Private Security Today, 1st edition

  • Frank Schmalleger, 
  • Larry J. Siegel, 
  • Carter F. Smith

Your access includes:

  • Search, highlight, and take notes
  • Easily create flashcards
  • Use the app for access anywhere
  • 14-day refund guarantee

$10.99per month

4-month term, pay monthly or pay $43.96

Learn more, spend less

  • Study simpler and faster

    Use flashcards and other study tools in your eTextbook

  • Listen on the go

    Learn how you like with full eTextbook audio

  • Special partners and offers

    Enjoy perks from special partners and offers for students

  • Find it fast

    Quickly navigate your eTextbook with search

  • Stay organized

    Access all your eTextbooks in one place


1. Origins and Foundations of Security
The History of Security
Security in European History
Security in North America
Spotlight Allan Pinkerton
Security Today
Defining Security
The Need for Security
Security Professionals
Academic Recognition
Security Careers
The Role of Security
Private Security and Public Space
Private Security and Law Enforcement
Agency Cooperation
Overcoming Obstacles to Cooperation
The Effect of Homeland Security and Emergency Management
Volunteers in Security
Neighborhood Watch
Stand Your Ground
Spotlight Trayvon Martin and George Zimmerman
Challenges in the Security Field
Professional Organizations

2. Theoretical Foundations of Security
Why Do People Commit Crime?
Focus on the Individual
It's a Rational Choice
It's in Your Makeup
It's in Your Mind
It's a Lack of Self-Control
Social Influences
It's the Environment
It is How You Are Raised
Learning View
Control View
Multiple Causes/Multiple Crimes
The Crime Triangle
Controlling People
General Deterrence
Specific Deterrence
Controlling Places
Situational Crime Prevention
Security in Practice Communities Feel Safer with Private Security
Defensible Space
Crime Prevention through Environmental Design
Displacement and Diffusion
Broken Windows Theory
Game Theory
Key Terms
Review Questions
Practical Application

3. Security Administration and Management
The Business of Security
Security Programs: Proprietary versus Contractual
Spotlight What Security Executives Should Know about Ethics
Business Principles
Explaining Ethics
Natural Law
Ethical Theory
Religious Principles
Legal Requirements
Ethical Practice
Ethical Systems
Ethics and Security
Security in Practice Insider Threats
Administrator or Manager
Ethics of the Employees
Ethics of Leadership
Competitive Advantages
Spotlight ACTION: Decision-Making Model -- Raytheon
Ethical Decision Making
Ethics and the Use of Force
Ethical Hiring Practices
The Security Profession
Security Professionalism
Security Leadership
Security Management Issues
Planning and Decision Making
Labor Relations
Financial Management
Change Management
Security Programs in the Organization
Motivation and Management Theories
Security Administration and Management Challenges
Cultural Awareness
Professional Certification
G4S Custom Protection Officer (CPO)
Future Security Firms
Spotlight Security Franchising
Key Terms
Review Questions
Practical Application

4. Legal Aspects, Liability, and Regulation
Security Exercise
Licensing and Professional Standards
Spotlight Private Officer International Helps Craft Security Laws
Legal Foundations of Security Law
Constitutional Law
Bill of Rights
Case Law (Judicial Decisions)
Laws of Arrest
Rights of Accused Persons
Security in Practice Training Requirements in Private Security
Search and Seizure
Statutory Criminal Law
Administrative Law
Agency Relationship
Employment Law
Workers' Compensation
Spotlight Security and Service Animals
Liability Insurance
Sexual Harassment
Civil Law
Careers in Security
Key Terms
Review Questions
Practical Application

5. Understanding, Analyzing, and Managing Risk
Risk Assessment
Determining Risk
Security Exercise
Security Surveys
Spotlight Home Security Survey
An Ongoing Process
Diagram the Location
Cost Effectiveness
Spotlight Security Vulnerability Self-Assessment
Types of Risk
Sources of Risk
The Process of Risk Management
The Cycle of Risk Management
Risk Management Activities
Risk Management Programs
Risk Management Applications
Risk Management Principles
Organizational Risk
Reducing Risk
Steps to Optimal Risk Reduction Strategies
Measuring Effectiveness
Spotlight Managing Risk on Campus
Careers in Security
Key Terms
Review Questions
Practical Application

6. Physical Security
Guiding Principles
Physical Security
Designing the Security System
Labeling the Threat
Ranking the Threat
Protecting against the Threat
Perimeter Security
Access Barriers
Structural Barriers
Safes and Vaults
Mechanical Locks
Lock Picking
Master Keying
Electromagnetic Locks
Electrified Locking Mechanisms
Motion Sensors
Access and Entry Control
Security Lighting
Emergency Lighting
Security Forces
Security Personnel and the Use of Force
Dogs in Support of Security
Proper Use of Security Support Dogs
Use of Force with Security Support Dogs
Video Surveillance Systems
Legal Issues
The Future of Surveillance Systems
Layered Security
Crime Prevention through Environmental Design
Fire Safety
National Fire Incident Reporting System (NFIRS)
Fire Detectors
Fire Extinguishers
Careers in Security
Key Terms
Review Questions
Practical Application

7. Institutional and Workplace Security
Institutional and Facilities Security
Airport Security
Amusement Parks
Banking and Financial Institutions
Chemical Security
Convenience Stores
Correctional Facilities (Private)
Food Service Organizations
Government Buildings
Health Care Industry
Hospitality and Lodging (Hotels and Motels)
Maritime/Port Security
Medical and Legal Marijuana Distributions
Movie Theaters
Retail Complex Security (Mall, Shopping Center, General Retail Security)
Schools and Campuses
Sporting Events and Arenas
Security Exercise
The Nature of Workplace Violence
Types of Workplace Violence
Indicators of Potential for Workplace Violence
Domestic Violence in the Workplace
Active Shooter Situations
The Workplace Violator
Controlling Workplace Violence
Planning for Prevention
Prevention Strategies
Employee Responsibilities
Security in Practice Securing the Olympics
Emerging Forms of Institutional and Workplace Security
Petroleum Manufacturing and Distribution
Pharmaceutical Manufacturing and Distribution
Cruise Ships
Energy Manufacturing and Distribution Sector
Careers in Security
Key Terms
Review Questions
Practical Application

8. Security Investigations and Prosecution
Private versus Public Investigators
Qualifications of Private Investigators
Spotlight Basic Principles for Investigators
The Investigation Process and the Investigative Mind-Set
Conducting Effective Investigations
Criminal Investigations
White-Collar Crimes
Spotlight Sarbanes-Oxley Act
Fraud Investigations
Product Counterfeiting
Noncriminal Investigations
Due Diligence Investigations
Theft of Trade Secrets and Economic Espionage
Interviewing and Interrogating
Spotlight Differences between Interviews and Interrogations
Interview Types
Nonverbal Communication
Listening Skills
Taking Notes
Surveillance Methods
Surveillance Types
Spotlight Ten Tips and Suggestions for Covert Operators
Undercover Operations
Information and Intelligence
Polygraph Examinations and Behavioral Analysis Interviews
Sources and Other Information Resources
Managing Human Sources
Report Writing
Case Management for the Investigator
Bringing the Case to Court
Court Testimony
Direct Examination
Spotlight Courtroom Testimony
Expert Testimony
Professional Certifications for Investigators
Spotlight ASIS Professional Certified Investigator
Networking and Liaison
Careers in Security
Key Terms
Review Questions
Practical Application

9. Retail Security and Loss Prevention
Retail Security, Loss Prevention, and Asset Protection
Goals of Retail Security and Loss Prevention Professionals
Security Exercise
Types of Products Targeted for Theft
Preventing Shoplifting
Spotlight Probable Cause Steps
Shoplifter Identification: Profiling
Profiling Problems
Changing Behavior
Spotlight Credentialing Loss Prevention Professionals
Organized Retail Crime
Spotlight Gate Cutters Organized Retail Crime Group
Combating Organized Retail Crime
Security in Practice Mall Security
Flash Mobs
Employee Theft/Theft from Within
Conspiracies with Outsiders
Preventing Employee Theft
New Loss Prevention
Spotlight LERPnet2.0 - The Law Enforcement Retail Partnership Network
Video Surveillance
Spotlight Facial Recognition is a Game-Changer for Retailers
Emerging Forms of Theft
Accident Prevention
Vandalism, Burglary, and Robbery
Careers in Security
Key Terms
Review Questions
Practical Application

10. Homeland Security and the Terrorism Threat
Defining Homeland Security
The Goals of Homeland Security
Practicing Homeland Security
Private Homeland Security
Private/Public Cooperation
International Homeland Security
United Kingdom
The Threat of Terrorism
Homegrown Violent Extremists
Spotlight Nidal Hasan
Religious Extremism
Spotlight Best Terminology for Describing the Terrorist Threat
Becoming an Extremist
Spotlight Sovereign Citizens
Domestic Terrorists
Spotlight Wolf Packs
Terrorist Activity in the United States
Spotlight Terrorism in Texas
Terrorists and Crime
Terrorism outside the United States
The Islamic State (IS)
Boko Haram
Spotlight Islamic State in Europe
Terrorist Planning and Preparation
Terrorist Motivation
Domestic Terrorism and Law Enforcement
Bombings and Bomb Threats
Fires, Bombs, and Explosive Devices
Spotlight INTERCON Bomb Threat Plan
Countering Terrorism with Private Security
Executive and Protection Services
Assessing the Threat of Terrorism
Careers in Security
Key Terms
Review Questions
Practical Application

11. Emergency Practices and Crisis/Disaster Management
History of Emergency, Crisis, and Disaster Management
Supporting Emergency Management Legislation
Emergency, Crisis, or Disaster Management?
The Effect of Emergency, Crisis, or Disaster Management on Security
Maintaining Partnerships
Emergency Management and National Preparedness
Emergency Response Plans
Public Information and Warning
Media and Public Relations
National Incident Management System
Incident Command System
Business and Operations Continuity
Challenges and Future Considerations for Security Professionals
Careers in Security
Key Terms
Review Questions
Practical Application

12. Critical Infrastructure Security
Critical Infrastructure Defined
Key Resources
Spotlight The New World Trade Center
Threat Analysis
Protecting CIKR
National Infrastructure Protection Plan
The National Response Framework
Information Sharing
Spotlight Critical Infrastructure in Occupied Territory
CIKR Protection at the Federal Level
Interagency Cooperation
Security Exercise
State, Local, and Tribal CIKR Concerns and Responsibilities
Fusion Centers
Protecting CIKR and the Private Sector
Industry Concerns
Public-Private Partnerships for Infrastructure Security
Benefits of Cooperation
Cooperation in Practice
New York Police Department SHIELD
The Law Enforcement and Private Security Organization El Paso
Target & BLUE
Operation Cooperation
The Process of CIKR Protection
Vulnerability Assessment Guidelines
Vulnerability Assessment Tools
Careers in Security
Key Terms
Review Questions
Practical Application

13. Information, Cyber, and Computer Security
Security in Practice Securing Client Networks
Information Security and Cyber/Computer Security
Information Security (INFOSEC)
Spotlight Wikileaks
Information Security Threats and Concerns
Spotlight Facebook
Spotlight Edward Snowden
Cyber/Computer Security
Spotlight Nigerian Scams
Identity theft
How Do They Do It?
Spotlight US Computer Emergency Readiness Team
Spotlight Ransomware
Mobile Security
Mobile Payments
Cloud Computing
The Smart Grid
Mesh Networks
Internet of Things
Human Enhancements
Driverless Vehicles
Here Come the White Hats: Security's Role in Countering Cyberattacks
Elicit Management Commitment
Securing Passwords
Require Firewalls
Encourage a Computer User Baseline
Countering Cyberthreats
Spotlight Cyber Storm
Cyberthreats from Within
Cyberwarfare and Cyberterrorism
Spotlight Anonymous
Cyber Vigilantism
Fighting the Cyberwar
Cyber Caliphate
Spotlight What Can We Do with Cyberspace?
Careers in Security
Key Terms
Review Questions
Practical Application


Published by Pearson (July 14th 2021) - Copyright © 2017

ISBN-13: 9780137402106

Subject: Criminal Justice

Category: Security Management

Your questions answered

Pearson+ is your one-stop shop, with eTextbooks and study videos designed to help students get better grades in college.

A Pearson eTextbook is an easy‑to‑use digital version of the book. You'll get upgraded study tools, including enhanced search, highlights and notes, flashcards and audio. Plus learn on the go with the Pearson+ app.

Your eTextbook subscription gives you access for 4 months. You can make a one‑time payment for the initial 4‑month term or pay monthly. If you opt for monthly payments, we will charge your payment method each month until your 4‑month term ends. You can turn on auto‑renew in My account at any time to continue your subscription before your 4‑month term ends.

When you purchase an eTextbook subscription, it will last 4 months. You can renew your subscription by selecting Extend subscription on the Manage subscription page in My account before your initial term ends.

If you extend your subscription, we'll automatically charge you every month. If you made a one‑time payment for your initial 4‑month term, you'll now pay monthly. To make sure your learning is uninterrupted, please check your card details.

To avoid the next payment charge, select Cancel subscription on the Manage subscription page in My account before the renewal date. You can subscribe again in the future by purchasing another eTextbook subscription.

Channels is a video platform with thousands of explanations, solutions and practice problems to help you do homework and prep for exams. Videos are personalized to your course, and tutors walk you through solutions. Plus, interactive AI‑powered summaries and a social community help you better understand lessons from class.

Channels is an additional tool to help you with your studies. This means you can use Channels even if your course uses a non‑Pearson textbook.

When you choose a Channels subscription, you're signing up for a 1‑month, 3‑month or 12‑month term and you make an upfront payment for your subscription. By default, these subscriptions auto‑renew at the frequency you select during checkout.

When you purchase a Channels subscription it will last 1 month, 3 months or 12 months, depending on the plan you chose. Your subscription will automatically renew at the end of your term unless you cancel it.

We use your credit card to renew your subscription automatically. To make sure your learning is uninterrupted, please check your card details.