Security Operations Management

Security Operations Management

4th Edition - December 8, 2021

Write a review

  • Authors: Robert McCrie, Seungmug Lee
  • eBook ISBN: 9780128223727
  • Paperback ISBN: 9780128223710

Purchase options

Purchase options
DRM-free (PDF, EPub)
In Stock
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order


Security Operations Management, Fourth Edition, the latest release in this seminal reference on corporate security management operations for today’s security management professionals and students, explores the characteristics of today’s globalized workplaces, security’s key role within them, and what the greatest concern is for security practitioners and senior managers. Incorporating the latest security research and best practices, the book covers key skills needed by security managers to demonstrate the value of their security program, offers information on identifying and managing risk, and reviews the latest technological advances in security control, command, communications and computing.

Key Features

  • Includes myriad global cases and examples of both the business and technical aspects of security
  • Offers valuable coverage of cybercrime and workplace violence
  • Explores the latest technological advances in security control, command, communications, and computing, along with current techniques for how prospective security personnel are vetted, including via social media
  • Prepares security professionals for certification exams


Security Management upper level undergraduate and graduate students, and Security Directors and Managers. Business professionals at all levels responsible for security operations and risk management in their firm

Table of Contents

  • Cover image
  • Title page
  • Table of Contents
  • Copyright
  • Acknowledgments
  • Part I. General Managerial Fundamentals and Competencies
  • 1. Security Operations in the Management Environment
  • Organizations and Managers
  • What Is an Organization?
  • Who Is a Manager or Director?
  • What Is Security and Who Is a Security Manager?
  • What Is the Purpose of an Executive?
  • What Is the Strategy of Management?
  • Characteristics of Modern Organizations
  • Organizations and Security
  • Summary
  • Discussion and Review
  • 2. Core Competencies to Create Effective Protection Programs
  • Core Competencies of Security Operations
  • A Brief History of a Growing Field
  • How Contemporary Security Services Have Evolved
  • What Drives Security Operations?
  • Laws That Affect Growth of Security Service
  • 9/11 and Its Consequences
  • Other Legal Measures Affecting Security
  • The Role of Unions in Security Operations
  • The Growth of the Modern Protective Industry
  • Security Services
  • Security Services and Products as a Global Business
  • How Security Executives Rank Priorities
  • Specific Concerns for Different Industries
  • Summary
  • Discussion and Review
  • 3. Decisions on Hiring to Meet Protective Goals
  • Personnel Planning
  • Job Descriptions
  • Negligent Hiring Litigation
  • The Vetting Process
  • Recruiting
  • The Polygraph
  • Preemployment Testing
  • Testing the Tests
  • Finding Applicable Test Instruments
  • Job-Related Skills Testing
  • The Challenge of Work Opportunity Tax Credit (WOTC)
  • Fitness for Work
  • Reviewing the File
  • The Final Employment Interview
  • Assessing the Candidates
  • Preemployment Drug Screening
  • Marijuana and the Workplace
  • General Medical Fitness
  • The Final Offer of Employment
  • Summary
  • Discussion and Review
  • 4. Training and Development for High Performance
  • Why Train Anyhow?
  • The Training Manager
  • Planning Training and Development Requirements
  • That Critical Phase of Orientation
  • Training for New Security Employees
  • Security Training in Europe
  • Training Techniques
  • Using Audiovisual (AV) Materials and PowerPoint
  • Advanced Training for Cybersecurity
  • The Criticality of Firearms Training
  • Continuing Training, Education, and Development
  • A Challenge for Security Training: De-escalating Violence
  • Emergency and Fire Prevention Training
  • Security Training Desirable for Nonsecurity Personnel
  • Training for Trainers and Supervisors
  • Development and Education for Managers and Executives
  • Measuring Effectiveness
  • Summary
  • Discussions and Review
  • 5. Supporting and Motivating Supervisors and Staff
  • Supporting Supervisors and Staff
  • Who Counts as a Supervisor?
  • Safety at Work: The Responsibility of Supervisors
  • Why Be a Supervisor, Anyway?
  • Why Some People Are Not Cut Out to Be Supervisors
  • Duties of Employees to Supervisors and the Workplace
  • Motivating Supervisors and Staff
  • Time Management for Supervisors and Managers
  • Time Analysis Management
  • Delegate Everything Delegable
  • Using Technology for Greater Efficiency
  • Clean Desk or Messy?
  • Motivation Matters
  • The Complexity of Motivation
  • The Hawthorne Investigations
  • The Hierarchy of Human Needs
  • Motivational-Hygiene Factors
  • Money as a Motivator
  • Manipulated Self-Motivation: The Pygmalion Effect
  • The Limitations of Motivation Research
  • What’s Wrong with Praising Worker Performance?
  • Summary
  • Discussion and Review
  • Part II. Special Issues in Security Management
  • 6. Appraising and Promoting People in Security Programs
  • The Difficulties of Performance Appraisal
  • Who Should Be Appraised and When?
  • Appraisal for All Levels and by All Levels
  • What Types of Evaluation Do Workers Prefer?
  • What Needs to Be Evaluated and How?
  • Using a Formal Appraisal Document
  • Job Performance Rating: Creating the Documentation
  • The Need for Appraisal Documentation and Its Protection
  • Other Written Appraisal Techniques
  • The Appraisal Interview
  • Assessing Performance Among Different Employment Levels
  • Reviewing Management Strategy
  • Examples of MBO in Security Applications
  • Critical Incident Review
  • Problem-Solving Ability
  • Field Review
  • Performance Reviews for Senior Management
  • The Limitations of Appraisals
  • Evaluating Workers When They Work at Home
  • The Promotion Process
  • Why Promotions Are Important
  • Summary
  • Discussion and Review
  • 7. Discipline and Discharge
  • Why Some Employees Fail to Achieve Desired Standards
  • The Psychological Basis of Noncompliance
  • Why Some Supervisors Do Not Discipline Well
  • Human Relations–Oriented Managers
  • Progressive Discipline to Save Ineffective Workers
  • Why Employees Are Disciplined
  • Legal Issues for Wrongful Discharge
  • Special Defenses Against Discharge
  • Workplace Bullying and Disruptive Behavior Prevention
  • Using Employee Assistance Programs for Aiding Workers
  • T.I.M.E. Is Not on Your Side
  • Summary
  • Discussion and Review
  • 8. Accounting Controls and Budgeting
  • Financial Controls in the Organization
  • The Evolution of Financial Controls
  • Consolidated Balance Sheets
  • Notes to the Consolidated Balance Sheet and Statement of Operations
  • Statement from the Independent Auditor
  • The Significance of Change in Auditors
  • The Securities and Exchange Commission
  • Manipulation of Financial Statements
  • Not-for-Profit (NFP) Organizations
  • Budgeting for a Security Department
  • The Process of Budget Creation
  • The Goals of the Corporation: Profits
  • Payback Method
  • Initial Investment Rate of Return Method
  • Time-Adjusted Rate of Return Method
  • Other Managerial Options If a Proposal Is Rejected by Senior Management
  • When Senior Management Seeks to Cut the Security Budget
  • Security as a Profit Center
  • Forensic Safeguards to Internal Fraud
  • Generally Accepted Accounting Principles
  • Fraud, Embezzlement, and Security
  • Separating Tasks: A Powerful Tool Against Fraud
  • Summary
  • Discussion and Review
  • 9. Operating Personnel-Intensive Programs
  • The Proprietary/Contract Employee Debate
  • Combined Proprietary and Contract Staffs
  • Core Expectations of Security Officers
  • Other Important Expectations
  • Nonexpectations of Security Officers
  • Peace Officer Use and Training Standards
  • Hiring Current Police Officers on an Off-Duty Basis
  • Searching for Investigators to Find Facts
  • Private Investigations to Enhance Law Enforcement
  • The Importance of Investigations in IT Crimes
  • Nonexpectations of Investigators
  • Trends in Proprietary and Contract Security
  • Proprietary Security Strategy
  • Contract Security Services
  • Insurance for Security Services
  • Selecting Contract Security Services
  • Determining Final Costs
  • The Delicate Relationship to Achieve a Successful Contract
  • Continuous Supervision
  • Retaining Services of Private Investigators and Consultants
  • Contracting for Alarm Monitoring Services
  • Purchasing Security Services Through Internet Proposals
  • Summary
  • Discussion and Review
  • 10. Operating Physical Security- and Technology-Centered Programs
  • Situational Crime Prevention: A Strategy of Crime Reduction
  • The Risk-Versus-Cost Ratio
  • Dealing With Managers Who Oppose Security Programs
  • Why Physical Security Is Important
  • Selecting Security Countermeasures to Reduce Loss
  • Facility Design: Location, Area, and Architecture
  • Animals
  • Barriers
  • Security Glazing
  • Signs
  • Locks, Keys, and Containers
  • Lighting Systems and the Need for Power Backup
  • Internet Protocol/Closed-Circuit Television
  • Intrusion Detection Systems
  • Access Control Systems
  • Alarm Systems
  • Robotic Systems
  • Drones for Security Use
  • Communications and Intelligence
  • Information Security Systems
  • Contraband Detection
  • Fire Detection and Life Safety
  • Designing Security Systems
  • Summary
  • Discussion and Review
  • 11. Global Leadership for Optimal Security Operations
  • Learning About Leadership
  • Leadership and Power
  • Leadership Traits of the Marines
  • The Importance of Discretion, Especially in Security Management
  • The Problems With Leadership
  • What Is Distinctive About Leadership for Security Operations?
  • Critical Leadership Issues for Security Operations Managers
  • 1. Cyber/Communications Security: Internet/Intranet Security
  • 2. Active Shooter or Active Assault/Assailant Threats
  • 3. Workplace Violence Prevention/Response
  • 4. Business Continuity Planning/Organizational Resilience
  • 5. Cyber/Communications Security: Mobile Technology
  • 6. Employee Selection/Screening/Rescreening (Including Insider Threats)
  • 7. Crisis Management and Response: Natural Disasters
  • 8. Property Crime: External Theft/Vandalism
  • 9. Litigation: Inadequate Security
  • 10. Crisis Management and Response: Domestic Terrorism/Lone Wolf Attacks
  • Other Significant Management Concerns
  • Terrorism: Implications for Security Management
  • Responding to a Pandemic, Covid-19: Fast Action for a Global Crisis
  • General Employee Theft: Losses From Within
  • Unethical Business Conduct: Propriety in Practice
  • Identity Theft: A Global Surge
  • Sexual Harassment/Equal Employment Opportunity (EEOC) Concerns: A Sensitive Risk of the Times
  • Fraud/White-Collar Crime: Perversion of Truth
  • Business Espionage/Theft of Trade Secrets: An Overlooked Risk
  • Litigation: Negligent Hiring in a Contentious Era
  • Kidnapping/Extortion: Grand Drama Within the Workplace
  • Organized Crime: The Sinister Side of Commerce
  • Future Directions of Security Operations
  • Summary
  • Discussion and Review
  • Appendix A. Contact Information for Security Organizations
  • Appendix B. Code of Ethics of ASIS International
  • Appendix C. The MBA Oath
  • Appendix D. Selected Security Standards
  • Appendix E. Example of Academic Curricula in Security Management
  • Glossary
  • Index

Product details

  • No. of pages: 504
  • Language: English
  • Copyright: © Butterworth-Heinemann 2022
  • Published: December 8, 2021
  • Imprint: Butterworth-Heinemann
  • eBook ISBN: 9780128223727
  • Paperback ISBN: 9780128223710

About the Authors

Robert McCrie

Since 1970, Robert McCrie has written, edited, researched, taught, and consulted broadly in issues related to security management (protection of assets from loss) and criminal justice. He edits Security Letter and was founding editor-in-chief of Security Journal, a research journal, and now is editor emeritus.

He has been associated with John Jay College since the 1970’s. He joined the faculty in 1985, moving up the ranks to full professor and serving as chair of one of the largest departments, Law, Police Science and Criminal Justice Administration from 1997-2003. He later helped found his current department.

Affiliations and Expertise

Professor, John Jay University, New York, NY, USA

Seungmug Lee

SEUNGMUG LEE, PH.D. Associate Professor The University of Texas at Arlington Department of Criminology and Criminal Justice University Hall, Room 362 Arlington, TX 76019-0595. He was awarded as the CoLA faculty research endowment grant with the title “Women burglars” in 2018.

Affiliations and Expertise

The University of Texas, Arlington Department of Criminology and Criminal Justice University Hall, Arlington, TX, USA

Ratings and Reviews

Write a review

Latest reviews

(Total rating for all reviews)

  • Jon D. Sun Jun 19 2022

    Awesome book

    A very concise book which explains all the concepts relating to security operations management.