Printer Friendly

HOME ON THE PAGE.

http://www.securitymanagement.com

Traffic to Security Management Online is up eightfold from last year. Find out what you're missing by logging on to www.securitymanagement.com and checking out the latest reports, articles, surveys, and book chapters via "Beyond Print." New this month are the following.

Online harassment. In the last year, 19 percent of youth who use the Internet regularly received unwanted sexual solicitations. In 15 percent of those incidents, the solicitor tried to contact the child by phone or mail. But predators were more likely to be fellow youth than adults, according to a survey by the University of New Hampshire's Crime Against Children Research Center and the National Center for Missing and Exploited Children.

"Not all of the sexual aggression on the Internet fits the image of the sexual predator or the wily child molester," the authors write. "A lot of it looks and sounds like the hallways of our high schools." The report also concludes that perhaps the worst aspect of sexual solicitations is that "parents and reporting authorities do not seem to be hearing about the majority of the episodes."

In addition, 25 percent of youth were exposed to unwanted online pornography and 6 percent were harassed in a nonsexual way, such as by threats. SM Online has the full 62-page report.

School security, In Monterey County, California, the local high schools and the Probation Department split the cost of probation officers assigned to schools. Probation officers are one element of school violence prevention that schools should consider, according to a guide prepared by the International Association of Chiefs of Police. Other prevention recommendations for schools include: requiring visitors to sign in and out and wear badges; encouraging screened and trained parents/guardians to monitor students; developing and enforcing restrictions about student loitering in parking lots, bathrooms, and other gathering areas; and developing threat and crisis management plans.

Other parts of the guide discuss what school administrators, teachers, and staff can do for crisis planning and preparation and how they can cope during and after a major crisis. The guide also covers legal considerations, recommendations for the media, and legislative issues. The document, "Guide for Preventing and Responding to School Violence," is on SM Online.

Another document features three papers on preventing school violence that were presented at a conference on criminal justice research and evaluation. The papers look at community partnerships for school violence prevention, research-based prevention of school violence and youth antisocial behavior, and methods used by schools to control violence. The document is on SM Online.

Interviews. The FBI has been using a computer program to train its investigators to interview a bank loan officer after an ATM theft. Interviewers choose from a scripted list of questions that appears on the screen. As the subject responds, follow up questions appear. Two views of the loan officer are provided on the computer screen to help the interviewer look for physical cues. The virtual interviewee is endowed with human characteristics, such as evasiveness, helpfulness, and indignation--the characteristics change from interview to interview and vary according to the interview approach taken. In one scenario, for example, if the investigator pointedly accuses the loan officer of the theft, that triggers indignation, and the loan officer shuts down the interview.

All new FBI agent trainees have been using the program since October 1, 1998, and instructors have seen improvement in the interviewing skills of those who have participated. A detailed description of the program, from the FBI Law Enforcement Bulletin, appears on SM Online.

Cargo security. An effective and successful logistics security program should include a security and operations manual, a security budget, legal issues or concerns, regular security reporting systems, skill enhancement, and advanced training and development through seminars and other courses. These are shards of advice from a chapter called "Security Manager Training and Development in Guidelines for Cargo Security & Loss Control, 2d edition (reviewed in June). The chapter is on SM Online.

Identity theft. In October 1999, a list of current and retired command officers in the U.S. armed services, along with their serial numbers (which are the same as their Social Security numbers), was posted on a public Web site. One of the names posted was Retired Lt. Col. James Jones, whose identity was stolen and whose creditworthiness was ruined when the thief established credit online in Jones's name and failed to pay for purchases or reimburse cash advances.

That case is discussed in detail in a white paper on identity theft published by the Software & Information Industry Association. The paper walks the reader through aspects of the Jones case, from poor business practices (such as no online verification of an applicant for a credit line beyond a Social Security number) to larger public policy issues (such as the need for posted Social Security/serial numbers to be represented as a "hash value," or an encrypted, unique data value). "Internet Identity Theft: A Tragedy for Victims," which also contains information on preventing identity theft, is on SM Online.

Fire simulation. On May 30, 1999, a fire in a Washington, D.C. town house killed two firefighters and burned several others. To provide insight into the fire development and thermal conditions that may have existed in the town house, the National Institute of Standards and Technology (NIST) was asked to perform computer simulations of the fire using its new Fire Dynamics Simulator and Smokeview software tools.

The simulation predicted fire conditions that correlated well with actual damage done to the town house. Opening of glass doors in the basement provided oxygen to the underventilated area, filling the basement with fire. From there, high temperature gases were forced up the stairwell to the living room and the back wall of the town house. SM has the full NIST report on the fire simulation.
COPYRIGHT 2000 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2000 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Author:GIPS, MICHAEL A.
Publication:Security Management
Date:Sep 1, 2000
Words:970
Previous Article:Report Proposes Measures Against Terrorism.
Next Article:Case Closed.
Topics:


Related Articles
Home on the page.
HOME ON THE PAGE.
Haiku.
Figures of fantasy; Internet, women, and cyberdiscourse.

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters