Chapter 4
Crime Analysis
In this chapter...
Statistics for Security Management
Crime Triangle
Purpose of Crime Analysis
Data Sources
Law Enforcement Data versus Social Disorder Models
Advantages of Law Enforcement Data
Geographic Levels
Methodology
Return on Security Investment
51
TAG's Risk Assessment Process
®
Asset
Identification
Current
Security
Measures
Policies &
Procedures
Physical
Security
Security
Personnel
Threat
Assessment
Vulnerability
Assessment
Risk
Assessment
Cost
Benefit
Analysis
Report and
Recommendations
Crime
Analysis
Figure 4-1.
Strategic Risk Assessment Process, Copyright ©2007 by Threat Analysis Group,
LLC. Used by permission. Additional information available from Threat
Analysis Group, LLC via www.threatanalysis.com.

Get Strategic Security Management now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.