Effective Security Management

Butterworth-Heinemann Inc (Verlag)
  • 6. Auflage
  • |
  • erschienen am 1. September 2015
  • |
  • 402 Seiten
E-Book | ePUB mit Adobe DRM | Systemvoraussetzungen
E-Book | PDF mit Adobe DRM | Systemvoraussetzungen
978-0-12-802790-5 (ISBN)
Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management.

The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers.

The sixth edition of this classic professional reference work on the topic includes newly updated and expanded coverage of topics such as the integration of security executive into the business, background checks and hiring procedures, involvement in labor disputes, organized crime, and the role of social media.

- Offers the most current picture of the role and duties of security managers
- Includes three new chapters on security ethics and conflicts of interest, convergence in security management, and ISO security standards, along with coverage of new security jobs titles and duties
- Contains updated contributions from leading security experts Colin Braziel, Karim Vellani, and James Broder
- Case studies and examples from around the world are included to facilitate further understanding
  • Englisch
  • MA
  • |
  • USA
Elsevier Science & Technology (Digital)
  • Für Beruf und Forschung
  • Überarbeitete Ausgabe
  • Höhe: 235 mm
  • |
  • Breite: 191 mm
  • 8,66 MB
978-0-12-802790-5 (9780128027905)
0128027908 (0128027908)
weitere Ausgaben werden ermittelt
Charles "Chuck Sennewald CSC, CPP, is an independent security management consultant and expert witness and the author of numerous Butterworth-Heinemann titles, including "Effective Security Management"; "Security Consulting"; "Retail Crime, Security and Loss Prevention: An Encyclopedic Reference;" "From the Files of a Security Expert Witness"; and earlier editions of this book "The Process of Investigation." Chuck is a graduate of California State University - Los Angeles with a BS degree in Police Science and Administration. Chuck is also the founder and first president of the International Association of Professional Security Consultants (IAPSC), and is a long-time member of ASIS International. He has lectured and is read in countries around the globe.
PART 1 General Security Management 1. General Principles of Organization 2. Organizational Structure 3. Security's Role in the Organization 4. The Security Director's Role 5. The Security Supervisor's Role 6. The Individual Security Employee 7. Ethics and Conflicts of Interest PART II Security Personnel Management 8. Hiring Security Personnel 9. Job Descriptions 10. Training 11. Discipline 12. Motivation and Morale 13. Promotions 14. Communication 15. Career (Proprietary) versus Non-career (and Contract) PART III Operational Management 16. Planning and Budget 17. Program Management 18. Risk 19. Crisis Management 20. The Security Survey 21. International Organization for Standardization (ISO) 22. Office Administration 23. Written Policies and Procedures 24. Computers and Effective Security Management 25. Statistics as a Security Management Tool 26. Convergence in Security Management PART IV Public Relations 27. Selling Security within the Organization 28. Relationship with Law Enforcement 29. Relationship with the Industry 30. Community Relations PART V Mismanagement 31. Jackass Management Traits Appendix A Employee Performance Evaluation Appendix B Security Vulnerability Study Appendix C IAPSC Code of Ethics Appendix D Selected Security-Related Organizations Appendix E Suggested Security/Loss Prevention Sources

General Principles of Organization

Organization is the arrangement of people with a common objective. This chapter discusses the six general principles of organization: logical division of work; clear lines of authority and responsibility; span of control; unity of command; delegation of responsibility and authority with accountability; and coordination to meet organizational goals. It goes on to explain the changing role of security, its contribution to profits, and the difference between corporate and company security.


functional organization; line authority; loss control; loss prevention; organization; span of control; unity of command

The structural framework of an organization is a vehicle for accomplishing the purposes for which a company or a department is established. That skeleton, the organizational structure itself, does not think, has no initiative, and cannot act or react. However, it is absolutely essential in the work environment. A sound organizational framework facilitates the accomplishment of tasks by members of the organization-people working under the supervision of responsible managers.

A hospital, for example, is organized for the purpose of providing health care services. A subunit of that master organization, the Security department, is organized for the purpose of protecting that health care environment. Organization, then, is the arrangement of people with a common objective or purpose (in a manner to make possible the performance of related tasks grouped for the purpose of assignment) and the establishment of areas of responsibility with clearly defined channels of communication and authority.

Organization Principles

In the design of a sound organizational framework there are six widely accepted principles:

1. The work should be divided according to some logical plan.

2. Lines of authority and responsibility should be made as clear and direct as possible.

3. One supervisor can effectively control only a limited number of people, and that limit should not be exceeded. (This principle is called "span of control.")

4. There should be "unity of command" in the organization.

5. Responsibility cannot be given without delegating commensurate authority, and there must be accountability for the use of that authority.

6. All efforts of subunits and personnel must be coordinated into the harmonious achievement of the organization's objectives.

Because each of these principles has a meaningful application within a security organization, it is helpful to elaborate on them.

Logical Division of Work

The necessity for the division of work becomes apparent as soon as you have more than one person on the job. How the work is divided can have a significant impact on the results at the end of the day. The manner and extent of the division of work influence the product or performance qualitatively as well as quantitatively. The logical division of work, therefore, deserves close attention.

There are five primary ways in which work can be divided:


 Process or method





It is most common for work to be divided according to purpose. The Security department could be organized into two divisions: a Loss Control or Loss Prevention division (its purpose is to prevent losses) and a Detection division (its purpose is to apprehend those who defeated the efforts of the prevention unit).

Process or Method

A process unit is organized according to the method of work; all similar processes are in the same unit. An example in security might be the alarm room operators and dispatchers or the credit card investigators unit of the general investigative section.


Work may also be divided according to the clientele served or worked with. Examples here include the background screening personnel, who deal only with prospective and new employees; store detectives, who concentrate on shoplifters; or general retail investigators, who become involved with dishonest employees, forgers, and other criminal offenders.

Division of work by purpose, process, or clientele is really a division based on the nature of the work and consequently is referred to as "functional." In other words, the grouping of security personnel to perform work divided by its nature (purpose, process, or clientele) is called functional organization.

For many organizations, the functional organization constitutes the full division of work. Security, however, like police and fire services in the public sector, usually has around-the-clock protective responsibilities. In addition, unlike its cousins in the public sector, it may have protective responsibilities spread over a wide geographic area.


At first glance, the 24-hour coverage of a given facility may appear relatively simple. It might be natural to assume there should be three, 8-hour shifts with fixed posts, patrol, and the communication and alarm center all changing at midnight, 8:00 AM, and 4:00 PM. However, a number of interesting problems surface when a department begins organizing by time:

 How many security people are necessary on the first shift? If a minimum security staff takes over at midnight and the facility commences its business day at 7:00 AM, can you operate for 1 hour with the minimum staff or must you increase coverage prior to 7:00 AM and overlap shifts? (There are hundreds of variables to just this type of problem.)

 If you have two or more functional units, with some personnel assigned to patrol and others assigned to the communications and alarm center (in another organizational pyramid altogether), who is in command at 3:00 AM? The question of staff supervision confuses many people. (See Chapter 5 for a detailed discussion of staff supervision.)

 How much supervision is necessary during facility downtime? If the question is not how much, then how is any supervision exercised at 3:00 AM?

 If there are five posts, each critical and necessary, and five persons are scheduled and one fails to show, how do you handle the situation? Should you schedule six persons for just that contingency?

These and other problems do arise and are resolved regularly in facilities of every kind. Organizing by time, a way of life for security operations, does create special problems that demand consideration, especially if this approach to the division of work is a new undertaking for a company.


Whenever a Security department is obliged to serve a location removed from the headquarters facility, and one or more security personnel are assigned to the outlying location, one major issue must be resolved: To whom does the security personnel report-to security management back at headquarters or to site management (which is nonsecurity)?

The real issue is whether or not nonsecurity management should have direct supervision over a security employee who has technical or semitechnical skills that are beyond the competence or understanding of nonsecurity management personnel.

In defining the type of authority an executive or supervisor exercises, a distinction is generally made between line and staff authority. Although these terms have many meanings, in its primary sense, line authority implies a direct (or single-line) relationship between a supervisor and his or her subordinate; the staff function is service or advisory in nature.

Security personnel should be directly supervised only by security management. Site management may provide staff supervision, providing suggestions and assistance, but these should be restricted to such matters as attention to duty, promptness in reporting, and compliance with general rules. Detailed security activities fall outside the jurisdiction of site management.

Nonsecurity management should not have line authority (direct supervision) over security, not only because of the issue of professional competency but also because site management should not be beyond the "reach" of security. Site management would indeed be out of reach if the only internal control, security, was subject to its command. Site management would be free to engage in any form of mischief, malpractice, or dishonesty without fear of security's reporting the activities to company headquarters.

Clear Lines of Authority and Responsibility

Once the work has been properly divided, the organization takes on the appearance of a pyramid-like structure, within which are smaller pyramids, as illustrated in Figure 1-1. Each part of each pyramid defines, with exactness, a function or responsibility and to whom that function is responsible. We can easily trace the solid line upward to the Security Director, who is ultimately responsible for every function within the security organization.

Figure 1-1 Repeated pyramidal forms within an organizational structure.

Not only is it important to have this organizational pyramid documented, normally in the form of an organizational chart, it is also essential that security employees have access to the chart so...

Dateiformat: EPUB
Kopierschutz: Adobe-DRM (Digital Rights Management)


Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat EPUB ist sehr gut für Romane und Sachbücher geeignet - also für "fließenden" Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.

Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)


Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.

Download (sofort verfügbar)

68,96 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
ePUB mit Adobe DRM
siehe Systemvoraussetzungen
PDF mit Adobe DRM
siehe Systemvoraussetzungen
Hinweis: Die Auswahl des von Ihnen gewünschten Dateiformats und des Kopierschutzes erfolgt erst im System des E-Book Anbieters
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung dieser Web-Seiten erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok