Effective Security Management,
Edition 6
By Charles A. Sennewald, CPP and Curtis Baillie

Publication Date: 28 Aug 2015
Description

Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management.

The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers.

The sixth edition of this classic professional reference work on the topic includes newly updated and expanded coverage of topics such as the integration of security executive into the business, background checks and hiring procedures, involvement in labor disputes, organized crime, and the role of social media.

Key Features

  • Offers the most current picture of the role and duties of security managers
  • Includes three new chapters on security ethics and conflicts of interest, convergence in security management, and ISO security standards, along with coverage of new security jobs titles and duties
  • Contains updated contributions from leading security experts Colin Braziel, Karim Vellani, and James Broder
  • Case studies and examples from around the world are included to facilitate further understanding
About the author
By Charles A. Sennewald, CPP, Independent security management consultant, expert witness, and author, internationally based and Curtis Baillie, President, Security Consulting Strategies, Sandusky, Ohio, USA
Table of Contents
  • Preface
  • Acknowledgments
  • Introduction
    • Managing the Organization
    • Managerial Acts
    • Managerial Functions
    • The Successful Manager
  • Part 1: General Security Management
    • 1. General Principles of Organization
      • Organization Principles
      • Where Security Fits in the Organizational Structure
      • The Difference between Corporate and Company Security
      • Summary
      • Review
    • 2. Organizational Structure
      • The Informal Organization
      • Additional Organizational Structure
      • Summary
      • Review
    • 3. Security’s Role in the Organization
      • The Protective Service Role
      • Summary
      • Review
    • 4. The Security Director’s Role
      • The Security Director…
      • The New Security Director
      • Summary
      • Review
    • 5. The Security Supervisor’s Role
      • The Supervisor as an Inspector
      • Supervisory Authority
      • The Supervisor as the “In-Between” Person
      • The Supervisor’s Span of Control
      • Supervisory Training
      • Summary
      • Review
    • 6. The Individual Security Employee
      • Standards of Conduct
      • Summary
      • Review
    • 7. Ethics and Conflicts of Interest
      • Deciding between Right and Wrong: Listening to Our Inner Voice
      • The Need for Ethics-Based Policies
      • Higher Standard of Expectations
      • Establishing a Business Ethics Policy
      • Train Employees to Your Expectations
      • Reporting Potential Unethical Conduct
      • Deciding Ethical Dilemmas
      • Identifying and Reporting Potential Conflicts of Interest
      • Summary
      • Review
  • Part 2: Security Personnel Management
    • 8. Hiring Security Personnel
      • Hiring
      • Summary
      • Review
    • 9. Job Descriptions
      • Accuracy and Completeness in Describing the Job
      • Matching Applicant to the Job
      • Employee’s Understanding of the Job
      • Matching Training to Job Description
      • Performance Evaluations Based on Job Descriptions
      • Job Descriptions are Current
      • Composition of the Job Description
      • Summary
      • Review
    • 10. Training
      • Shortcomings of Typical “Training”
      • Circumvention of the Training Program
      • Training Defined
      • POP Formula: Policy, Objective, Procedure
      • Training as Ongoing Responsibility
      • Types of Security Training Programs
      • Security Manual
      • Summary
      • Review
    • 11. Discipline
      • The Supervisor’s Role in Discipline
      • Disciplinary Problems Arising from Misunderstood Assignments
      • Basic Rules of the Disciplinary Process
      • Progressive Discipline
      • Self-Discipline
      • Summary
      • Review
    • 12. Motivation and Morale
      • Theory X and Theory Y
      • Organizational Behavior
      • Give Your People the Opportunity to Fail
      • Motivators
      • Demotivators
      • Summary
      • Review
    • 13. Promotions
      • Identifying Promotional Candidates
      • Selection of the Right Candidate
      • Following the Selection
      • Promotion from Within
      • Vertical Promotion Outside the Department
      • Advantages of Multiple Layers
      • Temporary Promotions
      • Retreating
      • Summary
      • Review
    • 14. Communication
      • Types of Communication
      • About Listening
      • Summary
      • Review
    • 15. Career (Proprietary) versus Noncareer (and Contract) Personnel
      • Career Personnel
      • Part-Time Noncareer Personnel
      • Contractual Noncareer Personnel
      • Combining Career and Noncareer Personnel
      • Summary
      • Review
  • Part 3: Operational Management
    • 16. Planning and Budgeting
      • What is a Budget?
      • Why Do We Have a Budget?
      • When is a Budget Prepared?
      • Who Participates in the Budgeting Process?
      • Top-Down and Bottom-Up Process
      • How is a Budget Prepared?
      • Justifying the Security Budget
      • Summary
      • Review
    • 17. Program Management
      • The Security Inspection Process
      • Who Conducts the Inspection?
      • Assessment of Risks and Countermeasures
      • Inspecting for Compliance with Procedures
      • Statistics in Program Management
      • Summary
      • Review
    • 18. Risk
      • Risk Defined
      • Risk Management Programs and the Security Professional’s Role
      • Risk Program Components
      • Summary
      • Review
    • 19. Crisis Management
      • Crisis Management Defined
      • Genesis of the Crisis Management Team
      • The Media and Public Threat
      • Composition of the Crisis Management Team
      • Communication
      • The Crisis Management Team Leader (CMTL)
      • The Crisis Plan
      • Red Teaming: Seeking Out Company Security Vulnerabilities
      • Summary
      • Review
    • 20. The Security Survey
      • What is a Security Survey?
      • The Purpose of a Security Survey
      • Defining Security Survey Goals
      • Building a Survey Program: Components of a Security Survey
      • Summary
      • Review
    • 21. International Security Standards
      • Introduction
      • What is a Standard?
      • International Standards Organization
      • International Security Standards
      • European Standardization Organizations
      • National Standards Bodies
      • Summary
      • Review
    • 22. Office Administration
      • Description of Functions
      • The Office Environment
      • Summary
      • Review
    • 23. Written Policies and Procedures
      • Historical Evolution
      • Policy
      • Benefits
      • Consistency in Performance
      • Reduction of Decision-Making Time
      • Enhancement of Controls
      • Provision for Objective Performance Evaluation
      • Compliance
      • Combining Policies and Procedures
      • Section 11.06 Investigative and Security Interviews
      • Definitions
      • Procedures
      • Free-Standing Policies
      • Importance of the Written Policy
      • Policies, Procedures, and the Security Manual
      • Format and Mechanics
      • Post Orders
      • Summary
      • Review
    • 24. Computers and Effective Security Management
      • Introduction
      • PC Hardware
      • Networks
      • PC Software
      • Specialized Management Programs
      • Artificial Intelligence
      • Multimedia
      • Risks of Using PCs
      • Summary
      • Review
    • 25. Statistics as a Security Management Tool
      • Introduction
      • Planning for Future Security Needs
      • Internal Statistical Analysis
      • External Statistical Analysis
      • Methodology
      • Information for Risk Analysis
      • Return on Investment
      • Summary
      • Review
    • 26. Convergence in Security Management
      • How the Idea of Convergence Came About
      • Merging Functions between Companies
      • The Convergence of Security and IT Security
      • Understanding Convergence
      • Benefits of Converging
      • Return on Investment
      • Summary
      • Review
  • Part 4: Public Relations
    • 27. Selling Security within the Organization
      • How to Sell Security
      • Summary
      • Review
    • 28. Relationship with Law Enforcement
      • Services of the Public Sector
      • Services of the Private Sector
      • Summary
      • Review
    • 29. Relationship with the Industry
      • Effective Relationship Categories
      • Participation
      • Summary
      • Review
    • 30. Community Relations
      • Introduction
      • Company Outlook and Participation
      • Company Image
      • Company Support
      • Security Networking
      • Public Speaking
      • Print Media Interviews
      • Radio Interviews and Appearances on Television
      • General Public Contact
      • Summary
      • Review
  • Part 5: Mismanagement
    • 31. Jackass Management Traits
      • The Manager Who Seeks to Be “Liked” Rather Than Respected
      • The Manager Who Ignores the Opinions and Advice of Subordinates
      • The Manager Who Fails to Delegate Properly
      • The Manager Who Ignores the Training and Developmental Needs of Subordinates
      • The Manager Who Insists on Doing Everything “The Company Way”
      • The Manager Who Fails to Give Credit When Credit is Due
      • The Manager Who Treats Subordinates as Subordinates
      • The Manager Who Ignores Employees’ Complaints
      • The Manager Who Does Not Keep People Informed
      • The Manager Who Holds His or Her Assistant Back
      • The Manager Who Views the Disciplinary Process as a Punitive Action
      • The Manager Who Fails to Back up His or Her People
      • The Manager Whose Word Cannot Be Trusted
      • The Manager Who Avoids Making Decisions
      • The Manager Who “Plays Favorites”
      • The Manager Who Fails to Stay Current in the Field
      • The Manager Who Enjoys “Pouring on” More Work Than a Subordinate Can Handle
      • The Manager Who Acts or Overreacts Too Quickly
      • The Newly Promoted Manager Who Believes His or Her Manure is Odorless
      • The Manager Who is Moody
      • Managers Who Fail to Plan and Put Priorities on Their Work
      • The Manager Who Lacks Emotion and Empathy
      • The Manager Who Hires Relatives into the Organization
      • The Manager Who Has a Dim View of Women's Value in the Workplace and Created the Famous "Glass Ceiling"
      • The Manager Who Faithfully Practices the Art of Pessimism
      • The Manager Who Steals Subordinates’ Ideas
      • The Manager Whose Style and Authority is Based on Absolute Power
      • The Manager Who Seems Oblivious to What is Happening
      • The Manager Who Loves to “Sack” Employees
      • The Manager Who Embarrasses Subordinates in the Presence of Others
      • The Manager Who Follows “Double Standards” in the Organization
      • The Manager Who is a Religious or Racial Bigot
      • Summary
  • Appendix A. Employee Performance Evaluation
  • Appendix B. Security Vulnerability Survey
    • I General Function
    • II Building and Perimeter
    • III Vehicular Movement
    • IV Lighting
    • V Locking Controls
    • VI Alarms
    • VII Guards/Security Controls
    • VIII Employee and Visitor Controls
    • IX Product Controls (Shipping and Receiving)
    • X Money Controls
    • XI Proprietary Information
    • XII Other Vulnerabilities
    • XIII Personnel Security
  • Appendix C. IAPSC Code of Ethics
    • General
    • Professional
    • Forensic
    • Enforcement
  • Appendix D. Selected Security-Related Organizations
  • Appendix E. Suggested Security/Loss Prevention Reference Sources
    • Books
    • Journals
    • Magazines
    • Newsletters
    • Association Publications
  • Index
Book details
ISBN: 9780128027745
Page Count: 402
Retail Price : £62.99
  • Fischer, Introduction to Security 9e, Sep-12, 544 pages, $69.95, 9780123850577
  • Fay, Contemporary Security Management 3e, Nov-10, 466 pages, $68.95, 9780123815491
  • Vellani, Strategic Security Management, Oct-06, 416 pages, $81.95, 9780123708977
  • McCrie, Security Operations Management 3e, Feb-16, 472 pages, $89.95, ISBN pending
  • IFPO, Security Supervision and Management 4e, Sep-15, 568 pages, $74.95, 9780128004890
  • Evan Wheeler, Security Risk Management: Building an Information Security Risk Management Program from the Ground Up, Syngress, Jun-11, 360 pages, $49.95, 9781597496155
  • Komendat, Security Leader Insights for Success: Lessons and Strategies from Leading Security Professionals, SEC, Mar-14, 140 pages, $24.95, 9780128008447
  • Peterson, Enterprise Security Risk Management, Oct-15, 376 pages, $59.95, 9780128021620
Audience

Security Directors and Managers, Business professionals responsible for security, Security Management upper level undergraduate and graduate students