(eBook PDF) Introduction to Security: Operations and Management 5th Editioninstant download
(eBook PDF) Introduction to Security: Operations and Management 5th Editioninstant download
https://ebookluna.com/product/ebook-pdf-introduction-to-
security-operations-and-management-5th-edition/
OR CLICK BUTTON
DOWLOAD EBOOK
https://ebookluna.com/product/original-pdf-introduction-to-operations-and-
supply-chain-management-5th-edition/
https://ebookluna.com/product/ebook-pdf-introduction-to-operations-supply-
chain-management-4th/
https://ebookluna.com/product/ebook-pdf-a-practical-introduction-to-
homeland-security-and-emergency-management-from-home-to-abroad/
https://ebookluna.com/product/ebook-pdf-introduction-to-network-security/
(eBook PDF) Management of Information Security 5th Edition
https://ebookluna.com/product/ebook-pdf-management-of-information-
security-5th-edition/
https://ebookluna.com/product/ebook-pdf-matching-supply-with-demand-an-
introduction-to-operations-management-4th-edition/
(eBook PDF) Operations and Supply Chain Management: The Core 5th Edition
https://ebookluna.com/product/ebook-pdf-operations-and-supply-chain-
management-the-core-5th-edition/
(eBook PDF) Operations and Supply Chain Management: The Core 5th Edition
https://ebookluna.com/product/ebook-pdf-operations-and-supply-chain-
management-the-core-5th-edition-2/
https://ebookluna.com/download/production-and-operations-management-ebook-
pdf/
Brief Contents
Pa r t 1
Introduction: Security’s Role in Society 1
Chapter 1 History and Overview 2
Chapter 2 Threats to Safety and Security 25
Chapter 3 The Legal and Regulatory Environment of the Private Security
Industry 47
Pa r t 2
Security Operations: Essential Functions 71
Chapter 4 Physical Security 72
Chapter 5 Personnel Security 98
Chapter 6 Information Security 118
Pa r t 3
Security Sectors 139
Chapter 7 Institutional Security 140
Chapter 8 Commercial, Office, and Residential Security 167
Chapter 9 Homeland Security 186
Pa r t 4
Security Management 215
Chapter 10 Management, Leadership, and Ethics in Security Organizations 216
Chapter 11 Managing People and Organizations 239
Chapter 12 Risk Assessment, Security Surveys, and Continuity Planning 256
Pa r t 5
Trends and Challenges 275
Chapter 13 Security in an International Perspective 276
Chapter 14 The Future 296
vii
▼
This page intentionally left blank
Contents
Preface xvii
Acknowledgments xx
Pa r t 1
Introduction: Security’s Role in Society 1
Chapter 1 History and Overview 2
Learning Objectives 2
The Context for Security 2
Theoretical Foundations 3
Security: A Brief History 5
Ancient Traditions 5
English Origins 6
The American Experience 7
Security in America: Colonial Origins to WWI 7
Security in the Twentieth Century 10
World War II 11
The Cold War and the National Industrial Security Program 11
Federal Initiatives 13
Post-9-11 Security 15
The Contemporary Security Industry 15
Security Personnel 16
Proprietary Security 16
Contract Security Services 17
Hybrid Security Organizations 18
Determining Security Needs 19
Security’s Impact 20
Security: Essential Functions 20
Roles of the Security Manager 21
Summary 23 • Key Terms and Concepts 23 • Discussion Questions
and Exercises 24 • Your Turn 24
ix
▼
Fire 28
Counterproductive Workplace Behaviors 32
Workplace Violence 32
Crime 33
Nature and Extent of Crime 33
White-Collar Crimes 35
Organized Crime 35
Theories of Crime 36
Crime Prevention 40
Terrorism 40
Civil Unrest 41
Labor Unrest 42
Man-made Disasters 42
Environmental Accidents/Disasters 42
Warfare 43
Natural Disasters 44
Civil Liability 45
Summary 45 • Key Terms and Concepts 46 • Discussion Questions and
Exercises 46 • Your Turn: Assessing Threats to Safety and Security in Your Area 46
Contents x
▼
Pa r t 2
Security Operations: Essential Functions 71
Chapter 4 Physical Security 72
Learning Objectives 72
Introduction 72
Physical Security Systems 72
Levels of Protection 73
Core Elements of Physical Protection Systems 75
Perimeter Security 76
Lighting 77
Fencing and Barriers 78
Sensors 80
Alarm Systems 82
Alarm System Management 83
Building Exteriors and Interiors 85
Access Control 85
Locks 86
Fire Sensors and Alarms 89
Fire Protection Systems 91
Fire Extinguishers and Sprinkler Systems 91
Cameras and Surveillance Systems 92
Guard Forces 94
Summary 96 • Career opportunities 96 • Key Terms and
Concepts 96 • Discussion Questions and Exercises 96 • Your Turn:
Strengthening Physical Security for a Small Business Owner 97
Contents xi
▼
Chapter 6 Information Security 118
Learning Objectives 118
Introduction 118
Information Security 119
Information Security Objectives 119
Designing an Information Security Program 120
Key Components of an Information Security Program 121
Asset Classification and Access Control 121
Policies and Procedures (Operational Goals) 123
Physical Security Controls 124
Human Activities and Information Security Policy 124
Technical/Logical Controls 125
Communications and Operations Management 126
Systems Development and Maintenance 126
Business Continuity Management 127
Compliance 127
Cybersecurity 127
The Nature and Extent of Cybercrime 128
Types of Cybercrimes 128
SCADA-based Attacks 131
Protecting Computer Networks 131
Communications Security 132
Protecting Intellectual Property 133
Summary 136 • Career Opportunities in Information Security 136 • Key Terms
and Concepts 137 • Discussion Questions and Exercises 137 • Your Turn:
Preventing Cyberstalking 138
Pa r t 3
Security Sectors 139
Chapter 7 Institutional Security 140
Learning Objectives 140
Introduction 140
Financial Institution Security 140
ATM Security 143
User Authentication and Financial Institution Security 144
Courthouse and Courtroom Security 145
Educational Institution Security 147
Elementary and Secondary Schools 147
Institutions of Higher Education 150
Types of IHE Security Programs 151
IHE Legislation 152
Health Care Security 153
Extended Care/Nursing Home Security 155
Entertainment Security 155
Theme Parks 155
Mega Events 156
Gaming and Casino Security 158
Contents xii
▼
Museum Security 159
Zoo and Aquarium Security 160
Religious Institutions and Security 162
Summary 164 • Career opportunities 164 • Key Terms and
Concepts 164 • Discussion Questions and Exercises 165 • Your Turn: Analyzing
the Virginia Tech Incident 165
Contents xiii
▼
Pa r t 4
Security Management 215
Chapter 10 Management, Leadership, and Ethics in Security Organizations 216
Learning Objectives 216
Introduction 216
The Need for Effective Administration 217
What is Management? 219
Core Functions of Management 219
Managerial Levels 220
The Evolution of Managerial Thought 221
The Role of Supervision in the Workplace 223
Leadership 223
Leadership Theories 225
Behavioral Assumptions and Leadership Style 227
Ensuring Ethics and Integrity 230
Ethical Dilemmas 232
Unethical Activities 232
Ethical Standards 233
Ethical Leadership 233
The ASIS Code of Ethics 235
Summary 236 • Key Terms and Concepts 237 • Discussion Questions and
Exercises 237 • Careers in Security Management 237 • Your Turn:
Demonstrating Ethical Leadership in the Face of Workplace Theft 238
Chapter 11 Managing People and Organizations 239
Learning Objectives 239
Introduction 239
Personnel Recruitment and Selection 239
Hiring Off-duty Police Officers 240
Negligent Hiring and Retention 241
Employee Development and Training 242
Performance Appraisal 243
Policies and Procedures 244
Scheduling 245
Planning 247
Types of Plans 249
Performance Measures 249
Budgeting 252
Summary 254 • Career Opportunities 254 • Key Terms and
Concepts 255 • Discussion Questions and Exercises 255 •
Your Turn 255
Contents xiv
▼
Identifying Risk 259
Risk Assessment Techniques 261
Security Surveys 262
Conducting the Survey 263
Assigning Risk Levels 264
Quantifying Risk: Examples 265
Risk Management Techniques 267
Continuity and Contingency Planning 269
Contingency Plans 269
Contingency Plans and Emergency Management 270
Summary 272 • Key Terms and Concepts 273 • Discussion Questions and
Exercises 273 • Your Turn: Conducting a Safety and Security Survey 273
Pa r t 5
Trends and Challenges 275
Chapter13 Security in an International Perspective 276
Learning Objectives 276
Introduction 276
The Private Security Industry in Europe 277
The former USSR and Warsaw Pact Countries 277
Yugoslavia and Southern Eastern Europe 277
The European Union 279
The United Kingdom 281
The African Continent and Private Security 283
The Private Security Industry in Central and South America 285
International Issues and Private Security 286
High Seas Piracy 286
Private Military Security Companies (PMSCs) 289
Regulating the International Private Security Industry 291
The Montreux Document 291
The International Code of Conduct 292
The United Nations 292
Summary 294 • Career Opportunities in International Security 295 •
Key Terms and Concepts 295 • Discussion Questions and Exercises 295 •
Your Turn 295
Contents xv
▼
Visit https://testbankfan.com
now to explore a rich
collection of testbank or
solution manual and enjoy
exciting offers!
Growth and Challenges 309
Partnerships 310
Changes in Security-Related Services 311
Changes in Higher Education 312
Summary 312 • Future Career Opportunities 313 • Key Terms and
Concepts 313 • Discussion Questions and Exercises 314 • Your Turn: Assessing
Intercultural Competency 314
Glo s s a r y 315
References 335
Index 369
Contents xvi
▼
P re fa c e
World events including the attacks of September 11, 2001, warfare, man-made and natural
disasters, concern over crime, and security-related legislation have led to individuals,
institutions, and governmental units to discover, re-examine, and explore the practices,
roles, and functions of private security in society and organizations. The fifth edition of
INTRODUCTION TO SECURITY: Operations and Management is the culmination of years
of classroom teaching and practical experiences by the authors that provides readers with
an understanding of the diverse and complex field of private security. It is particularly
designed for two audiences: individuals exploring or seeking careers in private security,
and those who want to gain a better understanding of the practice and field of security and
how it differs from and complements the public sector criminal justice system.
The primary goal of this edition is to provide students and practitioners a detailed descrip-
tion and understanding of the private security industry and its diverse roles and functions in
the twenty-first century. The book is balanced between security and management and leader-
ship principles and practices. As such, it is relatively unique among other security texts,
integrating security and managerial practices into one comprehensive text. Because of its
design and content, it can readily be used in traditional and online undergraduate and gradu-
ate courses related to private security and security management. This text will also serve as a
useful desk reference for security personnel and serve as study guide and aid for professional
certifications, including the ASIS Certified Protection Professional (CPP) examination.
xvii
▼
Chapter 5 presents topics related to personnel security. Information security is the primary
subject of Chapter 6. Following an understanding of security’s role and its fundamental
activities within organizations, Part 3 reviews specific security sectors. Chapter 7 explores
security issues unique to specific institutions. Chapter 8 introduces the reader to security
practices and applications in the context of commercial, office, and residential security,
while Chapter 9 reviews key concepts and issues related to the concept and philosophy of
homeland security. Section 4 explores concepts related to how to lead and manage security
operations in the various security sectors that exist. For example, Chapter 10 reviews basic
concepts related to the effective management and leadership of security organizations.
Chapter 11, meanwhile, examines core human resource activities performed by security
managers and financial management activities related to budgeting. This section concludes
with Chapter 12, which includes information related to risk management: particularly risk
assessment and continuity planning. The last section of this text explores trends and
challenges. Chapter 13 provides the reader with a review of the private security industry in
an international perspective while Chapter 14 explores future trends and issues.
This fifth edition also contains a variety of learning and study aids to assist in enhanc-
ing the reader’s foundational knowledge to ensure that key information, ideas, and
perspectives important to the field of private security, management, and leadership are
mastered. Some of these study aids will also enhance critical, practical, and creative
thinking skills, which are essential attributes needed to manage the twenty-first-century
security organization. For example, each chapter begins with a set of learning objectives
that serve to explain what knowledge a person should be able to exhibit upon completion
of the chapter. Included within the chapters are “Quick Surveys” that serve to apply key
concepts found in the chapter to practical issues and situations, while “Security Spotlights”
are also found throughout the text where readers can further apply and synthesize infor-
mation from the chapter to actual, real-life issues related to security operations and
management. Each chapter also concludes with a list of key terms and exercises and
discussion questions to further ensure mastery of the information found in the chapter.
The text also has a comprehensive glossary that can serve as a ready reference guide for
key security terms and concepts.
▶ Instructor Supplements
Instructor’s Manual with Test Bank. Includes content outlines for classroom discussion,
teaching suggestions, and answers to selected end-of-chapter questions from the text. This
also contains a Word document version of the test bank.
TestGen. This computerized test generation system gives you maximum flexibility in cre-
ating and administering tests on paper, electronically, or online. It provides state-of-the-art
features for viewing and editing test bank questions, dragging a selected question into a
test you are creating, and printing sleek, formatted tests in a variety of layouts. Select test
items from test banks included with TestGen for quick test creation, or write your own
questions from scratch. TestGen’s random generator provides the option to display differ-
ent text or calculated number values each time questions are used.
PowerPoint Presentations. Our presentations are clear and straightforward. Photos, illustra-
tions, charts, and tables from the book are included in the presentations when applicable.
To access supplementary materials online, instructors need to request an instructor access
code. Go to www.pearsonhighered.com/irc, where you can register for an instructor
access code. Within 48 hours after registering, you will receive a confirming email,
including an instructor access code. Once you have received your code, go to the site and
log on for full instructions on downloading the materials you wish to use.
Preface xviii
▼
▶ Alternate Versions
eBooks This text is also available in multiple eBook formats. These are an exciting new choice
for students looking to save money. As an alternative to purchasing the printed textbook,
students can purchase an electronic version of the same content. With an eTextbook, students
can search the text, make notes online, print out reading assignments that incorporate lecture
notes, and bookmark important passages for later review. For more information, visit your
favorite online eBook reseller or visit www.mypearsonstore.com.
Preface xix
▼
A c k n ow l e d g m e n t s
I wish to express my deepest appreciation to the many people who provided support and
assistance during the development of the fifth edition of this textbook. Gratitude is extended
to my colleagues at Pearson including Gary Bauer, Jennifer Sargunar and Nikhil Rakshit,
and to the excellent Aptara team led by Production Project Manager Rakhshinda Chishty
and copy editor Tripti Khurana. Thank you so much for your professionalism, attention to
detail, and dedication. Many thanks are also extended to the following individuals who
shared their expertise in security for this edition: Thomas Ackerman, Director, Institute of
Public Safety (Santa Fe College, Gainesville, Florida), Dan Bohle, Investigator, GVSU
Security, Daniel Carncross, Director of Security (Columbia-Sussex Corporation, East
Lansing Division), MACS (EXW/IDW) Steven J. Dyke, USN, Richard Grossenbacher
(U.S. Secret Service (Ret), and Brian F. Kingshott, Ph.D., FRSA (London). I would also
like to thank Andria Zwerk and Derek Manke for their assistance in the preparation of
the manuscript.
I also appreciate the valuable contributions made by the reviewers of the previous
editions: Jamie A. Latch, Remington College; Patrick Patterson, Remington College;
Charles Green, Remington College; Jerome Randall, University of Central Florida;
Richard Hill, University of Houston-Downtown; Dimitrius A. Oliver, Ph.D., Holly
Dershem-Bruce, Dawson Community College, Glendive, MT; Stephen Jones, University
of Maryland, College Park, MD; Sean Gabbidon, Penn State University, Middletown, PA;
Neal Strehlow, Fox Valley Technical College, Appleton, WI; Donald Jenkins, Central
Community College, Grand Island, NE; Michael Moberly, Southern Illinois University,
Carbondale, IL; Charles Biggs, Oakland City University, Oakland City, IN; Terrance
Hoffman, Nassau Community College, Garden City, NY; and Kevin Peterson, Innovative
Protection Solutions LLC, Herndon, VA; John Bolinger, MacMurray College; Sonya
Brown, Tarrant County College; Janice Duncan, Bauder College; and Bobby Polk,
Metropolitan Community College—Omaha, NE.
Finally, I wish to express my heartfelt gratitude to my family, friends, and colleagues
for their encouragement and patience.
xx
▼
Discovering Diverse Content Through
Random Scribd Documents
Plate III.
W. West imp.
COMPLEX BRANDS.
SMUTS.
COMPLEX SMUTS.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookluna.com