Using Access and ID Control to Prevent Workplace Violence

Scaglione, Bernard
July 2010
Security: Solutions for Enterprise Security Leaders;Jul2010, Vol. 47 Issue 7, p40
Trade Publication
The article discusses the important role of access and identification control in stopping workplace violence in healthcare institutions in the U.S. It states that installing access control systems such as door locks and card readers can keep unauthorized persons from staying into restricted areas to reduce violence and promote safety to the staff. Moreover, it stresses the need for health institutions to conduct workplace violence prevention programs.


Related Articles

  • PIN Fraud Rising Fast.  // Credit Union Journal;1/30/2012, Vol. 16 Issue 5, p14 

    The article reports on the increasing number of personal identification number (PIN) fraud because of accessibility to new technology and software that makes obtaining card and PIN numbers easier.

  • India Issuing ID Numbers.  // India -- West;10/8/2010, Vol. 35 Issue 46, pA44 

    The article reports on the issuance of identification numbers to the 1.2 billion people in India on September 29, 2010 in New Delhi.

  • Substituting for another physician.  // Medical Economics;7/10/2009, Vol. 86 Issue 13, p55 

    The article provides answer to a question if it is legal for the other physician to bill services of other practicioners under its own tax identification number.

  • Emerging alternatives to chip and PIN to tackle card fraud in the US.  // MarketWatch: Technology;Oct2009, Vol. 8 Issue 10, p7 

    The article focuses on the development of chip and PIN technology which possesses high probability to address the card fraud issues in the U.S. It highlights the creation of MagnePrint technology by Magtek Inc. which explores the unique features of the iron particles in a card's magnetic stripe....

  • Authentication - Antidote to Phone Hacking. Kemshall, Andy // Technical Support Magazine;Dec2011, Vol. 3 Issue 3, p15 

    The article offers information on the use of authentication to prevent phone hacking. It mentions that the great bonus to place authentication to phone is that users recognize immediately when they have lost their mobile phone and quickly report it. It states that the hacker will just get one...

  • Battle of Platforms: Industry Debates PINs vs. Signatures. Morrison, David // Credit Union Times;5/2/2012, Vol. 23 Issue 17, p3 

    The article offers information on two different validation platforms of embedded smart chips in the U.S. for transaction, personal identification numbers (PIN) or signatures. The article compares the two platforms and reports the increasing dilemma of the U.S. Card issuers. According to the U.S....

  • NEXT BIG CARD FRAUD WAVE COULD AFFECT PREPAID.  // CardLine;7/17/2009, Vol. 9 Issue 29, p6 

    The article reports on the statement of Mike Urban, senior director of fraud solutions at FICO in the U.S., regarding the potential risk of prepaid cards for card fraud. According to Urban, the fraud will take various forms including counterfeit cards, lost-and-stolen cards and theft of personal...

  • A Survey of Emerging Biometric Technologies.  // International Journal of Computer Applications;Nov2010, Vol. 9, p1 

    The article presents a survey on emerging biometric technologies. It mentions changes in computer security along with trends ranging from personal identification numbers (PINs) to biometry that come to solve problems identified with knowledge-based authentication systems. It notes that the...

  • SSSL: Shoulder Surfing Safe Login. Perković, Toni; Čagalj, Mario; Rakić, Nikola // Journal of Communications Software & Systems;Jun2010, Vol. 6 Issue 2, p65 

    Classical PIN-entry methods are vulnerable to a broad class of observation attacks (shoulder surfing, key-logging). A number of alternative PIN-entry methods that are based on human cognitive skills have been proposed. These methods can be classified into two classes regarding information...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics