Security Supervision and Management - 4th Edition - ISBN: 9780128001134, 9780128004890

Security Supervision and Management

4th Edition

Theory and Practice of Asset Protection

Editors: Sandi Davies
Authors: IFPO
eBook ISBN: 9780128004890
Paperback ISBN: 9780128001134
Imprint: Butterworth-Heinemann
Published Date: 10th June 2015
Page Count: 668
Tax/VAT will be calculated at check-out Price includes VAT (GST)
74.95
45.99
53.95
Unavailable
Price includes VAT (GST)
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or managerial positions. Covering everything needed from how to work with today’s generation security force employees to the latest advances in the security industry, Security Supervision and Management, Fourth Edition, shows security officers how to become a more efficient and well-rounded security professional. Security Supervision and Management, Fourth Edition, is also the only text needed to prepare for the Certified in Security Supervision and Management (CSSM) designation offered by International Foundation for Protection Officers (IFPO).

 

The IFPO also publishes The Professional Protection Officer: Practical Security Strategies and Emerging Trends, now in its 8th edition.

Key Features

  • Core text for completing the Security Supervision and Management Program/Certified in Security Supervision and Management (CSSM) designation offered by IFPO
  • Contributions from more than 50 experienced security professionals in a single volume
  • Completely updated to reflect the latest procedural and technological changes in the security industry
  • Conforms to ANSI/ASIS standards

Readership

Security officers, supervisors, and managers, whether in-house or contract seeking to obtain the Certified in Security Supervision and Management (CSSM) designation; Students taking Security Management courses

Table of Contents

  • Dedication
  • List of Authors and Contributors
  • Foreword
  • Acknowledgments
  • Introduction
  • Protection Officer Code of Ethics
  • Unit I. Foundations
    • 1. What is Asset Protection?
      • Mission
      • Nature of the Asset Protection Professional
    • 2. Legal Aspects of Security
      • Introduction
      • Historical Perspectives
      • Key Terms and Concepts
      • Arrest and Detention
      • Interrogation
      • Search and Seizure
      • Considerations Regarding the Use of Force
      • Civil Liability
      • Criminal Law and Criminal Liability
      • Trespassing
      • Labor Law, Discipline, and Dismissal
      • Employment-at-Will
      • Discipline
      • Dismissal/Removal
      • Legal Standards Regarding Privacy
      • Employee Background Investigations
      • Trade Secrets
      • Administrative Law
      • Regulations Governing the Security Industry
      • Standards
      • Giving Depositions and Testifying in Legal and Quasi-Legal Proceedings
      • Emerging Trends
    • 3. Theories of Crime and Criminal Behavior and Their Implications for Security
      • The Classical and Neoclassical Schools of Thought
      • The Positivist School of Thought
      • Other Explanations of Criminality
      • Criminological Theories in the Real World
      • Appendix: Quick Reference Theory Matrix
    • 4. Ethics, Integrity, and Professional Conduct
      • Introduction
      • Definition of Ethics
      • Code of Ethics
      • Leadership Commitment for Change
      • A Model for Establishing a Code of Ethics in a Major Private Security Company
      • Training to Make Ethical Decisions
      • Integrity Issues Involving Time or Abuse of Office
      • When Security Becomes the Enemy
      • What Can the Security Professional Do About This?
      • Emerging Trends
      • Surveillance/Video Systems
      • Intelligence Gathering
      • Other Considerations
    • 5. The Theories of Accident Causation
      • Heinrich’s Domino Theory
      • Ferrell’s Human Factor Model
      • Petersen’s Accident/Incident Model
      • Systems Models
      • The Integration of Theories and General Safety Program Implications
      • Emerging Trends
    • 6. An Introduction to the Supply Chain
      • What Is the Supply Chain?
      • Time and Cost versus Impacts
      • Information Is Everything
  • Unit II. Basics of Supervision
    • 7. Supervisory Characteristics and Expectations
      • Contract versus Proprietary
      • The Promotion to Supervisor
      • The Impact of Poor Supervision
      • What Employees Expect from Supervisors
      • Conclusions
    • 8. Company Policy and Procedures: The Security Supervisor’s Primer
      • What Are Policies, and How Do Procedures and Rules Influence Them?
      • Planning
      • Writing Policies
      • Implementing Policies
      • Reviewing/Revising Policies
      • The Security Policy and Procedure Manual
    • 9. Operational Supervision
      • Relative Information of Faults and Attributes for an Operational Supervisor
      • Operational Briefing
      • Challenges: Partnering in a Multi-Service Single Location
      • Conclusion
    • 10. The Supervisor’s Role in Safety
      • Supervising Crisis Situations
      • Safety Committee Meetings
      • Safety Attitude Development: A Culture of Safety
      • Supervising Accident Scenes
      • Enforcement of Safety Regulations
      • Fire Safety Supervisory Functions
      • Summary
      • Emerging Trends
    • 11. The Supervisor’s Role in Improving Customer Service and Tenant Relations
      • The Role of the Supervisor
      • Core Philosophy of Parent or Client Organization
      • The Key Questions
      • The Customer Service Role of Protection Officers
      • The Supervisor’s Role in Tenant Relations
    • 12. Supervising During Special Events
      • Assessment
      • Access Control
      • Communications
      • Traffic Control
      • Emergency Medical Operations
      • Evacuation
      • Fixed Posts
      • Assignment of Security Officer Posts
      • Pre-event Briefings
      • Talking to Crowds
      • Post-Event Briefing
      • Selection
      • Recruitment
      • Applications/Interviews
      • Testing/Vetting
      • Training:
      • Sports Security: An Emerging Aspect of Special Event Protection
      • Emerging Trends
    • 13. Training and Development: A Primer for Protection Professionals
      • Defining Training
      • Benefits of Training
      • Three Domains of Learning
      • Learning over Time
      • Determining Training Needs
      • Initiating Curriculum Design
      • Implement an Instructional Strategy
      • Types of Training
      • Role of Supervisory Personnel in Training
      • Failing to Get It Right
      • Evaluation of Learning
      • Testing for Learning Retention
      • Challenges in Training
      • Finding the Time
      • Training Challenges
      • Emerging Trends
      • Conclusion
  • Unit III
    • Part 1. Human Resource Management
      • 14. Recruitment and Retention of Security Personnel: Understanding and Meeting the Challenge
        • Introduction
        • Recruitment
        • Turnover Costs
        • Retention Strategies
        • Emerging Trends
        • Conclusion
      • 15. Career Development and Professional Growth for Security Professionals
        • The Career Recipe
        • Congratulations, You’re Hired
        • Getting Promoted
        • Moving On
        • Career Killers
        • Emerging Trends
        • Conclusion
      • 16. Orientation for Security Officers
        • Introduction
        • Background Checks/Investigations
        • Pre-orientation
        • Personal Appearance and Uniform Maintenance
        • Within First Week of Arrival
        • Training
        • Before a New Staff Member Arrives
        • First Day of Work
        • Mentoring
        • Report Writing
        • Role of the Security Officer
        • Other Points to Consider
        • Conclusion
      • 17. Time and Stress Management
        • When Is the Best Time for Planning Your Work?
        • Protecting the Master Plan
        • Routine Meetings
        • Politically Charged Meetings
        • Meeting Deadlines
        • Prioritizing Your Work
        • The Demon Phone and Social Media
        • Delegation Skills That Lead to Success
        • Dealing with Stress That Is Not Work Related
        • Handling Fears in Your Professional Life
        • Follow up and Follow through
        • Warning about Praising
        • Conclusion
      • 18. Employee Motivation Theory and Application
        • Part 1: Theory
        • Part 2: Application
        • Summary
      • 19. Supervising Across Generations
        • The Changing Landscape of Work
        • Addressing Intergenerational Dynamics
        • Workplace Characteristics
        • C-Suite Priorities
        • Valuing Diversity
        • Women as Leaders
        • Managing Generations Successfully
        • Emerging Trends
        • Conclusion
      • 20. The Supervisor’s Role in Employee Relations
        • Processing the Complaint
        • The Importance of Documenting
        • Precedents and Privacy
        • Dealing with Unions
        • The End of the Investigation
        • Prevention
        • Potential Legal Issues
        • Conclusion
    • Part 2. Security-Related Business Functions
      • 21. Evaluation of Uniformed Protection Officers
        • Introduction
        • Officer Evaluation
      • 22. Statistical Analysis for Security and Supervision
        • The Collection of Data
        • Metrics and Data Collection
        • Staffing Exercise
        • Analysis of Data
        • Forecasting
        • Inventory Exercise
        • Graphic Presentations
        • Determining Correlations and Causality
        • Conclusion
      • 23. Security Officer Scheduling
        • Define the Mission
        • Gather Information
        • Account for Controlled and Uncontrolled Factors
        • Account for Fatigue
        • Communication
        • Time-Off Requests
        • Contractual Requirements
        • Challenges
        • Conclusion
      • 24. Improving Organizational Performance by Employing Total Quality Management
      • 25. Project Management for the Security Professional: A Position in Transition
        • Project Management: An Overview
        • History
        • Transition to Today’s World
        • Project Management: A Security-Specific Challenge
        • The People Piece
        • Communication
        • Motivation
        • Leadership
        • The Program Piece
        • The System Piece
        • The Business Piece
        • The Wrap
  • Unit IV. Technology in Security
    • 26. Security Technology: A Management Perspective
      • Chapter Learning Objectives
      • Introduction
      • Security, Risk, and Organizational Management Dependencies
      • Security Measures
      • Organizational Culture and Types of Security Technology Measures
      • Closed Circuit Video
      • Electronic Access Control
      • Intrusion Detection Systems
      • Ethical Issues and the Use of Technology
      • Temptations to Abuse Security Technology
      • Management’s Obligation
      • Summary
    • 27. Fire Protection Systems and Special Hazards
      • Overview
      • Principles of Fire Science
      • Building Construction Classification
      • Requirements and Consensus Standards
      • Fundamentals of Fire Protection Systems
      • Other Fire Protection Systems (AFFF, FM220)
      • Hazardous Materials, Explosives, and CBRNE
      • CBRNE
      • Fire Alarm Response
      • Fire Investigation and Documentation
      • Conclusion
    • 28. Identity Documentation and Verification
      • The Breeder Document
      • The Social Security Card
      • The Driver’s License
      • The Passport
      • Refugee/Asylee Travel Documents
      • Green Card Residency Permits
      • Immigrant and Nonimmigrant Visas
      • Transportation Worker Identification Credential
      • What Companies Do to Address Identification Problems
      • Conclusion
  • Unit V. Emergency Management
    • 29. Integrated Physical Security Systems
      • Detection, Delay, and Response
      • Layered Security or Security-In-Depth
      • Current Thinking in Physical Security Technology
      • Physical Security Technologies
      • Intrusion Detection
      • Access Control
      • Visitor Management
      • Video Technology
      • Integrated Operations Centers
      • Conclusion
    • 30. Managing Critical Incidents and Large-Scale Special Events
      • Introduction
      • Scope of the Problem
      • Emergency Planning Considerations
      • The Components of an Effective Emergency Response Plan
      • Incident Command System
      • Common Requirements for Effective Critical Incident Management
      • Vulnerability Analysis
      • The Emergency Operations Center
      • Media Relations
      • Developing the Emergency Response Plan
      • Integrated Systems Approach to Special Event Planning
      • Reviewing and Integrating the Emergency Response Plan
      • Training and Testing
      • Evaluating the Emergency Response Plan
      • Terrorism’s Impact on Crisis Management
      • Post-9/11 Era: The Public Sector
      • Post-9/11 Era: The Private Sector
      • Professional Development
      • Summary
  • Unit VI. Investigations
    • 31. Managing Investigations
      • Introduction
      • Key Management Points
      • Key Management Skills
      • Personnel Concerns
      • Investigation Issues
      • Conclusion
      • Information Dissemination Checklist
    • 32. Interviewing
      • Interviewing Defined
      • What Interviewing Means to the Supervisor
      • Why the Skill Is Important
      • Officer/Supervisory Participation
      • Shyness
      • Demeanor
      • Rapport
      • Why Language Is Important
      • Interviewing versus Interrogation
      • The Administrative Interview
      • Due Diligence Investigations
      • Challenges for the Interviewer
      • Things to Remember When Conducting an Interview
      • The Impact of Note-Taking on the Interview Process
      • Conclusion
    • 33. Introduction to Vehicle Searches
      • Commercial Vehicles
      • Passenger Vehicles
      • Examples of Concealment
      • Tires
      • A Note on Gas Tanks
      • A Real-Life Case of an Improvised Explosive Device in a Vehicle
      • Documentation
      • Conclusion
    • 34. Crime Scene Response and Evidence Collection
      • Introduction
      • Upon Arrival
      • Personal Protective Equipment
      • Photographic Documentation
      • Collection of Evidence
      • Summary
    • 35. The Importance of Report Writing to the Security Operation
      • Why Report Writing Is Crucial
      • Situations That May Require Written Reporting
      • How Information Is Collected
      • The Importance of Notes
      • Six Important Points of Report Writing
      • The Supervisor’s Responsibilities
      • Testifying
      • Conclusion
    • 36. Apprehension and Detention Procedures
      • Scenario 1
      • Scenario 2
      • Introduction
      • Authority
      • Tactics
      • Weapons
      • Emerging Trends
  • Unit VII. Current Issues in Security
    • 37. Espionage: A Primer
      • Espionage in History
      • Espionage in the Twenty-First Century
      • Sabotage
      • How Can Espionage Be Conducted?
      • Social Engineering
      • Motivations
      • Security Clearances and Classifications
      • Trade Secrets
      • What Can Security Do About Espionage in the Twenty-First Century?
    • 38. Cyber Security
      • Internet Security Primer
      • Confidentiality, Integrity, and Availability: The CIA Triad
      • Authorization and Authentication
      • Risks, Threats, and Vulnerabilities
      • Defense in Depth
      • Ethics and Cyber Security
      • The Many Faces of Cybercrime
      • Cybercrime
      • Advancing Your Cyber Security Career Options
    • 39. Workplace Violence: Prevention, Mitigation, Response, and Recovery
      • Introduction
      • The Risk
      • OSHA
      • Identify the Risks
      • Threat Assessment Team
      • Workplace Violence Prevention Policy
      • Train to Identify Warning Signs
      • Education and Training
      • A Violence-Free Workplace
    • 40. An Overview of Security Risk Management Concepts
      • Security Risk Management Models
      • A Generic Security Risk Management Model
      • Another Perspective: The ARES Model
      • Benefits of Integrated Risk Management
    • 41. Standards, Guidelines, and Regulation for the Security Industry
      • ISO—International Organization for Standardization
      • ANSI—American National Standards Institute
      • ASIS International
      • SIA—Security Industry Association
      • NFPA—National Fire Protection Association
      • PCI SSC—Payment Card Industry Security Standards Council
      • Federal Regulation of Private Protective Security Officers
      • Federal Government Contracts
      • State Regulation of Private Protective Security Officers
      • State Regulators
      • Legal Regulatory Authority
      • Regulated Private Security Entities/Functions
      • Security Officer Requirements
      • Organizational or Company-Level Requirements
      • Compliance Challenges
      • International Regulation
      • Emerging Trends
    • 42. The Relationship Between Corporate Security and Information Technology Professionals
      • Organizational Characteristics
      • Leveraging IT for Security Disciplines and Functions
      • Security IT versus IT Security
      • Outsourcing
    • 43. International Perspectives on Security in the Twenty-First Century
      • Introduction—Paul A. Caron
      • The Transformation of Threats in Today’s Security Professional’s Operating Environment—Paul A. Caron
      • Anatomy of Terrorism—K.C. Goswami
      • Civil Considerations/Terrorist Activities—Bruce W. Dobbins
      • Religious Considerations and Local Governance Issues—Ona Ekhomu
      • Security Management and Supervision General International Security Concerns—H.D.G.T. Oey
      • Protection of Assets Managed in Times of Conflict—Bruce W. Dobbins
      • ANSI/ASIS, PSC1, Aspects on Implementation—Erik D. Erickson
  • Index

Details

No. of pages:
668
Language:
English
Copyright:
© Butterworth-Heinemann 2015
Published:
Imprint:
Butterworth-Heinemann
eBook ISBN:
9780128004890
Paperback ISBN:
9780128001134

About the Editor

Sandi Davies

Sandi J Davies has served as the Executive Director of the International Foundation for Protection Officers (IFPO) for more than 25 years. She is the former Chairperson of the Security Services Council for ASIS International, and is currently a member of the Security Services Council and the Women In Security Council of ASIS International. Sandi has edited eight editions of The Professional Protection Officer, as well as all four editions of Security Supervision: Theory and Practice of Asset Protection.

Affiliations and Expertise

Executive Director, International Foundation for Protection Officers (IFPO)

About the Author

Reviews

"One of its primary functions is to serve as the study guide for the credential Certified in Security Supervision and Management (CSSM), offered by the International Foundation for Protection Officers (IFPO)...This weighty textbook well serves the experienced security professional, the security department director or manager, the security specialist, and the security student." --Security Management, Security Supervision and Management, Fourth Edition

"...it’s a book to dip into if you are interested in any number of topics, from report writing (again, the superviser plays an important part here) to vehicle searches (’a legally complex activity’)." --Professional Security Magazine Online