985
Views
1
CrossRef citations to date
0
Altmetric
Articles

Private security services regulations in the United States today

Pages 287-304 | Received 10 Mar 2017, Accepted 02 Aug 2017, Published online: 13 Aug 2017

References

  • Becker, T. M. (1974). The place of private police in society: An area of research for the social sciences. Social Problems, 21, 438. doi:10.2307/799910
  • Becoming a Certified Security Consultant. 2017. Retrieved from: https://iapsc.org/about-us/certification.
  • Bergel, J. (2015, Nov 10). In many states, security guards get scant training, oversight. HuffPost.
  • Chang, L. Y. C., & Grabsky, P. (2014). Cybercrime and establishing a secure cyberworld. In M. Gill (Ed.), Handbook of security., London & New York: Palgrave Macmillan.
  • CISSP® − Certified information systems security professional.2017 Retrieved from: https:www.isc2.org/template-three-column-certificate-pages.aspex
  • Clarke, R., & Newman, G. (2005). Designing out crime from products and systems. Monsey, NY: Criminal Justice Press.
  • Clarke, R. V. (Ed.). (1997). Situational crime prevention: Successful case studies (pp. 2nd). Guilderland, NY: Harrow and Heston.
  • Cunningham, W., & Taylor, T. (1985). The Hallcrest report: Private security and police in America. Boston, MA: Butterworth-Heinemann.
  • Cunningham, W. C., Strauchs, J. J., & Van Meter, C. W. 1990. The Hallcrest report II: Private security trends 1970-2000. Stoneham, MA: Butterworth-Heinemann.
  • Donovan, E., & Walsh, W. (1986). An evaluation of Starrett City security services. University Park, PA: Pennsylvania State University.
  • Freedonia Group. (2015, June 20). Private security service revenues. Cleveland, OH: Freedonia Group, Inc.
  • Hemmens, C., Maahs, J., Scarborough, K. E., & Collins, P. A. (2001). Watching the watchman: State regulations of private security 1982-1998. Security Journal, 14(4), 17–28. doi:10.1057/palgrave.sj.8340095
  • Horan, J. D. (1967). The Pinkertons: The detective dynasty that made history (pp. 50). New York: Bonanza Books.
  • Joh, E. E. (2005). Conceptualizing the private police. Utah Law Review, 573, 578–579.
  • Kakalik, J. S., & Wildhorn, S. 1972. Private police in the United States: Findings and recommendations, Government Printing Office, Washington, DC, vol. 5, 30. (The Rand Report)
  • Keller, K. S. (2004). Securing security expert testimony: Overcoming the Daubert challenge to reach the witness stand. Security Journal, 17(3), 21–29. doi:10.1057/palgrave.sj.8340174
  • Krahmann, E. 2002. Private firms and the new security governance. Retrieved from http://www.isanet.org/noarchive/krahmann.html
  • Lee, L. (2009). Homeland security and private sector business: Corporations’ role in critical infrastructure protection. Boca Raton, FL: CRC Press.
  • McCrie, R. (2005). ASIS International. In L. E. Sullivan (Ed.), Encyclopedia of law enforcement, vol. 2 (pp. 547–549). Thousand Oaks, CA: Sage Publications.
  • McCrie, R. (2006). A history of security. In M. Gill (Ed.), Handbook of security. London & New York: Palgrave Macmillan.
  • McCrie, R. D. (2004). The history of expertise in security management practice and litigation. Security Journal, 17(3), 11–19. doi:10.1057/palgrave.sj.8340173
  • Morn, F. (1982). The eye that never sleeps. Bloomington, IN: Indiana University Press, p. 98.
  • Nalla, M. K., & Crichlow, V. J. (2014). Have the standards for private security guards become more stringent in the Post 9/11 Era? An assessment of security guard regulations in the US from 1982 to 2010. Security Journal, 27, 1–15.
  • National Advisory Committee on Criminal Justice Standards and Goals. 1976. Private security: Report of the task force on private security. Government Printing Office, Washington, DC.
  • Nemeth, C. P. (2012). Private security and the law (4th ed.). Waltham, MA: Butterworth-Heinemann.
  • Phillips, B. (2016). The complete book of locks and locksmithing (7th ed.). New York: McGraw-Hill.
  • Poulin, K. C., & Nemeth, C. P. (2005). Private security and public safety: A community-based approach. Upper Saddle River, NJ: Pearson Prentice Hall.
  • Prenzler, T., & Sarre, R. (2014). Regulation. In M. Gill (Ed.), The handbook of security (2nd ed.). London & New York: Palgrave Macmillan.
  • Private Security Officer Selection and Training. (2010). ASIS GDL PSO-2010. Alexandria, VA: ASIS International.
  • Private Security Service Demand in the United States. (2015). Cleveland, OH: Freedonia Group.
  • Richemond-Barak, D. (2014). Can self-regulation work? Lessons from the private security and military industry. Michigan Journal of International Law, 35, 773.
  • Roberts, C. (2012). The U.S. Federal Protective Service: A troubled agency–The need for improved contract guard training and oversight. Journal of Applied Security Research, 7(4), 478–488. doi:10.1080/19361610.2012.710539
  • Sennewald, C. A., & Tsukayama, J. K. (2015). The process of investigation: Concepts and strategies for investigators in the private sector (4th ed., pp. 13). Waltham, MA: Butterworth-Heinemann.
  • Sklansky, D. A. (1999). The private police. UCLA Law Review, 46, 1165–1287.
  • Sklansky, D. A. (2006). Private police and democracy. American Criminal Law Review, 43, 89–105.
  • Valiant Solutions . (2017,  June 7). Personal communications. Woodbury, NY: Valiant Solutions, Inc.
  • Spearin, C. (2014). Special operations forces & private security companies. Parameters, 44(2), 61.
  • Strom, K., Berzofsky, M., Shook-Sa, B., Barrick, K., Daye, C., Hortstmann, N., & Kinsey, S. (2010). The private security industry: A review of the definitions, available data sources, and paths moving forward. Washington, DC: US Department of Justice.
  • USA PATRIOT ACT 2001. http://www.gpo.gov/fdsys/pkg/PLAW-107publ56/pdf/plaw-107publ56.pdf
  • Williams, A. (2014). Guards with guns [online]. [2016, July 27]. Available: htpps://apps.cironline.org/hired-guns

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.