NCJ Number
109254
Journal
Security Volume: 25 Issue: 2 Dated: (February 1988) Pages: 48-52
Date Published
1988
Length
5 pages
Annotation
The most popular applications for personal computers in the security office are in access control enhancement, word processing, violation loggings, safety equipment testing, and budgeting.
Abstract
An access control system linked to a computer can upgrade recordkeeping without buying a new access control system. Word processing facilitates the production of security manuals and security lists. Personal computers improve security communications by increasing the ease with which safety newsletters, for example, are produced. Regarding violation loggings, data base management software keeps track of numbers and types of violations; and computerized operations also enhance the keeping of figures and dates on safety equipment testing. In using the personal computer in security operations, care must be taken not to overautomate. Every potential application must be assessed according to standard criteria. Training in the use of personal computers in security administration can be facilitated by the selection of software accompanied by clear instructions regarding its use. Software should also be 'mistake-proof,' i.e., so designed as to preclude harmful errors. The computer should be a business computer and ideally incorporate a hard disk. A printer is required for the production of reports, charts, and correspondence.