skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 134424 Find in a Library
Title: Getting the Most Out of Your System
Journal: Security Management  Volume:36  Issue:1  Dated:(January 1992)  Pages:37-40
Author(s): R N Bordes
Date Published: 1992
Page Count: 4
Type: Report (Technical)
Format: Article
Language: English
Country: United States of America
Annotation: To get the most out of an access control system, users need the time and motivation to explore its advanced features.
Abstract: Many access control systems installed today are capable of providing multiple features that are valuable to the security management team. But due to any number of reasons, many of these systems are unfortunately still providing data that was state-of-the-art 5 years ago. Many existing access control systems that users believe are antiquated can be upgraded with the purchase of newer software packages. Some access control features that are sitting unused in machines because the end users either are not aware of or do not take advantage of them are automated quard tour rounds, card reader or cardholder reports, access level features, time zone features, entry-and-exit programming, and distributed intelligence. System managers must be selected for their imagination and motivation to explore the software. This can only be accomplished with adequate start-up time and training. 3 exhibits.
Main Term(s): Personnel identification systems
Index Term(s): Computer aided operations; Computer privacy and security; Security management
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.