𝔖 Scriptorium
✦   LIBER   ✦

📁

Security 101 An Introduction to the Private Security Industry

✍ Scribed by Joseph Jaksa


Publisher
Carolina Academic Press
Year
2016
Tongue
English
Leaves
317
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The concept of security and securing one's property and possessions dates back to the early centuries of mankind. Identified as a basic human need, we have an intrinsic desire to protect our self and our property. Today, in the United States, the private security industry is the largest employer in the criminal justice system. The modern-day protection of lives and property includes security personnel, equipment, policies, procedures, and laws. These protective methods are implemented in residential and business communities. The content of this book provides general security concepts, information, and examples intended for college and university students enrolled in an entry-level or introductory security class or those seeking a professional career in security management. The book covers relevant theories and practices and offer topics for research and discussion questions combining both academic theories and current security industry challenges relevant to this complex sector of the criminal justice system. The book is divided into chapters providing the basic building blocks needed to develop a solid foundation of security knowledge. Each chapter includes an introduction/overview, learning objectives, content relevant to the specific chapter topic, along with a topical case study, research question and discussion topic to enhance the chapter's content. Each chapter will end with a formal conclusion and a list of topics to aid with the learning process.

✦ Table of Contents


Cover Page
Title Page
Copyright
Dedication
Contents
Foreword
Purpose of the Book
Acknowledgments
Chapter One: The Past Can Greatly Influence the Future: A Brief History of the Security Industry
Introduction
Learning Objectives
What Is Security?
The Personal Need for Security
Historical Evidence of Security
The Security Pioneers
The Century of Professionalism
Security in the “Global World”
Conclusion
Case Study—Allan Pinkerton: Hero or Villain?
Discussion Topic—Police/Security Relations
Research Focus—ASIS International
Key Terms
Sources
Chapter Two: Unnatural Partners: The Business of Private Security
Introduction
Learning Objectives
The Business of Protecting
Security Officers
Security Supervisors, Managers, and Executives
Chain of Command and Span of Control
Formal Security Education and Careers
Issues in the Security Sector
Conclusion
Case Study—Security Officer Wages in the United States
Research Focus—European vs. American Security Officers
Discussion Topic—The Fraudulent Employee
Key Terms
Sources
Chapter Three: Criminally Civil: Legal Aspects of Private Security
Introduction
Learning Objectives
Defining Criminal and Civil Law
Variations of Civil Law
What Is Liability?
Criminal Law and Security
Exceptions to the Legal Authority of Security Personnel
Reporting and Liability
Rules, Regulations, and Directives of the Employer
The Courtroom and Legal Process
Conclusion
Case Study—The Case of the Dummy Camera
Discussion Topic—The Conundrum of Moonlighting
Research Focus—Civil Court: Cases vs. Settlement
Key Terms
Sources
Chapter Four: Fortifying the Facility: The Concept of Physical Security
Introduction
Learning Objectives
Designing a Security System
Crime Prevention through Environmental Design (CPTED)
Target Hardening
Exterior Protection
Facility Protection
Conclusion
Case Study—Quality vs. Price
Discussion Topic—When Does “Aesthetically Pleasing” Become a Risk?
Research Focus—Commercial and Residential Smoke Detectors
Key Terms
Sources
Chapter Five: The Human Element: The Concept of Personnel Security
Introduction
Learning Objectives
The Need for Pre-Employment Searches
Sources of Information for Pre-Employment Checks
Legal Considerations
Elements of a Pre-Employment Investigation
Testing for Alcohol or Illegal Substances
The Debate for Continued Verification of Employees
Protecting the Employee
Conclusion
Case Study—Hostility in the Workforce
Discussion Topic—Background Investigations
Research Topic—Violence in the Workplace
Key Terms
Sources
Chapter Six: Protection in the Black Hole: Cybersecurity in Our Society
Introduction
Learning Objectives
What Is the Internet and Where Did It Come From?
Internet Myths
Basic Components
Crimes on the Internet
Protecting the System
Policies and Procedures
Investigating Cyber Crimes
The Threat of Terrorism
Law Enforcement and Private Sector Partnership
Conclusion
Case Study—Former Detroit Mayor Kwame Kilpatrick
Discussion Topic—“Putting All Your Eggs in One Basket!”
Research Focus—DEF CON
Key Terms
Sources
Chapter Seven: Nobody Sees, Nobody Knows: The Field of Private Investigations
Introduction
Learning Objectives
What Is an Investigator?
Types of Investigations
Investigative Operations
Types of Investigations
Documentation
Legal Considerations and Concerns
Conclusion
Case Study—The Heartbroken Mother
Discussion Topic—Privatizing Forensic Science
Research Topic—“Spy Stuff”
Key Terms
Sources
Chapter Eight: Shrinking the Shoplifting: Retail and Shopping Center Security
Introduction
Learning Objectives
Controlling Shrink
Internal Threats
External Threats
Prevention
Shopping Center Security
Public/Private Partnerships
Conclusion
Case Study—Excessive Force
Discussion Question—Civil Liberties vs. Loss Prevention
Research Focus—Loss Prevention Devices
Key Words
Sources
Chapter Nine: Keeping the Currency and Its Customers Safe: Banking and Financial Security
Introduction
Learning Objectives
Banks Historically as Targets
The Bank Protection Act of 1968
Bank Security Officer
Threats to Banks
Protective Measures
Private/Public Partnerships
Conclusion
Case Study—The Duress Alarm
Discussion Question—The Use of Dye Packs
Research Focus—The Bank Protection Act of 1968
Key Terms
Sources
Chapter Ten: Helping the Healing Process: Hospital and Healthcare Security
Introduction
Learning Objectives
The Complexity of the Healthcare Environment
Workplace Challenges
Areas of Concern
Protective Measures
Physical Security Measures
Professional Organizations and Certifications
Conclusion
Case Study—The Confused Patron
Discussion Topic—Security or Customer Service?
Research Focus—The Emergency Room
Key Terms
Sources
Chapter Eleven: Protecting the K-16 Process: School, College, and University Security
Introduction
Learning Objectives
The Complexity of the Education Sector
Primary Educational Facility Protection
Secondary Educational Facility Protection
Colleges' and Universities' Challenges
Conclusion
Case Study—The Bath, Michigan, School Bombing
Discussion Topic—Public Access vs. Public Safety
Research Focus—Violence on the College Campus
Key Terms
Sources
Chapter Twelve: Ensuring Items Get from Here to There: Transportation and Cargo Security
Introduction
Learning Objectives
The Impact of Protecting Cargo
Pilferage—“Public Enemy Number One”
Ports and Shipyards
Airports
Distribution and Transportation Centers
Cargo in Transit
Conclusion
Case Study—Delivery Drones
Discussion Topic—Justifying Theft
Research Focus—The Screening Process
Key Terms
Sources
Chapter 13: Protecting a Crowd: Lodging and Entertainment Security
Introduction
Learning Objectives
Casinos
National and International Sporting Events
Concert Venues
Amusement Parks and Resorts
Hotels and Motels
Cruise Ships
Conclusion
Case Study—Terror at Sea
Discussion Topic—Customer Service or Security
Research Focus—The Protection of Casinos
Key Terms
Sources
Chapter 14: “So, Now What?” The Future of the Security Industry
Introduction
Continued Public/Private Sector Partnering
The Global Fight against Terrorism
Training and Education
Adaptation to an Ever-Changing Environment
Index


📜 SIMILAR VOLUMES


Private Security: An Introduction to Pri
✍ Charles P. Nemeth 📂 Library 📅 2018 🏛 CRC Press 🌐 English

<P>There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry. <B>Private Security: An Introduction to Principles and Practice </B>takes a new approach to the subject of private sector security that wi

Private Security: An Introduction to Pri
✍ Charles P. Nemeth 📂 Library 📅 2017 🏛 CRC Press 🌐 English

There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry.<b>Private Security: An Introduction to Principles and Practice</b>takes a new approach to the subject of private sector security that will be

Private Security: An Introduction to Pri
✍ Charles P. Nemeth 📂 Library 📅 2017 🏛 CRC Press 🌐 English

There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry.<b>Private Security: An Introduction to Principles and Practice</b>takes a new approach to the subject of private sector security that will be

Introduction to Private Security , Fifth
✍ Kären M. Hess 📂 Library 📅 2008 🏛 Wadsworth Publishing 🌐 English

INTRODUCTION TO PRIVATE SECURITY, Fifth Edition, provides a comprehensive, accessible, state-of-the-art overview of private security, its principles, its legal authority, its growing role in the criminal justice system, and its impact on society. Newly updated with expanded coverage of important cur

Security Operations: An Introduction to
✍ Carolyn Mae Kim; Robert H Deatherage Jr 📂 Library 📅 2021 🏛 CRC Press 🌐 English

<strong>Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas, Second Edition</strong> was written for one primary purpose: to keep people alive by introducing them to private security detail tactics and techniques. The book provides an understa

Regulating the Private Security Industry
✍ Sarah Percy 📂 Library 📅 2007 🏛 Routledge 🌐 English

<span>The under-regulation of the private security industry has increasingly become a topic of media and academic interest. This Adelphi Paper enters the debate by explaining why the industry requires further regulation, and what is wrong with the current system. It begins by briefly defining the in