Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 48, No. 4, April

A Better Focus on Surveillance: Find out How One Bank Brought Everything into Focus after Numerous Mergers Led to a Hodgepodge of Surveillance Systems
Bank One is the nation's sixth-largest bank holding company, with more than 1,000 banking centers and business offices in 23 states and multiple countries. Much of the company's growth has come as a result of mergers and acquisitions, which have also...
A Fool and Security: Soon Parted?
When T. S. Eliot wrote that "April is the cruelest month," he certainly didn't have April Fool's Day in mind. But the sometimes cruel pranks played on that day can have significant security ramifications. Last year, seven men in Sturgis, Michigan,...
Airports Eyeing Private Screeners
The U.S. aviation industry's mandated switch to a federalized screening force after 9-11 got a lot of attention. But a less-noticed provision of the law that federalized airport security allows airports to ask the Transportation Security Administration...
An International Approach to Fighting Spam
One frequently made criticism of domestic legislation that is designed to outlaw spam is that much of the world's junk e-mail comes from other countries, where the spammers are beyond the jurisdiction of U.S. law. But a new "series of actions" announced...
ASIS Guidelines Update
To ensure that draft guidelines benefit from the participation of all interested parties, ASIS International will be regularly providing the status of draft guideline projects so that members and others can avail themselves of a completed guideline,...
Awash in Risk: Public Utilities Can Mitigate Risk at Their Facilities with a Properly Performed Vulnerability Risk Assessment
To better protect critical infrastructure, the U.S. government initiated requirements in 2002 that water utilities serving more than 3,300 persons conduct vulnerability assessments. It's a good idea, if properly carried out. But poorly conducted assessments...
Business News
Last year, the Federal Trade Commission fined several major online retailers for lax security on their c-commerce sites, according to the Open Web Application Security Project (OWASP). To help organizations understand how to protect their Web sites....
Can Burglar Alarm Systems Do More? Services No Longer Routinely Requested as Part of Alarm Monitoring Represent Missed Opportunity
The district manager received the call Monday at 9:07 a.m. Marjorie, the assistant manager of one of the company's strip shopping-center stores, reported that the deposits from the weekend were not in the safe as they should be. She had tried reaching...
Cities Frustrated by Homeland Security without the Funding
Federal officials wouldn't dream of sending troops to Iraq or Afghanistan without the best weapons, technology, and training. So why aren't state and local first responders--the front lines of homeland security--getting equal support? That question...
Diagnosis Security: How One Hospital Assessed and Improved Its Physical Security and Loss Prevention Programs While It Upgraded Its Supply Chain Controls
Loudoun Hospital Center (LHC) in Loudoun County, Virginia, faces a daunting prospect: Because it is less than 35 miles from Washington, D.C., it might have to serve as a receiving facility in the event of another major terror at tack against the nation's...
Giuliani to Address Annual Seminar
Former Mayor of New York City Rudolph W. Giuliani will provide the keynote address at the ASIS International 50th Annual Seminar and Exhibits in Dallas on Wednesday, September 29. Giuliani was widely praised for his leadership and compassion during...
Had Your Fill of Spam? Unwanted Commercial E-Mail-Spam-Has Become More Than Just a Nuisance. Here's How Two Organizations Have Solved Their Spam Problems
It's Monday morning, and a hectic week lies ahead. You can't afford to waste any time. Nothing new in that. But added to the crush of real business these days is the endless slew of unsolicited e-mails hawking everything from low airfares to cheap...
Heart-Stopping Action: Whether It's a Sporting Event or a Rock Concert, Medical Emergencies Can Spoil the Fun and Create Liability Unless Management Plans Ahead
During construction for a major sports event, a hydraulic lift topples, sending a construction worker falling three stories. He suffers serious head trauma and other injuries. At a political convention at a downtown convention center, more than 100...
Home on the Page @ WWW.Securitymanagement.Com
As the world of security becomes more complicated and encompassing, Security Management editors offer an easy way to locate the most critical information: Just look to Security Management Online, where the best resources have been gathered for easy...
I Know What You Did Last Shift: A New Study Examines Why Employees Don't Report Security Concerns about Coworkers and What Management Can Do
While most U.S. government employees are careful in guarding the nation's secrets, some who have failed to do so have done great harm to national security. Dealing with this risk is the primary goal of the federal government's personnel security program....
Keeping the Vote In
Touch-screen voting systems have come under heavy fire, thanks in part to last year's "Hopkins" report that concluded that "this voting system is far below even the most minimal security standards applicable in other contexts." But a new analysis by...
Networking Video with Class
The thirteen schools in the Edwardsville community school district in southwestern Illinois share a high-capacity computing and telecommunications network for the use of their combined 7,000 students and 880 staff members. One of the few analog remnants...
PSP Profile
More than 180 security professionals have earned the Physical Security Professional (PSP) designation since its establishment by ASIS International last year Beginning with this issue, this column will profile a security professional who has earned...
Security Issues Tax IRS System Administrators
The Internal Revenue Service continues to have major computer-security flaws that could result in unauthorized access to tax returns, according to a report prepared by the IRS's acting deputy inspector general for audit. The findings are based on...
Teaching Common Sense: In Security, the Emphasis Is Often on Post Orders and Emergencies, but It Helps to Address Basic Commonsense Issues in Training as Well
A contract security officer forgets to get directions for a new site to which he was recently assigned. He never gets there, the post goes unstaffed, and the contract service provider loses an important contract. In another part of the country, a contract...
Tellers Walk a Fine Line with Robberies
A teller receives a note from a robber asking for a bag of cash. Typically, tellers are trained to comply with the request and get the robber out of the bank. Some banks, however, are training tellers to use their discretion: if the note-passer doesn't...
U.S. Judicial Decisions
Drug testing. In a recent decision, an appellate court ruled that a school district did not defame an employee who gave an insufficient urine sample in a drug test. The court determined that the sample was not adequate and under federal law comprised...
You Bagged the Shoplifter, Now What? A Policy of Catching Shoplifters and Pushing for Prosecutions May Not Be the Best Use of Company Resources
Executives for a large retailer in a major metropolitan city were convinced that their policy for handling shoplifting cases was effective in keeping both recidivism and shrinkage rates down. But security officers said they were spending significant...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.