NCJ Number
192919
Date Published
2002
Length
287 pages
Annotation
This book examines the nature, scope, and history of security systems, the essential elements of security, types of security organizations, regulation and professionalism, the impact of economic and social globalization, and the future of security management.
Abstract
This book presents management strategies for loss prevention and an overview of the security field. It identifies over 20 security environments, applications, and services, and examines issues encountered within these areas. The findings of the 1997 American Society of Industrial Security (ASIS)/Webster University Education Symposium are included in the book, as well as the proceedings of the 1998 and 1999 ASIS Academic/Practitioner Symposiums. In addition, references are made to the topics outlined in the 1998 ASIS recommendations for introduction to security topics for business students. The book is divided into 10 chapters. Chapter 1 gives an introduction to security management. The issues addressed in this chapter include: the nature, scope, and history of security systems; the essential elements of security, types of security organizations; regulation and professionalism; the impact of economic and social globalization; and the future of security management. Chapter 2 examines criminal and non-criminal threats to individuals and organizations, which include human error, fire, natural and environmental disasters, liability, substance abuse, civil disorder, and crime. Chapter 3 looks at the legal issues related to security management. This chapter includes information on various types of law: tort law, contract law, administrative law, property law, employment law, and criminal law. Chapter 4 reviews the process of risk management, security planning, and program administration. The concept of risk, the types of risk, and risk management techniques are also discussed in this chapter. Chapters 5, 6, and 7 examine the security management triad: physical, personnel, and information security. Chapter 8 focuses on investigations, criminal, and business intelligence operations and reporting. In chapters 9 and 10, 20 security environments, applications, and services in a specific setting are examined. These settings include airline and airport security, banking and financial institution security, computer security, contract services, courthouse and courtroom security, disaster recovery, educational institution security, entertainment security, executive protection, government security, healthcare security, and hospitality security. Appendices, references and index