Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Contemporary Security Management -  John Fay

Contemporary Security Management (eBook)

(Autor)

eBook Download: PDF | EPUB
2010 | 3. Auflage
480 Seiten
Elsevier Science (Verlag)
978-0-12-381951-2 (ISBN)
Systemvoraussetzungen
Systemvoraussetzungen
41,99 inkl. MwSt
(CHF 40,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Contemporary Security Management, Third Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: - how to organize, plan, develop and manage a security operation. - how to identify vulnerabilities. - how to determine the protective resources required to offset threats. - how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management. - Comprehensive introduction to security and IT security management principles - Discussion of both public and private sector roles, as well as the increasingly common privatizing of government functions - New experience-based exercises to sharpen security management and strategic skills and reinforce the content of each chapter

Mr. Fay was a special agent of the U.S. Army Criminal Investigation Division (CID) and later the Director of the National Crime Prevention Institute at the University of Louisville. He has held security management positions in the petroleum industry while teaching at the university level. He holds the Master of Business Administration degree from the University of Hawaii, and is a well-known and respected author of many books, including Butterworth's Security Dictionary: Terms and Concepts, Drug Testing, Encyclopedia of Security Management: Techniques and Technology, and Model Security Policies, Plans, and Procedures, all by Butterworth-Heinemann.Was a special agent of the U.S. Army Criminal Investigation Division (CID) and later the Director of the National Crime Prevention Institute. Former manager of security for British Petroleum's operations in the Gulf of Mexico. He was previously an adjunct professor at the University of North Florida and the University of Houston.
Contemporary Security Management, Third Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management:- how to organize, plan, develop and manage a security operation. - how to identify vulnerabilities. - how to determine the protective resources required to offset threats. - how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management. - Comprehensive introduction to security and IT security management principles- Discussion of both public and private sector roles, as well as the increasingly common privatizing of government functions- New experience-based exercises to sharpen security management and strategic skills and reinforce the content of each chapter

Front Cover 1
Contemporary Security Management 4
Copyright 5
Table of Contents 6
About the Author 18
About the Contributor 18
Chapter 1. Historical Roots 20
Introduction 20
The Industrial Revolution 20
Scientific Management 22
Operations Research 23
Project Management 23
Age of Technology 25
Human Relations 26
Business Today 27
Security Industry 28
Review Questions 32
References 32
Chapter 2. Organizing 34
Introduction 34
Staffing 34
Independent Contractors and Consultants 41
Practices 42
Establishing Objectives 43
Organizing Consistent with Policies 45
Organizing Outside of the Security Group 46
Terminating Unacceptable Employees 49
Organizational Structures 52
Review Questions 55
References 55
Chapter 3. Managing People 56
Introduction 56
Maslow’s Theory 56
Maslow in the Security Environment 58
People Development 59
Performance Appraisal 62
Performance Appraisal Cycle 65
Upward Feedback 68
Position Evaluation 72
Review Questions 74
References 74
Chapter 4. Leadership and Management Skills 76
Introduction 76
Leadership in the Management of Security 76
Build a Vision 77
Empowerment 79
Followers 80
Leaders Add Value 81
Competition among Leaders 81
Price of Leadership 82
Leading in the Twenty-First Century 82
Conclusion 84
Review Questions 85
References 85
Chapter 5. Strategy 86
Introduction 86
Business Strategy 86
Core and Support Activities 87
Outsourcing and the Security Group 87
Effect of Strategy on Security Management 90
Technical Knowledge 91
Strategy and Risk 92
Imperatives 92
Strategic Planning 95
Conclusion 100
Review Questions 100
References 100
Chapter 6. Budget Management 102
Introduction 102
Budget Preparation 103
Authorization 103
Execution 104
Audit 104
The Budget Director 105
Zero-Based Budgeting 105
Controlling Costs 109
Overspending 110
Conclusion 115
Review Questions 115
References 115
Chapter 7. Managing Change 116
Introduction 116
Adjusting to Change 119
Technology and Change 121
Politics and Change 122
Change on a Personal Level 124
Review Questions 126
References 127
Chapter 8. Making Decisions 128
Introduction 128
A Decision-Making Strategy 129
Implications for the CSO 132
Conclusion 134
Review Questions 134
References 134
Chapter 9. Managing Risk 136
Introduction 136
Risk Analysis 136
Risk Assessment versus Threat Assessment 142
Self-Assessment 143
Security Review 144
Security Audit 145
Project Review 151
Security Incident Causation Model 154
SICM Standards 156
Management Failures 157
Applying the SICM Technique 157
Conclusions 158
Review Questions 158
References 159
Chapter 10. Managing Guard Operations 160
Introduction 160
Security Officer Selection and Training 160
Needs Assessment 163
Life-Safety Program 165
Proprietary versus Contract Security 167
Assurance 171
Value of Guard Services 172
Conclusions 174
Review Questions 175
References 175
Chapter 11. Managing Physical Security 176
Introduction 176
Types of Protected Assets 176
Safeguards 177
Factors in Selecting Safeguards 177
Concentric Protection 180
Security Lighting 182
Sensors 183
Intrusion Detection Systems 189
Lock and Key Systems 191
Conclusions 196
Review Questions 198
References 198
Chapter 12. Managing Access Control 200
Introduction 200
Employee Badges and Visitor Passes 201
Types of Identification Cards 201
Traffic Control 203
Materials Control 204
Access Control Barriers 205
Biometrics 207
Closed-Circuit Television (CCTV) 208
Intrusion Detection 213
Threat Individuals 214
Conclusions 217
Review Questions 218
References 218
Chapter 13. Managing Investigations 220
Introduction 220
Case Management 220
Private Investigation 222
Investigation Types 223
Physical Evidence 235
Forensics 236
Polygraph Testing 244
The Deposition 246
Discovery 246
Pretrial Preparation 247
Trial Procedures 248
Conclusions 250
Review Questions 251
References 251
Chapter 14. Pre-Employment Screening 252
Introduction 252
Negligent Hiring 253
Employment Application Form 253
Verifying Application Information 254
Employee Release 260
Reference Checks 261
Records of Interest 262
Database Searches 265
Cost Avoidance 265
Fair Credit Reporting Act 265
Freedom of Information Act 267
Privacy Act of 1974 267
The Gramm-Leach Bliley Act 269
Health Insurance Portability and Accountability Act 270
Applicant Testing 270
Review Questions 274
References 274
Chapter 15. Emergency Management 276
Introduction 276
Emergency Management Process 276
Dealing with the Media 283
National Incident Management System (NIMS) 284
Incident Command System (ICS) 285
Bomb Incidents 287
Fire Emergencies 296
Natural Disasters 301
Medical Emergencies 305
Conclusions 309
Review Questions 309
References 309
Chapter 16. Business Continuity 310
Introduction 310
Policy 310
Risk Assessment 312
Thinking Ahead 314
Continuation and Resumption 315
Business Impact Analysis 316
Recovery Program 317
Conclusion 319
Review Questions 319
References 320
Chapter 17. Managing Information Security 322
Introduction 322
Management Intention 323
IT Governance 326
The Importance of Transparency 329
Threat Assessment 332
Estimating Costs of Exposure: Quantitative versus Qualitative Risk Assessment 334
How Management Can Respond to Risk 335
Security Management 337
Intellectual Property 344
Activities to Secure Intellectual Property 345
The Risk of Scale 349
Review Questions 351
References 351
Chapter 18. Substance Abuse 352
Introduction 352
Role of the Chief Security Officer 353
Testing for Illegal Drugs 354
Alcohol Testing 355
Employee Awareness and Cooperation 357
Intervention 359
Investigation 365
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) 366
Review Questions 368
References 368
Chapter 19. Executive Protection 370
Introduction 370
The Protected Persons 371
Program Size, Equipment, and Objectives 372
Protection at the Office and at Home 373
The Threat 373
Adversary Attempts at the Residence or Office 374
Event Protection in the United States 374
Event Protection Overseas 376
Operational Plan 377
Antikidnap Plan 378
Abduction 380
Proof of Life 381
Countermeasures 384
Conclusions 386
Review Questions 386
References 386
Chapter 20. Workplace Violence 388
Introduction 388
Policy 388
Characteristics of Workplace Violence 393
Assessment 396
Readiness 397
Response 398
Intervention 400
Psychological Profiling 401
Liability 402
Conclusion 405
Review Questions 405
References 406
Chapter 21. Employee Awareness Program 408
Introduction 408
Goals 408
Awareness Program 409
The Message 410
Workforce Culture 412
Conclusion 413
Review Questions 414
References 414
Chapter 22. Vulnerability Assessment 416
Introduction 416
The Process 417
Exit Briefing 425
Final Report 425
Management Actions 426
Conclusions 429
Review Questions 429
References 429
Chapter 23. Security Program Design 430
Introduction 430
Three Pillars 431
Training 433
Testing the Design 434
Full-Program Testing 436
Revising 437
Security Program Design and the External Environment 438
Conclusion 439
Review Questions 439
References 439
Chapter 24. Critical Infrastructures and Key Resources 440
Introduction 440
Presidential Directive 440
The Patriot Act 441
Critical Infrastructure and Key Resources 441
Attack Possibilities 442
The World Trade Center as a CIKR 442
Vulnerability 443
Threat Probability 444
The Office of Infrastructure Protection (IP) 445
The National Counterterrorism Center (NCTC) 445
The National Intelligence Program (NIP) 446
Fusion Centers 446
The National Strategy for Information Sharing (NSIP) 447
The National Criminal Intelligence Resource Center (NCIRC) 447
National Infrastructure Advisory Council (NIAC) 447
Federal Bureau of Investigation (FBI) 447
Central Intelligence Agency (CIA) 448
Intelligence Operations 448
Defense Intelligence Agency (DIA) 449
U.S. Coast Guard (USCG) 449
U.S. Secret Service (USSS) 450
Law Enforcement 450
DHS Private Sector Office 451
Conclusions 451
Review Questions 452
References 452
Chapter 25. The Terrorist Threat 454
Introduction 454
Terrorist Groups 454
The Evolution of Terrorism 455
Motives 457
Evaluation 459
Tactics 460
Terrorist Preparation 463
Conclusions 465
Review Questions 465
References 466
Index 468

Erscheint lt. Verlag 8.12.2010
Sprache englisch
Themenwelt Recht / Steuern Allgemeines / Lexika
Sozialwissenschaften Soziologie
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
Wirtschaft Betriebswirtschaft / Management Wirtschaftsinformatik
ISBN-10 0-12-381951-2 / 0123819512
ISBN-13 978-0-12-381951-2 / 9780123819512
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 8,7 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

EPUBEPUB (Adobe DRM)
Größe: 7,3 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Planung und Durchführung von Audits nach ISO 9001:2015

von Gerhard Gietl; Werner Lobinger

eBook Download (2022)
Carl Hanser Verlag GmbH & Co. KG
CHF 68,35
Praxishandbuch betriebswirtschaftlicher Grundlagen für …

von Andreas Frodl

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 48,80