Book description
The International Foundation for Protection Officers (IFPO) has for many years provided materials to support its certification programs. The current edition of this book is being used as the core text for the Security Supervision and Management Training/Certified in Security Supervision and Management (CSSM) Program at IFPO. The CSSM is unique and was designed in 1988 to meet the needs of the security supervisor or senior protection officer. The book has enjoyed tremendous acceptance and success in the past, but after seven years, it has become dated. The changes, vetted by IFPO, make the third edition more current and relevant.Updates include 14 new chapters, 3 completely revised chapters, "Student Performance Objectives" added to each chapter, and added information on related resources (both print and online).
* Completion of the Security Supervision and Management Program is the initial step toward the Certified in Security Supervision and Management (CSSM) designation
* Over 40 experienced security professionals contribute chapters in their area of specialty
* Revised throughout, and completely updated with 14 new chapters on topics such as Leadership, Homeland Security, Strategic Planning and Management, Budget Planning, Career Planning, and much more.
* Quizzes at the end of each chapter allow for self testing or enhanced classroom work
Table of contents
- Front Cover
- Security Supervision and Management The Theory and Practice of Asset Protection
- Copyright Page
- Table of Contents (1/2)
- Table of Contents (2/2)
- Introduction (1/4)
- Introduction (2/4)
- Introduction (3/4)
- Introduction (4/4)
- Unit I: Security and Asset Protection Principles
-
Unit II: Human Resource Management
- Unit II–1: Recruitment and Retention of Security Personnel: Understanding and Meeting the Challenge
- Unit II–2: Security Personnel Selection
- Unit II–3: Supervisory Characteristics and Expectations
- Unit II–4: Evaluation of Uniformed Protection Officers
- Unit II–5: Employee Motivation Theory and Application
- Unit II–6: Employee Discipline: Policy and Practice
- Unit II–7: Human Reliability
-
Unit III: Supervision
- Unit III–1: Personnel Deployment
- Unit III–2: Dealing with Difficult Employees
- Unit III–3: The Supervisor’s Role in Handling Complaints and Grievances
-
Unit III–4: Unethical Acts by Security Officers
- The Problem
- Leadership, Courage, and Preventing Corruption
- Why Unethical Acts Occur in the Security Profession
- Leadership Commitment for Change
- Training Security Officers to Make Ethics-Related Decisions
- Rational Thinking for Ethical Decisions
- Making the Ethical Decision
- Ethical Training Scenaros
- The Corruption Prevention Process
- Conclusions
- Unethical Acts by Security Officers
- Appendix A: A Model for Ethical Decision Making
- Unit III–5: Interpersonal Communications
-
Unit IV: Training and Development
-
Unit IV–1: Training: Strategies, Tactics, and Challenges for Protection Managers
- Defining Training
- Benefits of Training
- Determining Training Needs
- Types of Training
- Roles of Supervisory Personnel in Training
- Problems in Training
- The Definitional Dilemma
- The Frog
- Bad Medicine
- The Assessment Ass
- The Budget Buster
- Roleaids
- Toad Training
- Mr. Unique
- Marketing
- The Profiteer
- Conclusion
- Endnotes
- Training: Strategies, Tactics and Challenges for Protection Managers
- Unit IV–2: Orientation for Security Officers
- Unit IV–3: Staff Training and Development
- Unit IV–4: Curriculum Design
-
Unit IV–5: Professional Certifi cations: Milestones of Professionalism
- The Individual Professional
- Benefits of Professional Certification to Society
- Benefits of Professional Certification to Employers, Clients, or Students
- Benefits of Professional Certification to the Individual
- The Responsibility of Being a Leader in Security
- Professional Security Organizations
- Professional Certifications: Milestones of Professionalism
-
Unit IV–1: Training: Strategies, Tactics, and Challenges for Protection Managers
-
Unit V: Management and Leadership
- Unit V–1: Evolution of Management
- Unit V–2: Time and Stress Management
- Unit V–3: Project Management: An Overview
- Unit V–4: Company Policy and Procedures: The Security Supervisor’s Primer
- Unit V–5: Total Quality Management
-
Unit V–6: Leadership for Protection Professionals
- Leadership in the Security Industry
- Traditional and Contemporary Security Management Competencies (1/4)
- Traditional and Contemporary Security Management Competencies (2/4)
- Traditional and Contemporary Security Management Competencies (3/4)
- Traditional and Contemporary Security Management Competencies (4/4)
- Conclusion
- Bibliography
- Leadership for Protection Professionals Quiz Questions
-
Unit VI: Risk Management and Emergency Management
- Unit VI–1: Risk Management
-
Unit VI–2: Why Accidents Happen: The Theories of Causation
- Heinrich’s Domino Theory
- Ferrell’s Human Factor Model
- Petersen’s Accident/Incident Model
- The Epidemiological Approach
- Systems Models
- The Integration of Theories and General Program Implications
- Adapting Accident Causation to Specific Environments
- The Future of Accidents and Accident Causation
- References
- Quiz
- Unit VI–3: The Supervisor’s Role in Safety
- Unit VI–4: Workplace Violence
- Unit VI–5: Critical Incident Management in the Post-9/11 Era
- Unit VI–6: Supervising During Emergencies
-
Unit VI–7: Supervising During Special Events
- Assessment
- Access Control
- Communications
- Traffic Control
- Emergency Medical Operations
- Evacuation
- Fixed Posts
- Assigning Security Officer’s Posts
- Pre-event Briefings
- Talking to Crowds
- Post-event Briefing
- Selection
- Recruitment
- Applications/Interviewing
- Testing
- Training: A Supervisor’s Responsibility to the Employee
- Hazardous materials
- Delivering Instruction
- Equipment
- Conclusion
- Bibliography
- For More Information
- Supervising During Special Events
- Unit VI–8: Security and Medical Response
- Unit VI–9: Outsourcing in Security
- Unit VI–10: Internal Loss
-
Unit VII: Physical Security and Technology
- Unit VII–1: Security Systems Design and Evaluation
- Unit VII–2: Statistical Analysis
-
Unit VII–3: Security Technologies
- Introduction
- Security Systems Integration
- Computer Basics and Enterprise Systems
- Electronic Access Control Basics
- CCTV Systems Basics
- Fire Safety/Life Safety and Nonsecurity Systems
- How and Where to Learn More about Security Systems Integration and High Technology Tools
- Bibliography
- Security Technologies
- Unit VII–4: High-Technology Theft
- Unit VII–5: Designing Operations Control Centers
- Unit VIII: Investigation
-
Unit IX: Customer, Client and Community Relations
- Unit IX–1: Customer Service and the Protection Officer: Guidelines to Achieving Excellence
- Unit IX–2: The Supervisor’s Role in Improving Customer Service
- Unit IX–3: Tenant Relations (1/2)
- Unit IX–3: Tenant Relations (2/2)
- Unit IX–4: Uniforms and Image Projection for Protection Forces
-
Unit IX–5: The Relationship Between Marketing and the Security Function
- Introduction
- Security Market Needs
- The Concept of Services Marketing
- Security Services Marketing
- Selling the Security Service
- Mission Statement
- The Customer—Security Service Interface
- The Security Survey
- Summary
- The Ten Commandments of Marketing
- Bibliography
- Periodicals
- Marketing the Security Function
- Unit IX–6: Crime Prevention and Community Relations Strategies
- Unit IX–7: Public–Private Sector Liaison Programs
-
Unit X: Legal Aspects
-
Unit X–1: Legal Aspects of Security
- Introduction
- Key Terms and Concepts
- Arrest and Detention
- Detention
- Considerations Regarding the Use of Force
- Civil Liability
- Intentional Torts
- Criminal Law and Criminal Liability
- Trespassing
- Labor Law, Discipline, and Dismissal
- Legal Standards Regarding Privacy
- Administrative Law
- Audits
- Interrogation
- Search and Seizure
- Regulations Governing the Security Industry
- Standards
- Giving Depositions and Testifying in Legal and Quasi-Legal Proceedings
- Bibliography
- Legal Aspects of Security
- Unit X–2: Managing/Supervising to Reduce Liability
- Unit X–3: Sexual Harassment
-
Unit X–1: Legal Aspects of Security
Product information
- Title: Security Supervision and Management, 3rd Edition
- Author(s):
- Release date: November 2007
- Publisher(s): Butterworth-Heinemann
- ISBN: 9780080553993
You might also like
book
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information …
book
Mastering Information Security Compliance Management
Strengthen your ability to implement, assess, evaluate, and enhance the effectiveness of information security controls based …
book
Information Security Handbook
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, …
book
Information Security Handbook
Implement information security effectively as per your organization's needs. About This Book Learn to build your …