skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 113270 Find in a Library
Title: Matrix for Security
Journal: Security Management  Volume:32  Issue:8  Dated:(August 1988)  Pages:131-135
Author(s): R J Hankinson
Date Published: 1988
Page Count: 5
Type: Program/Project Description
Format: Article
Language: English
Country: United States of America
Annotation: The risk assessment matrix (RAM) developed by the Federal Protective Service and the General Services Administration is contributing to improved security of the Federal workplace.
Abstract: RAM identifies threats and potential threats, anticipates their probability and severity, and recommends countermeasures in a readable, easily understood, and concise form. The first part of the RAM consists of sections detailing the historical crime rate, building and tenant characteristics, potential risk for a variety of crimes (including terrorism) and overall potential risk, and recommended security measures. The second part of the RAM is a variety of cost and scheduling data. Each security or countermeasure recommendation is then evaluated by physical security specialists who decide on the types of services, systems, or devices to be used; estimate costs; and schedule installation and implementation dates. The RAM can be used to establish a uniform level of security for each building, track compliance with internal requirements (e.g., funding sources, resurveying), and identifying areas of highest vulnerability. It can also be used as part of the historical building security record, as a base for future security surveys, as a security profile, and as a mechanism for presenting security information to tenants.
Main Term(s): Security surveys
Index Term(s): Computer aided operations; Facility security; Needs assessment; Threat assessment
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=113270

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.