Skip to main content

Security: Hybrid

  • Living reference work entry
  • First Online:
Encyclopedia of Security and Emergency Management

Definitions

Hybrid security refers to the use of both contracted and proprietary security services to protect a company’s assets.

Introduction

Businesses that have a need for security often inquire about security services that would be best suited to their organization (Nixon and Kerr 2008). Traditionally, businesses will choose from establishing a proprietary organization within their company (i.e., hire their own staff; McCrie 2016; Perry 2018; also see “Security: Proprietary” in this volume) or use a contract company (i.e., hire a security agency to provide staff; Fischer et al. 2013; McCrie 2016; also see “Security: Contract” in this volume) to satisfy their needs. As there are advantages and disadvantages to both proprietary and contract security services, the hybrid security model provides an excellent example of how the two types of services can be combined to give the company the best coverage (Nemeth 2018). When deciding between proprietary and contractual services, the...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Brownyard, T. (2015). The do’s and don’ts of contract security. Security, 52(1), 24–26.

    Google Scholar 

  • Fischer, R., Halibozek, E., & Walters, D. (2013). Introduction to security (9th ed.). Burlington: Butterworth-Heinemann.

    Google Scholar 

  • Hertig, C. A., & Davies, S. J. (2011). Contract security training and development: Examining methods of contract training. Security, 48(4), 78–80.

    Google Scholar 

  • McCrie, R. (2016). Security operations management (3rd ed.). Oxford: Butterworth Heinemann.

    Google Scholar 

  • Nemeth, C. P. (2018). Private security: An introduction to principles and practice. Boca Raton: CRC Press.

    Google Scholar 

  • Nixon, W. B., & Kerr, K. M. (2008). Background screening and investigations: Managing hiring risk from the HR and security perspectives. Burlington: Butterworth-Heinemann.

    Google Scholar 

  • Perry, R. H. (2018). U.S. contract security industry (10th ed.). https://www.roberthperry.com/uploads/2018_White_Paper1.pdf. Accessed 2 Dec 2019.

  • Reilly, S. (2013). How to train your security training program. Security, 50(9), 122–124.

    Google Scholar 

  • Sennewald, C. A. (2011). Career (proprietary) versus noncareer (and contract) personnel. In C. A. Sennewald (Ed.), Effective security management (pp. 127–135). Burlington: Butterworth-Heinemann.

    Chapter  Google Scholar 

  • Zalud, B. (2007). Enterprise-wide alignment drives contract or proprietary decision. Security, 44(2), 46, 48–49, 52.

    Google Scholar 

Future Readings

  • Fay, J. (2011). Contemporary security management (3rd ed.). Burlington: Butterworth-Heinemann.

    Google Scholar 

  • Sorrells, E. (2016). Security litigation: Best practices for managing and preventing security-related lawsuits. Amsterdam: Elsevier.

    Google Scholar 

  • Strom, K., Berzofsky, M., Shook-Sa, B., Barrick, K., Daye, C., Horstmann, N., & Kinsey, S. (2010). The private security industry: A review of the definitions, available data sources, and paths moving forward (NCJ No. 232781). Retrieved from National Criminal Justice Reference Service website: https://www.ncjrs.gov/app/publications/abstract.aspx?ID=254874. 2 Dec 2019.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lauren R. Shapiro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Gentile, A., Shapiro, L.R. (2020). Security: Hybrid. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_293-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69891-5_293-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69891-5

  • Online ISBN: 978-3-319-69891-5

  • eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences

Publish with us

Policies and ethics