U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computer Applications in the Private Security Business

NCJ Number
76334
Author(s)
A M Sapse; P Shenkin; M Sapse
Date Published
1980
Length
136 pages
Annotation
This book traces the development of security and private police systems, examines aspects of the security industry which could be subjected to computer applications, describes the workings of computers, and discusses the application of computer technology to the security program used at Bell Security, Inc. in New York City.
Abstract
The history of security programs and security police forces such as Bow Street Runners or Pinkerton is traced from the earliest nomadic times up through the present. Close scrutiny is given to the diversity of security and police systems which has developed in the United States primarily because of the geographic disparity from which different needs arose. Examples are given of modern day needs for security in industry and in government, and the role that private security systems play in safeguarding industry is examined. It is suggested that computer technology would help to make the private security business more cost efficient. Security operations, such as marketing, sales, recruiting, training, dispatching, and supervision, which might be amenable to computer applications are detailed. Computer operations are then explained, with attention given to the possible uses of a computer, the computer hardware or machinery, and the computer software or programs. The computerized dispatching system used at Bell Security, Inc., is described in detail. Finally, methods used to prevent and stop unauthorized use of the computer in business operations are discussed. Tabular data, graphs, a bibliography of five references and an index are provided.