Vai al contenuto principale della pagina
Autore: | McCrie Robert D |
Titolo: | Security operations management [[electronic resource] /] / Robert D. McCrie |
Pubblicazione: | Amsterdam ; ; Boston, : Butterworth-Heinemann, an imprint of Elsevier, 2007 |
Edizione: | 2nd ed. |
Descrizione fisica: | 1 online resource (411 p.) |
Disciplina: | 363.289 |
658.47 | |
Soggetto topico: | Private security services - Management |
Security systems - Management | |
Soggetto genere / forma: | Electronic books. |
Note generali: | Description based upon print version of record. |
Nota di bibliografia: | Includes bibliographical references and index. |
Nota di contenuto: | Front cover; Title page; Copyright page; Table of Contents; Preface; Acknowledgments; Part I: General Fundamentals and Competencies; Chapter 1: Security Operations in the Management Environment; ORGANIZATIONS AND MANAGERS; A POINT ABOUT TITLES; WHAT IS THE PURPOSE OF AN EXECUTIVE?; WHAT IS THE STRATEGY OF MANAGEMENT?; THE CHARACTERISTICS OF MODERN ORGANIZATIONS; HOW ORGANIZATIONS ARE STRUCTURED; GOVERNMENT SECURITY OPERATIONS; LAYERS OF MANAGEMENT; SECURITY IN THE ORGANIZATIONAL HIERARCHY; STRUCTURE OF A COMPLEX SECURITY DEPARTMENT; ETHICS AND SECURITY OPERATIONS; SUMMARY |
DISCUSSION AND REVIEWENDNOTES; ADDITIONAL REFERENCES; Chapter 2: Core Competencies to Initiate Effective Protection Programs; CORE COMPETENCIES OF SECURITY OPERATIONS; HOW CONTEMPORARY SECURITY SERVICES HAVE EVOLVED; WHAT DRIVES SECURITY OPERATIONS?; A BRIEF HISTORY OF A GROWING FIELD; THE GROWTH OF THE MODERN PROTECTIVE INDUSTRY; HOW SECURITY EXECUTIVES RANK PRIORITIES; SPECIFIC CONCERNS FOR DIFFERENT INDUSTRIES; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 3: Staffing to Meet Protective Goals; PERSONNEL PLANNING; JOB DESCRIPTIONS; NEGLIGENT HIRING LITIGATION | |
THE VETTING PROCESSSUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 4: Training and Development for High Performance; WHY TRAIN, ANYHOW?; THE TRAINING MANAGER OF OFFICER; PLANNING TRAINING AND DEVELOPMENT REQUIREMENTS; THE ORIENTATION; TRAINING TECHNIQUES; FIREARMS TRAINING; ONGOING "IN-SERVICE" TRAINING; SECURITY TRAINING FOR NONSECURITY PERSONNEL; TRAINING FOR TRAINERS AND SUPERVISORS; DEVELOPMENT AND EDUCATION FOR MANAGERS AND EXECUTIVES; MEASURING EFFECTIVENESS; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES | |
Chapter 5: Supporting and Motivating Supervisors and StaffSUPPORTING SUPERVISORS AND STAFF; SAFETY AT WORK: THE RESPONSIBILITY OF SUPERVISORS; WHY BE A SUPERVISOR, ANYWAY?; DUTIES OF EMPLOYEES TO SUPERVISORS AND THE WORKPLACE; MOTIVATING SUPERVISORS AND STAFF; TIME MANAGEMENT FOR SUPERVISORS AND MANAGERS; THE COMPLEXITY OF MOTIVATION; THE LIMITATIONS OF MOTIVATION RESEARCH; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 6: Appraising and Promoting People in Security Programs; THE DIFFICULTIES OF PERFORMANCE APPRAISAL; WHO SHOULD BE APPRAISED AND WHEN? | |
APPRAISAL FOR ALL LEVELS AND BY ALL LEVELSWHAT TYPES OF EVALUATION DO WORKERS PREFER?; WHAT NEEDS TO BE EVALUATED?; USING A FORMAL APPRAISAL DOCUMENT; JOB PERFORMANCE RATING; THE NEED FOR APPRAISAL DOCUMENTATION; OTHER WRITTEN APPRAISAL TECHNIQUES; THE APPRAISAL INTERVIEW; ASSESSING PERFORMANCE AMONG DIFFERENT EMPLOYMENT LEVELS; REVIEWING MANAGEMENT STRATEGY; PERFORMANCE REVIEWS FOR SENIOR MANAGEMENT; THE LIMITATIONS OF APPRAISALS; THE PROMOTION PROCESS; WHAT'S WRONG WITH PROMOTION?; WHY PROMOTIONS ARE IMPORTANT; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES | |
Part II: Special Issues in Security Management | |
Sommario/riassunto: | The second edition of Security Operations Management continues as the seminal reference on corporate security management operations. Revised and updated, topics covered in depth include: access control, selling the security budget upgrades to senior management, the evolution of security standards since 9/11, designing buildings to be safer from terrorism, improving relations between the public and private sectors, enhancing security measures during acute emergencies, and, finally, the increased security issues surrounding the threats of terrorism and cybercrime. An ideal reference for |
Titolo autorizzato: | Security operations management |
ISBN: | 1-280-75202-5 |
9786610752027 | |
0-08-046949-3 | |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910457300903321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |