870 likes | 1.66k Views
Security & Loss Prevention: An Introduction. 5 th Edition Philip Purpura. Part 1. INTRODUCTION TO SECURITY AND LOSS PREVENTION. Chapter 1. The History of Security and Loss Prevention: A Critical Perspective. Chapter 1. WHY CRITICAL THINKING? HOW CAN WE THINK CRITICALLY?
E N D
Security & Loss Prevention: An Introduction 5th Edition Philip Purpura
Part 1 INTRODUCTION TO SECURITY AND LOSS PREVENTION
Chapter 1 The History of Security and Loss Prevention: A Critical Perspective
Chapter 1 • WHY CRITICAL THINKING? • HOW CAN WE THINK CRITICALLY? • WHY THINK CRITICALLY ABOUT THE HISTORY OF SECURITY AND LOSS PREVENTION? • SECURITY AND LOSS PREVENTION DEFINED
Chapter 1 • HISTORY • Why Study the History of Security and Loss Prevention? • EARLY CIVILIZATIONS • Ancient Greece • Ancient Rome • The Middle Ages in Europe
Chapter 1 • MORE CONTEMPORARY TIMES • England • Early America • The Growth of Policing • The Growth of Security Companies • Railroads and Labor Unions • The Great Wars
Chapter 1 • The Third Wave • Convergence of IT and Physical Security • Convergence of Enterprise Security • 21st Century/Post-9/11 Security Challenges
Chapter 2 The Business, Careers, and Challenges of Security and Loss Prevention
Chapter 2 • INTRODUCTION • METRICS • Internal Metrics • External Metrics • THE SECURITY INDUSTRY • Contract versus Proprietary Security
Chapter 2 • CAREERS: LOSS PREVENTION SERVICES AND SPECIALISTS • THE LIMITATIONS OF THE CRIMINAL JUSTICE SYSTEM: IMPLICATIONS FOR LOSS PREVENTION PRACTITIONERS
Chapter 2 • CHALLENGES OF THE SECURITY INDUSTRY • Cooperation between Public Police and Private Security • Regulation of the Industry • The Need for Training • Ethics • The False Alarm Problem
Part 2 REDUCING THE PROBLEM OF LOSS
Chapter 3 Foundations of Security and Loss Prevention
Chapter 3 • THE SECURITY AND LOSS PREVENTION PROFESSION • Theoretical Foundations • Security Periodicals • METHODS FOR PROTECTION PROGRAMS • Risk Analysis • Planning
Chapter 3 • STANDARDS AND REGULATIONS • Standards • Regulations • Post-9/11 Standards and Regulations • Standard-Setting Organizations • EVALUATION OF LOSS PREVENTION PROGRAMS • Scientific Method
Chapter 3 • Sources of Research Assistance • PROPRIETARY SECURITY • Basics of Organization: The Vocabulary • Basics of Organization: The Practical Management Tools
Chapter 4 Law
Chapter 4 • INTRODUCTION • JUDICIAL SYSTEMS • State Court Systems • Federal Court System • ORIGINS OF LAW • TORT LAW AND CONTROLS OVER PRIVATE SECURITY
Chapter 4 • LEGAL THEORY OF PREMISES SECURITY CLAIMS • CONTRACT LAW • CIVIL JUSTICE PROCEDURES • ADMINISTRATIVE LAW • Recordkeeping, Reporting, Inspections, and Searches
Chapter 4 • Compliance Auditing • Federal Sentencing Guidelines • Labor Law • CRIMINAL JUSTICE PROCEDURE • Arrest Law • Force • Searches • Questioning
Chapter 5 Internal and External Relations
Chapter 5 • INTERNAL AND EXTERNAL RELATIONS • Benefits of Good Relations • INTERNAL RELATIONS • Customer Driven Security and Loss Prevention Programs • Marketing
Chapter 5 • Human Relations on the Job • Management Support • Orientation and Training Programs • Loss Prevention Meetings • Intranet and E-Mail • Involvement Programs
Chapter 5 • EXTERNAL RELATIONS • Law Enforcement • Public Safety Agencies • The Community • The Media • External Loss Prevention Peers
Chapter 5 • SPECIAL PROBLEMS • Prosecution Decisions • Loss Prevention Attire
Chapter 6 Applicant Screening and Employee Socialization
Chapter 6 • INTRODUCTION • EMPLOYMENT LAW • Federal Legislation • U.S. Supreme Court Decisions • Equal Employment Opportunity Commission • EEO, AA, and Quotas
Chapter 6 • Diversity • Sexual Harassment • SCREENING METHODS • Resumes and Applications • Interview • Tests • Background Investigations
Chapter 6 • EMPLOYEE SOCIALIZATION • Loss Prevention Orientation for New Employees • Employee Training • Planning Training • Learning Principles • Wasted Training
Chapter 6 • Examples Set by Superiors • Employee Needs
Chapter 7 Internal Threats and Countermeasures
Chapter 7 • INTRODUCTION • INTERNAL THEFT • How Serious Is The Problem? • Why Do Employees Steal? • How Do Employees Steal? • Possible Indicators of Theft
Chapter 7 • MANAGEMENT COUNTERMEASURES • PHYSICAL SECURITY COUNTERMEASURES • Integration, Open Architecture, and Convergence • Access Controls
Chapter 7 • Locks and Keys • Intrusion Detection Systems • Interior Sensors • Closed-Circuit Television • Security Officers • Safes, Vaults, and File Cabinets
Chapter 8 External Threats and Countermeasures
Chapter 8 • INTRODUCTION • METHODS OF UNAUTHORIZED ENTRY • COUNTERMEASURES • Construction and Environmental Security Design • Perimeter Security
Chapter 8 • Barriers • Protecting Buildings Against Terrorism • Windows • Doors • Intrusion Detection Systems • CCTV • Lighting
Chapter 8 • Parking Lot and Vehicle Controls • Security Officers • Communications and the Control Center • Protective Dogs
Chapter 9 Services and Systems: Methods Toward Wise Purchasing Decisions
Chapter 9 • INTRODUCTION • PITFALLS WHEN PURCHASING SECURITY SERVICES AND SYSTEMS • PURCHASING SECURITY SERVICES • Questions When Considering Contract Security Officers
Chapter 9 • Contract Undercover Investigators • Consultants • Certifications in Security • PURCHASING SECURITY SYSTEMS • Questions When Considering a Security System • System Acquisition • OUTSOURCING
Chapter 10 Investigations
Chapter 10 • INTRODUCTION • TYPES OF INVESTIGATIONS • Proprietary and Contract Investigations • Private and Public Investigations • Overt and Undercover Private Investigations • Important Considerations
Chapter 10 • LAW • EVIDENCE • INTERVIEWING AND INTERROGATION • INFORMATION SOURCES • Legal Restrictions When Collecting Information
Chapter 10 • IDENTITY THEFT • INVESTIGATIVE LEADS • SURVEILLANCE • INFORMATION ACCURACY • REPORT WRITING • TESTIMONY
Chapter 11 Accounting, Accountability, and Auditing
Chapter 11 • INTRODUCTION • ACCOUNTING • ACCOUNTABILITY • Cashier Operations • Purchasing • Inventory
Chapter 11 • AUDITING • Auditors • Internal Control Questionnaire • FRAUD • GOVERNANCE, RISK MANAGEMENT, AND COMPLIANCE
Chapter 12 Risk Management, Business Continuity, and Emergency Management
Chapter 12 • RISK MANAGEMENT • The Role of the Risk Manager • The Risk Management Process • Risk Modeling • Risk Management Tools • Enterprise Risk Management • INSURANCE