INFORMATION

Site Map - Security Services

Meeting Management's Expectations

- Whether in-house or proprietary, the key to building and maintaining a successful security force program is to ensure that it is well-managed and focused on company needs.

Security officers

- Johnson v. LaRabida Children's Hospital, U.S. Court of Appeals for the Seventh District, No. 03-2339, 2004.

What's True About False Arrests?

- This study of false-arrest lawsuits shows companies the security procedures and policies that are most likely to land them in court.

What Are Security's Lessons in Iraq?

- Private security had to get up to speed fast in Iraq. The experience has yielded important lessons.

Electronic Security Systems: A Manager’s Guide to Evaluating and Selecting System Solutions

- For security to succeed, it must incorporate not just guards, guns, and gates, but other elements, in particular technology. In addition, all the factors must work together, without focus on individual parts at the expense of the whole. Electronic Security Systems: A Manager’s Guide to Evaluating and Selecting System Solutions fills that need, detailing all of the various components of a successful security system.

Show No Fear

- Presenting a calm exterior is the key to success in this eight-step approach to de-escalating a threatening situation.

GPS Tracks Journey

- When Journey Security Services security guards witnessed a car accident while on patrol, they didn't have time to verify their coordinates and call 911. Instead the guards made a phone call to their supervisor, who tracked their precise location in seconds using the GPS tracking device in one guard's cell phone. The supervisor was able to call for an ambulance while the guards focused on helping the victims.

Secret Service Does Its Share

- Everyone's heard complaints about industry and government not sharing information with each other. So it's refreshing when word arises of effective communication between the public and private sectors. At January's inauguration of President Bush for his second term, the Secret Service's actions were a model of cooperation, according to private security companies with which they worked.

Identifying and Exploring Security Essentials

- An associate professor of criminal justice, Mary Clifford has written a lengthy text that would be especially useful to students pursuing a career in security management. Chapters conclude with discussion and review questions designed to help readers understand the terms and concepts presented. These exercises and the practice scenarios contained in the book are best when considered in a group or classroom setting with an opportunity for feedback.

What's the Value of Training Time?

- Many cities are considering bills that would mandate minimum training hours for security officers. Quality is not discussed, and that's a mistake.

Security Consulting, Third Edition

- Sennewald divides security consulting into three specialties: security management consulting (covering issues such as organizational change and policy development), forensic consulting (such as analyzing evidence for lawsuits), and security technical or engineering consulting (which includes recommending equipment or hardware). The book explicitly focuses on the first two--Sennewald admits to having no technical experience--but the lessons from the book could apply to all three.

Checking the Checkers

- The background screening company you hire should be thoroughly vetted.

Essentials of the Reid Technique: Criminal Interrogation and Confessions

- Many experts consider the Reid Technique to be the leading method on interviewing and interrogation and Criminal Interrogation and Confessions to be the seminal textbook on the subject. Now the developers of the Reid Technique have created an abridged version of the classic textbook, called Essentials of the Reid Technique: Criminal Interrogation and Confessions.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.