INFORMATION

Site Map - Research & Studies

Cargo Security Still Stalling

- Despite increased attention, cargo security is still sorely lacking, according to cargo industry executives. A recent survey, shows that 62 percent of executives named background checks of workers and drivers as a very important measure, but only 14 percent said that industry performance in this arena was excellent. The disparity between importance and performance was vast for the other nine measures listed as well, such as cargo inspection (41 percent said it was very important, while only 4 percent gave the industry high marks on that measure) and improved operational procedures (50 percent versus 2 percent). More information on the survey of 103 executives, conducted by the U.S. Chamber of Commerce on behalf of Deloitte & Touche LLP, can be obtained by contacting Deloitte via SM Online.

A New Form of Electromagnetic Radiation Could Bolster Airport and National Security

- Scientists at the DOE's Argonne National Laboratory may be able to harness the power of T-rays for more effective checkpoint screening.

Old crime new tricks

- Hackers steal customer information and then demand money in return for not disclosing the compromise. How common is this scenario? A recent study shows that 17 of 100 companies surveyed have been so threatened, and many of those threats came from insiders. Almost a quarter of respondents said they would contact their legal department if so threatened, yet 59 percent were unsure whether their legal counsels were qualified to give advice (another 12 percent said they definitely were not). @ The Carnegie Mellon study, Enumerating and Reducing the Threat of Transnational Cyber Extortion against Small and Medium Size Organizations .

Out of Sight, Out of Mind

- Almost one-third of companies outsource application-development tasks, as well as Web-site development and management, according to a new survey of 744 organizations carried out by Enterprise Systems, a provider of business and technology information for IT managers. Outsourcing: Who, Where, and Why? The 2004 Enterprise Strategies Outsourcing Survey is available at SM Online.

Did You Know That?

- The United States is known for its scientific expertise and ingenuity. When it comes time to blending these with public policy, however, the science often takes a backseat. A report by the Henry L. Stimson Center, a think tank, proposes methods for incorporating expertise in science, technology, and health into the formation of national biological security policy. @ You can find the report, as well as an executive summary, through SM Online.

MANPADS.

- Is it feasible to outfit planes to defend against shoulder-fired missiles?

Balancing Science and Security

- America's scientific community is worried government fears of terrorism will stop the flow of information, researchers, and students necessary for America's continued scientific supremacy.

Bacterium May Have Killed 19,000 in 2005

- Researchers say M.R.S.A., a virulent drug-resistant bacterium found in hospitals and nursing homes, could account for more deaths than HIV/AIDS.

Hot Property: The Stealing of Ideas in an Age of Globalization

- Part history lesson, part scary bedtime story, Pat Choate’s Hot Property is chockablock with intellectual-property anecdotes spanning the past 200 years.

Criminal Justice Technology in the 21st Century, Second Edition

- The book is a compilation of scholarly articles targeted to professors, students, and policymakers, relying heavily on research studies that employ both inferential and descriptive statistics. The material is presented in four sections, with contributions appearing from some of the leading criminal justice experts in the academic community.

Fraud Findings.

- In a study conducted by Pratkanis for the Consumer Fraud Research Group, he writes that investment-fraud victims seemed to be actually more knowledgeable about investing than were nonvictims, supporting the adage that a little knowledge is a dangerous thing. He also describes the phenomenon of “mass customization,” in which con artists find out all they can about a customer and tailor their tactics to the person. One fraud artist who learned that a victim was religious managed to gain the woman’s trust by praying with her at the beginning of every conversation.@ The study is available via SM Online.

Business News

- A digital homeland security library is redesigned

The Handbook of Security

- A collection of separate essays on security studies from the most eminent security scholars today.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.