Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 43, No. 6, June

Accurate Applications
Employment applications are a basic starting point for preemployment screening, but companies must ensure that these documents do not violate federal or state antidiscrimination laws. The following overview highlights the primary legal considerations...
Answering the Call for Regulation
While investigating a theft, police in Gwent, Wales (U.K.), discovered that the owner of the local contract security company had operated under three different aliases and been convicted of forty-three crimes since 1959. His extensive criminal record...
Cautious Investment Key to Success in Restive Russia
These are not good days for supporters of investment in Russia. The tandem collapse of the ruble and the government that supported it has introduced a period of instability that will likely last until the presidential elections in 2000. But the enormous...
Defusing Threats
Forget the fear of a pop quiz or ennui of an English class. For some students, the end of the school year means a respite from the terror of bomb threats and the monotony of constant evacuation. Prank calls to shut down schools were already a concern...
High-Tech Manufacturers Assess Theft Stats
The high-technology hardware industry's efforts to judge the size of its theft problem has long been stymied by the reluctance of manufacturers to report incidents. But in recent years that reluctance has been overcome by the need to get a handle on...
Home on the Page
http://www.securitymanagement.com Join the thousands of security professionals who stop by SM Online every month for the latest news and information. New offerings this month include the following resources. Travel safety. Watch out for yellow...
Play It Safe
A few years ago, I surveyed a collection storage facility at a museum as part of an assignment to evaluate its physical security. During the survey, I opened all the doors leading out of the storage area. Opening one flimsy wooden door, I found a mechanical...
Police Not Pushing Panic Button
More than a million personal alarms, also known as panic buttons and mobile security devices (MSDs), are projected to be in use by 2002. They are expected to be found mostly in automobiles (as part of a road service/directions feature), but some will...
Privacy's Price Tag
In response to the recent advancements in information gathering, civil rights advocates are warning that the proverbial sky is falling on the privacy rights of Americans. They assert, for example, that computer databases maintained by the government...
Profiting from Overseas Opportunities
As the decade draws to a close, the intense interest investors have shown in Africa over the past five years has begun to wane. In addition to war in Congo-DRC and Angola, economic turmoil in other parts of the world - including Asia, Russia, and Brazil...
The Challenge of Global Gatherings
Several years ago, when Hong Kong was still an English colony, Visa International was holding its annual conference there. The event attracted bankers from around the world, and many attendees brought along their spouses to enjoy the surrounding sites....
To Dream, Perchance to Kill
Albert Einstein said that "thought is father of the action." This axiom is directly applicable to violence in schools and offices, and an understanding of its implications may help managers detect the early warning signs of a troubled employee. ...
Training That Triumphs
A strong training program is critical to good organizational performance. But all training programs are not created equal. To provide the tools for security employees to improve their skills, managers should consider scenario training followed by an...
Treading Lightly through the Hiring Thicket
In their desire to HIRE productive EMPLOYEES, companies must ensure that their preemployment SCREENING programs are lawful. Preemployment screening can help management avoid hiring problem employees - a laudable goal. However, employers must tread...
Using the Hacker's Toolbox
In the physical world, a security professional hired to improve security at a facility will look over the property as if "casing the joint" to spot and shore up weaknesses before a criminal can exploit them. The same approach makes sense for a company's...
Weed the People
"We the people, in order to form a more perfect union..." Perhaps no words better convey the underpinnings of American government. Too bad some school children in Utah have been prevented from reading them - at least from one site on the Internet -...
What Price Security?
The Florida Department of Motor Vehicles agreed to provide driver's license information to Image Data LLC of Nashua, New Hampshire. in 1997. The information included photographs. Social Security numbers, and information on sex, race, and dates of birth....
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.