Effective Security Management. için kapak resmi
Effective Security Management.
Başlık:
Effective Security Management.
Yazar:
Sennewald, Charles A.
ISBN:
9780123820136
Yazar Ek Girişi:
Basım Bilgisi:
5th ed.
Fiziksel Tanımlama:
1 online resource (359 pages)
İçerik:
Front Cover -- Effective Security Management -- Copyright Page -- Contents -- Preface -- PART I. General Security Management -- Chapter 1. General Principles of Organization -- Organization Principles -- Where Security Fits in the Organizational Structure -- Summary -- Review Questions -- Chapter 2. Organizational Structure -- The Informal Organization -- Subunit Structures -- Corporate Culture -- Summary -- Review Questions -- Chapter 3. Security's Role in the Organization -- The Protective Service Role -- Special Services -- Educational Services -- Management Services -- Summary -- Review Questions -- Chapter 4. The Security Director's Role -- The Security Director as a Leader -- As a Company Executive -- As an Executive with High Visibility -- As an Executive with a Broad Profile -- As an Innovator -- As a Counselor and Advisor (In-House Security Consultant) -- As a Trainer -- As a Contemporary Professional -- As a Goal Setter and Strategic Planner -- The New Security Director -- Summary -- Review Questions -- Chapter 5. The Security Supervisor's Role -- The Supervisor as an Inspector -- The Supervisor and the Individual Employee -- Supervisory Authority -- The Supervisor as the "In-Between" Person -- The Supervisor's Span of Control -- One Boss -- Automatic Shifting in the Line of Command -- Functional or Staff Supervision -- Supervisory Training -- Summary -- Review Questions -- Chapter 6. The Individual Security Employee -- Standards of Conduct -- Summary -- Review Questions -- PART II. Security Personnel Management -- Chapter 7. Hiring Security Personnel -- Hiring -- Summary -- Review Questions -- Chapter 8. Job Descriptions -- Accuracy and Completeness in Describing the Job -- Matching Applicant to the Job -- Employee's Understanding of the Job -- Matching Training to Job Description -- Performance Evaluations Based on Job Descriptions.

Job Descriptions Are Current -- Composition of the Job Description -- Sample Job Description -- Summary -- Review Questions -- Chapter 9. Training -- Shortcomings of Typical "Training" -- Training Defined -- On-the-Job Training -- Formal or Structured Training -- POP Formula: Policy, Objective, Procedure -- Training as Ongoing Responsibility -- Types of Security Training Programs -- Meeting Organizational Needs -- Security Manual -- Summary -- Review Questions -- Chapter 10. Discipline -- The Supervisor's Role in Discipline -- Disciplinary Problems Arising from Misunderstood Assignments -- Basic Rules of the Disciplinary Process -- Progressive Discipline -- Self-Discipline -- Summary -- Review Questions -- Chapter 11. Motivation and Morale -- "Theory X" and "Theory Y" -- Organizational Behavior -- Work Motivation Theory -- Demotivators -- Summary -- Review Questions -- Chapter 12. Promotions -- Identifying Promotional Candidates -- Selection of the Right Candidate -- The Board Interview -- Following the Selection -- Promotion from "within" -- Vertical Promotion outside the Department -- Advantages of Multiple Layers -- "Temporary" Promotions -- "Retreating" -- Summary -- Review Questions -- Chapter 13. Communication -- Types of Communication -- About Listening -- Summary -- Review Questions -- Chapter 14. Career (Proprietary) versus Noncareer (and Contract) Personnel -- Career Personnel -- Part-Time Noncareer Personnel -- Contractual Noncareer Personnel -- Combining Career and Noncareer Personnel -- Summary -- Review Questions -- PART III. Operational Management -- Chapter 15. Planning and Budgeting -- What Is a Budget? -- Why Do We Have a Budget? -- When Is a Budget Prepared? -- Who Participates in the Budgeting Process? -- How Is a Budget Prepared? -- Justifying the Security Budget -- Summary -- Review Questions -- Chapter 16. Program Management.

The Security Inspection Process -- Assessment of Risks and Countermeasures -- Statistics in Program Management -- Summary -- Review Questions -- Chapter 17. Risk -- Risk Defined -- Risk Programs and the Security Professional's Role -- Risk Program Components -- Summary -- Review Questions -- Chapter 18. The Security Survey -- What is a Security Survey? -- The Purpose of a Security Survey -- Defining Security Survey Goals -- Building a Survey Program/Components of a Security Survey -- Summary -- Review Questions -- Chapter 19. Office Administration -- Description of Functions -- Office Security -- The Office Environment -- Summary -- Review Questions -- Chapter 20. Written Policies and Procedures -- Historical Evolution -- Policy -- Benefits -- Compliance -- Combining Policies and Procedures -- Free-Standing Policies -- Importance of the Written Policy -- Policies, Procedures, and the Security Manual -- Format and Mechanics -- Post Orders -- Summary -- Review Questions -- Chapter 21. Computers and Effective Security Management -- Introduction -- PC Hardware -- PC Software -- Word Processing -- Database Management -- Spreadsheets -- Desktop Publishing -- Encryption Software -- Computer Graphics -- Telecommunications -- Specialized Management Programs -- Artificial Intelligence -- Multimedia -- Risks of Using PCs -- Summary -- Review Questions -- Chapter 22. Statistics as a Security Management Tool -- Introduction -- Planning For Future Security Needs -- Internal Statistical Analysis -- External Statistical Analysis -- Methodology -- Information for Risk Analysis -- Return on Investment -- Summary -- Review Questions -- PART IV. Public Relations -- Chapter 23. Selling Security within the Organization -- How to Sell Security -- Summary -- Review Questions -- Chapter 24. Relationship with Law Enforcement -- Services of the Public Sector.

Services of the Private Sector -- Summary -- Review Questions -- Chapter 25. Relationship with the Industry -- Effective Relationship Categories -- Summary -- Review Questions -- Chapter 26. Community Relations -- Community Relations and the Security Professional -- Networking -- Summary -- Review Questions -- PART V. Mismanagement -- Chapter 27. Jackass Management Traits -- 1 The Manager Who Seeks to Be "Liked" Rather Than Respected -- 2 The Manager Who Ignores the Opinions and Advice of Subordinates -- 3 The Manager Who Fails to Delegate Properly -- 4 The Manager Who Ignores the Training and Developmental Needs of Subordinates -- 5 The Manager Who Insists on Doing Everything "The Company Way" -- 6 The Manager Who Fails to Give Credit When Credit Is Due -- 7 The Manager Who Treats Subordinates as Subordinates -- 8 The Manager Who Ignores Employees' Complaints -- 9 The Manager Who Does Not Keep People Informed -- 10 The Manager Who Holds His or Her Assistant Back -- 11 The Manager Who Views the Disciplinary Process as a Punitive Action -- 12 The Manager Who Fails to Back up His or Her People -- 13 The Manager Whose Word Cannot Be Trusted -- 14 The Manager Who Avoids Making Decisions -- 15 The Manager Who "Plays Favorites" -- 16 The Manager Who Fails to Stay Current in the Field -- 17 The Manager Who Enjoys "Pouring on" More Work than a Subordinate can Handle -- 18 The Manager Who Acts or Overreacts Too Quickly -- 19 The Newly Promoted Manager Who Believes his or her Manure is Odorless -- 20 The Manager Who Is Moody -- 21 Managers Who Fail to Plan and Put Priorities on their Work -- 22 The Manager Who Lacks Emotion and Empathy -- 23 The Manager Who Hires Relatives into the Organization -- 24 The Manager Who Views Women as Being Limited to Pleasure, Breeding, and Menial Functions -- 25 The Manager Who Faithfully Practices the Art of Pessimism.

26 The Manager Who Steals Subordinates' Ideas -- 27 The Manager Whose Style and Authority are Based on Absolute Power -- 28 The Manager Who Seems Oblivious to What Is Happening -- 29 The Manager Who Loves to "Sack" Employees -- 30 The Manager Who Embarrasses Subordinates in the Presence of Others -- 31 The Manager Who Follows "Double Standards" in the Organization -- 32 The Manager Who Is a Religious or Racial Bigot -- Summary -- Appendix A. Employee Performance Evaluation -- RATING CODE DEFINITIONS -- PART I -- 1. KNOWLEDGE OF JOB -- 2. QUALITY OF WORK -- 3. QUANTITY OF WORK -- 4. ADAPTABILITY -- 5. ATTITUDE -- 6. DEPENDABILITY -- 7. JUDGMENT -- 8. INITIATIVE -- 9. CUSTOMER SERVICE (As Applicable) -- 10. MERCHANDISE KNOWLEDGE (As Applicable) -- 11. SALES PERFORMANCE (As Applicable) -- 12. APPEARANCE -- 13. ATTENDANCE -- PART II -- SUMMARY RATING -- PART III -- 1. DISPOSITION -- 2. RECOMMENDATIONS FOR TRAINING OR OTHER ACTION -- 3. REMARKS -- PART IV -- 1. REPORT OF INTERVIEW -- Appendix B. Security Vulnerability Survey -- I. GENERAL FUNCTION -- II. BUILDING & PERIMETER -- III. VEHICULAR MOVEMENT -- IV. LIGHTING -- V. LOCKING CONTROLS -- VI. ALARMS -- VII. GUARDS/SECURITY CONTROLS -- VIII. EMPLOYEE AND VISITOR CONTROLS -- IX. PRODUCT CONTROLS (Shipping and Receiving) -- X. MONEY CONTROLS -- XI. PROPRIETARY INFORMATION -- XII. OTHER VULNERABILITIES -- XIII. PERSONNEL SECURITY -- Appendix C. Selected Security-Related Organizations -- Appendix D. Suggested Security/Loss Prevention Reference Sources -- Index.
Özet:
Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. Working with a team of sterling contributors endowed with cutting-edge technological expertise, the book presents the most accurately balanced picture of a security manager's duties. Its Jackass Management cartoons also wittily illustrate the array of pitfalls a new manager must learn to avoid in order to lead effectively. In short, this timely revision of a classic text retains all the strengths that have helped the book endure over the decades and adds the latest resources to support professional development. * Includes a new chapter on the use of statistics as a security management tool * Contains complete updates to every chapter while retaining the outstanding organization of the previous editions * Recommended reading for The American Society for Industrial Security's (ASIS) Certified Protection Professional (CPP) exam.
Notlar:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Elektronik Erişim:
Click to View
Ayırtma: Copies: