Security and loss prevention : an introduction / Philip Purpura
E-Book | Butterworth-Heinemann | 2013 | 6th ed.

Additional actions:


6th ed.
1 online resource
As in previous editions, the 6th edition of Security and Loss Prevention provides proven strategies to prevent and reduce incidents of loss due to legal issues, theft and other crimes, fire, and accidental or intentional harm from emplyees, as well as the many ramifications of corporate misconduct. Topics new to this edition include Global Risk Analysis, Evidence-based Loss Prevention, Optimization of Social Network Sites, Internal Victim Services Program, Digital News Environment, Crisis Communications, Green construction, law, and physical security, Intelligent video, pretexting, "homegrown" threats, marine piracy, countering online order fraud, cloud computing and security, geo-tags, and more. This new edition continues to apply the following methods: examples, illustrations, sidebar questions, boxed topics, international perspectives, and case problems and Web exercises at the end of each chapter. To assist the reader further, each chapter will begin with objectives and a list of key terms. A comprehensive index is also included in the book. Lecture slides will be available to adopters and an instructor's manual is available which contains sample syllabi and examination questions for each chapter. Incorporates changes in laws, presents various strategies of asset protection, and covers the ever-evolving technology of security and loss prevention. Utilizes end-of-chapter case problems that take the chapters' content and relate it to real security situations and issues, offering various perspectives on contemporary security challenges. Includes student study questions and an accompanying Instructor's manual with lecture slides, lesson plans, and an instructor test bank for each chapter.
Includes index.
Title from PDF title page; (ScienceDirect; viewed on Feb. 18, 2013).
Machine generated contents note: pt. I Introduction to Security and Loss Prevention -- 1.The History of Security and Loss Prevention: A Critical Perspective -- Why Critical Thinking? -- How can we Think Critically? -- Why Think Critically about the History of Security and Loss Prevention? -- Security and Loss Prevention Defined -- History -- Early Civilizations -- More Contemporary Times -- Case Problems -- References -- 2.The Business, Careers, and Challenges of Security and Loss Prevention -- Introduction: Why is Security a Huge Industry? -- Terms and Definitions of the Security Industry -- Metrics -- The Security Industry -- Careers: Loss Prevention Services and Specialists -- Occupational Outlook -- Limitations of the Criminal Justice System: Implications for Loss Prevention Practitioners -- Challenges of the Security Industry -- Case Problems -- References -- pt. II Reducing the Problem of Loss -- 3.Foundations of Security and Loss Prevention
The Security and Loss Prevention Profession -- Methods for Protection Programs -- Standards and Regulations -- Evaluation of Loss Prevention Programs -- Proprietary Security -- Case Problems -- References -- 4.Law -- Introduction -- Judicial Systems -- Origins of Law -- Tort Law and Controls over Private Security -- Legal Theory of Premises Security Claims -- Contract Law -- Civil Justice Procedures -- Administrative Law -- Criminal Justice Procedures -- Case Problems -- The Decision for "You Be the Judge" -- References -- 5.Internal and External Relations -- Internal and External Relations -- Internal Relations -- External Relations -- Special Problems -- Case Problems -- References -- 6.Applicant Screening and Employee Socialization -- Introduction -- Employment Law -- Social Media, Sexual Harassment, and Employee Venting -- Screening Methods -- Employee Socialization -- Case Problems -- The Decision for "You Be the Judge" -- References -- 7.Internal Threats and Countermeasures
Introduction -- Internal Theft -- Management Countermeasures -- Physical Security Countermeasures -- Case Problems -- References -- 8.External Threats and Countermeasures -- Introduction -- Methods of Unauthorized Entry -- Countermeasures -- Case Problems -- References -- 9.Services and Systems: Methods for Making Wise Purchasing Decisions -- Introduction -- Pitfalls when Purchasing Security Services and Systems -- Purchasing Security Services -- Purchasing Security Systems -- Outsourcing -- Case Problem -- The Decision for "You Be the Judge" -- References -- 10.Investigations -- Introduction -- Types of Investigations -- Law -- Evidence -- Interviewing and Interrogation -- Information Sources -- Surveillance -- Information Accuracy -- Report Writing -- Testimony -- Case Problems -- References -- 11.Accounting, Accountability, and Auditing -- Introduction -- Accounting -- Accountability -- Auditing -- Fraud -- Governance, Risk Management, and Compliance -- Case Problems
16.Protecting Critical Infrastructure -- Critical Infrastructure -- Critical Infrastructure Sectors -- Transportation Systems -- National Monuments and Icons -- Border and Transportation Security -- Case Problems -- References -- 17.Protecting Commercial and Institutional Critical Infrastructure -- Introduction -- Commercial Facilities -- Robbery and Burglary -- Banking and Finance -- Educational Institutions -- Healthcare and Public Health -- Case Problems -- References -- 18.Topics of Concern -- Workplace Violence -- Human Resources Protection -- Substance Abuse in the Workplace -- Information Security -- Communications Security -- Case Problems -- References -- 19.Your Future in Security and Loss Prevention -- Introduction -- Security and Loss Prevention in the Future -- Education -- Research -- Training -- The Concept of the Security Institute -- Employment -- Case Problems -- References.
Local Note
Elsevier ScienceDirect eBook - Educational Textbooks 2020 [EDUTXT20]
Back to top