Conflict Management for Security Professionals

Author: Tufano   Andrew A.  

Publisher: Elsevier Science‎

Publication year: 2013

E-ISBN: 9780124172074

P-ISBN(Paperback): 9780124171961

P-ISBN(Hardback):  9780124171961

Subject: D0 Political Theory;F2 Economic Planning and Management

Keyword: 经济计划与管理

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Effectively resolving conflict prevents violence, reduces incidents, improves productivity, and contributes to the overall health of an organization. Unlike the traditionally reactive law enforcement approach to resolving conflict, Conflict Management for Security Professionals provides a proven, reliable, business-focused approach that teaches security personnel to diffuse situations before they escalate when dealing with uncooperative, dangerous, or violent individuals.

Covering everything from policies and procedures to security tactics and business impact, Conflict Management for Security Professionals uniquely addresses conflict resolution from a security perspective for managers, policy makers, security officials, or anyone else who interacts with people every day. This book helps organizations create and maintain safe environments without interfering with their ability to remain profitable, competitive, and relevant.

  • Comprehensive and systematic conflict management and resolution program geared specifically for the needs of security managers, supervisors, and officers.
  • Incorporates classroom and field-tested conflict resolution concepts, models, and approaches.
  • Addresses everything from policies and programs to tactics for a wide variety of stakeholders in any private or public organization.

Chapter

Acknowledgments

About the Author

Inspiration

The Bottom Line

Process

Communication Solutions

The Reality of Violence

Better Suited

Invention

The Law of Probabilities

Recommendations

Audience

“Protect and Serve”

I: Underlying Principles of Organizational Conflict Resolution

1 Introduction

Process

The Default Position

Definitions and Distinctions

Law Enforcement and Private Security Distinctions

Historical Aspects of Conflict Resolution

The Setting

Trials and Tribulations

The Intended Message of This Book

Reference

2 The “Business-Focused” Community

The Problem

Introduction

Process

Managing Conflict in a Business-Focused Environment

Issues: Dealing with People in a Business Setting

Getting the Balance Right

Useful Methods and Models

Business-Based Conflict Resolution Strategies

Integrating Various Approaches

Dealing with Structural Impediments

Summary

Reference

3 Employing Organizational Safety Models

The Problem

Introduction

Process

The Observe-and-Report Model

The Enforcement Model

Adversarial Techniques

The Observe, Report, Advise, and Protect Model

Empowered Stakeholders

Interpersonal Field Conflict Dynamics

Resolution Misalignment

Organizational Safety Associates

Support Mode

Protective Mode

Summary

Reference

4 Presenting a Professional Image

The Problem

Introduction

Process

Uniforms and Duty Gear

Uniform Attributes

“You are What You Wear!”

SAID: Security Attire Identity Dissonance

Presenting a False Image

Impersonating a Police Officer

Internal Challenges

Summary

References

5 Protecting Your Reputation

The Problem

Introduction

Process

Reputation as an Intangible Asset

Is Perception Reality?

Community Sensitivities

Protection Strategies for Your Reputation

Conflict Resolution in Reputation Management

The Public Relations Campaign: A Key Tool

The Important Role in Crisis Communication

Failure to Manage Perceptions

Examples from Today’s Headlines

Headline: “Chinese Students Grill USC, LAPD, Reps on Shooting and Security Issues”

Headline: “Officers Did Nothing to Help”

Headline: “Officers Pepper-Spray Peaceful Protestors!”

Summary

References

II: Policies

6 Developing Policies on Conflict and Violence

The Problem

Introduction

Process

How Can Conflict Resolution Be Incorporated into Organizational Policies?

Viewing Conflict Resolution as a Unique Business Task

Potentiality and Complacency

Whose Force is Best?

The Role of “Response Time”

“Force” as a Normative Business Strategy

Forceless Organizational Safety

Talk is Not Enough

The Role of Security Professionals

Summary

Reference

7 Use-of-Force Policies and Risk Mitigation

The Problem

Introduction

Process

The Role of Policies in Conflict Resolution Strategies

Policy Considerations

Types of Policies and Their Foundations

Rules-Governed Policies

Situational Policies

An Approach to Policy Making

Shifting Liability

Organizational Malpractice

Dealing with Conflict Resolution Expectations

Summary

References

III: People as Part of a Conflict Resolution Strategy

8 Involving People in Conflict Resolution Roles

The Problem

Introduction

Process

Role Conflicts: Law Enforcement Versus Private Security

Paradigm Shift

“Business-Minded” Security Personnel

Today’s Career Environment and its Realities

Police Academy Graduates

Former Police Officers

Vocational Relevance

Summary

References

9 The Role of Training and Trainer Standards

The Problem

Introduction

Process

Potentially Dangerous Encounters (PDEs)

Philosophical Approaches to Training

Funding

Qualities of Effective Standards

Reliability

Applicability

Basic Training

Content Rich

Judgment

Justification

Mechanics

Competency Testing

Ongoing and Continuous Training

Realism

Trainer Standards

Context, Training, and Trainers

Law Enforcement Trainers

Trainer Qualifications

Law Enforcement Training Challenges

Summary

References

IV: Implementing Conflict Resolution Strategies

10 Verbal Conflict Resolution Strategies: Theories, Techniques, and Tactics for Resolving Conflict

The Problem

Introduction

Process

Perspectives on the Effectiveness of Verbal Strategies

The Ability to Influence

Verbal Tactics

Negotiating Subject Cooperation

Verbal Tactics: How To

Verbal Commands

Interpersonal Field Conflict Dynamics

The DEACONS Approach

Step One: Dialogue with a Subject

Step Two: Explain the Nature of the Conflict

Step Three: Ask for Cooperation

Step Four: Context

Step Five: Options and Outcomes

Step Six: Negotiate a Settlement

Step Seven: Settle with the Subject

Verbal Aggression

Communication Strategies for Dealing with Verbal Aggression

Perception Management

Summary

References

11 Physical Conflict Resolution Strategies: Theories, Techniques, Tactics, and Tools for Resolving Conflict

The Problem

Introduction

Process

Authority and Jurisdiction

Law Enforcement Versus Private Security Personnel Authority

Graham v. Connor: The Standard

Nonconsensual Physical Contact

Protective Action

A Matter of Degree: Force Versus Resistance

Justifying Physical Contact

Objective Criteria (Nonexhaustive List)

Subject/Security Personnel Interaction Factors

Security Personnel/Subject Interaction Factors

Subject Behavioral Factors (Nonexhaustive List)

Environmental Conditions (Nonexhaustive List)

Other Personnel Considerations

Situational Factors (Nonexhaustive List)

Situational Protective Action Risk Continuum (SPARC)

Aligning Situational Force

Subject’s Actions: Defined

Subject Resistance (SR) Levels

Level I: Nonassaultive

Cooperative

Resistive

Level II: Assaultive

Level III: Life-Threatening Assault

Dealing with Immediate Physical Threats

Protective Action Response Zones (PARZ)

PARZ One: Noncontact

PARZ Two: Less Lethal

Weaponless Options

CRT: Control and Restraint Techniques

WPM: Weaponless Protective Measures

Protective Tools or Devices

OC/Pepper Spray

Baton

ECD or Taser®

PARZ Three: Lethal

Firearm

PARZ Two: Less Lethal

Summary

12 Security Personnel Accountability

The Problem

Introduction

Process

Documentation

Security Staff Accountability

Peer Intervention

Factors Affecting Personnel Intervention

Post-Incident Review and Reporting Process

Using Metrics as an Element of Accountability

The Role of Review Boards in Accountability

Summary

Index

The users who browse this book also browse