker Identification Credential
What Companies Do to Address Identification Problems
Conclusion
Unit V. Emergency Management
29. Integrated Physical Security Systems
Detection, Delay, and Response
Layered Security or Security-In-Depth
Current Thinking in Physical Security Technology
Physical Security Technologies
Intrusion Detection
Access Control
Visitor Management
Video Technology
Integrated Operations Centers
Conclusion
30. Managing Critical Incidents and Large-Scale Special Events
Introduction
Scope of the Problem
Emergency Planning Considerations
The Components of an Effective Emergency Response Plan
Incident Command System
Common Requirements for Effective Critical Incident Management
Vulnerability Analysis
The Emergency Operations Center
Media Relations
Developing the Emergency Response Plan
Integrated Systems Approach to Special Event Planning
Reviewing and Integrating the Emergency Response Plan
Training and Testing
Evaluating the Emergency Response Plan
Terrorism’s Impact on Crisis Management
Post-9/11 Era: The Public Sector
Post-9/11 Era: The Private Sector
Professional Development
Summary
Unit VI. Investigations
31. Managing Investigations
Introduction
Key Management Points
Key Management Skills
Personnel Concerns
Investigation Issues
Conclusion
Information Dissemination Checklist
32. Interviewing
Interviewing Defined
What Interviewing Means to the Supervisor
Why the Skill Is Important
Officer/Supervisory Participation
Shyness
Demeanor
Rapport
Why Language Is Important
Interviewing versus Interrogation
The Administrative Interview
Due Diligence Investigations
Challenges for the Interviewer
Things to Remember When Conducting an Interview
The Impact of Note-Taking on the Interview Process
Conclusion
33. Introduction to Vehicle Searches
Commercial Vehicles
Passenger Vehicles
Examples of Concealment
Tires
A Note on Gas Tanks
A Real-Life Case of an Improvised Explosive Device in a Vehicle
Documentation
Conclusion
34. Crime Scene Response and Evidence Collection
Introduction
Upon Arrival
Personal Protective Equipment
Photographic Documentation
Collection of Evidence
Summary
35. The Importance of Report Writing to the Security Operation
Why Report Writing Is Crucial
Situations That May Require Written Reporting
How Information Is Collected
The Importance of Notes
Six Important Points of Report Writing
The Supervisor’s Responsibilities
Testifying
Conclusion
36. Apprehension and Detention Procedures
Scenario 1
Scenario 2
Introduction
Authority
Tactics
Weapons
Emerging Trends
Unit VII. Current Issues in Security
37. Espionage: A Primer
Espionage in History
Espionage in the Twenty-First Century
Sabotage
How Can Espionage Be Conducted?
Social Engineering
Motivations
Security Clearances and Classifications
Trade Secrets
What Can Security Do About Espionage in the Twenty-First Century?
38. Cyber Security
Internet Security Primer
Confidentiality, Integrity, and Availability: The CIA Triad
Authorization and Authentication
Risks, Threats, and Vulnerabilities
Defense in Depth
Ethics and Cyber Security
The Many Faces of Cybercrime
Cybercrime
Advancing Your Cyber Security Career Options
39. Workplace Violence: Prevention, Mitigation, Response, and Recovery
Introduction
The Risk
OSHA
Identify the Risks
Threat Assessment Team
Workplace Violence Prevention Policy
Train to Identify Warning Signs
Education and Training
A Violence-Free Workplace
40. An Overview of Security Risk Management Concepts
Security Risk Management Models
A Generic Security Risk Management Model
Another Perspective: The ARES Model
Benefits of Integrated Risk Management
41. Standards, Guidelines, and Regulation for the Security Industry
ISO—International Organization for Standardization
ANSI—American National Standards Institute
ASIS International
SIA—Security Industry Association
NFPA—National Fire Protection Association
PCI SSC—Payment Card Industry Security Standards Council
Federal Regulation of Private Protective Security Officers
Federal Government Contracts
State Regulation of Private Protective Security Officers
State Regulators
Legal Regulatory Authority
Regulated Private Security Entities/Functions
Security Officer Requirements
Organizational or Company-Level Requirements
Compliance Challenges
International Regulation
Emerging Trends
42. The Relationship Between Corporate Security and Information Technology Professionals
Organizational Characteristics
Leveraging IT for Security Disciplines and Functions
Security IT versus IT Security
Outsourcing
43. International Perspectives on Security in the Twenty-First Century
Introduction—Paul A. Caron
The Transformation of Threats in Today’s Security Professional’s Operating Environment—Paul A. Caron
Anatomy of Terrorism—K.C. Goswami
Civil Considerations/Terrorist Activities—Bruce W. Dobbins
Religious Considerations and Local Governance Issues—Ona Ekhomu
Security Management and Supervision General International Security Concerns—H.D.G.T. Oey
Protection of Assets Managed in Times of Conflict—Bruce W. Dobbins
ANSI/ASIS, PSC1, Aspects on Implementation—Erik D. Erickson
Index
No. of pages: 668
Language: English
Edition: 4
Published: June 9, 2015
Imprint: Butterworth-Heinemann
Paperback ISBN: 9780128001134
eBook ISBN: 9780128004890
SD
Sandi J. Davies
Sandi J Davies has served as the Executive Director of the International Foundation for Protection Officers (IFPO) for more than 25 years. She is the former Chairperson of the Security Services Council for ASIS International, and is currently a member of the Security Services Council and the Women In Security Council of ASIS International. Sandi has edited eight editions of The Professional Protection Officer, as well as all four editions of Security Supervision: Theory and Practice of Asset Protection.
Affiliations and expertise
Executive Director, International Foundation for Protection Officers (IFPO)
BG
Brion P. Gilbride
Affiliations and expertise
CPP, CSSM, CPO; Security manager specializing in intelligence analysis and insider threat
CH
Chris A. Hertig
Affiliations and expertise
CPP, CPOI; author and professor
I
IFPO
The International Foundation for Protection Officers (IFPO), headquartered in Naples, FL, was developed to facilitate the training and certification needs of first-time security officers and supervisors throughout the private and public security industry. It was registered as a nonprofit organization in January 1998, with offices in the United States and Canada. The Foundation works with corporations, colleges and protection professionals to develop professional growth opportunities for students and career security professionals.
IFPO publications include The Protection Officer Training Manual, now in its 7th edition, and Security Supervision and Management: The Theory and Practice of Asset Protection.
Affiliations and expertise
International Foundation for Protection Officers, Naples, FL
Read Security Supervision and Management on ScienceDirect