Private Security Today, 1st edition

  • Frank Schmalleger, 
  • Larry J. Siegel, 
  • Carter F. Smith

Choose the option that's right for you

$9.99 / mo

4-month term, pay monthly or pay $39.96

Enjoy these features

  • Up to 2 devices
  • Discounted tutor access
  • Exclusive offers

$14.99 / mo

4-month term, pay monthly or pay $59.96

Enjoy these features

  • Up to 2 devices
  • Discounted tutor access
  • Exclusive offers

Learn more, spend less

  • Study smarter, not harder

    Save time with study tools in your eTextbook

  • Listen on the go

    Learn how you like with full eTextbook audio

  • Learn anytime, anywhere

    Get the app to access your eTextbook whenever you need it

  • Make it your own

    Your notes. Your highlights. Your eTextbook

  • Find it fast

    Quickly navigate your eTextbook with search


Private Security spans the evolution of security through its present and future. This globally focused overview presents theories in a way that asks you to consider the balance of personal freedoms and public safety. Topics were chosen by student, professional and professor recommendations.

Published by Pearson (July 14th 2021) - Copyright © 2017

ISBN-13: 9780137402106

Subject: Criminal Justice

Category: Security Management

Table of contents

1. Origins and Foundations of Security
The History of Security
Security in European History
Security in North America
Spotlight Allan Pinkerton
Security Today
Defining Security
The Need for Security
Security Professionals
Academic Recognition
Security Careers
The Role of Security
Private Security and Public Space
Private Security and Law Enforcement
Agency Cooperation
Overcoming Obstacles to Cooperation
The Effect of Homeland Security and Emergency Management
Volunteers in Security
Neighborhood Watch
Stand Your Ground
Spotlight Trayvon Martin and George Zimmerman
Challenges in the Security Field
Professional Organizations

2. Theoretical Foundations of Security
Why Do People Commit Crime?
Focus on the Individual
It's a Rational Choice
It's in Your Makeup
It's in Your Mind
It's a Lack of Self-Control
Social Influences
It's the Environment
It is How You Are Raised
Learning View
Control View
Multiple Causes/Multiple Crimes
The Crime Triangle
Controlling People
General Deterrence
Specific Deterrence
Controlling Places
Situational Crime Prevention
Security in Practice Communities Feel Safer with Private Security
Defensible Space
Crime Prevention through Environmental Design
Displacement and Diffusion
Broken Windows Theory
Game Theory
Key Terms
Review Questions
Practical Application

3. Security Administration and Management
The Business of Security
Security Programs: Proprietary versus Contractual
Spotlight What Security Executives Should Know about Ethics
Business Principles
Explaining Ethics
Natural Law
Ethical Theory
Religious Principles
Legal Requirements
Ethical Practice
Ethical Systems
Ethics and Security
Security in Practice Insider Threats
Administrator or Manager
Ethics of the Employees
Ethics of Leadership
Competitive Advantages
Spotlight ACTION: Decision-Making Model -- Raytheon
Ethical Decision Making
Ethics and the Use of Force
Ethical Hiring Practices
The Security Profession
Security Professionalism
Security Leadership
Security Management Issues
Planning and Decision Making
Labor Relations
Financial Management
Change Management
Security Programs in the Organization
Motivation and Management Theories
Security Administration and Management Challenges
Cultural Awareness
Professional Certification
G4S Custom Protection Officer (CPO)
Future Security Firms
Spotlight Security Franchising
Key Terms
Review Questions
Practical Application

4. Legal Aspects, Liability, and Regulation
Security Exercise
Licensing and Professional Standards
Spotlight Private Officer International Helps Craft Security Laws
Legal Foundations of Security Law
Constitutional Law
Bill of Rights
Case Law (Judicial Decisions)
Laws of Arrest
Rights of Accused Persons
Security in Practice Training Requirements in Private Security
Search and Seizure
Statutory Criminal Law
Administrative Law
Agency Relationship
Employment Law
Workers' Compensation
Spotlight Security and Service Animals
Liability Insurance
Sexual Harassment
Civil Law
Careers in Security
Key Terms
Review Questions
Practical Application

5. Understanding, Analyzing, and Managing Risk
Risk Assessment
Determining Risk
Security Exercise
Security Surveys
Spotlight Home Security Survey
An Ongoing Process
Diagram the Location
Cost Effectiveness
Spotlight Security Vulnerability Self-Assessment
Types of Risk
Sources of Risk
The Process of Risk Management
The Cycle of Risk Management
Risk Management Activities
Risk Management Programs
Risk Management Applications
Risk Management Principles
Organizational Risk
Reducing Risk
Steps to Optimal Risk Reduction Strategies
Measuring Effectiveness
Spotlight Managing Risk on Campus
Careers in Security
Key Terms
Review Questions
Practical Application

6. Physical Security
Guiding Principles
Physical Security
Designing the Security System
Labeling the Threat
Ranking the Threat
Protecting against the Threat
Perimeter Security
Access Barriers
Structural Barriers
Safes and Vaults
Mechanical Locks
Lock Picking
Master Keying
Electromagnetic Locks
Electrified Locking Mechanisms
Motion Sensors
Access and Entry Control
Security Lighting
Emergency Lighting
Security Forces
Security Personnel and the Use of Force
Dogs in Support of Security
Proper Use of Security Support Dogs
Use of Force with Security Support Dogs
Video Surveillance Systems
Legal Issues
The Future of Surveillance Systems
Layered Security
Crime Prevention through Environmental Design
Fire Safety
National Fire Incident Reporting System (NFIRS)
Fire Detectors
Fire Extinguishers
Careers in Security
Key Terms
Review Questions
Practical Application

7. Institutional and Workplace Security
Institutional and Facilities Security
Airport Security
Amusement Parks
Banking and Financial Institutions
Chemical Security
Convenience Stores
Correctional Facilities (Private)
Food Service Organizations
Government Buildings
Health Care Industry
Hospitality and Lodging (Hotels and Motels)
Maritime/Port Security
Medical and Legal Marijuana Distributions
Movie Theaters
Retail Complex Security (Mall, Shopping Center, General Retail Security)
Schools and Campuses
Sporting Events and Arenas
Security Exercise
The Nature of Workplace Violence
Types of Workplace Violence
Indicators of Potential for Workplace Violence
Domestic Violence in the Workplace
Active Shooter Situations
The Workplace Violator
Controlling Workplace Violence
Planning for Prevention
Prevention Strategies
Employee Responsibilities
Security in Practice Securing the Olympics
Emerging Forms of Institutional and Workplace Security
Petroleum Manufacturing and Distribution
Pharmaceutical Manufacturing and Distribution
Cruise Ships
Energy Manufacturing and Distribution Sector
Careers in Security
Key Terms
Review Questions
Practical Application

8. Security Investigations and Prosecution
Private versus Public Investigators
Qualifications of Private Investigators
Spotlight Basic Principles for Investigators
The Investigation Process and the Investigative Mind-Set
Conducting Effective Investigations
Criminal Investigations
White-Collar Crimes
Spotlight Sarbanes-Oxley Act
Fraud Investigations
Product Counterfeiting
Noncriminal Investigations
Due Diligence Investigations
Theft of Trade Secrets and Economic Espionage
Interviewing and Interrogating
Spotlight Differences between Interviews and Interrogations
Interview Types
Nonverbal Communication
Listening Skills
Taking Notes
Surveillance Methods
Surveillance Types
Spotlight Ten Tips and Suggestions for Covert Operators
Undercover Operations
Information and Intelligence
Polygraph Examinations and Behavioral Analysis Interviews
Sources and Other Information Resources
Managing Human Sources
Report Writing
Case Management for the Investigator
Bringing the Case to Court
Court Testimony
Direct Examination
Spotlight Courtroom Testimony
Expert Testimony
Professional Certifications for Investigators
Spotlight ASIS Professional Certified Investigator
Networking and Liaison
Careers in Security
Key Terms
Review Questions
Practical Application

9. Retail Security and Loss Prevention
Retail Security, Loss Prevention, and Asset Protection
Goals of Retail Security and Loss Prevention Professionals
Security Exercise
Types of Products Targeted for Theft
Preventing Shoplifting
Spotlight Probable Cause Steps
Shoplifter Identification: Profiling
Profiling Problems
Changing Behavior
Spotlight Credentialing Loss Prevention Professionals
Organized Retail Crime
Spotlight Gate Cutters Organized Retail Crime Group
Combating Organized Retail Crime
Security in Practice Mall Security
Flash Mobs
Employee Theft/Theft from Within
Conspiracies with Outsiders
Preventing Employee Theft
New Loss Prevention
Spotlight LERPnet2.0 - The Law Enforcement Retail Partnership Network
Video Surveillance
Spotlight Facial Recognition is a Game-Changer for Retailers
Emerging Forms of Theft
Accident Prevention
Vandalism, Burglary, and Robbery
Careers in Security
Key Terms
Review Questions
Practical Application

10. Homeland Security and the Terrorism Threat
Defining Homeland Security
The Goals of Homeland Security
Practicing Homeland Security
Private Homeland Security
Private/Public Cooperation
International Homeland Security
United Kingdom
The Threat of Terrorism
Homegrown Violent Extremists
Spotlight Nidal Hasan
Religious Extremism
Spotlight Best Terminology for Describing the Terrorist Threat
Becoming an Extremist
Spotlight Sovereign Citizens
Domestic Terrorists
Spotlight Wolf Packs
Terrorist Activity in the United States
Spotlight Terrorism in Texas
Terrorists and Crime
Terrorism outside the United States
The Islamic State (IS)
Boko Haram
Spotlight Islamic State in Europe
Terrorist Planning and Preparation
Terrorist Motivation
Domestic Terrorism and Law Enforcement
Bombings and Bomb Threats
Fires, Bombs, and Explosive Devices
Spotlight INTERCON Bomb Threat Plan
Countering Terrorism with Private Security
Executive and Protection Services
Assessing the Threat of Terrorism
Careers in Security
Key Terms
Review Questions
Practical Application

11. Emergency Practices and Crisis/Disaster Management
History of Emergency, Crisis, and Disaster Management
Supporting Emergency Management Legislation
Emergency, Crisis, or Disaster Management?
The Effect of Emergency, Crisis, or Disaster Management on Security
Maintaining Partnerships
Emergency Management and National Preparedness
Emergency Response Plans
Public Information and Warning
Media and Public Relations
National Incident Management System
Incident Command System
Business and Operations Continuity
Challenges and Future Considerations for Security Professionals
Careers in Security
Key Terms
Review Questions
Practical Application

12. Critical Infrastructure Security
Critical Infrastructure Defined
Key Resources
Spotlight The New World Trade Center
Threat Analysis
Protecting CIKR
National Infrastructure Protection Plan
The National Response Framework
Information Sharing
Spotlight Critical Infrastructure in Occupied Territory
CIKR Protection at the Federal Level
Interagency Cooperation
Security Exercise
State, Local, and Tribal CIKR Concerns and Responsibilities
Fusion Centers
Protecting CIKR and the Private Sector
Industry Concerns
Public-Private Partnerships for Infrastructure Security
Benefits of Cooperation
Cooperation in Practice
New York Police Department SHIELD
The Law Enforcement and Private Security Organization El Paso
Target & BLUE
Operation Cooperation
The Process of CIKR Protection
Vulnerability Assessment Guidelines
Vulnerability Assessment Tools
Careers in Security
Key Terms
Review Questions
Practical Application

13. Information, Cyber, and Computer Security
Security in Practice Securing Client Networks
Information Security and Cyber/Computer Security
Information Security (INFOSEC)
Spotlight Wikileaks
Information Security Threats and Concerns
Spotlight Facebook
Spotlight Edward Snowden
Cyber/Computer Security
Spotlight Nigerian Scams
Identity theft
How Do They Do It?
Spotlight US Computer Emergency Readiness Team
Spotlight Ransomware
Mobile Security
Mobile Payments
Cloud Computing
The Smart Grid
Mesh Networks
Internet of Things
Human Enhancements
Driverless Vehicles
Here Come the White Hats: Security's Role in Countering Cyberattacks
Elicit Management Commitment
Securing Passwords
Require Firewalls
Encourage a Computer User Baseline
Countering Cyberthreats
Spotlight Cyber Storm
Cyberthreats from Within
Cyberwarfare and Cyberterrorism
Spotlight Anonymous
Cyber Vigilantism
Fighting the Cyberwar
Cyber Caliphate
Spotlight What Can We Do with Cyberspace?
Careers in Security
Key Terms
Review Questions
Practical Application


Your questions answered

Introducing Pearson+. Reimagined learning, designed for you. Choose from one eTextbook or over 1,500 eTextbooks and study tools, all in one place, for one low monthly subscription. A new way to buy books that fits your budget. Make the most of your study time with offline access, enhanced search, notes and flashcards — to get organized, get the work done quicker and get results. Plus, with the app, put textbooks in your pocket and learn wherever. It's time to upgrade the textbook and simplify learning, so you can have time to live too.

Pearson eTextbook is an easy-to-use digital textbook available from Pearson+. Make it your own by adding notes and highlights. Download the Pearson+ mobile app to learn on the go, even offline. Listen on the go with our new audiobook feature, available for most titles.

When you choose a plan, you're signing up for a 4-month 'term'. You can opt to make a one-time payment for the initial 4-month term or pay monthly. If you opt for monthly payments, we will charge your payment method each month until your 4-month term has ended. You can turn on auto-renew in My account at any time to continue your subscription before your 4-month term has ended.

When you purchase a Pearson+ subscription, it will last 4 months. Before your initial 4-month term ends, you can extend your subscription by turning auto-renew on in My account.

If you turn auto-renew on, we’ll automatically renew your subscription and charge you every month until you turn off auto-renew. If you made a one-time payment for your initial 4-month term, you’ll now pay monthly.

To avoid the next payment charge, make sure you turn auto renewal off 1 day before the auto renewal date. You can subscribe again after auto-renew has been turned off by purchasing another Pearson+ subscription. We use your credit card to renew your subscription automatically. To make sure your learning is uninterrupted, please check your card details before your first monthly payment.

With a Multi Pearson+ subscription plan, you can download up to 10 titles on the Pearson+ app from My list on each of your authorized devices every month.

When you're using your Multi Pearson+ subscription plan in a browser, you can select and read from as many titles as you like.