000 | 06057nam a22004813i 4500 | ||
---|---|---|---|
001 | EBC2025499 | ||
003 | MiAaPQ | ||
005 | 20240729123541.0 | ||
006 | m o d | | ||
007 | cr cnu|||||||| | ||
008 | 240724s2015 xx o ||||0 eng d | ||
020 |
_a9780128014882 _q(electronic bk.) |
||
020 | _z9780128013465 | ||
035 | _a(MiAaPQ)EBC2025499 | ||
035 | _a(Au-PeEL)EBL2025499 | ||
035 | _a(CaPaEBR)ebr11043524 | ||
035 | _a(CaONFJC)MIL769136 | ||
035 | _a(OCoLC)907466947 | ||
040 |
_aMiAaPQ _beng _erda _epn _cMiAaPQ _dMiAaPQ |
||
050 | 4 | _aBV900 -- .J46 2015eb | |
082 | 0 | _a201.7 | |
100 | 1 | _aMcLamb, Jennie-Leigh. | |
245 | 1 | 0 | _aKeeping Religious Institutions Secure. |
250 | _a1st ed. | ||
264 | 1 |
_aSan Diego : _bElsevier Science & Technology, _c2015. |
|
264 | 4 | _c©2015. | |
300 | _a1 online resource (217 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
505 | 0 | _aFront Cover -- Keeping Religious Institutions Secure -- Copyright -- Contents -- About the Authors -- Preface -- Acknowledgments -- 1 - Introduction -- Incidents in the United States -- Incidents Outside the United States -- Safety versus Security -- Purpose and Scope of this Book -- Organization of this Book -- Considerations -- End Notes -- Chapter 2 - Examining Typical Crimes -- General Crime Information -- Financial Crimes -- Crimes against Property -- Crimes against Persons -- Hate Crimes -- Final Thoughts -- End Notes -- 3 - Understanding Basic Security Principles -- General Concepts -- Disaster/Crisis/Incident Management Cycle -- Physical Security -- Electronic Security -- Environmental Security -- Operational Security -- Information Security -- Final Thoughts -- End Notes -- 4 - Evaluating Risk -- Risk -- Risk Assessment -- Security Survey -- Cost-Benefit Analysis -- Putting It All Together -- Final Thoughts -- End Notes -- 5 - Choosing Physical and Electronic Security Countermeasures -- Security System Functions -- Designing and Implementing a Physical Protection System -- Improving an Existing PPS -- Systems Integration -- Performance Measures for PPS Functions -- Building Your Facility -- Final Thoughts -- End Notes -- 6 - Utilizing the Total Environment -- Benefits of CPTED -- What is CPTED? -- Behavior Management -- Space Assessment 3-D Approach -- Putting CPTED Principles to Work -- Final Thoughts -- End Notes -- 7 - Developing Policies and Procedures -- Topics for Policies and Procedures -- Emergency Plans for Security Incidents -- Recovery Plans -- Information Security Policies -- Issue-Specific Security Policies -- Policy Distribution -- Final Thoughts -- End Notes -- 8 - Identifying and Handling At-Risk People -- Threat Assessment -- Signs of a Person Being Under the Influence of Chemical Substances19 -- Mental Illness. | |
505 | 8 | _aSuspicious Behaviors Indicating Criminal Activity -- Early Warning Signs of Potential Workplace Violence -- Warning Signs of Potential/Impending Violence -- Domestic Violence -- Meeting with a Potentially Violent Person -- Confrontation Management and De-Escalation Techniques -- Final Thoughts -- End Notes -- 9 - Reacting to an Event in Progress -- Declaring a Crisis -- Bomb Threats -- Other Threats -- Suspicious Mail or Packages -- Suspicious Items -- Potential Attacker -- Managing Anxiety -- Managing Verbal Aggression -- Physical Intervention -- Final Thoughts -- End Notes -- 10 - Responding to an Active Shooter -- Factors that Affect Decision-Making -- Preparation -- Run -- Hide -- Intervene -- What to Do when Law Enforcement Arrives -- Final Thoughts -- End Notes -- 11 - Recovering from an Incident -- Immediate Aftermath -- Short Term -- Long Term -- Summary -- End Notes -- 12 - Handling the Media -- Introduction -- Media Liaison -- Other Considerations -- Final Thoughts -- End Notes -- 13 - Recognizing Intangible Capital and Liability Concerns -- Intangible Assets -- Intangible Capital -- Protecting Your Facility's Reputation -- Liability Concerns -- Final Thoughts -- End Notes -- 14 - Increasing Security Awareness -- Factors that Negatively Affect Awareness -- Security Awareness Program -- Final Thoughts -- End Notes -- 15 - Implementing and Training -- Implementing a Security Program -- Training -- Final Thoughts -- End Notes -- 16 - Keeping the Principal Safe -- Deciding If You Need Executive Protection -- Threat Identification -- 24-Hour Protection -- Residential Protection -- Facility Protection -- Protection When You Travel -- Protection for Your Family -- Personal Protection Detail -- 17 - Assessing the Need for Less Lethal Tools and Firearms -- Use of Force Continuum -- Training -- Budget -- Less Lethal Tools/Weapons -- Firearms. | |
505 | 8 | _aConsiderations -- Final Thoughts -- 18 - Establishing Security Partnerships -- Within the Organization -- Outside the Organization -- Community -- Other Religious Institutions -- How to Establish Partnerships -- End Notes -- 19 - Protecting Children and Youth -- General Procedures -- Principles of Safety -- Abuse and Neglect -- Reducing the Likelihood of Victimization -- Standards of Conduct for Staff and Volunteers -- Prevention Strategies -- Final Thoughts -- End Notes -- 20 - Conclusion and Summary -- Index. | |
588 | _aDescription based on publisher supplied metadata and other sources. | ||
590 | _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. | ||
650 | 0 | _aReligious institutions -- Safety measures. | |
650 | 0 | _aReligious institutions -- Security measures. | |
650 | 0 | _aCrime -- Religious aspects. | |
655 | 4 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _aMcLamb, Jennie-Leigh _tKeeping Religious Institutions Secure _dSan Diego : Elsevier Science & Technology,c2015 _z9780128013465 |
797 | 2 | _aProQuest (Firm) | |
856 | 4 | 0 |
_uhttps://ebookcentral.proquest.com/lib/orpp/detail.action?docID=2025499 _zClick to View |
999 |
_c49603 _d49603 |