LEADER 05441nam 22006734a 450 001 9910457321003321 005 20200520144314.0 010 $a1-281-05253-1 010 $a9786611052539 010 $a0-08-047682-1 035 $a(CKB)1000000000349869 035 $a(EBL)294060 035 $a(OCoLC)225369577 035 $a(SSID)ssj0000129767 035 $a(PQKBManifestationID)11937001 035 $a(PQKBTitleCode)TC0000129767 035 $a(PQKBWorkID)10079271 035 $a(PQKB)10144222 035 $a(MiAaPQ)EBC294060 035 $a(Au-PeEL)EBL294060 035 $a(CaPaEBR)ebr10186007 035 $a(CaONFJC)MIL105253 035 $a(EXLCZ)991000000000349869 100 $a20060420d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aContemporary security management$b[electronic resource] /$fJohn J. Fay 205 $a2nd ed. 210 $aAmsterdam ;$aBoston $cElsevier/Butterworth-Heinemann$dc2006 215 $a1 online resource (538 p.) 300 $aDescription based upon print version of record. 311 $a0-7506-7928-X 320 $aIncludes bibliographical references and index. 327 $aCover; Title page; Copyright page; Table of contents; 1. Historical Roots; INTRODUCTION; INDUSTRIAL REVOLUTION; Fertile Ground; Growth of Factories; Mass Production; SCIENTIFIC MANAGEMENT; HUMAN RELATIONS; OPERATIONS RESEARCH; AGE OF TECHNOLOGY; BUSINESS TODAY; SECURITY INDUSTRY; English Roots; Law Enforcement and Security; Terrorism; Security Marketplace; Guard Services; Professionalism; Technology; The Future; NOTES; 2. Strategy; BUSINESS STRATEGY; CORE AND SUPPORT ACTIVITIES; OUTSOURCING; OUTSOURCING AND THE SECURITY GROUP; Protecting Assets Under Altered Circumstances; Due Diligence 327 $aAmbiguous SpecificationsEFFECT OF STRATEGY ON SECURITY MANAGEMENT; Anticipate; Exposures; Magnitude; Complexity; TECHNICAL KNOWLEDGE; Access; Quality; Teamwork; STRATEGY AND RISK; Predict; Quantify; IMPERATIVES; Improve on Quality; Forge Close Links with Customers; Establish Close Relationships with Suppliers; Make Effective Use of Technology; Operate with Minimum Layers of Management; Continuously Improve the Security Staff; STRATEGIC PLANNING; Policy and Planning; The CSO and Strategic Planning; Business Is Like War; No Absolutes in Strategic Planning; Strategy and Change; NOTES; 3. Leading 327 $aINTRODUCTIONBuild a Vision; Enlist Followers; LEADERSHIP DEFINITIONS VARY; Complex and Subtle; Manager Versus Leader; Peter Principle; COMPETENCIES; Gain Attention; Set a Goal; Communicate the Message; Cultivate Trust; Develop Oneself; EMPOWERMENT; Contributing; Sharing Accomplishments; Energizing and Motivating; Conflicting Values; Quantity Versus Quality; Love of Work; FOLLOWERS; Taking Directions; Telling the Truth; Providing Feedback; LEADERS ADD VALUE; COMPETITION AMONG LEADERS; Ambition; Loyalty; PRICE OF LEADERSHIP; LEADING IN THE TWENTY-FIRST CENTURY; Build and Manage 327 $aKnow the LandscapeExpect the Best; Do Not Micromanage; Be Accessible; Focus on What Is Important; Point the Way; CONCLUSIONS; NOTES; 4. Organizing; STAFFING; Justify the Position; Identify Relevant Skills and Knowledge; Search for Qualified Candidates; Compare Candidates Against Job Requirements; Identify the Apparent Best Candidate; Conduct a Background Inquiry; Test the Apparent Best Candidate; Offer the Job; The Independent Contractor; ORGANIZING ACTIVITIES; ESTABLISHING OBJECTIVES; Group Objectives; Individual Objectives; ORGANIZING CONSISTENT WITH POLICIES; Obtaining Resources 327 $aThe People ResourceORGANIZING BEYOND BOUNDARIES; Assigning Tasks; Monitoring Performance; TERMINATING AN EMPLOYEE; Stunned Reaction; Psychological Trauma; Sorrow; Belligerence; Managing the Termination Interview; ORGANIZATIONAL STRUCTURES; Vertical Model; Network Model; Security Group Fit; NOTES; 5. Managing People; WORKING THROUGH PEOPLE; MASLOW'S THEORY; Physiological; Survival; Love; Self-esteem; Self-fulfillment; Curiosity; Key Tenets; Maslow in the Security Environment; PEOPLE DEVELOPMENT; Encourage; Expect Excellence; APPRAISING PERFORMANCE; Setting Targets; Target Qualities 327 $aFocus on Action Steps 330 $aContemporary Security Management serves as an indispensable working tool for students and security professionals at all levels of experience. It is designed to provide the hard facts on modern practices to efficiently and effectively run a security department and covers such vital topics as: leadership in management, employee relations, risk management and mitigation, terrorism, information security, access control, investigations, substance abuse, workplace violence and emergency management. New topics covered include terrorism and the new government mandate to perform standard vulnerability 606 $aPrivate security services 606 $aIndustries$xSecurity measures 606 $aPersonnel management 608 $aElectronic books. 615 0$aPrivate security services. 615 0$aIndustries$xSecurity measures. 615 0$aPersonnel management. 676 $a005.8 700 $aFay$b John$f1934-$01026988 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910457321003321 996 $aContemporary security management$92442183 997 $aUNINA