SlideShare a Scribd company logo
1 of 15
Download to read offline
11/18/2013

Current and Emerging Trends in the
Private Security Industry: The need for
Continuing Education and Training of
the Security Professional

Carter F. Smith, JD, PhD
carterfsmith@gmail.com 615-656-3505
http://www.linkedin.com/in/carterfsmith
http://apsu.academia.edu/CarterSmith/Papers

What trends
are important
to you?
2

1
11/18/2013

Overview
• History
• Challenges
• Perceptions
• Professionalization
• Education (or not)
• Future

History

• Through WW II, private security seen as
unsavory, ill-trained thugs hired to break strikes,
suppress labor, and spy on one another.
• Police viewed private security companies as
dangerous and unauthorized intrusion into
government role.
• Following WW II, more tolerant attitude
developed
– private security more often seen as necessary
supplement to overburdened public police. 4

2
11/18/2013

History
• Late 1960s -- early 1970s - security burden
was shifted (back) to private sector.
• Public law-enforcement grew 42 percent.
• Security Guard employment grew 6 percent.
• Investigative employment grew 19 percent.
• Contract security almost doubled.
• Population grew only 12 percent.
5

(recent) History
• Mid 1970s, crime rates rose.
– Before end of 1976 1 of 4 Americans was victim
• Americans were paying more for private security
services than federal, state, and local governments
paid for criminal justice system.
• Security field has received increased attention in the
past decade or so since the events 9 / 11
• Some Communities have recently received attention
for augmenting their public security with private
– necessary supplement to overburdened public
police . . .
6

3
11/18/2013

It’s important for you because
• Private security has long eclipsed
public security (police) as the
primary resource for individual and
property protection, with over 1
million people employed
–Bureau of Labor Statistics, 2012
7

Challenges
• Entry-level security professionals
– Receive lower pay
– Required to have only high school diploma

• As field increases, so will ranks of
supervisors.
– pay commensurate with their experience
and education
8

4
11/18/2013

Challenges
•What do you see?

9

Perceptions
• Respondents were students in
three offerings of an upperdivision course in criminal justice
entitled Security Administration
at a large, public university in
southeast U.S.
10

5
11/18/2013

11

Perceptions

• Non-CJ majors and CJ minors agreed more strongly
than CJ majors that
– course increased respect for security field
– course was more interesting than others

• Female participants agreed more strongly than
males that respect for security field increased.
• Participants with no prior interest in CJ agreed
more that knowledge of private security had
increased.
12

6
11/18/2013

Perceptions
If you have not considered working
in the security field . . . Why?
• When I heard the
• I already have a job
word security, I
in Law Enforcement
always thought of a
lined up.
mall cop.
• My goal has been
• I would like to work
Federal Law
as a Lawyer instead.
Enforcement.
13

Perceptions

• Security officers aren’t as powerful as police officers.
• I want to have more control, action and responsibility.
• I wouldn’t be opposed to it in some business aspect such
as management or marketing.
• My career goal was always on the more pro-active side of
law enforcement.
• I always thought that security guards had to be buff guys
who are able to be complete assholes to people.
• I don’t know if I am physically fit enough to respond
necessarily to a situation.
14

7
11/18/2013

Perceptions

• Security officers aren’t as powerful as police officers.
• I want to have more control, action and responsibility.
• I wouldn’t be opposed to it in some business aspect such
as management or marketing.
• My career goal was always on the more pro-active side of
law enforcement.
• I always thought that security guards had to be buff guys
who are able to be complete assholes to people.
• I don’t know if I am physically fit enough to respond
necessarily to a situation.
15

It’s important for you because

• Respondents may be your future
clients, colleagues, or
competitors.
• Responses may be indicative of
community perceptions.
16

8
11/18/2013

•
•
•
•
•
•
•
•

Professionalization
Skills flow from body of theory.
Common body of knowledge, freely communicated.
Unique service based on learned techniques.
Extensive training, minimum qualifications, licensing
certification.
Code of ethics guiding client relations and contact with
others.
Emphasis on service to mankind rather than individual gain.
A professional organization which establishes policy, regulates
actions, and exercises responsibility.
Requires advanced training, mental rather than manual work.
17

Professionalization - four criteria:
• Qualification - establish, promote, and enforce
unambiguous qualification criteria.
• Academic studies -- achieve widespread academic
acceptance and promotion of advanced security-related
studies.
• Business skills -- managers must develop business-related
skills so they can earn respect within the corporation.
• Corporate Recognition -- managers must be able to get
security's message across to develop an understanding
and appreciation of security in executive boardrooms.
18

9
11/18/2013

Professionalization
• Public's perception is what matters
–attitude of society as a whole
–general opinion of corporate
leadership.

• Consumers decide when security has
become a profession.
19

It’s important for you because
• Determination of professionalism based on
experience with professionals.
• Criteria set clear guidelines, but gauge is
public and client perception.
• Knowing how to be perceived as
professional is only part of it.
• Critical that all members of the profession
contribute to advancement and regard in
community.
20

10
11/18/2013

Education
13 identified security knowledge categories
in academic security realm, including:
• Criminology
• Business contingency
management
• Facility management
• Fire and life safety
• Industrial security
• Information and
computer security

•
•
•
•

Investigations
Physical security
Security Principles
Security risk
management
• Security law
• Security management
• Security technology
21

Education (acceptance)

• Progress achieving widespread academic acceptance
due to involvement by professional organizations.
• ASIS International collaborates with faculty and security
directors to identify security education needs.
• CJ departments have added security courses
– many schools have their own security departments

• Yet to be corresponding substantive response from
business schools to incorporate security curriculum.
– Similarity to public security and law enforcement allows for its
incorporation into most criminal justice programs if not its
own department.

22

11
11/18/2013

Education

2012 security concerns of Fortune 1000 companies
1. Cyber and Communications Security
2. Workplace Violence
3. Business Continuity Planning
4. Employee Selection/Screening
5. Property Crime moved
6. General Employee Theft
7. Crisis Management and Response
8. Unethical Business Conduct
9. Litigation
23
10. Identity Theft

It’s important for you because
• Changes in focus to higher-tech
workplace and advanced criminal
methods require innovation and critical
thinking skills.
• Higher education is necessity for
advancement with security technology
and leadership demands on today’s
security professionals.
24

12
11/18/2013

Future

• increased threat from social media,
especially social engineering
• more challenges with background
checks to weed out problems
• increased need for education
• training sessions on professionalism for
younger/newer hires
25

Future
• even more going mobile, challenges both
physical and digital
• tech and networked devices plus crowdsourced attacks -- physical and digital
• security for hire? a-la-carte security
services? free-lance security solutions?
• decreased government spending in criminal
justice sector
26

13
11/18/2013

Future
• Crisis and Emergency Management.
–from forces of nature or human action
or inaction.
–increasingly responsibility of security
professional
–requires coordination with different
set of agencies and providers
27

Recommendations
• Implement guerilla, all-hands
marketing strategy
• Engage in CJ and other curriculum
development
• Offer to visit courses and events
• Offer internships
• Sponsor academic competitions
28

14
11/18/2013

References
• Smith, C.F. and Choo, T. (2013).
Revisiting Security Administration in
the classroom: A decade later.
Security Journal. (25 March 2013;
doi: 10.1057/sj.2013.7).
• Smith, C.F. et al. Security Today.
(textbook – forthcoming)
29

Current and Emerging Trends in the
Private Security Industry: The need for
Continuing Education and Training of
the Security Professional

Carter F. Smith, JD, PhD
carterfsmith@gmail.com 615-656-3505
http://www.linkedin.com/in/carterfsmith
http://apsu.academia.edu/CarterSmith/Papers

15

More Related Content

Viewers also liked

Chapter 16 Lymphatic System and Immunity
Chapter 16   Lymphatic System and ImmunityChapter 16   Lymphatic System and Immunity
Chapter 16 Lymphatic System and Immunity1957Hamlet
 
Supply chain management of mcdonalds
Supply chain management of mcdonaldsSupply chain management of mcdonalds
Supply chain management of mcdonaldsDarshan Bairi
 
UX STRAT 2013: Ronnie Battista, 10 Commandments of UX Strategy
UX STRAT 2013: Ronnie Battista, 10 Commandments of UX StrategyUX STRAT 2013: Ronnie Battista, 10 Commandments of UX Strategy
UX STRAT 2013: Ronnie Battista, 10 Commandments of UX StrategyUX STRAT
 

Viewers also liked (6)

Market Forces in NHS
Market Forces in NHSMarket Forces in NHS
Market Forces in NHS
 
Enzymes
Enzymes Enzymes
Enzymes
 
Estabilidad de medicamentos 2012
Estabilidad de medicamentos 2012Estabilidad de medicamentos 2012
Estabilidad de medicamentos 2012
 
Chapter 16 Lymphatic System and Immunity
Chapter 16   Lymphatic System and ImmunityChapter 16   Lymphatic System and Immunity
Chapter 16 Lymphatic System and Immunity
 
Supply chain management of mcdonalds
Supply chain management of mcdonaldsSupply chain management of mcdonalds
Supply chain management of mcdonalds
 
UX STRAT 2013: Ronnie Battista, 10 Commandments of UX Strategy
UX STRAT 2013: Ronnie Battista, 10 Commandments of UX StrategyUX STRAT 2013: Ronnie Battista, 10 Commandments of UX Strategy
UX STRAT 2013: Ronnie Battista, 10 Commandments of UX Strategy
 

Similar to Current and emerging trends in the private security industry and the need for continuing education and training of the security professional.

Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Mourad Khalil
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Risky Business: The Whys and Hows of Effective Reputational Risk Management
Risky Business: The Whys and Hows of Effective Reputational Risk ManagementRisky Business: The Whys and Hows of Effective Reputational Risk Management
Risky Business: The Whys and Hows of Effective Reputational Risk ManagementCharlie Pownall
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorSandra (Sandy) Dunn
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouDenim Group
 
Common and Concerning Risks In IT
Common and Concerning Risks In ITCommon and Concerning Risks In IT
Common and Concerning Risks In ITpbhugenberg3
 
Towards a code of ethics for gamification at enterprise
Towards a code of ethics for gamification at enterpriseTowards a code of ethics for gamification at enterprise
Towards a code of ethics for gamification at enterpriseAlimohammad Shahri
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generationIBM Security
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureCraig McGill
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Share with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxShare with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxbagotjesusa
 
Security administration in the classroom more challenging when it’s not as ...
Security administration in the classroom   more challenging when it’s not as ...Security administration in the classroom   more challenging when it’s not as ...
Security administration in the classroom more challenging when it’s not as ...Carter F. Smith, J.D., Ph.D.
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
Ofsted Report July 2016 - Implementing Prevent
 Ofsted Report July 2016 - Implementing Prevent Ofsted Report July 2016 - Implementing Prevent
Ofsted Report July 2016 - Implementing PreventThe Pathway Group
 

Similar to Current and emerging trends in the private security industry and the need for continuing education and training of the security professional. (20)

Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Risky Business: The Whys and Hows of Effective Reputational Risk Management
Risky Business: The Whys and Hows of Effective Reputational Risk ManagementRisky Business: The Whys and Hows of Effective Reputational Risk Management
Risky Business: The Whys and Hows of Effective Reputational Risk Management
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
Common and Concerning Risks In IT
Common and Concerning Risks In ITCommon and Concerning Risks In IT
Common and Concerning Risks In IT
 
Towards a code of ethics for gamification at enterprise
Towards a code of ethics for gamification at enterpriseTowards a code of ethics for gamification at enterprise
Towards a code of ethics for gamification at enterprise
 
Towards a code of ethics for gamification at enterprise po em
Towards a code of ethics for gamification at enterprise po emTowards a code of ethics for gamification at enterprise po em
Towards a code of ethics for gamification at enterprise po em
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generation
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Training People and Rising Awareness
Training People and Rising AwarenessTraining People and Rising Awareness
Training People and Rising Awareness
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Share with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxShare with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docx
 
Security administration in the classroom more challenging when it’s not as ...
Security administration in the classroom   more challenging when it’s not as ...Security administration in the classroom   more challenging when it’s not as ...
Security administration in the classroom more challenging when it’s not as ...
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Ofsted Report July 2016 - Implementing Prevent
 Ofsted Report July 2016 - Implementing Prevent Ofsted Report July 2016 - Implementing Prevent
Ofsted Report July 2016 - Implementing Prevent
 

More from Carter F. Smith, J.D., Ph.D.

Street gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaperStreet gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaperCarter F. Smith, J.D., Ph.D.
 
Military trained gang members in the volunteer state- four year follow-up wi...
Military trained gang members in the volunteer state-  four year follow-up wi...Military trained gang members in the volunteer state-  four year follow-up wi...
Military trained gang members in the volunteer state- four year follow-up wi...Carter F. Smith, J.D., Ph.D.
 
Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Carter F. Smith, J.D., Ph.D.
 
Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!Carter F. Smith, J.D., Ph.D.
 
Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...Carter F. Smith, J.D., Ph.D.
 
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...Carter F. Smith, J.D., Ph.D.
 

More from Carter F. Smith, J.D., Ph.D. (20)

APA Manual 7th Edition - prerelease essentials
APA Manual 7th Edition -  prerelease essentialsAPA Manual 7th Edition -  prerelease essentials
APA Manual 7th Edition - prerelease essentials
 
The Hounds
The HoundsThe Hounds
The Hounds
 
Street gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaperStreet gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaper
 
Military trained gang members in the volunteer state- four year follow-up wi...
Military trained gang members in the volunteer state-  four year follow-up wi...Military trained gang members in the volunteer state-  four year follow-up wi...
Military trained gang members in the volunteer state- four year follow-up wi...
 
Success tips for (my) classes
Success tips for (my) classesSuccess tips for (my) classes
Success tips for (my) classes
 
James Earl Hitchcox
James Earl HitchcoxJames Earl Hitchcox
James Earl Hitchcox
 
Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...
 
Gangcoptechspeak
GangcoptechspeakGangcoptechspeak
Gangcoptechspeak
 
Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!
 
Domestic Terrorism in the Next Eleven
Domestic Terrorism in the Next ElevenDomestic Terrorism in the Next Eleven
Domestic Terrorism in the Next Eleven
 
12 steps to_id-dt
12 steps to_id-dt12 steps to_id-dt
12 steps to_id-dt
 
I gangs hi tech gang communication-handout
I gangs hi tech gang communication-handoutI gangs hi tech gang communication-handout
I gangs hi tech gang communication-handout
 
Gangs and the military
Gangs and the military Gangs and the military
Gangs and the military
 
All grown up handouts
All grown up   handoutsAll grown up   handouts
All grown up handouts
 
Public service announcement
Public service announcementPublic service announcement
Public service announcement
 
Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...
 
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
 
Gang terroroc scja2011
Gang terroroc scja2011Gang terroroc scja2011
Gang terroroc scja2011
 
Flash gangs scja2011
Flash gangs scja2011Flash gangs scja2011
Flash gangs scja2011
 
Gangs+college
Gangs+collegeGangs+college
Gangs+college
 

Recently uploaded

Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 

Recently uploaded (20)

Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 

Current and emerging trends in the private security industry and the need for continuing education and training of the security professional.

  • 1. 11/18/2013 Current and Emerging Trends in the Private Security Industry: The need for Continuing Education and Training of the Security Professional Carter F. Smith, JD, PhD carterfsmith@gmail.com 615-656-3505 http://www.linkedin.com/in/carterfsmith http://apsu.academia.edu/CarterSmith/Papers What trends are important to you? 2 1
  • 2. 11/18/2013 Overview • History • Challenges • Perceptions • Professionalization • Education (or not) • Future History • Through WW II, private security seen as unsavory, ill-trained thugs hired to break strikes, suppress labor, and spy on one another. • Police viewed private security companies as dangerous and unauthorized intrusion into government role. • Following WW II, more tolerant attitude developed – private security more often seen as necessary supplement to overburdened public police. 4 2
  • 3. 11/18/2013 History • Late 1960s -- early 1970s - security burden was shifted (back) to private sector. • Public law-enforcement grew 42 percent. • Security Guard employment grew 6 percent. • Investigative employment grew 19 percent. • Contract security almost doubled. • Population grew only 12 percent. 5 (recent) History • Mid 1970s, crime rates rose. – Before end of 1976 1 of 4 Americans was victim • Americans were paying more for private security services than federal, state, and local governments paid for criminal justice system. • Security field has received increased attention in the past decade or so since the events 9 / 11 • Some Communities have recently received attention for augmenting their public security with private – necessary supplement to overburdened public police . . . 6 3
  • 4. 11/18/2013 It’s important for you because • Private security has long eclipsed public security (police) as the primary resource for individual and property protection, with over 1 million people employed –Bureau of Labor Statistics, 2012 7 Challenges • Entry-level security professionals – Receive lower pay – Required to have only high school diploma • As field increases, so will ranks of supervisors. – pay commensurate with their experience and education 8 4
  • 5. 11/18/2013 Challenges •What do you see? 9 Perceptions • Respondents were students in three offerings of an upperdivision course in criminal justice entitled Security Administration at a large, public university in southeast U.S. 10 5
  • 6. 11/18/2013 11 Perceptions • Non-CJ majors and CJ minors agreed more strongly than CJ majors that – course increased respect for security field – course was more interesting than others • Female participants agreed more strongly than males that respect for security field increased. • Participants with no prior interest in CJ agreed more that knowledge of private security had increased. 12 6
  • 7. 11/18/2013 Perceptions If you have not considered working in the security field . . . Why? • When I heard the • I already have a job word security, I in Law Enforcement always thought of a lined up. mall cop. • My goal has been • I would like to work Federal Law as a Lawyer instead. Enforcement. 13 Perceptions • Security officers aren’t as powerful as police officers. • I want to have more control, action and responsibility. • I wouldn’t be opposed to it in some business aspect such as management or marketing. • My career goal was always on the more pro-active side of law enforcement. • I always thought that security guards had to be buff guys who are able to be complete assholes to people. • I don’t know if I am physically fit enough to respond necessarily to a situation. 14 7
  • 8. 11/18/2013 Perceptions • Security officers aren’t as powerful as police officers. • I want to have more control, action and responsibility. • I wouldn’t be opposed to it in some business aspect such as management or marketing. • My career goal was always on the more pro-active side of law enforcement. • I always thought that security guards had to be buff guys who are able to be complete assholes to people. • I don’t know if I am physically fit enough to respond necessarily to a situation. 15 It’s important for you because • Respondents may be your future clients, colleagues, or competitors. • Responses may be indicative of community perceptions. 16 8
  • 9. 11/18/2013 • • • • • • • • Professionalization Skills flow from body of theory. Common body of knowledge, freely communicated. Unique service based on learned techniques. Extensive training, minimum qualifications, licensing certification. Code of ethics guiding client relations and contact with others. Emphasis on service to mankind rather than individual gain. A professional organization which establishes policy, regulates actions, and exercises responsibility. Requires advanced training, mental rather than manual work. 17 Professionalization - four criteria: • Qualification - establish, promote, and enforce unambiguous qualification criteria. • Academic studies -- achieve widespread academic acceptance and promotion of advanced security-related studies. • Business skills -- managers must develop business-related skills so they can earn respect within the corporation. • Corporate Recognition -- managers must be able to get security's message across to develop an understanding and appreciation of security in executive boardrooms. 18 9
  • 10. 11/18/2013 Professionalization • Public's perception is what matters –attitude of society as a whole –general opinion of corporate leadership. • Consumers decide when security has become a profession. 19 It’s important for you because • Determination of professionalism based on experience with professionals. • Criteria set clear guidelines, but gauge is public and client perception. • Knowing how to be perceived as professional is only part of it. • Critical that all members of the profession contribute to advancement and regard in community. 20 10
  • 11. 11/18/2013 Education 13 identified security knowledge categories in academic security realm, including: • Criminology • Business contingency management • Facility management • Fire and life safety • Industrial security • Information and computer security • • • • Investigations Physical security Security Principles Security risk management • Security law • Security management • Security technology 21 Education (acceptance) • Progress achieving widespread academic acceptance due to involvement by professional organizations. • ASIS International collaborates with faculty and security directors to identify security education needs. • CJ departments have added security courses – many schools have their own security departments • Yet to be corresponding substantive response from business schools to incorporate security curriculum. – Similarity to public security and law enforcement allows for its incorporation into most criminal justice programs if not its own department. 22 11
  • 12. 11/18/2013 Education 2012 security concerns of Fortune 1000 companies 1. Cyber and Communications Security 2. Workplace Violence 3. Business Continuity Planning 4. Employee Selection/Screening 5. Property Crime moved 6. General Employee Theft 7. Crisis Management and Response 8. Unethical Business Conduct 9. Litigation 23 10. Identity Theft It’s important for you because • Changes in focus to higher-tech workplace and advanced criminal methods require innovation and critical thinking skills. • Higher education is necessity for advancement with security technology and leadership demands on today’s security professionals. 24 12
  • 13. 11/18/2013 Future • increased threat from social media, especially social engineering • more challenges with background checks to weed out problems • increased need for education • training sessions on professionalism for younger/newer hires 25 Future • even more going mobile, challenges both physical and digital • tech and networked devices plus crowdsourced attacks -- physical and digital • security for hire? a-la-carte security services? free-lance security solutions? • decreased government spending in criminal justice sector 26 13
  • 14. 11/18/2013 Future • Crisis and Emergency Management. –from forces of nature or human action or inaction. –increasingly responsibility of security professional –requires coordination with different set of agencies and providers 27 Recommendations • Implement guerilla, all-hands marketing strategy • Engage in CJ and other curriculum development • Offer to visit courses and events • Offer internships • Sponsor academic competitions 28 14
  • 15. 11/18/2013 References • Smith, C.F. and Choo, T. (2013). Revisiting Security Administration in the classroom: A decade later. Security Journal. (25 March 2013; doi: 10.1057/sj.2013.7). • Smith, C.F. et al. Security Today. (textbook – forthcoming) 29 Current and Emerging Trends in the Private Security Industry: The need for Continuing Education and Training of the Security Professional Carter F. Smith, JD, PhD carterfsmith@gmail.com 615-656-3505 http://www.linkedin.com/in/carterfsmith http://apsu.academia.edu/CarterSmith/Papers 15