Cargando…

Keeping religious institutions secure /

Keeping Religious Institutions Secure explores the unique vulnerabilities that churches, synagogues, and mosques face in regards to security, making them attractive to criminals who see them as easy targets. The text illustrates why all places of worship should think about security and the types of...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: McLamb, Jennie-Leigh (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford UK ; Waltham, MA : Butterworth-Heinemann, an imprint of Elsevier, [2015]
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Front Cover; Keeping Religious Institutions Secure; Copyright; Contents; About the Authors; Preface; Acknowledgments; 1
  • Introduction; Incidents in the United States; Incidents Outside the United States; Safety versus Security; Purpose and Scope of this Book; Organization of this Book; Considerations; End Notes; Chapter 2
  • Examining Typical Crimes; General Crime Information; Financial Crimes; Crimes against Property; Crimes against Persons; Hate Crimes; Final Thoughts; End Notes; 3
  • Understanding Basic Security Principles; General Concepts; Disaster/Crisis/Incident Management Cycle.
  • Physical SecurityElectronic Security; Environmental Security; Operational Security; Information Security; Final Thoughts; End Notes; 4
  • Evaluating Risk; Risk; Risk Assessment; Security Survey; Cost-Benefit Analysis; Putting It All Together; Final Thoughts; End Notes; 5
  • Choosing Physical and Electronic Security Countermeasures; Security System Functions; Designing and Implementing a Physical Protection System; Improving an Existing PPS; Systems Integration; Performance Measures for PPS Functions; Building Your Facility; Final Thoughts; End Notes; 6
  • Utilizing the Total Environment.
  • Benefits of CPTEDWhat is CPTED?; Behavior Management; Space Assessment 3-D Approach; Putting CPTED Principles to Work; Final Thoughts; End Notes; 7
  • Developing Policies and Procedures; Topics for Policies and Procedures; Emergency Plans for Security Incidents; Recovery Plans; Information Security Policies; Issue-Specific Security Policies; Policy Distribution; Final Thoughts; End Notes; 8
  • Identifying and Handling At-Risk People; Threat Assessment; Signs of a Person Being Under the Influence of Chemical Substances19; Mental Illness; Suspicious Behaviors Indicating Criminal Activity.
  • Early Warning Signs of Potential Workplace ViolenceWarning Signs of Potential/Impending Violence; Domestic Violence; Meeting with a Potentially Violent Person; Confrontation Management and De-Escalation Techniques; Final Thoughts; End Notes; 9
  • Reacting to an Event in Progress; Declaring a Crisis; Bomb Threats; Other Threats; Suspicious Mail or Packages; Suspicious Items; Potential Attacker; Managing Anxiety; Managing Verbal Aggression; Physical Intervention; Final Thoughts; End Notes; 10
  • Responding to an Active Shooter; Factors that Affect Decision-Making; Preparation; Run; Hide.
  • InterveneWhat to Do when Law Enforcement Arrives; Final Thoughts; End Notes; 11
  • Recovering from an Incident; Immediate Aftermath; Short Term; Long Term; Summary; End Notes; 12
  • Handling the Media; Introduction; Media Liaison; Other Considerations; Final Thoughts; End Notes; 13
  • Recognizing Intangible Capital and Liability Concerns; Intangible Assets; Intangible Capital; Protecting Your Facility's Reputation; Liability Concerns; Final Thoughts; End Notes; 14
  • Increasing Security Awareness; Factors that Negatively Affect Awareness; Security Awareness Program; Final Thoughts; End Notes.
  • 15
  • Implementing and Training.