Security Technology in the Protection of Assets

  • Clifton L. Smith

Abstract

Security technology systems are deployed to prevent or moderate the intentions of persons who commit crimes in the community and the workplace. That is, the application of security technology to the protection of assets of people, information and property is according to the requirements of the security management plan of the facility or location. According to Garcia (2008: 4), security technology systems have the functions of detection and delay. The detection of unauthorized persons at a location is an important role of security technology, as it allows monitoring or surveillance systems to replace the functions of guarding forces. The function of delay relates to the effectiveness of barriers in retarding the progress of an intruder through a facility to the assets of the organization. Thus the purpose of security technology is to implement the security management plan for the organization by replacing guarding manpower with technology designed to provide an enhanced security function.

Keywords

Access Control Smart Card Crime Prevention Intrusion Detection System Biometric System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Armitage, R. (2013). Crime Prevention Through Housing Design. Basingstoke: Palgrave.CrossRefGoogle Scholar
  2. Berger, D. (1999). Industrial Security. 2nd ed. Stoneham, MA: Butterworth-Heinemann.Google Scholar
  3. Bohm, D. and Peat, D. (2000). Science, Order and Creativity. 2nd ed. New York: Routledge. Brooks, D.J. (2010). Assessing Vulnerabilities of Biometric Readers Using an Applied Defeat Evaluation Methodology. Paper Presented at the Proceedings of the 3rd Australian Security and Intelligence Conference, Perth, WA.Google Scholar
  4. Cohen, L.E. and Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach.. American Sociological Review, 44, 588–605.CrossRefGoogle Scholar
  5. Coole, M. and Brooks, D.J. (2011). Mapping the Organizational Relations Within Physical Security’s Body of Knowledge: A Management Heuristic of Sound Theory and Best Practice. Paper Presented at the 4th Australian Security and Intelligence Conference, Perth, Western Australia.Google Scholar
  6. Crowe, T.D. (2000). Crime Prevention Through Environmental Design. 2nd ed. Boston: Butterworth-Heinemann.Google Scholar
  7. Dabling, J.G., McLaughlin, J.O. and Andersen, J.J. (2012). Design and Performance Testing of an Integrated Detection and Assessment Perimeter System. In Proceedings of the IEEE 46th Annual 2012 International Carnahan Conference on Security Technology. Boston, MA. pp. 34–42.Google Scholar
  8. Dai, J., Hu, R., Chen, J. and Cai, Q. (2012). Benefit-Cost Analysis of Security Systems for Multiple Protected Assets Based on Information Entropy.. Entropy, 14, 571–580.CrossRefGoogle Scholar
  9. Ferrer, M.A., Morales, A., Travieso, C.M. and Alonso, J.B. (2007). Low Cost Multimodal Identification System Based on Hand Geometry, Palm and Fingerprint Texture. In Proceedings of the IEEE 41st Annual 2007 International Carnahan Conference on Security Technology. Ottawa, Ontario, Canada. pp. 52–58.Google Scholar
  10. Ferrer, M.A., Travieso, C.M. and Alonso, J.B. (2006). Multimodal Biometric System Based on Hand Geometry and Palm Print Texture. In Proceedings of the IEEE 40th Annual 2006 International Carnahan Conference on Security Technology. Lexington, KY. pp. 92–97.Google Scholar
  11. Garcia, M.L. (2006). Vulnerability Assessment of Physical Protection Systems. Boston: Butterworth-Heinemann.Google Scholar
  12. Garcia, M.L. (2008). The Design and Evaluation of Physical Protection Systems. 2nd ed. Boston: Butterworth-Heinemann.Google Scholar
  13. Gauch, H.G. (2003). Scientific Method in Practice. Cambridge: Cambridge University Press.Google Scholar
  14. Gill, M. (2006). CCTV: Is It Effective? in Gill, M. (ed.). The Handbook of Security. Basingstoke, UK, 438–461: Palgrave Macmillan.Google Scholar
  15. Godfrey-Smith, P. (2003). Theory and Reality: An Introduction to the Philosophy of Science. Chicago: University of Chicago Press.CrossRefGoogle Scholar
  16. Gonzaga, E. and Cossette, H.J. (2012). Plasma Barrier Force-Field Access Denial System, In Proceedings of the IEEE 46th Annual 2012 International Carnahan Conference on Security Technology. Boston, MA. pp. 297–304.Google Scholar
  17. Harman, K. and Messner, W.K. (2012). Outdoor Perimeter Security Sensors a Forty Year Perspective. In Proceedings of the IEEE 46th Annual 2012 International Carnahan Conference on Security Technology. Boston, MA. pp. 1–9.Google Scholar
  18. Haslem, S.A. and McGarty, C. (1998). Doing Psychology. Wiltshire: Sage Publications Ltd.Google Scholar
  19. Honey, G. (2000). Electronic Access Control. Boston, MA: Butterworth-Heinemann.Google Scholar
  20. Jones, D.E.L. and Smith, C.L. (2005). The Development of a Model for Testing and Evaluation of Security Equipment Within the Australian Standard/New Zealand Standard AS/NZS4360:2004 — Risk Management. Paper presented at the SET Conference on Counterterrorism, Canberra, Australia.Google Scholar
  21. Norman, T.L. (2012). Electronic Access Control. Boston: Butterworth-Heinemann.Google Scholar
  22. Sahba, K., Alameh, K.E., Smith, C.L. and Paap, A. (2006). Cylindrical Quasi-Cavity Waveguide for Static Wide Angle Pattern Projection.. Optics Express, 15(6), 3023–3030.CrossRefGoogle Scholar
  23. Smith, C.L. (2003). The Science of Biometric Identification.. Australian Science Teachers Journal, 49(3), 34–39.Google Scholar
  24. Smith, C.L. (2005). The Security Systems Research and Testing Laboratory at Edith Cowan University. In Proceedings of the IEEE 39th Annual 2005 International Carnahan Conference on Security Technology. Las Palmas, Spain. pp. 308–311.Google Scholar
  25. Smith, C.L. and Brooks, D.J. (2013). Security Science: The Theory and Practice of Security. Boston: Butterworth-Heinemann.Google Scholar
  26. Smith, C.L. and Robinson, M. (1999). The Understanding of Security Technology and Its Applications. In Proceedings of the IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology. Madrid, Spain. pp. 26–37.Google Scholar
  27. Tilley, N. (2009). Crime Prevention. Cullompton, Devon, UK: Willam Publishing.Google Scholar
  28. Vintr, Z., Valis, D. and Malach, J. (2012). Attack Tree-Based Evaluation of Physical Protection Systems Vulnerability. In Proceedings of the IEEE 46th Annual 2012 International Carnahan Conference on Security Technology. Boston, MA. pp. 59–65.Google Scholar
  29. Vintr, Z., Vintr, M. and Malach, J. (2012). Evaluation of Physical Protection System Effectiveness. In Proceedings of the IEEE 46th Annual 2012 International Carnahan Conference on Security Technology. Boston, MA. pp. 15–21.Google Scholar
  30. Western Australian Planning Commission (2005). Designing Out Crime. Western Australian Planning Commission, Perth.Google Scholar

Copyright information

© Clifton L. Smith 2014

Authors and Affiliations

  • Clifton L. Smith

There are no affiliations available

Personalised recommendations