Entry
Reader's guide
Entries A-Z
Subject index
Security Management
The term security management refers to efforts to prevent loss caused by fire, theft, or accidents. Security management is considered to be a business function and is supplemental to the services provided by governmental agencies such as police or fire departments. Nevertheless, it is a vast enterprise that employs more than two and one-half times the number of public police and claims expenditures of more than $50 billion annually.
History
The history of modern security management began about 150 years ago and runs roughly parallel to that of public policing. Essentially, security management developed in order to provide businesses with protective and investigative services in areas or circumstances not under the jurisdiction of public law enforcement. One security pioneer was a Scottish cooper named Allan Pinkerton, who settled in the Chicago area and later became a police detective. Eventually, he formed his own organization to provide security services to the railroads that traveled through the American western frontier but had no police protection against criminals. The Pinkerton Agency, which also conducted investigations, was later called upon by the Union Army during the Civil War to provide intelligence about the Confederates.
During the nineteenth century, other security services emerged. Washington P. Brink founded a courier and delivery service that eventually used the first armored cars to facilitate the safe transport of currency and valuables. William J. Burns, a former Secret Service agent, founded an agency that provided investigative and guard services to the banking industry. Finally, Edwin Holmes, originally a merchant, marketed the first burglar alarm systems using batteries, switches, and bells. These systems were first used by the wealthy to protect their mansions against intruders, but soon they were installed in businesses as well. The use of burglar alarms actually preceded telephone service in the United States.
The role of private security continued to develop during the late nineteenth and early twentieth centuries. Private security personnel were used as strikebreakers and guards at factories. During World War II, private security guards were used to protect industrial plants producing materials for the armed forces. In the latter part of the 1900s, with the escalation of the crime rate and the availability of efficient and inexpensive electronic devices, security became common to most people's experience. Today, many homes and businesses have fire or smoke alarms, as well as intrusion detection systems. In addition, guards and security patrols are now typically seen in parking lots, apartments or residential communities, stores, office buildings, schools, and factories.
When someone refers to the “security industry,” this term includes a number of types of services. Most common are contract guard services, private investigators, alarm companies, and locksmiths. There are also security consultants and engineers. Proprietary security services are provided by any corporation's own security personnel, whereas contract security services are provided by corporations specializing in security management.
A major step in the professionalization of the security industry was the formation of the American Society of Industrial Security (ASIS). Members of ASIS are security managers and consultants; the organization claims a membership of 32,000, with chapters in the United States and 108 foreign countries. The organization sponsors conferences, publications such as books and the journal Security Management, and a Certified Protection Professional (CPP) accreditation program. Applicants for CPP status must demonstrate both educational and experiential qualifications and pass a rigorous examination.
...
- Crimes and Related Behaviors
- Antisocial Behavior
- Armed Robbery
- Arson
- Art Theft and Fraud
- Assassination
- Assault
- Banditry
- Barroom Violence
- Blackmail
- Bribery
- Bullying
- Burglary
- Campus Crime
- Capital Crimes
- Career Criminals
- Carjacking
- Child Homicide
- Child Maltreatment
- Child Neglect
- Child Physical Abuse
- Child Sexual Abuse
- Civil Disobedience
- Civil Order Crime
- Collective Violence
- Consumer Fraud
- Corporate Crime
- Crime Classification Systems
- Crime Reports and Statistics
- Crimes Against Persons With Disabilities
- Criminal History
- Cybercrime
- Delinquency
- Digital Crime
- Driving Under the Influence
- Drug Millionaires
- Drug Trafficking
- Elder Abuse
- Environmental Crime
- Euthanasia
- Family Violence
- Fencing
- Feuding
- Forgery
- Fraud
- Gambling
- Gangs
- Genocide
- Graffiti
- Hate Crimes
- Homicide and Murder
- Identity Theft
- Illicit Antiquities
- Infanticide
- Juvenile Crime and War
- Kidnapping
- Mass Murder
- Militias
- Missing Children
- Modus Operandi
- Money Laundering
- Obscenity and Pornography
- Organized Crime—Global
- Organized Crime—United States
- Piracy, Intellectual Property
- Piracy, Sea
- Political Corruption
- Prostitution
- Race and Violence
- Rape
- Rape, Date and Marital
- Recidivism
- Religious Deviance
- Riots
- Road Rage
- Robbery
- Same-Sex Abuse
- School Violence
- Scientific Misconduct
- Securities Fraud
- Sexual Violence
- Shoplifting
- Sibling Violence
- Smuggling
- Spectator Violence
- Sport Violence
- Spree Murder
- Stalking
- Stranger Violence
- Student Threats
- Suicide
- Terrorism
- Vagrancy
- War Crimes
- Witchcraft
- Women as Offenders
- Women Who Kill
- Workplace Violence
- Law and Justice
- Adversarial Justice
- Alternative Dispute Resolution
- Appeal/Appellate
- Arraignment
- Arrestee Drug Abuse Monitoring (ADAM) Program
- Assembly-Line Justice
- Bail and Bond
- Cameras in the Courtroom
- Charge Attrition
- Child Witness
- Civil Law Legal Traditions
- Clemency
- Common Law Legal Traditions
- Community Justice Programs
- Community Prosecution
- Comparative Law and Justice
- Competency to Stand Trial
- Court Structure, Federal
- Court Structure, State
- Court Unification
- Criminal Defenses
- Criminal Insanity
- Criminal Justice
- Criminal Law
- Criminal Trial
- Customary Law
- Death Sentence Outcomes
- Defense Counsel Systems
- Determinate Sentences
- Differentiated Case Management
- Discretionary Justice
- Diversion Programs
- Domestic Violence Courts
- Drug Courts
- Drug Legalization
- Drug Treatment
- Due Process
- Entrapment
- Exclusionary Rule
- Expert Witness
- Eyewitness Testimony
- Family Court
- Family Strengthening Programs
- Fines
- Get-Tough Initiatives
- Grand Jury
- Gun Control
- Habitual Felony Laws
- Harm Reduction
- Human Rights
- Indeterminate Sentences
- Inquisitorial Justice
- Intensive Probation Supervision
- International Criminal Court
- Judicial Selection Process
- Jury Nullification
- Jury System
- Justice
- Juvenile Court
- Juvenile Justice
- Juvenile Offenders in Adult Courts
- Mandatory Sentencing
- Mercy
- Military Justice
- Miranda Rights
- Online Victimization of Youth
- Pardon
- Plea Bargaining
- Probation
- Procedural Justice
- Prosecutorial Discretion
- Public Defender
- Race and Sentencing
- Rehabilitation Model
- Reintegration Model
- Release on Own Recognizance
- Restorative Justice
- Retributive Justice
- Revenge, Retribution, and Rehabilitation
- Scared Straight Programs
- Selective Incapacitation
- Sentencing
- Sentencing Guidelines
- Speedy Trial Legislation
- Split Sentence
- United States Supreme Court
- Whistle-Blowing
- Wickersham Commission
- Wrongful Convictions
- Zero Tolerance Policing
- Policing
- Alcohol, Tobacco and Firearms, Bureau of
- Arrest Clearance
- Arrest Practices
- Broken Windows Theory
- Citizen Review
- Community Policing
- Comparative Policing
- Confession
- Counterterrorism
- Criminal Investigation
- Deadly Force
- Detective Work
- Federal Bureau of Investigation
- Foot Patrol
- Geographic Information Systems
- Geographic Profiling
- Homicide Investigation
- Hot Spot Policing
- House Arrest
- Informants
- Interrogation
- KGB
- Mandatory Arrest
- Neighborhood Watch Programs
- Net Widening
- Police Attitudes and Behavior
- Police Corruption
- Police Information Systems
- Police Organizations
- Police Privatization
- Police Pursuits
- Police Strategies and Operations
- Police Technology
- Police Training and Selection
- Police, Killing of
- Private Security
- Problem-Oriented Policing
- Race and Policing
- Racial Profiling
- Recreational Law Enforcement
- Royal Canadian Mounted Police
- Rural Law Enforcement
- Scotland Yard
- Surveillance Abuse
- Women and Policing
- Zero Tolerance Policing
- Forensics
- Anthropology, Forensic
- Cognitive Interview
- Crime Analysis
- Crime Laboratory
- Crime Scene Assessment
- Criminal Profiling
- Criminalistics
- Detection of Deception
- DNA Testing
- Firearms Identification
- Forensic Behavioral Sciences
- Forensic Interrogation
- Forensic Polygraph
- Forensic Science
- Hypnosis
- Medical Examiner
- Odontology
- Psychiatry, Forensic
- Psychology, Forensic
- Questioned Documents/Ink Dating
- Scientific Evidence
- Toxicology
- Voice Identification
- Voice Stress Analysis
- Corrections
- Abolitionism
- Alcatraz
- Attica
- Auburn State Prison
- Boot Camps
- Corrections
- Corrections Officers
- Day Release
- Death Row
- Death Row Inmates
- Devil's Island
- Early Release Programs
- Eastern State Penitentiary
- Electronic Monitoring
- Elmira Reformatory
- Furlough Programs
- Halfway House
- International Imprisonments
- Joliet Correctional Center
- Leavenworth Federal Penitentiary
- New Generation Jails
- Parole
- Penal Colonies
- Preventive Detention
- Prison Overcrowding
- Prison Reform
- Prison Riots
- Prison Systems
- Prison Violence
- Prisoner Literature
- Prisoner Rights
- Prisoners, Elderly
- Race and Corrections
- Religion in Prison
- San Quentin
- Sex Offender Treatment
- Shelters
- Shock Incarceration
- Sing Sing
- Supermax Prisons
- Tucker State Farm
- Women in Prison
- Work Release
- Victimology
- Juvenile Victimization and Offending
- National Crime Victimization Survey
- Online Victimization of Youth
- Repeat Victimization
- Victim Advocates
- Victim Needs and Services
- Victim Rights and Restitution
- Victim Theories
- Victim-Offender Mediation
- Victim/Witness Protection
- Victimization
- Victims' Bill of Rights
- Women as Victims
- Punishment
- Sociocultural Context and Popular Culture
- Alcohol
- Buddhism
- Christianity
- Cinema
- Comic Books
- Commercial Sex Industry
- Conduct Norms and Crime
- Costs of Crime
- Crime and Everyday Life
- Daoism
- Demography
- Discrimination in the Criminal Justice Workplace
- Drugs
- Environmental Design
- Ethics
- Ethnicity and Race
- Fear of Crime
- Financial Costs and Benefits of Crime Prevention
- Gated Communities
- Gender
- Gun Control
- Hinduism
- HIV/AIDS in Criminal Justice
- Islam
- Judaism
- Literature, Fiction
- Literature, True Crime
- Masculinity, Anger, and Violence
- Media
- Moral Panic
- Policing Democracy
- Political Corruption
- Prisoner Literature
- Public Housing
- Public Opinion
- Risk
- Security Management
- Sensation Seeking
- Shame and Guilt
- Shinto
- Social Class
- Television
- Video and Computer Games
- Vigilantism
- International
- Alternative Punishments in Sub-Saharan Africa
- Australia
- Buddhism
- Canada
- Caribbean
- China
- Christianity
- Comparative Law and Justice
- Comparative Policing
- Counterterrorism
- Daoism
- Europe, Central Eastern
- France
- Genocide
- Germany
- Great Britain
- Hinduism
- Human Rights
- India
- Indonesia
- International Criminal Court
- International Imprisonments
- Islam
- Italian Mafia
- Italy
- Japan
- Judaism
- Latin America, Crime and Violence in
- Mexico
- Organized Crime—Global
- Penal Colonies
- Piracy, Intellectual Property
- Piracy, Sea
- Policing Democracy
- Political Corruption
- Poverty
- Russia
- Shinto
- Singapore
- Smuggling
- South Pacific Islands
- Sub-Saharan Africa
- Terrorism
- War Crimes
- Witchcraft
- Women and Crime in a Global Perspective
- Concepts and Theories
- Attachment Theory
- Biocriminology
- Broken Windows Theory
- Cartographic School of Criminology
- Control Theories
- Crime as Pathology
- Crime Control Model
- Critical Criminology
- Culture Conflict and Crime
- Deterrence Theory
- Deviance
- Economic Theories of Crime
- Education and Employment
- Evolutionary Perspectives on Crime
- Experimental Criminology
- Feminist Theory
- Integrative Theories
- Life-Course Theories
- Nonintervention Model
- Peacemaking Criminology
- Radical Criminology
- Social Control Theory
- Social Learning Theories
- Sociological Theories
- Strain Theory
- Trait Theories
- Research Methods and Information
- Sourcebook of Criminal Justice Statistics
- Arrestee Drug Abuse Monitoring (ADAM) Program
- Crime Classification Systems
- Crime Reports and Statistics
- Criminal Justice
- Criminology
- Ethnography of Crime and Punishment
- Information Systems
- National Crime Victimization Survey
- Self-Report Surveys
- Social Psychology
- Statistical Methods and Models
- Uniform Crime Reports
- Organizations and Institutions
- Alcatraz
- Alcohol, Tobacco, and Firearms
- Appendix 3: Professional and Scholarly Associations
- Attica
- Auburn State Prison
- Devil's Island
- Eastern State Penitentiary
- Elmira Reformatory
- Federal Bureau of Investigation
- International Criminal Court
- Italian Mafia
- Joliet Correctional Center
- KGB
- Leavenworth Federal Penitentiary
- Royal Canadian Mounted Police
- San Quentin
- Sing Sing
- Tucker State Farm
- United States Supreme Court
- Special Populations
- American Indians and Alaska Natives
- Animals in Criminal Justice
- Child Homicide
- Child Maltreatment
- Child Neglect
- Child Physical Abuse
- Child Sexual Abuse
- Child Witness
- Ethnicity and Race
- Homeless Men and Crime
- Homeless Women and Crime
- Infanticide
- Juvenile Court
- Juvenile Crime and War
- Juvenile Justice
- Juvenile Offenders in Adult Courts
- Juvenile Victimization and Offending
- Mentally Ill Offenders
- Military Justice
- Militias
- Missing Children
- Online Victimization of Youth
- Prisoners, Elderly
- School Violence
- Street Youth
- Student Threats
- Women and Crime in a Global Perspective
- Women and Policing
- Women as Offenders
- Women as Victims
- Women in Prison
- Women Who Kill
- Youth, At-Risk
- Youthful Offender
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches