Planning for Access Control
Article Abstract:
The planning process for an access control system can be applied to various security operations. The purpose for the system must first be established and then identified as stated objectives. The security manager must gauge employee reaction so as not to upset morale. An important point in planning is the fact that redundancy in security can increase effectiveness of security systems. Examination should also be paid to criteria for decision making. The final step is the creation of cost and effect models.
Publication Name: Security Management
Subject: Law
ISSN: 0145-9406
Year: 1984
User Contributions:
Comment about this article or add new information about this topic:
Making Dollars and Sense with EAS
Article Abstract:
Electronic article surveillance (EAS) is a security aid technology. EAS is highly suited for the retail industry, but market penetration has been poor. Manufacturers of EAS are targeting all levels of the retail industry. Technological breakthroughs have advanced the efficiency of EAS. Recent developments include identification methods in tagging systems and document control. Another new development being marketed is an EAS system with a surface acoustic wave chip.
Publication Name: Security Management
Subject: Law
ISSN: 0145-9406
Year: 1984
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Reforming the new confirmation process: replacing "despise and resent" with "advise and consent". Burying Caesar: replacement of the veterans appeals process is needed to provide fairness to claimants
- Abstracts: Planning for Educational Benefits after the Greensboro Case. Excluding Qualified Defined Benefit Plan Insured Incidental Death Benefits from the Participant's Gross Estate - Minority and Non-Stockholders
- Abstracts: Legislative Process Restored. Washington Items
- Abstracts: Controlling Computer Crime, Where Do We Stand? Computer Abuse: A Crime of the Times. ASIS Testifies on Capitol Hill
- Abstracts: Security Regulation: A State-By-State Update. What's on the Security Horizon