LEADER 05456nam 2200685Ia 450 001 9910816333203321 005 20200520144314.0 010 $a1-280-75202-5 010 $a9786610752027 010 $a0-08-046949-3 035 $a(CKB)1000000000349895 035 $a(EBL)285823 035 $a(OCoLC)225369504 035 $a(SSID)ssj0000243273 035 $a(PQKBManifestationID)12052396 035 $a(PQKBTitleCode)TC0000243273 035 $a(PQKBWorkID)10320513 035 $a(PQKB)11224430 035 $a(PQKBManifestationID)16031886 035 $a(PQKB)22174893 035 $a(OCoLC)795012817 035 $a(MiAaPQ)EBC285823 035 $a(CaSebORM)9780750678827 035 $a(OCoLC)824969647 035 $a(OCoLC)ocn824969647 035 $a(EXLCZ)991000000000349895 100 $a20061215d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity operations management /$fRobert D. McCrie 205 $a2nd ed. 210 $aAmsterdam ;$aBoston $cButterworth-Heinemann, an imprint of Elsevier$d2007 215 $a1 online resource (411 p.) 300 $aDescription based upon print version of record. 311 $a0-12-802618-9 311 $a0-7506-7882-8 320 $aIncludes bibliographical references and index. 327 $aFront cover; Title page; Copyright page; Table of Contents; Preface; Acknowledgments; Part I: General Fundamentals and Competencies; Chapter 1: Security Operations in the Management Environment; ORGANIZATIONS AND MANAGERS; A POINT ABOUT TITLES; WHAT IS THE PURPOSE OF AN EXECUTIVE?; WHAT IS THE STRATEGY OF MANAGEMENT?; THE CHARACTERISTICS OF MODERN ORGANIZATIONS; HOW ORGANIZATIONS ARE STRUCTURED; GOVERNMENT SECURITY OPERATIONS; LAYERS OF MANAGEMENT; SECURITY IN THE ORGANIZATIONAL HIERARCHY; STRUCTURE OF A COMPLEX SECURITY DEPARTMENT; ETHICS AND SECURITY OPERATIONS; SUMMARY 327 $aDISCUSSION AND REVIEWENDNOTES; ADDITIONAL REFERENCES; Chapter 2: Core Competencies to Initiate Effective Protection Programs; CORE COMPETENCIES OF SECURITY OPERATIONS; HOW CONTEMPORARY SECURITY SERVICES HAVE EVOLVED; WHAT DRIVES SECURITY OPERATIONS?; A BRIEF HISTORY OF A GROWING FIELD; THE GROWTH OF THE MODERN PROTECTIVE INDUSTRY; HOW SECURITY EXECUTIVES RANK PRIORITIES; SPECIFIC CONCERNS FOR DIFFERENT INDUSTRIES; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 3: Staffing to Meet Protective Goals; PERSONNEL PLANNING; JOB DESCRIPTIONS; NEGLIGENT HIRING LITIGATION 327 $aTHE VETTING PROCESSSUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 4: Training and Development for High Performance; WHY TRAIN, ANYHOW?; THE TRAINING MANAGER OF OFFICER; PLANNING TRAINING AND DEVELOPMENT REQUIREMENTS; THE ORIENTATION; TRAINING TECHNIQUES; FIREARMS TRAINING; ONGOING "IN-SERVICE" TRAINING; SECURITY TRAINING FOR NONSECURITY PERSONNEL; TRAINING FOR TRAINERS AND SUPERVISORS; DEVELOPMENT AND EDUCATION FOR MANAGERS AND EXECUTIVES; MEASURING EFFECTIVENESS; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES 327 $aChapter 5: Supporting and Motivating Supervisors and StaffSUPPORTING SUPERVISORS AND STAFF; SAFETY AT WORK: THE RESPONSIBILITY OF SUPERVISORS; WHY BE A SUPERVISOR, ANYWAY?; DUTIES OF EMPLOYEES TO SUPERVISORS AND THE WORKPLACE; MOTIVATING SUPERVISORS AND STAFF; TIME MANAGEMENT FOR SUPERVISORS AND MANAGERS; THE COMPLEXITY OF MOTIVATION; THE LIMITATIONS OF MOTIVATION RESEARCH; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 6: Appraising and Promoting People in Security Programs; THE DIFFICULTIES OF PERFORMANCE APPRAISAL; WHO SHOULD BE APPRAISED AND WHEN? 327 $aAPPRAISAL FOR ALL LEVELS AND BY ALL LEVELSWHAT TYPES OF EVALUATION DO WORKERS PREFER?; WHAT NEEDS TO BE EVALUATED?; USING A FORMAL APPRAISAL DOCUMENT; JOB PERFORMANCE RATING; THE NEED FOR APPRAISAL DOCUMENTATION; OTHER WRITTEN APPRAISAL TECHNIQUES; THE APPRAISAL INTERVIEW; ASSESSING PERFORMANCE AMONG DIFFERENT EMPLOYMENT LEVELS; REVIEWING MANAGEMENT STRATEGY; PERFORMANCE REVIEWS FOR SENIOR MANAGEMENT; THE LIMITATIONS OF APPRAISALS; THE PROMOTION PROCESS; WHAT'S WRONG WITH PROMOTION?; WHY PROMOTIONS ARE IMPORTANT; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES 327 $aPart II: Special Issues in Security Management 330 $aThe second edition of Security Operations Management continues as the seminal reference on corporate security management operations. Revised and updated, topics covered in depth include: access control, selling the security budget upgrades to senior management, the evolution of security standards since 9/11, designing buildings to be safer from terrorism, improving relations between the public and private sectors, enhancing security measures during acute emergencies, and, finally, the increased security issues surrounding the threats of terrorism and cybercrime. An ideal reference for 606 $aPrivate security services$xManagement 606 $aSecurity systems$xManagement 615 0$aPrivate security services$xManagement. 615 0$aSecurity systems$xManagement. 676 $a363.28/9068 700 $aMcCrie$b Robert D$01607676 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910816333203321 996 $aSecurity operations management$93934045 997 $aUNINA