skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 136297 Find in a Library
Title: Computing a Successful System
Journal: Security Management  Volume:36  Issue:4  Dated:(April 1992)  Pages:58,61-62
Author(s): B J Rauschhuber
Date Published: 1992
Page Count: 3
Type: Program Description (Model)
Format: Article
Language: English
Country: United States of America
Annotation: Apple Computer Inc., uses computer technology to enhance security in every facet of its manufacturing organization.
Abstract: Computer systems are used for training, access control, property control, security administration, investigations, recordkeeping, scheduling, and administrative tasks. Security personnel training is provided through a blend of custom-made videotapes and software. The videos provide the new officer with a basic understanding of the style and type of security at the company and overviews of the training process. The officer then learns how to operate an Apple Macintosh computer through a training software package. The trainee next continues training with the computer system, using three, automated software packages in a 5-day program. The security organization operates through the use of four file servers, each on an individual secured network called a local area network. These file servers allow various aspects of the department to operate independently yet with flexibility and control. The file servers are set up in four platforms: property control, security operations, security administration, and card access/alarm systems. An officer at a computer terminal in a lobby has available information on access control, property control, and general security procedures (plant protection procedures, phone directories, MicroMail, passdown log, and vehicle registration).
Main Term(s): Business security; Computer aided operations
Index Term(s): Computer aided instruction; Security management; Security training
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.