Abstract
Security technology systems are deployed to prevent or moderate the intentions of persons who commit crimes in the community and the workplace. That is, the application of security technology to the protection of assets of people, information and property is according to the requirements of the security management plan of the facility or location. According to Garcia (2008: 4), security technology systems have the functions of detection and delay. The detection of unauthorized persons at a location is an important role of security technology, as it allows monitoring or surveillance systems to replace the functions of guarding forces. The function of delay relates to the effectiveness of barriers in retarding the progress of an intruder through a facility to the assets of the organization. Thus the purpose of security technology is to implement the security management plan for the organization by replacing guarding manpower with technology designed to provide an enhanced security function.
Keywords
Access Control Smart Card Crime Prevention Intrusion Detection System Biometric SystemPreview
Unable to display preview. Download preview PDF.
References
- Armitage, R. (2013). Crime Prevention Through Housing Design. Basingstoke: Palgrave.CrossRefGoogle Scholar
- Berger, D. (1999). Industrial Security. 2nd ed. Stoneham, MA: Butterworth-Heinemann.Google Scholar
- Bohm, D. and Peat, D. (2000). Science, Order and Creativity. 2nd ed. New York: Routledge. Brooks, D.J. (2010). Assessing Vulnerabilities of Biometric Readers Using an Applied Defeat Evaluation Methodology. Paper Presented at the Proceedings of the 3rd Australian Security and Intelligence Conference, Perth, WA.Google Scholar
- Cohen, L.E. and Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach.. American Sociological Review, 44, 588–605.CrossRefGoogle Scholar
- Coole, M. and Brooks, D.J. (2011). Mapping the Organizational Relations Within Physical Security’s Body of Knowledge: A Management Heuristic of Sound Theory and Best Practice. Paper Presented at the 4th Australian Security and Intelligence Conference, Perth, Western Australia.Google Scholar
- Crowe, T.D. (2000). Crime Prevention Through Environmental Design. 2nd ed. Boston: Butterworth-Heinemann.Google Scholar
- Dabling, J.G., McLaughlin, J.O. and Andersen, J.J. (2012). Design and Performance Testing of an Integrated Detection and Assessment Perimeter System. In Proceedings of the IEEE 46th Annual 2012 International Carnahan Conference on Security Technology. Boston, MA. pp. 34–42.Google Scholar
- Dai, J., Hu, R., Chen, J. and Cai, Q. (2012). Benefit-Cost Analysis of Security Systems for Multiple Protected Assets Based on Information Entropy.. Entropy, 14, 571–580.CrossRefGoogle Scholar
- Ferrer, M.A., Morales, A., Travieso, C.M. and Alonso, J.B. (2007). Low Cost Multimodal Identification System Based on Hand Geometry, Palm and Fingerprint Texture. In Proceedings of the IEEE 41st Annual 2007 International Carnahan Conference on Security Technology. Ottawa, Ontario, Canada. pp. 52–58.Google Scholar
- Ferrer, M.A., Travieso, C.M. and Alonso, J.B. (2006). Multimodal Biometric System Based on Hand Geometry and Palm Print Texture. In Proceedings of the IEEE 40th Annual 2006 International Carnahan Conference on Security Technology. Lexington, KY. pp. 92–97.Google Scholar
- Garcia, M.L. (2006). Vulnerability Assessment of Physical Protection Systems. Boston: Butterworth-Heinemann.Google Scholar
- Garcia, M.L. (2008). The Design and Evaluation of Physical Protection Systems. 2nd ed. Boston: Butterworth-Heinemann.Google Scholar
- Gauch, H.G. (2003). Scientific Method in Practice. Cambridge: Cambridge University Press.Google Scholar
- Gill, M. (2006). CCTV: Is It Effective? in Gill, M. (ed.). The Handbook of Security. Basingstoke, UK, 438–461: Palgrave Macmillan.Google Scholar
- Godfrey-Smith, P. (2003). Theory and Reality: An Introduction to the Philosophy of Science. Chicago: University of Chicago Press.CrossRefGoogle Scholar
- Gonzaga, E. and Cossette, H.J. (2012). Plasma Barrier Force-Field Access Denial System, In Proceedings of the IEEE 46th Annual 2012 International Carnahan Conference on Security Technology. Boston, MA. pp. 297–304.Google Scholar
- Harman, K. and Messner, W.K. (2012). Outdoor Perimeter Security Sensors a Forty Year Perspective. In Proceedings of the IEEE 46th Annual 2012 International Carnahan Conference on Security Technology. Boston, MA. pp. 1–9.Google Scholar
- Haslem, S.A. and McGarty, C. (1998). Doing Psychology. Wiltshire: Sage Publications Ltd.Google Scholar
- Honey, G. (2000). Electronic Access Control. Boston, MA: Butterworth-Heinemann.Google Scholar
- Jones, D.E.L. and Smith, C.L. (2005). The Development of a Model for Testing and Evaluation of Security Equipment Within the Australian Standard/New Zealand Standard AS/NZS4360:2004 — Risk Management. Paper presented at the SET Conference on Counterterrorism, Canberra, Australia.Google Scholar
- Norman, T.L. (2012). Electronic Access Control. Boston: Butterworth-Heinemann.Google Scholar
- Sahba, K., Alameh, K.E., Smith, C.L. and Paap, A. (2006). Cylindrical Quasi-Cavity Waveguide for Static Wide Angle Pattern Projection.. Optics Express, 15(6), 3023–3030.CrossRefGoogle Scholar
- Smith, C.L. (2003). The Science of Biometric Identification.. Australian Science Teachers Journal, 49(3), 34–39.Google Scholar
- Smith, C.L. (2005). The Security Systems Research and Testing Laboratory at Edith Cowan University. In Proceedings of the IEEE 39th Annual 2005 International Carnahan Conference on Security Technology. Las Palmas, Spain. pp. 308–311.Google Scholar
- Smith, C.L. and Brooks, D.J. (2013). Security Science: The Theory and Practice of Security. Boston: Butterworth-Heinemann.Google Scholar
- Smith, C.L. and Robinson, M. (1999). The Understanding of Security Technology and Its Applications. In Proceedings of the IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology. Madrid, Spain. pp. 26–37.Google Scholar
- Tilley, N. (2009). Crime Prevention. Cullompton, Devon, UK: Willam Publishing.Google Scholar
- Vintr, Z., Valis, D. and Malach, J. (2012). Attack Tree-Based Evaluation of Physical Protection Systems Vulnerability. In Proceedings of the IEEE 46th Annual 2012 International Carnahan Conference on Security Technology. Boston, MA. pp. 59–65.Google Scholar
- Vintr, Z., Vintr, M. and Malach, J. (2012). Evaluation of Physical Protection System Effectiveness. In Proceedings of the IEEE 46th Annual 2012 International Carnahan Conference on Security Technology. Boston, MA. pp. 15–21.Google Scholar
- Western Australian Planning Commission (2005). Designing Out Crime. Western Australian Planning Commission, Perth.Google Scholar