SlideShare a Scribd company logo
1 of 15
Download to read offline
11/18/2013

Current and Emerging Trends in the
Private Security Industry: The need for
Continuing Education and Training of
the Security Professional

Carter F. Smith, JD, PhD
carterfsmith@gmail.com 615-656-3505
http://www.linkedin.com/in/carterfsmith
http://apsu.academia.edu/CarterSmith/Papers

What trends
are important
to you?
2

1
11/18/2013

Overview
• History
• Challenges
• Perceptions
• Professionalization
• Education (or not)
• Future

History

• Through WW II, private security seen as
unsavory, ill-trained thugs hired to break strikes,
suppress labor, and spy on one another.
• Police viewed private security companies as
dangerous and unauthorized intrusion into
government role.
• Following WW II, more tolerant attitude
developed
– private security more often seen as necessary
supplement to overburdened public police. 4

2
11/18/2013

History
• Late 1960s -- early 1970s - security burden
was shifted (back) to private sector.
• Public law-enforcement grew 42 percent.
• Security Guard employment grew 6 percent.
• Investigative employment grew 19 percent.
• Contract security almost doubled.
• Population grew only 12 percent.
5

(recent) History
• Mid 1970s, crime rates rose.
– Before end of 1976 1 of 4 Americans was victim
• Americans were paying more for private security
services than federal, state, and local governments
paid for criminal justice system.
• Security field has received increased attention in the
past decade or so since the events 9 / 11
• Some Communities have recently received attention
for augmenting their public security with private
– necessary supplement to overburdened public
police . . .
6

3
11/18/2013

It’s important for you because
• Private security has long eclipsed
public security (police) as the
primary resource for individual and
property protection, with over 1
million people employed
–Bureau of Labor Statistics, 2012
7

Challenges
• Entry-level security professionals
– Receive lower pay
– Required to have only high school diploma

• As field increases, so will ranks of
supervisors.
– pay commensurate with their experience
and education
8

4
11/18/2013

Challenges
•What do you see?

9

Perceptions
• Respondents were students in
three offerings of an upperdivision course in criminal justice
entitled Security Administration
at a large, public university in
southeast U.S.
10

5
11/18/2013

11

Perceptions

• Non-CJ majors and CJ minors agreed more strongly
than CJ majors that
– course increased respect for security field
– course was more interesting than others

• Female participants agreed more strongly than
males that respect for security field increased.
• Participants with no prior interest in CJ agreed
more that knowledge of private security had
increased.
12

6
11/18/2013

Perceptions
If you have not considered working
in the security field . . . Why?
• When I heard the
• I already have a job
word security, I
in Law Enforcement
always thought of a
lined up.
mall cop.
• My goal has been
• I would like to work
Federal Law
as a Lawyer instead.
Enforcement.
13

Perceptions

• Security officers aren’t as powerful as police officers.
• I want to have more control, action and responsibility.
• I wouldn’t be opposed to it in some business aspect such
as management or marketing.
• My career goal was always on the more pro-active side of
law enforcement.
• I always thought that security guards had to be buff guys
who are able to be complete assholes to people.
• I don’t know if I am physically fit enough to respond
necessarily to a situation.
14

7
11/18/2013

Perceptions

• Security officers aren’t as powerful as police officers.
• I want to have more control, action and responsibility.
• I wouldn’t be opposed to it in some business aspect such
as management or marketing.
• My career goal was always on the more pro-active side of
law enforcement.
• I always thought that security guards had to be buff guys
who are able to be complete assholes to people.
• I don’t know if I am physically fit enough to respond
necessarily to a situation.
15

It’s important for you because

• Respondents may be your future
clients, colleagues, or
competitors.
• Responses may be indicative of
community perceptions.
16

8
11/18/2013

•
•
•
•
•
•
•
•

Professionalization
Skills flow from body of theory.
Common body of knowledge, freely communicated.
Unique service based on learned techniques.
Extensive training, minimum qualifications, licensing
certification.
Code of ethics guiding client relations and contact with
others.
Emphasis on service to mankind rather than individual gain.
A professional organization which establishes policy, regulates
actions, and exercises responsibility.
Requires advanced training, mental rather than manual work.
17

Professionalization - four criteria:
• Qualification - establish, promote, and enforce
unambiguous qualification criteria.
• Academic studies -- achieve widespread academic
acceptance and promotion of advanced security-related
studies.
• Business skills -- managers must develop business-related
skills so they can earn respect within the corporation.
• Corporate Recognition -- managers must be able to get
security's message across to develop an understanding
and appreciation of security in executive boardrooms.
18

9
11/18/2013

Professionalization
• Public's perception is what matters
–attitude of society as a whole
–general opinion of corporate
leadership.

• Consumers decide when security has
become a profession.
19

It’s important for you because
• Determination of professionalism based on
experience with professionals.
• Criteria set clear guidelines, but gauge is
public and client perception.
• Knowing how to be perceived as
professional is only part of it.
• Critical that all members of the profession
contribute to advancement and regard in
community.
20

10
11/18/2013

Education
13 identified security knowledge categories
in academic security realm, including:
• Criminology
• Business contingency
management
• Facility management
• Fire and life safety
• Industrial security
• Information and
computer security

•
•
•
•

Investigations
Physical security
Security Principles
Security risk
management
• Security law
• Security management
• Security technology
21

Education (acceptance)

• Progress achieving widespread academic acceptance
due to involvement by professional organizations.
• ASIS International collaborates with faculty and security
directors to identify security education needs.
• CJ departments have added security courses
– many schools have their own security departments

• Yet to be corresponding substantive response from
business schools to incorporate security curriculum.
– Similarity to public security and law enforcement allows for its
incorporation into most criminal justice programs if not its
own department.

22

11
11/18/2013

Education

2012 security concerns of Fortune 1000 companies
1. Cyber and Communications Security
2. Workplace Violence
3. Business Continuity Planning
4. Employee Selection/Screening
5. Property Crime moved
6. General Employee Theft
7. Crisis Management and Response
8. Unethical Business Conduct
9. Litigation
23
10. Identity Theft

It’s important for you because
• Changes in focus to higher-tech
workplace and advanced criminal
methods require innovation and critical
thinking skills.
• Higher education is necessity for
advancement with security technology
and leadership demands on today’s
security professionals.
24

12
11/18/2013

Future

• increased threat from social media,
especially social engineering
• more challenges with background
checks to weed out problems
• increased need for education
• training sessions on professionalism for
younger/newer hires
25

Future
• even more going mobile, challenges both
physical and digital
• tech and networked devices plus crowdsourced attacks -- physical and digital
• security for hire? a-la-carte security
services? free-lance security solutions?
• decreased government spending in criminal
justice sector
26

13
11/18/2013

Future
• Crisis and Emergency Management.
–from forces of nature or human action
or inaction.
–increasingly responsibility of security
professional
–requires coordination with different
set of agencies and providers
27

Recommendations
• Implement guerilla, all-hands
marketing strategy
• Engage in CJ and other curriculum
development
• Offer to visit courses and events
• Offer internships
• Sponsor academic competitions
28

14
11/18/2013

References
• Smith, C.F. and Choo, T. (2013).
Revisiting Security Administration in
the classroom: A decade later.
Security Journal. (25 March 2013;
doi: 10.1057/sj.2013.7).
• Smith, C.F. et al. Security Today.
(textbook – forthcoming)
29

Current and Emerging Trends in the
Private Security Industry: The need for
Continuing Education and Training of
the Security Professional

Carter F. Smith, JD, PhD
carterfsmith@gmail.com 615-656-3505
http://www.linkedin.com/in/carterfsmith
http://apsu.academia.edu/CarterSmith/Papers

15

More Related Content

Viewers also liked

Chapter 16 Lymphatic System and Immunity
Chapter 16   Lymphatic System and ImmunityChapter 16   Lymphatic System and Immunity
Chapter 16 Lymphatic System and Immunity1957Hamlet
 
Supply chain management of mcdonalds
Supply chain management of mcdonaldsSupply chain management of mcdonalds
Supply chain management of mcdonaldsDarshan Bairi
 
UX STRAT 2013: Ronnie Battista, 10 Commandments of UX Strategy
UX STRAT 2013: Ronnie Battista, 10 Commandments of UX StrategyUX STRAT 2013: Ronnie Battista, 10 Commandments of UX Strategy
UX STRAT 2013: Ronnie Battista, 10 Commandments of UX StrategyUX STRAT
 

Viewers also liked (6)

Market Forces in NHS
Market Forces in NHSMarket Forces in NHS
Market Forces in NHS
 
Enzymes
Enzymes Enzymes
Enzymes
 
Estabilidad de medicamentos 2012
Estabilidad de medicamentos 2012Estabilidad de medicamentos 2012
Estabilidad de medicamentos 2012
 
Chapter 16 Lymphatic System and Immunity
Chapter 16   Lymphatic System and ImmunityChapter 16   Lymphatic System and Immunity
Chapter 16 Lymphatic System and Immunity
 
Supply chain management of mcdonalds
Supply chain management of mcdonaldsSupply chain management of mcdonalds
Supply chain management of mcdonalds
 
UX STRAT 2013: Ronnie Battista, 10 Commandments of UX Strategy
UX STRAT 2013: Ronnie Battista, 10 Commandments of UX StrategyUX STRAT 2013: Ronnie Battista, 10 Commandments of UX Strategy
UX STRAT 2013: Ronnie Battista, 10 Commandments of UX Strategy
 

Similar to Current and emerging trends in the private security industry and the need for continuing education and training of the security professional.

Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Mourad Khalil
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Risky Business: The Whys and Hows of Effective Reputational Risk Management
Risky Business: The Whys and Hows of Effective Reputational Risk ManagementRisky Business: The Whys and Hows of Effective Reputational Risk Management
Risky Business: The Whys and Hows of Effective Reputational Risk ManagementCharlie Pownall
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorSandra (Sandy) Dunn
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouDenim Group
 
Common and Concerning Risks In IT
Common and Concerning Risks In ITCommon and Concerning Risks In IT
Common and Concerning Risks In ITpbhugenberg3
 
Towards a code of ethics for gamification at enterprise
Towards a code of ethics for gamification at enterpriseTowards a code of ethics for gamification at enterprise
Towards a code of ethics for gamification at enterpriseAlimohammad Shahri
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generationIBM Security
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureCraig McGill
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Share with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxShare with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxbagotjesusa
 
Security administration in the classroom more challenging when it’s not as ...
Security administration in the classroom   more challenging when it’s not as ...Security administration in the classroom   more challenging when it’s not as ...
Security administration in the classroom more challenging when it’s not as ...Carter F. Smith, J.D., Ph.D.
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
Ofsted Report July 2016 - Implementing Prevent
 Ofsted Report July 2016 - Implementing Prevent Ofsted Report July 2016 - Implementing Prevent
Ofsted Report July 2016 - Implementing PreventThe Pathway Group
 

Similar to Current and emerging trends in the private security industry and the need for continuing education and training of the security professional. (20)

Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Risky Business: The Whys and Hows of Effective Reputational Risk Management
Risky Business: The Whys and Hows of Effective Reputational Risk ManagementRisky Business: The Whys and Hows of Effective Reputational Risk Management
Risky Business: The Whys and Hows of Effective Reputational Risk Management
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
Common and Concerning Risks In IT
Common and Concerning Risks In ITCommon and Concerning Risks In IT
Common and Concerning Risks In IT
 
Towards a code of ethics for gamification at enterprise po em
Towards a code of ethics for gamification at enterprise po emTowards a code of ethics for gamification at enterprise po em
Towards a code of ethics for gamification at enterprise po em
 
Towards a code of ethics for gamification at enterprise
Towards a code of ethics for gamification at enterpriseTowards a code of ethics for gamification at enterprise
Towards a code of ethics for gamification at enterprise
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generation
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Training People and Rising Awareness
Training People and Rising AwarenessTraining People and Rising Awareness
Training People and Rising Awareness
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Share with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxShare with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docx
 
Security administration in the classroom more challenging when it’s not as ...
Security administration in the classroom   more challenging when it’s not as ...Security administration in the classroom   more challenging when it’s not as ...
Security administration in the classroom more challenging when it’s not as ...
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Ofsted Report July 2016 - Implementing Prevent
 Ofsted Report July 2016 - Implementing Prevent Ofsted Report July 2016 - Implementing Prevent
Ofsted Report July 2016 - Implementing Prevent
 

More from Carter F. Smith, J.D., Ph.D.

Street gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaperStreet gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaperCarter F. Smith, J.D., Ph.D.
 
Military trained gang members in the volunteer state- four year follow-up wi...
Military trained gang members in the volunteer state-  four year follow-up wi...Military trained gang members in the volunteer state-  four year follow-up wi...
Military trained gang members in the volunteer state- four year follow-up wi...Carter F. Smith, J.D., Ph.D.
 
Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Carter F. Smith, J.D., Ph.D.
 
Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!Carter F. Smith, J.D., Ph.D.
 
Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...Carter F. Smith, J.D., Ph.D.
 
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...Carter F. Smith, J.D., Ph.D.
 

More from Carter F. Smith, J.D., Ph.D. (20)

APA Manual 7th Edition - prerelease essentials
APA Manual 7th Edition -  prerelease essentialsAPA Manual 7th Edition -  prerelease essentials
APA Manual 7th Edition - prerelease essentials
 
The Hounds
The HoundsThe Hounds
The Hounds
 
Street gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaperStreet gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaper
 
Military trained gang members in the volunteer state- four year follow-up wi...
Military trained gang members in the volunteer state-  four year follow-up wi...Military trained gang members in the volunteer state-  four year follow-up wi...
Military trained gang members in the volunteer state- four year follow-up wi...
 
Success tips for (my) classes
Success tips for (my) classesSuccess tips for (my) classes
Success tips for (my) classes
 
James Earl Hitchcox
James Earl HitchcoxJames Earl Hitchcox
James Earl Hitchcox
 
Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...
 
Gangcoptechspeak
GangcoptechspeakGangcoptechspeak
Gangcoptechspeak
 
Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!
 
Domestic Terrorism in the Next Eleven
Domestic Terrorism in the Next ElevenDomestic Terrorism in the Next Eleven
Domestic Terrorism in the Next Eleven
 
12 steps to_id-dt
12 steps to_id-dt12 steps to_id-dt
12 steps to_id-dt
 
I gangs hi tech gang communication-handout
I gangs hi tech gang communication-handoutI gangs hi tech gang communication-handout
I gangs hi tech gang communication-handout
 
Gangs and the military
Gangs and the military Gangs and the military
Gangs and the military
 
All grown up handouts
All grown up   handoutsAll grown up   handouts
All grown up handouts
 
Public service announcement
Public service announcementPublic service announcement
Public service announcement
 
Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...
 
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
 
Gang terroroc scja2011
Gang terroroc scja2011Gang terroroc scja2011
Gang terroroc scja2011
 
Flash gangs scja2011
Flash gangs scja2011Flash gangs scja2011
Flash gangs scja2011
 
Gangs+college
Gangs+collegeGangs+college
Gangs+college
 

Recently uploaded

The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 

Recently uploaded (20)

The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 

Current and emerging trends in the private security industry and the need for continuing education and training of the security professional.

  • 1. 11/18/2013 Current and Emerging Trends in the Private Security Industry: The need for Continuing Education and Training of the Security Professional Carter F. Smith, JD, PhD carterfsmith@gmail.com 615-656-3505 http://www.linkedin.com/in/carterfsmith http://apsu.academia.edu/CarterSmith/Papers What trends are important to you? 2 1
  • 2. 11/18/2013 Overview • History • Challenges • Perceptions • Professionalization • Education (or not) • Future History • Through WW II, private security seen as unsavory, ill-trained thugs hired to break strikes, suppress labor, and spy on one another. • Police viewed private security companies as dangerous and unauthorized intrusion into government role. • Following WW II, more tolerant attitude developed – private security more often seen as necessary supplement to overburdened public police. 4 2
  • 3. 11/18/2013 History • Late 1960s -- early 1970s - security burden was shifted (back) to private sector. • Public law-enforcement grew 42 percent. • Security Guard employment grew 6 percent. • Investigative employment grew 19 percent. • Contract security almost doubled. • Population grew only 12 percent. 5 (recent) History • Mid 1970s, crime rates rose. – Before end of 1976 1 of 4 Americans was victim • Americans were paying more for private security services than federal, state, and local governments paid for criminal justice system. • Security field has received increased attention in the past decade or so since the events 9 / 11 • Some Communities have recently received attention for augmenting their public security with private – necessary supplement to overburdened public police . . . 6 3
  • 4. 11/18/2013 It’s important for you because • Private security has long eclipsed public security (police) as the primary resource for individual and property protection, with over 1 million people employed –Bureau of Labor Statistics, 2012 7 Challenges • Entry-level security professionals – Receive lower pay – Required to have only high school diploma • As field increases, so will ranks of supervisors. – pay commensurate with their experience and education 8 4
  • 5. 11/18/2013 Challenges •What do you see? 9 Perceptions • Respondents were students in three offerings of an upperdivision course in criminal justice entitled Security Administration at a large, public university in southeast U.S. 10 5
  • 6. 11/18/2013 11 Perceptions • Non-CJ majors and CJ minors agreed more strongly than CJ majors that – course increased respect for security field – course was more interesting than others • Female participants agreed more strongly than males that respect for security field increased. • Participants with no prior interest in CJ agreed more that knowledge of private security had increased. 12 6
  • 7. 11/18/2013 Perceptions If you have not considered working in the security field . . . Why? • When I heard the • I already have a job word security, I in Law Enforcement always thought of a lined up. mall cop. • My goal has been • I would like to work Federal Law as a Lawyer instead. Enforcement. 13 Perceptions • Security officers aren’t as powerful as police officers. • I want to have more control, action and responsibility. • I wouldn’t be opposed to it in some business aspect such as management or marketing. • My career goal was always on the more pro-active side of law enforcement. • I always thought that security guards had to be buff guys who are able to be complete assholes to people. • I don’t know if I am physically fit enough to respond necessarily to a situation. 14 7
  • 8. 11/18/2013 Perceptions • Security officers aren’t as powerful as police officers. • I want to have more control, action and responsibility. • I wouldn’t be opposed to it in some business aspect such as management or marketing. • My career goal was always on the more pro-active side of law enforcement. • I always thought that security guards had to be buff guys who are able to be complete assholes to people. • I don’t know if I am physically fit enough to respond necessarily to a situation. 15 It’s important for you because • Respondents may be your future clients, colleagues, or competitors. • Responses may be indicative of community perceptions. 16 8
  • 9. 11/18/2013 • • • • • • • • Professionalization Skills flow from body of theory. Common body of knowledge, freely communicated. Unique service based on learned techniques. Extensive training, minimum qualifications, licensing certification. Code of ethics guiding client relations and contact with others. Emphasis on service to mankind rather than individual gain. A professional organization which establishes policy, regulates actions, and exercises responsibility. Requires advanced training, mental rather than manual work. 17 Professionalization - four criteria: • Qualification - establish, promote, and enforce unambiguous qualification criteria. • Academic studies -- achieve widespread academic acceptance and promotion of advanced security-related studies. • Business skills -- managers must develop business-related skills so they can earn respect within the corporation. • Corporate Recognition -- managers must be able to get security's message across to develop an understanding and appreciation of security in executive boardrooms. 18 9
  • 10. 11/18/2013 Professionalization • Public's perception is what matters –attitude of society as a whole –general opinion of corporate leadership. • Consumers decide when security has become a profession. 19 It’s important for you because • Determination of professionalism based on experience with professionals. • Criteria set clear guidelines, but gauge is public and client perception. • Knowing how to be perceived as professional is only part of it. • Critical that all members of the profession contribute to advancement and regard in community. 20 10
  • 11. 11/18/2013 Education 13 identified security knowledge categories in academic security realm, including: • Criminology • Business contingency management • Facility management • Fire and life safety • Industrial security • Information and computer security • • • • Investigations Physical security Security Principles Security risk management • Security law • Security management • Security technology 21 Education (acceptance) • Progress achieving widespread academic acceptance due to involvement by professional organizations. • ASIS International collaborates with faculty and security directors to identify security education needs. • CJ departments have added security courses – many schools have their own security departments • Yet to be corresponding substantive response from business schools to incorporate security curriculum. – Similarity to public security and law enforcement allows for its incorporation into most criminal justice programs if not its own department. 22 11
  • 12. 11/18/2013 Education 2012 security concerns of Fortune 1000 companies 1. Cyber and Communications Security 2. Workplace Violence 3. Business Continuity Planning 4. Employee Selection/Screening 5. Property Crime moved 6. General Employee Theft 7. Crisis Management and Response 8. Unethical Business Conduct 9. Litigation 23 10. Identity Theft It’s important for you because • Changes in focus to higher-tech workplace and advanced criminal methods require innovation and critical thinking skills. • Higher education is necessity for advancement with security technology and leadership demands on today’s security professionals. 24 12
  • 13. 11/18/2013 Future • increased threat from social media, especially social engineering • more challenges with background checks to weed out problems • increased need for education • training sessions on professionalism for younger/newer hires 25 Future • even more going mobile, challenges both physical and digital • tech and networked devices plus crowdsourced attacks -- physical and digital • security for hire? a-la-carte security services? free-lance security solutions? • decreased government spending in criminal justice sector 26 13
  • 14. 11/18/2013 Future • Crisis and Emergency Management. –from forces of nature or human action or inaction. –increasingly responsibility of security professional –requires coordination with different set of agencies and providers 27 Recommendations • Implement guerilla, all-hands marketing strategy • Engage in CJ and other curriculum development • Offer to visit courses and events • Offer internships • Sponsor academic competitions 28 14
  • 15. 11/18/2013 References • Smith, C.F. and Choo, T. (2013). Revisiting Security Administration in the classroom: A decade later. Security Journal. (25 March 2013; doi: 10.1057/sj.2013.7). • Smith, C.F. et al. Security Today. (textbook – forthcoming) 29 Current and Emerging Trends in the Private Security Industry: The need for Continuing Education and Training of the Security Professional Carter F. Smith, JD, PhD carterfsmith@gmail.com 615-656-3505 http://www.linkedin.com/in/carterfsmith http://apsu.academia.edu/CarterSmith/Papers 15