Security Operations Management
- 3rd Edition - September 11, 2015
- Author: Robert McCrie
- Language: English
- eBook ISBN:9 7 8 - 0 - 1 2 - 8 0 2 6 1 8 - 2
Security Operations Management, 3rd edition, is the latest edition the seminal reference on corporate security management operations for today’s security management profes… Read more
Purchase options
Institutional subscription on ScienceDirect
Request a sales quoteThe book explores the characteristics of today’s globalized workplaces, why security has a key role within them, and what the greatest concern are to security practitioners and senior managers. Incorporating the latest security research and best practices, updates to Security Operations Management 3rd edition include explorations of the key skills needed by security managers to demonstrate the value of their security program, greater emphasis on identifying and managing risk, and coverage of the latest technological advances in security control, command, communications, and computing. The third edition also delves more deeply than previous editions into online security training practices, as well as investigates the changing roles of women and minorities in security operations.
- Includes all-new cases and examples—including from outside the U.S.—providing coverage of both the business and technical aspects of security
- Offers increased coverage of cybercrime and workplace violence
- Explores the latest technological advances in security control, command, communications, and computing, and current techniques for how prospective security personnel are vetted, including how to use social media
- Prepares security professionals for professional certification exams
1) Security Directors and Managers, 2) Business professionals at all levels responsible for security operations and risk management in their firm, 3) Security Management upper level undergraduate and graduate students.
- Acknowledgments
- Part I: General Managerial Fundamentals and Competencies
- 1: Security Operations in the Management Environment
- Abstract
- Organizations and Managers
- What Is the Purpose of an Executive?
- What Is the Strategy of Management?
- Characteristics of Modern Organizations
- Scientific Management Pioneers
- Security Management Precedent Setters
- Organizations and Security
- Government Security Operations
- Layers of Management
- Security in the Organizational Hierarchy
- Structure of a Complex Security Department
- Ethics and Security Operations
- Summary
- Discussion and Review
- 2: Core Competencies to Create Effective Protection Programs
- Abstract
- Core Competencies of Security Operations
- A Brief History of a Growing Field
- How Contemporary Security Services Have Evolved
- What Drives Security Operations?
- The Growth of the Modern Protective Industry
- How Security Executives Rank Priorities
- Specific Concerns for Different Industries
- Summary
- Discussion and Review
- 3: Staffing to Meet Protective Goals
- Abstract
- Personnel Planning
- Job Descriptions
- Negligent Hiring Litigation
- The Vetting Process
- Summary
- Discussion and Review
- 4: Training and Development for High Performance
- Abstract
- Why Train Anyhow?
- The Training Manager
- Planning Training and Development Requirements
- That Critical Phase of Orientation
- Training Content for New Security Employees
- Training Techniques
- Ongoing “In-Service” Training
- The Importance of Reducing Risk in Confrontations
- Emergency and Fire Prevention Training
- Security Training for Nonsecurity Personnel
- Training for Trainers and Supervisors
- Development and Education for Managers and Executives
- Measuring Effectiveness
- Summary
- Discussion and Review
- 5: Supporting and Motivating Supervisors and Staff
- Abstract
- Supporting Supervisors and Staff
- Safety at Work: The Responsibility of Supervisors
- Why Be a Supervisor, Anyway?
- Why Some People are Not Cut Out to be Supervisors
- Duties of Employees to Supervisors and the Workplace
- Motivating Supervisors and Staff
- Time Management for Supervisors and Managers
- The Complexity of Motivation
- The Limitations of Motivation Research
- Summary
- Discussion and Review
- 1: Security Operations in the Management Environment
- Part II: Special Issues in Security Management Operations
- 6: Appraising and Promoting People in Security Programs
- Abstract
- The Difficulties of Performance Appraisal
- Who Should Be Appraised and When?
- Appraisal for All Levels and by All Levels
- What Types of Evaluation Do Workers Prefer?
- What Needs to Be Evaluated and How?
- Using a Formal Appraisal Document
- Job Performance Rating: Creating the Documentation
- The Need for Appraisal Documentation and its Protection
- Other Written Appraisal Techniques
- The Appraisal Interview
- Assessing Performance Among Different Employment Levels
- Reviewing Management Strategy
- Examples of MBO in Security Applications
- Performance Reviews for Senior Management
- The Limitations of Appraisals
- The Promotion Process
- What’s Wrong with Promotion?
- Why Promotions are Important
- Summary
- Discussion and Review
- 7: Discipline and Discharge
- Abstract
- Why Some Employees Fail to Achieve Desired Standards
- The Psychological Basis of Noncompliance
- Why Some Supervisors Do Not Discipline Well
- Human Relations–Oriented Managers
- Progressive Discipline to Save Weak Workers
- Why Employees Are Disciplined
- Legal Issues for Wrongful Discharge
- Special Defenses Against Discharge
- Legal Cases of Proper and Improper Discharges
- Insurance Against Wrongful Termination
- Procedures at the Time of Dismissal
- The Exit Interview
- Dismissal and the Disgruntled Employee
- Workplace Bullying and Disruptive Behavior Prevention
- Using Employee Assistance Programs for Aiding Workers
- T.I.M.E. is Not on Your Side
- Summary
- Discussion and Review
- 8: Accounting Controls and Budgeting
- Abstract
- Financial Controls in the Organization
- Budgeting for a Security Department
- The Goals of the Corporation: Profits
- When Senior Management Seeks to Cut Security Spending
- Security as a Profit Center
- Forensic Safeguards to Internal Fraud
- Summary
- Discussion and Review
- 9: Operating Personnel-Intensive Programs
- Abstract
- The Proprietary/Contract Employee Debate
- Core Expectations of Security Officers
- Proprietary Security Strategy
- Contract Security Services
- Selecting Contract Security Services
- Retaining Services of Private Investigators and Consultants
- Contracting for Alarm Monitoring Services
- Purchasing Security Services Through Internet Proposals
- Summary
- Discussion and Review
- 10: Operating Physical Security- and Technology-Centered Programs
- Abstract
- Situational Crime Prevention: A Strategy of Crime Reduction
- The Risk Versus Cost Ratio
- Why Physical Security Is Important
- Selecting Security Countermeasures to Reduce Loss
- Designing Security Systems
- Summary
- Discussion and Review
- 11: Global Leadership for Optimal Security Operations
- Abstract
- Learning About Leadership
- What Is Distinctive About Leadership for Security Operations?
- Critical Leadership Issues for Security Operations Managers
- Other Issues Concerning Security Operations Managers
- The Future Direction of Security Operations
- Summary
- Discussion and Review
- 6: Appraising and Promoting People in Security Programs
- Appendix A: Contact Information for Security Organizations
- Appendix B: Code of Ethics of ASIS International
- Appendix C: The MBA Oath
- Appendix D: Selected Security Standards
- Glossary
- Subject Index
- No. of pages: 464
- Language: English
- Edition: 3
- Published: September 11, 2015
- Imprint: Butterworth-Heinemann
- eBook ISBN: 9780128026182
RM
Robert McCrie
He has been associated with John Jay College since the 1970’s. He joined the faculty in 1985, moving up the ranks to full professor and serving as chair of one of the largest departments, Law, Police Science and Criminal Justice Administration from 1997-2003. He later helped found his current department.