Closed security in an open environment. (University of Michigan-Dearborn): An article from: Security Management
Book Details
Author(s)Linda M. Kinczkowski
ISBN / ASINB00096KA8M
ISBN-13978B00096KA85
AvailabilityAvailable for download now
MarketplaceUnited States 🇺🇸
Description
This digital document is an article from Security Management, published by American Society for Industrial Security on May 1, 1996. The length of the article is 2767 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.
From the supplier: The security department of the University of Michigan-Dearborn remains vigilant despite a low crime rate on the campus. Its staff keeps the university population informed about crimes committed on the campus through E-mail or by memorandum. Magnetic stripe card readers have also been installed at entrances, while an alarm monitoring system enables the security department to monitor intrusion, fires and panic alarms.
Citation Details
Title: Closed security in an open environment. (University of Michigan-Dearborn)
Author: Linda M. Kinczkowski
Publication:Security Management (Refereed)
Date: May 1, 1996
Publisher: American Society for Industrial Security
Volume: v40 Issue: n5 Page: p37(4)
Distributed by Thomson Gale
From the supplier: The security department of the University of Michigan-Dearborn remains vigilant despite a low crime rate on the campus. Its staff keeps the university population informed about crimes committed on the campus through E-mail or by memorandum. Magnetic stripe card readers have also been installed at entrances, while an alarm monitoring system enables the security department to monitor intrusion, fires and panic alarms.
Citation Details
Title: Closed security in an open environment. (University of Michigan-Dearborn)
Author: Linda M. Kinczkowski
Publication:Security Management (Refereed)
Date: May 1, 1996
Publisher: American Society for Industrial Security
Volume: v40 Issue: n5 Page: p37(4)
Distributed by Thomson Gale
