You are previewing Security Operations Management, 2nd Edition.
O'Reilly logo
Security Operations Management, 2nd Edition

Book Description

The second edition of Security Operations Management continues as the seminal reference on corporate security management operations. Revised and updated, topics covered in depth include: access control, selling the security budget upgrades to senior management, the evolution of security standards since 9/11, designing buildings to be safer from terrorism, improving relations between the public and private sectors, enhancing security measures during acute emergencies, and, finally, the increased security issues surrounding the threats of terrorism and cybercrime. An ideal reference for the professional, as well as a valuable teaching tool for the security student, the book includes discussion questions and a glossary of common security terms. Additionally, a brand new appendix contains contact information for academic, trade, and professional security organizations.

* Fresh coverage of both the business and technical sides of security for the current corporate environment
* Strategies for outsourcing security services and systems
* Brand new appendix with contact information for trade, professional, and academic security organizations

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Preface
  5. Acknowledgments
  6. Table of Contents
  7. Part I: General Fundamentals and Competencies
    1. Chapter 1: Security Operations in the Management Environment
      1. Organizations and Managers
      2. A Point About Titles
      3. What is The Purpose of An Executive?
      4. What is The Strategy of Management?
      5. The Characteristics of Modern Organizations
      6. How Organizations are Structured
      7. Government Security Operations
      8. Layers of Management
      9. Security in the Organizational Hierarchy
      10. Structure of a Complex Security Department
      11. Ethics and Security Operations
      12. Summary
      13. Discussion and Review
      14. Endnotes
      15. Additional References
    2. Chapter 2: Core Competencies to Initiate Effective Protection Programs
      1. Core Competencies of Security Operations
      2. How Contemporary Security Services Have Evolved
      3. What Drives Security Operations?
      4. A Brief History of a Growing Field
      5. The Growth of the Modern Protective Industry
      6. How Security Executives Rank Priorities
      7. Specific Concerns for Different Industries
      8. Summary
      9. Discussion and Review
      10. Endnotes
      11. Additional References
    3. Chapter 3: Staffing to Meet Protective Goals
      1. Personnel Planning
      2. References
      3. Job Descriptions
      4. Negligent Hiring Litigation
      5. The Vetting Process
      6. Summary
      7. Discussion and Review
      8. Endnotes
      9. Additional References
    4. Chapter 4: Training and Development for High Performance
      1. Why Train, Anyhow?
      2. The Training Manager or Officer
      3. Planning Training and Development Requirements
      4. The Orientation
      5. Training Techniques
      6. Firearms Training
      7. Ongoing In-Service Training
      8. Security Training for Nonsecurity Personnel
      9. Training for Trainers and Supervisors
      10. Development and Education for Managers and Executives
      11. Measuring Effectiveness
      12. Summary
      13. Discussion and Review
      14. Endnotes
      15. Additional References
    5. Chapter 5: Supporting and Motivating Supervisors and Staff
      1. Supporting Supervisors and Staff
      2. Safety at Work: the Responsibility of Supervisors
      3. Why be a Supervisor, Anyway?
      4. Duties of Employees to Supervisors and the Workplace
      5. Motivating Supervisors and Staff
      6. Time Management for Supervisors and Managers
      7. The Complexity of Motivation
      8. The Limitations of Motivation Research
      9. Summary
      10. Discussion and Review
      11. Endnotes
      12. Additional References
    6. Chapter 6: Appraising and Promoting People in Security Programs
      1. The Difficulties of Performance Appraisal
      2. Who Should Be Appraised and When?
      3. Appraisal for All Levels and By All Levels
      4. What Types of Evaluation Do Workers Prefer?
      5. What Needs to Be Evaluated?
      6. Using a Formal Appraisal Document
      7. Job Performance Rating
      8. The Need for Appraisal Documentation
      9. Other Written Appraisal Techniques
      10. The Appraisal Interview
      11. Assessing Performance Among Different Employment Levels
      12. Reviewing Management Strategy
      13. Performance Reviews for Senior Management
      14. The Limitations of Appraisals
      15. The Promotion Process
      16. What’S Wrong with Promotion?
      17. Why Promotions are Important
      18. Summary
      19. Discussion and Review
      20. Endnotes
      21. Additional References
  8. Part II: Special Issues in Security Management
    1. Chapter 7: Discipline and Discharge
      1. Why Some Employees Fail to Achieve Desired Standards
      2. The Psychological Basis of Noncompliance
      3. Why Some Supervisors do not Discipline Well
      4. Human Relations–Oriented Managers
      5. Progressive Discipline to Save Weak Workers
      6. Why Employees are Disciplined
      7. Legal Issues for Wrongful Discharge
      8. Special Defenses Against Discharge
      9. Legal Cases of Proper and Improper Discharges
      10. Insurance Against Wrongful Termination
      11. Procedures at the Time of Dismissal
      12. The Exit Interview
      13. Dismissal and the Disgruntled Employee
      14. T.I.M.E. is not on Your Side
      15. Summary
      16. Discussion and Review
      17. Endnotes
      18. Additional References
    2. Chapter 8: Accounting Controls and Budgeting
      1. Financial Controls in the Organization
      2. Budgeting for a Security Department
      3. The Goals of the Corporation: Profits
      4. Budget Downfalls
      5. Security As a Profit Center
      6. Forensic Safeguards to Internal Fraud
      7. Summary
      8. Discussion and Review
      9. Endnotes
      10. Additional References
    3. Chapter 9: Operating Personnel-Intensive Programs
      1. The Proprietary/Contract Employee Debate
      2. Core Expectations of Security Officers
      3. Proprietary Security Strategy
      4. Contract Security Services
      5. Selecting Contract Security Services
      6. Large, Complex Security Programs
      7. Retaining Services of Private Investigators and Consultants
      8. Contracting for Alarm Monitoring Services
      9. Purchasing Security Services Through
      10. Internet Proposals
      11. Summary
      12. Discussion and Review
      13. Endnotes
      14. Additional References
    4. Chapter 10: Operating Physical- and Technology-Centered Programs
      1. Situational Crime Prevention: a Philosophy of Crime Reduction
      2. The Risk Versus Cost Ratio
      3. Why Physical Security is Important
      4. Selecting Security Countermeasures to Reduce Loss
      5. Designing Security Systems
      6. Summary
      7. Discussion and Review
      8. Endnotes
      9. Additional References
    5. Chapter 11: Leadership for Optimal Security Operations
      1. Learning About Leadership
      2. What is Distinctive About Leadership for Security Operations?
      3. Critical Leadership Issues for Security Operations Managers
      4. The Future Direction of Security Operations
      5. Discussion and Review
      6. Endnotes
      7. Additional References
  9. Appendix A: Contact Information for Security Organizations
    1. Academic, Trade, and Professional Associations
    2. Federal Contacts
  10. Appendix B: Code of Ethics of the American Society for Industrial Security
    1. Preamble
    2. Code of Ethics
    3. Article I
    4. Article Ii
    5. Article Iii
    6. Article Iv
    7. Article V
    8. Article Vi
    9. Censure, Suspension, and Expulsion
  11. Appendix C: Report of the Task Force on Private Security
    1. Introduction
  12. Glossary
  13. Index
  14. Instructions for online access