U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

JUST WHEN YOU THOUGHT IT WAS SAFE...

NCJ Number
142796
Journal
Security Management Volume: 32 Issue: 8 Dated: (August 1988) Pages: complete issue
Author(s)
R I Atlas
Date Published
1988
Length
6 pages
Annotation
For a building to be truly secure, architects and planners must incorporate security features into the drawings from the very beginning.
Abstract
While these security features may include concealed and unobtrusive devices including closed-circuit television and alarms, many companies require high-profile security appurtenances including reception desks and consoles. However, if any of these devices are not considered during the initial planning phase, their effectiveness is bound to be limited. For example, parking lot, entrance, and lobby designs often do not anticipate the control requirement in many buildings. To ensure that security is designed into the environment, rather than becoming imposed upon it, architects should take note of the following strategies: natural access control, natural surveillance, and territorial reinforcement. Security design poses three primary challenges for architects: determining requirements, knowing the technology, and understanding architectural implications. Security planning should begin during the site selection process, accounting for the various levels of security: site analysis, perimeter or exterior security, and internal space protection. Zoning design goals are accomplished through the use of unrestricted, control, and restricted zones. All of these security planning features are aimed at preventing crime in the built environment. 13 notes