Private Security Today, 1st edition

Published by Pearson (July 14, 2021) © 2017

  • Frank Schmalleger Emeritus, University of North Carolina
  • Larry J. Siegel
  • Carter F. Smith
Products list

eTextbook features

  • Instant access to eTextbook
  • Search, highlight, and notes
  • Create flashcards
Products list

Details

  • A print text

This product is expected to ship within 3-6 business days for US and 5-10 business days for Canadian customers.

1. Origins and Foundations of Security
Introduction
The History of Security
Security in European History
Security in North America
Spotlight Allan Pinkerton
Security Today
Defining Security
The Need for Security
Security Professionals
Academic Recognition
Security Careers
The Role of Security
Private Security and Public Space
Private Security and Law Enforcement
Agency Cooperation
Overcoming Obstacles to Cooperation
The Effect of Homeland Security and Emergency Management
Volunteers in Security
Neighborhood Watch
Stand Your Ground
Spotlight Trayvon Martin and George Zimmerman
Challenges in the Security Field
Professional Organizations
Summary

2. Theoretical Foundations of Security
Introduction
Why Do People Commit Crime?
Focus on the Individual
It's a Rational Choice
It's in Your Makeup
It's in Your Mind
It's a Lack of Self-Control
Social Influences
It's the Environment
It is How You Are Raised
Learning View
Control View
Multiple Causes/Multiple Crimes
The Crime Triangle
Controlling People
General Deterrence
Specific Deterrence
Controlling Places
Situational Crime Prevention
Security in Practice Communities Feel Safer with Private Security
Defensible Space
Crime Prevention through Environmental Design
Displacement and Diffusion
Diffusion
Broken Windows Theory
Game Theory
Summary
Key Terms
Review Questions
Practical Application

3. Security Administration and Management
Introduction
The Business of Security
Security Programs: Proprietary versus Contractual
Spotlight What Security Executives Should Know about Ethics
Business Principles
Ethics
Explaining Ethics
Natural Law
Ethical Theory
Religious Principles
Legal Requirements
Ethical Practice
Ethical Systems
Ethics and Security
Security in Practice Insider Threats
Administrator or Manager
Ethics of the Employees
Ethics of Leadership
Competitive Advantages
Spotlight ACTION: Decision-Making Model -- Raytheon
Ethical Decision Making
Ethics and the Use of Force
Ethical Hiring Practices
The Security Profession
Security Professionalism
Security Leadership
Security Management Issues
Planning and Decision Making
Labor Relations
Financial Management
Change Management
Security Programs in the Organization
Motivation and Management Theories
Security Administration and Management Challenges
Demographics
Globalization
Cultural Awareness
Professional Certification
G4S Custom Protection Officer (CPO)
Future Security Firms
Spotlight Security Franchising
Summary
Key Terms
Review Questions
Practical Application

4. Legal Aspects, Liability, and Regulation
Introduction
Security Exercise
Licensing and Professional Standards
Spotlight Private Officer International Helps Craft Security Laws
Legal Foundations of Security Law
Constitutional Law
Bill of Rights
Case Law (Judicial Decisions)
Laws of Arrest
Confession/Admission
Detention
Interrogation
Rights of Accused Persons
Security in Practice Training Requirements in Private Security
Search and Seizure
Statutory Criminal Law
Administrative Law
Agency Relationship
Employment Law
Strikes
Workers' Compensation
Hiring
Spotlight Security and Service Animals
Liability Insurance
Sexual Harassment
Civil Law
Careers in Security
Summary
Key Terms
Review Questions
Practical Application

5. Understanding, Analyzing, and Managing Risk
Introduction
Risk
Risk Assessment
Determining Risk
Security Exercise
Security Surveys
Spotlight Home Security Survey
An Ongoing Process
Diagram the Location
Cost Effectiveness
Spotlight Security Vulnerability Self-Assessment
Types of Risk
Sources of Risk
The Process of Risk Management
The Cycle of Risk Management
Risk Management Activities
Risk Management Programs
Risk Management Applications
Risk Management Principles
Organizational Risk
Reducing Risk
Steps to Optimal Risk Reduction Strategies
Measuring Effectiveness
Spotlight Managing Risk on Campus
Careers in Security
Summary
Key Terms
Review Questions
Practical Application

6. Physical Security
Introduction
Guiding Principles
Physical Security
Designing the Security System
Labeling the Threat
Ranking the Threat
Protecting against the Threat
Perimeter Security
Access Barriers
Structural Barriers
Fences
Gates
Safes and Vaults
Locks
Mechanical Locks
Lock Picking
Master Keying
Electromagnetic Locks
Electrified Locking Mechanisms
Motion Sensors
Access and Entry Control
Biometrics
Security Lighting
Emergency Lighting
Security Forces
Security Personnel and the Use of Force
Dogs in Support of Security
Proper Use of Security Support Dogs
Use of Force with Security Support Dogs
Video Surveillance Systems
Legal Issues
The Future of Surveillance Systems
Layered Security
Crime Prevention through Environmental Design
Fire Safety
National Fire Incident Reporting System (NFIRS)
Fire Detectors
Fire Extinguishers
Careers in Security
Summary
Key Terms
Review Questions
Practical Application

7. Institutional and Workplace Security
Introduction
Institutional and Facilities Security
Airport Security
Amusement Parks
Banking and Financial Institutions
Chemical Security
Convenience Stores
Correctional Facilities (Private)
Food Service Organizations
Government Buildings
Health Care Industry
Hospitality and Lodging (Hotels and Motels)
Maritime/Port Security
Medical and Legal Marijuana Distributions
Movie Theaters
Museums
Retail Complex Security (Mall, Shopping Center, General Retail Security)
Schools and Campuses
Sporting Events and Arenas
Security Exercise
The Nature of Workplace Violence
Types of Workplace Violence
Indicators of Potential for Workplace Violence
Domestic Violence in the Workplace
Active Shooter Situations
The Workplace Violator
Controlling Workplace Violence
Planning for Prevention
Prevention Strategies
Employee Responsibilities
Security in Practice Securing the Olympics
Emerging Forms of Institutional and Workplace Security
Petroleum Manufacturing and Distribution
Pharmaceutical Manufacturing and Distribution
Cruise Ships
Energy Manufacturing and Distribution Sector
Careers in Security
Summary
Key Terms
Review Questions
Practical Application

8. Security Investigations and Prosecution
Introduction
Private versus Public Investigators
Qualifications of Private Investigators
Spotlight Basic Principles for Investigators
The Investigation Process and the Investigative Mind-Set
Conducting Effective Investigations
Criminal Investigations
White-Collar Crimes
Spotlight Sarbanes-Oxley Act
Fraud Investigations
Product Counterfeiting
Noncriminal Investigations
Due Diligence Investigations
Accidents
Theft of Trade Secrets and Economic Espionage
Interviewing and Interrogating
Spotlight Differences between Interviews and Interrogations
Interview Types
Nonverbal Communication
Listening Skills
Taking Notes
Surveillance
Surveillance Methods
Surveillance Types
Spotlight Ten Tips and Suggestions for Covert Operators
Undercover Operations
Information and Intelligence
Polygraph Examinations and Behavioral Analysis Interviews
Sources and Other Information Resources
Managing Human Sources
Report Writing
Case Management for the Investigator
Bringing the Case to Court
Depositions
Discovery
Court Testimony
Direct Examination
Cross-Examination
Spotlight Courtroom Testimony
Expert Testimony
Professional Certifications for Investigators
Spotlight ASIS Professional Certified Investigator
Networking and Liaison
Careers in Security
Summary
Key Terms
Review Questions
Practical Application

9. Retail Security and Loss Prevention
Introduction
Retail Security, Loss Prevention, and Asset Protection
Goals of Retail Security and Loss Prevention Professionals
Shrinkage
Shoplifting
Security Exercise
Types of Products Targeted for Theft
Preventing Shoplifting
Spotlight Probable Cause Steps
Shoplifter Identification: Profiling
Profiling Problems
Changing Behavior
Spotlight Credentialing Loss Prevention Professionals
Organized Retail Crime
Spotlight Gate Cutters Organized Retail Crime Group
Combating Organized Retail Crime
Security in Practice Mall Security
Flash Mobs
Employee Theft/Theft from Within
Motivations
Conspiracies with Outsiders
Preventing Employee Theft
New Loss Prevention
Technology
Spotlight LERPnet2.0 - The Law Enforcement Retail Partnership Network
Video Surveillance
Spotlight Facial Recognition is a Game-Changer for Retailers
Emerging Forms of Theft
Accident Prevention
Vandalism, Burglary, and Robbery
Vandalism
Burglary
Robbery
Careers in Security
Summary
Key Terms
Review Questions
Practical Application

10. Homeland Security and the Terrorism Threat
Introduction
Defining Homeland Security
The Goals of Homeland Security
Practicing Homeland Security
Private Homeland Security
Private/Public Cooperation
International Homeland Security
United Kingdom
France
Israel
Russia
Canada
The Threat of Terrorism
Homegrown Violent Extremists
Extremism
Spotlight Nidal Hasan
Religious Extremism
Spotlight Best Terminology for Describing the Terrorist Threat
Becoming an Extremist
Spotlight Sovereign Citizens
Domestic Terrorists
Spotlight Wolf Packs
Terrorist Activity in the United States
Spotlight Terrorism in Texas
Terrorists and Crime
Terrorism outside the United States
The Islamic State (IS)
Boko Haram
Spotlight Islamic State in Europe
Al-Shabaab
Terrorist Planning and Preparation
Terrorist Motivation
Domestic Terrorism and Law Enforcement
Bombings and Bomb Threats
Fires, Bombs, and Explosive Devices
Spotlight INTERCON Bomb Threat Plan
Countering Terrorism with Private Security
Executive and Protection Services
Assessing the Threat of Terrorism
Careers in Security
Summary
Key Terms
Review Questions
Practical Application

11. Emergency Practices and Crisis/Disaster Management
Introduction
History of Emergency, Crisis, and Disaster Management
Supporting Emergency Management Legislation
Emergency, Crisis, or Disaster Management?
Emergencies
Crisis
Disaster
The Effect of Emergency, Crisis, or Disaster Management on Security
Maintaining Partnerships
Emergency Management and National Preparedness
Prevention
Protection
Mitigation
Response
Recovery
Planning
Emergency Response Plans
Public Information and Warning
Media and Public Relations
National Incident Management System
Incident Command System
Business and Operations Continuity
Challenges and Future Considerations for Security Professionals
Careers in Security
Summary
Key Terms
Review Questions
Practical Application

12. Critical Infrastructure Security
Introduction
Critical Infrastructure Defined
Key Resources
Spotlight The New World Trade Center
Threat Analysis
Protecting CIKR
National Infrastructure Protection Plan
The National Response Framework
Information Sharing
Spotlight Critical Infrastructure in Occupied Territory
CIKR Protection at the Federal Level
Interagency Cooperation
Security Exercise
State, Local, and Tribal CIKR Concerns and Responsibilities
Fusion Centers
Protecting CIKR and the Private Sector
Industry Concerns
Public-Private Partnerships for Infrastructure Security
Benefits of Cooperation
Cooperation in Practice
New York Police Department SHIELD
The Law Enforcement and Private Security Organization El Paso
Target & BLUE
Operation Cooperation
InfraGard
The Process of CIKR Protection
Vulnerability Assessment Guidelines
Vulnerability Assessment Tools
Careers in Security
Summary
Key Terms
Review Questions
Practical Application

13. Information, Cyber, and Computer Security
Introduction
Security in Practice Securing Client Networks
Information Security and Cyber/Computer Security
Information Security (INFOSEC)
Spotlight Wikileaks
Information Security Threats and Concerns
Spotlight Facebook
Spotlight Edward Snowden
Cyber/Computer Security
Cybercrimes
Spotlight Nigerian Scams
Identity theft
Cybercriminals
How Do They Do It?
Spotlight US Computer Emergency Readiness Team
Spotlight Ransomware
Mobile Security
Mobile Payments
Cloud Computing
The Smart Grid
Mesh Networks
Internet of Things
Human Enhancements
Driverless Vehicles
Here Come the White Hats: Security's Role in Countering Cyberattacks
Elicit Management Commitment
Securing Passwords
Require Firewalls
Encourage a Computer User Baseline
Countering Cyberthreats
Spotlight Cyber Storm
Cyberthreats from Within
Cyberwarfare and Cyberterrorism
Cyberterrorism
Spotlight Anonymous
Cyber Vigilantism
Fighting the Cyberwar
Cyber Caliphate
Spotlight What Can We Do with Cyberspace?
Careers in Security
Summary
Key Terms
Review Questions
Practical Application

Endnotes
Glossary
Index

This publication contains markup to enable structural navigation and compatibility with assistive technologies. Images in the publication MAY NOT be fully described, which is a barrier to those who rely on alternative text descriptions. The publication supports text reflow and contains no content hazards known to cause adverse physical reactions.

Need help? Get in touch