HOW TO HIGHLIGHT SECURITY'S STRATEGIC VALUE Without executive support, security initiatives are doomed. Find out how to get the support you need (Englisch)
- Neue Suche nach: Smith, N. A.
- Neue Suche nach: Smith, N. A.
In:
SECURITY MANAGEMENT
;
45
;
85-90
;
2001
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:HOW TO HIGHLIGHT SECURITY'S STRATEGIC VALUE Without executive support, security initiatives are doomed. Find out how to get the support you need
-
Beteiligte:Smith, N. A. ( Autor:in )
-
Erschienen in:SECURITY MANAGEMENT ; 45 ; 85-90
-
Verlag:
- Neue Suche nach: AMERICAN SOCIETY FOR INDUSTRIAL SECURITY
-
Erscheinungsdatum:01.01.2001
-
Format / Umfang:6 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 658.47
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 658.47 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 45
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 8
-
LETTERS - Readers take issue with advice on handling workplace violence and an analysis of emergency telephones.| 2001
- 8
-
Departments - LETTERS - Readers respond to items about executive protection, security standards, mistake strategies, and prescreening tests.| 2001
- 8
-
LETTERS - Readers sound off on security standards, fax vulnerabilities, privacy in a high-tech world, and officer professionalism.| 2001
- 8
-
Departments - LETTERS - Tackling tailgating, drawing parallels between the drug war and Vietnam, and pondering outplacement for problem employees.| 2001
- 8
-
Departments - EDITOR'S NOTE - Security Management looks at counterterrorism efforts in light of the September II attacks.| 2001
- 8
-
Departments - LETTERS - The continuing saga of security standards, and a discussion about CCTV monitoring.| 2001
- 8
-
Departments - LETTERS - Experts battle over terrorism statistics, and clarification is offered on a negligent security case.| 2001
- 8
-
Departments - EDITOR'S NOTE| 2001
- 8
-
Security managers can help businesses keep the proper perspective with regard to security threats| 2001
- 8
-
Departments - LETTERS - Readers sound off on security standards, fax vulnerabilities, privacy in a high-tech world, and officer professionalism.| 2001
- 8
-
Departments - EDITOR'S NOTE - Security managers can help businesses keep the proper perspective with regard to security threats.| 2001
- 8
-
Departments - EDITOR'S NOTE - What do changes in how security information is used portend for the future of security managers?| 2001
- 8
-
Departments - LETTERS - ASIS launches a commission to study security hazards, zero tolerance for zero tolerance, and shared visitor badging.| 2001
- 8
-
Tackling tailgating, drawing parallels between the drug war and Vietnam, and pondering outplacement for problem employees| 2001
- 8
-
Departments - LETTERS - Plaudits for workplace violence articles, an opposing view on aviation security, and a word on electronic article surveillance.| 2001
- 10
-
Cruise ships hound drug traffickers, a study suggests that drug-test cheating is down, first responders get a bioterror resource, and moreGips, M. A. et al. | 2001
- 10
-
Departments - LETTERS - A CD-ROM's author-producer takes issue with a reviewer's criticisms.| 2001
- 10
-
Departments - NEWS AND TRENDS - Cruise ships hound drug traffickers, a study suggests that drug-test cheating is down, first responders get a bioterror resource, and more.Gips, Michael A. et al. | 2001
- 10
-
Departments - LETTERS - Two security professionals voice their support for standards.| 2001
- 12
-
Voice units found to detect stress, facial recognition systems face rigorous testing, pharmaceutical counterfeiting rises, and library security guidelines are adoptedGips, M. A. et al. | 2001
- 12
-
Departments - NEWS AND TRENDS - CCTV ruling raises privacy issues, critics make waves over port security bill, simulated smallpox attack concerns Congress, and much more.Gips, Michael A. et al. | 2001
- 12
-
Departments - NEWS AND TRENDS - Terrorism readiness assailed, groups slam filtering software, ASIS healthcare industry security practices study released, and much more.Gips, Michael A. et al. | 2001
- 12
-
Departments - NEWS AND TRENDS - Facial recognition fuels debate, a new painting sensor raises optimism, a company cooks up a solution to lunch thieves, and more.Gips, Michael A. et al. | 2001
- 12
-
NEWS AND TRENDS - Crime trends, biometrics, drug testing, and much more.Gips, Michael A. et al. | 2001
- 12
-
Departments - NEWS AND TRENDS - Voice units found to detect stress, facial recognition systems face rigorous testing, pharmaceutical counterfeiting rises, and library security guidelines are adopted.Gips, Michael A. et al. | 2001
- 14
-
Departments - NEWS AND TRENDS - A survey of crime trends in Asia, the Mideast, and Latin America; efforts to curb gas theft in Eastern Europe; monkey business at California zoos; and other news from the security trenches.Gips, Michael A. et al. | 2001
- 14
-
Departments - NEWS AND TRENDS - Putting mail rooms on guard against anthrax, building government efforts to fight bioterrorism, watching how a fire grows, and more.Gips, Michael A. et al. | 2001
- 14
-
NEWS AND TRENDS - Putting mail rooms on guard against anthrax, building government efforts to fight bioterrorism, watching how a fire grows, and more.Gips, Michael A. et al. | 2001
- 14
-
Experts ponder bioterror risks, a study looks at supply-chain losses, and moreGips, M. A. et al. | 2001
- 14
-
Departments - NEWS AND TRENDS - Evaluating prospects for Mexico, China, and Pakistan; decrying the drug war; slamming Internet filtering software; and getting a bird's eye view of espionage.Gips, Michael A. et al. | 2001
- 14
-
Departments - NEWS AND TRENDS - Experts ponder bioterror risks, a study looks at supply-chain losses, and more.Gips, Michael A. et al. | 2001
- 14
-
Departments - NEWS AND TRENDS - Items address whether portable defibrillators will spark liability claims, how a new alarm promises to repel intruders, and whether cage robberies in Las Vegas casinos are on the rise.Gips, Michael A. et al. | 2001
- 16
-
Departments - NEWS AND TRENDS - A vulnerability is found in fax machines and printers, power theft is assessed, terrorism numbers are released, jewelry crime is scrutinized, and much more.Gips, Michael A. et al. | 2001
- 20
-
Remote surveillance helps Holland monitor traffic on its canals, while across the ocean it helps a shoe store chain monitor customer traffic and employee performance| 2001
- 20
-
Departments - WORKING WISE - Remote surveillance helps Holland monitor traffic on its canals, while across the ocean it helps a shoe store chain monitor customer traffic and employee performance.| 2001
- 21
-
Departments - WORKING WISE - Ace Hardware tools up loss prevention, and Cal-ISO plugs into awareness training.| 2001
- 21
-
Ace Hardware tools up loss prevention, and Cal-ISO plugs into awareness training| 2001
- 22
-
WORKING WISE Software gets a risk review, and an Arizona newspaper gets a lock on the news| 2001
- 22
-
Departments - WORKING WISE - A shipping company takes on stowaways, and a department store welcomes digital video.| 2001
- 22
-
WORKING WISE A shipping company takes on stowaways, and a department store welcomes digital video| 2001
- 22
-
WORKING WISE - The Hawaii Convention Center juggles officer schedules, and a trucking company tracks stolen laptops.| 2001
- 22
-
Departments - WORKING WISE - Software gets a risk review, and an Arizona newspaper gets a lock on the news.| 2001
- 22
-
Departments - WORKING WISE - Iowa Health Systems protects its patient records, and a footwear company shoos away counterfeiters.| 2001
- 23
-
Departments - WORKING WISE - Application service provider M2M Matrix finds an easy way to provide secure access to online information and assets.| 2001
- 23
-
Departments - WORKING WISE - Mount Holyoke College adopts a one-card system, and Kraft revamps its visitor badging.| 2001
- 23
-
WORKING WISE. A research firm seeks to encrypt sensitive telephone calls, and a staffing services company tries out a test that helps identify aggressive tendencies| 2001
- 23
-
WORKING WISE - Application service provider M2M Matrix finds an easy way to provide secure access to online information and assets.| 2001
- 23
-
Application service provider M2M Matrix finds an easy way to provide secure access to online information and assets| 2001
- 23
-
Departments - WORKING WISE - A research firm seeks to encrypt sensitive telephone calls, and a staffing services company tries out a test that helps identify aggressive tendencies.| 2001
- 24
-
Departments - WORKING WISE - A service station goes digital, and a service firm for an oil company adds access control and metal detection.| 2001
- 25
-
A smile and an empathetic word can go a long way toward keeping tensions lowStiel, H. et al. | 2001
- 25
-
Departments - LEADING EDGE - A smile and an empathetic word can go a long way toward keeping tensions low.Stiel, Holly et al. | 2001
- 26
-
After a violent incident, managers must know how to deal with employees' emotions and other challengesBotting, J. M. et al. | 2001
- 26
-
Focusing on the internal customer is the best way for security to gain status and influence in the organizationHarrold, S. J. et al. | 2001
- 26
-
Departments - LEADING EDGE - A computer retailer discovers that three heads are better than one.Firsich, James et al. | 2001
- 26
-
Departments - LEADING EDGE - After a violent incident, managers must know how to deal with employees' emotions and other challenges.Botting, James M. et al. | 2001
- 26
-
Departments - LEADING EDGE - Mistakes are unavoidable, but negative consequences for managers aren't.Cottringer, William et al. | 2001
- 26
-
LEADING EDGE - Fostering leaders at all levels of an organization and encouraging workers to be active agents of change are crucial factors in the calculus of success.Samuel, Mark et al. | 2001
- 26
-
LEADING EDGE A computer retailer discovers that three heads are better than oneFirsich, J. et al. | 2001
- 26
-
LEADING EDGE Mistakes are unavoidable, but negative consequences for managers aren'tCottringer, W. et al. | 2001
- 26
-
LEADING EDGE - The Cleveland transit authority learned that it takes employee education to make even a state-of-the-art security system effective.Buckner, Bernard L. et al. | 2001
- 26
-
Fostering leaders at all levels of an organization and encouraging workers to be active agents of change are crucial factors in the calculus of successSamuel, M. et al. | 2001
- 26
-
Departments - LEADING EDGE - Focusing on the internal customer is the best way for security to gain status and influence in the organization.Harrold, Steven J. et al. | 2001
- 26
-
Departments - LEADING EDGE - Fostering leaders at all levels of an organization and encouraging workers to be active agents of change are crucial factors in the calculus of success.Samuel, Mark et al. | 2001
- 28
-
Departments - WORKING WISE - A retailer uses a Web site to attract security talent, and a biotechnology company puts a new spin on encryption.| 2001
- 28
-
Departments - LEADING EDGE - Jerks, blowhards, brats, and dark angels. Sound like your company? Learn how to get these disparate personalities to work together constructively.Robbins, Harvey et al. | 2001
- 28
-
LEADING EDGE Jerks, blowhards, brats, and dark angels. Sound like your company? Learn how to get these disparate personalities to work together constructivelyRobbins, H. / Finley, M. et al. | 2001
- 30
-
Managers should assess need before investing in a training programMager, R. F. et al. | 2001
- 30
-
Departments - LEADING EDGE - Managers should assess need before investing in a training program.Mager, Robert F. et al. | 2001
- 31
-
Departments - LEADING EDGE - How to get employees to embrace change.Besecker, Kenneth H. et al. | 2001
- 31
-
How to get employees to embrace changeBesecker, K. H. et al. | 2001
- 32
-
Departments - LEADING EDGE - "Skunk works" and other tactics can restart projects that have derailed.Mourier, Pierre et al. | 2001
- 32
-
TECH TALK New Linux worms, a report on industrial espionage, DoD's information security challenges, and other data from the binary worldPiazza, P. et al. | 2001
- 32
-
"Skunk works" and other tactics can restart projects that have derailedMourier, P. / Smith, M. et al. | 2001
- 32
-
Departments - TECH TALK - New Linux worms, a report on industrial espionage, DoD's information security challenges, and other data from the binary world.Piazza, Peter et al. | 2001
- 34
-
TECH TALK How public should public records be in the digital world? How should computers be legally searched and seized? How can business and the military learn from each other? Answers to these and other questions can be found hereinPiazza, P. et al. | 2001
- 34
-
A library discovers a different kind of reader, and a museum models system integration| 2001
- 34
-
Black-hat bees swarm Honeynet, insurance companies cover cyber losses, Web bugs infest the Net, and more digital dataPiazza, P. et al. | 2001
- 34
-
Departments - TECH TALK - A new recipe for cookies, e-mail virus developments, and jurisdictional challenges on the Internet.Piazza, Peter et al. | 2001
- 34
-
Departments - TECH TALK - How public should public records be in the digital world? How should computers be legally searched and seized? How can business and the military learn from each other? Answers to these and other questions can be found herein.Piazza, Peter et al. | 2001
- 34
-
Departments - LEADING EDGE - Forget yearly performance appraisals. The most effective feedback fits in with the flow of the employee's work cycle.Coens, Tom et al. | 2001
- 34
-
Departments - TECH TALK - Black-hat bees swarm Honeynet, insurance companies cover cyber losses, Web bugs infest the Net, and more digital data.Piazza, Peter et al. | 2001
- 34
-
Departments - WORKING WISE - A library discovers a different kind of reader, and a museum models system integration.| 2001
- 35
-
Exploits reveal the weakest IT link, NIST releases intrusion detection guide, a study estimates information loss, and morePiazza, P. et al. | 2001
- 35
-
TECH TALK - U.K. creates a new high-tech crime unit, SM checks in on the progress of a computer forensics lab, and other bits and bytes.Piazza, Peter et al. | 2001
- 35
-
Departments - TECH TALK - Exploits reveal the weakest IT link, NIST releases intrusion detection guide, a study estimates information loss, and more.Piazza, Peter et al. | 2001
- 35
-
TECH TALK Protecting against and monitoring for sensitive data leaks, uniting to fight online fraud, getting your software fix, and morePiazza, P. et al. | 2001
- 35
-
Who's liable for hack attacks? Who's setting security benchmarks? Find the answers to these and other critical questionsPiazza, P. et al. | 2001
- 35
-
Departments - TECH TALK - Protecting against and monitoring for sensitive data leaks, uniting to fight online fraud, getting your software fix, and more.Piazza, Peter et al. | 2001
- 35
-
Departments - TECH TALK - Who's liable for hack attacks? Who's setting security benchmarks? Find the answers to these and other critical questions.Piazza, Peter et al. | 2001
- 37
-
Departments - TECH TALK - Experts give advice on laptop security, a Florida county tracks traveling criminals, a paper discusses distributed denial of service attacks, and more for the developing digerati.Piazza, Peter et al. | 2001
- 39
-
Departments - TECH TALK - Two more efforts to create computer security best practices, auditors blast infrastructure protection efforts, a company turns the tables on crackers, and other pitstops on the information superhighway.Piazza, Peter et al. | 2001
- 40
-
Departments - TECH TALK - A new cybercrime treaty raises concerns, a report questions oil and gas infrastructure security, an online privacy standard is proposed, and the Choke worm throttles instant messaging.Piazza, Peter et al. | 2001
- 40
-
A new cybercrime treaty raises concerns, a report questions oil and gas infrastructure security, an online privacy standard is proposed, and the Choke worm throttles instant messagingPiazza, P. et al. | 2001
- 42
-
Features - DISASTER MANAGEMENT - ANTICIPATING THE WORST OF TIMES - By planning for the worst of times, these public and private organizations are learning how to be at their best when it counts most.Jones, Radford et al. | 2001
- 42
-
SQUARE GETS HIP TO PROTECTIONMartin, P. D. et al. | 2001
- 42
-
ABOUT THE COVER - Poorly selected protection specialists create the dangerous illusion of security. Companies looking to, protect their top executives must thoroughly investigate the training and experience of contract agents lest they place the lives of top management in unqualified hands.| 2001
- 42
-
ABOUT THE COVER - Seemingly innocent family photos may be used by an employee to covertly send proprietary information to competitors via e-mail. Companies must know how to follow the e-mail trail whenever e-mail use arouses suspicions.Mahurin, Matt et al. | 2001
- 42
-
ABOUT THE COVER - Bank robbers, like regular customers, frequent locations where they feel welcome. Find out how one Canadian bank changed its floor plan and procedures to convince robbers to take their business elsewhere.Smith, Owen et al. | 2001
- 42
-
LEAVING ROBBERS BARREN Robberies today are less numerous but more violent. Find out how one Canadian bank is battling backAbraham, B. R. / Baldassaro, P. J. et al. | 2001
- 42
-
Features - BUSINESS CONTINUITY - REBUILDING ON SECURITY'S SOLID FOUNDATION - What are companies doing in the wake of September 11, and what preliminary lessons have been learned?Harowitz, Sherry L. et al. | 2001
- 42
-
IS YOUR VIP PROTECTED? Bodyguards are plentiful, but not all of them are well trained. How can you be sure you are getting the best?Nichter, D. A. et al. | 2001
- 42
-
Features - COMPUTER SECURITY - TIPS FOR TRACKING THE E-MAIL TRAIL - Investigating the origin of e-mail to catch criminals requires special skills and tools.Poole, Tim et al. | 2001
- 42
-
Features - EXECUTIVE PROTECTION - IS YOUR VIP PROTECTED? - Bodyguards are plentiful, but not all of them are well trained. How can you be sure you are getting the best?Nichter, D.Anthony et al. | 2001
- 42
-
ANTICIPATING THE WORST OF TIMES By planning for the worst of times, these public and private organizations are learning how to be at their best when it counts mostJones, R. et al. | 2001
- 42
-
REBUILDING ON SECURITY'S SOLID FOUNDATION What are companies doing in the wake of September 11, and what preliminary lessons have been learned?Harowitz, S. L. et al. | 2001
- 42
-
Features - FINANCIAL SERVICES - LEAVING ROBBERS BARREN - Robberies today are less numerous but more violent. Find out how one Canadian bank is battling backAbraham, Brian R. et al. | 2001
- 42
-
Features - PHYSICAL SECURITY - SQUARE GETS HIP TO PROTECTION - With a name like Security Square Mall, the team at this property has added incentive to create a safe milieu for shoppers.Martin, Paul D. et al. | 2001
- 42
-
TIPS FOR TRACKING THE E-MAIL TRAIL Investigating the origin of e-mail to catch criminals requires special skills and toolsPoole, T. / Hansen, J. et al. | 2001
- 44
-
STEALING THE SHOW - Find out how to protect against information collection efforts that competitors might target at staff attending trade shows.Nolan III, John A. et al. | 2001
- 44
-
RAILING AGAINST THE WEATHER How Burlington Northern Santa Fe railroad carries on its business despite a range of daunting weather conditionsGips, M. A. et al. | 2001
- 44
-
About the Cover - Every crime has a crime scene that can be scoured for clues. But sometimes the evidence isn't a bloodstain or a carpet fiber. It is the data in a computer. In those cases, investigators must coax secrets from the silicon chips.Bradford, Stuart et al. | 2001
- 44
-
HIGH-TECH HOLMES Deductive reasoning is still at the heart of any investigation, but when computer crimes are involved, it helps to know how to sift through the data bitsWright, J. et al. | 2001
- 44
-
Features - INVESTIGATIONS - HIGH-TECH HOLMES - Deductive reasoning is still at the heart of any investigation, but when computer crimes are involved, it helps to know how to sift through the data bits.Wright, Jon et al. | 2001
- 44
-
Features - BUSINESS CONTINUITY - RAILING AGAINST THE WEATHER - How Burlington Northern Santa Fe railroad carries on its business despite a range of daunting weather conditions.Gips, Michael A. et al. | 2001
- 46
-
CURING PRIVACY PROBLEMS How one healthcare organization is tackling new privacy regulationsAnderson, T. et al. | 2001
- 46
-
Features - HIPAA-HEALTHCARE - CURING PRIVACY PROBLEMS - How one healthcare organization is tackling new privacy regulations.Anderson, Teresa et al. | 2001
- 48
-
ABOUT THE COVER - When today's hotel guests ask a concierge for directions, they won't just get a map, they'll get advice on the safest routes as well -- Just one of the ways in which security is playing a role in the tourism industry.Sanford, Susan et al. | 2001
- 48
-
Features - TOURISM INDUSTRY - A SITE TO SEE - The tourism industry is flourishing, and the security function is playing an important role.Tarlow, Peter E. et al. | 2001
- 48
-
A SITE TO SEE The tourism industry is flourishing, and the security function is playing an important roleTarlow, P. E. et al. | 2001
- 48
-
WHERE HAVE ALL THE BELLMEN GONE? Since introducing new security software, the Pheasant Run Resort has improved its ability to document and assess security incidents ranging from absent bellmen to injured guestsGips, M. A. et al. | 2001
- 48
-
Features - BUSINESS PRACTICES - WHERE HAVE ALL THE BELLMEN GONE? - Since introducing new security software, the Pheasant Run Resort has improved its ability to document and assess security incidents ranging from absent bellmen to injured guests.Gips, Michael A. et al. | 2001
- 49
-
WAIVE GOODBYE TO LIABILITY Before parties enter into penetration testing of a computer network, they should document the scope of work and address the legal concerns to avoid liability down the roadBumgarner, J. N. et al. | 2001
- 49
-
Features - COMPUTER SECURITY - WAIVE GOODBYE TO LIABILITY - Before parties enter into penetration testing of a computer network, they should document the scope of work and address the legal concerns to avoid liability down the road.Bumgarner, John N. et al. | 2001
- 50
-
Features - SPECIAL FEATURE - ABSTRACT PROTECTIONISM - Though their origins could hardly be more different, the San Antonio Museum of Art and the Marion Koogler McNay Art Museum share many of the same challenges.Gips, Michael A. et al. | 2001
- 50
-
THEY'LL SUE...AND WHAT WILL YOU DO? Good records are just one of the ways in which companies can protect themselves against claims of negligent security, as these cases illustrateRay, D. L. et al. | 2001
- 50
-
Features - LEGAL ISSUES - THEY'LL SUE...AND WHAT WILL YOU DO? - Good records are just one of the ways in which companies can protect themselves against claims of negligent security, as these cases illustrate.Ray, David L. et al. | 2001
- 50
-
ABSTRACT PROTECTIONISM Though their origins could hardly be more different, the San Antonio Museum of Art and the Marion Koogler McNay Art Museum share many of the same challengesGips, M. A. et al. | 2001
- 51
-
THE TREASURE IN RISK MAPPING Risk mapping can help security managers communicate the security picture to senior executivesPhelps, E. F. et al. | 2001
- 51
-
Features - BUSINESS CONTINUITY - THE TREASURE IN RISK MAPPING - Risk mapping can help security managers communicate the security picture to senior executives.Phelps, E.Floyd et al. | 2001
- 53
-
AIRING OUT YOUR CRISIS PLAN A gas leak gave one hospital a chance to test its disaster management planSteiner, P. J. et al. | 2001
- 53
-
DO YOUR SECRETS PASS THE TEST? - To make sure that trade secrets are protected by the law companies must meet these legal standards.Halligan, R.Mark et al. | 2001
- 53
-
Features - DISASTER MANAGEMENT - AIRING OUT YOUR CRISIS PLAN - A gas leak gave one hospital a chance to test its disaster management plan.Steiner Jr, Paul J. et al. | 2001
- 53
-
Features - SPECIAL PULL-OUT SECTION - SECURITY EDUCATION PREVIEW| 2001
- 54
-
Features - HIRING HURDLES - HIRE POWER - Hiring requires more than placing an ad. Find out how this company successfully managed the process during a tight job market.Markwood, Susan et al. | 2001
- 54
-
HIRE POWER Hiring requires more than placing an ad. Find out how this company successfully managed the process during a tight job marketMarkwood, S. / Kingman, B. J. et al. | 2001
- 55
-
TECH TALK - Web parasites that steal computer Processing power, information technology weaknesses that also raise liability risks, a Web site that monitors online myths and hoaxes, and other digital dispatches.Piazza, Peter et al. | 2001
- 55
-
Departments - TECH TALK - Web parasites that steal computer processing power, information technology weaknesses that also raise liability risks, a Web site that monitors online myths and hoaxes, and other digital dispatches.Piazza, Peter et al. | 2001
- 55
-
Features - TRAINING - PRACTICE WHAT YOU TEACH - Role playing and penetration testing are two effective ways to train security and nonsecurity personnel alike.Kane, Patrick R. et al. | 2001
- 55
-
PRACTICE WHAT YOU TEACH Role-playing and penetration testing are two effective ways to train security and nonsecurity personnel alikeKane, P. R. et al. | 2001
- 56
-
Features - ACCESS CONTROL - DESIGNING A SAFE HOUSE FOR DATA - As the repository for a company's computer information and equipment, a data center has special security needs.Reese, Lloyd F. et al. | 2001
- 56
-
DESIGNING A SAFE HOUSE FOR DATA As the repository for a company's computer information and equipment, a data center has special security needsReese, L. F. et al. | 2001
- 58
-
A JOB WELL DONE The protective services department at this hospital has found a way to motivate employeesMorris, R. J. et al. | 2001
- 58
-
Features - HEALTHCARE - A JOB WELL DONE - The protective services department at this hospital has found a way to motivate employees.Morris, Ronald J. et al. | 2001
- 59
-
Features - LEGAL ISSUES - NOT GUILTY AS CHARGED - What happens when employees are not guilty as charged? Often, the company pays dearly for improperly investigating the allegations.Rosen, Mark et al. | 2001
- 59
-
NOT GUILTY AS CHARGEDRosen, M. et al. | 2001
- 60
-
Features - SPECIAL FOCUS: SCHOOL SECURITY - THE LATEST SCHOOL OF THOUGHT - Find out how schools are applying security concepts to improve staff and student protection -- And where progress remains to be made.Trump, Kenneth S. et al. | 2001
- 60
-
THE LATEST SCHOOL OF THOUGHT Find out how schools are applying security concepts to improve staff and student protection-and where progress remains to be madeTrump, K. S. et al. | 2001
- 62
-
A MAMMOTH PROTECTION TASK. How Oklahoma's new natural history museum protects its six million artifacts, including a mammoth and a 40-foot-long SaurophaganaxMustoe, J. L. et al. | 2001
- 62
-
Features - NOT GUILTY BY REASON OF SECURITY - It is possible to minimize the risk of negligent security claims by developing and implementing the right prevention strategy.Lombardi, John H. et al. | 2001
- 62
-
AN OUNCE OF PREVENTION AND A POUND OF PLANNING A forward-looking approach can help a company identify and head off potential problems before they reach the crisis stageNicklin, R. E. et al. | 2001
- 62
-
MUSEUM SECURITY - A MAMMOTH PROTECTION TASK - How Oklahoma's new natural history museum protects its six million artifacts, including a mammoth and a 40-foot-long Saurophaganax.Mustoe, James L. et al. | 2001
- 62
-
NOT GUILTY BY REASON OF SECURITY It is possible to minimize the risk of negligent security claims by developing and implementing the right prevention strategyLombardi, J. H. et al. | 2001
- 62
-
Features - CONTINGENCY PLANNING - AN OUNCE OF PREVENTION AND A POUND OF PLANNING - A forward-looking approach can help a company identify and head off potential problems before they reach the crisis stage.Nicklin, Roger E. et al. | 2001
- 64
-
PERIMETER SECURITY - DO FENCE ME IN - Whether it's terrorism or an assault in the parking lot, the response should be measured and targeted to the risk.Lowers, Mark et al. | 2001
- 64
-
THE HOSTILE CUSTOMER AND OTHER GRIM TALESAnderson, T. et al. | 2001
- 64
-
DO FENCE ME IN Whether it's terrorism or an assault in the parking lot, the response should be measured and targeted to the riskLowers, M. / Raker, T. / Rodgers, J. et al. | 2001
- 64
-
Features - PERIMETER SECURITY - DO FENCE ME IN - Whether it's terrorism or an assault in the parking lot, the response should be measured and targeted to the risk.Lowers, Mark et al. | 2001
- 64
-
Features - SEMINAR AND EXHIBITS PREVIEW - THE HOSTILE CUSTOMER AND OTHER GRIM TALES - Check out this sneak preview of four seminar sessions, including discussions of workplace violence and school security.Anderson, Teresa et al. | 2001
- 65
-
Features - BUSINESS PRACTICES - SHARING THE WEALTH OF KNOWLEDGE - When companies adopt and share good business practices, the benefits for all include improved procedures, loss reduction, and employee protection.Longmore-Etheridge, Ann et al. | 2001
- 65
-
SHARING THE WEALTH OF KNOWLEDGE When companies adopt and share good business practices, the benefits for all include improved procedures, loss reduction, and employee protectionLongmore-Etheridge, A. et al. | 2001
- 65
-
Features - TRAINING - NOT BY FORCE ALONE - Security officers need more than just physical self-defense techniques; a thorough knowledge of conflict-avoidance strategies, company policy, and street tactics is essential as well.Haynes, Richard A. et al. | 2001
- 65
-
NOT BY FORCE ALONE Security officers need more than just physical self-defense techniquesHaynes, R. A. et al. | 2001
- 66
-
PUTTING PAYDAY IN PERSPECTIVE Find out what the numbers from the latest ASIS employment survey revealAnderson, T. et al. | 2001
- 66
-
EMPLOYMENT SURVEY - PUTTING PAYDAY IN PERSPECTIVE - Find out what the numbers from the latest ASIS employment survey reveal.Anderson, Teresa et al. | 2001
- 66
-
Features - COMPUTER SECURITY - HASHING OUT ENCRYPTION SOLUTIONS - Find out how three encryption solutions stacked up when this company ran them through their paces.Bumgarner, John N. et al. | 2001
- 66
-
HASHING OUT ENCRYPTION SOLUTIONSBumgarner, J. N. et al. | 2001
- 68
-
Features - SPECIAL FOCUS: SCHOOL SECURITY - SCOURGE OF THE SCHOOLYARD - Bullying, dismissed by some adults as harmless bluster, is now recognized as a root cause of violence. To combat the problem, some schools are implementing "bullyproofing' programs.Piazza, Peter et al. | 2001
- 68
-
SCOURGE OF THE SCHOOLYARD Bullying, dismissed by some adults as harmless bluster, is now recognized as a root cause of violence. To combat the problem, some schools are implementing "bullyproofing" programsPiazza, P. et al. | 2001
- 69
-
Features - CONTINGENCY PLANNING - ESTABLISHING COMMUNICATION ACROSS THE POLITICAL DIVIDE - How the two political conventions kept the lines of communication open for security operations.Walters, Dennis H. et al. | 2001
- 69
-
REVISITING VISITOR BADGING - Emerging technologies may make it possible to have visitor access controls that work as smoothly as those for employees.Reed, Richard B. et al. | 2001
- 69
-
ESTABLISHING COMMUNICATION ACROSS THE POLITICAL DIVIDE How the two political conventions kept the lines of communication open for security operationsWalters, D. H. et al. | 2001
- 70
-
BAGGING PROFITS INSTEAD OF THIEVES Find out how retailers are keeping shoplifters and employees from pocketing the goodsLongmore-Etheridge, A. et al. | 2001
- 70
-
Features - RETAIL - BAGGING PROFITS INSTEAD OF THIEVES - Find out how retailers are keeping shoplifters and employees from pocketing the goods.Longmore-Etheridge, Ann et al. | 2001
- 70
-
Features - MANAGEMENT - ZEN AND THE ART OF SECURITY MAINTENANCE - Starbucks' security team strives to master the fine art of maintaining security against the back-drop of the host of threats the company faces.D'Addario, Francis J. et al. | 2001
- 70
-
ZEN AND THE ART OF SECURITY MAINTENANCE Starbucks' security team strives to master the fine art of maintaining security against the backdrop of the host of threats the company facesD Addario, F. J. et al. | 2001
- 72
-
SYSTEM INTEGRATION - AN INTEGRATED CURE - An integrated security system helped this hospital to lock down without becoming inhospitable to guests.Piazza, Peter et al. | 2001
- 72
-
BACKGROUND CHECKS STEP BY STEP Companies need to understand the rules for conducting criminal background checks so that they can do them legally to help in hiring decisionsLong, J. W. et al. | 2001
- 72
-
Features - COMPUTER SECURITY - E-SIGNED, SEALED, AND DELIVERED - Two very different institutions roll out public key infrastructures to authenticate users and protect confidential information.Piazza, Peter et al. | 2001
- 72
-
LODGING NO COMPLAINTSCallaghan, C. et al. | 2001
- 72
-
Features - LOSS PREVENTION - BACKGROUND CHECKS STEP BY STEP - Companies need to understand the rules for conducting criminal background checks so that they can do them legally to help in hiring decisions.Long, John W. et al. | 2001
- 72
-
IDENTITY THEFT - HOW TO AVOID AN IDENTITY CRISIS - Businesses can win the esteem of their employees and improve the bottom line by helping staff prevent or deal with identity theft.Grosso, Robert J.Del et al. | 2001
- 72
-
Features - IDENTITY THEFT - HOW TO AVOID AN IDENTITY CRISIS - Businesses can win the esteem of their employees and improve the bottom line by helping staff prevent or deal with identity theft.Grosso, Robert J.Del et al. | 2001
- 72
-
E-SIGNED, SEALED, AND DELIVERED Two very different institutions roll out public key infrastructures to authenticate users and protect confidential informationPiazza, P. et al. | 2001
- 72
-
AN INTEGRATED CURE An integrated security system helped this hospital to lock down without becoming inhospitable to guestsPiazza, P. et al. | 2001
- 72
-
Features - SPECIAL FOCUS ON THEMED ENTERTAINMENT - LODGING NO COMPLAINTS - Lodging industry solutions must continually evolve to meet changing threats. Practitioners are meeting the challenge.Callaghan, Chad et al. | 2001
- 72
-
HOW TO AVOID AN IDENTITY CRISISDel Grosso, R. J. et al. | 2001
- 74
-
ASSESSING U.S. COUNTERTERRORISM EFFORTSBremer, L. P. et al. | 2001
- 74
-
ASSESSING U.S. COUNTERTERRORISM EFFORTS - This article examines the latest commission report recommendations along with subsequent developments.Bremer III, L.Paul et al. | 2001
- 75
-
A NEW SYLLABUS FOR BETTER SECURITY The Milton Hershey School offers a sweet deal to its live-in student body, and a secure environment as wellPremo, R. et al. | 2001
- 75
-
Features - SPECIAL FOCUS: SCHOOL SECURITY - A NEW SYLLABUS FOR BETTER SECURITY - The Milton Hershey School offers a sweet deal to its live-in student body, and a secure environment as well.Premo, Rita et al. | 2001
- 76
-
Features - BUSINESS CONTINUITY - WHAT IF THE VIRTUAL WALLS FALL? - Traditional contingency planning is as critical for e-commerce as it is for bricks-and-mortar establishments.Klein, Dan et al. | 2001
- 76
-
WHAT IF THE VIRTUAL WALLS FALL? Traditional contingency planning is as critical for e-commerce as it is for bricks-and-mortar establishmentsKlein, D. / Canfield-Woods, B. / Piazza, P. et al. | 2001
- 78
-
LET'S GET DIGITAL Thinking about making the transition to digital CCTV? Here's an overview of considerations and trendsGips, M. A. et al. | 2001
- 78
-
Features - LEGISLATIVE UPDATE - AFFAIRS OF STATE - Identity theft, privacy, and retail security were some of the important issues on the minds of state lawmakers in 2000.Anderson, Teresa et al. | 2001
- 78
-
AFFAIRS OF STATE Identity theft, privacy, and retail security were some of the important issues on the minds of state lawmakers in 2000Anderson, T. et al. | 2001
- 78
-
Features - CCTV ADVANCES - LET'S GET DIGITAL - Thinking about making the transition to digital CCTV? Here's an overview of considerations and trends.Gips, Michael A. et al. | 2001
- 78
-
Features - PHYSICAL SECURITY - TAKING PARKING PROTECTION TO THE NEXT LEVEL - Over the past 10 years, the Johns Hopkins Medical Institutions has made concerted efforts to enhance security in its parking facilities.Coppola, Joseph R. et al. | 2001
- 78
-
TAKING PARKING PROTECTION TO THE NEXT LEVELCoppola, J. R. / Cohen, L. J. / Economas, G. et al. | 2001
- 79
-
Features - SPECIAL FOCUS ON THEMED ENTERTAINMENT - RUNNING ON MANUAL - To carry out the rules and regulations of the gaming industry, security needs a manual that's a sure thing.Boynton, Randall S. et al. | 2001
- 79
-
RUNNING ON MANUALBoynton, R. S. et al. | 2001
- 80
-
Features - INSURANCE - STAGING A FRAUD FIGHT - From the national to the local level, regulators and private security are coordinating their efforts to beat back insurance scam artists.Longmore-Etheridge, Ann et al. | 2001
- 80
-
STAGING A FRAUD FIGHT From the national to the local level, regulators and private security are coordinating their efforts to beat back insurance scam artistsLongmore-Etheridge, A. et al. | 2001
- 80
-
INSURANCE - STAGING A FRAUD FIGHT - From the national to the local level, regulators and private security are coordinating their efforts to beat back insurance scam artists.Longmore-Etheridge, Ann et al. | 2001
- 80
-
A Missouri appeals court rules that a contract security provider can't be held liable for the criminal actions of an employeeAnderson, T. et al. | 2001
- 80
-
Departments - LEGAL REPORTER - A Missouri appeals court rules that a contract security provider can't be held liable for the criminal actions of an employee, the Arkansas Supreme Court makes law on trade secrets, OSHA issues a final ergonomics rule, and more.Anderson, Teresa et al. | 2001
- 81
-
MARITIME UPDATE - DON'T GIVE UP THE SHIP - Piracy and other attacks are up, but almost as troubling as the violence itself are the roiling legal waters into which an incident can plunge a carrier.Hawkes, Kenneth Gale et al. | 2001
- 81
-
DON'T GIVE UP THE SHIP Piracy and other attacks are up, but almost as troubling as the violence itself are the roiling legal waters into which an incident can plunge a carrierHawkes, K. G. et al. | 2001
- 83
-
ASK AND YE MAY GET SUED - Knowing when it's okay to ask about a disability in the workplace is crucial. The EEOC offers guidance.Bland, Timothy S. et al. | 2001
- 84
-
PROFILE OF AN ATTRACTIVE MODELAddlesberger, R. T. et al. | 2001
- 84
-
Features - MANAGEMENT - PROFILE OF AN ATTRACTIVE MODEL - How security operations are modeled within the card manufacturing industry holds lessons for other industries as well.Addlesberger, Robert T. et al. | 2001
- 85
-
Features - MANAGEMENT - HOW TO HIGHLIGHT SECURITY'S STRATEGIC VALUE - Without executive support, security initiatives are doomed. Find out how to get the support you need.Smith Jr, Nicholas A. et al. | 2001
- 85
-
MARKED IMPROVEMENT By using marking technology, companies can improve inventory tracking and loss controlViggiani, P. et al. | 2001
- 85
-
HOW TO HIGHLIGHT SECURITY'S STRATEGIC VALUE Without executive support, security initiatives are doomed. Find out how to get the support you needSmith, N. A. et al. | 2001
- 85
-
Features - INVENTORY TRACKING - MARKED IMPROVEMENT - By using marking technology, companies can improve inventory tracking and loss control.Viggiani, Phil et al. | 2001
- 87
-
Departments - INDEX TO ADVERTISERS| 2001
- 87
-
HIGH WIRELESS ACT In the rush to use these wireless communications, security is often an afterthought rather than an integral design requirementBiery, K. / Hager, D. M. et al. | 2001
- 87
-
THE SURE HAND OF SURVEILLANCE At casinos, audits by surveillance investigators are the key to deterring employee theftBoss, D. J. / Florence, D. L. et al. | 2001
- 87
-
GAMING - THE SURE HAND OF SURVEILLANCE - At casinos, audits by surveillance investigators are the key to deterring employee theft.Boss, Derk J. et al. | 2001
- 87
-
TELECOMMUNICATIONS - HIGH WIRELESS ACT - In the rush to use these wireless communications, security is often an afterthought rather than an integral design requirement.Biery Jr, Ken et al. | 2001
- 87
-
Features - TELECOMMUNICATIONS - HIGH WIRELESS ACT - In the rush to use these wireless communications, security is often an afterthought rather than an integral design requirement.Biery Jr, Ken et al. | 2001
- 88
-
DON'T LET YOUR GUARD DOWN Follow these simple steps to improve the management of contract guardsVellani, K. H. et al. | 2001
- 88
-
Features - MANAGEMENT - DON'T LET YOUR GUARD DOWN - Follow these simple steps to improve the management of contract guards.Vellani, Karim H. et al. | 2001
- 90
-
Departments - LEGAL REPORTER - A state high court finds a retailer liable for failing to protect an employee from a customer, Congress looks at body armor and fire safety, and various other legal notes.Anderson, Teresa et al. | 2001
- 90
-
A state high court finds a retailer liable for failing to protect an employee from a customer, Congress looks at body armor and fire safety, and various other legal notesAnderson, T. et al. | 2001
- 91
-
Departments - REVIEWS - Experts review two books on information systems security and a CD-ROM that teaches preemployment interview techniques.| 2001
- 91
-
Features - INTERNATIONAL - YOU'RE NOT IN KANSAS ANYMORE - Conducting investigations in countries with diverse cultures requires careful attention to customs and laws.Turner, Jonathan E. et al. | 2001
- 91
-
LIGHTING THE WAY TO FIRE INTEGRATION The integration of fire systems into the security systems can save 10 to 15 percent, but it must be carefully planned to avoid problemsMoore, W. D. / Wilson, D. K. et al. | 2001
- 91
-
FROM THE GROUND UP How Georgia Tech revamped its access control systemLang, R. F. et al. | 2001
- 91
-
Features - SYSTEM INTEGRATION - LIGHTING THE WAY TO FIRE INTEGRATION - The integration of fire systems into the security systems can save 10 to 15 percent, but it must be carefully planned to avoid problems.Moore, Wayne D. et al. | 2001
- 91
-
Features - CAMPUS SECURITY - FROM THE GROUND UP - How Georgia Tech revamped its access control system.Lang, Robert F. et al. | 2001
- 91
-
YOU'RE NOT IN KANSAS ANYMORE Conducting investigations in countries with diverse cultures requires careful attention to customs and lawsTurner, J. E. et al. | 2001
- 92
-
WHO'S ON BOARD? - Illegal immigrants are increasingly trying to come ashore via ships, and that can create major problems for carriers unless security develops adequate prevention measures.Hawkes, Kenneth Gale et al. | 2001
- 93
-
WHICH WAY TO BETTER CONTROLS? Find out where access control trends are heading in this look at the landscapeStrauchs, J. J. et al. | 2001
- 93
-
Features - EXECUTIVE PROTECTION - ALL THE WORLD'S A STAGING GROUND - While contingency planning is important in executive protection, it should not be implemented at the expense of threat assessment and advance planning.Bowron, Eljay et al. | 2001
- 93
-
ALL THE WORLD'S A STAGING GROUND While contingency planning is important in executive protection, it should not be implemented at the expense of threat assessment and advance planningBowron, E. et al. | 2001
- 93
-
Departments - MARKETPLACE - Here's the place to shop for motorized drive cameras, video matrix switchers, smoke control systems, fence sensors, garage booths, and a wide variety of other security products.| 2001
- 93
-
Features - ACCESS CONTROL - WHICH WAY TO BETTER CONTROLS? - Find out where access control trends are heading in this look at the landscape.Strauchs, John J. et al. | 2001
- 93
-
SAFEGUARDING INFORMATION - IT'S NOT WHAT YOU KNOW - It's not what you know, it's how you protect it. Find out how one company keeps data secure.Gohm, Pete van de et al. | 2001
- 93
-
IT'S NOT WHAT YOU KNOW It's not what you know, it's how you protect it. Find out how one company keeps data securevan de Gohm, P. et al. | 2001
- 94
-
Features - ASIS SEMINAR & EXHIBITS - WORKING TOWARD A SECURE TOMORROW - The ASIS 47th Annual Seminar and Exhibits combined cutting-edge technologies, innovative presentations, professional networking, and top-notch entertainment.| 2001
- 94
-
WORKING TOWARD A SECURE TOMORROW| 2001
- 94
-
ASIS SEMINAR & EXHIBITS - WORKING TOWARD A SECURE TOMORROW - The ASIS 47th Annual Seminar and Exhibits combined cutting-edge technologies, innovative presentations, professional networking, and top-notch entertainment.| 2001
- 95
-
Features - AIRPORT SECURITY - DO DETECTION TECHNOLOGIES FLY? - The FAA has rolled out new technologies for tests at U.S. airports.Rao, Ed et al. | 2001
- 95
-
DO DETECTION TECHNOLOGIES FLY? The FAA has rolled out new technologies for tests at U.S. airportsRao, E. / Binzoni, F. et al. | 2001
- 96
-
California's high court authorizes a school security officer to stop a student without reasonable suspicion of wrongdoing, Congress takes on terrorism and privacy, and more from the legislatures and courtsAnderson, T. et al. | 2001
- 96
-
Departments - LEGAL REPORTER - California's high court authorizes a school security officer to stop a student without reasonable suspicion of wrongdoing, Congress takes on terrorism and privacy, and more from the legislatures and courts.Anderson, Teresa et al. | 2001
- 97
-
Features - HEALTHCARE - A DOSE OF RELIABLE DATA - An ASIS healthcare study serves as the starting point for future research and as a guide for industry practitioners.Gulinello, Joseph J. et al. | 2001
- 97
-
A DOSE OF RELIABLE DATA An ASIS healthcare study serves as the starting point for future research and as a guide for industry practitionersGulinello, J. J. et al. | 2001
- 98
-
WHEN A DOOR CLOSES Special challenges accompany a museum's final days in an old facilityYee, G. et al. | 2001
- 98
-
MUSEUM SECURITY - WHEN A DOOR CLOSES - Special challenges accompany a museum's final days in an old facility.Yee, Gary et al. | 2001
- 99
-
SPECIAL PULL-OUT SECTION - 2001 SECURITY MANAGEMENT INDEX - Save this handy listing of topics covered in the magazine this year.| 2001
- 99
-
Features - SPECIAL PULL-OUT SECTION - 2001 SECURITY MANAGEMENT INDEX - Save this handy listing of topics covered in the magazine this year.| 2001
- 100
-
Departments - REVIEWS - Information security is compared to cell regeneration, a mixed picture is painted of an art theft book, and works on British security, executive protection, and fire safety are praised.| 2001
- 101
-
I JUST WANT IT TO STOP. Companies can reduce the damage sexual harassment causes in the workplace by responding quickly and professionallyMillwee, S. C. et al. | 2001
- 101
-
HAPPY TRAILS Follow these four points to map out a successful corporate travel security programCremin, B. et al. | 2001
- 101
-
Features - TRAVEL SECURITY - HAPPY TRAILS - Follow these four points to map out a successful corporate travel security program.Cremin, Brian et al. | 2001
- 101
-
INVESTIGATIONS - I JUST WANT IT TO STOP - Companies can reduce the damage sexual harassment causes in the workplace by responding quickly and professionally.Millwee, Steven C. et al. | 2001
- 102
-
OF SHIPS AND SAILS AND SECURITY TALES Battery Park's security team faced up to the tall challenge of protecting OpSail 2000's tall ship extravaganzaHarper, S. E. et al. | 2001
- 102
-
Features - SPECIAL EVENTS - OF SHIPS AND SAILS AND SECURITY TALES - Battery Park's security team faced up to the tall challenge of protecting OpSail 2000's tall ship extravaganza.Harper, Steven Edward et al. | 2001
- 103
-
A Pennsylvania company fends off an ADA claim, an Illinois company loses a case because of a confusing sexual harassment policy, plus other cases, regulations, and legislationAnderson, T. et al. | 2001
- 103
-
Departments - INDUSTRY FOCUS - ASIS thanks corporate, chapter, and individual contributors to the Foundation.| 2001
- 103
-
Departments - LEGAL REPORTER - A Pennsylvania company fends off an ADA claim, an Illinois company loses a case because of a confusing sexual harassment policy, plus other cases, regulations, and legislation.Anderson, Teresa et al. | 2001
- 105
-
I LOVE PARIS WHEN IT'S GAMING The Paris Las Vegas's efforts to balance surveillance with aesthetics provide lessons for any casinoAnderson, N. J. et al. | 2001
- 105
-
Features - GAMING - I LOVE PARIS WHEN IT'S GAMING - The Paris Las Vegas's efforts to balance surveillance with aesthetics provide lessons for any casino.Anderson, Nanci Jo et al. | 2001
- 105
-
Departments - LEGAL REPORTER - Can an employer be held liable for filing a truthful report to police about a potentially violent employee? Also, bills on terrorism, school safety, and e-mail.Anderson, Teresa et al. | 2001
- 105
-
LEGAL REPORTER Can an employer be held liable for filing a truthful report to police about a potentially violent employee? Also, bills on terrorism, school safety, and e-mailAnderson, T. et al. | 2001
- 106
-
Departments - REVIEWS - Timely works on Usama bin Laden and identity theft are reviewed, as is a text on management skills for IT professionals.| 2001
- 107
-
CODE RED As virus writers get more creative, anti-virus techniques must shift from reactive to preventive methods that can limit the potential damage to a networkGruper, S. / Elzam, O. et al. | 2001
- 107
-
HARD PROBLEMS, SOFTWARE SOLUTIONS A museum, a hospital, and a major corporation each found just the right software to reduce management mayhemLongmore-Etheridge, A. et al. | 2001
- 107
-
Features - MANAGEMENT - HARD PROBLEMS, SOFTWARE SOLUTIONS - A museum, a hospital, and a major corporation each found just the right software to reduce management mayhem.Longmore-Etheridge, Ann et al. | 2001
- 107
-
Features - COMPUTER SECURITY - CODE RED - As virus writers get more creative, anti-virus techniques must shift from reactive to preventive methods that can limit the potential damage to a network.Gruper, Shimon et al. | 2001
- 108
-
Features - SPECIAL EVENTS - STAGING A SUCCESSFUL PERFORMANCE - Find out how to stage a security success before hosting your next special event.Nichter, D.Anthony et al. | 2001
- 108
-
Departments - MARKETPLACE - Shop for officer-scheduling software, fire alarm management systems, cargo seals, and CD-ROM destroyers among an array of security wares.| 2001
- 108
-
Books on information warfare, CCTV, and Windows security get two thumbs up, but mixed reviews for a treatise on terrorism| 2001
- 108
-
Departments - REVIEWS - Books on information warfare, CCTV, and Windows security get two thumbs up, but mixed reviews for a treatise on terrorism.| 2001
- 108
-
STAGING A SUCCESSFUL PERFORMANCE Find out how to stage a security success before hosting your next special eventNichter, D. A. et al. | 2001
- 108
-
Departments - ASIS SEMINAR & EXHIBITS PRODUCT SHOWCASE - Seventy-five items on display at the ASIS 47th Annual Seminar and Exhibits are showcased, including digital video systems, emergency phone towers, and shredders.| 2001
- 109
-
KNOCKING OUT OPPORTUNITY. By implementing strong internal controls, security managers can keep opportunity for theft from knocking profits downFrank, C. et al. | 2001
- 109
-
LOSS PREVENTION - KNOCKING OUT OPPORTUNITY - By implementing strong internal controls, security managers can keep opportunity for theft from knocking profits down.Frank, Craig et al. | 2001
- 110
-
Departments - VIEWPOINT - Who should chart security's course?Bates, Norman D. et al. | 2001
- 110
-
Departments - LEGAL REPORTER - The Ninth Circuit rules that a school can expel a student for writing a poem from the perspective of a school shooter; Congress considers legislation on port security, defibrillators, and camp security; and states consider drug testing and privacy laws.Anderson, Teresa et al. | 2001
- 112
-
This month shop for the latest in CCTV hardware, from digital video recorders and cameras to domes and multiplexers| 2001
- 112
-
Departments - MARKETPLACE - This month shop for the latest in CCTV hardware, from digital video recorders and cameras to domes and multiplexers.| 2001
- 114
-
Departments - LEGAL REPORTER - Federal courts uphold a school ban on "ganglike activity" and weigh in on workers who stand up for colleagues with disabilities, plus regulatory and legislative updates.Anderson, Teresa et al. | 2001
- 115
-
PUT IN A POLICY OR PAY THE PRICE Mitsubishi paid a $34 million settlement in a sexual harassment claim, then developed a clear policy. Other companies can learn from that expensive lessonGeorge, J. R. et al. | 2001
- 115
-
Features - LEGAL ISSUES - PUT IN A POLICY OR PAY THE PRICE - Mitsubishi paid a (USD)34 million settlement in a sexual harassment claim, then developed a clear policy. Other companies can learn from that expensive lesson.George, Jennifer R. et al. | 2001
- 115
-
ISC WEST PRODUCT SHOWCASE - Digital video systems and walk-through metal detectors are among the items on display.| 2001
- 116
-
Departments - REVIEWS - Experts share their opinions on recently published works covering CCTV, information security, fingerprinting, and cryptography.| 2001
- 116
-
Departments - MARKETPLACE - Products and services to shop for this month include an emergency tracking system and e-business audit software.| 2001
- 117
-
PLANNING A COMPANY GATHERING By doing such things as setting up a command center to respond to all security and emergency situations, this business ensured that a company meeting ran smoothlyPowell, J. D. et al. | 2001
- 117
-
Features - SPECIAL EVENTS - PLANNING A COMPANY GATHERING - By doing such things as setting up a command center to respond to all security and emergency situations, this business ensured that a company meeting ran smoothly.Powell, Joseph D. et al. | 2001
- 118
-
Departments - REVIEWS - Books on "netspionage" and cryptography are praised, while works on school security and fraud receive mixed reactions.| 2001
- 120
-
The Criscuoli and Noggle award winners are announced, and best practices are sought| 2001
- 120
-
Departments - MARKETPLACE - An industrial shredder, a solar-powered shelter, electronic heat detectors, a bolt seal, and a digital imaging station are featured this month.| 2001
- 120
-
Departments - INDUSTRY FOCUS - The Criscuoli and Noggle award winners are announced, and best practices are sought.| 2001
- 121
-
Departments - ASIS BOARD OF DIRECTORS| 2001
- 122
-
Departments - MARKETPLACE - Shop for the latest in bidirectional transceivers, fiber-optic video systems, card printers, infrared cameras, and workplace violence insurance.| 2001
- 122
-
Departments - REVIEWS - Titles under the microscope this month cover weapons of mass destruction, protecting one's privacy, executive protection, electronic access control, and crime analysis.| 2001
- 123
-
BEYOND THE FIGUREHEAD FACADE An IT expert examines various reporting models for ensuring the effectiveness of the corporate information security functionMurphy, B. L. et al. | 2001
- 123
-
Features - MANAGEMENT - BEYOND THE FIGUREHEAD FAÇADE - An IT expert examines various reporting models for ensuring the effectiveness of the corporate information security function. (This is the second in a two-part series that began last month. See "Editor's Note," June.)Murphy, Bruce L. et al. | 2001
- 124
-
LEGAL REPORTER - The privacy of e-mail gets court review. Plus a legislative look ahead.Anderson, Teresa et al. | 2001
- 124
-
Features - SPECIAL FEATURE - A TEAM VISION - President Bonnie S Michelman, CPP, wants the ASIS membership to get involved.Longmore-Etheridge, Ann et al. | 2001
- 124
-
A TEAM VISION President Bonnie S. Michelman, CPP, wants the ASIS membership to get involvedLongmore-Etheridge, A. et al. | 2001
- 126
-
Departments - MARKETPLACE - Just about everything you ever needed for a CCTV system is in the spotlight this month, as are smoke detectors and self-expiring badges.| 2001
- 128
-
Departments - INDUSTRY FOCUS - The Annual Meeting of the Members moves to January, and ASIS reaches out to students.| 2001
- 128
-
Departments - AMERICAS' SECURITY EXPO PRODUCT SHOWCASE - Among the items on display will be a PIR-microwave motion detector, a telephone encryption device, and a workplace violence training video.| 2001
- 128
-
Do OPSEC and risk management mesh?Pattakos, A. N. et al. | 2001
- 128
-
Departments - VIEWPOINT - Do OPSEC and risk management mesh?Pattakos, Arion N. et al. | 2001
- 130
-
REVIEWS - Safety and the security professional, crisis management, intrusion detection, and risk management books get mostly thumbs up.| 2001
- 130
-
Departments - INDUSTRY FOCUS - ASIS to offer awards for exceptional business practice submissions.| 2001
- 130
-
Departments - INDUSTRY FOCUS - Students at Detroit Mercy and Texas A&M take top honors in the 2nd Annual ASIS Student Writing Competition.| 2001
- 132
-
BANKS VAULT INTO ONLINE RISK Banks are finding ways to meet the challenge of cybersecuritySpivey, J. et al. | 2001
- 132
-
Features - FINANCIAL SERVICES - BANKS VAULT INTO ONLINE RISK - Banks are finding ways to meet the challenge of cybersecurity.Spivey, Jeffrey et al. | 2001
- 134
-
Departments - VIEWPOINT - How can security help the community?Dominguez, Louis G. et al. | 2001
- 134
-
New Jersey State troopers embrace the CPP designation, and ASIS continues its GSA security academy| 2001
- 134
-
How can security help the community?Dominguez, L. G. et al. | 2001
- 134
-
Departments - INDUSTRY FOCUS - New Jersey State troopers embrace the CPP designation, and ASIS continues its GSA security academy.| 2001
- 135
-
Departments - A GUIDE TO THE 2001 ASIS EXHIBITS - Check out which vendors will display their wares at the ASIS Annual Seminar and Exhibits in San Antonio, October 1-4| 2001
- 136
-
Departments - VIEWPOINT - Is the terrorist threat misunderstood?Pillar, Paul R. et al. | 2001
- 136
-
VIEWPOINT Is the terrorist threat misunderstood?Pillar, P. R. et al. | 2001
- 137
-
INDEX TO ADVERTISERS| 2001
- 137
-
Departments - LEGAL REPORTER - Courts hold that a company can read an employee's e-mails that are stored on the company server and that federal sexual harassment laws can be applied at the state level. Plus legislation on school and hospital securityAnderson, Teresa et al. | 2001
- 138
-
LEGAL REPORTER - A California appeals court calls one workplace violence policy unconstitutional, Australian lawmakers debate a cybercrime bill, and bills on identity theft, encryption, and school security are among those before the U.S. Congress.Anderson, Teresa et al. | 2001
- 138
-
Should the U.S. approach to bioterrorism change?Stanton, J. J. et al. | 2001
- 138
-
Departments - VIEWPOINT - Should the U.S. approach to bioterrorism change?Stanton, John J. et al. | 2001
- 138
-
Departments - LEGAL REPORTER - A California appeals court calls one workplace violence policy unconstitutional, Australian lawmakers debate a cybercrime bill, and bills on identity theft, encryption, and school security are among those before the U.S. Congress.Anderson, Teresa et al. | 2001
- 138
-
MARKETPLACE - Among products new on the shelf this month are cybercrime courses on CD-ROM and fingerprint authentication for laptops.| 2001
- 142
-
Are data protection strategies outdated?Hall, L. B. et al. | 2001
- 142
-
Departments - VIEWPOINT - Are data protection strategies outdated?Hall, Lawrence B. et al. | 2001
- 142
-
Departments - REVIEWS - Praise for works on business fraud, computer fraud, computer crime, and asset investigations. Disorganization dooms a book on personal identification.| 2001
- 144
-
Departments - INDUSTRY FOCUS - ASIS President Bonnie S. Michelman, CPP, receives an honorary award, and ASIS teams up with a bank group and a cargo security council for its 47th Annual Seminar and Exhibits.| 2001
- 144
-
Departments - MARKETPLACE - Readers can shop for the latest in ID card printers, fingerprint readers, Web-based cameras, and portable x-ray systems.| 2001
- 145
-
Departments - LEGAL REPORTER - An appellate court upholds an employee's right to speak out for better security at a public facility, franchisers are held not liable for poor security at their franchises unless they exercise considerable control, and more.Anderson, Teresa et al. | 2001
- 150
-
Departments - VIEWPOINT - Are your suppliers security conscious?Enterlin, Martin G. et al. | 2001
- 152
-
Departments - REVIEWS - Terrorism and getting work in the field of federal law enforcement are two of the topics taken up by this month's books.| 2001
- 152
-
Departments - REVIEWS - New books on electronic surveillance devices, voice and data security, and bomb counter-measures are reviewed, along with a video on economic espionage.| 2001
- 152
-
REVIEWS - New books on electronic surveillance devices, voice and data security, and bomb counter-measures are reviewed, along with a video on economic espionage.| 2001
- 153
-
INDUSTRY FOCUS - ASIS teams with the FBI's InfraGard program.| 2001
- 154
-
Departments - MARKETPLACE - Surveillance domes and digital video recorders are among the new product offerings.| 2001
- 154
-
Departments - INDUSTRY FOCUS - ASIS supports legislation amending the FCRA, and a new business practices guide is released.| 2001
- 156
-
Departments - MARKETPLACE - Security wares on display include new dome cameras, digital video sensors, access control software, and security revolving doors.| 2001
- 156
-
MARKETPLACE - Security wares on display include new dome cameras, digital video sensors, access control software, and security revolving doors.| 2001
- 160
-
What should security's function be?Dalton, D. R. et al. | 2001
- 160
-
VIEWPOINT - Can information assurance efforts be united?Berg, Allan et al. | 2001
- 160
-
Departments - INDUSTRY FOCUS - The Healthcare Association of Southern California has compiled a guide to bring uniformity to emergency codes, plus other news of industry deals and developments.| 2001
- 160
-
Departments - VIEWPOINT - What should security's function be?Datton, Dennis R. et al. | 2001
- 166
-
INDUSTRY FOCUS - New technology to assist retailers in identifying shoplifters is introduced, and a scholarship program for children of police and fire officials killed in September 11's attacks is announced.| 2001
- 166
-
Departments - INDUSTRY FOCUS - New technology to assist retailers in identifying shoplifters is introduced, and a scholarship program for children of police and fire officials killed in September 11's attacks is announced.| 2001
- 168
-
Departments - VIEWPOINT - How can EAPs serve security?Cid, David et al. | 2001
- 168
-
How can EAPs serve security?Cid, D. et al. | 2001
- 168
-
ASIS BOARD OF DIRECTORS| 2001
- 174
-
VIEWPOINT - Will the new threat result in real change?Azano, Harry J. et al. | 2001
- 174
-
Will the new threat result in real change?Azano, H. J. et al. | 2001
- 174
-
Departments - VIEWPOINT Will the new threat result in real change?Azano, Harry J. et al. | 2001
- 216
-
Departments - LEGAL REPORTER - Courts hold that a drunk worker can collect workers' compensation benefits, while employees fired for sending racy e-mail can't collect unemployment benefits. Plus federal and state legislative news.Anderson, Teresa et al. | 2001
- 216
-
Courts hold that a drunk worker can collect workers' compensation benefits, while employees fired for sending racy e-mail can't collect unemployment benefits. Plus federal and state legislative newsAnderson, T. et al. | 2001
- 232
-
Departments - REVIEWS - Books reviewed this month cover travel and terrorism, hacking and hospitals, computers and car bombs.| 2001
- 236
-
Departments - MARKETPLACE - Threat-monitoring services, fire-detection products, crime-threat reports, laptop security devices, and drone cameras are featured this month.| 2001
- 253
-
Departments - ADVERTISER HYPERLINKS| 2001
- 256
-
ASIS's Public Policy Advisory Council creates a network to disseminate legislation that effects the security industry| 2001
- 256
-
Departments - INDUSTRY FOCUS - ASIS's Public Policy Advisory Council creates a network to disseminate legislation that affects the security industry.| 2001
- 268
-
Can you cross the digital divide?Serpico, P. A. et al. | 2001
- 268
-
Departments - VIEWPOINT - Can you cross the digital divide?Serpico, Philip A. et al. | 2001