SlideShare a Scribd company logo
Security Supervision and
Management: The Theory and
Practice of Asset Protection –
          3d Edition
  ISBN 978-0-7506-8436-1
Course Objectives
Understanding:
•   Security and Asset Protection Principles
•   Human Resource Management
•   Supervision
•   Training and Development
•   Management and Leadership
•   Risk Management and Emergency Management
•   Physical Security and Technology
•   Investigation
•   Customer, Client and Community Relations
•   Legal Aspects
Method


How do adults learn?
Principles of Andragogy

from Alexander Kapp to Malcolm Knowles
Where should we be?
Unfortunately . . .
• Most of our learning, especially in higher
  education, comes from a secondary
  experience (Jarvis, 2006).
  – Reading
  – Interviewing
  – Sharing memories
So the fix is . . .
•   Get involved in the learning process
•   Work in groups to share experiences
•   Engage in meaningful conversations
•   Do stuff that means something
•   Get close to the primary experience
Group work
• 20 in class = 5 groups of 4
• Each group chooses 2 topics
• Each group hosts the discussion for the week
  – Prepare for and guide discussion
  – Identify external resources (sites/speakers etc.)
  – Prepare 5-10 review questions/answers
• Group outline to me 2 days before (dropbox)
Form groups
•   1
•   2
•   3
•   4
•   5
Choose topics (Team 1 and 2)
• Unit I Security and Asset Protection Principles
  – Unit I-1 Evolving a Discipline of Security - 3
  – Unit I-2 The Future of Security
  – Unit I-2 Appendix: The Future of Security Training
  – Unit I-3 Key Terms and Concepts
  – Unit I-4 Explaining Crime: Contemporary
    Criminological Theory - 35
Choose topics (Team 3)
• Unit II Human Resource Management
  – Unit II-1 Recruitment and Retention of Security
    Personnel: Understanding and Meeting the Challenge
  – Unit II-2 Security Personnel Selection - 63
  – Unit II-3 Supervisory Characteristics and Expectations
  – Unit II-4 Evaluation of Uniformed Protection Officers
  – Unit II-5 Employee Motivation Theory and
    Application - 79
  – Unit II-6 Employee Discipline: Policy and Practice
  – Unit II-7 Human Reliability
Choose topics (Team 4)
• Unit III Supervision
  – Unit III-1 Personnel Deployment
  – Unit III-2 Dealing with Difficult Employees
  – Unit III-3 The Supervisor's Role in Handling
    Complaints and Grievances
  – Unit III-4 Unethical Acts by Security Officers
  – Unit III-5 Interpersonal Communications - 123
Choose topics (Team 5)
• Unit IV Training and Development
  – Unit IV-1 Training: Strategies, Tactics, and
    Challenges for Protection Managers
  – Unit IV-2 Orientation for Security Officers
  – Unit IV-3 Staff Training and Development
  – Unit IV-4 Curriculum design - 165
  – Unit IV-5 Professional Certifications: Milestones of
    Professionalism
Choose topics (Team 1)
• Unit V Management and Leadership
  – Unit V-1 Evolution of Management
  – Unit V-2 Time and Stress Management - 191
  – Unit V-3 Project Management: An Overview
  – Unit V-4 Company Policy and Procedures: The
    Security Supervisor's Primer
  – Unit V-5 Total Quality Management - 211
  – Unit V-6 Leadership for Protection Professionals
Choose topics (Team 2)
• Unit VI Risk Management and Emergency
  Management
  – Unit VI-1 Risk Management - 243
  – Unit VI-2 Why Accidents Happen: The Theories of
    Causation
  – Unit VI-3 The Supervisor's Role in Safety
  – Unit VI-4 Workplace Violence
  – Unit VI-5 Critical Incident Management in the Post-9/11
    Era
  – Unit VI-6 Supervising During Emergencies 289
  – Unit VI-7 Supervising During Special Events
  – Unit VI-8 Security and Medical Response
  – Unit VI-9 Outsourcing in Security
  – Unit VI-10 Internal Loss
Choose topics (Team 3)
• Unit VII Physical Security and Technology
  – Unit VII-1 Security Systems Design and Evaluation
  – Unit VII-2 Statistical Analysis - 351
  – Unit VII-3 Security Technologies
  – Unit VII-4 High-Technology Theft
  – Unit VII-5 Designing Operations Control Centers
Choose topics (Team 4)
• Unit VIII Investigation
  – Unit VIII-1 Managing Investigations - 387
  – Unit VIII-2 Developing Report Writing Ability in
    Subordinates
  – Unit VIII-3 Testifying in Court - 403
Choose topics (Team 5)
• Unit IX Customer, Client and Community Relations
   – Unit IX-1 Customer Service and the Protection Officer:
     Guidelines to Achieving Excellence
   – Unit IX-2 The Supervisor's Role in Improving Customer
     Service
   – Unit IX-3 Tenant Relations
   – Unit IX-4 Uniforms and Image Projection for Protection
     Forces - 439
   – Unit IX-5 The Relationship Between Marketing and the
     Security Function
   – Unit IX-6 Crime Prevention and Community Relations
     Strategies
   – Unit IX-7 Public-Private Sector Liaison Programs
Choose topics?
• Unit X Legal Aspects
  – Unit X-1 Legal Aspects of Security - 475
  – Unit X-2 Managing/Supervising to Reduce Liability
  – Unit X-3 Sexual Harassment
Share contact information
• Name/email/phone (?)

  – Carter F. Smith
  – cfsmith@mtsu.edu
  – 615-494-7751
Plan
•   Ensure all have topics and plan to read
•   Assign responsibilities – write down
•   Include responsibilities in submitted outline
•   Backup plans in place?
•   Talk about potential challenges
That’s all . . .
Security Administration Intro

More Related Content

Viewers also liked

Human security introduction by dr. ghassan shahrour
Human security introduction by dr. ghassan shahrourHuman security introduction by dr. ghassan shahrour
Human security introduction by dr. ghassan shahrour
Ghassan Shahrour
 
PPM Security Manifesto - Gulhigen #Olhuvaalimanifesto
PPM Security Manifesto - Gulhigen #Olhuvaalimanifesto PPM Security Manifesto - Gulhigen #Olhuvaalimanifesto
PPM Security Manifesto - Gulhigen #Olhuvaalimanifesto
Badruddeen
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
Global Knowledge Training
 
Watermarking & Encryption
Watermarking & EncryptionWatermarking & Encryption
Watermarking & Encryption
Hossam Halapi
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
Bill Lisse
 
9 June 2009 المحاضرة INFOSEC
9 June 2009  المحاضرة  INFOSEC9 June 2009  المحاضرة  INFOSEC
9 June 2009 المحاضرة INFOSEC
Dr. Paul Coleman
 
التشفير
التشفيرالتشفير
التشفير
اصفر احمر
 
أساليب تشفير البيانات، بناء مقاطع التشفير
أساليب تشفير البيانات، بناء مقاطع التشفيرأساليب تشفير البيانات، بناء مقاطع التشفير
أساليب تشفير البيانات، بناء مقاطع التشفير
Omar Alabri
 
4 أنواع خوارزميات التشفير
4  أنواع خوارزميات التشفير4  أنواع خوارزميات التشفير
4 أنواع خوارزميات التشفير
رياض خليفة
 
Cisco network security Chapter7
Cisco network security Chapter7Cisco network security Chapter7
Cisco network security Chapter7
Khalid Al-wajeh
 
Mutual exclusion
Mutual exclusionMutual exclusion
Mutual exclusion
Dillip Behera
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
Shannon G., MBA
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mostafa Elgamala
 
التعرف على الاختراقات في الشبكات المحلية
التعرف على الاختراقات في الشبكات المحليةالتعرف على الاختراقات في الشبكات المحلية
التعرف على الاختراقات في الشبكات المحلية
Ahmed Al Enizi
 

Viewers also liked (15)

Human security introduction by dr. ghassan shahrour
Human security introduction by dr. ghassan shahrourHuman security introduction by dr. ghassan shahrour
Human security introduction by dr. ghassan shahrour
 
PPM Security Manifesto - Gulhigen #Olhuvaalimanifesto
PPM Security Manifesto - Gulhigen #Olhuvaalimanifesto PPM Security Manifesto - Gulhigen #Olhuvaalimanifesto
PPM Security Manifesto - Gulhigen #Olhuvaalimanifesto
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
Watermarking & Encryption
Watermarking & EncryptionWatermarking & Encryption
Watermarking & Encryption
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 
9 June 2009 المحاضرة INFOSEC
9 June 2009  المحاضرة  INFOSEC9 June 2009  المحاضرة  INFOSEC
9 June 2009 المحاضرة INFOSEC
 
التشفير
التشفيرالتشفير
التشفير
 
أساليب تشفير البيانات، بناء مقاطع التشفير
أساليب تشفير البيانات، بناء مقاطع التشفيرأساليب تشفير البيانات، بناء مقاطع التشفير
أساليب تشفير البيانات، بناء مقاطع التشفير
 
4 أنواع خوارزميات التشفير
4  أنواع خوارزميات التشفير4  أنواع خوارزميات التشفير
4 أنواع خوارزميات التشفير
 
Cisco network security Chapter7
Cisco network security Chapter7Cisco network security Chapter7
Cisco network security Chapter7
 
Mutual exclusion
Mutual exclusionMutual exclusion
Mutual exclusion
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Network Security
Network SecurityNetwork Security
Network Security
 
التعرف على الاختراقات في الشبكات المحلية
التعرف على الاختراقات في الشبكات المحليةالتعرف على الاختراقات في الشبكات المحلية
التعرف على الاختراقات في الشبكات المحلية
 

Similar to Security Administration Intro

Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
EC-Council
 
NEBOSH HSE PSM Element 1 v1.pdf
NEBOSH HSE PSM Element 1 v1.pdfNEBOSH HSE PSM Element 1 v1.pdf
NEBOSH HSE PSM Element 1 v1.pdf
Mohamed Ghonema
 
Lesson 1
Lesson 1Lesson 1
Lesson 1- Information Policy
Lesson 1- Information PolicyLesson 1- Information Policy
Lesson 1- Information Policy
MLG College of Learning, Inc
 
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyySeccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
chaudhryzunair4
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
Swati Gupta
 
Lesson 1- Risk Managment
Lesson 1- Risk ManagmentLesson 1- Risk Managment
Lesson 1- Risk Managment
MLG College of Learning, Inc
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
dotco
 
Building Your Information Security Program: Frameworks & Metrics
Building Your Information Security Program: Frameworks & MetricsBuilding Your Information Security Program: Frameworks & Metrics
Building Your Information Security Program: Frameworks & Metrics
Rob Arnold
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
Andrew Byers
 
cissp-course content.pdf & cissp description
cissp-course content.pdf & cissp descriptioncissp-course content.pdf & cissp description
cissp-course content.pdf & cissp description
Infosec train
 
CISSP _Course _Description and course overview
CISSP _Course _Description and course overviewCISSP _Course _Description and course overview
CISSP _Course _Description and course overview
priyanshamadhwal2
 
ch14.ppt
ch14.pptch14.ppt
ch14.ppt
FizZaShYkh
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and Controls
Rd. R. Agung Trimanda
 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metrics
nooralmousa
 
Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015
Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015
Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015
Connie Vaughn
 
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
APNIC
 
Lesson 2
Lesson 2Lesson 2
2015 trainingprogram(1)
2015 trainingprogram(1)2015 trainingprogram(1)
2015 trainingprogram(1)
Nuhu John
 

Similar to Security Administration Intro (20)

Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
 
NEBOSH HSE PSM Element 1 v1.pdf
NEBOSH HSE PSM Element 1 v1.pdfNEBOSH HSE PSM Element 1 v1.pdf
NEBOSH HSE PSM Element 1 v1.pdf
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Lesson 1- Information Policy
Lesson 1- Information PolicyLesson 1- Information Policy
Lesson 1- Information Policy
 
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyySeccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Lesson 1- Risk Managment
Lesson 1- Risk ManagmentLesson 1- Risk Managment
Lesson 1- Risk Managment
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
 
Building Your Information Security Program: Frameworks & Metrics
Building Your Information Security Program: Frameworks & MetricsBuilding Your Information Security Program: Frameworks & Metrics
Building Your Information Security Program: Frameworks & Metrics
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
cissp-course content.pdf & cissp description
cissp-course content.pdf & cissp descriptioncissp-course content.pdf & cissp description
cissp-course content.pdf & cissp description
 
CISSP _Course _Description and course overview
CISSP _Course _Description and course overviewCISSP _Course _Description and course overview
CISSP _Course _Description and course overview
 
ch14.ppt
ch14.pptch14.ppt
ch14.ppt
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and Controls
 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metrics
 
Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015
Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015
Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015
 
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
2015 trainingprogram(1)
2015 trainingprogram(1)2015 trainingprogram(1)
2015 trainingprogram(1)
 

More from Carter F. Smith, J.D., Ph.D.

APA Manual 7th Edition - prerelease essentials
APA Manual 7th Edition -  prerelease essentialsAPA Manual 7th Edition -  prerelease essentials
APA Manual 7th Edition - prerelease essentials
Carter F. Smith, J.D., Ph.D.
 
The Hounds
The HoundsThe Hounds
Street gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaperStreet gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaper
Carter F. Smith, J.D., Ph.D.
 
Military trained gang members in the volunteer state- four year follow-up wi...
Military trained gang members in the volunteer state-  four year follow-up wi...Military trained gang members in the volunteer state-  four year follow-up wi...
Military trained gang members in the volunteer state- four year follow-up wi...
Carter F. Smith, J.D., Ph.D.
 
Success tips for (my) classes
Success tips for (my) classesSuccess tips for (my) classes
Success tips for (my) classes
Carter F. Smith, J.D., Ph.D.
 
James Earl Hitchcox
James Earl HitchcoxJames Earl Hitchcox
James Earl Hitchcox
Carter F. Smith, J.D., Ph.D.
 
Current and emerging trends in the private security industry and the need for...
Current and emerging trends in the private security industry and the need for...Current and emerging trends in the private security industry and the need for...
Current and emerging trends in the private security industry and the need for...
Carter F. Smith, J.D., Ph.D.
 
Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...
Carter F. Smith, J.D., Ph.D.
 
Gangcoptechspeak
GangcoptechspeakGangcoptechspeak
Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!
Carter F. Smith, J.D., Ph.D.
 
Domestic Terrorism in the Next Eleven
Domestic Terrorism in the Next ElevenDomestic Terrorism in the Next Eleven
Domestic Terrorism in the Next Eleven
Carter F. Smith, J.D., Ph.D.
 
12 steps to_id-dt
12 steps to_id-dt12 steps to_id-dt
12 steps to_id-dt
Carter F. Smith, J.D., Ph.D.
 
I gangs hi tech gang communication-handout
I gangs hi tech gang communication-handoutI gangs hi tech gang communication-handout
I gangs hi tech gang communication-handout
Carter F. Smith, J.D., Ph.D.
 
Gangs and the military
Gangs and the military Gangs and the military
Gangs and the military
Carter F. Smith, J.D., Ph.D.
 
All grown up handouts
All grown up   handoutsAll grown up   handouts
All grown up handouts
Carter F. Smith, J.D., Ph.D.
 
Public service announcement
Public service announcementPublic service announcement
Public service announcement
Carter F. Smith, J.D., Ph.D.
 
Security administration in the classroom more challenging when it’s not as ...
Security administration in the classroom   more challenging when it’s not as ...Security administration in the classroom   more challenging when it’s not as ...
Security administration in the classroom more challenging when it’s not as ...
Carter F. Smith, J.D., Ph.D.
 
Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...
Carter F. Smith, J.D., Ph.D.
 
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Carter F. Smith, J.D., Ph.D.
 
Gang terroroc scja2011
Gang terroroc scja2011Gang terroroc scja2011
Gang terroroc scja2011
Carter F. Smith, J.D., Ph.D.
 

More from Carter F. Smith, J.D., Ph.D. (20)

APA Manual 7th Edition - prerelease essentials
APA Manual 7th Edition -  prerelease essentialsAPA Manual 7th Edition -  prerelease essentials
APA Manual 7th Edition - prerelease essentials
 
The Hounds
The HoundsThe Hounds
The Hounds
 
Street gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaperStreet gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaper
 
Military trained gang members in the volunteer state- four year follow-up wi...
Military trained gang members in the volunteer state-  four year follow-up wi...Military trained gang members in the volunteer state-  four year follow-up wi...
Military trained gang members in the volunteer state- four year follow-up wi...
 
Success tips for (my) classes
Success tips for (my) classesSuccess tips for (my) classes
Success tips for (my) classes
 
James Earl Hitchcox
James Earl HitchcoxJames Earl Hitchcox
James Earl Hitchcox
 
Current and emerging trends in the private security industry and the need for...
Current and emerging trends in the private security industry and the need for...Current and emerging trends in the private security industry and the need for...
Current and emerging trends in the private security industry and the need for...
 
Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...
 
Gangcoptechspeak
GangcoptechspeakGangcoptechspeak
Gangcoptechspeak
 
Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!
 
Domestic Terrorism in the Next Eleven
Domestic Terrorism in the Next ElevenDomestic Terrorism in the Next Eleven
Domestic Terrorism in the Next Eleven
 
12 steps to_id-dt
12 steps to_id-dt12 steps to_id-dt
12 steps to_id-dt
 
I gangs hi tech gang communication-handout
I gangs hi tech gang communication-handoutI gangs hi tech gang communication-handout
I gangs hi tech gang communication-handout
 
Gangs and the military
Gangs and the military Gangs and the military
Gangs and the military
 
All grown up handouts
All grown up   handoutsAll grown up   handouts
All grown up handouts
 
Public service announcement
Public service announcementPublic service announcement
Public service announcement
 
Security administration in the classroom more challenging when it’s not as ...
Security administration in the classroom   more challenging when it’s not as ...Security administration in the classroom   more challenging when it’s not as ...
Security administration in the classroom more challenging when it’s not as ...
 
Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...
 
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
 
Gang terroroc scja2011
Gang terroroc scja2011Gang terroroc scja2011
Gang terroroc scja2011
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
 
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
andagarcia212
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
lakshayrojroj
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
Kalna College
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
sonukumargpnirsadhan
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
 
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 

Security Administration Intro

  • 1.
  • 2. Security Supervision and Management: The Theory and Practice of Asset Protection – 3d Edition ISBN 978-0-7506-8436-1
  • 3. Course Objectives Understanding: • Security and Asset Protection Principles • Human Resource Management • Supervision • Training and Development • Management and Leadership • Risk Management and Emergency Management • Physical Security and Technology • Investigation • Customer, Client and Community Relations • Legal Aspects
  • 4. Method How do adults learn? Principles of Andragogy from Alexander Kapp to Malcolm Knowles
  • 6.
  • 7. Unfortunately . . . • Most of our learning, especially in higher education, comes from a secondary experience (Jarvis, 2006). – Reading – Interviewing – Sharing memories
  • 8. So the fix is . . . • Get involved in the learning process • Work in groups to share experiences • Engage in meaningful conversations • Do stuff that means something • Get close to the primary experience
  • 9. Group work • 20 in class = 5 groups of 4 • Each group chooses 2 topics • Each group hosts the discussion for the week – Prepare for and guide discussion – Identify external resources (sites/speakers etc.) – Prepare 5-10 review questions/answers • Group outline to me 2 days before (dropbox)
  • 10. Form groups • 1 • 2 • 3 • 4 • 5
  • 11. Choose topics (Team 1 and 2) • Unit I Security and Asset Protection Principles – Unit I-1 Evolving a Discipline of Security - 3 – Unit I-2 The Future of Security – Unit I-2 Appendix: The Future of Security Training – Unit I-3 Key Terms and Concepts – Unit I-4 Explaining Crime: Contemporary Criminological Theory - 35
  • 12. Choose topics (Team 3) • Unit II Human Resource Management – Unit II-1 Recruitment and Retention of Security Personnel: Understanding and Meeting the Challenge – Unit II-2 Security Personnel Selection - 63 – Unit II-3 Supervisory Characteristics and Expectations – Unit II-4 Evaluation of Uniformed Protection Officers – Unit II-5 Employee Motivation Theory and Application - 79 – Unit II-6 Employee Discipline: Policy and Practice – Unit II-7 Human Reliability
  • 13. Choose topics (Team 4) • Unit III Supervision – Unit III-1 Personnel Deployment – Unit III-2 Dealing with Difficult Employees – Unit III-3 The Supervisor's Role in Handling Complaints and Grievances – Unit III-4 Unethical Acts by Security Officers – Unit III-5 Interpersonal Communications - 123
  • 14. Choose topics (Team 5) • Unit IV Training and Development – Unit IV-1 Training: Strategies, Tactics, and Challenges for Protection Managers – Unit IV-2 Orientation for Security Officers – Unit IV-3 Staff Training and Development – Unit IV-4 Curriculum design - 165 – Unit IV-5 Professional Certifications: Milestones of Professionalism
  • 15. Choose topics (Team 1) • Unit V Management and Leadership – Unit V-1 Evolution of Management – Unit V-2 Time and Stress Management - 191 – Unit V-3 Project Management: An Overview – Unit V-4 Company Policy and Procedures: The Security Supervisor's Primer – Unit V-5 Total Quality Management - 211 – Unit V-6 Leadership for Protection Professionals
  • 16. Choose topics (Team 2) • Unit VI Risk Management and Emergency Management – Unit VI-1 Risk Management - 243 – Unit VI-2 Why Accidents Happen: The Theories of Causation – Unit VI-3 The Supervisor's Role in Safety – Unit VI-4 Workplace Violence – Unit VI-5 Critical Incident Management in the Post-9/11 Era – Unit VI-6 Supervising During Emergencies 289 – Unit VI-7 Supervising During Special Events – Unit VI-8 Security and Medical Response – Unit VI-9 Outsourcing in Security – Unit VI-10 Internal Loss
  • 17. Choose topics (Team 3) • Unit VII Physical Security and Technology – Unit VII-1 Security Systems Design and Evaluation – Unit VII-2 Statistical Analysis - 351 – Unit VII-3 Security Technologies – Unit VII-4 High-Technology Theft – Unit VII-5 Designing Operations Control Centers
  • 18. Choose topics (Team 4) • Unit VIII Investigation – Unit VIII-1 Managing Investigations - 387 – Unit VIII-2 Developing Report Writing Ability in Subordinates – Unit VIII-3 Testifying in Court - 403
  • 19. Choose topics (Team 5) • Unit IX Customer, Client and Community Relations – Unit IX-1 Customer Service and the Protection Officer: Guidelines to Achieving Excellence – Unit IX-2 The Supervisor's Role in Improving Customer Service – Unit IX-3 Tenant Relations – Unit IX-4 Uniforms and Image Projection for Protection Forces - 439 – Unit IX-5 The Relationship Between Marketing and the Security Function – Unit IX-6 Crime Prevention and Community Relations Strategies – Unit IX-7 Public-Private Sector Liaison Programs
  • 20. Choose topics? • Unit X Legal Aspects – Unit X-1 Legal Aspects of Security - 475 – Unit X-2 Managing/Supervising to Reduce Liability – Unit X-3 Sexual Harassment
  • 21. Share contact information • Name/email/phone (?) – Carter F. Smith – cfsmith@mtsu.edu – 615-494-7751
  • 22. Plan • Ensure all have topics and plan to read • Assign responsibilities – write down • Include responsibilities in submitted outline • Backup plans in place? • Talk about potential challenges