
Introduction to Security
by Ortmeier, P. J.-
Free Shipping On Orders Over $35
Your order must be $35 or more to qualify for free economy shipping. Marketplace items, eBooks and apparel do not qualify towards the $35 purchase minimum.
Buy Used
Rent Textbook
New Textbook
We're Sorry
Sold Out
eTextbook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
P.J. Ortmeier holds bachelors and masters degrees in Criminal Justice and a Ph.D. in Educational Leadership with an emphasis in Public Safety Training and Development. He is a U.S. Army veteran and a former police officer. Dr. Ortmeier developed and implemented numerous courses and degree programs in law enforcement, corrections, security, criminal justice, and public safety.
Currently, Dr. Ortmeier is the Coordinator of the 1400-student Administration of Justice Department at Grossmont College, located in the San Diego suburb of El Cajon, California. He also holds teaching positions at California State University, San Marcos, The Union Institute and University, and Webster University in San Diego.
Dr. Ortmeier is the author of Introduction to Law Enforcement and Criminal Justice, Policing the Community: A Guide for Patrol Operations, Public Safety and Security Administration and Security Management: An Introduction as well as several articles appearing in journals such as The Police Chief, The Law Enforcement Executive Forum, California Security, Police and Security News, and Security Management. Dr. Ortmeier’s publications focus on law enforcement, criminal justice, professional career education, management, leadership, community policing, security administration, and competency development for public safety personnel. With Edwin Meese III, former Attorney General of the United States, Dr. Ortmeier co-authored Leadership, Ethics, and Policing: Challenges for the 21st Century.
Dr. Ortmeier is a member of the American Society for Criminology, the Academy of Criminal Justice Sciences, the Western and Pacific Association of Criminal Justice Educators, the California Association of Administration of Justice Educators, and the American Society for Industrial Security. His current interests include homeland defense and the development of leadership skills and career education pathways for law enforcement and other public safety professionals.
Table of Contents
Preface | p. xii |
Organization of the Book | p. xiii |
Acknowledgments | p. xiii |
About the Author | p. xiv |
Introduction: Security's Role in Society | p. 1 |
History and Overview | p. 3 |
Learning Objectives | p. 3 |
The Context for Security | p. 4 |
Theoretical Foundation | p. 4 |
Defining Security's Role | p. 5 |
Security's Impact | p. 5 |
The Contemporary Security Environment | p. 7 |
Security: A Brief History | p. 8 |
Ancient Traditions | p. 8 |
English Common Law | p. 8 |
The American Experience | p. 10 |
Private Police and Public Law Enforcement | p. 14 |
Security: Essential Functions | p. 17 |
Security Organizations | p. 19 |
Contract Security Services | p. 19 |
Proprietary Security | p. 21 |
Hybrid Security Organizations | p. 21 |
The Virtual Security Organization | p. 22 |
Roles of the Security Manager | p. 22 |
Regulation of the Security Industry | p. 23 |
Professional Certification and Education Programs | p. 27 |
Summary | p. 28 |
Key Terms | p. 29 |
Discussion Questions and Exercises | p. 30 |
Case Study: Law Enforcement-Security Partnerships | p. 30 |
Threats to Safety and Security | p. 31 |
Learning Objectives | p. 31 |
Introduction | p. 32 |
Accidents | p. 32 |
Human Error | p. 33 |
The Threat from Fire | p. 33 |
Natural Disasters | p. 35 |
Environmental Disasters | p. 35 |
Civil Liability | p. 36 |
Substance Abuse | p. 37 |
Civil Disorder | p. 40 |
Crime | p. 41 |
Scope of Crime | p. 42 |
Economic Crime | p. 44 |
Organized Crime | p. 48 |
Street Crime | p. 49 |
Terrorism | p. 50 |
Victimless Crime | p. 50 |
Workplace Violence | p. 50 |
Causes of Crime and Prevention Strategies | p. 51 |
Summary | p. 53 |
Key Terms | p. 54 |
Discussion Questions and Exercises | p. 54 |
Case Study: Analyzing Crime Trends | p. 55 |
Legal Aspects of Security | p. 56 |
Learning Objectives | p. 56 |
Introduction | p. 57 |
Judicial Systems | p. 57 |
Burden and Degrees of Proof | p. 61 |
The Judicial Process | p. 62 |
Criminal Cases | p. 62 |
Civil Cases | p. 64 |
Tort Law | p. 65 |
Contract Law | p. 67 |
Administrative Law | p. 70 |
Property Law | p. 71 |
Employment Law | p. 73 |
Criminal Law | p. 74 |
Sources, Definitions, and Classifications of Crime | p. 74 |
Specific Crimes | p. 75 |
Preliminary (Preparatory) Crimes | p. 76 |
Crimes against Property | p. 76 |
Crimes against Persons | p. 77 |
Obstruction of Justice | p. 78 |
Crimes against Children | p. 79 |
Sex Crimes | p. 79 |
Controlled Substance Crimes | p. 79 |
Liquor Law Violations | p. 79 |
Driving under the Influence | p. 79 |
Weapons Violations | p. 79 |
Crimes against the Public Peace | p. 79 |
Laws of Arrest | p. 80 |
Evidence Law | p. 82 |
Search and Seizure | p. 83 |
Courtroom Presentation | p. 85 |
Attitude | p. 85 |
Appearance | p. 85 |
Demeanor | p. 86 |
Testimonial Technique | p. 86 |
Summary | p. 87 |
Key Terms | p. 88 |
Discussion Questions and Exercises | p. 88 |
Case Study: Legal Research and Writing | p. 89 |
Security Operations: Essential Functions | p. 91 |
Physical Security: Structural, Electronic, and Human Protection Systems | p. 93 |
Learning Objectives | p. 93 |
Introduction | p. 94 |
Basics of Defense and Levels of Protection | p. 94 |
Perimeter Controls | p. 95 |
Building Exteriors and Interiors | p. 96 |
Lighting | p. 97 |
Fences | p. 98 |
Locks | p. 99 |
Other Access Controls | p. 102 |
Visual Assessment and Surveillance Systems | p. 104 |
Alarm Systems | p. 106 |
Alarm System Management | p. 109 |
Fire Prevention and Protection | p. 112 |
Fire Prevention | p. 112 |
Fire Protection Systems | p. 114 |
Human Protection Systems | p. 116 |
Summary | p. 117 |
Key Terms | p. 117 |
Discussion Questions and Exercises | p. 118 |
Case Study: Physical Security | p. 118 |
Personnel Security Through Leadership and Ethics | p. 119 |
Learning Objectives | p. 119 |
Introduction | p. 120 |
Personnel Recruitment and Selection | p. 120 |
Recuritment | p. 120 |
Selection | p. 121 |
Negligent Hiring and Retention | p. 126 |
Personnel Management | p. 127 |
Training and Scheduling | p. 127 |
Supervision and Leadership | p. 128 |
Motivation and Management | p. 132 |
Behavioral Assumptions and Leadership Style | p. 133 |
Performance Appraisal | p. 138 |
Promotion | p. 139 |
Discipline | p. 139 |
Human Resource Policies and Procedures | p. 140 |
Employer-Employee Relations Laws | p. 141 |
Employee Retention | p. 143 |
Personnel Integrity | p. 144 |
ASIS International Code of Ethics | |
Summary | p. 148 |
Key Terms | p. 149 |
Discussion Questions and Exercises | p. 149 |
Case Study: Ethical Leadership | p. 150 |
Information and Computer Security | p. 151 |
Learning Objectives | p. 151 |
Introduction | p. 152 |
INFOSEC Risk Assessment and Analysis | p. 153 |
Information Protection Strategies | p. 154 |
Communications Security | p. 160 |
Computer Security | p. 162 |
Threats to Computers | p. 162 |
Computer Protection Strategies | p. 167 |
Summary | p. 169 |
Key Terms | p. 170 |
Discussion Questions and Exercises | p. 171 |
Case Study: Preventing Cybercrime | p. 171 |
Security Management | p. 173 |
Risk Assessment, Security Surveys, and Planning | p. 175 |
Learning Objectives | p. 175 |
Introduction | p. 176 |
The Concept of Risk | p. 176 |
Risk Defined | p. 176 |
Types of Risk | p. 176 |
Risk Assessment and Management Techniques | p. 177 |
Elimination, Reduction, Mitigation | p. 178 |
Vulnerability, Probability, Criticality | p. 178 |
Risk Assessment and the Security Survey | p. 180 |
Planning and Budgeting | p. 183 |
Plan Types and Elements | p. 183 |
Budgeting | p. 186 |
Selling the Plan | p. 189 |
Contingency Planning | p. 190 |
Disaster and Emergency Planning | p. 191 |
Crime Prevention Through Environmental Design | p. 193 |
Summary | p. 195 |
Key Terms | p. 196 |
Discussion Questions and Exercises | p. 197 |
Case Study: Planning | p. 197 |
Program Implementation and Administration | p. 198 |
Learning Objectives | p. 198 |
Introduction | p. 199 |
The Administrative Process | p. 199 |
Public Versus Private Administration | p. 199 |
Principles of Organization and Management | p. 200 |
Ethical Leadership | p. 204 |
Staffing | p. 204 |
Workforce Planning | p. 205 |
Training and Education | p. 208 |
Teaching and Learning Strategies | p. 211 |
Educational Program Development | p. 211 |
Equipment, Facilities, Supplies, and Maintenance | p. 214 |
Policies and Procedures | p. 215 |
Contract Services (Outsourcing) | p. 218 |
Evaluation (Assessment) | p. 219 |
Performance Measurements | p. 219 |
Quality Assurance | p. 221 |
Summary | p. 224 |
Key Terms | p. 224 |
Discussion Questions and Exercises | p. 225 |
Case Study: Security Program Evaluation | p. 225 |
Investigations, Intelligence Operations, and Reporting | p. 226 |
Learning Objectives | p. 226 |
Introduction | p. 227 |
Investigations | p. 227 |
The Basics | p. 227 |
Types of Investigations | p. 227 |
Human Resource Investigations | p. 228 |
Personal Injury and Property Damage Investigations | p. 230 |
Criminal Investigations | p. 230 |
Business Crime Investigations | p. 232 |
Information Gathering and Analysis | p. 235 |
Role of Forensic Science | p. 237 |
Impermissible Investigative Conduct | p. 238 |
Intelligence Operations | p. 242 |
Business Intelligence | p. 242 |
Criminal Intelligence | p. 244 |
National Intelligence | p. 244 |
Counterespionage | p. 244 |
Reporting | p. 247 |
Documentation Methods | p. 247 |
Notes | p. 247 |
Reports | p. 248 |
General Writing Principles | p. 248 |
Summary | p. 250 |
Key Terms | p. 251 |
Discussion Questions and Exercises | p. 251 |
Case Study: Investigating With Online Resources | p. 252 |
Security Applications and Solutions | p. 253 |
Institutional Security, Disaster Recovery, and Executive Protection | p. 255 |
Learning Objectives | p. 255 |
Introduction | p. 256 |
Banking and Financial Institution Security | p. 256 |
Computer Security | p. 257 |
Contract Services | p. 257 |
Courthouse and Courtroom Security | p. 257 |
Disaster Recovery | p. 258 |
Educational Institution Security | p. 260 |
Schools | p. 260 |
Colleges and Universities | p. 266 |
Entertainment Security | p. 268 |
Executive Protection | p. 272 |
Healthcare Security | p. 273 |
Hospitality Security | p. 276 |
Summary | p. 278 |
Key Terms | p. 279 |
Discussion Questions and Exercises | p. 279 |
Case Study: The Virginia Tech Incident | p. 279 |
Industrial Security, Retail Loss Prevention, and Workplace Violence | p. 281 |
Learning Objectives | p. 281 |
Introduction | p. 282 |
Industrial Security | p. 282 |
Library and Museum Security | p. 282 |
Office Building Security | p. 284 |
Privatization of Public Services | p. 286 |
Residential Security | p. 287 |
Retail Loss Prevention | p. 288 |
Introduction | p. 288 |
Internal Theft | p. 289 |
External Sources of Loss | p. 290 |
Workplace Violence Prevention | p. 293 |
Zoo and Aquarium Security | p. 297 |
Summary | p. 300 |
Key Terms | p. 300 |
Discussion Questions and Exercises | p. 300 |
Case Study: Workplace Violence | p. 301 |
Homeland Security: Confronting Terrorism and Domestic Threats | p. 302 |
Learning Objectives | p. 302 |
Introduction | p. 303 |
Homeland Security: A Historical Perspective | p. 303 |
Terrorism | p. 304 |
Bombs, Bomb Threats, and Weapons of Mass Destruction | p. 308 |
Nuclear Weapons | p. 309 |
Biological Weapons | p. 310 |
Chemical Weapons | p. 310 |
Radiological Weapons | p. 310 |
Natural Disasters | p. 310 |
Environmental Disasters | p. 312 |
Government Security | p. 314 |
The U.S. Department of Homeland Security (DHS) | p. 316 |
DHS Components | p. 318 |
Office of the Secretary (DHS) | p. 319 |
Advisory Panels and Committees | p. 320 |
The 9/11 Commission | p. 321 |
Airline and Airport Security | p. 323 |
Transportation and Cargo Security | p. 329 |
Trucking Industry Security | p. 331 |
Railroad Security | p. 332 |
Maritime Security | p. 332 |
Critical Infrastructure and Utility Security | p. 333 |
Summary | p. 337 |
Key Terms | p. 337 |
Discussion Questions and Exercises | p. 338 |
Case Study: Responding to a Catastrophe | p. 338 |
Trends and Challenges | p. 339 |
Career Opportunities | p. 341 |
Learning Objectives | p. 341 |
Introduction | p. 342 |
Career Preparation | p. 342 |
Resume Preparation Do's | p. 343 |
Resume Preparation Don'ts | p. 343 |
Career Opportunities | p. 344 |
Airport/Airline Security | p. 345 |
Banking/Financial Services Security | p. 345 |
Contract Services | p. 345 |
Computer/Information Security | p. 346 |
Casino/Gaming Security | p. 346 |
Chief Security Officer | p. 346 |
Educational Institution Security | p. 347 |
Healthcare Security | p. 347 |
Hospitality Security | p. 347 |
Industrial Security | p. 347 |
Investigations | p. 348 |
Museum and Library Security | p. 348 |
Residential/Commercial Real Estate Security | p. 348 |
Retail Loss Prevention | p. 349 |
Security Sales and Service | p. 349 |
Systems Design and Engineering | p. 349 |
Transportation Security | p. 349 |
Utility Security | p. 350 |
Summary | p. 350 |
Key Terms | p. 350 |
Discussion Questions and Exercises | p. 350 |
Case Study: Careers in Security | p. 351 |
The Future | p. 352 |
Learning Objectives | p. 352 |
Introduction | p. 353 |
The Future of Security: Growth and Challenges | p. 353 |
Impact of Globalization | p. 354 |
Legislative Trends in Security | p. 358 |
Terrorism | p. 359 |
The Global Landscape in 2020 | p. 361 |
New Global Players | p. 362 |
New Challenges to Governance | p. 363 |
Pervasive Insecurity | p. 365 |
Transmuting International Terrorism | p. 366 |
Policy Implications | p. 367 |
Summary | p. 368 |
Key Terms | p. 369 |
Discussion Questions and Exercises | p. 369 |
Case Study: The Big Picture | p. 369 |
Glossary | p. 370 |
Correlation of ASIS International Syllabus for Introduction to Security for Business Students with Introduction to Security: Operations and Management, 3rd edition | p. 386 |
Safety and Security Survey Instrument | p. 387 |
References | p. 398 |
Index | p. 413 |
Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.