Vai al contenuto principale della pagina

Security operations management [[electronic resource] /] / Robert D. McCrie



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: McCrie Robert D Visualizza persona
Titolo: Security operations management [[electronic resource] /] / Robert D. McCrie Visualizza cluster
Pubblicazione: Amsterdam ; ; Boston, : Butterworth-Heinemann, an imprint of Elsevier, 2007
Edizione: 2nd ed.
Descrizione fisica: 1 online resource (411 p.)
Disciplina: 363.289
658.47
Soggetto topico: Private security services - Management
Security systems - Management
Soggetto genere / forma: Electronic books.
Note generali: Description based upon print version of record.
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Front cover; Title page; Copyright page; Table of Contents; Preface; Acknowledgments; Part I: General Fundamentals and Competencies; Chapter 1: Security Operations in the Management Environment; ORGANIZATIONS AND MANAGERS; A POINT ABOUT TITLES; WHAT IS THE PURPOSE OF AN EXECUTIVE?; WHAT IS THE STRATEGY OF MANAGEMENT?; THE CHARACTERISTICS OF MODERN ORGANIZATIONS; HOW ORGANIZATIONS ARE STRUCTURED; GOVERNMENT SECURITY OPERATIONS; LAYERS OF MANAGEMENT; SECURITY IN THE ORGANIZATIONAL HIERARCHY; STRUCTURE OF A COMPLEX SECURITY DEPARTMENT; ETHICS AND SECURITY OPERATIONS; SUMMARY
DISCUSSION AND REVIEWENDNOTES; ADDITIONAL REFERENCES; Chapter 2: Core Competencies to Initiate Effective Protection Programs; CORE COMPETENCIES OF SECURITY OPERATIONS; HOW CONTEMPORARY SECURITY SERVICES HAVE EVOLVED; WHAT DRIVES SECURITY OPERATIONS?; A BRIEF HISTORY OF A GROWING FIELD; THE GROWTH OF THE MODERN PROTECTIVE INDUSTRY; HOW SECURITY EXECUTIVES RANK PRIORITIES; SPECIFIC CONCERNS FOR DIFFERENT INDUSTRIES; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 3: Staffing to Meet Protective Goals; PERSONNEL PLANNING; JOB DESCRIPTIONS; NEGLIGENT HIRING LITIGATION
THE VETTING PROCESSSUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 4: Training and Development for High Performance; WHY TRAIN, ANYHOW?; THE TRAINING MANAGER OF OFFICER; PLANNING TRAINING AND DEVELOPMENT REQUIREMENTS; THE ORIENTATION; TRAINING TECHNIQUES; FIREARMS TRAINING; ONGOING "IN-SERVICE" TRAINING; SECURITY TRAINING FOR NONSECURITY PERSONNEL; TRAINING FOR TRAINERS AND SUPERVISORS; DEVELOPMENT AND EDUCATION FOR MANAGERS AND EXECUTIVES; MEASURING EFFECTIVENESS; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES
Chapter 5: Supporting and Motivating Supervisors and StaffSUPPORTING SUPERVISORS AND STAFF; SAFETY AT WORK: THE RESPONSIBILITY OF SUPERVISORS; WHY BE A SUPERVISOR, ANYWAY?; DUTIES OF EMPLOYEES TO SUPERVISORS AND THE WORKPLACE; MOTIVATING SUPERVISORS AND STAFF; TIME MANAGEMENT FOR SUPERVISORS AND MANAGERS; THE COMPLEXITY OF MOTIVATION; THE LIMITATIONS OF MOTIVATION RESEARCH; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 6: Appraising and Promoting People in Security Programs; THE DIFFICULTIES OF PERFORMANCE APPRAISAL; WHO SHOULD BE APPRAISED AND WHEN?
APPRAISAL FOR ALL LEVELS AND BY ALL LEVELSWHAT TYPES OF EVALUATION DO WORKERS PREFER?; WHAT NEEDS TO BE EVALUATED?; USING A FORMAL APPRAISAL DOCUMENT; JOB PERFORMANCE RATING; THE NEED FOR APPRAISAL DOCUMENTATION; OTHER WRITTEN APPRAISAL TECHNIQUES; THE APPRAISAL INTERVIEW; ASSESSING PERFORMANCE AMONG DIFFERENT EMPLOYMENT LEVELS; REVIEWING MANAGEMENT STRATEGY; PERFORMANCE REVIEWS FOR SENIOR MANAGEMENT; THE LIMITATIONS OF APPRAISALS; THE PROMOTION PROCESS; WHAT'S WRONG WITH PROMOTION?; WHY PROMOTIONS ARE IMPORTANT; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES
Part II: Special Issues in Security Management
Sommario/riassunto: The second edition of Security Operations Management continues as the seminal reference on corporate security management operations. Revised and updated, topics covered in depth include: access control, selling the security budget upgrades to senior management, the evolution of security standards since 9/11, designing buildings to be safer from terrorism, improving relations between the public and private sectors, enhancing security measures during acute emergencies, and, finally, the increased security issues surrounding the threats of terrorism and cybercrime. An ideal reference for
Titolo autorizzato: Security operations management  Visualizza cluster
ISBN: 1-280-75202-5
9786610752027
0-08-046949-3
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910457300903321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui