Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Handbook of Loss Prevention and Crime Prevention -  Lawrence J. Fennelly

Handbook of Loss Prevention and Crime Prevention (eBook)

eBook Download: PDF
2003 | 4. Auflage
608 Seiten
Elsevier Science (Verlag)
978-0-08-049521-7 (ISBN)
Systemvoraussetzungen
88,79 inkl. MwSt
(CHF 86,75)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

The Handbook of Loss Prevention and Crime Prevention, Fourth Edition, is the most comprehensive reference of its kind, covering the latest information on every topic from community-oriented policing to physical security, workplace violence, CCTV, information security, homeland security, and a host of specialty areas.

The handbook shows how to prevent or minimize corporate losses, including security breaches, theft, and lack of resources due to natural or man-made disaster. This revised volume brings together the expertise of more than forty security and crime prevention experts who provide practical information and advice. Each chapter provides a wealth of information that can be put to use immediately.

This is a must-have reference for security managers, security students, and all levels of security professionals.

* Covers every important topic in the field, including the latest on high-tech security systems, homeland security, and many specialty areas
* Brings together the expertise of more than 40 security and crime prevention experts
* Each chapter provides a wealth of practical information that can be put to use immediately

Lawrence J. Fennelly is an internationally recognized authority on crime prevention, security planning and analysis, and on the study of how environmental factors (CPTED), physical hardware, alarms, lighting, site design, management practices, litigation consultants, security policies and procedures, and guard management contribute to criminal victimization.

Mr. Fennelly was previously employed with Apollo Security, Computershare, Inc., as well as a sergeant at Harvard College, employed by the Harvard University Police Department in Cambridge, Massachusetts. He was trained as a crime prevention specialist and served in this capacity for over 21 years at Harvard. He was also the department's training officer and assistant court officer. As part of his role as an officer at Harvard, Larry also was a deputy sheriff in both Suffolk and Middlesex counties (Massachusetts).

Mr. Fennelly is a frequent speaker and lecturer on CPTED, physical security, school crime, and other issues. He serves as an expert witness who works closely with attorneys in defense as well as plaintiff cases, assisting in case preparation, offering knowledgeable questions to ask the opposing side, etc. He has also done a considerable amount of consultant work throughout the United States. His experience ranges from identifying vulnerabilities to conducting security and lighting surveys, working with architects to design and implement security, and developing long range guard training programs and risk assessments of various facilities.

He is also a prolific author. His titles include such well-known security books as 'Crime Prevention Through Environmental Design,' 'Effective Physical Security,' and 'Handbook of Loss Prevention and Crime Prevention.'


The Handbook of Loss Prevention and Crime Prevention, Fourth Edition, is the most comprehensive reference of its kind, covering the latest information on every topic from community-oriented policing to physical security, workplace violence, CCTV, information security, homeland security, and a host of specialty areas. The handbook shows how to prevent or minimize corporate losses, including security breaches, theft, and lack of resources due to natural or man-made disaster. This revised volume brings together the expertise of more than forty security and crime prevention experts who provide practical information and advice. Each chapter provides a wealth of information that can be put to use immediately. This is a must-have reference for security managers, security students, and all levels of security professionals. - Covers every important topic in the field, including the latest on high-tech security systems, homeland security, and many specialty areas- Brings together the expertise of more than 40 security and crime prevention experts- Each chapter provides a wealth of practical information that can be put to use immediately

Cover 1
Copyright Page 5
Contents 8
Contributing Authors 14
Preface 16
PART ONE: INTRODUCTION 18
Chapter 1. Risk Assessment and Management 20
PART TWO: LOSS PREVENTION AND CRIME PREVENTION METHODS 24
Chapter 2. Designing Security with the Architects 26
Designing Security with the Architects 26
Designing Security and Layout of Site 27
Building SiteSecurity and Contractors 27
Ironmongery 29
Closed Circuit TV Checklist 30
Card Access ControlChecklist 30
Storage Rooms, Safes, and Vaults Checklist 31
Exterior Lighting Checklist 31
CrimePrevention Awareness Points 32
Appendix 2.A. Model Residential and Commercial BuildingSecurity Ordinance 32
Appendix 2.B. Standards 34
Chapter 3. Security Surveys 36
The Best Time to Conduct the Survey 37
Classification of Survey Recommendations 37
DevelopingSecurity Points 37
Nine Points of Security Concern 38
Personality of the Complex 39
Positive andNegative Aspects of Making Recommendations 39
Crime Analysis 39
Key Control 40
Closed CircuitTelevision 40
Intrusion Alarms 40
Lighting and Security 41
Security SurveyFollow-Up 41
Residential Security 41
Alarms 43
Appendix 3.A. Site Survey and Risk Assessment 46
Appendix 3.B. Physical Security Survey 48
Appendix 3.C. Plant Security Checklist 52
Appendix 3.D.Guard Security Checklist 54
Appendix 3.E. Office Security Checklist 55
Appendix 3.F. Home SecurityChecklist 56
Appendix 3.G. Fire Safety Inspection 58
Chapter 4. Internal Theft Controls 61
Introduction 61
What Is Honesty? 61
The Dishonest Employee 62
Management Responsibility in Loss 64
Program for Internal Security 65
Procedural Controls 67
When Controls Fail 73
Case Study 74
Summary 75
Chapter 5. Executive Protection 76
Rise of Terrorism in the United States 76
Formulating a Protection Plan 77
Threat Assessment 77
Planning 77
Home and Office Survey 77
Procedural Vulnerability 78
Physical Vulnerability 78
Protection in Transit 79
Everyday Security Awareness 80
If an Abduction Occurs 81
Chapter 6. Awareness 83
Awareness and Knowledge Strategies 83
Neighborhood Watch Guidelines 84
How to AvoidBecoming the Victim of an Attacker 85
Safety Checklist for Apartments 86
Robbery Prevention„Tips for Small Business 87
Burglary Prevention„Tips for Small Business 88
Suspicious Situations toReport 90
Vehicle Theft„a Big Problem 90
Safety Skills for Children 92
Street Smarts„How toProtect Oneself 94
The Con Artist 95
Crime Prevention Tips for Senior Citizens 96
Protection fromTelemarketing Fraud 97
Crime Prevention Tips at ATMs 97
Chapter 7. Crime Prevention through Environmental Design Strategies and Applications 99
Crime Prevention through Environmental Design Strategies 99
CPTED Applications 100
Objectives for the Commercial Environment 100
Downtown Streets and Pedestrian Areas.Parking Lots and Structures 101
Office and Industrial Systems 112
Hallways and Restrooms 115
Malls and Shopping Centers 117
Convenience Stores 121
Branch Banks 126
Objectives forthe Residential Environment 127
Objectives for the School Environment 137
Convention Centers andStadiums 147
PART THREE: SECURITY OPERATIONS AND EQUIPMENT 150
Chapter 8. Approaches to Physical Security 152
Levels of Physical Security 152
The Psychology of Maximum Security 155
The Value of Planning 155
Physical Barriers 159
The Security Plan 161
Conclusion 163
Chapter 9. Physical Barriers 165
Doors 165
Roofs 172
Floors 174
Fences 175
Walls and Moats 178
Chapter 10. The Use of Locks in Physical Crime Prevention 182
Lock Terminology and Components 182
Key-Operated Mechanisms 182
Combination Locks 190
Lock Bodies 192
Door Lock Types 193
Strikes 199
Attacks and Countermeasures 200
Locks and the SystemsApproach to Security 210
Key Control 210
A New Standard Set for Exit Devices, Locks, and Alarms 211
Appendix 10.A. Key Control and Lock Security Checklist 212
Appendix 10.B. Terms and Definitionsfor Door and Window Security 213
Chapter 11. Safes, Vaults, and Accessories 224
Choose the Right Container 224
UL-Rated Combination Locks 225
Relocking Devices 225
Locking Dials 226
Lockable Handles 227
Time Locks 227
Time-Delay Combination Locks 227
Alarmed Combination Locks 228
Vision-Restricting and Shielded Dials 228
Combination Changing 228
Safe Burglaries 229
OvercomingSafe-Opening Problems 231
Appendix 11.A. Rating Files, Safes, and Vaults 232
Chapter 12. Security Lighting 235
Illumination 235
Lamps 236
Twenty-Five Things You Need to Know about Lighting 237
Energy Management 238
Lighting Checklist 238
Protective Lighting Checklist 239
Chapter 13. Alarms: Intrusion Detection Systems 240
Components of Alarm Systems 240
Application 247
Alarm Control 247
Alarm Transmission/Signaling 248
Alarms Deter Crime 249
False Alarms 249
Alarm Equipment Overhaul 250
Additional Resources 250
Conclusion 251
Appendix 13.A. Smoke Detectors 251
Chapter 14. CCTV Surveillance 253
Protection of Assets: An Overview 253
History 254
Role of CCTV in Asset Protection 255
CCTV asPart of the Emergency and Disaster Plan 256
Emergency Shutdown and Restoration 257
SecurityInvestigations 258
Safety 258
The Security Officer’s Role 258
Training and Education of Employees 258
Synergythrough Integration 259
CCTV’s Role and Applications 260
Problems Solved by CCTV 261
Choice of Overt orCovert CCT 261
Security Surveillance Applications 261
Safety Applications 262
CCTV Access Control 262
TheBottom Line 262
Appendix 14.A. Glossary 264
Appendix 14.B. Designing Effective CCTV Systems 267
Chapter 15. Guard Service in the Twenty-First Century 270
Liabilities Connected with Guard Force 270
Power and Authority of the Security Guard 271
Training 271
Report Writing 271
Weapons Safety 272
Safety 273
Safety Checklist 273
Bomb Threats 274
Bomb Search 274
Fire Protection 275
Fire Prevention 275
Emergency Medical Assistance 276
Reporting a Medical Case 277
Guard Supervision 277
Conclusion 282
Chapter 16. Bomb and Physical Security Planning 283
Bombs 283
Bomb Threats 283
Why Prepare? 284
How to Prepare 284
Security against Bomb Incidents 284
Responding to Bomb Threats 286
Decision Time 286
Evacuation 287
Search Teams 287
Search Technique 287
When a Suspicious Object Is Located 289
Handling the News Media 289
Summary 289
Appendix 16.A.Suspect Package Alert 290
Appendix 16.B. Bomb Threat Checklist 291
Appendix 16.C. Mail Handlers andSuspicious Mail Procedures 292
PART FOUR: SECURITY AND CRIME PREVENTION APPLICATIONS 294
Chapter 17. Cargo Security: Intermoda/Logistics„The Complete Overview 296
Prevention Plan 297
Pilferage 298
Theft 298
Organized Crime 300
Cargo Package and Movement Controls 301
Trucking Operations 301
Appendix 17.A. Cargo Security Checklist 315
Appendix 17.B. PersonnelSecurity Checklist 320
Appendix 17.C. Physical Security Checklist 323
Appendix 17.D. InspectionReport Forms 324
Appendix 17.E. Documentation 326
Appendix 17.F. The Role of Private Security 328
Chapter 18. Lodging (Hotel/Motel) Security 329
Security Department Structure 329
Size of the Department 330
Reporting Level in the Organization 331
Role of Security 332
Training 334
Theft 336
Opportunities and Trends 339
Legal Issues 342
The Future ofLodging Security 346
Chapter 19. Retail Security: Lessons Learned from Convenience Store Research 347
New Challenges 347
Increase in Crime 347
The Research 349
Research Underway 354
The RecommendedProgram 354
Conclusions 355
Chapter 20. Putting an Extra EYE/IŽon CCTV: Managing Risk in Retail 358
Old Tech to New Tech 358
Rationale for Technology 358
Definition of Interactive 358
How InteractiveMonitoring Reduces Risk 359
How to Evaluate the Service Provider 359
Why Isn’t This Everywhere:Cost versus Availability? 360
How ICCTV Works 360
CCTV versus ICCTV 361
Chapter 21. Perspectives on Safe School Administration 362
Emphasize Crime and Deviance Prevention during Teacher Education 363
Maintain a Sense ofOwnership in School Grounds and the Surrounding Neighborhood 363
Conduct Periodic RiskAssessments or Security Surveys 363
Clearly State Rules and Regulations 363
Conduct a Crime andDeviance Analysis 363
Develop an Incident Mapping System 363
Utilize Parent Volunteers asMonitors and Student Aides 363
Institute After-School Programs 364
Security Considerations ShouldBe Incorporated from the Ground Up.Ž 364
Establish In-Class Communication between Teachersand Administration 364
Institute a Safety and Security Committee 364
Value the Contributions ofCustodial Personnel 364
Train Personnel in Graffiti Interpretation 364
Schools Need Central OfficeSupport 364
Value Aesthetics 365
Foster Students’ Beliefs They Are Connected to the School 365
DoNot Use Student Monitors 365
The Combustible EngineŽ Model of School Communities 365
Createa Crisis Management Plan 365
Train Personnel in Conflict Resolution 365
Implement CharacterEducation Curricula 366
Create Law-Related Education Modules to Be Incorporated in SocialStudies Courses 366
Establish Communities within Schools.Ž 366
Avoid Peer-Group Counseling 366
Instill an Awareness of the Dangers of Terrorism 366
Chapter 22. Campus Security and Crime Prevention 367
Communication 367
Key Elements in a Campus Crime Prevention Program 367
Commitment 368
Cycle of Activity 368
Specific Programs 369
The Campus Security Act of 1990 370
Neighborhood Watch on the the College Campus 371
Phones on Campus 372
Thefts in the Library 372
Bicycle Theft Prevention 372
Administration Office Security Programs 372
Operation Identification 372
Intrusion Alarms 373
Conclusion 373
Chapter 23. Hospitals and the Health-Care Security Environment 374
Categories of Health Care 374
Types of Hospitals 375
The Foundation of Health-Care Security: Risks 375
Basic Health-Care Security Risk and Areas of Vulnerability 375
Chapter 24. Library Security 379
Risk Assessment Terminology 380
Identifying Risks 380
Assessing Likelihood 381
Assessing Consequences 381
Qualifying Risks 382
Managing the Risk 382
The Scope of Security Problems in 383
Security Risk Management Strategies 384
Dealing with Specific Threats 385
Conclusion 386
Security Management Resources 386
Chapter 25. High-Rise Security and Fire Life Safety 387
High-Rise Assets 387
Threats to Security and Fire Life Safety 387
Security of Modern High-Rise 389
Fire Safety of Modern High-Rise Buildings 390
Summary 392
Chapter 26. Multiresidential Security 393
Apartments 394
Condominiums 394
Levels of Security 395
Personnel 395
Physical Security and Hardware 398
Procedures 400
The Elderly 401
Some Special Areas of Vulnerability 401
Disasters 402
Legislation 402
Basic Steps to Remember in Multiresidential Security 403
Chapter 27. Workplace Violence: Anticipation through Process, Not Prediction of Results Revisited 404
Causes and Avoidance of Claims of Inadequate Security 405
Job Applicant 406
Narrowing the Focus of the Workplace Violator Profile 406
Case Studies in Workplace Violence 407
OrganizationalDynamics 409
The TeamŽ Concept and Shared Expectations as an Approach to WorkplaceMotivation 409
Why Dont Subordinates Do What They Are Supposed to Do?Ž 410
Steps to Reducethe Opportunity for Workplace Violence 410
The Predatory Prevention Matrix 410
Process versusOutput, or the Difference between High CrimeŽ and High Profit.Ž 411
Uses of the PredatoryPrevention Matrix 412
An Apartment Case Study 414
The Magic Chair 416
Defense against WorkplaceViolence: Possible or Probable? 416
Chapter 28. Domestic Violence: Everyone’s Problem 419
What Is It 419
Who Are the Victims 420
Why Abusers Abuse 420
What We Do Know 420
Law EnforcementResponse 421
Options for Protection 422
Government Involvement 423
Conclusion 423
Chapter 29. Personal Safety and Self-Defense 424
Introduction 424
Violent Crimes 424
Self-Defense 426
Chapter 30. Designing Crime Risk Management Systems 427
Understanding Crime Risk Management 427
Who Is the Client? 428
The Client-PractitionerRelationship 429
Crime Pattern Analysis 429
Conducting the Security Survey 430
Determination ofProbable Maximum Loss 431
Making Recommendations to Clients 433
Conclusion 434
Chapter 31. Planning, Management, and Evaluation 435
The Concepts Defined 435
Statistical Information: The Backbone for Design of a PreventionProgram 437
Crime Statistics 437
Demographic Data 440
Efficiency Analysis: Measuring Activity 441
Effectiveness Analysis: Measuring Program Impact 442
Attitudinal Analysis: Gathering Opinionson the Program Impact 443
A Strategy to Facilitate Implementation of the Evaluation 444
Chapter 32. Financial Institution Security 448
The Bank Protection Act of 1968 448
The Role of the Security Department 450
Current RisksAffecting Financial Institutions 450
Criminal Reporting 454
Bank Security Devices 455
Security Trainingin Financial Institutions 456
Other Federal Regulations with an Impact on Banking 457
Critical Issuesin Financial Institution Security 458
Chapter 33. Automatic Teller Machines (ATMs) 459
Responsibility of an ATM Owner 459
Case Study from Ann Arbor Police Department: LawEnforcement and ATM Safety 459
Ann Arbor, Michigan’s Guidelines for Automatic Teller Machines User Safety 460
Appendix 33.A.ATM Safety Tips 462
Appendix 33.B.ATM SafetyChecklist 463
Chapter 34. Telecommunications Fraud 464
How Does It Happen? 464
How to Find Out 464
How to Reduce Vulnerability 465
How to Stop It 465
Chapter 35. Electronic Surveillance and Wiretapping 466
Countermeasures 467
Economic Espionage Act of 1996 468
Chapter 36. Safety Websites 470
Introduction 470
Safety Websites 470
Chapter 37. Homeland Security 471
Gov. Ridge Announces Homeland Security Advisory System 471
National Framework for Federal,State, and Local Governments, Private Industry, and the Public 471
Factors for Assignment ofThreat Conditions. Unified System for Public Announcements 471
A Tool to Combat Terrorism.Homeland Security in 2002 472
HITS and IFPO Computer-Based and Web-Based Security OfficerTraining 472
Final Comments 473
Chapter 38. Security of Information Systems 474
Conclusion 476
Security Organizations 477
Chapter 39. Counterespionage and Information Security Management 478
Reasons for Attacking Computers 478
Methods of Attacking Computer Systems 479
Methods ofDefense 479
Roots of Industrial Espionage 479
Historic Attacks on Computers and Networks 480
RecentLawsuits 480
Covert Action 481
Theft 481
Other Causes of Information Loss 481
Why People StealInformation 482
Types of Attacks 482
Espionage Methods 482
Rogue Use 483
Competitive Intelligence 483
Human Error 483
The WAECUP Human Factors Protocol 484
Human Factor Training Practices 485
Electronic Surveillance and Countermeasures 485
Telecommuting 487
Wireless Mike Dangers: AnExample 488
Computer Passwords 488
Current Security Issues 488
Host-Based Perimeter Defense 489
EMail 490
Local Area Network 491
Radio Links 492
Encryption 492
Investigations 494
Trade Secrets 496
Chapter 40. Emergency Management 498
Crisis, Disaster, Catastrophe„Are You Ready? 498
The Emergency Management Plan Is Only asGood as the Last Drill 500
Chapter 41. The Security Professional, Terrorism, Bio-Terrorism, and the Next Level 504
The Security Professional and Terrorism 504
Terrorism and the Terrorist 505
UnderstandingTerrorism 506
Terrorist Groups and Organizational Structure 507
Mechanism of Violence andAssociated Risk Factors 508
Assessing Threats from Terrorism and Developing EffectiveCountermeasures 508
The Security Manager’s Responsibilities 518
Conclusion 519
Index 521

PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
CHF 36,55
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
CHF 78,15