TY - BOOK AU - Fay,John TI - Contemporary security management SN - 9780080476827 AV - HV8290 .F39 2006eb U1 - 658.4/7 22 PY - 2006/// CY - Amsterdam, Boston PB - Elsevier/Butterworth-Heinemann KW - Private security services KW - Industries KW - Security measures KW - Personnel management KW - Services privés de sécurité KW - Industrie KW - Sécurité KW - Mesures KW - Personnel KW - Direction KW - BUSINESS & ECONOMICS KW - Workplace Culture KW - bisacsh KW - Corporate Governance KW - Leadership KW - Organizational Development KW - fast KW - Electronic books KW - gtlm N1 - Includes bibliographical references and index; Cover; Title page; Copyright page; Table of contents; 1. Historical Roots; INTRODUCTION; INDUSTRIAL REVOLUTION; Fertile Ground; Growth of Factories; Mass Production; SCIENTIFIC MANAGEMENT; HUMAN RELATIONS; OPERATIONS RESEARCH; AGE OF TECHNOLOGY; BUSINESS TODAY; SECURITY INDUSTRY; English Roots; Law Enforcement and Security; Terrorism; Security Marketplace; Guard Services; Professionalism; Technology; The Future; NOTES; 2. Strategy; BUSINESS STRATEGY; CORE AND SUPPORT ACTIVITIES; OUTSOURCING; OUTSOURCING AND THE SECURITY GROUP; Protecting Assets Under Altered Circumstances; Due Diligence; Ambiguous SpecificationsEFFECT OF STRATEGY ON SECURITY MANAGEMENT; Anticipate; Exposures; Magnitude; Complexity; TECHNICAL KNOWLEDGE; Access; Quality; Teamwork; STRATEGY AND RISK; Predict; Quantify; IMPERATIVES; Improve on Quality; Forge Close Links with Customers; Establish Close Relationships with Suppliers; Make Effective Use of Technology; Operate with Minimum Layers of Management; Continuously Improve the Security Staff; STRATEGIC PLANNING; Policy and Planning; The CSO and Strategic Planning; Business Is Like War; No Absolutes in Strategic Planning; Strategy and Change; NOTES; 3. Leading; INTRODUCTIONBuild a Vision; Enlist Followers; LEADERSHIP DEFINITIONS VARY; Complex and Subtle; Manager Versus Leader; Peter Principle; COMPETENCIES; Gain Attention; Set a Goal; Communicate the Message; Cultivate Trust; Develop Oneself; EMPOWERMENT; Contributing; Sharing Accomplishments; Energizing and Motivating; Conflicting Values; Quantity Versus Quality; Love of Work; FOLLOWERS; Taking Directions; Telling the Truth; Providing Feedback; LEADERS ADD VALUE; COMPETITION AMONG LEADERS; Ambition; Loyalty; PRICE OF LEADERSHIP; LEADING IN THE TWENTY-FIRST CENTURY; Build and Manage; Know the LandscapeExpect the Best; Do Not Micromanage; Be Accessible; Focus on What Is Important; Point the Way; CONCLUSIONS; NOTES; 4. Organizing; STAFFING; Justify the Position; Identify Relevant Skills and Knowledge; Search for Qualified Candidates; Compare Candidates Against Job Requirements; Identify the Apparent Best Candidate; Conduct a Background Inquiry; Test the Apparent Best Candidate; Offer the Job; The Independent Contractor; ORGANIZING ACTIVITIES; ESTABLISHING OBJECTIVES; Group Objectives; Individual Objectives; ORGANIZING CONSISTENT WITH POLICIES; Obtaining Resources; The People ResourceORGANIZING BEYOND BOUNDARIES; Assigning Tasks; Monitoring Performance; TERMINATING AN EMPLOYEE; Stunned Reaction; Psychological Trauma; Sorrow; Belligerence; Managing the Termination Interview; ORGANIZATIONAL STRUCTURES; Vertical Model; Network Model; Security Group Fit; NOTES; 5. Managing People; WORKING THROUGH PEOPLE; MASLOW'S THEORY; Physiological; Survival; Love; Self-esteem; Self-fulfillment; Curiosity; Key Tenets; Maslow in the Security Environment; PEOPLE DEVELOPMENT; Encourage; Expect Excellence; APPRAISING PERFORMANCE; Setting Targets; Target Qualities N2 - Contemporary Security Management serves as an indispensable working tool for students and security professionals at all levels of experience. It is designed to provide the hard facts on modern practices to efficiently and effectively run a security department and covers such vital topics as: leadership in management, employee relations, risk management and mitigation, terrorism, information security, access control, investigations, substance abuse, workplace violence and emergency management. New topics covered include terrorism and the new government mandate to perform standard vulnerability UR - https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196419 ER -