The paper “ Essential Criteria Involved when Considering the Introduction of Electronic Access Control Systems” is an earnest example of a finance & accounting coursework. This essay examines the vital processes involved when considering the introduction of electronic access control systems. The paper will also compare and contrast a variety of types of devices that are available at the moment. When examining the criteria involved, various theories of risk management will be taken into consideration, so as to come up with effective as well as up-to-date criteria that can help meet the demanding modern-day security needs.
The definition of electronic access systems constitutes security components particularly based on issuing cards. Philip Purpura in the book: Security and Loss Prevention: An Introduction (2007) writes that controlling access to your premises is an important factor in physical protection, hence is the function of electronic access systems- to help manage the access of the premise anytime they feel like. Access control systems are basically used to monitor and control access to areas such as offices, hotels, computer rooms, car parks, elevators, just to mention but a few (Purpura, 2007).
Access control is an everyday phenomenon. A lock on all cars is a form of access control. A PIN on every person’ s ATM at the bank is a means of access control. Its possession is very important when a person seeks to control important, sensitive/confidential information as well as equipment (AOTEA electronic 2010). The main purpose of an electronic access control system is to allow or deny access to some area based on one or a combination of the following factors: What you have, what you know, and who you are.
The level of security desired determines what combinations of these factors are necessary and therefore what devices are chosen (Vellani, 2007). According to a recent article published in the Yale Law Review, there are essential criteria fundamental when considering to introduce electronic access systems; worth noting is that these criteria are based on theories of defensible space, as established by Oscar Newman.
Anil K. Jain. (2001). Attacks on Biometric Systems: A Case Study in Fingerprints. Michigan State University. New York.
AOTEA electronic. (2010). Access Control Systems, how can we help you? [internet]. Available at: http://www.aoteaelectric.co.nz [accessed 8 October 2010]
ATSS access control. (2003). Why Should We Use Access Control System? [internet]. Available at: http://www.atss.in/Access/Access-Control.html [accessed 8 October 2010]
AWG Agentur (2002). CD Sicherheitsmanagement Nr.3/2002: Bedrohungsanalysen. Österreich: SecureLINE
Broder, J. F. (2006). Risk analysis and the security survey. London: Butterworth-Heinemann.
Center for Problem-Oriented Policing. (2010). p. 5-8.
Crowe, T. (2000). Crime Prevention Through Environmental Design. Boston: Butterworth - Heinman.
Cpp, B. W. (2008). Competitive Advantage-Fixing Small Business Security and Safety Problems. New York: Bill Wise CPP.
Craighead, G. (2009). High-Rise Security and Fire Life Safety. London: Butterworth- Heinemann.
Fospat Access Solutions How It Works. [internet]. Available at: http://www.fospataccess.com/howitworks.php [accessed 8 October 2010]
Hearnden, K., & Moore, A. (1999). The handbook of business security: a practical guide to managing the security risk. New York: Kogan Page Publishers.
Honey, G. (2000). Electronic access control. London: Newnes.
Honey, G. (1999). Electronic Security Systems Pocket Book. London: Newnes.
Hopper, L. J. (2007). Landscape architectural graphic standards. New York: John Wiley and Sons.
infor., W. (1984). choosing the vendor of an electronic access control system. London: Published by InfoWorld Media Group.
Konicek, J., & Little, K. (1997). Security, ID systems, and locks: the book on electronic access control. Australia: Butterworth-Heinemann.
Kovacich G.L. & Halibozek E.P. (2006). Security Metrics Management: How to manage the costs of an assets protection program. London: Butterworth-Heinemann.
Norman, T. (2009). Integrated security systems design: concepts, specifications, and implementation. Australia: Butterworth-Heinemann.
Officers, I. F. (2003). Protection officer training manual. Australia: Butterworth-Heinemann.
Pearson, R. L. (2007). Electronic security systems: a manager's guide to evaluating and selecting system solutions. Australia: Butterworth-Heinemann.
Purpura, P. (2007). Security and Loss Prevention: An Introduction. New York: Butterworth- Heinemann.
Randall, A. (2008). 21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention. London: Taylor & Francis Ltd.
Shanks, N. E., & Bradley, A. L. (2004). Handbook of checked baggage screening: advanced airport security operation. Ho: New Jersey: John Wiley and Sons.
Sharma, R. (2005). Industrial Security Management. Delhi: New Age International.
The International Foundation for Protection Officers (2003). Protection officer training manual. Hoboken: Elsevier.
Umar, A. (2005). Information Security and Auditing in the Digital Age: A Practical and Managerial Perspective. Chicago: nge solutions, inc,
Vellani, K. H. (2007). Strategic security management: a risk assessment guide for decision-makers. London: Butterworth-Heinemann.
Whitney, Sharon. (2010). what is Access Control, ILUS Electronics? New York.
Wilkinson, P. (2007). Homeland security in the UK: future preparedness for terrorist attack since 9/11. London: Taylor & Francis.
The World Market for Nanoclays. (2010). Electronic Access Control Systems - A Global Strategic Business Report. Electronics. publication. Canada, USA.