Security program design and management: a guide for security-conscious managers

Front Cover
Quorum Books, 1989 - Business & Economics - 294 pages
A unique "how-to" guide for managers with asset-protection responsibilities, this book offers the reader both a clear picture of security program needs and some practical suggestions for meeting these needs. In addition to providing detailed information on security program management, the guide also emphasizes the importance of the relationship between security program management and other administrative services. Tweedy covers proven strategies and techniques to combat everyday security problems like burglary as well as sophisticated thefts of vital information and threats of terrorism. Numerous illustrations, diagrams, checklists, job descriptions, and model forms are included for ready reference. Tweedy begins with an overview of security program development and operation. Several chapters follow devoted to the composition and utilization of a security guard force, elements of security program management, and control processes in security program management. Tweedy advocates employee participation in loss prevention and a new focus on managerial, rather than strictly task-oriented thinking. Separate chapters address issues such as personnel selection and performance evaluation, EDP system protection, and crime in the United States. The final four chapters provide a summary of steps to achieve a higher degree of protection against terrorism through crisis planning, protection of personnel, safeguarding facilities and other assets, and the protection of records. Two appendices provide details and relevant examples of actual security-related activities.

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Exhibits
4
Security Guard Force Composition
21
Security Guard Force Utilization
43
Elements of Security Program Management
57
Control Processes in Security Program Management
75
Personnel Selection and Performance Evaluation
95
SecurityRelated Support Activities
117
Electronic Data Processing System Protection
145
1O Terrrorism Countermeasures and Crisis Planning
185
Bombing Incidents 19781987
188
A National Agenda for Terrorist Countermeasure Action
194
Protection of Personnel and Visitors from Terrorism
199
Security of Facilities and Other Assets
217
Security of Vital and Confidential Records
233
SUPPLEMENTARY READING
287
Copyright

Crime in the United States
165

About the author (1989)

DONALD B. TWEEDY has been associated with the Diebold Group of New York, headed three successive U.S. State Department Contract Consulting Teams in the Third World, and was UN Technical Advisor in Public Administration in the Sudan.