000 06057nam a22004813i 4500
001 EBC2025499
003 MiAaPQ
005 20240729123541.0
006 m o d |
007 cr cnu||||||||
008 240724s2015 xx o ||||0 eng d
020 _a9780128014882
_q(electronic bk.)
020 _z9780128013465
035 _a(MiAaPQ)EBC2025499
035 _a(Au-PeEL)EBL2025499
035 _a(CaPaEBR)ebr11043524
035 _a(CaONFJC)MIL769136
035 _a(OCoLC)907466947
040 _aMiAaPQ
_beng
_erda
_epn
_cMiAaPQ
_dMiAaPQ
050 4 _aBV900 -- .J46 2015eb
082 0 _a201.7
100 1 _aMcLamb, Jennie-Leigh.
245 1 0 _aKeeping Religious Institutions Secure.
250 _a1st ed.
264 1 _aSan Diego :
_bElsevier Science & Technology,
_c2015.
264 4 _c©2015.
300 _a1 online resource (217 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aFront Cover -- Keeping Religious Institutions Secure -- Copyright -- Contents -- About the Authors -- Preface -- Acknowledgments -- 1 - Introduction -- Incidents in the United States -- Incidents Outside the United States -- Safety versus Security -- Purpose and Scope of this Book -- Organization of this Book -- Considerations -- End Notes -- Chapter 2 - Examining Typical Crimes -- General Crime Information -- Financial Crimes -- Crimes against Property -- Crimes against Persons -- Hate Crimes -- Final Thoughts -- End Notes -- 3 - Understanding Basic Security Principles -- General Concepts -- Disaster/Crisis/Incident Management Cycle -- Physical Security -- Electronic Security -- Environmental Security -- Operational Security -- Information Security -- Final Thoughts -- End Notes -- 4 - Evaluating Risk -- Risk -- Risk Assessment -- Security Survey -- Cost-Benefit Analysis -- Putting It All Together -- Final Thoughts -- End Notes -- 5 - Choosing Physical and Electronic Security Countermeasures -- Security System Functions -- Designing and Implementing a Physical Protection System -- Improving an Existing PPS -- Systems Integration -- Performance Measures for PPS Functions -- Building Your Facility -- Final Thoughts -- End Notes -- 6 - Utilizing the Total Environment -- Benefits of CPTED -- What is CPTED? -- Behavior Management -- Space Assessment 3-D Approach -- Putting CPTED Principles to Work -- Final Thoughts -- End Notes -- 7 - Developing Policies and Procedures -- Topics for Policies and Procedures -- Emergency Plans for Security Incidents -- Recovery Plans -- Information Security Policies -- Issue-Specific Security Policies -- Policy Distribution -- Final Thoughts -- End Notes -- 8 - Identifying and Handling At-Risk People -- Threat Assessment -- Signs of a Person Being Under the Influence of Chemical Substances19 -- Mental Illness.
505 8 _aSuspicious Behaviors Indicating Criminal Activity -- Early Warning Signs of Potential Workplace Violence -- Warning Signs of Potential/Impending Violence -- Domestic Violence -- Meeting with a Potentially Violent Person -- Confrontation Management and De-Escalation Techniques -- Final Thoughts -- End Notes -- 9 - Reacting to an Event in Progress -- Declaring a Crisis -- Bomb Threats -- Other Threats -- Suspicious Mail or Packages -- Suspicious Items -- Potential Attacker -- Managing Anxiety -- Managing Verbal Aggression -- Physical Intervention -- Final Thoughts -- End Notes -- 10 - Responding to an Active Shooter -- Factors that Affect Decision-Making -- Preparation -- Run -- Hide -- Intervene -- What to Do when Law Enforcement Arrives -- Final Thoughts -- End Notes -- 11 - Recovering from an Incident -- Immediate Aftermath -- Short Term -- Long Term -- Summary -- End Notes -- 12 - Handling the Media -- Introduction -- Media Liaison -- Other Considerations -- Final Thoughts -- End Notes -- 13 - Recognizing Intangible Capital and Liability Concerns -- Intangible Assets -- Intangible Capital -- Protecting Your Facility's Reputation -- Liability Concerns -- Final Thoughts -- End Notes -- 14 - Increasing Security Awareness -- Factors that Negatively Affect Awareness -- Security Awareness Program -- Final Thoughts -- End Notes -- 15 - Implementing and Training -- Implementing a Security Program -- Training -- Final Thoughts -- End Notes -- 16 - Keeping the Principal Safe -- Deciding If You Need Executive Protection -- Threat Identification -- 24-Hour Protection -- Residential Protection -- Facility Protection -- Protection When You Travel -- Protection for Your Family -- Personal Protection Detail -- 17 - Assessing the Need for Less Lethal Tools and Firearms -- Use of Force Continuum -- Training -- Budget -- Less Lethal Tools/Weapons -- Firearms.
505 8 _aConsiderations -- Final Thoughts -- 18 - Establishing Security Partnerships -- Within the Organization -- Outside the Organization -- Community -- Other Religious Institutions -- How to Establish Partnerships -- End Notes -- 19 - Protecting Children and Youth -- General Procedures -- Principles of Safety -- Abuse and Neglect -- Reducing the Likelihood of Victimization -- Standards of Conduct for Staff and Volunteers -- Prevention Strategies -- Final Thoughts -- End Notes -- 20 - Conclusion and Summary -- Index.
588 _aDescription based on publisher supplied metadata and other sources.
590 _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 0 _aReligious institutions -- Safety measures.
650 0 _aReligious institutions -- Security measures.
650 0 _aCrime -- Religious aspects.
655 4 _aElectronic books.
776 0 8 _iPrint version:
_aMcLamb, Jennie-Leigh
_tKeeping Religious Institutions Secure
_dSan Diego : Elsevier Science & Technology,c2015
_z9780128013465
797 2 _aProQuest (Firm)
856 4 0 _uhttps://ebookcentral.proquest.com/lib/orpp/detail.action?docID=2025499
_zClick to View
999 _c49603
_d49603