ebook img

Security Journal 1992: Vol 3 Index PDF

3 Pages·1992·0.31 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security Journal 1992: Vol 3 Index

Author Index Austin, C: See Laycock, G, 154 The Atkinson Value-Added Model: Meredith, C and Paquette, C: The Atkinson Security Project Crime Prevention in High-Rise Rental Bjor, J, Knutsson, J, and Kuhlhorn, E: II, 14 Apartments: Findings of a Dem- The Celebration of Midsummer Fve in Fay, JJ: onstration Project, 161 Sweden—A Study in the Art of Preventing Collective Disorder, Corporate Security: Protecting Assets Paquette, C: See Meredith, C, 161 169 in an Evolving Shamrock-Like Pelfrey, WV: Buckle, A, Farrington, DP, Burrows, f, Organization, 194 Convergence of Crime Prevention, Speed, M, and Burns-Howell, T: Farrington, DP: See Buckle, A, 137 New Policing Approaches, and Measuring Shoplifting by Repeated Private Security: Crime Analysis, Systematic Counting, 137 Gale, S: See Duncan, K, 14; Duncan, K, 2; 215 Burns-Howell, T: See Buckle, A, 137 Duncan, K, 27; Duncan, K, 4; Prince, JJ: Burrows, J: See Buckle, A, 137 Tofflemire, J, 45 Probable Cause Field Testing for Alco- Gilmere, JA: See Chuvala III, J, 83; Chu- hol and Drugs in Industry, 91 Calder, JD and Sipes, DD: vala IIIJ,, 87 Crime, Security, and Premises Liabil- Sipes, DD: See Calder, JD, 66 ity: Toward Precision in Secu- Hearnden, K: Speed, M: See Buckle, A, 137 rity Expert Testimony, 66 The Security Controller in the UK De- Chuvala III,J and Gilmere, JA: fense Industry: A Profile, 98 The Use of Technology in Countering Legal Consequences for Negligent Re- Terrorism Advisory Panel: tention, Supervision, and Train- Kennedy, DB: Part I. The Terrorist Threat and the ing of Employees, 87 Probability, Vulnerability, and Critical- Technological Response, 175 Negligent Hiring, Training, Supervis- ity as Architectural Security Part II. The Terrorist Threat and the ing, and Retention of Employ- Considerations, 199 Technological Response: Re- ees in Private Security, 83 Knutsson, J: See Bjor, J, 169 search and Development, 219 Clarke, RV: Kuhlhorn, E: See Bjor, J, 169 Tofflemire,J : See Duncan, K, 14; Dun- Editorial, 130 can, K, 2; Duncan, K, 27; Dun- Laycock, G and Austin, C: can, K, 4 Duncan, K: See Tofflemire, J, 45 Crime Prevention in Parking Facilities, Tofflemire, J, Duncan, K, and Gale, S: Duncan, K, Gale, S, Tofflemire, J, and 154 The ASIS Foundation Benchmark II Yaksick, R: Levi, M: Survey Study, 45 An Implementation of the Atkinson Preventing Credit Card Fraud, 147 Model: The Atkinson Security Vardalis, JJ: Project III, 27 Masuda, B: Privatization of Public Police: Houston, Conceptualizing a Value-Added Ap- Displacement versus Diffusion of Texas, 210 proach to Security Management: Benefits and the Reduction of The Atkinson Security Project I, Inventory Losses in a Retail En- Yaksick, R: See Duncan, K, 14; Duncan, 4 vironment, 131 K, 2; Duncan, K, 27; Duncan, The ASIS Foundation Atkinson Secu- ,4 rity Project, 2 Security J., 1992, vol. 3, no. 4, October 255 Subject Index Accountability, 210 Electronic surveillance, 147 Parking facilities, 154 Apartment, 161 Employer, 83, 87 Parking lots, 154 Asset protection, 194 Employment rewards, 98 Postal theft, 147 Audit loss, 137 Environmental criminology, 199 Premises liability, 66, 199 Environmental design, 161 Preventive audit survey, 131 Banks, 147 Expert testimony, 66 Probable cause, 91 Burglary, 161 Expert witness, 66 Public police, 210 Client-directed, 210 Field sobriety tests, 91 Retail security, 137 Collective disturbances, 169 Foreseeability, 199 Risk assessment, 215 Community policing, 215 Fraud prevention, 147 Consumer-controlled, 210 Security, 83, 87, 210 Contractor, 83, 87 Gaze nystagmus, 91 Security management, 66 Corporate security, 194 Security priorities, 98 Credit card, 147 Implementation, 154 Security resourcing, 98 Crime analysis, 215 Internal theft, 131 Shoplifting, 137 Crime prevention, 161 Shrinkage, 131 Cross-border crime, 147 Liability, 83, 87 Situational crime prevention, 154 Cycle counts, 131 Situational prevention, 169 Measurement validity, 137 Standards of care, 66 Defense security, 98 Stock shrinkage, 137 Design security, 199 Negligence, 83, 87 Sweden, 169 Diffusion of benefits, 131 Neighborhood watch, 161 Systematic counting, 137 Displacement, 131 Drunkenness, 169 Organizational structure, 194 Tort liability, 66 256 Security J., 1992, vol. 3, no. 4, October

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.