Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security & Loss Prevention: An Introduction

Similar presentations


Presentation on theme: "Security & Loss Prevention: An Introduction"— Presentation transcript:

1 Security & Loss Prevention: An Introduction
5th Edition Philip Purpura

2 INTRODUCTION TO SECURITY AND LOSS PREVENTION
Part 1 INTRODUCTION TO SECURITY AND LOSS PREVENTION

3 The History of Security and Loss Prevention: A Critical Perspective
Chapter 1 The History of Security and Loss Prevention: A Critical Perspective

4 Chapter 1 WHY CRITICAL THINKING? HOW CAN WE THINK CRITICALLY?
WHY THINK CRITICALLY ABOUT THE HISTORY OF SECURITY AND LOSS PREVENTION? SECURITY AND LOSS PREVENTION DEFINED

5 Chapter 1 HISTORY EARLY CIVILIZATIONS
Why Study the History of Security and Loss Prevention? EARLY CIVILIZATIONS Ancient Greece Ancient Rome The Middle Ages in Europe

6 Chapter 1 MORE CONTEMPORARY TIMES England Early America
The Growth of Policing The Growth of Security Companies Railroads and Labor Unions The Great Wars

7 Chapter 1 The Third Wave Convergence of IT and Physical Security
Convergence of Enterprise Security 21st Century/Post-9/11 Security Challenges

8 The Business, Careers, and Challenges of Security and Loss Prevention
Chapter 2 The Business, Careers, and Challenges of Security and Loss Prevention

9 Chapter 2 INTRODUCTION METRICS THE SECURITY INDUSTRY Internal Metrics
External Metrics THE SECURITY INDUSTRY Contract versus Proprietary Security

10 Chapter 2 CAREERS: LOSS PREVENTION SERVICES AND SPECIALISTS
THE LIMITATIONS OF THE CRIMINAL JUSTICE SYSTEM: IMPLICATIONS FOR LOSS PREVENTION PRACTITIONERS

11 Chapter 2 CHALLENGES OF THE SECURITY INDUSTRY
Cooperation between Public Police and Private Security Regulation of the Industry The Need for Training Ethics The False Alarm Problem

12 REDUCING THE PROBLEM OF LOSS
Part 2 REDUCING THE PROBLEM OF LOSS

13 Foundations of Security and Loss Prevention
Chapter 3 Foundations of Security and Loss Prevention

14 Chapter 3 THE SECURITY AND LOSS PREVENTION PROFESSION
Theoretical Foundations Security Periodicals METHODS FOR PROTECTION PROGRAMS Risk Analysis Planning

15 Chapter 3 STANDARDS AND REGULATIONS
Post-9/11 Standards and Regulations Standard-Setting Organizations EVALUATION OF LOSS PREVENTION PROGRAMS Scientific Method

16 Chapter 3 PROPRIETARY SECURITY Sources of Research Assistance
Basics of Organization: The Vocabulary Basics of Organization: The Practical Management Tools

17 Chapter 4 Law

18 Chapter 4 INTRODUCTION JUDICIAL SYSTEMS ORIGINS OF LAW
State Court Systems Federal Court System ORIGINS OF LAW TORT LAW AND CONTROLS OVER PRIVATE SECURITY

19 Chapter 4 LEGAL THEORY OF PREMISES SECURITY CLAIMS CONTRACT LAW
CIVIL JUSTICE PROCEDURES ADMINISTRATIVE LAW Recordkeeping, Reporting, Inspections, and Searches

20 Chapter 4 CRIMINAL JUSTICE PROCEDURE Compliance Auditing
Federal Sentencing Guidelines Labor Law CRIMINAL JUSTICE PROCEDURE Arrest Law Force Searches Questioning

21 Internal and External Relations
Chapter 5 Internal and External Relations

22 Chapter 5 INTERNAL AND EXTERNAL RELATIONS INTERNAL RELATIONS
Benefits of Good Relations INTERNAL RELATIONS Customer Driven Security and Loss Prevention Programs Marketing

23 Chapter 5 Human Relations on the Job Management Support
Orientation and Training Programs Loss Prevention Meetings Intranet and Involvement Programs

24 Chapter 5 EXTERNAL RELATIONS Law Enforcement Public Safety Agencies
The Community The Media External Loss Prevention Peers

25 Chapter 5 SPECIAL PROBLEMS Prosecution Decisions
Loss Prevention Attire

26 Applicant Screening and Employee Socialization
Chapter 6 Applicant Screening and Employee Socialization

27 Chapter 6 INTRODUCTION EMPLOYMENT LAW Federal Legislation
U.S. Supreme Court Decisions Equal Employment Opportunity Commission EEO, AA, and Quotas

28 Chapter 6 SCREENING METHODS Diversity Sexual Harassment
Resumes and Applications Interview Tests Background Investigations

29 Chapter 6 EMPLOYEE SOCIALIZATION
Loss Prevention Orientation for New Employees Employee Training Planning Training Learning Principles Wasted Training

30 Chapter 6 Examples Set by Superiors Employee Needs

31 Internal Threats and Countermeasures
Chapter 7 Internal Threats and Countermeasures

32 Chapter 7 INTRODUCTION INTERNAL THEFT How Serious Is The Problem?
Why Do Employees Steal? How Do Employees Steal? Possible Indicators of Theft

33 Chapter 7 MANAGEMENT COUNTERMEASURES PHYSICAL SECURITY COUNTERMEASURES
Integration, Open Architecture, and Convergence Access Controls

34 Chapter 7 Locks and Keys Intrusion Detection Systems Interior Sensors
Closed-Circuit Television Security Officers Safes, Vaults, and File Cabinets

35 External Threats and Countermeasures
Chapter 8 External Threats and Countermeasures

36 Chapter 8 INTRODUCTION METHODS OF UNAUTHORIZED ENTRY COUNTERMEASURES
Construction and Environmental Security Design Perimeter Security

37 Chapter 8 Barriers Protecting Buildings Against Terrorism Windows
Doors Intrusion Detection Systems CCTV Lighting

38 Chapter 8 Parking Lot and Vehicle Controls Security Officers
Communications and the Control Center Protective Dogs

39 Services and Systems: Methods Toward Wise Purchasing Decisions
Chapter 9 Services and Systems: Methods Toward Wise Purchasing Decisions

40 Chapter 9 INTRODUCTION PITFALLS WHEN PURCHASING SECURITY SERVICES AND SYSTEMS PURCHASING SECURITY SERVICES Questions When Considering Contract Security Officers

41 Chapter 9 PURCHASING SECURITY SYSTEMS OUTSOURCING
Contract Undercover Investigators Consultants Certifications in Security PURCHASING SECURITY SYSTEMS Questions When Considering a Security System System Acquisition OUTSOURCING

42 Chapter 10 Investigations

43 Chapter 10 INTRODUCTION TYPES OF INVESTIGATIONS
Proprietary and Contract Investigations Private and Public Investigations Overt and Undercover Private Investigations Important Considerations

44 Chapter 10 LAW EVIDENCE INTERVIEWING AND INTERROGATION
INFORMATION SOURCES Legal Restrictions When Collecting Information

45 Chapter 10 IDENTITY THEFT INVESTIGATIVE LEADS SURVEILLANCE
INFORMATION ACCURACY REPORT WRITING TESTIMONY

46 Accounting, Accountability, and Auditing
Chapter 11 Accounting, Accountability, and Auditing

47 Chapter 11 INTRODUCTION ACCOUNTING ACCOUNTABILITY Cashier Operations
Purchasing Inventory

48 Chapter 11 AUDITING FRAUD GOVERNANCE, RISK MANAGEMENT, AND COMPLIANCE
Auditors Internal Control Questionnaire FRAUD GOVERNANCE, RISK MANAGEMENT, AND COMPLIANCE

49 Risk Management, Business Continuity, and Emergency Management
Chapter 12 Risk Management, Business Continuity, and Emergency Management

50 Chapter 12 RISK MANAGEMENT INSURANCE The Role of the Risk Manager
The Risk Management Process Risk Modeling Risk Management Tools Enterprise Risk Management INSURANCE

51 Chapter 12 BUSINESS CONTINUITY Types of Insurance
Crime Insurance and Bonds Fire Insurance Property and Liability Insurance Claims Claims for Crime Losses BUSINESS CONTINUITY

52 Chapter 12 EMERGENCY MANAGEMENT THE MILITARY
Guidance for Business Continuity Planning Methodology for Business Continuity EMERGENCY MANAGEMENT All-Hazards Preparedness Concept The History of Emergency Management Emergency Management Disciplines THE MILITARY

53 Life Safety, Fire Protection, and Emergencies
Chapter 13 Life Safety, Fire Protection, and Emergencies

54 Chapter 13 LIFE SAFETY FIRE PROTECTION
Standards, Regulations, and Codes OSHA Regulations NFPA 101 Life Safety Code Building Design and Building Codes FIRE PROTECTION The Problem of Fire

55 Chapter 13 FIRE PREVENTION AND FIRE SUPPRESSION STRATEGIES
Private Organizations Involved in Fire Protection Fire Departments Fire Department Protection Efforts FIRE PREVENTION AND FIRE SUPPRESSION STRATEGIES Fire Prevention Strategies

56 Chapter 13 PUBLIC SAFETY AGENCIES EMERGENCIES
Fire Suppression Strategies PUBLIC SAFETY AGENCIES Police Emergency Medical Service (EMS) EMERGENCIES Human-Made Emergencies Natural Disasters

57 Safety in the Workplace
Chapter 14 Safety in the Workplace

58 Chapter 14 INTRODUCTION ACCIDENT STATISTICS AND COSTS
HISTORY OF SAFETY LEGISLATION Workers’ Compensation The Development of OSHA OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION

59 Chapter 14 OSHA’s Strategic Management Plan The Act’s Jurisdiction
OSHA Standards OSHA Recordkeeping and Reporting Additional Employer Responsibilities OSHA Inspections OSHA: Criticism and Controversy Assistance with Problems

60 Chapter 14 SAFETY STRATEGIES Safety and Health Committee
Socialization and Incentive Programs Investigations Additional Safety Measures

61 SPECIAL PROBLEMS AND COUNTERMEASURES
Part III SPECIAL PROBLEMS AND COUNTERMEASURES

62 Terrorism and Homeland Security
Chapter 15 Terrorism and Homeland Security

63 Chapter 15 TERRORISM Terrorism Defined History Religion and Politics
Causes of Terrorism International Terrorism International Terrorists

64 Chapter 15 HOMELAND SECURITY Domestic Terrorism Domestic Terrorists
Terrorist Methods Terrorist Weapons Weapons of Mass Destruction HOMELAND SECURITY Homeland Security Defined

65 Chapter 15 The Measurement of Terrorism
National Counterterrorism Center National Memorial Institute for the Prevention of Terrorism National Security and Homeland Security U.S. Government Action Against Terrorism Legislative Action Against Terrorism

66 Chapter 15 PRIVATE SECTOR State and Local Governments
Response to Weapons of Mass Destruction PRIVATE SECTOR Losses and Costs from the 9/11 Attacks The Homeland Security Market Public-Private Sector Partnerships

67 Chapter 15 Business and Organizational Countermeasures Against Terrorism Citizen Volunteers

68 Protecting Critical Infrastructures, Key Assets, and Borders
Chapter 16 Protecting Critical Infrastructures, Key Assets, and Borders

69 Chapter 16 CRITICAL INFRASTRUCTURE Critical Infrastructure Defined
The Role of Government in Protecting Critical Infrastructure and Key Resources NIPP Risk Management Framework NIPP Recommendations for the Private Sector

70 Chapter 16 CRITICAL INFRASTRUCTURE SECTORS Agriculture and Food Water
Energy Chemical Industry Telecommunications

71 Chapter 16 BORDER AND TRANSPORTATION SECURITY
Cyberspace and Information Technology Defense Industry Base Key Assets BORDER AND TRANSPORTATION SECURITY Government Agencies with Roles in Border and Transportation Security

72 Chapter 16 TRANSPORTATION SECTORS Aviation
Passenger Rail and Railroads Mass Transit Systems Highways, Trucking, and Intercity Busing Maritime Postal and Shipping Pipelines

73 Loss Prevention at Businesses and Institutions
Chapter 17 Loss Prevention at Businesses and Institutions

74 Chapter 17 INTRODUCTION LOSS PREVENTION AT RETAIL BUSINESSES Shrinkage
Human Resources Problems in Retailing Internal Loss Prevention Strategies Preventing Losses at Checkout Counters

75 Chapter 17 ROBBERY AND BURGLARY E-Business Counterfeiting Shoplifting
Confronting the Suspected Shoplifter ROBBERY AND BURGLARY Robbery Countermeasures Burglary Countermeasures

76 Chapter 17 SHOPPING MALL STRATEGIES BANKS AND FINANCIAL BUSINESSES
Banking and Finance Sector Challenges Banking and Finance Sector Initiatives The Scope of Threats and Legal Responsibilities of the Banking and Finance Sector

77 Chapter 17 EDUCATIONAL INSTITUTIONS Regulation H
Bank Robbery Countermeasures Automatic Teller Machines Kidnapping and Extortion Embezzlement, Online Risks, and Fraud EDUCATIONAL INSTITUTIONS Threats and Hazards at Educational Institutions

78 Chapter 17 HEALTHCARE INSTITUTIONS Countermeasures School Districts
Colleges and Universities Fire Protection at Educational Institutions HEALTHCARE INSTITUTIONS Public Health Sector Challenges Public Health Sector Initiatives

79 Chapter 17 The Scope of Threats and Legal Responsibilities of Healthcare Institutions Strategies for Healthcare Institutions

80 Chapter 18 Topics of Concern

81 Chapter 18 WORKPLACE VIOLENCE PERSONNEL PROTECTION Legal Guidelines
Protection Methods PERSONNEL PROTECTION Planning Education and Training General Protection Strategies

82 Chapter 18 SUBSTANCE ABUSE IN THE WORKPLACE INFORMATION SECURITY
Countermeasures Alcoholism Types of Substances and Abuse INFORMATION SECURITY Corporate Intelligence Gathering: Putting It in Perspective

83 Chapter 18 COMMUNICATIONS SECURITY
Espionage Techniques and the Vulnerabilities of Technology Countermeasures COMMUNICATIONS SECURITY Electronic Surveillance and Wiretapping Technical Surveillance Countermeasures

84 Your Future in Security and Loss Prevention
Chapter 19 Your Future in Security and Loss Prevention

85 Chapter 19 SECURITY AND LOSS PREVENTION IN THE FUTURE EDUCATION
Trends Affecting Security and Loss Prevention EDUCATION Loss Prevention Education: Today and Tomorrow

86 Chapter 19 RESEARCH TRAINING EMPLOYMENT
The Concept of the Security Institute EMPLOYMENT Sources of Employment Information Career Advice


Download ppt "Security & Loss Prevention: An Introduction"

Similar presentations


Ads by Google