skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 52310 Find in a Library
Title: HOW TO DEVELOP AN EFFECTIVE COMPANY SECURITY PROGRAM
Author(s): R S POST; D A SCHACHTSIEK
Corporate Author: Dartnell Corporation
United States of America
Date Published: 1977
Page Count: 420
Sponsoring Agency: Dartnell Corporation
Chicago, IL 60640
Sale Source: Dartnell Corporation
4660 Ravenswood Avenue
Chicago, IL 60640
United States of America
Language: English
Country: United States of America
Annotation: THIS MANUAL FOR COMPANY SECURITY MANAGERS PROVIDES MATERIALS FOR EVALUATING EXISTING SECURITY PROGRAMS AND PROBLEMS; IDENTIFYING PROTECTIVE RESOURCES; AND COST ESTIMATING, IMPLEMENTING, AND RUNNING A SECURITY PROGRAM.
Abstract: THE FIRST SECTION OF THE MANUAL PROVIDES BASIC BACKGROUND INFORMATION ABOUT SECURITY PROGRAM OPERATIONS, ANALYSIS OF PROBLEMS, AND A SUMMARY OF RELEVANT MANAGEMENT TECHNIQUES AND PROBLEMS ASSOCIATED WITH PROTECTION. A SECURITY AUDIT OUTLINE IS PRESENTED AS WELL AS A SECURITY PLAN DEVELOPMENT FORMAT. MANAGEMENT TECHNIQUES DESCRIBED INCLUDE RISK ANALYSIS (REQUIRING THE IDENTIFICATION, TABULATION, EVALUATION, AND SOLUTION OF ALL CONCEIVABLE HAZARDS AND CONSEQUENTLY THE DEVELOPMENT OF MEASURES WHICH WOULD ELIMINATE OR REDUCE THE HAZARDS), FAULT-FREE ANALYSIS (WHICH PROVIDES A GRAPHIC REPRESENTATION OF THE CONDITIONS LEADING UP TO AN UNDESIRED EVENT), AND BRAINSTORMING (USING INTERACTIVE EXCHANGE OF IDEAS AT A MANAGEMENT SESSION). COMPLEXITIES OF PROGRAMMING SECURITY WHICH INTERFERE WITH THE PRESENTATION OF ANALYTICAL AND MANAGEMENT TECHNIQUES ARE REVIEWED, AND DEFINITIONS OR POLICY STATEMENTS GENERIC TO SECURITY PROGRAM DEVELOPMENT ARE PROVIDED IN POLICY STATEMENT FORMATS IN EACH SUBSECTION. THE SECOND SECTION OF THE MANUAL CONTAINS CHECKLISTS, FORMATS, COST GUIDES AND INSTRUCTIONS FOR PROBLEM ANALYSIS, PROBLEMSOLVING, POLICY OR PROCEDURE PLANNING, OR DEVELOPMENT AND TRAINING. SECURITY PERSONNEL QUALIFICATIONS, SELECTION POLICIES, AND SALARY AND TRAINING STANDARDS ARE OUTLINED. A GUIDE FOR DETERMINING THE TYPE OF INTRUSION EQUIPMENT NECESSARY FOR SECURITY NEEDS AND FOR LOCATING AND BIDDING ON THE EQUIPMENT IS PROVIDED. SECURITY CHECKLISTS AND POLICIES REGARDING BOMB THREATS, FIREARMS USE BY SECURITY OFFICERS, GUARD FUNCTIONS, INCIDENT REPORTING, AND AFTER-HOLDUP PROCEDURES ARE PROVIDED. REFERENCES AND AN INDEX ARE INCLUDED.
Index Term(s): Alarm systems; Business security; Intrusion detectors; Management; Private police; Procedure manuals; Security management
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=52310

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.