Security Operations Management - 3rd Edition - ISBN: 9780128023969, 9780128026182

Security Operations Management

3rd Edition

Authors: Robert McCrie
eBook ISBN: 9780128026182
Paperback ISBN: 9780128023969
Imprint: Butterworth-Heinemann
Published Date: 2nd October 2015
Page Count: 464
Tax/VAT will be calculated at check-out Price includes VAT (GST)
96.32
64.95
54.99
89.95
Unavailable
Price includes VAT (GST)
× Read this ebook on your PC, Mac, Apple iOS and Andriod mobile devices and eReader

This ebook is protected by Adobe Content Server digital rights management.

For more information on how to use .acsm files please click the Ebook Format Help link.

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

Security Operations Management, 3rd edition, is the latest edition the seminal reference on corporate security management operations for today’s security management professionals and students.

The book explores the characteristics of today’s globalized workplaces, why security has a key role within them, and what the greatest concern are to security practitioners and senior managers. Incorporating the latest security research and best practices, updates to Security Operations Management 3rd edition include explorations of the key skills needed by security managers to demonstrate the value of their security program, greater emphasis on identifying and managing risk, and coverage of the latest technological advances in security control, command, communications, and computing. The third edition also delves more deeply than previous editions into online security training practices, as well as investigates the changing roles of women and minorities in security operations.

Key Features

  • Includes all-new cases and examples—including from outside the U.S.—providing coverage of both the business and technical aspects of security
  • Offers increased coverage of cybercrime and workplace violence
  • Explores the latest technological advances in security control, command, communications, and computing, and current techniques for how prospective security personnel are vetted, including how to use social media
  • Prepares security professionals for professional certification exams

Readership

1) Security Directors and Managers, 2) Business professionals at all levels responsible for security operations and risk management in their firm, 3) Security Management upper level undergraduate and graduate students.

Table of Contents

  • Acknowledgments
  • Part I: General Managerial Fundamentals and Competencies
    • 1: Security Operations in the Management Environment
      • Abstract
      • Organizations and Managers
      • What Is the Purpose of an Executive?
      • What Is the Strategy of Management?
      • Characteristics of Modern Organizations
      • Scientific Management Pioneers
      • Security Management Precedent Setters
      • Organizations and Security
      • Government Security Operations
      • Layers of Management
      • Security in the Organizational Hierarchy
      • Structure of a Complex Security Department
      • Ethics and Security Operations
      • Summary
      • Discussion and Review
    • 2: Core Competencies to Create Effective Protection Programs
      • Abstract
      • Core Competencies of Security Operations
      • A Brief History of a Growing Field
      • How Contemporary Security Services Have Evolved
      • What Drives Security Operations?
      • The Growth of the Modern Protective Industry
      • How Security Executives Rank Priorities
      • Specific Concerns for Different Industries
      • Summary
      • Discussion and Review
    • 3: Staffing to Meet Protective Goals
      • Abstract
      • Personnel Planning
      • Job Descriptions
      • Negligent Hiring Litigation
      • The Vetting Process
      • Summary
      • Discussion and Review
    • 4: Training and Development for High Performance
      • Abstract
      • Why Train Anyhow?
      • The Training Manager
      • Planning Training and Development Requirements
      • That Critical Phase of Orientation
      • Training Content for New Security Employees
      • Training Techniques
      • Ongoing “In-Service” Training
      • The Importance of Reducing Risk in Confrontations
      • Emergency and Fire Prevention Training
      • Security Training for Nonsecurity Personnel
      • Training for Trainers and Supervisors
      • Development and Education for Managers and Executives
      • Measuring Effectiveness
      • Summary
      • Discussion and Review
    • 5: Supporting and Motivating Supervisors and Staff
      • Abstract
      • Supporting Supervisors and Staff
      • Safety at Work: The Responsibility of Supervisors
      • Why Be a Supervisor, Anyway?
      • Why Some People are Not Cut Out to be Supervisors
      • Duties of Employees to Supervisors and the Workplace
      • Motivating Supervisors and Staff
      • Time Management for Supervisors and Managers
      • The Complexity of Motivation
      • The Limitations of Motivation Research
      • Summary
      • Discussion and Review
  • Part II: Special Issues in Security Management Operations
    • 6: Appraising and Promoting People in Security Programs
      • Abstract
      • The Difficulties of Performance Appraisal
      • Who Should Be Appraised and When?
      • Appraisal for All Levels and by All Levels
      • What Types of Evaluation Do Workers Prefer?
      • What Needs to Be Evaluated and How?
      • Using a Formal Appraisal Document
      • Job Performance Rating: Creating the Documentation
      • The Need for Appraisal Documentation and its Protection
      • Other Written Appraisal Techniques
      • The Appraisal Interview
      • Assessing Performance Among Different Employment Levels
      • Reviewing Management Strategy
      • Examples of MBO in Security Applications
      • Performance Reviews for Senior Management
      • The Limitations of Appraisals
      • The Promotion Process
      • What’s Wrong with Promotion?
      • Why Promotions are Important
      • Summary
      • Discussion and Review
    • 7: Discipline and Discharge
      • Abstract
      • Why Some Employees Fail to Achieve Desired Standards
      • The Psychological Basis of Noncompliance
      • Why Some Supervisors Do Not Discipline Well
      • Human Relations–Oriented Managers
      • Progressive Discipline to Save Weak Workers
      • Why Employees Are Disciplined
      • Legal Issues for Wrongful Discharge
      • Special Defenses Against Discharge
      • Legal Cases of Proper and Improper Discharges
      • Insurance Against Wrongful Termination
      • Procedures at the Time of Dismissal
      • The Exit Interview
      • Dismissal and the Disgruntled Employee
      • Workplace Bullying and Disruptive Behavior Prevention
      • Using Employee Assistance Programs for Aiding Workers
      • T.I.M.E. is Not on Your Side
      • Summary
      • Discussion and Review
    • 8: Accounting Controls and Budgeting
      • Abstract
      • Financial Controls in the Organization
      • Budgeting for a Security Department
      • The Goals of the Corporation: Profits
      • When Senior Management Seeks to Cut Security Spending
      • Security as a Profit Center
      • Forensic Safeguards to Internal Fraud
      • Summary
      • Discussion and Review
    • 9: Operating Personnel-Intensive Programs
      • Abstract
      • The Proprietary/Contract Employee Debate
      • Core Expectations of Security Officers
      • Proprietary Security Strategy
      • Contract Security Services
      • Selecting Contract Security Services
      • Retaining Services of Private Investigators and Consultants
      • Contracting for Alarm Monitoring Services
      • Purchasing Security Services Through Internet Proposals
      • Summary
      • Discussion and Review
    • 10: Operating Physical Security- and Technology-Centered Programs
      • Abstract
      • Situational Crime Prevention: A Strategy of Crime Reduction
      • The Risk Versus Cost Ratio
      • Why Physical Security Is Important
      • Selecting Security Countermeasures to Reduce Loss
      • Designing Security Systems
      • Summary
      • Discussion and Review
    • 11: Global Leadership for Optimal Security Operations
      • Abstract
      • Learning About Leadership
      • What Is Distinctive About Leadership for Security Operations?
      • Critical Leadership Issues for Security Operations Managers
      • Other Issues Concerning Security Operations Managers
      • The Future Direction of Security Operations
      • Summary
      • Discussion and Review
  • Appendix A: Contact Information for Security Organizations
  • Appendix B: Code of Ethics of ASIS International
  • Appendix C: The MBA Oath
  • Appendix D: Selected Security Standards
  • Glossary
  • Subject Index

Details

No. of pages:
464
Language:
English
Copyright:
© Butterworth-Heinemann 2016
Published:
Imprint:
Butterworth-Heinemann
eBook ISBN:
9780128026182
Paperback ISBN:
9780128023969

About the Author

Robert McCrie

Since 1970, Robert McCrie has written, edited, researched, taught, and consulted broadly in issues related to security management (protection of assets from loss) and criminal justice. He edits Security Letter and was founding editor-in-chief of Security Journal, a research journal, and now is editor emeritus.

He has been associated with John Jay College since the 1970’s. He joined the faculty in 1985, moving up the ranks to full professor and serving as chair of one of the largest departments, Law, Police Science and Criminal Justice Administration from 1997-2003. He later helped found his current department.

Affiliations and Expertise

Professor, John Jay University, New York, NY, USA