Limit search to available items
72 results found. Sorted by relevance | date | title .
Book Cover
E-book
Author Sennewald, Charles A., 1931- author.

Title Effective security management / Charles A. Sennewald, Curtis Baillie
Edition Sixth edition
Published Kidlington, Oxford, UK : Butterworth-Heinemann is an imprint of Elsevier, 2015

Copies

Description 1 online resource
Contents Front Cover -- Effective Security Management -- Copyright Page -- Contents -- Preface -- Acknowledgments -- Introduction -- Managing the Organization -- Managerial Acts -- Managerial Functions -- The Successful Manager -- Characteristics of the Successful Manager -- 1 General Security Management -- 1 General Principles of Organization -- Organization Principles -- Logical Division of Work -- Purpose -- Process or Method -- Clientele -- Time -- Geography -- Clear Lines of Authority and Responsibility -- Span of Control -- Unity of Command -- Responsibility, Authority, and Accountability -- Coordination to Meet Organizational Goals -- Where Security Fits in the Organizational Structure -- The Changing Role of Security -- Security's Contribution to Profits -- To Whom Does Security Report? -- The Difference between Corporate and Company Security -- Summary -- Review -- 2 Organizational Structure -- The Informal Organization -- Subunit Structures -- Corporate Culture -- Additional Organizational Structure -- Summary -- Review -- 3 Security's Role in the Organization -- The Protective Service Role -- Special Services -- Executive's Home Security Survey -- Investigative Assistance -- Bodyguard/Escort Service -- Emergency Service -- Educational Services -- General Security Programs -- Supervisory Training Sessions -- Employee Self-Protection Programs -- Unit or Departmental Presentations -- Management Services -- Summary -- Review -- 4 The Security Director's Role -- The Security Director ... -- As a Leader -- As a Company Executive -- As an Executive with High Visibility -- As an Executive with a Broad Profile -- As an Innovator -- As a Counselor and Advisor (In-House Security Consultant) -- As a Trainer -- As a Contemporary Professional -- As a Goal Setter and Strategic Planner -- The New Security Director -- Summary -- Review
5 The Security Supervisor's Role -- The Supervisor as an Inspector -- The Supervisor and the Individual Employee -- Supervisory Authority -- The Supervisor as the "In-Between" Person -- The Supervisor's Span of Control -- One Boss -- Automatic Shifting in the Line of Command -- Functional or Staff Supervision -- Supervisory Training -- Summary -- Review -- 6 The Individual Security Employee -- Standards of Conduct -- Courtesy -- Responsibility -- Due Process -- Cooperation -- Personal Integrity -- Self-Respect -- Honesty -- Cleanliness -- Stability -- Fidelity -- Morality -- Attitude -- Summary -- Review -- 7 Ethics and Conflicts of Interest -- Deciding between Right and Wrong: Listening to Our Inner Voice -- The Need for Ethics-Based Policies -- Higher Standard of Expectations -- Establishing a Business Ethics Policy -- Train Employees to Your Expectations -- Reporting Potential Unethical Conduct -- Deciding Ethical Dilemmas -- Identifying and Reporting Potential Conflicts of Interest -- Creating a Conflict of Interest Reporting Program -- Summary -- Review -- 2 Security Personnel Management -- 8 Hiring Security Personnel -- Hiring -- Recruiting -- Entry- or First-Level Positions -- Non-Entry-Level Recruiting -- Initial Interviewing -- Initial Human Resource Interview -- The Initial Security Interview -- Seven Interviewing Rules -- Secondary Interviewing -- Selection of Best Candidate -- Background Investigation of Applicant -- Job Offer -- Summary -- Review -- 9 Job Descriptions -- Accuracy and Completeness in Describing the Job -- Undesirable -- Desirable -- Matching Applicant to the Job -- Undesirable -- Desirable -- Employee's Understanding of the Job -- Matching Training to Job Description -- Performance Evaluations Based on Job Descriptions -- Job Descriptions are Current -- Composition of the Job Description -- Sample Job Description
Advantages of Multiple Layers -- Temporary Promotions -- Retreating -- Summary -- Review -- 14 Communication -- Types of Communication -- Verbal-Down -- Verbal-Up -- Written-Down -- Department Handbook or Manual -- Departmental Newsletter -- Written-Horizontal -- Written-Up -- Verbal-Horizontal -- Action -- About Listening -- Summary -- Review -- 15 Career (Proprietary) versus Noncareer (and Contract) Personnel -- Career Personnel -- Advantages of Career Personnel -- Example -- Disadvantages of Career Personnel -- Example -- Part-Time Noncareer Personnel -- Advantages of Part-Time Noncareer Personnel -- Example -- Disadvantages of Part-Time Noncareer Personnel -- Example -- Contractual Noncareer Personnel -- Advantages of Contractual Noncareer Personnel -- Example -- Disadvantages of Contractual Noncareer Personnel -- Example -- Combining Career and Noncareer Personnel -- Summary -- Review -- 3 Operational Management -- 16 Planning and Budgeting -- What is a Budget? -- Why Do We Have a Budget? -- When is a Budget Prepared? -- Who Participates in the Budgeting Process? -- Top-Down and Bottom-Up Process -- Phase One: Senior Management-Top-Down -- Phase Two: Security (Middle) Management-Bottom-Up -- Phase Three: Senior Management-Top-Down -- How is a Budget Prepared? -- Salary Expense Budget -- Sundry Expense Budget -- Justifying the Security Budget -- Summary -- Review -- 17 Program Management -- The Security Inspection Process -- Support of Senior Management -- Continuous Security Inspections -- Formal or Informal Security Inspections -- Structured or Unstructured Inspections -- Warehouse Exterior -- Who Conducts the Inspection? -- Assessment of Risks and Countermeasures -- Risk Assessment -- Selection of Countermeasures -- Procedural Controls -- Hardware -- Electronics -- Personnel -- Assessment of Countermeasures
Inspecting for Compliance with Procedures -- Statistics in Program Management -- Summary -- Review -- 18 Risk -- Risk Defined -- Risk Management Programs and the Security Professional's Role -- Risk Program Components -- Risk Analysis -- Risk Assessment and Risk Rating -- Risk Mitigation -- Reporting -- Summary -- Review -- 19 Crisis Management -- Crisis Management Defined -- Genesis of the Crisis Management Team -- The Media and Public Threat -- Composition of the Crisis Management Team -- Communication -- The Crisis Management Team Leader (CMTL) -- The Crisis Plan -- Red Teaming: Seeking Out Company Security Vulnerabilities -- Summary -- Review -- 20 The Security Survey -- What is a Security Survey? -- The Purpose of a Security Survey -- Defining Security Survey Goals -- Building a Survey Program: Components of a Security Survey -- Components of a Security Survey -- Summary -- Review -- 21 International Security Standards -- Introduction -- What is a Standard? -- International Standards Organization -- International Security Standards -- European Standardization Organizations -- National Standards Bodies -- American National Standards Institute -- British Standards Organization -- Examples of International Security Standards -- Information Security: ISO/IEC 27001 -- Business Continuity Management: ISO 22301 -- Supply Chain Security Management: ISO 28000 -- International Ship and Port Facilities Security Code -- BS 8549:2006: Security Consultancy: Code of Practice -- Summary -- Review -- 22 Office Administration -- Description of Functions -- Supervision -- Administrative Assistant -- Reception -- Clerical -- Records -- Record Filing Systems -- Control Ledger -- Master Index -- File Control -- Mail -- Office Security -- The Office Environment -- Summary -- Review -- 23 Written Policies and Procedures -- Historical Evolution -- Policy
Summary Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers. The sixth edition of this classic professional reference work on the topic includes newly updated and expanded coverage of topics such as the integration of security executive into the business, background checks and hiring procedures, involvement in labor disputes, organized crime, and the role of social media
Bibliography Includes bibliographical references and index
Notes Online resource; title from PDF title page (ScienceDirect, viewed September 3, 2015)
Subject Private security services -- Management
Industries -- Security measures.
Retail trade -- Security measures.
Industries -- Security measures
Private security services -- Management
Retail trade -- Security measures
Form Electronic book
Author Baillie, Curtis, author
ISBN 9780128027905
0128027908
0128027746
9780128027745