1. Trang chủ
  2. » Luận Văn - Báo Cáo

Introduction to security operations and management 5th johnson

400 206 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

www.downloadslide.net www.downloadslide.net Introduction to Security www.downloadslide.net This page intentionally left blank www.downloadslide.net Fifth Edition Introduction to Security Operations and Management Brian R Johnson, Ph.D Michigan State University P.J Ortmeier (deceased) Grossmont College 330 Hudson Street, NY NY 10013 www.downloadslide.net Vice President, Portfolio Management: Andrew  Gilfillan Portfolio Manager: Gary Bauer Editorial Assistant: Lynda Cramer Senior Vice President, Marketing: David Gesell Field Marketing Manager: Thomas Hayward Product Marketing Manager: Kaylee Carlson Senior Marketing Coordinator: Les Roberts Director, Digital Studio and Content Production: Brian Hyland Managing Producer: Cynthia Zonneveld Managing Producer: Jennifer Sargunar Content Producer: Nikhil Rakshit Manager, Rights Management: Johanna Burke Operations Specialist: Deidra Smith Creative Digital Lead: Mary Siener Managing Producer, Digital Studio: Autumn Benson Content Producer, Digital Studio: Maura Barclay Full-Service Management and Composition:   iEnergizer Aptara® Full-Service Project Manager: Rakhshinda Chishty Cover Designer: StudioMontage Cover Art: nirutft/Fotolia Printer/Binder: Edwards Brothers Cover Printer: Lehigh-Phoenix Color/Hagerstown Text Font: Times LT Pro Copyright © 2018, 2013, 2009 by Pearson Education All Rights Reserved Printed in the United States of America This publication is protected by copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise For information regarding permissions, request forms, and the appropriate contacts within the Pearson Education Global Rights and Permissions department, please visit www.pearsoned.com/permissions/ Acknowledgments of third-party content appear on the appropriate page within the text PEARSON and ALWAYS LEARNING are exclusive trademarks owned by Pearson Education, Inc in the U.S and/or other countries Unless otherwise indicated herein, any third-party trademarks, logos, or icons that may appear in this work are the property of their respective owners, and any references to third-party trademarks, logos, icons, or other trade dress are for demonstrative or descriptive purposes only Such references are not intended to imply any sponsorship, endorsement, authorization, or promotion of Pearson’s products by the owners of such marks, or any relationship between the owner and Pearson Education, Inc., authors, licensees, or distributors Library of Congress Cataloging-in-Publication Data Names: Johnson, Brian R., author | Ortmeier, P J Introduction to security Title: Introduction to security : operations and management/P J Ortmeier, Ph.D., Grossmont College Description: Fifth Edition | Hoboken : Pearson, 2016 | Revised edition of the author’s Introduction to security,   2012 | Includes bibliographical references and index Identifiers: LCCN 2016041385 | ISBN 9780134558929 | ISBN 0134558928 Subjects: LCSH: Private security services—Management | Buildings—Security measures | Industries—Security   measures | Corporations—Security measures | Security systems | Computer security Classification: LCC HV8290 J6196 2016 | DDC 363.28/9068—dc23 LC record available at  https://lccn.loc.gov/2016041385 10 9 8 7 6 5 4 3 2 1 ISBN-10:    0-13-45589-28 ISBN-13: 978-0-13-45589-29 www.downloadslide.net To my wife Shari and my son Brian www.downloadslide.net This page intentionally left blank www.downloadslide.net Brief Contents Pa r t Introduction: Security’s Role in Society  Chapter History and Overview  Chapter Threats to Safety and Security  25 Chapter The Legal and Regulatory Environment of the Private Security Industry 47 Pa r t Security Operations: Essential Functions  71 Chapter Physical Security  72 Chapter Personnel Security  98 Chapter Information Security  118 Pa r t Security Sectors  Chapter Chapter Chapter Pa r t 139 Institutional Security  140 Commercial, Office, and Residential Security  167 Homeland Security  186 Security Management  215 Chapter 10 Management, Leadership, and Ethics in Security Organizations  216 Chapter 11 Managing People and Organizations  239 Chapter 12 Risk Assessment, Security Surveys, and Continuity Planning  256 Pa r t Trends and Challenges  275 Chapter 13 Security in an International Perspective  276 Chapter 14 The Future  296 vii ▼ www.downloadslide.net This page intentionally left blank www.downloadslide.net Contents Preface  xvii Acknowledgments xx About the Authors  xxi Pa r t Introduction: Security’s Role in Society  Chapter History and Overview  Learning Objectives  The Context for Security  Theoretical Foundations  Security: A Brief History  Ancient Traditions  English Origins  The American Experience  Security in America: Colonial Origins to WWI  Security in the Twentieth Century  10  World War II  11 The Cold War and the National Industrial Security Program  11 Federal Initiatives  13 Post-9-11 Security  15 The Contemporary Security Industry  15 Security Personnel  16 Proprietary Security  16 Contract Security Services  17 Hybrid Security Organizations  18 Determining Security Needs  19 Security’s Impact  20 Security: Essential Functions  20 Roles of the Security Manager  21 Summary  23  •  Key Terms and Concepts  23  •  Discussion Questions and Exercises  24  •  Your Turn  24 Chapter Threats to Safety and Security  25 Learning Objectives  25 Introduction 25 Accidents 26 Human Error and Accidents  28 ix ▼ www.downloadslide.net Sahara-Sahel Region European Journal on Criminal Policy and Research, 20(3), 343–360 Strizzi, N., & Meis, S (2001) Challenges facing tourism markets in Latin America and the Caribbean region in the new millennium Journal of Travel Research, 40(2), 183–192 Strom, K., Berzofsky, M., Shook-Sa, B., Barrick, K., Daye, C., Horstmann, N., & Kinsey, S (2010) The private security industry: A review of the definitions, available data sources, and paths moving forward Washington DC: US Department of Justice Su, J Z., Kim, A K., Crampton, G P., & Liu, Z (2001) Fire suppression with inert gas agents Journal of Fire Protection Engineering, 11(2), 72–87 Subramaniam, C (2004) Human factors influencing fire safety measures Disaster Prevention and Management: An International Journal, 13(2), 110–116 Sufian, F., & Majid, M Z A (2014) Banks’ efficiency and share prices in an emerging market: A DEA window analysis approach Oxford Journal: An International Journal of Business & Economics, 1(1) Sullivan, H T., Hakkinen, M T., & DeBlois, K (2010) Communicating critical information using mobile phones to populations with special needs International Journal of Emergency Management, 7(1), 6–16 Sullivan, R J (2014) Controlling security risk and fraud in payment systems Federal Reserve Bank of Kansas City, Economic Review, 99(3), 47–78 Sullivant, J (2007) Strategies for protecting national critical infrastructure assets: A focus on problem solving ­Hoboken, NJ: John Wiley & Sons Inc Sun Microsystems integrates access control worldwide (2000, October) Access Control & Security Systems Integration, 43(11), 1, 30, 32, 34 Suomi, K., & Järvinen, R (2013) Tracing reputation risks in retailing and higher-education services Journal of Retailing and Consumer Services, 20(2), 207–217 Support Anti-terrorism by Fostering Effective Technologies (SAFETY) Act, 2002 (Public Law 107-296) Survey finds Londoners ready to tackle the terrorist threat (2014, November 10) The security lion Retrieved from https://thesecuritylion.wordpress.com/tag/ project-servator/ Sury, P., Ritzmann, S., & Schwaninger, A (2012, October) Initial results of web based blended learning in the field of air cargo security In Security Technology (ICCST), 2012 IEEE International Carnahan Conference on (pp 274–279) IEEE Sutherland, E (1949) White-collar crime New York: Dryden Sveningsson, S., & Alvesson, M (2003) Managing managerial identities: Organizational fragmentation, discourse and identity struggle Human Relations, 56(10), 1163–1193 Sweet, K M (2006) Transportation and cargo security: Threats and solutions Upper Saddle River, NJ: Pearson Prentice Hall Syamsuddin, I., & Hwang, J (2010) The use of AHP in security policy decision making: An open office calc application Journal of Software, 5(10), 1162–1169 Sygnatur, E., & Toscano, G (2000, Spring) Work-related homicides: The facts Compensation and Working Conditions, 2, 3–8 Talarico, L., Sorensen, K., Reniers, G., & Springael, J (2016) Pipeline security In S Hakim, G Albert, & Y Shiftan (Eds.) Securing transportation systems (pp 281–321) Taneja, S (2014) Violence in the workplace: A strategic crisis management issue Journal of Applied Business and Economics, 16(1), 32–42 Tankel, S (2014) Indian jihadism: The evolving threat Studies in Conflict & Terrorism, 37(7), 567–585 Tanner-Smith, E E., & Fisher, B W (2016) Visible school security measures and student academic performance, attendance, and postsecondary aspirations Journal of Youth and Adolescence, 1–16 Tarlow, P E (2011) Tourism risk management in an age of terrorism Economía Autónoma, 4(7), 18–30 Taveau, J (2012, March) Secondary dust explosions: How to prevent them or mitigate their effects? Process Safety Progress, 31(1), 36–50 Tebogo, T (2014, July 28) Scannex to secure diamonds Botswana Daily News Retrieved from http://www.dailynews.gov.bw/news-details.php?nid=13245 Terry, P., & Tholen, M (2006) Security barrier design Practice Periodical on Structural Design and Construction, 11(2), 105–111 Testimony Published by Federal Bureau of Investigation, © 2004 Testimony on the TSA Behavior Detection and Analysis ­Program (2013) Retrieved from https://www.tsa.gov/ news/testimony/2013/11/14/testimony-tsa-behaviordetection-and-analysis-program Testimony (2015) Retrieved from https://www.fbi.gov/ news/testimony/animal-rights-extremism-andecoterrorism The influence of culture, emotions, intangibility, and atmospheric cues on online behavior, Copyright © 2014 Published by Elsevier Inc The Loss Prevention Foundation (2007) Retrieved from http://www.losspreventionfoundation.org/ The Montreux Document (2008, September) Geneva, Switzerland: ICRC The new security company:integration of services and technology responding to changes in customer demand, demography and technology, Copyright References  363 ▼ www.downloadslide.net © 2015 Used by permission of Confederation of European Security Services The Protective Forces at the Department of Energy (2010) Hearing Before the subcommittee on Strategic Forces of the Committee on Armed Services Senate, 111, Cong TSA expands the use of Explosives Trace Detection technology at airports nationwide (2010, February 17) Retrieved from https://www.tsa.gov/news/releases/ 2010/02/17/tsa-expands-use-explosives-tracedetection-technology-airports-nationwide The USDA handbook on workplace violence prevention and response (2001, October) Washington, DC: United States Department of Agriculture TSA supports passenger rail systems security (2015, September 3) Retrieved from https://www.tsa.gov/ news/top-stories/2015/09/03/tsa-supports-passenger-railsystems-security The Working Group on the use of mercenaries as a means of violating human rights and impeding the exercise of the right of peoples to self-determination Copyright © 2015 Published by Office of the High Commissioner for Human Rights Tsang, N K., Lee, L Y., Wong, A., & Chong, R (2012) THEMEQUAL—Adapting the SERVQUAL scale to theme park services: A case of Hong Kong Disneyland Journal of Travel & Tourism Marketing, 29(5), 416–429 Thomas, L (2001, January) Security measures for the Miami federal courthouse Security Products, 5(1), 54 Thomas, R S., Bishara, N., & Martin, K J (2014) An empirical analysis of non-competition clauses and other restrictive post-employment covenants Vanderbilt Law and Economics Research Paper, (14–11) Thomason, R (2000, September) Airport security for the new millennium Security Technology & Design, 10(9), 52, 54, 56, 60 Tichy, N., & Ulrich, D (1984) The leadership challenge—a call for the transformational leader SMR Forum Sloan Management Review, 26(1), 59–68 Tong, J., Wang, X., Wen, H., & Kummer, S (2010, November) Analysis and comparison of transport chain between China and Austria In Logistics Engineering and Intelligent Transportation Systems (LEITS), 2010 International Conference on (pp 1–5) IEEE Transnational European Union: Towards a Common Political Space, Copyright © 2005 Published by Routledge Transportation Security Administration (2011) Frequently asked questions [Online] Available from http://www tsa.gov/what_we_do/layers/secureflight/faqs.shtm Trantham, N., & Garcia, A (2015, July) Reputation dynamics in networks: Application to cyber security of wind farms Systems Engineering, 18(4), 339–348 Trevino, L K., Hartman, L P., & Brown, M (2000) Moral person and moral manager: How executives develop a reputation for ethical leadership California Management Review, 42(4), 128–142 Tseng, H R., Jan, R H., & Yang, W (2007, November) An ­ ireless improved dynamic user authentication scheme for w sensor networks In Global Telecommunications Conference, 2007 GLOBECOM’07 IEEE (pp 986–990) IEEE Tuttle, H (2015) Kidnap and ransom in the wake of ISIS Risk Management, 62(1), Two teens arrested in theft of koalas (2000, December 29) San Diego Union Tribune, p A3 Tyska, L A., & Fennelly, L J (2000) Physical security: 150 things you should know Boston: ButterworthHeinemann Understanding School Violence Published by U.S Department of Health & Human Services, © 2015 UNDP (1994) Human Development Report 1994: New Dimensions of Human Security New York: Oxford University Press United Nations (2015) IMO profile Retrieved from https:// business.un.org/en/entities/13 United Nations Convention Against Transnational Organized Crime Copyright © 2004 Published by United Nations Publications United Nations Office on Drugs and Crime (2010) Crime and instability: Case studies of transnational threats Austria: Vienna University Health Care provides health, safety and security for patients (2000, October) Access Control & Security Systems Integration, 43(11), 44 UN Use of PMSC? It’s a Reality, Not a Hypothetical Copyright © 2012 Published by The Huffington post Trimmer, H W (1999) Understanding and servicing alarm systems (3rd ed.) Woburn, MA: ButterworthHeinemann United States Code, 2012 Edition, Title 18—Crimes and Criminal Procedure Published by United States Government Publishing Office, © 2015 Trotta, R Prevention: The key to executive protection Management Review, 77(8), 35–42 U.S Central Intelligence Agency (2007) OIG report on CIA accountability with respect to the 9/11 attacks [Online] Available from http://www.cia.gov/library/reports/ ExecutiveSummary_OIG Report.pdf True III, J M (2005) Blue eagle at work: Reclaiming democratic rights in the American workplace Berkeley Journal of Employment & Labor Law, 26(1), 181–204 TSA chief likely to face lawmakers’ questions on pat-downs, body scans (2010, November 17) CNN.com U.S Coast Guard (2007) Maritime Transportation Security Act of 2002 [Online] Available from http://www uscg.mil/hq/g-cp/comrel/factfile/fastcards/ MTSA2002.htm References  364 ▼ www.downloadslide.net U.S Chemical Safety and Hazard Investigation Board (2007, March) Investigation report: Refinery explosion and fire, BP Texas City, Texas, March 23, 2005 Available from http://www.csb.gov/assets/1/19/ CSBFinalReportBP.pdf 31 U.S Code § 5312—Definitions and application Published by United States Government Publishing Office U.S Congress (2001) USA PATRIOT Act of 2001 (Public Law 107–56) Washington, DC: U.S Government Printing Office U.S Congress (2002, November 25) Homeland Security Act of 2002 Washington, DC: U.S Government Printing Office U.S Congress (2005, May 11) Pub L No 109–113 US Customs and Border Protection (2006) Supply chain security best practices catalog Washington, DC: U.S Customs and Border Protection US Customs and Border Protection (2011) Container Security Initiative in summary Washington, DC: US Customs and Border Protection U.S Department of Education (2007) Campus security [Online] Available from http://www.ed.gov/admins/ lead/safety/campus.html U.S Department of Education, Institute of Education ­Sciences (2011) Indicators of school crime and safety: 2010 [Online] Available from http://nces.ed.gov/ programs/crimeindicators/crimeindicators2010/index.asp U.S Department of Health and Human Services (2007) Factsheets [Online] Available from http://www.­ pandemicflu.gov U.S Department of Health and Human Services, Office of Civil Rights (2007) Fact sheet: Privacy and your health information [Online] Available from http://www.hhs gov/ocr/hipaa/consumer_rights U.S Department of Homeland Security (2008, January 22) National Response Framework Retrieved from https:// www.fema.gov/pdf/emergency/nrf/NRFRolloutBriefing Notes.pdf U.S Department of Homeland Security (2012, February) Department of Homeland Security Strategic Plan Fiscal Years 2012–2016 Washington, DC: U.S Department of Homeland Security U.S Department of Homeland Security (2015) About DHS Retrieved from dhs.gov U.S Department of Homeland Security, Office of the Press Secretary (2007) DHS completes key framework for critical infrastructure protection [Online] Available from http:// www.dhs.gov/xnews/releases/pr_1179773665704.shtm U.S Department of Homeland Security, Transportation Security Administration (2003) Aviation and Transportation Security Act (ATSA) Public Law 107-7 [Online] Available from http://www.tsa.gov U.S Department of Justice (2007) Fact sheet: USA PATRIOT Act Improvement and Reauthorization Act of 2005 [Online] Available from http://www.usdoj.gov U.S Department of Justice, Bureau of Justice Statistics (2006) 2006 indicators of school crime and safety Washington, DC: U.S Department of Justice U.S Department of Justice, Federal Bureau of Investigation (2011) National Incident Based Reporting System Retrieved from https://www.fbi.gov/about-us/cjis/ucr/ nibrs/2011 U.S Department of Justice, Federal Bureau of Investigation (2013) National Incident Based Reporting System Retrieved from https://www.fbi.gov/about-us/cjis/ucr/ nibrs/nibrs-user-manual U.S Department of Justice, Federal Bureau of Investigation, Economic Espionage Unit (2007) Focus on economic espionage [Online] Available from http://www.fbi gov/hq/ci/economic.htm U.S Department of Justice, Private Security Advisory Council to the Law Enforcement Assistance Administration (1977) Reports to the LEAA Washington, DC: U.S Government Printing Office U.S Department of Labor, Bureau of Labor Statistics (2010) Census of fatal occupational injury summary, 2009 [Online] Available from http://www.bls.gov/news release/cfoi.nr0.htm U.S Department of State (2007) County reports on terrorism [Online] Available from http://www.state.gov/s/ct/ rls/crt/2006/82727.htm U.S Department of State (2015) Retrieved from www state.gov U.S Department of State Foreign Affairs Handbook (2014) 5(12) Section 113 p 35 Retrieved from http://www state.gov/documents/organization/88382.pdf U.S Fire Administration (2010, April) Nonresidential building fires Available from http://tkolb.net/FireReports/ NonresidentialBuildingFires.pdf U.S Fire Administration (2013, June) Nonresidential building fires (2009–2011) Available from https://www.usfa fema.gov/downloads/pdf/statistics/v14i5.pdf US Fire Administration (2014) Residential building fire trends, 2004–2103 Retrieved from https://www.usfa fema.gov/downloads/pdf/statistics/res_bldg_fire_ estimates.pdf U.S General Services Administration (2011) Alarm and signal systems: Security system management [Online] Available from http://www.gsa.gov/portal/content/104644# AlarmSignal Retrieved from January 23, 2011 U.S Private Security Advisory Council, (1976) A Report on the Regulation of Private Security Guard Services Including a Model Private Security Licensing and Regulatory Statute Department of Justice, LEAA : Washington D.C References  365 ▼ www.downloadslide.net USA PATRIOT Act (2001) H.R 3162, 107th Cong Vallabhaneni, S R (2013) Wiley CIS exam review 2013 focus notes: Part 1, Internal audit basics New Jersey: John Wiley & Sons Van Niekerk, D., Coetzee, C., Botha, D., Murphree, M J., Fourie, K., Le Roux, T., & Meyer, S (2015) Planning and executing scenario based simulation exercises: Methodological lessons Journal of Homeland Security and Emergency Management, 12(1), 193–210 Van Niekerk, J., & Von Solms, R (2004, June) Organisational learning models for information security In The ISSA 2004 Enabling Tomorrow Conference (Vol 30) van Steden, R., & de Waard, J (2013) “Acting like chameleons”: On the McDonaldization of private security Security Journal, 26(3), 294–309 van Steden, R., & Sarre, R (2007) The growth of private security: Trends in the European Union Security Journal, 20(4), 222–235 Varnali, R (2015) An exploratory study of the cultural context of organizational climate and human resource practices Asia Pacific Journal of Human Resources, 53(4), 432–447 Vellani, K (2006) Strategic security management: A risk assessment guide for decision makers Boston: Butterworth-Heinemann Vellani, K (2007) Strategic security management: A risk assessment guide for decision makers Boston: Elsevier Vincent, B (2000, May) Protection at $5.75 an hour Access Control & Security Systems Integration, 43(6), 1, 47–48 Vincent, J L (2009) Infant hospital abduction: Security measures to aid in prevention MCN: The American Journal of Maternal/Child Nursing, 34(3), 179–183 Vindevogel, F (2005) Private security and urban crime mitigation A bid for BIDs Criminal Justice, 5(3), 233–255 towns In Engineering earth (pp 1917–1935) Springer Netherlands Waheed, Y (2014) Ebola in West Africa: An international medical emergency Asian Pacific Journal of Tropical Biomedicine, 4(9), 673–674 Wakefield, J C (2010) A toxicological review of the products of combustion Health Protection Agency, Centre for Radiation, Chemical and Environmental Hazards, Chemical Hazards and Poisons Division Walby, K., & Lippert, R K (2014) Corporate security in the 21st Century Published by Palgrave Macmillan Walby, K., & Lippert, R K (2015) Ford first? Corporate security and the U.S Department of War’s Plant Protection Service’s interior organization, 1917–1918 Labor History, 56(2), 117–135 Wallwork, R D (2005) Operational implications of private military companies in the global war on terror Fort Leavenworth, Kansas: United States Army Command and General Staff College School of Advanced Military Studies Retrieved from http://handle.dtic.mil/100.2/ ADA436294 Wal-Mart loses overtime pay lawsuit (2002, December 20) The Olympian [Online] Available from http://www.theolympian.com/home/news/20021220/business/314505html Walsh, D W., Christen, H T., Callsen, C E., Miller, G T., Maniscalco, P M., & Dolan, N J (2012) National Incident Management System: Principles and practice Sudbury, MA: Jones & Bartlet Walsh, J (2000, August) Employee theft International Foundation for Protection Officers Walsh, K., Levin, H., Jaye, P., & Gazzard, J (2013) Cost analyses approaches in medical education: There are no simple solutions Medical Education, 47(10), 962–968 Walsh, T J., & Healy, R J (1987) Protection of assets manual Santa Monica, CA: The Merrit Company Violence Occupational Hazards in Hospitals ­Published by National Institute for Occupational Safety and Health, © 2002 Wang, P., Lin, H T., & Wang, T S (2016) An improved ant colony system algorithm for solving the IP traceback problem Information Sciences, 326, 172–187 Vitale, P (2011) Wages of war: Manufacturing nationalism during World War II Antipode, 43(3), 783–819 War Department (1943, May 1) Plant protection for manufacturers Pamphlet No 32-1 Washington, DC: Office of Civilian Defense Voss, M D., & Williams, Z (2013) Public–private partnerships and supply chain security: C-TPAT as an indicator of relational security Journal of Business Logistics, 34(4), 320–334 Vukadin, I K., Borovec, K., & Golub, T L (2013) Policing in Croatia: The main challenges on the path to democratic policing In Handbook on policing in Central and Eastern Europe (pp 31–55) New York: Springer Wagley, J (2010, November) Be smart about IDs Security Management, pp 91–92 Wagner, T E., & Obermiller, P J (2011) A doubleedged sword: Social control in Appalachian company Ward, R H., Kiernam, K L., & Mabrey, D (2006) Homeland security: An introduction New York: LexisNexis/Anderson Publishing Wardle, K A., & Wardle, D (2004) Glimpses of private life: Roman rock cut tombs of the first and second centuries AD at Knossos British School at Athens Studies, 473–480 Warner, B D., Beck, E., & Ohmer, M L (2010) Linking informal social control and restorative justice: Moving social disorganization theory beyond community policing Contemporary Justice Review, 13(4), 355–369 References  366 ▼ www.downloadslide.net Wasserman, G A., Miller, L S., & Cothern, L (2000, April) Prevention of serious and violent juvenile offending Washington, DC: U.S Department of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention Water Sector-Specific Plan (2010) Washington, DC: Department of Homeland Security Webster, C W R (2004) Evolving standards and regulation: Exploring the development and provision of closed circuit television in the United Kingdom Knowledge, Technology & Policy, 17(2), 82–103 Weinstein, S (2013) How target became a target: Massive cyber security breach creates legal and reputational risk for leading U.S retailer Coventry Law Journal, 18(22), 11–18 White, A., & Gill, M (2013) The transformation of policing from ratios to rationalities British Journal of Criminology, 53(1), 74–93 White, B (2010, September 30) The new presence on Oakland’s streets Wall Street Journal Retrieved from http://www.wsj.com/articles/SB100014240527487046540 04575518012723731400 White, J R (2012) Terrorism and homeland security (7th ed.) Belmont, CA: Cengage/Wadsworth White, S (2001, January) Nature watch Security Products, 5(1), 50 Whitmore, A (2014) Using open government data to predict war: A case study of data and systems challenges Government Information Quarterly, 31(4), 622–630 Weisel, D L (2007) The problem of bank robbery Problemoriented guides for police Problem-specific guides series, (no 48) U.S Department of Justice, Office of Community Oriented Policing Services Wiegman, D A., & Shappell, S A (2003) A human error approach to aviation accident analysis: The human factors analysis and classification system Burlington, VT: Ashgate Weiss, R P (1986) Private detective agencies and labour discipline in the United States, 1855–1946 The Historical Journal, 29(01), 87–107 Wilberg Fitzsimons, E (2000, September 28) False alarms trigger fines San Diego Union Tribune, p B1 Weiss, R P (2007) From cowboy detectives to soldiers of fortune: Private security contracting and its contradictions on the new frontiers of capitalist expansion Social Justice, 34(3/4), 1–19 Williams, K S., & Johnstone, C (2000) The politics of the selective gaze: Closed circuit television and the policing of public space Crime, Law and Social Change, 34(2), 183–210 Wimmer, R (2000, January) Assessing CCTV’s roles in public venues Security Technology & Design, 10(1), 32–34 Weissman, S H., Busch, K G., & Schouten, R (2014) Introduction to this issue: The evolution of terrorism from 1914 to 2014 Behavioral Sciences & the Law, 32(3), 259–262 Winkler, I (1997) Corporate espionage Rocklin, CA: Prima Publishing Weiten, W (2004) Psychology: Themes and variations (6th ed.) Belmont, CA: Wadsworth Witey, F (1947) Plant protection employees under current federal labor legislation University of Illinois Bulletin, 44(72), 3–19 Weldes, J (Ed.) (1999) Cultures of insecurity: States, communities, and the production of danger (Vol 14) University of Minnesota Press Wenger, C (2015) Building walls around flood problems: The place of levees in Australian flood management Australian Journal of Water Resources, 19(1), 3–21 Wernick, D A., & Von Glinow, M A (2012) Reflections on the evolving terrorist threat to luxury hotels: A case study on Marriott International Thunderbird International Business Review, 54(5), 729–746 Wesley, R L., & Wanat, J A (2013) A guide to internal loss prevention Elsevier Westhead, P., & Storey, D (1996) Management training and small firm performance: Why is the link so weak? International Small Business Journal, 14(4), 13–24 What Is Security and Resilience Published by The Department of Homeland Security, © 2015 What is workplace violence? (2002) Washington, DC: U.S Department of Labor, Occupational Safety & Health Administration Retrieved from https://www.osha.gov/ OshDoc/data_General_Facts/factsheet-workplaceviolence.pdf Wolensky, K C (2008) Freedom to assemble and the Lattimer massacre of 1897 Pennsylvania Legacies, 8(1), 24–31 Workforce Framework Customized User Guides Copyright © 2015 Published by National Initiative for Cybersecurity Careers and Studies Workplace violence in the health sector Published by World health organisation, © 2002 Workplace violence prevention strategies and research needs (2004) Washington, DC: Center for Disease Control and Prevention, National Institute for Occupational Safety and Health Workplace violence: Awareness and prevention for employers and employees (2012) Seattle, Washington: Washington State Department of Labor and Industries Retrieved from http://www.lni.wa.gov/IPUB/417-140000.pdf Wright, S (2015) Competitive intelligence, analysis and strategy New York: Routledge Wulfhorst, E (2006, June 23) Younger workers more likely to think theft is OK San Diego Union Tribune, p A2 References  367 ▼ www.downloadslide.net Yang, C C., & Wei, H H (2013) The effect of supply chain security management on security performance in container shipping operations Supply Chain Management: An International Journal, 18(1), 74–85 Young, J E (2002) Indemnification clauses in multiple contract transactions International Business Law, 30, 115–118 Young, J R (2008) For emergency alerts, some colleges try sirens Chronicle of Higher Education, 54(31), a22 (Eds.), Maritime transport security: Issues, challenges and national policies (pp 40–51) Northampton, MA: Edward Elgar Zeigler, M (2002, February 16) Olympic security sky-high San Diego Union Tribune, pp A1, A12 Zerrenner, K (2014, February 6) Can the World Bank’s “Thirsty Energy” Effort Create a Culture Shift? Retrieved from http://www.greenbiz.com/blog/2014/02/06/ can-world-banks-thirsty-energy-effort-create-culture-shift Young, M E., & Lambie, G W (2007) Wellness in school and mental health systems: Organizational influences The Journal of Humanistic Counseling, Education and Development, 46(1), 98–113 Zhang, R (2013) A transportation security system applying RFID and GPS Journal of Industrial Engineering and Management, 6(1), 163–174 Young, S., Balluz, L., & Malilay, J (2004) Natural and technologic hazardous material releases during and after natural disasters: A review Science of the Total Environment, 322(1), 3–20 Zhou, C., Yu, Q., & Wang, L (2012) Investigation of the risk of electromagnetic security on computer systems International Journal of Computer and Electrical Engineering, 4(1), 92–98 Zalok, E., & Eduful, J (2013) Assessment of fuel load survey methodologies and its impact on fire load data Fire Safety Journal, 62, 299–310 Zhu, S., & Levinson, D M (2012) Disruptions to transportation networks: A review In Network reliability in practice (pp 5–20) New York: Springer Zamparini, L (2014) Economic issues in maritime transport security In K Bichou, J S Szyliowicz, & L Zamparini Zuckerman, E (2003, February 22) Nobody had a chance San Diego Union Tribune, pp A1, A16 References  368 ▼ www.downloadslide.net Index Note: Page numbers followed by f or t represent figures or tables, respectively A Absolute liability offenses, 50 Absolute value, 124 Acceptance, 56 Access control, 85–86, 121–123, 154 types of, 121 Accidents, 26–28 environmental, 42–43 human error and, 27, 28 workplace, 28 Actus reus, 50 Administration defined, 217 need for effective, 217–219 private, 217, 218t public, 217 Administrative controls, 110 Administrative laws, 55–56 Advanced procedures, 105 Advance team, 105 Africa, private security industry in, 283–284 African diamond industry, security practices in, 284 Air cargo security, 171 Alarm points, 84 Alarms defined, 82 false, 82 nuisance, 82 Alarm system circuit, 82 Alarm systems categories, 83 components, 82 management, 83–85 “All-hazards” approach, 26 Al Qaeda, 201, 306, 307 American District Telegraph Company (ADT), “American Dream,” 39 American Express Company, American Security Experience, 7–9 American Society for Industrial Security (ASIS), 13, 61–62 code of ethics, 235–236 International Guidelines Commission, 261 Americans with Disabilities Act (ADA) recruitment process, 100 American Zoo and Aquarium Association (AZA), 162 Ancient traditions, Annunciator, 82 Anti-Pinkerton Act of 1893, 62 Appellate courts, 65–66 Application, job, 99 Aquarium security, 160–162 Arraignment, 67 Arrest, 51 Asphyxiant gases, 30 Asset classification, 121–123 assumption of risk doctrine, 54–55 ATMs (automatic teller machines) defined, 143 security, 143–144 Authenticators, 145 Authorization to release information document, 100 Availability, 120 Aviation and Transportation Security Act of 2001, 171, 205 Aviation security, 205–207 Bioterrorism Act of 2002, 202 Blake, Robert, 228 Blanchard, Ken, 228 Boosters, 177 Bottom of basket (BoB) detectors, 179 Bow Street Runners, Bridge Calls, 281 British Petroleum Texas City refinery explosion, 42 Brown, Michael, 41 Budget, 252–253 defined, 252 types of, 252 Building elements, physical security, 75 Buildings, physical security, 85–89 access control, 85–86 locks, 86–89, 87f, 88f Bureaucracy, 217 Bureaucrats, 218 Burglar alarm, 9, 11 Burglary safeguards, 182 Burns, William, 10 Bush, George W., 188, 203 Business continuity management (BCM), 127 Business continuity plan (BCP), 269 Business resumption activities, 272 C B Back doors, 129 Backdraft explosion, 30 Background investigation, 100 Bailiffs, 146 Baldwin–Felts Detective Agency, Baltimore and Ohio railroad, Bank Protection Act of 1968, 141–142 Banks, 141 robberies, prevention of, 143 Barnyard terrorism, 298 Barriers, 78–80, 80f Behavioral assumptions, and leadership style, 227–230 Benefit denial, 178 Bill of Rights, 48 Bin Laden, Osama, 305 Biometric system, 88, 88f 369 ▼ Card-operated lock, 87 Card trapping, 143 Cargo security, 168–171 Cargo theft, 179–180 Casino security, 158–159 CBRN weapons, 309 CCTV (Closed Circuit Television), 92–94, 93f, 144, 178, 282, 304 Central and South America, private security industry in, 285 Central station alarm system, 83 Certified Protection Professional (CPP), 19, 61–62 Chain-link fencing, 79 Challenges for cause, 67 Chernobyl nuclear power plant explosion, 42 Chicago Area Project, 39 www.downloadslide.net Chief executive officer (CEO), 225 Chief Security Officer (CSO), 19 Choke points, 131 Churn, 240 CIA triad, 119–120 Citadel, 288 Civil demand, 179 Civil disturbance, 41 Civil law, 51–55 defenses under, 54–55 defined, 51 intentional torts, 53–54 negligence torts, 52–53 remedies under, 54 Civil liability, 45 Civil recovery, 179 Civil Rights Act of 1964, Title VII of, 60 Civil unrest, 41–42 Civil War, Clery Act, 152 Clinton, Bill, 188 Cloud, 127 Code of ethics ASIS, 235–236 defined, 233 Cold War, 11–13 Collective security theory, 4–5 Color of law, 241 Columbine effect, 147 Combination locks, 87 Combustible hazards, 30 Combustion, stages of, 30 Common criteria security model, 262, 262f Common law, 49 Communications and operations management, 126 Communications security (COMSEC), 132 Community security, 298 Comparative negligence, 55 Compensatory damages, 54 Competitive intelligence, 135 Conduction, 31 Confederation of European Security Services (CoESS), 280, 311 Confidentiality, 119 Consideration, as contract element, 56 Constitutional law, 48–49 Container Security Initiative (CSI), 168–169 Contemporary security industry, 15–16 Contingency planning components of, 271 defined, 269 and emergency management, 270–272 risk management, 269–270 types of, 269 Continued reliability checks, 101–103 Continuous evaluation process (CEP), 101 Contract collective bargaining, 61 defined, 56 E-contracts, 57 elements of, 56 expressed, 56 implied, 56 noncompete agreements, 58 Contract law, 56–58 Contract security, Contract security services, 17–18 Convection, 31 Copyright, 133 Corporate kidnapping, 113–114 Corporate social responsibility (CSR), 298 Cost–benefit analysis, 252 Counterinsurgency techniques, 307 Countermeasures, 75 Counter Terrorism Security Advisors (CTSAs), 282 Coupon fraud, 176 Courthouse security, 145–147 Court of general jurisdiction, 65 Courtroom security, 145–147 Courts of limited jurisdiction, 65 Covenants Not to Compete (CNCs), 58 CRAVED model, 178 Credit history, 101 Crime, 33–35 See also Offenses classification of, 33, 50 defined, 33 elements of, 50 nature and extent of, 33–35 organized, 35 prevention strategies, 40 property-related, 50 theories of, 36–40 trends in United States, 33, 34f victimless, 50 white-collar, 35 Crime in the United States (report), 33 Crime prevention through environmental design (CPTED), 40, 110, 124 elements of, 183 residential security, 183 school violence, 148–149 Crime Triangle, 37f Criminal history checks, 100 Criminal law, 49–51 sources of, 49–50 Index  370 ▼ Criminal negligence, 50 Criminology, 36 Critical information, 120 Critical infrastructure and key resources (CIKR), 171, 194, 195–196, 196f Criticality, 264 Crowd management, 156 Cruise ships, 173 Cryptographic security, 126 Cryptography, 132 Culture, defined, 309 Culture conflict, 38 Customs-Trade Partnership against Terrorism (C-TPAT), 169 Cybercrimes defined, 128 nature and extent of, 128 types of, 128–131 Cybersecurity, 127–132 network security program, 131–132 SCADA (Supervisory Control and Data Acquisition), 131 D Decisional roles, managers, 220, 220t Decision-making, 248–249 Decryption, 126 Deepwater Horizon Oil Spill, 42–43 Defamation, 53–54 Defend Trade Secrets Act (DTSA), 135 Defense Advanced Research Projects Agency (DARPA), 304 Defense in depth, 73 Defense Security Services, 56 Defense Security Services (DSS), 12 Delay functions, 75 Delphi technique, 263 Denial of Service (DoS) attack, 130 Department of Defense, 12 Department of Energy, 55 Department of Homeland Security (DHS) See U.S Department of Homeland Security (DHS) Detection elements, physical security, 75 Deterrence-based strategies, 73 Differential association principle, 38 Disasters, 27 contingency planning in, 271 hybrid, 44–45 man-made, 42–43 natural, 44–45 Discipline, 243 Discretionary access control (DAC), 121 Distributed Denial of Service (DDoS) attack, 130–131 Djibouti Code of Conduct (DCoC), 289 www.downloadslide.net Doctrine of assumption of risk, 54–55 Domestic terrorism, defined, 200 Drones, 303 Drug-Free Schools and Communities Act, 152 Duggan, Mark, 41 Duncan Hunter National Defense Authorization Act (2008), 290–291 Dunkin’ Brands, 175 Duty, concept of, 53 Dynamic risk, 259 E Early warning systems (EWS), 110 Economic espionage, 134 Economic Espionage Act (EEA) of 1996, 135 Economic security, 298 E-contracts, 57 Education, 243 Educational institution security, 147–152 elementary and secondary schools, 147–150 Institutions of Higher Education See Institutions of Higher Education (IHEs) Ego, 37 Egyptians, Electronic article surveillance (EAS), 179 Electronic locks, 87 Electronic Signature in Global and National Commerce Act (E-Sign Act), 57 Emanations security (TEMPEST), 132 Emergency management, 173 contingency plans and, 270–272 Emergency notification systems, 151 Emergency response, 271 Employee development training and, 242–243 Employee Polygraph Protection Act of 1988 (EPPA), 60 Employment law, 59–61 collective bargaining laws, 60–61 Encryption, 126 Energy security, 301 Entertainment security, 155–162 mega events, 156–158 museum security, 159–160 theme parks, 155–156 zoo and aquarium security, 160–162 Environmental accidents/disasters, 42–43 Environmental Protection Agency (EPA), 196 water sector vision statement, 197 Environmental security, 298 Equal Employment Opportunity Commission (EEOC), 55, 60 Ethical dilemma, 232 Ethical leadership, 233–234 Ethical standards, 233 Ethics, 230–236 defined, 230 principles, 231 and security environment, 19 Europe, private security industry in, 277–282 European Union (EU), 279–281 Evidence-based practices (EBps), 311–312 Executive/corporate kidnapping, 113–114 Executive Outcomes (EO), 289–290 Executive protection (EP), 104–105 Expeditionary terrorist activities, 307 Explosives detection strategy, 207–208 Expressed contract, 56 Express kidnappings, 113 Extended care facilities, security of, 155 F Fair Labor Standards Act (FLSA), 59–60, 246–247 False alarms, 82 Fargo, William, Federal Aviation Administration (FAA), 205–206 Federal Aviation Regulation (FAR), 206 Federal Emergency Management Agency (FEMA), 31, 193, 203 risk quantification table, 265f Federal Energy Regulatory Commission (FERC), 301 Federal Motor Carrier Safety Administration (FMCSA), 209 Federal personnel security background investigation process, 101, 102f Federal Railroad Administration (FRA), 210 Felonies, 50 Fencing, 78–80, 78f Fifth Amendment, 63 Financial institution, defined, 140, 141 Financial institution security, 140–145 ATM security, 143–144 user authentication and, 144–145 Fire, 28–33 causes of, 31 classification of, 29–30 Fire alarm, 9, 89–90 Fire annunciators, 91 Fire brigade, 90 Index  371 ▼ Fire extinguishers, 30, 91–92 Fire hazard abatement, 89 Fire inspection program, 90 Fire investigation, 89 Fire load, 31 Fire prevention, 89–90 Fire prevention enforcement, 89 Fire protection systems, 91–92 Fire safety education, 90 Fire sensors, 89–90, 91 Fire tetrahedron model, 29 Fire triangle, 29, 29f Firewall, 132 Five Modes of Adaptation (Merton), 39 Flashover, 30 Food and Drug Administration, 55 Food Safety Modernization Act (FSMA), 204–205 Food security, 298, 299 Ford Motor Company’s Security Services, 11 Foreign Intelligence Surveillance Act (FISA), 189, 190 Foreign Intelligence Surveillance Court (FISC), 190 Foreseeability, 53 Fourth Amendment, 55 Frankpledge system, Free-burning phase, combustion, 30 Free will, 36 Freud, Sigmund, 37 Fuel load, 31 Fukushima Daiichi Nuclear Power Plant disaster, 45 Full-time equivalent (FTE), 247 Fusion centers, 189, 202 G Gaming industry, security of, 158–159 Gang violence, 39 Gases asphyxiant, 30 irritant, 30–31 Gated resorts, 174 General deterrence, 36 General Motors, 11 Geneva Center for the Democratic Control of Armed Forces (DCAF), 279 Globalization, 296–301 defined, 297 human security and, 298–301 Global security assemblage, 297 Global Terrorism Database (University of Maryland), 40 Great Depression, 10 www.downloadslide.net Great Wall of China, Grey market, 279 Guard forces, 75 Guard forces, and physical security, 94–95 H Hackers, 118, 129 Hallcrest Report I/II, 14 Hamilton, Lee, 188 Hamper, Ben, 38 Harris, Eric, 147 Hawalas (informal banking systems), 308 Hawthorne effect, 222 Hazards, 25, 26 combustible, 30 Health care facilities defined, 153 security of, 153–155 Health care settings, violence in, 111 Health Insurance Portability and Accountability Act (HIPAA), 56, 154 Health security, 298 Health threats, to employees, 114–115 Heat-related injuries, 31 Hersey, Paul, 228 Hierarchical organizational structure, 220, 221 Hierarchy of needs (Maslow), High seas piracy, 286–289 Highwayman Act of 1692, Hobbes, Thomas, Hold harmless clauses, 57 Holmes, Edwin, Homegrown terrorists, 307 Homeland security, 186–211 defined, 186 historical perspective, 187 missions, 195 National Incident Management System, 198–199 National Infrastructure Protection Plan, 194–197 natural/technological/accidental hazards, 203–205 9-11 Commission and, 187–189 role of private sector in, 194–199 terrorism and, 200–202 transportation security, 205–211 USA PATRIOT Act of 2001, 189–190 Homeland Security Act of 2002, 15, 190, 203 Hospitality industry security, 172–174 Hostile work environment, 242 Human error, and accidents, 27, 28 Human Factors Analysis and Classification System, 27 Human personality, elements of, 37 Human Relations Movement, 222–223 Human security components of, 298 defined, 298 and globalization, 298–301 The Human Side of Enterprise (McGregor), 227 Hurricane Katrina, 45 Hurricane Sandy, 44 Hybrid disasters, 44–45 Hybrid security organization, 18 I Id, 37 Impeachment, 67 Imperial Sugar Refinery explosion, 31–32 Implementing Recommendations of the 9-11 Commission Act of 2007, 188, 189 Implied contract, 56 Inchoate offenses, 50 Incipient stage, combustion, 30 Indemnification clause, 57 Indictment, 67 Indonesia, piracy incident, 287 Industrial Defense Program, 12 Industrial espionage, 134 Industrial revolution, Industrial security, 167–168 Industrial self-regulation, 61–62 Inergen systems, 92 Information, 118–119 criminal cases, 67 levels of, 121 Informational role, managers, 220, 220t Information gathering, 129 Information security (INFOSEC), 21, 118–136 asset classification and access control, 121–127 business continuity management, 127 communications and operations management, 126 communications security, 132 compliance, 127 components of, 121–127 defined, 119 designing, 120 human activities and, 124–125 intellectual property, protection of, 133–136 Index  372 ▼ objectives, 119–120 policies and procedures (operational goals), 123 systems development and maintenance, 126–127 technical/logical controls, 125–126 Information system, defined, 118–119 Infrared sensors, 91 Initial appearance, 66 Injunction, 54 In-service training, 243 Institutional anomie theory, 39 Institutional security, 140–163 courthouse security, 145–147 courtroom Security, 145–147 educational, 147–152 entertainment security See Entertainment security financial institution, 140–145 health care security, 153–155 religious institutions, 162–163 Institutions of Higher Education (IHEs), 150 legislation, 152 security programs, types of, 151–152 Intangible standards, 250 Integrity defined, 230 ethics and, 230–236 Integrity tests, 100, 119 Intellectual property defined, 133 protection of, 133–136 Intelligence Reform and Terrorism Prevention Act of 2004, 188 Intelligence Reform Bill, 63 Intentional torts, 53–54 Interagency Security Committee (ISC), 74 Intercultural competency, 309–310 Intermediate appellate courts, 64 Internal employee theft, 175–176 Internal labor market (ILM), 240 Internal Revenue Service, 55 International Association of Chiefs of Police (IACP), 303 International Association of Healthcare Security and Safety, 13 International Code of Conduct (ICoC), 292 elements of, 293 International Code of Conduct for Private Security Providers Association (ICoC), 292 International issues, and private security industry, 286–291 www.downloadslide.net high seas piracy, 286–289 private military security companies, 289–291 Internationally Recommended Transit Corridor (IRTC), 288 International private security industry International Code of Conduct, 292, 293 Montreux Document, 291–292 regulating, 291–294 United Nations, 292–294 International Ship and Port Facility Code (ISPS), 210 International terrorism, 308–309 Interpersonal role, managers, 220, 220t Interview, 99–100 Ionization sensors, 91 Irritant gases, 30–31 ISIS (Islamic State), 306, 308 J Jersey Barrier, 79 Jihad (holy war), 307 Job-task (occupational) analysis, 99 Joint Commission, 153 Judicial process criminal cases, 66–68 Judicial systems, 63–66 district courts, 64 intermediate appellate courts, 64 state courts, 65–66 K Kean, Thomas, 188 Keating, Charles, Jr., 68 Key Facilities List, 12 Key-operated locks, 86 Keypad locks, 87 Kidnappings executive/corporate, 113–114 express, 113 Klebold, Dylan, 147 Korean War, 12 Kosovo, 279 L Labor Management and Reporting and Disclosure Act of 1959, 60 Labor unrest, 42 La Follette Civil Liberties Committee, 62 Lattimer Massacre, Law Enforcement Assistance Administration (LEAA), 13 Law Enforcement Education Program (LEEP), 13 Leadership, 223–230 competencies, 226 defined, 223 global competencies, 224 management vs., 224t path–goal theory, 230 style, behavioral assumptions and, 227–230 theories, 225–226 transactional, 225 transformational, 225 Leadership (MacGregor), 225 Lebanese loop, 143 Legal and regulatory environment, of security, 47–68 administrative laws, 55–56 civil law See Civil law constitutional law, 48–49 contract law, 56–58 criminal law, 49–51 employment and labor law, 59–61 industrial self-regulation, 61–62 judicial systems, 63–66 municipal ordinances, 61 property law, 58–59 Legal risk, 260 Legislative trends, in security, 304–305 Libel, 53–54 Light Detection and Ranging (LiDAR), 172 Lighting, 77–78 Limitations of liability clauses, 57 Line item budgets, 252 Line of sight (LOS) sensors, 81 Line supervisors, 225 Local alarm system, 83 Locks card-operated, 87 combination, 87 electronic, 87 key-operated, 86 keypad, 87 and physical security, 86–89, 87f, 88f session, 126 Logical controls See Technical/logical controls Logic bombs, 130 Loss prevention, 179 Loss Prevention Certified (LPC), 62 Loss Prevention Foundation, 62 Loss Prevention Qualified (LPQ), 62 M Madrassas (Islamic seminaries), 308 Madrid bombing, 307 Magnetometers, 147 Index  373 ▼ Malicious code attacks, 129–130 Management defined, 219 evolution of, 221–223 functions of, 219–220 leadership vs., 224t levels, 220–221 operational, 221 scientific, 221–222 tactical, 221 Management levels, 220–221 Managerial grid, 228, 229f Managerial roles, and behaviors, 220, 220t Mandatory access control (MAC), 121–122 Man-made disasters defined, 42 environmental accidents/disasters, 42–43 warfare, 43 Maritime piracy, 286–287 Maritime security, 210–211 Maritime Security Centre, Horn of Africa (MSCHOA), 288 Maritime Transportation Security Act (MTSA) of 2002, 210–211 Marriott Hotel bombing (Islamabad, Pakistan), 40–41 Maslow, Abraham, Maslow’s hierarchy of needs, Mass private property hypothesis, Materialized risk, 257 Max Weber’s Theory of Bureaucracy, 217–218 Mayo, Eton, 222 “McDonaldization of Security,” 18 McGregor, Douglas, 227 McVeigh, Timothy, 200 Mega events, security of, 156–158 Mens rea, 50 Merchant’s privilege laws, 179 Merton, Robert, 39 Mesabi Iron Range, Metrics, 251 Metropolitan Police Act, 6, Microwave motion sensors, 80 Misdemeanors, 50 Mission statement, 248 Mitigation, 267, 267f Mitigation activities, 203 Mobile Detection Assessment Response System (MDARS), 304 Model Penal Code, 50 Molly Maguires, Montreux Document, 291–292 www.downloadslide.net Moonlighting, 240 Morality, 230 Morse, Samuel, Motivation behavioral assumptions, 227 Mouton, Jane, 228 Municipal ordinances, 61 Museum security, 159–160 Mutuality of obligation, 56 N Napolitano, Janet, 201 Natech disasters See Hybrid disasters National Advisory Commission on Criminal Justice Standards and Goals, 14 National Counter Terrorism Security Office (NaCTSO), 282 National Crime Victimization Survey (NCVS), 33, 34 National Incident-Based Reporting System (NIBRS), 34, 35 National Incident Management System (NIMS), 198–199, 270 private sector implementation activities, 199 National Industrial Security Program (NISP), 11–13 security-compliance regulations, 168 National Infrastructure Protection Plan (NIPP), 194–197 National Initiative for Cybersecurity Education (NICE), 310 National Intelligence Council (NIC), 307 National Intelligence Estimate (NIE), 307, 308 National Labor Relations Act (NLRA), 11, 42, 60 National Labor Relations Board (NLRB), 60 National Response Framework, 270 Nationwide SAR (Suspicious Activity Reporting) Initiative (NSI), 202 Natural disasters, 44–45 categories of, 44 Negligence torts, 52–53 Negligent hiring, 241 Negligent retention, 241–242 Network segmentation, 131 Nigeria, piracy incident, 287 9-11 Commission defined, 187 and homeland security, 187–189 Noncompete agreements, 58 Normans, North-Western Police Agency, Nuclear Regulatory Commission, 56 Nuisance alarms, 82 Numerical standards, 250 Nursing home, security of, 155 O Obama, Barack, 204 Objective (quantitative) measures, 263 Occupational safety, 103 Occupational Safety and Health Act, 1970, 27 Occupational Safety and Health Administration (OSHA), 27–28, 55, 153, 231 inspections/citations, 28 and workplace violence, 107 Off-duty police officers, hiring of, 240–241 Offenses See also Crime arrestable, 51 inchoate, 50 strict/absolute liability, 50 Offer, defined, 56 Office building security, 180–181 Office of Naval Intelligence (ONI), 10 Omnibus Crime Control and Safe Streets Act, 13 Operational goals, INFOSEC, 123 Operational management, 221 Operational plans, 249 Operational risk, 260 Operational risk management (ORM), 260 Operation Cooperation, 310 Operation Partnership, 310 Operations security (OPSEC), 120 Optical character recognition (OCR), 170 Organizational goals, 248 Organizational objectives, 248 Organized crime, 35 Organized retail crime (ORC), 35, 177 Outsourcing, for security services, 57 Overseas Security Advisory Council (OSAC), 114 Oxidation, 29 P Pandemic, 204 Partnerships, 310–311 public private, 306 Passenger screening strategy, 207–208 Passive infrared sensors, 81 Passwords, 126 Password stewardship, 123 Index  374 ▼ Patents, 133 Path–Goal Leadership, 230 Payment fraud, 176 Peel, Robert, PELAN (pulsed elemental analysis with neutrons), 170 Performance appraisal, 243–244 Performance-based budgets (PBB), 252 Performance measures, 249–252 Perils, 25, 26 Perimeter lighting, 77 Perimeter security, 76–77 Personality, elements of, 37 Personal property, 59 Personal security, 298 Personnel security, 98–115 defined, 21, 99 elements of, 98–105 executive protection, 104–105 hiring practices, 99–101 and international issues, 112–115 issues, 103 personnel safety, 103 workplace violence See Workplace violence (WPV) Personnel selection, 240 Pharaohs, Phishing, 130 Photoelectric sensors, 91 Physical security, 72–95, 182 access control, 85–86 alarm systems, 82–85 barriers, 78–80, 80f buildings, 85–89 cameras and surveillance systems, 92–94 controls, 124 defined, 21, 72 elements of, 72–73, 75–76 fencing, 78–80, 78f fire protection systems, 91–92 fire sensors and alarms, 89–90 guard forces, 94–95 level of protection, 73–74 lighting, 77–78 perimeter security, 76–77 sensors, 75, 80–82 Physical security measures, 124 PIN crack, 143 Pinkerton, Allan, 8, Piracy, 286–289 defined, 286 incidents, 287 maritime, 286–287 Pirate gangs, 287 Planned redundancy, 131 www.downloadslide.net Plan/planning, 247–249 defined, 247 risk management, 258 types of, 249 Plan review, facility, 89 “Plugging the hole” approach, 73 Plural policing, 278 Point-of-sale (POS) theft, 175 Policy, 244–245 Political security, 298 POSDCORB model, 219–220 Post-bureaucratic organizations, 219 Post-incident procedures, 110 Post-Katrina Emergency Reform Act of 2006, 203 Precursor conduct, 202 Pre-employment screening, 240 Preliminary hearing, 67 Preparedness activities, 203 President’s Commission on Law Enforcement and Administration of Justice, 13 Prevention and control strategies, 110 Principal (person), 104 Principle of differential association, 38 Private administration, 217 characteristics of, 218t Private justice systems, 19 Private maritime security contractors (PMSCs), 288–289 Private Military Companies (PMCs), 232 Private military security companies (PMSCs), 289–292 Private police, 19 “The Private Police Industry: Its Nature and Extent” (RAND report), 13 Private/public interdependence, 310–311 Private security, 3, 8, 16 legal and regulatory environment of, 47–68 Private Security Advisory Council (PSAC), 13–14 Private security industry in Africa, 283–284 in Central and South America, 285 in Europe, 277–282 international See International private security industry international issues and, 284–291 Private Security Officer Employment Authorization Act of 2004, 63 Probability, 264 Procedural security measures, 73 Procedure, 245 Professional Assault Response Training (PART), 154–155 Progressive discipline, 243 Project Argus, 282 Project Griffin, 281 Project Kraken, 282 Project Pegasus, 282 Project Servator, 282 Promotion, 243 Property laws, 58–59 Property-related crimes, 50 Proprietary alarm system, 83 Proprietary security, 16–17 Protection levels, 73–74 Protective operations, 105 Proximity sensor, 81 Psychopaths, 37 Psychosis, 38 Public administration, 217 characteristics of, 217t Public private partnerships, 306 Public sector security, 15–16 Punctuated equilibrium, 305 Punitive damages, 54 Pure risk, 259 Pyrolysis, 29 Pyrotechnics, 31 Q Quality assurance, 251 R Radiation heat transfer, 31 Radiation portal monitor (RPM), 170 Radio frequency identification (RFID), 176, 179 Railroad security, 209–210 Railway police Act, Ram raiding, 143 REAL ID Act of 2005, 207 Real property, 59 Reasonable doubt, 49 Recovery efforts, 204, 271 Recovery time objectives (RTOs), 272 Recruitment, 99–101, 239–242 defined, 240 of off-duty police officers, 240–241 Refund fraud, 176 Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships in Asia (RECAAP), 289 Relative value, 124 Religious institutions, and security, 162–163 Repeat-use (standing) plan, 249 Reputational risk, 260–261 Index  375 ▼ Research and Development (RAND) Corporation, 13 Residential security, 181–183 Resilience, defined, 195 Respondeat superior, 52 Response, 204 Retail security external threats, 176–178 internal employee theft, 175–176 and loss prevention, 174–180 shoplifting prevention strategy, 178–180 Return on investment (ROI), 253 Ring of Steel, 282 Riot, 41 Risk, 25, 26 concept of, 256–259 defined, 256, 257 determination, 256 dynamic, 259 identification of, 259–261 legal, 260 levels, assigning, 264 materialized, 257 operational, 260 pure, 259 quantifying, 265–266, 265f reputational, 260–261 speculative, 259–260 static, 259 Risk acceptance, 268 Risk assessment defined, 261 and executive protection plan, 104–105 techniques, 261–266 Risk avoidance, 267 Risk elimination, 267 Risk management, 26 contingency planning, 269–270 defined, 257 elements of, 257–258, 258f plan, 258 techniques, 267–268 Risk reduction activities, 267–268 Risk spreading, 268 Risk state, 266 Risk states, 266, 266f Risk transfer, 268 Rivethead: Tales from the Assembly Line (Hamper), 38 Robbery, 63 Role-based access control (RBAC), 121 Romans, Romanski v Detroit Entertainment LLC, 49 Routine activities theory, 36–37 www.downloadslide.net S SAFE Port Act See Security and Accountability for Every Port Act of 2006 Safe-School Initiative, 149 Safe-school zones, 149 Safety defined, 27 occupational, 103 security personnel, 103 SAFETY (Support Anti-Terrorism by Fostering Effective Technologies) Act of 2002, 194 Safety analysis, 109 Safety threats See Security/safety threats SCADA (Supervisory Control and Data Acquisition), 131 Scheduling, 245–252 defined, 245 elements of, 246 planning See Plan/planning Scheduling cycle, 246 Scheduling periods, 246 Schools violence, 147–150 Scientific management, 221–222 Sector-specific plans (SSPs), 197 Secure Flight, 209 Security contract, defined, English origins, 5–6 functions, 20–21 history of, 5–9 impact of, 20 information See Information security (INFOSEC) institutional See Institutional security legislative trends in, 304–305 needs, determination of, 19–20 personnel See Personnel security physical See Physical security post 9-11, 15 as practice and industry, private, 3, 8, 16 public sector, 15–16 as subjective/psychological state of mind, 2–3 theoretical foundations, 3–5 threats to See Security/safety threats in twentieth century, 10–15 Security and Accountability for Every Port Act of 2006, 169 Security awareness, 98–99 Security industry career opportunities in, 19 contemporary, 15–16 regulation of, 62–63 Security Industry Authority (SIA), 281 Security management defined, 22 elements of, 47–68 Security Manager roles of, 21–22 Security organization hybrid, 18 Security personnel, 16–18 contract security services, 17–18 proprietary security, 16–17 recruitment, 99–101 safety, 103 Security/safety threats, 25–45 accidents, 26–28 civil liability, 45 civil unrest, 41–42 crime See Crime fire, 28–33 man-made disasters, 42–43 natural disasters, 44–45 terrorism, 40–41 Security survey, 262–263 conducting, 263–264 defined, 262 Security systems integration, 84 Security Triad, 20f Self-scan checkout kiosk fraud, 177 Sensors, 75, 80–82 active, 80 alarm systems, 82 fire, 89–90, 91 line of sight, 81 passive, 81 September 11, 2001 and DHS creation, 15 and homeland security, 187–189 Serbia, 279 Session locks, 126 Sexual harassment, 242 Shipping/cargo security, 168–171 Shire reeve, Shoplifting, 36, 153, 176–177 Shoplifting prevention strategy, 178–180 Shrinkage (loss of assets), 28, 174 Single-issue groups, 308 Single-use plans, 249 Site work elements, physical security, 75 Index  376 ▼ Situational awareness, 114 Situational Leadership Model, 228–229 Skimming activities, 143 Slander, 54 Smart containers, 170 Smoldering stage, combustion, 30 Snitches, 177 Social disorganization theory, 38 Social engineering, 124 Social learning theories, 38 Social structure theories, 38–39 Society for Worldwide Interbank Financial Telecommunication (SWIFT), 306 Somalia, piracy incident, 287 Soviet Union, 277 Specific deterrence, 36 Speculative risk, 259–260 Spoofing, 130 Sprinkler systems, 91–92 Stages of combustion, 30 Standoff zones, 76–77, 76f State action, 49 State courts, 65–66 States’ rights, 304 Static risk, 259 Statute of Westminster of 1285, Statutes, 49 Strain/anomie theories, 39 Strategic plan, 249 Strict liability offenses, 50 Subjective (qualitative) measure, 263 Subjective state, security as, 2–3 Sudanese conflict, 43 Superego, 37 Supervision, 223 Supervisory Control and Data Acquisition (SCADA), 301 Support Anti-Terrorism by Fostering Effective Technologies Act (SAFETY Act) of 2002, 194 Surveillance studies, 312 Surveillance systems, 92–94 Sutherland, Edwin, 35, 38 T Tactical management, 221 Tactical plans, 249 Tangible standards, 250 Task Force on Private Security, 14 Taylor, Frederick, 221, 222 Technical/logical controls, 125–126 Technical security, 132 Technology, 302–304 www.downloadslide.net Terrorism, 40–41, 115, 305–309 defined, 200 and homeland security, 200–202 international, 308–309 Tetrahedron model, 29 Theft cargo, 179–180 internal employee, 175–176 point-of-sale, 175 Theme parks, security of, 155–156 Theory crime, 36–40 defined, 36 Theory of collective security, 4–5 Theory X assumptions, 227, 228 Theory Y assumptions, 227–228 Theory Z, 228 Thermal injuries, 31 Thermal sensors, 91 Thief takers, Threats, 25–26 external, and retail crime, 176–178 health, to employees, 114–115 Title VII of the Civil Rights Act of 1964, 60 Torts defined, 51 intentional, 53–54 negligence, 52–53 Trademark, 133 Trade secrets, 133–134 Traffic treadles, 79–80 Training defined, 242 and employee development, 242–243 in-service, 243 Training needs analysis (TNA), 242–243 Transactional leadership, 225 Transaction exception reporting systems, 175 Transformational leadership, 225 Transnational organized crime (TOC), 35 Transnational organized crimes, 297 Transnational private policing, 297 Transportation security, 205–211 Transportation Security Administration (TSA), 193, 205, 206–207, 209 Transportation Worker Identification Credential (TWIC), 211 Trial courts See U.S district courts Triangle Shirtwaist Fire disaster, 1911, 28–29 Trojanhorse, 130 Trucking industry security, 208–209 Turnover, 239–240 Tything units, U U.S Department of Homeland Security (DHS), 15, 190–194 advisory panels and committees, 193–194 components of, 192–193 function and mission, 194 mission statement, 248 organization of, 191f six-point agenda, 191 vision statement, 248 U.S Supreme Court, 64 Ultrasonic motion sensor, 80 Unethical, 230 activities, 232 defined, 230 Uniform Crime Reports (UCR), 33, 34–35 Uniform Electronic Transaction Act (1999), 57 United Kingdom, private security industry in, 281–282 United Nations (UN), 292–294 United Nations Counter Terrorism Implementation Task Force (CTITF), 306 Unmanned Ariel Vehicles (UAVs), 303–304 U.S Constitution, 48–49 U.S courts of appeals, 64 U.S district courts, 64 U.S Immigration and Customs Enforcement (ICE), 193 U.S Marshals Service (USMS), 146 USA PATRIOT Act of 2001, 189–190 USA PATRIOT Improvement and Reauthorization Act of 2005, 189 User authentication, and financial institution security, 144–145 Utilities security, 171–172 V Value-added contribution (VAC), 253 Value-added services, 311 Values, 230–231 Vehicle barrier systems, 79, 80f Victimless crimes, 50 Video analytics, 304 Violence gang, 39 workplace See Workplace violence (WPV) Violence prevention program, 109 Violent Crime Control and Law Enforcement Act of 1994, 14 Virtual Private Networks (VPNs), 127 Viruses, 130 Index  377 ▼ Vishing, 130 Visible Intermodal Protection Response (VIPR) Teams, 210 Vision statement, 248 Voir dire examination, 67 Vulnerabilities, 25, 26, 264 W Wagner Act See National Labor Relations Act (NLRA) War and Navy Departments, 11, 12 Warfare, 43 Warsaw Pact countries, 277 Washington Perry Brinks, Watch, Water security, 299–301 Weapons of mass destruction (WMD), 190 Weber’s Theory of Bureaucracy, 217–218 Wedge barriers, 80 Wells, Henry, Wells Fargo & Company, Westinghouse Corporation, 11 White-collar crime, 35 White House Commission on Aviation Safety and Security, 206 William Burns International Detective Agency, Woolworth, F.W., Working Group on the use of mercenaries, 292 Workplace accidents, 28 Workplace deviance, 32 Workplace violence (WPV), 32–33, 106–112 classification of, 107 defined, 32, 106 examples, 106 factors increasing, 108 in health care settings, 111 nature and extent of, 107–109 preventing, 109–111 in retail outlets and convenience stores, 112 warning signs, 108t World War II (WWII), 11 Worms, 130 Y Yousef, Ramzi, 14 Yugoslavia, 277–279 Z Zero-based budget (ZBB), 252 Zoological park security, 160–162 ... reader to foundational information related to the history and evolution of security, and security? ??s function and role in society Chapter presents a brief history and overview of private security. .. residential security, while Chapter reviews key concepts and issues related to the concept and philosophy of homeland security Section explores concepts related to how to lead and manage security operations. ..www.downloadslide.net Introduction to Security www.downloadslide.net This page intentionally left blank www.downloadslide.net Fifth Edition Introduction to Security Operations and Management Brian R Johnson,

Ngày đăng: 28/08/2021, 14:04

Xem thêm:

TỪ KHÓA LIÊN QUAN

Mục lục

    Part 1 Introduction: Security’s Role in Society

    Chapter 1 History and Overview

    The Context for Security

    Security: A Brief History

    Security in America: Colonial Origins to WWI

    Security in the Twentieth Century

    The Cold War and the National Industrial Security Program

    The Contemporary Security Industry

    Roles of the Security Manager

    Key Terms and Concepts

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w