Security science: the theory and practice of security
Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners and students the underlying scientific perspective base...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier, BH
2013
|
Schlagworte: | |
Online-Zugang: | TUM01 Volltext |
Zusammenfassung: | Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners and students the underlying scientific perspective based on robust underlying theories, principles, models or frameworks. Demonstrating the relationships and underlying concepts, they present an approach to each core security function within the context of both organizational security and homeland security. The book is unique in its application |
Beschreibung: | Functions of a Facility Manager Includes bibliographical references and index Front Cover; Security Science: The Theory and Practice of Security; Copyright; Dedication; Contents; Acknowledgments; About the Authors; Foreword; Preface; Chapter 1: Concept of Security; Introduction; Scientific method in support of security science; Scientific Method; Engineering Design Process; Defining the concept of security; Security of individuals; Hierarchy of Human Needs; Safety versus Security; Risk-driven Security; Security of groups; The Law and Social Contract; Public Security (Policing); Private Security; Security of nation-state and international systems National Security and Defense Homeland Security; Securitization; Concept of security matrix; Security science: context defines concept definition; Theoretical Definition of Security; Studies in a Body of Knowledge; Consolidated Framework of Security Science; Security science; Conclusion; Further Reading; References; Chapter 2: Security Management; Introduction; Security management issues; A systems approach; General Systems Theory; Benefits of a Systems Approach; Security management; Management Functions; Security Planning; Strategic security management frameworks; Risk-based Framework Quality Assurance Framework Governance Framework; Strategic Security Management Framework; Organizational resilience; Resilience; Organizational Resilience; Organizational Resilience Planning; Building Resilience; Security management functions; Security Governance; Controls; Security Metrics and Performance Management; Security Risk Management; Succession Planning; Security Training and Education; Cost-Benefit Analysis; Budget; Security management policies and procedures; Types of Procedures; Features of a Strong Policy and Procedures; Security principles; Security ethics; Security decay Conclusion Websites; References; Chapter 3: Security Risk Management; Introduction; The concept of risk; Defining risk; The concepts of probability to likelihood; Probability in Risk Assessment; Importance of consequence; Source of risk; Risk management; An international approach to risk management; The Context; Risk Assessment; Risk Treatment; Security risk management; Threat; What Is Intent?; What Is Capability?; What is a Threat Assessment?; Criticality; Vulnerability; Threat, criticality, and vulnerability; Risk models and modeling; Gaming risk; Decision-making in risk Decision-making and Judgment Heuristics; Perception and culture; Psychometric Risk Perception; Cultural Theory of Risk; Gender and Risk; Trust; Trust the Information; Gaining consensus; Conclusion; Further Reading; References; Chapter 4: Built Environment; Introduction; Built environment; Security and the built environment; Physical Reinforcement; Crime Prevention through Environmental Design; Lighting Effect; Greener Environments; Facility management; Importance of Facility Management; Purpose of Facilities; Who is the facility manager?; Emergence of the Facility Manager |
Beschreibung: | 1 Online-Ressource (xvii, 256 p.) |
ISBN: | 0123944368 0123947855 9780123944368 9780123947857 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV041053755 | ||
003 | DE-604 | ||
005 | 20190927 | ||
007 | cr|uuu---uuuuu | ||
008 | 130528s2013 |||| o||u| ||||||eng d | ||
020 | |a 0123944368 |9 0-12-394436-8 | ||
020 | |a 0123947855 |c electronic bk. |9 0-12-394785-5 | ||
020 | |a 9780123944368 |9 978-0-12-394436-8 | ||
020 | |a 9780123947857 |c electronic bk. |9 978-0-12-394785-7 | ||
035 | |a (OCoLC)823730851 | ||
035 | |a (DE-599)BVBBV041053755 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 | ||
082 | 0 | |a 658.47 |2 23 | |
100 | 1 | |a Smith, Clifton L. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security science |b the theory and practice of security |c Clifton L. Smith ; David J. Brooks |
264 | 1 | |a Amsterdam |b Elsevier, BH |c 2013 | |
300 | |a 1 Online-Ressource (xvii, 256 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Functions of a Facility Manager | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Front Cover; Security Science: The Theory and Practice of Security; Copyright; Dedication; Contents; Acknowledgments; About the Authors; Foreword; Preface; Chapter 1: Concept of Security; Introduction; Scientific method in support of security science; Scientific Method; Engineering Design Process; Defining the concept of security; Security of individuals; Hierarchy of Human Needs; Safety versus Security; Risk-driven Security; Security of groups; The Law and Social Contract; Public Security (Policing); Private Security; Security of nation-state and international systems | ||
500 | |a National Security and Defense Homeland Security; Securitization; Concept of security matrix; Security science: context defines concept definition; Theoretical Definition of Security; Studies in a Body of Knowledge; Consolidated Framework of Security Science; Security science; Conclusion; Further Reading; References; Chapter 2: Security Management; Introduction; Security management issues; A systems approach; General Systems Theory; Benefits of a Systems Approach; Security management; Management Functions; Security Planning; Strategic security management frameworks; Risk-based Framework | ||
500 | |a Quality Assurance Framework Governance Framework; Strategic Security Management Framework; Organizational resilience; Resilience; Organizational Resilience; Organizational Resilience Planning; Building Resilience; Security management functions; Security Governance; Controls; Security Metrics and Performance Management; Security Risk Management; Succession Planning; Security Training and Education; Cost-Benefit Analysis; Budget; Security management policies and procedures; Types of Procedures; Features of a Strong Policy and Procedures; Security principles; Security ethics; Security decay | ||
500 | |a Conclusion Websites; References; Chapter 3: Security Risk Management; Introduction; The concept of risk; Defining risk; The concepts of probability to likelihood; Probability in Risk Assessment; Importance of consequence; Source of risk; Risk management; An international approach to risk management; The Context; Risk Assessment; Risk Treatment; Security risk management; Threat; What Is Intent?; What Is Capability?; What is a Threat Assessment?; Criticality; Vulnerability; Threat, criticality, and vulnerability; Risk models and modeling; Gaming risk; Decision-making in risk | ||
500 | |a Decision-making and Judgment Heuristics; Perception and culture; Psychometric Risk Perception; Cultural Theory of Risk; Gender and Risk; Trust; Trust the Information; Gaining consensus; Conclusion; Further Reading; References; Chapter 4: Built Environment; Introduction; Built environment; Security and the built environment; Physical Reinforcement; Crime Prevention through Environmental Design; Lighting Effect; Greener Environments; Facility management; Importance of Facility Management; Purpose of Facilities; Who is the facility manager?; Emergence of the Facility Manager | ||
520 | 3 | |a Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners and students the underlying scientific perspective based on robust underlying theories, principles, models or frameworks. Demonstrating the relationships and underlying concepts, they present an approach to each core security function within the context of both organizational security and homeland security. The book is unique in its application | |
650 | 7 | |a BUSINESS & ECONOMICS / Corporate Governance |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Leadership |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Development |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Workplace Culture |2 bisacsh | |
650 | 4 | |a Führung | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Security systems | |
650 | 4 | |a Private security services | |
650 | 4 | |a Internal security | |
650 | 0 | 7 | |a Innere Sicherheit |0 (DE-588)4127888-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Menschliche Sicherheit |0 (DE-588)7716334-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wissenschaft |0 (DE-588)4066562-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Soziale Sicherheit |0 (DE-588)4055732-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kriminalität |0 (DE-588)4033178-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Prävention |0 (DE-588)4076308-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Forschung |0 (DE-588)4017894-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | 1 | |a Wissenschaft |0 (DE-588)4066562-8 |D s |
689 | 0 | 2 | |a Forschung |0 (DE-588)4017894-8 |D s |
689 | 0 | |5 DE-188 | |
689 | 1 | 0 | |a Menschliche Sicherheit |0 (DE-588)7716334-5 |D s |
689 | 1 | 1 | |a Soziale Sicherheit |0 (DE-588)4055732-7 |D s |
689 | 1 | 2 | |a Innere Sicherheit |0 (DE-588)4127888-4 |D s |
689 | 1 | 3 | |a Kriminalität |0 (DE-588)4033178-7 |D s |
689 | 1 | 4 | |a Prävention |0 (DE-588)4076308-0 |D s |
689 | 1 | |5 DE-188 | |
700 | 1 | |a Brooks, David J. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=485991 |x Verlag |3 Volltext |
912 | |a ZDB-4-NLEBK | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-026031003 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=485991 |l TUM01 |p ZDB-4-NLEBK |q TUM_PDA_EBSCO_BAE_gekauft |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804150415788343296 |
---|---|
any_adam_object | |
author | Smith, Clifton L. |
author_facet | Smith, Clifton L. |
author_role | aut |
author_sort | Smith, Clifton L. |
author_variant | c l s cl cls |
building | Verbundindex |
bvnumber | BV041053755 |
collection | ZDB-4-NLEBK |
ctrlnum | (OCoLC)823730851 (DE-599)BVBBV041053755 |
dewey-full | 658.47 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.47 |
dewey-search | 658.47 |
dewey-sort | 3658.47 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06475nmm a2200769zc 4500</leader><controlfield tag="001">BV041053755</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190927 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130528s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123944368</subfield><subfield code="9">0-12-394436-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123947855</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-394785-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123944368</subfield><subfield code="9">978-0-12-394436-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123947857</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-394785-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)823730851</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041053755</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.47</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Smith, Clifton L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security science</subfield><subfield code="b">the theory and practice of security</subfield><subfield code="c">Clifton L. Smith ; David J. Brooks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier, BH</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 256 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Functions of a Facility Manager</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Front Cover; Security Science: The Theory and Practice of Security; Copyright; Dedication; Contents; Acknowledgments; About the Authors; Foreword; Preface; Chapter 1: Concept of Security; Introduction; Scientific method in support of security science; Scientific Method; Engineering Design Process; Defining the concept of security; Security of individuals; Hierarchy of Human Needs; Safety versus Security; Risk-driven Security; Security of groups; The Law and Social Contract; Public Security (Policing); Private Security; Security of nation-state and international systems</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">National Security and Defense Homeland Security; Securitization; Concept of security matrix; Security science: context defines concept definition; Theoretical Definition of Security; Studies in a Body of Knowledge; Consolidated Framework of Security Science; Security science; Conclusion; Further Reading; References; Chapter 2: Security Management; Introduction; Security management issues; A systems approach; General Systems Theory; Benefits of a Systems Approach; Security management; Management Functions; Security Planning; Strategic security management frameworks; Risk-based Framework</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Quality Assurance Framework Governance Framework; Strategic Security Management Framework; Organizational resilience; Resilience; Organizational Resilience; Organizational Resilience Planning; Building Resilience; Security management functions; Security Governance; Controls; Security Metrics and Performance Management; Security Risk Management; Succession Planning; Security Training and Education; Cost-Benefit Analysis; Budget; Security management policies and procedures; Types of Procedures; Features of a Strong Policy and Procedures; Security principles; Security ethics; Security decay</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Conclusion Websites; References; Chapter 3: Security Risk Management; Introduction; The concept of risk; Defining risk; The concepts of probability to likelihood; Probability in Risk Assessment; Importance of consequence; Source of risk; Risk management; An international approach to risk management; The Context; Risk Assessment; Risk Treatment; Security risk management; Threat; What Is Intent?; What Is Capability?; What is a Threat Assessment?; Criticality; Vulnerability; Threat, criticality, and vulnerability; Risk models and modeling; Gaming risk; Decision-making in risk</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Decision-making and Judgment Heuristics; Perception and culture; Psychometric Risk Perception; Cultural Theory of Risk; Gender and Risk; Trust; Trust the Information; Gaining consensus; Conclusion; Further Reading; References; Chapter 4: Built Environment; Introduction; Built environment; Security and the built environment; Physical Reinforcement; Crime Prevention through Environmental Design; Lighting Effect; Greener Environments; Facility management; Importance of Facility Management; Purpose of Facilities; Who is the facility manager?; Emergence of the Facility Manager</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners and students the underlying scientific perspective based on robust underlying theories, principles, models or frameworks. Demonstrating the relationships and underlying concepts, they present an approach to each core security function within the context of both organizational security and homeland security. The book is unique in its application</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Corporate Governance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Leadership</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Development</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Workplace Culture</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Führung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Private security services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internal security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Menschliche Sicherheit</subfield><subfield code="0">(DE-588)7716334-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wissenschaft</subfield><subfield code="0">(DE-588)4066562-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soziale Sicherheit</subfield><subfield code="0">(DE-588)4055732-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kriminalität</subfield><subfield code="0">(DE-588)4033178-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Forschung</subfield><subfield code="0">(DE-588)4017894-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Wissenschaft</subfield><subfield code="0">(DE-588)4066562-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Forschung</subfield><subfield code="0">(DE-588)4017894-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Menschliche Sicherheit</subfield><subfield code="0">(DE-588)7716334-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Soziale Sicherheit</subfield><subfield code="0">(DE-588)4055732-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Kriminalität</subfield><subfield code="0">(DE-588)4033178-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brooks, David J.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=485991</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026031003</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=485991</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-4-NLEBK</subfield><subfield code="q">TUM_PDA_EBSCO_BAE_gekauft</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041053755 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:38:34Z |
institution | BVB |
isbn | 0123944368 0123947855 9780123944368 9780123947857 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026031003 |
oclc_num | 823730851 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xvii, 256 p.) |
psigel | ZDB-4-NLEBK ZDB-4-NLEBK TUM_PDA_EBSCO_BAE_gekauft |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Elsevier, BH |
record_format | marc |
spelling | Smith, Clifton L. Verfasser aut Security science the theory and practice of security Clifton L. Smith ; David J. Brooks Amsterdam Elsevier, BH 2013 1 Online-Ressource (xvii, 256 p.) txt rdacontent c rdamedia cr rdacarrier Functions of a Facility Manager Includes bibliographical references and index Front Cover; Security Science: The Theory and Practice of Security; Copyright; Dedication; Contents; Acknowledgments; About the Authors; Foreword; Preface; Chapter 1: Concept of Security; Introduction; Scientific method in support of security science; Scientific Method; Engineering Design Process; Defining the concept of security; Security of individuals; Hierarchy of Human Needs; Safety versus Security; Risk-driven Security; Security of groups; The Law and Social Contract; Public Security (Policing); Private Security; Security of nation-state and international systems National Security and Defense Homeland Security; Securitization; Concept of security matrix; Security science: context defines concept definition; Theoretical Definition of Security; Studies in a Body of Knowledge; Consolidated Framework of Security Science; Security science; Conclusion; Further Reading; References; Chapter 2: Security Management; Introduction; Security management issues; A systems approach; General Systems Theory; Benefits of a Systems Approach; Security management; Management Functions; Security Planning; Strategic security management frameworks; Risk-based Framework Quality Assurance Framework Governance Framework; Strategic Security Management Framework; Organizational resilience; Resilience; Organizational Resilience; Organizational Resilience Planning; Building Resilience; Security management functions; Security Governance; Controls; Security Metrics and Performance Management; Security Risk Management; Succession Planning; Security Training and Education; Cost-Benefit Analysis; Budget; Security management policies and procedures; Types of Procedures; Features of a Strong Policy and Procedures; Security principles; Security ethics; Security decay Conclusion Websites; References; Chapter 3: Security Risk Management; Introduction; The concept of risk; Defining risk; The concepts of probability to likelihood; Probability in Risk Assessment; Importance of consequence; Source of risk; Risk management; An international approach to risk management; The Context; Risk Assessment; Risk Treatment; Security risk management; Threat; What Is Intent?; What Is Capability?; What is a Threat Assessment?; Criticality; Vulnerability; Threat, criticality, and vulnerability; Risk models and modeling; Gaming risk; Decision-making in risk Decision-making and Judgment Heuristics; Perception and culture; Psychometric Risk Perception; Cultural Theory of Risk; Gender and Risk; Trust; Trust the Information; Gaining consensus; Conclusion; Further Reading; References; Chapter 4: Built Environment; Introduction; Built environment; Security and the built environment; Physical Reinforcement; Crime Prevention through Environmental Design; Lighting Effect; Greener Environments; Facility management; Importance of Facility Management; Purpose of Facilities; Who is the facility manager?; Emergence of the Facility Manager Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners and students the underlying scientific perspective based on robust underlying theories, principles, models or frameworks. Demonstrating the relationships and underlying concepts, they present an approach to each core security function within the context of both organizational security and homeland security. The book is unique in its application BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh BUSINESS & ECONOMICS / Workplace Culture bisacsh Führung Wirtschaft Security systems Private security services Internal security Innere Sicherheit (DE-588)4127888-4 gnd rswk-swf Menschliche Sicherheit (DE-588)7716334-5 gnd rswk-swf Wissenschaft (DE-588)4066562-8 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Soziale Sicherheit (DE-588)4055732-7 gnd rswk-swf Kriminalität (DE-588)4033178-7 gnd rswk-swf Prävention (DE-588)4076308-0 gnd rswk-swf Forschung (DE-588)4017894-8 gnd rswk-swf Sicherheit (DE-588)4054790-5 s Wissenschaft (DE-588)4066562-8 s Forschung (DE-588)4017894-8 s DE-188 Menschliche Sicherheit (DE-588)7716334-5 s Soziale Sicherheit (DE-588)4055732-7 s Innere Sicherheit (DE-588)4127888-4 s Kriminalität (DE-588)4033178-7 s Prävention (DE-588)4076308-0 s Brooks, David J. Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=485991 Verlag Volltext |
spellingShingle | Smith, Clifton L. Security science the theory and practice of security BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh BUSINESS & ECONOMICS / Workplace Culture bisacsh Führung Wirtschaft Security systems Private security services Internal security Innere Sicherheit (DE-588)4127888-4 gnd Menschliche Sicherheit (DE-588)7716334-5 gnd Wissenschaft (DE-588)4066562-8 gnd Sicherheit (DE-588)4054790-5 gnd Soziale Sicherheit (DE-588)4055732-7 gnd Kriminalität (DE-588)4033178-7 gnd Prävention (DE-588)4076308-0 gnd Forschung (DE-588)4017894-8 gnd |
subject_GND | (DE-588)4127888-4 (DE-588)7716334-5 (DE-588)4066562-8 (DE-588)4054790-5 (DE-588)4055732-7 (DE-588)4033178-7 (DE-588)4076308-0 (DE-588)4017894-8 |
title | Security science the theory and practice of security |
title_auth | Security science the theory and practice of security |
title_exact_search | Security science the theory and practice of security |
title_full | Security science the theory and practice of security Clifton L. Smith ; David J. Brooks |
title_fullStr | Security science the theory and practice of security Clifton L. Smith ; David J. Brooks |
title_full_unstemmed | Security science the theory and practice of security Clifton L. Smith ; David J. Brooks |
title_short | Security science |
title_sort | security science the theory and practice of security |
title_sub | the theory and practice of security |
topic | BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh BUSINESS & ECONOMICS / Workplace Culture bisacsh Führung Wirtschaft Security systems Private security services Internal security Innere Sicherheit (DE-588)4127888-4 gnd Menschliche Sicherheit (DE-588)7716334-5 gnd Wissenschaft (DE-588)4066562-8 gnd Sicherheit (DE-588)4054790-5 gnd Soziale Sicherheit (DE-588)4055732-7 gnd Kriminalität (DE-588)4033178-7 gnd Prävention (DE-588)4076308-0 gnd Forschung (DE-588)4017894-8 gnd |
topic_facet | BUSINESS & ECONOMICS / Corporate Governance BUSINESS & ECONOMICS / Leadership BUSINESS & ECONOMICS / Organizational Development BUSINESS & ECONOMICS / Workplace Culture Führung Wirtschaft Security systems Private security services Internal security Innere Sicherheit Menschliche Sicherheit Wissenschaft Sicherheit Soziale Sicherheit Kriminalität Prävention Forschung |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=485991 |
work_keys_str_mv | AT smithcliftonl securitysciencethetheoryandpracticeofsecurity AT brooksdavidj securitysciencethetheoryandpracticeofsecurity |