U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Living With SIN: The Security Information Network

NCJ Number
110741
Journal
Security Management Volume: 32 Issue: 4 Dated: (April 1988) Pages: 61-72
Author(s)
M Nabours
Date Published
1988
Length
12 pages
Annotation
Appropriate computer hardware and software systems can increase the efficiency and effectiveness of security management operations.
Abstract
Tasks that have the most potential for savings in labor costs or highly visible improvements in efficiency and quality should be computerized. Examples are labor-intensive paper systems that must be accessed by more than one parameter, key records, parking permits, and records requiring statistical reports, such as incident reports, survey reports, and background investigation records. The steps in building a computer system are first to define needs, then select the software that can best meet those needs, and select hardware that will satisfy the requirements of the first two steps. Among the software that should be considered are word processing to make office operations more efficient, an accounting package, and a utility program, most importantly a 'menu' system. Another decision is whether to have a local area network (LAN). A LAN is required for retaining data on disk for retrieval by other terminals. Most LAN manufacturers are being responsive to computer security issues and are designing better and better security features into their operating systems.

Downloads

No download available

Availability