The Role Of The Risk Manager

1,215 views
1,108 views

Published on

VIEW & RE-VIEW;
TRIAL & ERROR;
THE WAY OF LEARNING-BUT NOT FOR MANAGERS...
muhammadakhlaqkhan@yahoo.com

Published in: Business, Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,215
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
51
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

The Role Of The Risk Manager

  1. 1. Security & Loss Prevention: An Introduction 5 th Edition Philip Purpura
  2. 2. Part 1 INTRODUCTION TO SECURITY AND LOSS PREVENTION
  3. 3. Chapter 1 The History of Security and Loss Prevention: A Critical Perspective
  4. 4. Chapter 1 <ul><li>WHY CRITICAL THINKING? </li></ul><ul><li>HOW CAN WE THINK CRITICALLY? </li></ul><ul><li>WHY THINK CRITICALLY ABOUT THE HISTORY OF SECURITY AND LOSS PREVENTION? </li></ul><ul><li>SECURITY AND LOSS PREVENTION DEFINED </li></ul>
  5. 5. Chapter 1 <ul><li>HISTORY </li></ul><ul><ul><li>Why Study the History of Security and Loss Prevention? </li></ul></ul><ul><li>EARLY CIVILIZATIONS </li></ul><ul><ul><li>Ancient Greece </li></ul></ul><ul><ul><li>Ancient Rome </li></ul></ul><ul><ul><li>The Middle Ages in Europe </li></ul></ul>
  6. 6. Chapter 1 <ul><li>MORE CONTEMPORARY TIMES </li></ul><ul><ul><li>England </li></ul></ul><ul><ul><li>Early America </li></ul></ul><ul><ul><li>The Growth of Policing </li></ul></ul><ul><ul><li>The Growth of Security Companies </li></ul></ul><ul><ul><li>Railroads and Labor Unions </li></ul></ul><ul><ul><li>The Great Wars </li></ul></ul>
  7. 7. Chapter 1 <ul><ul><li>The Third Wave </li></ul></ul><ul><ul><li>Convergence of IT and Physical Security </li></ul></ul><ul><ul><li>Convergence of Enterprise Security </li></ul></ul><ul><ul><li>21 st Century/Post-9/11 Security Challenges </li></ul></ul>
  8. 8. Chapter 2 The Business, Careers, and Challenges of Security and Loss Prevention
  9. 9. Chapter 2 <ul><li>INTRODUCTION </li></ul><ul><li>METRICS </li></ul><ul><ul><li>Internal Metrics </li></ul></ul><ul><ul><li>External Metrics </li></ul></ul><ul><li>THE SECURITY INDUSTRY </li></ul><ul><ul><li>Contract versus Proprietary Security </li></ul></ul>
  10. 10. Chapter 2 <ul><li>CAREERS: LOSS PREVENTION SERVICES AND SPECIALISTS </li></ul><ul><li>THE LIMITATIONS OF THE CRIMINAL JUSTICE SYSTEM: IMPLICATIONS FOR LOSS PREVENTION PRACTITIONERS </li></ul>
  11. 11. Chapter 2 <ul><li>CHALLENGES OF THE SECURITY INDUSTRY </li></ul><ul><ul><li>Cooperation between Public Police and Private Security </li></ul></ul><ul><ul><li>Regulation of the Industry </li></ul></ul><ul><ul><li>The Need for Training </li></ul></ul><ul><ul><li>Ethics </li></ul></ul><ul><ul><li>The False Alarm Problem </li></ul></ul>
  12. 12. Part 2 REDUCING THE PROBLEM OF LOSS
  13. 13. Chapter 3 Foundations of Security and Loss Prevention
  14. 14. Chapter 3 <ul><li>THE SECURITY AND LOSS PREVENTION PROFESSION </li></ul><ul><ul><li>Theoretical Foundations </li></ul></ul><ul><ul><li>Security Periodicals </li></ul></ul><ul><li>METHODS FOR PROTECTION PROGRAMS </li></ul><ul><ul><li>Risk Analysis </li></ul></ul><ul><ul><li>Planning </li></ul></ul>
  15. 15. Chapter 3 <ul><li>STANDARDS AND REGULATIONS </li></ul><ul><ul><li>Standards </li></ul></ul><ul><ul><li>Regulations </li></ul></ul><ul><ul><li>Post-9/11 Standards and Regulations </li></ul></ul><ul><ul><li>Standard-Setting Organizations </li></ul></ul><ul><li>EVALUATION OF LOSS PREVENTION PROGRAMS </li></ul><ul><ul><li>Scientific Method </li></ul></ul>
  16. 16. Chapter 3 <ul><ul><li>Sources of Research Assistance </li></ul></ul><ul><li>PROPRIETARY SECURITY </li></ul><ul><ul><li>Basics of Organization: The Vocabulary </li></ul></ul><ul><ul><li>Basics of Organization: The Practical Management Tools </li></ul></ul>
  17. 17. Chapter 4 Law
  18. 18. Chapter 4 <ul><li>INTRODUCTION </li></ul><ul><li>JUDICIAL SYSTEMS </li></ul><ul><ul><li>State Court Systems </li></ul></ul><ul><ul><li>Federal Court System </li></ul></ul><ul><li>ORIGINS OF LAW </li></ul><ul><li>TORT LAW AND CONTROLS OVER PRIVATE SECURITY </li></ul>
  19. 19. Chapter 4 <ul><li>LEGAL THEORY OF PREMISES SECURITY CLAIMS </li></ul><ul><li>CONTRACT LAW </li></ul><ul><li>CIVIL JUSTICE PROCEDURES </li></ul><ul><li>ADMINISTRATIVE LAW </li></ul><ul><ul><li>Recordkeeping, Reporting, Inspections, and Searches </li></ul></ul>
  20. 20. Chapter 4 <ul><ul><li>Compliance Auditing </li></ul></ul><ul><ul><li>Federal Sentencing Guidelines </li></ul></ul><ul><ul><li>Labor Law </li></ul></ul><ul><li>CRIMINAL JUSTICE PROCEDURE </li></ul><ul><ul><li>Arrest Law </li></ul></ul><ul><ul><li>Force </li></ul></ul><ul><ul><li>Searches </li></ul></ul><ul><ul><li>Questioning </li></ul></ul>
  21. 21. Chapter 5 Internal and External Relations
  22. 22. Chapter 5 <ul><li>INTERNAL AND EXTERNAL RELATIONS </li></ul><ul><ul><li>Benefits of Good Relations </li></ul></ul><ul><li>INTERNAL RELATIONS </li></ul><ul><ul><li>Customer Driven Security and Loss Prevention Programs </li></ul></ul><ul><ul><li>Marketing </li></ul></ul>
  23. 23. Chapter 5 <ul><ul><li>Human Relations on the Job </li></ul></ul><ul><ul><li>Management Support </li></ul></ul><ul><ul><li>Orientation and Training Programs </li></ul></ul><ul><ul><li>Loss Prevention Meetings </li></ul></ul><ul><ul><li>Intranet and E-Mail </li></ul></ul><ul><ul><li>Involvement Programs </li></ul></ul>
  24. 24. Chapter 5 <ul><li>EXTERNAL RELATIONS </li></ul><ul><ul><li>Law Enforcement </li></ul></ul><ul><ul><li>Public Safety Agencies </li></ul></ul><ul><ul><li>The Community </li></ul></ul><ul><ul><li>The Media </li></ul></ul><ul><ul><li>External Loss Prevention Peers </li></ul></ul>
  25. 25. Chapter 5 <ul><li>SPECIAL PROBLEMS </li></ul><ul><ul><li>Prosecution Decisions </li></ul></ul><ul><ul><li>Loss Prevention Attire </li></ul></ul>
  26. 26. Chapter 6 Applicant Screening and Employee Socialization
  27. 27. Chapter 6 <ul><li>INTRODUCTION </li></ul><ul><li>EMPLOYMENT LAW </li></ul><ul><ul><li>Federal Legislation </li></ul></ul><ul><ul><li>U.S. Supreme Court Decisions </li></ul></ul><ul><ul><li>Equal Employment Opportunity Commission </li></ul></ul><ul><ul><li>EEO, AA, and Quotas </li></ul></ul>
  28. 28. Chapter 6 <ul><ul><li>Diversity </li></ul></ul><ul><ul><li>Sexual Harassment </li></ul></ul><ul><li>SCREENING METHODS </li></ul><ul><ul><li>Resumes and Applications </li></ul></ul><ul><ul><li>Interview </li></ul></ul><ul><ul><li>Tests </li></ul></ul><ul><ul><li>Background Investigations </li></ul></ul>
  29. 29. Chapter 6 <ul><li>EMPLOYEE SOCIALIZATION </li></ul><ul><ul><li>Loss Prevention Orientation for New Employees </li></ul></ul><ul><ul><li>Employee Training </li></ul></ul><ul><ul><li>Planning Training </li></ul></ul><ul><ul><li>Learning Principles </li></ul></ul><ul><ul><li>Wasted Training </li></ul></ul>
  30. 30. Chapter 6 <ul><ul><li>Examples Set by Superiors </li></ul></ul><ul><ul><li>Employee Needs </li></ul></ul>
  31. 31. Chapter 7 Internal Threats and Countermeasures
  32. 32. Chapter 7 <ul><li>INTRODUCTION </li></ul><ul><li>INTERNAL THEFT </li></ul><ul><ul><li>How Serious Is The Problem? </li></ul></ul><ul><ul><li>Why Do Employees Steal? </li></ul></ul><ul><ul><li>How Do Employees Steal? </li></ul></ul><ul><ul><li>Possible Indicators of Theft </li></ul></ul>
  33. 33. Chapter 7 <ul><li>MANAGEMENT COUNTERMEASURES </li></ul><ul><li>PHYSICAL SECURITY COUNTERMEASURES </li></ul><ul><ul><li>Integration, Open Architecture, and Convergence </li></ul></ul><ul><ul><li>Access Controls </li></ul></ul>
  34. 34. Chapter 7 <ul><ul><li>Locks and Keys </li></ul></ul><ul><ul><li>Intrusion Detection Systems </li></ul></ul><ul><ul><li>Interior Sensors </li></ul></ul><ul><ul><li>Closed-Circuit Television </li></ul></ul><ul><ul><li>Security Officers </li></ul></ul><ul><ul><li>Safes, Vaults, and File Cabinets </li></ul></ul>
  35. 35. Chapter 8 External Threats and Countermeasures
  36. 36. Chapter 8 <ul><li>INTRODUCTION </li></ul><ul><li>METHODS OF UNAUTHORIZED ENTRY </li></ul><ul><li>COUNTERMEASURES </li></ul><ul><ul><li>Construction and Environmental Security Design </li></ul></ul><ul><ul><li>Perimeter Security </li></ul></ul>
  37. 37. Chapter 8 <ul><ul><li>Barriers </li></ul></ul><ul><ul><li>Protecting Buildings Against Terrorism </li></ul></ul><ul><ul><li>Windows </li></ul></ul><ul><ul><li>Doors </li></ul></ul><ul><ul><li>Intrusion Detection Systems </li></ul></ul><ul><ul><li>CCTV </li></ul></ul><ul><ul><li>Lighting </li></ul></ul>
  38. 38. Chapter 8 <ul><ul><li>Parking Lot and Vehicle Controls </li></ul></ul><ul><ul><li>Security Officers </li></ul></ul><ul><ul><li>Communications and the Control Center </li></ul></ul><ul><ul><li>Protective Dogs </li></ul></ul>
  39. 39. Chapter 9 Services and Systems: Methods Toward Wise Purchasing Decisions
  40. 40. Chapter 9 <ul><li>INTRODUCTION </li></ul><ul><li>PITFALLS WHEN PURCHASING SECURITY SERVICES AND SYSTEMS </li></ul><ul><li>PURCHASING SECURITY SERVICES </li></ul><ul><ul><li>Questions When Considering Contract Security Officers </li></ul></ul>
  41. 41. Chapter 9 <ul><ul><li>Contract Undercover Investigators </li></ul></ul><ul><ul><li>Consultants </li></ul></ul><ul><ul><li>Certifications in Security </li></ul></ul><ul><li>PURCHASING SECURITY SYSTEMS </li></ul><ul><ul><li>Questions When Considering a Security System </li></ul></ul><ul><ul><li>System Acquisition </li></ul></ul><ul><li>OUTSOURCING </li></ul>
  42. 42. Chapter 10 Investigations
  43. 43. Chapter 10 <ul><li>INTRODUCTION </li></ul><ul><li>TYPES OF INVESTIGATIONS </li></ul><ul><ul><li>Proprietary and Contract Investigations </li></ul></ul><ul><ul><li>Private and Public Investigations </li></ul></ul><ul><ul><li>Overt and Undercover Private Investigations </li></ul></ul><ul><ul><li>Important Considerations </li></ul></ul>
  44. 44. Chapter 10 <ul><li>LAW </li></ul><ul><li>EVIDENCE </li></ul><ul><li>INTERVIEWING AND INTERROGATION </li></ul><ul><li>INFORMATION SOURCES </li></ul><ul><ul><li>Legal Restrictions When Collecting Information </li></ul></ul>
  45. 45. Chapter 10 <ul><li>IDENTITY THEFT </li></ul><ul><li>INVESTIGATIVE LEADS </li></ul><ul><li>SURVEILLANCE </li></ul><ul><li>INFORMATION ACCURACY </li></ul><ul><li>REPORT WRITING </li></ul><ul><li>TESTIMONY </li></ul>
  46. 46. Chapter 11 Accounting, Accountability, and Auditing
  47. 47. Chapter 11 <ul><li>INTRODUCTION </li></ul><ul><li>ACCOUNTING </li></ul><ul><li>ACCOUNTABILITY </li></ul><ul><ul><li>Cashier Operations </li></ul></ul><ul><ul><li>Purchasing </li></ul></ul><ul><ul><li>Inventory </li></ul></ul>
  48. 48. Chapter 11 <ul><li>AUDITING </li></ul><ul><ul><li>Auditors </li></ul></ul><ul><ul><li>Internal Control Questionnaire </li></ul></ul><ul><li>FRAUD </li></ul><ul><li>GOVERNANCE, RISK MANAGEMENT, AND COMPLIANCE </li></ul>
  49. 49. Chapter 12 Risk Management, Business Continuity, and Emergency Management
  50. 50. Chapter 12 <ul><li>RISK MANAGEMENT </li></ul><ul><ul><li>The Role of the Risk Manager </li></ul></ul><ul><ul><li>The Risk Management Process </li></ul></ul><ul><ul><li>Risk Modeling </li></ul></ul><ul><ul><li>Risk Management Tools </li></ul></ul><ul><ul><li>Enterprise Risk Management </li></ul></ul><ul><li>INSURANCE </li></ul>
  51. 51. Chapter 12 <ul><ul><li>Types of Insurance </li></ul></ul><ul><ul><li>Crime Insurance and Bonds </li></ul></ul><ul><ul><li>Fire Insurance </li></ul></ul><ul><ul><li>Property and Liability Insurance </li></ul></ul><ul><ul><li>Claims </li></ul></ul><ul><ul><li>Claims for Crime Losses </li></ul></ul><ul><li>BUSINESS CONTINUITY </li></ul>
  52. 52. Chapter 12 <ul><ul><li>Guidance for Business Continuity Planning </li></ul></ul><ul><ul><li>Methodology for Business Continuity </li></ul></ul><ul><li>EMERGENCY MANAGEMENT </li></ul><ul><ul><li>All-Hazards Preparedness Concept </li></ul></ul><ul><ul><li>The History of Emergency Management </li></ul></ul><ul><ul><li>Emergency Management Disciplines </li></ul></ul><ul><li>THE MILITARY </li></ul>
  53. 53. Chapter 13 Life Safety, Fire Protection, and Emergencies
  54. 54. Chapter 13 <ul><li>LIFE SAFETY </li></ul><ul><ul><li>Standards, Regulations, and Codes </li></ul></ul><ul><ul><li>OSHA Regulations </li></ul></ul><ul><ul><li>NFPA 101 Life Safety Code </li></ul></ul><ul><ul><li>Building Design and Building Codes </li></ul></ul><ul><li>FIRE PROTECTION </li></ul><ul><ul><li>The Problem of Fire </li></ul></ul>
  55. 55. Chapter 13 <ul><ul><li>Private Organizations Involved in Fire Protection </li></ul></ul><ul><ul><li>Fire Departments </li></ul></ul><ul><ul><li>Fire Department Protection Efforts </li></ul></ul><ul><li>FIRE PREVENTION AND FIRE SUPPRESSION STRATEGIES </li></ul><ul><ul><li>Fire Prevention Strategies </li></ul></ul>
  56. 56. Chapter 13 <ul><ul><li>Fire Suppression Strategies </li></ul></ul><ul><li>PUBLIC SAFETY AGENCIES </li></ul><ul><ul><li>Police </li></ul></ul><ul><ul><li>Emergency Medical Service (EMS) </li></ul></ul><ul><li>EMERGENCIES </li></ul><ul><ul><li>Human-Made Emergencies </li></ul></ul><ul><ul><li>Natural Disasters </li></ul></ul>
  57. 57. Chapter 14 Safety in the Workplace
  58. 58. Chapter 14 <ul><li>INTRODUCTION </li></ul><ul><li>ACCIDENT STATISTICS AND COSTS </li></ul><ul><li>HISTORY OF SAFETY LEGISLATION </li></ul><ul><ul><li>Workers’ Compensation </li></ul></ul><ul><ul><li>The Development of OSHA </li></ul></ul><ul><li>OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION </li></ul>
  59. 59. Chapter 14 <ul><ul><li>OSHA’s Strategic Management Plan </li></ul></ul><ul><ul><li>The Act’s Jurisdiction </li></ul></ul><ul><ul><li>OSHA Standards </li></ul></ul><ul><ul><li>OSHA Recordkeeping and Reporting </li></ul></ul><ul><ul><li>Additional Employer Responsibilities </li></ul></ul><ul><ul><li>OSHA Inspections </li></ul></ul><ul><ul><li>OSHA: Criticism and Controversy </li></ul></ul><ul><ul><li>Assistance with Problems </li></ul></ul>
  60. 60. Chapter 14 <ul><li>SAFETY STRATEGIES </li></ul><ul><ul><li>Safety and Health Committee </li></ul></ul><ul><ul><li>Socialization and Incentive Programs </li></ul></ul><ul><ul><li>Investigations </li></ul></ul><ul><ul><li>Additional Safety Measures </li></ul></ul>
  61. 61. Part III SPECIAL PROBLEMS AND COUNTERMEASURES
  62. 62. Chapter 15 Terrorism and Homeland Security
  63. 63. Chapter 15 <ul><li>TERRORISM </li></ul><ul><ul><li>Terrorism Defined </li></ul></ul><ul><ul><li>History </li></ul></ul><ul><ul><li>Religion and Politics </li></ul></ul><ul><ul><li>Causes of Terrorism </li></ul></ul><ul><ul><li>International Terrorism </li></ul></ul><ul><ul><li>International Terrorists </li></ul></ul>
  64. 64. Chapter 15 <ul><ul><li>Domestic Terrorism </li></ul></ul><ul><ul><li>Domestic Terrorists </li></ul></ul><ul><ul><li>Terrorist Methods </li></ul></ul><ul><ul><li>Terrorist Weapons </li></ul></ul><ul><ul><li>Weapons of Mass Destruction </li></ul></ul><ul><li>HOMELAND SECURITY </li></ul><ul><ul><li>Homeland Security Defined </li></ul></ul>
  65. 65. Chapter 15 <ul><ul><li>The Measurement of Terrorism </li></ul></ul><ul><ul><li>National Counterterrorism Center </li></ul></ul><ul><ul><li>National Memorial Institute for the Prevention of Terrorism </li></ul></ul><ul><ul><li>National Security and Homeland Security </li></ul></ul><ul><ul><li>U.S. Government Action Against Terrorism </li></ul></ul><ul><ul><li>Legislative Action Against Terrorism </li></ul></ul>
  66. 66. Chapter 15 <ul><ul><li>State and Local Governments </li></ul></ul><ul><ul><li>Response to Weapons of Mass Destruction </li></ul></ul><ul><li>PRIVATE SECTOR </li></ul><ul><ul><li>Losses and Costs from the 9/11 Attacks </li></ul></ul><ul><ul><li>The Homeland Security Market </li></ul></ul><ul><ul><li>Public-Private Sector Partnerships </li></ul></ul>
  67. 67. Chapter 15 <ul><ul><li>Business and Organizational Countermeasures Against Terrorism </li></ul></ul><ul><ul><li>Citizen Volunteers </li></ul></ul>
  68. 68. Chapter 16 Protecting Critical Infrastructures, Key Assets, and Borders
  69. 69. Chapter 16 <ul><li>CRITICAL INFRASTRUCTURE </li></ul><ul><ul><li>Critical Infrastructure Defined </li></ul></ul><ul><ul><li>The Role of Government in Protecting Critical Infrastructure and Key Resources </li></ul></ul><ul><ul><li>NIPP Risk Management Framework </li></ul></ul><ul><ul><li>NIPP Recommendations for the Private Sector </li></ul></ul>
  70. 70. Chapter 16 <ul><li>CRITICAL INFRASTRUCTURE SECTORS </li></ul><ul><ul><li>Agriculture and Food </li></ul></ul><ul><ul><li>Water </li></ul></ul><ul><ul><li>Energy </li></ul></ul><ul><ul><li>Chemical Industry </li></ul></ul><ul><ul><li>Telecommunications </li></ul></ul>
  71. 71. Chapter 16 <ul><ul><li>Cyberspace and Information Technology </li></ul></ul><ul><ul><li>Defense Industry Base </li></ul></ul><ul><ul><li>Key Assets </li></ul></ul><ul><li>BORDER AND TRANSPORTATION SECURITY </li></ul><ul><ul><li>Government Agencies with Roles in Border and Transportation Security </li></ul></ul>
  72. 72. Chapter 16 <ul><li>TRANSPORTATION SECTORS </li></ul><ul><ul><li>Aviation </li></ul></ul><ul><ul><li>Passenger Rail and Railroads </li></ul></ul><ul><ul><li>Mass Transit Systems </li></ul></ul><ul><ul><li>Highways, Trucking, and Intercity Busing </li></ul></ul><ul><ul><li>Maritime </li></ul></ul><ul><ul><li>Postal and Shipping </li></ul></ul><ul><ul><li>Pipelines </li></ul></ul>
  73. 73. Chapter 17 Loss Prevention at Businesses and Institutions
  74. 74. Chapter 17 <ul><li>INTRODUCTION </li></ul><ul><li>LOSS PREVENTION AT RETAIL BUSINESSES </li></ul><ul><ul><li>Shrinkage </li></ul></ul><ul><ul><li>Human Resources Problems in Retailing </li></ul></ul><ul><ul><li>Internal Loss Prevention Strategies </li></ul></ul><ul><ul><li>Preventing Losses at Checkout Counters </li></ul></ul>
  75. 75. Chapter 17 <ul><ul><li>E-Business </li></ul></ul><ul><ul><li>Counterfeiting </li></ul></ul><ul><ul><li>Shoplifting </li></ul></ul><ul><ul><li>Confronting the Suspected Shoplifter </li></ul></ul><ul><li>ROBBERY AND BURGLARY </li></ul><ul><ul><li>Robbery Countermeasures </li></ul></ul><ul><ul><li>Burglary Countermeasures </li></ul></ul>
  76. 76. Chapter 17 <ul><li>SHOPPING MALL STRATEGIES </li></ul><ul><li>BANKS AND FINANCIAL BUSINESSES </li></ul><ul><ul><li>Banking and Finance Sector Challenges </li></ul></ul><ul><ul><li>Banking and Finance Sector Initiatives </li></ul></ul><ul><ul><li>The Scope of Threats and Legal Responsibilities of the Banking and Finance Sector </li></ul></ul>
  77. 77. Chapter 17 <ul><ul><li>Regulation H </li></ul></ul><ul><ul><li>Bank Robbery Countermeasures </li></ul></ul><ul><ul><li>Automatic Teller Machines </li></ul></ul><ul><ul><li>Kidnapping and Extortion </li></ul></ul><ul><ul><li>Embezzlement, Online Risks, and Fraud </li></ul></ul><ul><li>EDUCATIONAL INSTITUTIONS </li></ul><ul><ul><li>Threats and Hazards at Educational Institutions </li></ul></ul>
  78. 78. Chapter 17 <ul><ul><li>Countermeasures </li></ul></ul><ul><ul><li>School Districts </li></ul></ul><ul><ul><li>Colleges and Universities </li></ul></ul><ul><ul><li>Fire Protection at Educational Institutions </li></ul></ul><ul><li>HEALTHCARE INSTITUTIONS </li></ul><ul><ul><li>Public Health Sector Challenges </li></ul></ul><ul><ul><li>Public Health Sector Initiatives </li></ul></ul>
  79. 79. Chapter 17 <ul><ul><li>The Scope of Threats and Legal Responsibilities of Healthcare Institutions </li></ul></ul><ul><ul><li>Strategies for Healthcare Institutions </li></ul></ul>
  80. 80. Chapter 18 Topics of Concern
  81. 81. Chapter 18 <ul><li>WORKPLACE VIOLENCE </li></ul><ul><ul><li>Legal Guidelines </li></ul></ul><ul><ul><li>Protection Methods </li></ul></ul><ul><li>PERSONNEL PROTECTION </li></ul><ul><ul><li>Planning </li></ul></ul><ul><ul><li>Education and Training </li></ul></ul><ul><ul><li>General Protection Strategies </li></ul></ul>
  82. 82. Chapter 18 <ul><li>SUBSTANCE ABUSE IN THE WORKPLACE </li></ul><ul><ul><li>Countermeasures </li></ul></ul><ul><ul><li>Alcoholism </li></ul></ul><ul><ul><li>Types of Substances and Abuse </li></ul></ul><ul><li>INFORMATION SECURITY </li></ul><ul><ul><li>Corporate Intelligence Gathering: Putting It in Perspective </li></ul></ul>
  83. 83. Chapter 18 <ul><ul><li>Espionage Techniques and the Vulnerabilities of Technology </li></ul></ul><ul><ul><li>Countermeasures </li></ul></ul><ul><li>COMMUNICATIONS SECURITY </li></ul><ul><ul><li>Electronic Surveillance and Wiretapping </li></ul></ul><ul><ul><li>Technical Surveillance Countermeasures </li></ul></ul>
  84. 84. Chapter 19 Your Future in Security and Loss Prevention
  85. 85. Chapter 19 <ul><li>SECURITY AND LOSS PREVENTION IN THE FUTURE </li></ul><ul><ul><li>Trends Affecting Security and Loss Prevention </li></ul></ul><ul><li>EDUCATION </li></ul><ul><ul><li>Loss Prevention Education: Today and Tomorrow </li></ul></ul>
  86. 86. Chapter 19 <ul><li>RESEARCH </li></ul><ul><li>TRAINING </li></ul><ul><ul><li>The Concept of the Security Institute </li></ul></ul><ul><li>EMPLOYMENT </li></ul><ul><ul><li>Sources of Employment Information </li></ul></ul><ul><ul><li>Career Advice </li></ul></ul>

×