TITLE

The State of The Security Officer: 2008

AUTHOR(S)
McCourt, Mark
PUB. DATE
February 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Feb2008, Vol. 45 Issue 2, p10
SOURCE TYPE
Trade Publication
DOC. TYPE
Editorial
ABSTRACT
The author reflects the roles of the security officer for 2008 in the U.S. He said that visibility of security officers is increasing and important. He adds that although technology endow guards to be more productive, the physical presence of guards are important to make certain of the safety of guests. Furthermore, he said that security officers also function as a greeter, as a guest service and customer service personnel, among others.
ACCESSION #
29418668

 

Related Articles

  • White Glove Security Enhances Bottom Line Real Estate Value. Daniels, Andrew // Security: Solutions for Enterprise Security Leaders;Mar2015, p36 

    The article focuses on a comprehensive physical security program needed by property managers at residential communities to maintain a safe and secure environment. According to Amazon's founder, Jeff Bezos, delivering a white glove customer service experience is the strategy of giving an...

  • Casino Security & Customer Service. Rodriguez, Anthony // Security: Solutions for Enterprise Security Leaders;Aug2015, Vol. 52 Issue 8, p26 

    The article focuses on customer service and casino security as the factors in patronizing casino gambling establishments. Topics include the role of security in customer service, the role and duties of a casino security officer, and the ways on how the security department excel in customer...

  • Security Profession's Premier Event Celebrates its Success and Looks to the Future.  // Government Security;Dec2006, Vol. 5 Issue 8, p22 

    The article discusses the ASIS International Seminar and Exhibits 2007, which will be held in Las Vegas, Nevada, on September 24-27, 2007. The events, which is the premier convention for security management professionals worldwide, will build upon the successful 2006 showing, which had...

  • Enterprise Risk Management as a Foundation. Brennan, Jerry; Mattice, Lynn // Security: Solutions for Enterprise Security Leaders;Mar2013, Vol. 50 Issue 3, p22 

    The article discusses the importance for business organization to utilize the principles of the enterprise risk management (ERM) as the foundation of their security programs. It explores the concept of the ERM and the significance of using its standards and methodologies as the foundation of a...

  • Making Access Complete, One Way or the Other. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Mar2013, Vol. 50 Issue 3, p48 

    The article discusses tips for security professionals on how to implement effective integrated access control solutions in their business organization in the U.S. It provides insights from several security officers regarding their initiative of developing security solutions, integrated with...

  • Turnstiles: Brawn, Brains or Both.  // Security: Solutions for Enterprise Security Leaders;Sep2007, Vol. 44 Issue 9, p67 

    The article focuses on the advantages of using turnstiles as part of security measures for firms. According to the article, using turnstiles to monitor pedestrian flow enables security personnel to devote their attention to suspicious behavior or packages that require closer inspection without...

  • Games to Play. Cunningham, Gary; Wallace, Mike // Security: Solutions for Enterprise Security Leaders;Aug2006, Vol. 43 Issue 8, p62 

    The article reports on training and education for security executives, supervisors and officers. The first step in the process is the mental evaluation, and preparing a summary of the security events experienced in the area. The next consideration is the evaluation of the things that can happen,...

  • The Human Factor. Scaglione, Ben // Security: Solutions for Enterprise Security Leaders;Dec2011, Vol. 48 Issue 12, p36 

    The article focuses on the vital role of access control screener in securing facilities, places and entities. However, finding the correct personnel to control access and check identification is enormous, and it presents various challenges. Thus, the employer must see to it that a screener must...

  • LETTERS TO THE EDITOR. Yarnell, Steve; McCrie, Robert // Security: Solutions for Enterprise Security Leaders;Feb2007, Vol. 44 Issue 2, p12 

    Several letters to the editor are presented in response to articles in the December 2006 issue including the Top 25 Executives in the Security Industry, and the 25 Most Influential Security Executives.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics