Security & Loss Prevention: An Introduction

advertisement
Security & Loss Prevention:
An Introduction
5th Edition
Philip Purpura
Part 1
INTRODUCTION TO
SECURITY AND
LOSS
PREVENTION
Chapter 1
The History of
Security and Loss
Prevention: A Critical
Perspective
Chapter 1
WHY CRITICAL THINKING?
 HOW CAN WE THINK CRITICALLY?
 WHY THINK CRITICALLY ABOUT THE
HISTORY OF SECURITY AND LOSS
PREVENTION?
 SECURITY AND LOSS PREVENTION
DEFINED

Chapter 1

HISTORY
–

Why Study the History of Security and
Loss Prevention?
EARLY CIVILIZATIONS
–
–
–
Ancient Greece
Ancient Rome
The Middle Ages in Europe
Chapter 1

MORE CONTEMPORARY TIMES
–
–
–
–
–
–
England
Early America
The Growth of Policing
The Growth of Security Companies
Railroads and Labor Unions
The Great Wars
Chapter 1
–
–
–
–
The Third Wave
Convergence of IT and Physical Security
Convergence of Enterprise Security
21st Century/Post-9/11 Security
Challenges
Chapter 2
The Business, Careers,
and Challenges of
Security and Loss
Prevention
Chapter 2
INTRODUCTION
 METRICS

–
–

Internal Metrics
External Metrics
THE SECURITY INDUSTRY
–
Contract versus Proprietary Security
Chapter 2
CAREERS: LOSS PREVENTION
SERVICES AND SPECIALISTS
 THE LIMITATIONS OF THE CRIMINAL
JUSTICE SYSTEM: IMPLICATIONS
FOR LOSS PREVENTION
PRACTITIONERS

Chapter 2

CHALLENGES OF THE SECURITY
INDUSTRY
–
–
–
–
–
Cooperation between Public Police and
Private Security
Regulation of the Industry
The Need for Training
Ethics
The False Alarm Problem
Part 2
REDUCING THE
PROBLEM OF
LOSS
Chapter 3
Foundations of
Security and Loss
Prevention
Chapter 3

THE SECURITY AND LOSS
PREVENTION PROFESSION
–
–

Theoretical Foundations
Security Periodicals
METHODS FOR PROTECTION
PROGRAMS
–
–
Risk Analysis
Planning
Chapter 3

STANDARDS AND REGULATIONS
–
–
–
–

Standards
Regulations
Post-9/11 Standards and Regulations
Standard-Setting Organizations
EVALUATION OF LOSS PREVENTION
PROGRAMS
–
Scientific Method
Chapter 3
–

Sources of Research Assistance
PROPRIETARY SECURITY
–
–
Basics of Organization: The Vocabulary
Basics of Organization: The Practical
Management Tools
Chapter 4
Law
Chapter 4
INTRODUCTION
 JUDICIAL SYSTEMS

–
–
State Court Systems
Federal Court System
ORIGINS OF LAW
 TORT LAW AND CONTROLS OVER
PRIVATE SECURITY

Chapter 4
LEGAL THEORY OF PREMISES
SECURITY CLAIMS
 CONTRACT LAW
 CIVIL JUSTICE PROCEDURES
 ADMINISTRATIVE LAW

–
Recordkeeping, Reporting, Inspections,
and Searches
Chapter 4
–
–
–

Compliance Auditing
Federal Sentencing Guidelines
Labor Law
CRIMINAL JUSTICE PROCEDURE
–
–
–
–
Arrest Law
Force
Searches
Questioning
Chapter 5
Internal and External
Relations
Chapter 5

INTERNAL AND EXTERNAL
RELATIONS
–

Benefits of Good Relations
INTERNAL RELATIONS
–
–
Customer Driven Security and Loss
Prevention Programs
Marketing
Chapter 5
–
–
–
–
–
–
Human Relations on the Job
Management Support
Orientation and Training Programs
Loss Prevention Meetings
Intranet and E-Mail
Involvement Programs
Chapter 5

EXTERNAL RELATIONS
–
–
–
–
–
Law Enforcement
Public Safety Agencies
The Community
The Media
External Loss Prevention Peers
Chapter 5

SPECIAL PROBLEMS
–
–
Prosecution Decisions
Loss Prevention Attire
Chapter 6
Applicant Screening
and Employee
Socialization
Chapter 6
INTRODUCTION
 EMPLOYMENT LAW

–
–
–
–
Federal Legislation
U.S. Supreme Court Decisions
Equal Employment Opportunity
Commission
EEO, AA, and Quotas
Chapter 6
–
–

Diversity
Sexual Harassment
SCREENING METHODS
–
–
–
–
Resumes and Applications
Interview
Tests
Background Investigations
Chapter 6

EMPLOYEE SOCIALIZATION
–
–
–
–
–
Loss Prevention Orientation for New
Employees
Employee Training
Planning Training
Learning Principles
Wasted Training
Chapter 6
–
–
Examples Set by Superiors
Employee Needs
Chapter 7
Internal Threats and
Countermeasures
Chapter 7
INTRODUCTION
 INTERNAL THEFT

–
–
–
–
How Serious Is The Problem?
Why Do Employees Steal?
How Do Employees Steal?
Possible Indicators of Theft
Chapter 7
MANAGEMENT
COUNTERMEASURES
 PHYSICAL SECURITY
COUNTERMEASURES

–
–
Integration, Open Architecture, and
Convergence
Access Controls
Chapter 7
–
–
–
–
–
–
Locks and Keys
Intrusion Detection Systems
Interior Sensors
Closed-Circuit Television
Security Officers
Safes, Vaults, and File Cabinets
Chapter 8
External Threats and
Countermeasures
Chapter 8
INTRODUCTION
 METHODS OF UNAUTHORIZED
ENTRY
 COUNTERMEASURES

–
–
Construction and Environmental Security
Design
Perimeter Security
Chapter 8
–
–
–
–
–
–
–
Barriers
Protecting Buildings Against Terrorism
Windows
Doors
Intrusion Detection Systems
CCTV
Lighting
Chapter 8
–
–
–
–
Parking Lot and Vehicle Controls
Security Officers
Communications and the Control Center
Protective Dogs
Chapter 9
Services and Systems:
Methods Toward Wise
Purchasing Decisions
Chapter 9
INTRODUCTION
 PITFALLS WHEN PURCHASING
SECURITY SERVICES AND
SYSTEMS
 PURCHASING SECURITY SERVICES

–
Questions When Considering Contract
Security Officers
Chapter 9
–
–
–

PURCHASING SECURITY SYSTEMS
–
–

Contract Undercover Investigators
Consultants
Certifications in Security
Questions When Considering a Security
System
System Acquisition
OUTSOURCING
Chapter 10
Investigations
Chapter 10
INTRODUCTION
 TYPES OF INVESTIGATIONS

–
–
–
–
Proprietary and Contract Investigations
Private and Public Investigations
Overt and Undercover Private
Investigations
Important Considerations
Chapter 10
LAW
 EVIDENCE
 INTERVIEWING AND
INTERROGATION
 INFORMATION SOURCES

–
Legal Restrictions When Collecting
Information
Chapter 10
IDENTITY THEFT
 INVESTIGATIVE LEADS
 SURVEILLANCE
 INFORMATION ACCURACY
 REPORT WRITING
 TESTIMONY

Chapter 11
Accounting,
Accountability, and
Auditing
Chapter 11
INTRODUCTION
 ACCOUNTING
 ACCOUNTABILITY

–
–
–
Cashier Operations
Purchasing
Inventory
Chapter 11

AUDITING
–
–
Auditors
Internal Control Questionnaire
FRAUD
 GOVERNANCE, RISK MANAGEMENT,
AND COMPLIANCE

Chapter 12
Risk Management,
Business Continuity,
and Emergency
Management
Chapter 12

RISK MANAGEMENT
–
–
–
–
–

The Role of the Risk Manager
The Risk Management Process
Risk Modeling
Risk Management Tools
Enterprise Risk Management
INSURANCE
Chapter 12
–
–
–
–
–
–

Types of Insurance
Crime Insurance and Bonds
Fire Insurance
Property and Liability Insurance
Claims
Claims for Crime Losses
BUSINESS CONTINUITY
Chapter 12
–
–

EMERGENCY MANAGEMENT
–
–
–

Guidance for Business Continuity Planning
Methodology for Business Continuity
All-Hazards Preparedness Concept
The History of Emergency Management
Emergency Management Disciplines
THE MILITARY
Chapter 13
Life Safety, Fire
Protection, and
Emergencies
Chapter 13

LIFE SAFETY
–
–
–
–

Standards, Regulations, and Codes
OSHA Regulations
NFPA 101 Life Safety Code
Building Design and Building Codes
FIRE PROTECTION
–
The Problem of Fire
Chapter 13
–
–
–

Private Organizations Involved in Fire
Protection
Fire Departments
Fire Department Protection Efforts
FIRE PREVENTION AND FIRE
SUPPRESSION STRATEGIES
–
Fire Prevention Strategies
Chapter 13
–

PUBLIC SAFETY AGENCIES
–
–

Fire Suppression Strategies
Police
Emergency Medical Service (EMS)
EMERGENCIES
–
–
Human-Made Emergencies
Natural Disasters
Chapter 14
Safety in the
Workplace
Chapter 14
INTRODUCTION
 ACCIDENT STATISTICS AND COSTS
 HISTORY OF SAFETY LEGISLATION

–
–

Workers’ Compensation
The Development of OSHA
OCCUPATIONAL SAFETY AND
HEALTH ADMINISTRATION
Chapter 14
–
–
–
–
–
–
–
–
OSHA’s Strategic Management Plan
The Act’s Jurisdiction
OSHA Standards
OSHA Recordkeeping and Reporting
Additional Employer Responsibilities
OSHA Inspections
OSHA: Criticism and Controversy
Assistance with Problems
Chapter 14

SAFETY STRATEGIES
–
–
–
–
Safety and Health Committee
Socialization and Incentive Programs
Investigations
Additional Safety Measures
Part III
SPECIAL PROBLEMS
AND
COUNTERMEASURES
Chapter 15
Terrorism and
Homeland Security
Chapter 15

TERRORISM
–
–
–
–
–
–
Terrorism Defined
History
Religion and Politics
Causes of Terrorism
International Terrorism
International Terrorists
Chapter 15
–
–
–
–
–

Domestic Terrorism
Domestic Terrorists
Terrorist Methods
Terrorist Weapons
Weapons of Mass Destruction
HOMELAND SECURITY
–
Homeland Security Defined
Chapter 15
–
–
–
–
–
–
The Measurement of Terrorism
National Counterterrorism Center
National Memorial Institute for the
Prevention of Terrorism
National Security and Homeland Security
U.S. Government Action Against Terrorism
Legislative Action Against Terrorism
Chapter 15
–
–

State and Local Governments
Response to Weapons of Mass
Destruction
PRIVATE SECTOR
–
–
–
Losses and Costs from the 9/11 Attacks
The Homeland Security Market
Public-Private Sector Partnerships
Chapter 15
–
–
Business and Organizational
Countermeasures Against Terrorism
Citizen Volunteers
Chapter 16
Protecting Critical
Infrastructures, Key
Assets, and Borders
Chapter 16

CRITICAL INFRASTRUCTURE
–
–
–
–
Critical Infrastructure Defined
The Role of Government in Protecting
Critical Infrastructure and Key Resources
NIPP Risk Management Framework
NIPP Recommendations for the Private
Sector
Chapter 16

CRITICAL INFRASTRUCTURE
SECTORS
–
–
–
–
–
Agriculture and Food
Water
Energy
Chemical Industry
Telecommunications
Chapter 16
–
–
–

Cyberspace and Information Technology
Defense Industry Base
Key Assets
BORDER AND TRANSPORTATION
SECURITY
–
Government Agencies with Roles in
Border and Transportation Security
Chapter 16

TRANSPORTATION SECTORS
–
–
–
–
–
–
–
Aviation
Passenger Rail and Railroads
Mass Transit Systems
Highways, Trucking, and Intercity Busing
Maritime
Postal and Shipping
Pipelines
Chapter 17
Loss Prevention at
Businesses and
Institutions
Chapter 17
INTRODUCTION
 LOSS PREVENTION AT RETAIL
BUSINESSES

–
–
–
–
Shrinkage
Human Resources Problems in Retailing
Internal Loss Prevention Strategies
Preventing Losses at Checkout Counters
Chapter 17
–
–
–
–

E-Business
Counterfeiting
Shoplifting
Confronting the Suspected Shoplifter
ROBBERY AND BURGLARY
–
–
Robbery Countermeasures
Burglary Countermeasures
Chapter 17
SHOPPING MALL STRATEGIES
 BANKS AND FINANCIAL
BUSINESSES

–
–
–
Banking and Finance Sector Challenges
Banking and Finance Sector Initiatives
The Scope of Threats and Legal
Responsibilities of the Banking and
Finance Sector
Chapter 17
–
–
–
–
–

Regulation H
Bank Robbery Countermeasures
Automatic Teller Machines
Kidnapping and Extortion
Embezzlement, Online Risks, and Fraud
EDUCATIONAL INSTITUTIONS
–
Threats and Hazards at Educational
Institutions
Chapter 17
–
–
–
–

Countermeasures
School Districts
Colleges and Universities
Fire Protection at Educational Institutions
HEALTHCARE INSTITUTIONS
–
–
Public Health Sector Challenges
Public Health Sector Initiatives
Chapter 17
–
–
The Scope of Threats and Legal
Responsibilities of Healthcare Institutions
Strategies for Healthcare Institutions
Chapter 18
Topics of Concern
Chapter 18

WORKPLACE VIOLENCE
–
–

Legal Guidelines
Protection Methods
PERSONNEL PROTECTION
–
–
–
Planning
Education and Training
General Protection Strategies
Chapter 18

SUBSTANCE ABUSE IN THE
WORKPLACE
–
–
–

Countermeasures
Alcoholism
Types of Substances and Abuse
INFORMATION SECURITY
–
Corporate Intelligence Gathering: Putting It
in Perspective
Chapter 18
–
–

Espionage Techniques and the
Vulnerabilities of Technology
Countermeasures
COMMUNICATIONS SECURITY
–
–
Electronic Surveillance and Wiretapping
Technical Surveillance Countermeasures
Chapter 19
Your Future in
Security and Loss
Prevention
Chapter 19

SECURITY AND LOSS PREVENTION
IN THE FUTURE
–

Trends Affecting Security and Loss
Prevention
EDUCATION
–
Loss Prevention Education: Today and
Tomorrow
Chapter 19
RESEARCH
 TRAINING

–

The Concept of the Security Institute
EMPLOYMENT
–
–
Sources of Employment Information
Career Advice
Download