U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Security Goes Computer and Likes It

NCJ Number
109254
Journal
Security Volume: 25 Issue: 2 Dated: (February 1988) Pages: 48-52
Author(s)
B Moss
Date Published
1988
Length
5 pages
Annotation
The most popular applications for personal computers in the security office are in access control enhancement, word processing, violation loggings, safety equipment testing, and budgeting.
Abstract
An access control system linked to a computer can upgrade recordkeeping without buying a new access control system. Word processing facilitates the production of security manuals and security lists. Personal computers improve security communications by increasing the ease with which safety newsletters, for example, are produced. Regarding violation loggings, data base management software keeps track of numbers and types of violations; and computerized operations also enhance the keeping of figures and dates on safety equipment testing. In using the personal computer in security operations, care must be taken not to overautomate. Every potential application must be assessed according to standard criteria. Training in the use of personal computers in security administration can be facilitated by the selection of software accompanied by clear instructions regarding its use. Software should also be 'mistake-proof,' i.e., so designed as to preclude harmful errors. The computer should be a business computer and ideally incorporate a hard disk. A printer is required for the production of reports, charts, and correspondence.