Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 51, No. 1, January

A Healthy Way to Protect Patient Data: A Healthcare Organization Found That It Needed a Way to Control the Use of Removable Media to Ensure That Patient Data Remains Protected
LIKE ALL HOSPITALS and medical facilities, Baptist Memorial Health Care Corporation (BMHCC) must comply with the Health Insurance Portability and Accountability Act (HIPAA), which requires medical services providers to provide security measures for...
A Man with a Plan: 2007 ASIS International President Steve Chupa, CPP, Has Been at the Forefront of a Project Aimed at Helping the Society and the Profession Assess and Adapt to New Global Business Challenges
At an ASIS International Board of Directors meeting several years ago, Steve D. Chupa, CPP, posed a question to his fellow members: "If we look at security going out seven to ten years, will ASIS be meeting the challenges created by changes in the...
CCTV Ordinances on the Rise: The Legislative Trend toward Requiring More Businesses to Use CCTV Surveillance Has Not Been Well Thought Out
IF LEGISLATIVE PROPOSALS in Chicago and Milwaukee go through, bars and nightclubs in those cities will be required to post surveillance cameras on their premises. Last year, following a shooting at a mall, Baltimore County required all shopping centers...
Convergence: Smart Cards versus Biometrics
COMPANIES ARE TYING together physical and IT (or logical) access control systems, but not all such systems are equally popular. Forty-nine percent of 89 companies in a wide range of industries surveyed by EQUS Group Inc., a San Jose, California-based...
Executive Committee Announced
The members of the ASIS International Board of Directors Executive Committee have been announced: Jeff Spivey, CPP, PSP, president of Risk Management Associates, will serve as chairman of the Board; Steve D. Chupa, CPP, director of worldwide security...
Five Not-So-Easy Pieces
ACCESS CONTROL IS IMPORTANT for any business, but it is especially critical for government contractors that supply sensitive goods or services because the government requires that they have a robust, multilayered security system. Security Management...
Frank M. Carpency
Frank M. Carpency, CPP, PSP, is a registered professional engineer with degrees in electrical and electronics technology and electrical engineering from Pennsylvania State University and LaSalle University. He has more than 30 years experience in the...
Gimme Shelter: When Is Sheltering-in-Place Preferable to Evacuation, and How Should You Go about It?
In 2005, as Hurricane Rita was bearing down on Houston, few people were taking any chances. The recent experience of what Katrina had done to New Orleans was fresh in their minds. As a result, hundreds of thousands of families hastily packed and left...
Hearts, Minds, and Homegrown Terror: Federal Authorities Have Been Forging Ties with U.S. Muslim Communities to Counter the Idea That the War Agaist Terrorism Is a War against Islam
LAST YEAR'S FOILED PLOT to blow up transatlantic flights between Great Britain and the United States renewed the public's fear of terrorist attacks and, for some, frustration over increased airport security measures. [ILLUSTRATION OMITTED] What...
Home Is Where the Crime Is
RESIDENTIAL construction site theft thrives because builders don't spend the money to fight it. They have little financial incentive to do so, since the losses don't really hit the bottom line. Particularly when theft involves small equipment, tools,...
Intelligence Support Systems: Technologies for Lawful Intercepts
****# Intelligence Support Systems: Technologies for Lawful Intercepts. By Paul Hoffmann and Kornel Terplan; published by Auerbach Publications, www.crcpress.com (Web); 463 pages; $90. Wiretapping is hot. It's one of the key tools in the war on...
Introduction to Private Investigation: Essential Knowledge and Procedures for the Private Investigator, Second Edition
***## Introduction to private Investigation: Essential Knowledge and Procedures for the Private Investigator, Second Edition. By Joseph A. Travers; published by Charles C. Thomas; available from ASIS International, Item #1642, 703/519-6200 (phone),...
John Deere Plows Ahead with Security
FOLLOWING IN the footsteps of other multinationals, such as Procter & Gamble, GE, and ADM, agriculture equipment giant John Deere is setting up an international security network to standardize the way it protects global operations as it continues...
Keys to Encryption: Encryption Technology Was Once So Complicated and Expensive to Implement That No One Used It. That's Changing. These Examples Illustrate How It Can Be Done
Halfway through a meeting led by one hospital's IT security team, the doctors finally got a break to stretch their legs and get coffee. While they were gone, some of the security team went around the room and picked up a few of the PDAs that had been...
New Year Brings New Congress, New Content
In November, voters sent the message that they wanted changes in Washington, D.C. As a result, when the 110th Congress convenes this month, there will be new Democratic leadership controlling the House and Senate. While it's too early to tell exactly...
Prisons: Fostering Extremism?
HISTORY HAS SHOWN the potential of prisons to serve as incubators for extremist leaders, from Adolf Hitler--who wrote Mein Kampf while in prison--to Abu Musab A1-Zarqawi--whose radicalism hardened during a six-month prison term in the 1990s. In addition,...
Security Saves Time
THE AUTHORS OF Doing Business 2007: How to Reform waded into their research more than two years ago expecting to find that stepped-up security measures would have slowed the pace of global trade. Instead, they found that the time it took to turn around...
State Legislature Wrap-Up
State legislatures around the country have enacted dozens of security-related laws during the past year. Some provisions reflect a state's need to respond to local incidents, as when a crime occurs and the state passes laws to prevent future attacks,...
State Perspective-Arizona: Interview with Frank Navarette
Frank Navarette's introduction to the security field was 18 years in the Phoenix Police Department, but perhaps as much as anything, it was his international experience in the telecommunications field that made him the favored pick to lead the Arizona...
The ABCs of USB
YOU MAY THINK OF USB flash drives as little more than trade-show giveaways that can be used to ferry files and folders from a company laptop to a home computer. In reality, USB drives have evolved into something much more useful--and potentially dangerous....
The Price of Oil: Unrest in Nigeria Has Forced Corporate Security for Companies Operating There to Focus Additional Resources on Personnel Protection and Awareness Training
AN EXPERIENCED oil hand can earn $1,500 per day working in the Niger Delta. But there's a reason companies are paying such high wages to those willing to come to Nigeria, the world's eighth-largest oil exporter. During one three-week stretch in August...
Top 10 Performing Security Stocks for October
% Stock Company/Symbol Increase Price ZIX Corp. 94% $1.20 ZIXI Wave Systems 87% $3.11 WAVX Applied Digital Solutions 47% $2.38 ADSX Inksure Technologies...
Training in Vain?
IF YOU BELIEVE transit and rail industry leaders and government officials, they have provided copious security training of various forms to employees. Transit and rail unions, by contrast, say that hardly any of their members have received such training....
Why?
****# Why? By Charles Tilly; published by Princeton University Press, pup.princeton.edu (Web); 202 pages; $24.95. From the ancient philosophers to today's bloggers, men and women have asked, "Why?" This book asks that same momentous question, but...
Worth a Look
USB DRIVES have been born again, thanks to a new technology platform called U3, created by storage-product makers SanDisk and M-Systems (which have recently merged). U3 technology allows next-generation flash drives to be used to run software such...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.