Healthcare is on a critical path, evolving with the introduction of Obama Care and now COVID-19. How will healthcare and specifically healthcare security adapt over the next few years? What tools will be necessary for healthcare security professionals and all security professionals to meet the demands of the transforming security environment? Security professionals need new tools and programs to adapt security services to the “New Normal.” As healthcare emerges from pandemic threats, active shooter and workplace violence will re-emerge and new threats related to civil unrest, fraud, mergers, and further financial struggles will change how healthcare security will function.
Healthcare Security: Solutions for Management, Operations, and Administration provides a series of articles related to the management and operations of healthcare security which will assist healthcare security professionals in managing the “New Normal” now and into the future. It is a collection of previously published articles on healthcare security and general security covering various topics related to the management of healthcare security and provides information on general security operations. It also includes unconventional topics that are necessary in the administration of healthcare security such as auditing principles, fraud prevention, investigations, interview and interrogation techniques, and forensics.
Author(s): Anthony Luizzo, Bernard Scaglione
Publisher: Routledge/Productivity Press
Year: 2022
Language: English
Pages: 345
City: New York
Cover
Half Title
Title
Copyright
Contents
Preface
Acknowledgements
About the Authors
Introduction
1. The Changing Face of Healthcare Security
How has Hospital Security Changed Since 9/11?
Aspects of Hospital Security: How is Hospital Security Changing in the New Century?
Hospital Security in the 21st Century: What Should We Expect
The Changing Face of the Hospital Security: Re-tooling for the Future
The Changing Face of Hospital Security
2. Security Management
The Hidden Cost of Downsizing: Where Loyalty Dies, Fraud Grows
Stretching the Security Dollar
Investigating in a New Environment
Shoplifter Profiles and Tips on How They Steal
Asking the Right Questions About Fire Prevention
Putting the Spotlight on Security
Improving the Dependability of an ID Program
3. Disaster Preparedness
Training Security Officers to Recognize the Perils of Weapons of Mass Destruction and Pandemic Flu Contaminates – Part I
Training Security Operatives to Recognize the Perils of Weapons of Mass Exposure Contaminates – Part II
Disaster Planning: Training for the Perils of Weapons of Mass Exposure 2020
4. The Security Survey
Beyond “Target Hardening” – Approaches in Applying Crime Risk Management Principles and Techniques in Community Surveys
The Access Control Security Survey
The Security Survey: A Prescription for Enhancing Security
Aspects of the Security Survey: Distinctions Between: Single-Client, Multi-Client, Access Control, & Community–Wide Security Surveys
The Security Survey: An Investigative Tool – Part I
The Security Survey: An Investigative Tool – Part II
Revising the Security Survey
The Many Faces of the Security Survey
5. Practical Crime Prevention
An Alternate Perspective on Healthcare Crime Prevention
A Clinical Approach to Crime Detection
A Clinical Approach to Hospital Security
The Art and Science of Proactive Security Programming
The Varied Roles of the Crime Prevention Expert
How is Crime Risk Measured and Managed?
Using Access and ID Control to Prevent Workplace Violence
Workplace Violence Prevention: A Guide to Active Shooter and Workplace Violence Resources
Aspects of Crime and Violence Avoidance
Squeezing the Most from Your Security Dollar
6. Metrics and Data Application
An Alternative View in the Development of Healthcare Security Metrics
Resources Available for Applying Metrics in Security and Safety Programming
Applying Metrics to 21st Century Healthcare Security
7. Physical Security Applications
The Man Behind the Security Camera
Shell Hardening
Digital Security Technology Simplified
Determining and Implementing Successful Access Control Solutions
8. Customer Service Initiatives
The Patient Wish List: Getting Customer Service Right
Creating a Customer Service Program for Healthcare Security
9. Auditing and Forensics
Auditing Proactive Security Programs
Auditing Investigative Techniques
Auditing Hospital Security
Auditing Crime Analysis Programs
Auditing Warehouse and Loading Dock Security
Auditing Access Control Procedures
Auditing Loss Prevention Programs
The Environmental School of Criminology: Proactive vs. Reactive Security
Auditing Hospital Security: Is Your Security Program In Compliance
Security Auditing: A Prescription for Keeping Protection Programs Healthy
Aspects of Preparing for a “No Prior Notice” Regulatory Audit
Forensic Accounting and the Criminal Justice Process
How Have the Terrorist Attacks of 9/11/01 Affected the Corporate Hiring Process?
Background Checks: A Diagnostic Tool to Decipher Deception
A New Approach to Handling Incoming Verifications
Forensics Role in the Investigative Process
10. Fraud Detection and Prevention
Play it Safe: A Guide to Preventing Shoplifting, Fraud and Employee Theft
A Team Approach to Fraud Prevention
Delving Deeper to Decipher Fraud
The Fraud Prevention Jackpot
Safeguarding Assets Against Fraud
Objections to Active Fraud Prevention
Steps in a Fraud Audit
Investigating Money Laundering Schemes
Fraud Audit Checklist
The Fraud Equation
Ten Questions an Entrepreneur Should Ask About Fraud
What is Business Espionage and How Can it be Effectively Controlled?
Auditing for Identity Fraud
Aspects of Fraud Prevention: Where Loyalty Dies, Fraud Grows
Aspects of Controlling Fraud in Healthcare Facilities: Taking the Threat Seriously
11. Interview and Interrogation
Interview vs. Interrogation
Demystifying the Investigative Process
Decrypting the Interrogation Process
The Art of Non-Target Interviewing
Effective Interview Techniques
12. VIP Protection
Aspects of Hospital Security: Protecting the VIP
Aspects of Hospital Security: Protecting the VIP – Part II
Index