Introduction
Approximately 20 billion dollars are spent annually by firms across the world in a variety of sizes and segments who choose to develop and provide security as a proprietary or in-house function (Perry 2018). Often this decision is based upon the desire to have more control over the entire security operation and has much appeal to organizations that value loyalty, quality, and prestige of their security staff while eliminating the large rate of employee turnover often associated with a contractual security firm (McCrie 2016).
Where and how the proprietary security organization functions within the organization is a matter of great importance and shall determine its value and strength. There is...
References
Brennan, J., & Mattice, L. (2014). Managing risk across enterprise. Security, 51(7), 22.
Finch, B. (2013). The security leader, the business leader. Security Magazine, 50 (6), 20–22, 24.
McCrie, R. (2016). Security operations management (3rd ed.). Oxford: Butterworth Heinemann.
Nemeth, C. P. (2018). Private security: An introduction to principles and practice. Boca Raton: CRC Press.
Perry, R. H. (2018). U.S. contract security industry (10th ed.). Accessed at: https://www.roberthperry.com/uploads/2018_White_Paper1.pdf. 2 Dec 2019.
Reilly, S. (2013). How to train your security training program. Security, 50(9), 122–124.
Sennewald, C. A. (2011). Career (proprietary) versus noncareer (and contract) personnel. In C. A. Sennewald (Ed.), Effective security management (pp. 127–135). Burlington: Butterworth-Heinemann.
Strom, K., Berzofsky, M., Shook-Sa, B., Barrick, K., Daye, C., Horstmann, N., & Kinsey, S. (2010). The private security industry: A review of the definitions, available data sources, and paths moving forward (NCJ No. 232781). Retrieved from National Criminal Justice Reference Service website: https://www.ncjrs.gov/app/publications/abstract.aspx?ID= 254874. 2 Dec 2019.
Zalud, B. (2007). Enterprise-wide alignment drives contract or proprietary decision. Security, 44(2), 46, 48–49, 52.
Further Reading
Fay, J. (2011). Contemporary security management (3rd ed.). Burlington: Butterworth-Heinemann.
Sorrells, E. (2016). Security litigation: Best practices for managing and preventing security-related lawsuits. Amsterdam: Elsevier.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this entry
Cite this entry
Gentile, A., Shapiro, L.R. (2019). Security: Proprietary. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_32-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-69891-5_32-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69891-5
Online ISBN: 978-3-319-69891-5
eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences