1.

Record Nr.

UNINA9910784364803321

Autore

Fay John <1934->

Titolo

Contemporary security management [[electronic resource] /] / John J. Fay

Pubbl/distr/stampa

Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2006

ISBN

1-281-05253-1

9786611052539

0-08-047682-1

Edizione

[2nd ed.]

Descrizione fisica

1 online resource (538 p.)

Disciplina

005.8

Soggetti

Private security services

Industries - Security measures

Personnel management

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Cover; Title page; Copyright page; Table of contents; 1. Historical Roots; INTRODUCTION; INDUSTRIAL REVOLUTION; Fertile Ground; Growth of Factories; Mass Production; SCIENTIFIC MANAGEMENT; HUMAN RELATIONS; OPERATIONS RESEARCH; AGE OF TECHNOLOGY; BUSINESS TODAY; SECURITY INDUSTRY; English Roots; Law Enforcement and Security; Terrorism; Security Marketplace; Guard Services; Professionalism; Technology; The Future; NOTES; 2. Strategy; BUSINESS STRATEGY; CORE AND SUPPORT ACTIVITIES; OUTSOURCING; OUTSOURCING AND THE SECURITY GROUP; Protecting Assets Under Altered Circumstances; Due Diligence

Ambiguous SpecificationsEFFECT OF STRATEGY ON SECURITY MANAGEMENT; Anticipate; Exposures; Magnitude; Complexity; TECHNICAL KNOWLEDGE; Access; Quality; Teamwork; STRATEGY AND RISK; Predict; Quantify; IMPERATIVES; Improve on Quality; Forge Close Links with Customers; Establish Close Relationships with Suppliers; Make Effective Use of Technology; Operate with Minimum Layers of Management; Continuously Improve the Security Staff; STRATEGIC PLANNING; Policy and Planning; The CSO and Strategic Planning; Business Is Like War; No Absolutes in Strategic Planning; Strategy and



Change; NOTES; 3. Leading

INTRODUCTIONBuild a Vision; Enlist Followers; LEADERSHIP DEFINITIONS VARY; Complex and Subtle; Manager Versus Leader; Peter Principle; COMPETENCIES; Gain Attention; Set a Goal; Communicate the Message; Cultivate Trust; Develop Oneself; EMPOWERMENT; Contributing; Sharing Accomplishments; Energizing and Motivating; Conflicting Values; Quantity Versus Quality; Love of Work; FOLLOWERS; Taking Directions; Telling the Truth; Providing Feedback; LEADERS ADD VALUE; COMPETITION AMONG LEADERS; Ambition; Loyalty; PRICE OF LEADERSHIP; LEADING IN THE TWENTY-FIRST CENTURY; Build and Manage

Know the LandscapeExpect the Best; Do Not Micromanage; Be Accessible; Focus on What Is Important; Point the Way; CONCLUSIONS; NOTES; 4. Organizing; STAFFING; Justify the Position; Identify Relevant Skills and Knowledge; Search for Qualified Candidates; Compare Candidates Against Job Requirements; Identify the Apparent Best Candidate; Conduct a Background Inquiry; Test the Apparent Best Candidate; Offer the Job; The Independent Contractor; ORGANIZING ACTIVITIES; ESTABLISHING OBJECTIVES; Group Objectives; Individual Objectives; ORGANIZING CONSISTENT WITH POLICIES; Obtaining Resources

The People ResourceORGANIZING BEYOND BOUNDARIES; Assigning Tasks; Monitoring Performance; TERMINATING AN EMPLOYEE; Stunned Reaction; Psychological Trauma; Sorrow; Belligerence; Managing the Termination Interview; ORGANIZATIONAL STRUCTURES; Vertical Model; Network Model; Security Group Fit; NOTES; 5. Managing People; WORKING THROUGH PEOPLE; MASLOW'S THEORY; Physiological; Survival; Love; Self-esteem; Self-fulfillment; Curiosity; Key Tenets; Maslow in the Security Environment; PEOPLE DEVELOPMENT; Encourage; Expect Excellence; APPRAISING PERFORMANCE; Setting Targets; Target Qualities

Focus on Action Steps

Sommario/riassunto

Contemporary Security Management serves as an indispensable working tool for students and security professionals at all levels of experience. It is designed to provide the hard facts on modern practices to efficiently and effectively run a security department and covers such vital topics as: leadership in management, employee relations, risk management and mitigation, terrorism, information security, access control, investigations, substance abuse, workplace violence and emergency management. New topics covered include terrorism and the new government mandate to perform standard vulnerability