Handbook of loss prevention and crime prevention 4th ed

Handbook of loss prevention and crime prevention 4th ed

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • مؤلف : Lawrence J Fennelly
  • ناشر : Amsterdam ; Boston : Elsevier Butterworth Heinemann
  • چاپ و سال / کشور: 2004
  • شابک / ISBN : 9780750674539

Description

Contents Contributing Authors xiii Preface xv PART ONE / INTRODUCTION 1 1. Risk Assessment and Management 3 Murray Neal PART TWO / LOSS PREVENTION AND CRIME PREVENTION METHODS 7 2. Designing Security with the Architects 9 Lawrence J. Fennelly Designing Security with the Architects. Designing Security and Layout of Site. Building Site Security and Contractors. Ironmongery. Closed Circuit TV Checklist. Card Access Control Checklist. Storage Rooms, Safes, and Vaults Checklist. Exterior Lighting Checklist. Crime Prevention Awareness Points. Appendix 2.A. Model Residential and Commercial Building Security Ordinance. Appendix 2.B. Standards 3. Security Surveys 19 Lawrence J. Fennelly The Best Time to Conduct the Survey. Classification of Survey Recommendations. Developing Security Points. Nine Points of Security Concern. Personality of the Complex. Positive and Negative Aspects of Making Recommendations. Crime Analysis. Key Control. Closed Circuit Television. Intrusion Alarms. Lighting and Security. Other Security Aspects. Security Survey Follow-Up. Residential Security. Alarms. Appendix 3.A. Site Survey and Risk Assessment. Appendix 3.B. Physical Security Survey. Appendix 3.C. Plant Security Checklist. Appendix 3.D. Guard Security Checklist. Appendix 3.E. Office Security Checklist. Appendix 3.F. Home Security Checklist. Appendix 3.G. Fire Safety Inspection 4. Internal Theft Controls 44 Robert Fischer Introduction. What Is Honesty?. The Dishonest Employee. Management Responsibility in Loss Prevention. Program for Internal Security. Procedural Controls. When Controls Fail. Case Study. Summary 5. Executive Protection 59 Charles J. Diecidue Rise of Terrorism in the United States. Formulating a Protection Plan. Threat Assessment. Planning. Home and Office Survey. Procedural Vulnerability. Physical Vulnerability. Protection in Transit. Everyday Security Awareness. If an Abduction Occurs vii viii HANDBOOK OF LOSS PREVENTION AND CRIME PREVENTION 6. Awareness 66 Robert Hanna Awareness and Knowledge Strategies. Neighborhood Watch Guidelines. How to Avoid Becoming the Victim of an Attacker. Safety Checklist for Apartments. Robbery Prevention— Tips for Small Business. Burglary Prevention—Tips for Small Business. Suspicious Situations to Report. Vehicle Theft—a Big Problem. Safety Skills for Children. Street Smarts—How to Protect Oneself. The Con Artist. Crime Prevention Tips for Senior Citizens. Protection from Telemarketing Fraud. Crime Prevention Tips at ATMs 7. Crime Prevention through Environmental Design Strategies and Applications 82 Timothy Crowe Crime Prevention through Environmental Design Strategies. CPTED Applications. Objectives for the Commercial Environment. Downtown Streets and Pedestrian Areas. Parking Lots and Structures. Office and Industrial Systems. Hallways and Restrooms. Malls and Shopping Centers. Convenience Stores. Branch Banks. Objectives for the Residential Environment. Objectives for the School Environment. Convention Centers and Stadiums PART THREE / SECURITY OPERATIONS AND EQUIPMENT 133 8. Approaches to Physical Security 135 Richard Gigliotti and Ronald Jason Levels of Physical Security. The Psychology of Maximum Security. The Value of Planning. Physical Barriers. The Security Plan. Conclusion 9. Physical Barriers 148 Richard Gigliotti and Ronald Jason Doors. Roofs. Floors. Fences. Walls and Moats 10. The Use of Locks in Physical Crime Prevention 165 James M. Edgar and William D. McInerney Lock Terminology and Components. Key-Operated Mechanisms. Combination Locks. Lock Bodies. Door Lock Types. Strikes. Attacks and Countermeasures. Locks and the Systems Approach to Security. Key Control. A New Standard Set for Exit Devices, Locks, and Alarms. Appendix 10.A. Key Control and Lock Security Checklist. Appendix 10.B. Terms and Definitions for Door and Window Security 11. Safes, Vaults, and Accessories 207 Kenneth Dunckel Choose the Right Container. UL-Rated Combination Locks. Relocking Devices. Locking Dials. Lockable Handles. Time Locks. Time-Delay Combination Locks. Alarmed Combination Locks. Vision-Restricting and Shielded Dials. Combination Changing. Safe Burglaries. Overcoming Safe-Opening Problems. Appendix 11.A. Rating Files, Safes, and Vaults 12. Security Lighting 218 Philip P. Purpura, Lawrence J. Fennelly, Gerard Honey, and James F. Broder Illumination. Lamps. Twenty-Five Things You Need to Know about Lighting. Energy Management. Lighting Checklist. Protective Lighting Checklist 13. Alarms: Intrusion Detection Systems 223 Mike Rolf and James Cullity Components of Alarm Systems. Application. Alarm Control. Alarm Transmission/Signaling. Alarms Deter Crime. False Alarms. Alarm Equipment Overhaul. Additional Resources. Conclusion. Appendix 13.A. Smoke Detectors 14. CCTV Surveillance 236 Herman Kruegle Protection of Assets: An Overview. History. Role of CCTV in Asset Protection. CCTV as Part of the Emergency and Disaster Plan. Emergency Shutdown and Restoration. Security Investigations. Safety. The Security Officer’s Role. Training and Education of Employees. Synergy through Integration. CCTV’s Role and Applications. Problems Solved by CCTV. Choice of Overt or Covert CCTV. Security Surveillance Applications. Safety Applications. CCTV Access Control. The Bottom Line. Appendix 14.A. Glossary. Appendix 14.B. Designing Effective CCTV Systems 15. Guard Service in the Twenty-First Century 253 Joseph G.Wyllie Liabilities Connected with Guard Force. Power and Authority of the Security Guard. Training. Report Writing. Weapons Safety. Safety. Safety Checklist. Bomb Threats. Bomb Search. Fire Protection. Fire Prevention. Emergency Medical Assistance. Reporting a Medical Case. Guard Supervision. Conclusion 16. Bomb and Physical Security Planning 266 Stephen E. Higgins Bombs. Bomb Threats. Why Prepare?. How to Prepare. Security against Bomb Incidents. Responding to Bomb Threats. Decision Time. Evacuation. Search Teams. Search Technique. When a Suspicious Object Is Located. Handling the News Media. Summary. Appendix 16.A. Suspect Package Alert. Appendix 16.B. Bomb Threat Checklist. Appendix 16.C. Mail Handlers and Suspicious Mail Procedures PART FOUR / SECURITY AND CRIME PREVENTION APPLICATIONS 277 17. Cargo Security: Intermoda/Logistics—The Complete Overview 279 Louis A. Tyska Prevention Plan. Pilferage. Theft. Organized Crime. Cargo Package and Movement Controls. Trucking Operations. Appendix 17.A. Cargo Security Checklist. Appendix 17.B. Personnel Security Checklist. Appendix 17.C. Physical Security Checklist. Appendix 17.D. Inspection Report Forms. Appendix 17.E. Documentation. Appendix 17.F. The Role of Private Security 18. Lodging (Hotel/Motel) Security 312 Mark Beaudry and Skip Brandt Security Department Structure. Size of the Department. Reporting Level in the Organization. Role of Security. Training. Theft. Opportunities and Trends. Legal Issues. The Future of Lodging Security 19. Retail Security: Lessons Learned from Convenience Store Research 330 Rosemary J. Erickson and Arnie Stenseth New Challenges. Increase in Crime. The Research. Research Underway. The Recommended Program. Conclusions Contents ix x HANDBOOK OF LOSS PREVENTION AND CRIME PREVENTION 20. Putting an Extra “EYE/I”on CCTV: Managing Risk in Retail 341 Scott Greenwald Old Tech to New Tech. Rationale for Technology. Definition of Interactive. How Interactive Monitoring Reduces Risk. How to Evaluate the Service Provider. Why Isn’t This Everywhere: Cost versus Availability?. How ICCTV Works. CCTV versus ICCTV 21. Perspectives on Safe School Administration 345 G. Edward Richards Emphasize Crime and Deviance Prevention during Teacher Education. Maintain a Sense of Ownership in School Grounds and the Surrounding Neighborhood. Conduct Periodic Risk Assessments or Security Surveys. Clearly State Rules and Regulations. Conduct a Crime and Deviance Analysis. Develop an Incident Mapping System. Utilize Parent Volunteers as Monitors and Student Aides. Institute After-School Programs. Security Considerations Should Be Incorporated from the “Ground Up.” Establish In-Class Communication between Teachers and Administration. Institute a Safety and Security Committee. Value the Contributions of Custodial Personnel. Train Personnel in Graffiti Interpretation. Schools Need Central Office Support. Value Aesthetics. Foster Students’ Beliefs They Are Connected to the School. Do Not Use Student Monitors. The “Combustible Engine” Model of School Communities. Create a Crisis Management Plan. Train Personnel in Conflict Resolution. Implement Character Education Curricula. Create Law-Related Education Modules to Be Incorporated in Social Studies Courses. Establish “Communities within Schools.” Avoid Peer-Group Counseling. Instill an Awareness of the Dangers of Terrorism 22. Campus Security and Crime Prevention 350 Bronson S. Bias Communication. Key Elements in a Campus Crime Prevention Program. Commitment. Cycle of Activity. Specific Programs. The Campus Security Act of 1990. Neighborhood Watch on the College Campus. Phones on Campus. Thefts in the Library. Bicycle Theft Prevention. Administration Office Security Programs. Operation Identification. Intrusion Alarms. Conclusion 23. Hospitals and the Health-Care Security Environment 357 Russell L. Colling Categories of Health Care. Types of Hospitals. The Foundation of Health-Care Security: Risks and Areas of Vulnerability. Basic Health-Care Security Risk and Areas of Vulnerability 24. Library Security 362 R. A. (Rick) Draper and Susan Urosevic Risk Assessment Terminology. Identifying Risks. Assessing Likelihood. Assessing Consequences. Qualifying Risks. Managing the Risk. The Scope of Security Problems in Libraries. Security Risk Management Strategies. Dealing with Specific Threats. Conclusion. Security Management Resources 25. High-Rise Security and Fire Life Safety 370 Geoff Craighead High-Rise Assets. Threats to Security and Fire Life Safety. Security of Modern High-Rise Buildings. Fire Safety of Modern High-Rise Buildings. Summary 26. Multiresidential Security 376 Norman R. Bottom Apartments. Condominiums. Levels of Security. Personnel. Physical Security and Hardware. Procedures. The Elderly. Some Special Areas of Vulnerability. Disasters. Legislation. Basic Steps to Remember in Multiresidential Security 27. Workplace Violence: Anticipation through Process, Not Prediction of Results Revisited 387 John H. Lombardi Causes and Avoidance of Claims of Inadequate Security. Job Applicant. Narrowing the Focus of the Workplace Violator Profile. Case Studies in Workplace Violence. Organizational Dynamics. The “Team” Concept and Shared Expectations as an Approach to Workplace Motivation. “Why Don’t Subordinates Do What They Are Supposed to Do?”. Steps to Reduce the Opportunity for Workplace Violence. The Predatory Prevention Matrix. Process versus Output, or the Difference between “High Crime” and “High Profit.” Uses of the Predatory Prevention Matrix. An Apartment Case Study. The Magic Chair. Defense against Workplace Violence: Possible or Probable? 28. Domestic Violence: Everyone’s Problem 402 Ingeborg Sebyan What Is It. Who Are the Victims. Why Abusers Abuse. What We Do Know. Law Enforcement Response. Options for Protection. Government Involvement. Conclusion 29. Personal Safety and Self-Defense 407 Melissa Soalt Introduction. Violent Crimes. Self-Defense 30. Designing Crime Risk Management Systems 410 National Crime Prevention Institute Understanding Crime Risk Management. Who Is the Client?. The Client-Practitioner Relationship. Crime Pattern Analysis. Conducting the Security Survey. Determination of Probable Maximum Loss. Making Recommendations to Clients. Conclusion 31. Planning, Management, and Evaluation 418 Charles M. Girard The Concepts Defined. Statistical Information: The Backbone for Design of a Prevention Program. Crime Statistics. Demographic Data. Efficiency Analysis: Measuring Activity. Effectiveness Analysis: Measuring Program Impact. Attitudinal Analysis: Gathering Opinions on the Program Impact. A Strategy to Facilitate Implementation of the Evaluation 32. Financial Institution Security 431 Edward F. McDonough, Jr., and Linda F. Mikitarian The Bank Protection Act of 1968. The Role of the Security Department. Current Risks Affecting Financial Institutions. Criminal Reporting. Bank Security Devices. Security Training in Financial Institutions. Other Federal Regulations with an Impact on Banking. Critical Issues in Financial Institution Security 33. Automatic Teller Machines (ATMs) 442 Jerry Wright Responsibility of an ATM Owner. Case Study from Ann Arbor Police Department: Law Enforcement and ATM Safety. Ann Arbor, Michigan’s Guidelines for Automatic Teller Contents xi xii HANDBOOK OF LOSS PREVENTION AND CRIME PREVENTION Machines User Safety. Appendix 33.A.ATM Safety Tips. Appendix 33.B.ATM Safety Checklist 34. Telecommunications Fraud 447 Mark D. Farrell How Does It Happen?. How to Find Out. How to Reduce Vulnerability. How to Stop It 35. Electronic Surveillance and Wiretapping 449 Philip P. Purpura Countermeasures. Economic Espionage Act of 1996 36. Safety Websites 453 Richard A. Phelan Introduction. Safety Websites 37. Homeland Security 454 Lawrence J. Fennelly Gov. Ridge Announces Homeland Security Advisory System. National Framework for Federal, State, and Local Governments, Private Industry, and the Public. Factors for Assignment of Threat Conditions. Unified System for Public Announcements. A Tool to Combat Terrorism. Homeland Security in 2002. HITS and IFPO Computer-Based and Web-Based Security Officer Training. Final Comments 38. Security of Information Systems 457 Joseph C. Nelson Conclusion. Security Organizations 39. Counterespionage and Information Security Management 461 Norman R. Bottom Reasons for Attacking Computers. Methods of Attacking Computer Systems. Methods of Defense. Roots of Industrial Espionage. Historic Attacks on Computers and Networks. Recent Lawsuits. Covert Action. Theft. Other Causes of Information Loss. Why People Steal Information. Types of Attacks. Espionage Methods. Rogue Use. Competitive Intelligence. Human Error. The WAECUP Human Factors Protocol. Human Factor Training Practices. Electronic Surveillance and Countermeasures. Telecommuting. Wireless Mike Dangers: An Example. Computer Passwords. Current Security Issues. Host-Based Perimeter Defense. EMail. Local Area Network. Radio Links. Encryption. Investigations. Trade Secrets 40. Emergency Management 481 Norman Bottom Crisis, Disaster, Catastrophe—Are You Ready?. The Emergency Management Plan Is Only as Good as the Last Drill 41. The Security Professional, Terrorism, Bio-Terrorism, and the Next Level 487 Karl J. Leger The Security Professional and Terrorism. Terrorism and the Terrorist. Understanding Terrorism. Terrorist Groups and Organizational Structure. Mechanism of Violence and Associated Risk Factors. Assessing Threats from Terrorism and Developing Effective Countermeasures. The Security Manager’s Responsibilities. Conclusion Index 504
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری