June 2013

The Risky Business of Travel

By Ann Longmore-Etheridge

Companies requiring that employees travel to other countries must have strong travel security programs to protect both personnel and corporate information.


Cybersecurity for Critical Infrastructure

By Sherry Harowitz

As stakeholders work to shape a new cybersecurity framework for critical infrastructure, they highlight some options and the challenges inherent in devising such standards.


Industry News

By Ann Longmore-Etheridge

John W. Howard, former prime minister of Australia, is tapped to keynote at the ASIS International 59th Annual Seminar and Exhibits in Chicago, and Eric H. Morse, CPP, is profiled.

Legal Report

By Teresa Anderson

A company’s drug and alcohol screening program passes judicial muster, the U.S. Supreme Court rules that police need a warrant to use drug dogs, and legislators consider bills on courthouse security, school safety, and fraud.


By Laura Spadanuta

A new approach to problem solving from the bottom up, and researchers voluntarily lift a moratorium on bird flu studies.

Is Whistleblowing Working?

By Teresa Anderson

As the Dodd-Frank whistleblower program—designed to help catch fraud at financial institutions—reaches its one year anniversary, experts look at how it is working.

Biometrics in Developing Regions

By Holly Gilbert

First-world countries have long used biometrics for security and forensics, but developing countries are using biometrics to create IDs that can be used to facilitate services like voting or the distribution of financial aid.


The Magazine — Past Issues


Don’t Get Burned by Digital Wildfires

By Sherry Harowitz

Are you at risk of getting burned by a digital wildfire?


Don’t Overdo Data Retention

By Holly Gilbert

Experts urge companies to revisit their data retention policies to ensure that they are culling information archives effectively.

Behind the Numbers

By Ponemon Institute

Top 5 Data-Protection Practices in Healthcare


Situational Awareness

By Scott Taylor, CPP

Security officers in the hospitality industry need specialized training to deal effectively with intoxicated or belligerent patrons.


Assessing U.S. Efforts in Central America

By Holly Gilbert

U.S. government programs designed to curb violence and drugs in Central America are gaining traction, but experts warn that addressing social issues may be the key to success.


An App Approach to Crime

By Ann Longmore-Etheridge

Pennsylvania’s Susquehanna University is using a smartphone app to make it easier for students, faculty, and staff to report concerns to security.


Bribery and Corruption: Navigating the Global Risks

By Brian Loughman and Richard Sibery; Reviewed by James T. “Tom” Roberts, Jr., CPP

Bribery and corruption in international business have been part of national cultures for as long as individuals have traded goods and services. The authors of this book focus on educating business leaders and employees about how to avoid corrupt practices, and they do it very well.

Eyewitness Identification: A Police Perspective

By Paul Carroll and Ken Patenaude; Reviewed by James D. Brown, CPP

Law enforcement has the responsibility to arrest the guilty person and an obligation to ensure that the wrong person is not convicted of a crime. Eyewitness Identification acknowledges the increasing awareness that eyewitness identification of criminals is unreliable.

Private Security and the Law, Fourth Edition

By Charles P. Nemeth; Reviewed by Mark Beaudry, CPP

In this provocative book, the author covers a wide spectrum of topics regarding private security law. The book excels primarily because the author continually emphasizes the overarching business imperatives while considering the applicable liabilities.

Money Laundering: A Guide for Criminal Investigators, Third Edition

By John Madinger; Reviewed by Adrian A. Barnie

John Madinger, who has extensive experience as an IRS criminal investigator, has written an outstanding introduction to the complex world of money laundering. It includes interesting sections on the history of money and of money laundering along with other forms of financial crime.

Cyber Attacks: Protecting National Infrastructure, Student Edition

By Edward Amoroso; Reviewed by A. Spencer Wilcox

Author Edward Amoroso proposes ideas for the implementation of a National In­fra­structure Protection Criteria. The proposed framework defines 10 criteria, and then identifies functions associated with each. The 10 criteria are deception, separation, diversity, commonality, depth, discretion, collection, correlation, awareness, and response.

Cargo Theft, Loss Prevention, and Supply Chain Security

By Dan Burges; Reviewed by Richard E. Widup, Jr., CPP

Supply chain security has become headline news, and this book does a good job of describing the multitude of cargo theft challenges that security professionals face today. The first section of the book details the pervasiveness of the problem and its consequences.

Security Questioning 101

By Chameleon Associates; Reviewed by Terry L. Wettig, CPP

Security Questioning 101 is the latest addition to the catalog of security-related courses offered by Chame­­le­on Associates—a security training and consulting firm. Its motto, Improving Security through Intelligence, certainly comes to life in this course as the student is taught to improve intelligence through effective questioning techniques.


Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.