Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 46, No. 3, March

Code Wars: Virus Attack Trends; the Worms of 2001 Are the Building Blocks of the Next Generation of Threats to the Internet, Which Are Likely to Be Faster, Harder to Fight, and Deadlier. (Computer Security)
In Star Wars, the forces of good and evil wage battle against one another, but ironically both draw their strength from the same source: The Force. The concept of a single power that can be used for ill or good is a fitting metaphor for the world of...
Court Curtails Safe Haven of Arbitration. (News and Trends)
Companies increasingly require that new employees sign arbitration agreements when they are hired to save the business from costly legal battles when employees have complaints, such as discrimination claims. But now the Supreme Court has determined...
Designing Trouble Away: Palm Trees and Jogging Paths Pave Way for Subtle Security. (Physical Security)
SECURITY IS IN THE FOREFRONT of national attention as a result of the September u, 2001, terrorist attacks, especially within the government. But federal facilities had already been ratcheting up security following earlier incidents, such as the attack...
Is the U.S. Prepared for Nuclear Terrorism? the United States Finds Itself at Greater Risk of an Attack by Unclear-Based Weaponry Today Than at the Height of the Cold War. (Viewpoint)
In October 2001, in Philadelphia, Pennsylvania, two portable moisture density gauges containing sealed sources of radioactive material were reported stolen off the back of a pickup truck at a worksite, despite being properly chained and locked. The...
Judicial Decisions. (Legal Reporter)
Retaliation. According to a federal appeals court ruling, a company's admission that it terminated an employee in response to a request that his attorney be allowed to videotape his workstation for a workers' compensation case was sufficient proof...
Law Enforcement Targets Warez Sites. (Tech Talk)
A series of international law enforcement investigations into software pirate gangs culminated simultaneously late last year with the execution of dozens of search warrants around the world, according to the U.S. Department of Justice. The investigations...
Letters
Compulsory Reading The "Viewpoint" by Harry Azano entitled "Will the New Threat Result in Real Change" (December) is an excellent article and should be compulsory reading for all those associated with the security industry. For too long the pressure...
Meat Scare Feeds Media Frenzy: Find out How One Company Dealt with a Threat of Product Tampering and How the Lessons Can Be Applied to Any Situation. (Business Continuity)
ON NOVEMBER 10, 2001, THE FBI announced the profile of the person they think may be responsible for the anthrax-laced letters sent last fall to media notables and members of the U.S. congress. The description suggests that the letters are the work...
New Help for Critical Infrastructures. (News and Trends)
If four words could sum up U.S. homeland defense, it might be "It's the infrastructure, stupid." Recognizing how vulnerable power plants, computer networks, oil facilities, and other such entities are to the nation, officials have been clamoring to...
Northern Composure: Teaching Conflict Resolution Skills to Staff Has Markedly Decreased Aggressive Behavior at the University College of the Fraser Valley
CLEAR LAKES, LUSH FARMS, AND JAGGED peaks dot the Fraser Valley landscape, a strip of land that extends northeast from Vancouver, British Columbia, Canada. Despite the serene backdrop, students at the University College of the Fraser Valley (UCFV)...
Not Masters of Their Domain. (Tech Talk)
Every Web site depends on a properly functioning Domain Name System (DNS) server to get visitors to its site. The DNS is the device that translates text Web addresses, or URLs, into numeric IP addresses. But servers are often improperly configured,...
One Brick in the Security Wall: One of the Most Important Elements of Information Security-The Regular Patching of Software Vulnerabilities-Is Often a Loose Brick in the Security Wall. (Tech Talk)
Building an effective level of information security can be likened to building a brick wall. There are many bricks in the information-security wall, from safe computing practices to intrusion-detection systems. However, one of the most important elements...
Past as Prologue Assessing Job Candidates: By Understanding the Legal Theory of Negligent Hiring, Companies Can Avoid Lawsuits. (Focus on Employment)
COURTS IN 30 STATES recognize the theory of negligent hiring, under which companies can be held liable for the actions of their employees. The negligent hiring theory holds that employers who know or have reason to believe that an employee poses a...
Pepper Spray Doesn't Impair Breathing, Says New Report. (News and Trends)
Law enforcement officials and private security professionals ho use pepper spray can breathe easier knowing that their targets are breathing freely as well. New research shows that exposure to pepper spray, or oleoresin capsicum (OC), does not seriously...
Tampa Facial Recognition a Failure, ACLU Claims. (News and Trends)
The much-publicized use of facial recognition technology on the streets of Tampa, Florida, has been a failure-not identifying a single criminal suspect and coming up with "many false positives"--and it is, in effect, being abandoned, according to a...
The Electronic Witness. (Investigations)
IT WAS ANY COMPANY'S WORST-CASE SCENARIO. Richard, a high-level engineer with utilities company ABC Electric Inc. (all names have been fictionalized), suddenly resigned his job and, along with another engineer, went to work for a newly created company,...
Too Much Information: Managers Can Use a Decision-Modeling Process to Make Tough Choices Easier. (Leading Edge)
Security managers face a range of daunting decisions, such as choosing among several vendors for a multimillion-dollar security system contract, selecting a contract security guard provider for multiple facilities, or hiring the right candidate for...
Training for Tense Times: Security Professionals at Four Companies Discuss Their Violence Response Teams. (Focus on Employment)
ON JANUARY 9, local authorities found an extensive firearms cache allegedly belonging to David Reza, a fired nuclear power plant worker in California. The worker was reported to have made threats that he would get revenge by killing former coworkers...
Transit Systems Urge Rapid Assistance. (News and Trends)
A terrorist strike against a mass transit system would be a double blow: an attack on a critical infrastructure and the elimination of an evacuation route. This is the core concern of the leading mass transit agencies, as made evident at a hearing...
Urban Renewal. (Working Wise)
If you're in the market for a rattan doghouse built to resemble an antique discovered in Avignon, France, Anthropologie is your place. This high-end retail chain caters to the upscale woman's market. Anthropologie's parent company, Urban Outfitters,...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.