1 / 86

Security & Loss Prevention: An Introduction

Security & Loss Prevention: An Introduction. 5 th Edition Philip Purpura. Part 1. INTRODUCTION TO SECURITY AND LOSS PREVENTION. Chapter 1. The History of Security and Loss Prevention: A Critical Perspective. Chapter 1. WHY CRITICAL THINKING? HOW CAN WE THINK CRITICALLY?

golda
Download Presentation

Security & Loss Prevention: An Introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security & Loss Prevention: An Introduction 5th Edition Philip Purpura

  2. Part 1 INTRODUCTION TO SECURITY AND LOSS PREVENTION

  3. Chapter 1 The History of Security and Loss Prevention: A Critical Perspective

  4. Chapter 1 • WHY CRITICAL THINKING? • HOW CAN WE THINK CRITICALLY? • WHY THINK CRITICALLY ABOUT THE HISTORY OF SECURITY AND LOSS PREVENTION? • SECURITY AND LOSS PREVENTION DEFINED

  5. Chapter 1 • HISTORY • Why Study the History of Security and Loss Prevention? • EARLY CIVILIZATIONS • Ancient Greece • Ancient Rome • The Middle Ages in Europe

  6. Chapter 1 • MORE CONTEMPORARY TIMES • England • Early America • The Growth of Policing • The Growth of Security Companies • Railroads and Labor Unions • The Great Wars

  7. Chapter 1 • The Third Wave • Convergence of IT and Physical Security • Convergence of Enterprise Security • 21st Century/Post-9/11 Security Challenges

  8. Chapter 2 The Business, Careers, and Challenges of Security and Loss Prevention

  9. Chapter 2 • INTRODUCTION • METRICS • Internal Metrics • External Metrics • THE SECURITY INDUSTRY • Contract versus Proprietary Security

  10. Chapter 2 • CAREERS: LOSS PREVENTION SERVICES AND SPECIALISTS • THE LIMITATIONS OF THE CRIMINAL JUSTICE SYSTEM: IMPLICATIONS FOR LOSS PREVENTION PRACTITIONERS

  11. Chapter 2 • CHALLENGES OF THE SECURITY INDUSTRY • Cooperation between Public Police and Private Security • Regulation of the Industry • The Need for Training • Ethics • The False Alarm Problem

  12. Part 2 REDUCING THE PROBLEM OF LOSS

  13. Chapter 3 Foundations of Security and Loss Prevention

  14. Chapter 3 • THE SECURITY AND LOSS PREVENTION PROFESSION • Theoretical Foundations • Security Periodicals • METHODS FOR PROTECTION PROGRAMS • Risk Analysis • Planning

  15. Chapter 3 • STANDARDS AND REGULATIONS • Standards • Regulations • Post-9/11 Standards and Regulations • Standard-Setting Organizations • EVALUATION OF LOSS PREVENTION PROGRAMS • Scientific Method

  16. Chapter 3 • Sources of Research Assistance • PROPRIETARY SECURITY • Basics of Organization: The Vocabulary • Basics of Organization: The Practical Management Tools

  17. Chapter 4 Law

  18. Chapter 4 • INTRODUCTION • JUDICIAL SYSTEMS • State Court Systems • Federal Court System • ORIGINS OF LAW • TORT LAW AND CONTROLS OVER PRIVATE SECURITY

  19. Chapter 4 • LEGAL THEORY OF PREMISES SECURITY CLAIMS • CONTRACT LAW • CIVIL JUSTICE PROCEDURES • ADMINISTRATIVE LAW • Recordkeeping, Reporting, Inspections, and Searches

  20. Chapter 4 • Compliance Auditing • Federal Sentencing Guidelines • Labor Law • CRIMINAL JUSTICE PROCEDURE • Arrest Law • Force • Searches • Questioning

  21. Chapter 5 Internal and External Relations

  22. Chapter 5 • INTERNAL AND EXTERNAL RELATIONS • Benefits of Good Relations • INTERNAL RELATIONS • Customer Driven Security and Loss Prevention Programs • Marketing

  23. Chapter 5 • Human Relations on the Job • Management Support • Orientation and Training Programs • Loss Prevention Meetings • Intranet and E-Mail • Involvement Programs

  24. Chapter 5 • EXTERNAL RELATIONS • Law Enforcement • Public Safety Agencies • The Community • The Media • External Loss Prevention Peers

  25. Chapter 5 • SPECIAL PROBLEMS • Prosecution Decisions • Loss Prevention Attire

  26. Chapter 6 Applicant Screening and Employee Socialization

  27. Chapter 6 • INTRODUCTION • EMPLOYMENT LAW • Federal Legislation • U.S. Supreme Court Decisions • Equal Employment Opportunity Commission • EEO, AA, and Quotas

  28. Chapter 6 • Diversity • Sexual Harassment • SCREENING METHODS • Resumes and Applications • Interview • Tests • Background Investigations

  29. Chapter 6 • EMPLOYEE SOCIALIZATION • Loss Prevention Orientation for New Employees • Employee Training • Planning Training • Learning Principles • Wasted Training

  30. Chapter 6 • Examples Set by Superiors • Employee Needs

  31. Chapter 7 Internal Threats and Countermeasures

  32. Chapter 7 • INTRODUCTION • INTERNAL THEFT • How Serious Is The Problem? • Why Do Employees Steal? • How Do Employees Steal? • Possible Indicators of Theft

  33. Chapter 7 • MANAGEMENT COUNTERMEASURES • PHYSICAL SECURITY COUNTERMEASURES • Integration, Open Architecture, and Convergence • Access Controls

  34. Chapter 7 • Locks and Keys • Intrusion Detection Systems • Interior Sensors • Closed-Circuit Television • Security Officers • Safes, Vaults, and File Cabinets

  35. Chapter 8 External Threats and Countermeasures

  36. Chapter 8 • INTRODUCTION • METHODS OF UNAUTHORIZED ENTRY • COUNTERMEASURES • Construction and Environmental Security Design • Perimeter Security

  37. Chapter 8 • Barriers • Protecting Buildings Against Terrorism • Windows • Doors • Intrusion Detection Systems • CCTV • Lighting

  38. Chapter 8 • Parking Lot and Vehicle Controls • Security Officers • Communications and the Control Center • Protective Dogs

  39. Chapter 9 Services and Systems: Methods Toward Wise Purchasing Decisions

  40. Chapter 9 • INTRODUCTION • PITFALLS WHEN PURCHASING SECURITY SERVICES AND SYSTEMS • PURCHASING SECURITY SERVICES • Questions When Considering Contract Security Officers

  41. Chapter 9 • Contract Undercover Investigators • Consultants • Certifications in Security • PURCHASING SECURITY SYSTEMS • Questions When Considering a Security System • System Acquisition • OUTSOURCING

  42. Chapter 10 Investigations

  43. Chapter 10 • INTRODUCTION • TYPES OF INVESTIGATIONS • Proprietary and Contract Investigations • Private and Public Investigations • Overt and Undercover Private Investigations • Important Considerations

  44. Chapter 10 • LAW • EVIDENCE • INTERVIEWING AND INTERROGATION • INFORMATION SOURCES • Legal Restrictions When Collecting Information

  45. Chapter 10 • IDENTITY THEFT • INVESTIGATIVE LEADS • SURVEILLANCE • INFORMATION ACCURACY • REPORT WRITING • TESTIMONY

  46. Chapter 11 Accounting, Accountability, and Auditing

  47. Chapter 11 • INTRODUCTION • ACCOUNTING • ACCOUNTABILITY • Cashier Operations • Purchasing • Inventory

  48. Chapter 11 • AUDITING • Auditors • Internal Control Questionnaire • FRAUD • GOVERNANCE, RISK MANAGEMENT, AND COMPLIANCE

  49. Chapter 12 Risk Management, Business Continuity, and Emergency Management

  50. Chapter 12 • RISK MANAGEMENT • The Role of the Risk Manager • The Risk Management Process • Risk Modeling • Risk Management Tools • Enterprise Risk Management • INSURANCE

More Related