Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 45, No. 9, September

An Academic Approach
The ease with which a person could take materials from the library without authorization had become a concern at the Melvin Gelman Library a few years ago, prompting a search for solutions. The library, a part of George Washington University, in...
An Integrated Cure
An integrated security system helped this hospital to lock down without becoming inhospitable. IT WAS A TYPICAL weekend at Fort Lauderdale's 587-bed Holy Cross Hospital. There were the usual comings and goings of those on duty among the hospital's...
A Protocol to Protect Privacy
Five Democratic Congressmen recently introduced a resolution recognizing the importance of an online privacy standard called P3P, or the Platform for Privacy Preferences. P3P is "an immediate way to address consumer concerns without onerous regulation,"...
Assessing Facial Ids
Groucho Marx once said, "I never forget a face, but in your case I'll make an exception." Three government agencies recently looked into whether biometric facial recognition products were as efficient as Groucho. The results are contained in a report...
Business News
Labsafety.com has placed a paper on school safety on its Web site. The paper notes that violence is not the only concern for schools. These facilities must also address the same hazards as seen in industry, including indoor air quality and handling...
Congressional Legislation
Privacy. A bill (H.R. 2036) introduced by Rep. Clay Shaw (R-FL) would restrict government use of Social Security numbers (SSNs) for identification purposes. For example, the bill would prohibit the use of Social Security numbers on checks issued by...
Cybercrime Treaty Opens Pandora's Box
An international cybercrime treaty has pleased those fighting against copyright infringement but has concerned business groups and privacy advocates. After four years and 27 drafts, the European Committee on Crime Problems has approved the Convention...
Don't Give Up the Ship
Earlier this year a cargo ship just off the coast of Riau Island, Indonesia, was boarded by thieves armed with knives and guns. The thieves succeeded in overpowering the crew and hijacking the vessel. They then tied and blindfolded the seamen and abandoned...
Drug Counterfeiting: A Bitter Pill
San Diego, a city of roughly 1.25 million inhabitants, has about 125 pharmacies. As of a year ago, according to the San Diego Weekly Reader, Tijuana, Mexico, with a population about the same size of San Diego's, had 1,000 pharmacies. Tijuanans probably...
Home on the Page
About 23,000 viewers visit Security Management Online each month to read breaking news and research articles, link to items mentioned in columns and stories, and take part in the Forums. If you're not one of them, find out what you're missing by logging...
Impressions of Abstract San Antonio Protectionism
Beside the San Antonio River sits the San Antonio Museum of Art. A few brushstokes to the north is the Marion Koogler McNay Art Museum. These two repositories of mankind's memorabilia are as dissimilar in some ways as the beer barrels and wrought iron...
It's Not What You Know
It's how you protect it. Protecting proprietary information in today's corporate climate requires an understanding of the risks. IN THE LAST DECADE, the evolution in corporate restructuring, the exponential growth in information technologies, and...
Judicial Decisions
Workers' compensation. The Wisconsin Supreme Court has upheld an employee's right to workers' compensation benefits even though the worker's intoxication was the cause of his injuries. William E. Larsen and his wife owned Larsen Laboratories, Inc.,...
Letters
Alienating Law Enforcement I read with curiosity D. Anthony Nichter's article entitled "Is Your VIP Protected" (May). I must say that I am impressed with Mr. Nichter's ability to alienate everyone in professional law enforcement, including off-duty...
Library Security Guidelines Revised
"For him that stealeth a Book from this Library...let the flames of Hell consume him for ever and aye." Thus, it is said, did the Monastery of San Pedro, in Barcelona, Spain, try to stem hook theft in the 16th century. Acknowledging that medieval...
MasterCard Merchants Harden Sites
MasterCard International recently unveiled the Site Data Protection Service (SDP), a comprehensive set of services that can help even the least computer-savvy merchants harden their Web sites against cyber-attacks. The SDP is designed to protect merchants...
Messenger Chokes on New Worm
A recent worm called Choke proved that even the strongest anti-virus software monitoring a company's gateway is powerless if workers are exposing the network to risks using instant message services. Choke, also known as W32/Choke and I-Worm.Choke,...
Putting Payday in Perspective
SECURITY MANAGERS working in publicly held companies earn more on average than those in privately owned enterprises. But company revenue appears to be a less significant determinant of salary than the size of the security budget and the breadth of...
Report Exposes Infrastructure Flaws
Oil and natural gas companies are not adequately prepared to cope with cyber-disruptions, according to a new report to the Secretary of Energy by the National Petroleum Council (NPC). While these companies have long had the capacity to recover quickly...
State Legislation
California Employee monitoring. A bill (S.B. 147) introduced in the California Senate would prohibit employers from secretly monitoring an employee's e-mail or any of the employee's other computer records. Under the provision, any employer that...
The Sure Hand of Surveillance
EACH MORNING AT THE CASINO a personnel department manager stopped by a vendor kiosk for a cup of coffee. She always purchased the same type and size of beverage and paid the same amount. One day, she noticed that although the clerk had charged her...
Voice Units Found to Detect Stress
It is said that beauty is in the eye of the be holder. But where is truth? Could it be in the voice of the speaker? Makers of voice analysis devices think so. And tests conducted by the Air Force Research Laboratory (AFRL) Information Directorate show...
When a Door Closes
When the M.H. de Young Memorial Museum prepared to close its old facility, a week of special events put security's skills on display. WE LEAVE BEHIND A BIT OF OURSELVES/ Wherever we have been," wrote the poet Edmond Haraucourt. When a museum closes,...