Crime Pattern Analysis and the Security Director: A Primer

Ballantyne, Steve W.
March 2011
Security: Solutions for Enterprise Security Leaders;Mar2011, Vol. 48 Issue 3, p98
Trade Publication
The article offers information on the crime pattern analysis (CPA). It mentions that the CPA is a generic term which covers a wide range of crime analysis and looks for crime patterns and trends. It states that CPA can be used by security managers to essentially highlight the vulnerable areas that can be the target and needed to prevent or deter crime.


Related Articles

  • Mark Your Calendars.  // Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p12 

    The article presents a calendar of events related to security systems. A seminar titled "Successful Security Consulting," will be held during May 6-7, 2006 in Carefree, Arizona. Another conference named IAPSC Annual Conference is scheduled to be held during May 7-10, 2006. These events are being...

  • CREATING A CORPORATE SHIELD. Stewart, Graeme // Business Mexico;Oct2005, Vol. 15 Issue 10, p18 

    The article focuses on the corporate security strategies used for the chief executives officers of Mexico. The strategies are proactive in a new, innovative way, which include plans designed by security advisers and special training, with courses in topics as security awareness and evasive...

  • TOP RANKS: SECURITY & ALARM COMPANIES.  // Business Journal (Central New York);2005 Book of Lists, p59 

    Presents a chart depicting the top security and alarm companies ranked according to the number of employees in Central New York. Sales in the region in 2003; Alarm types available; Services available.

  • MOVING FORWARD. SCOTT, CORY // Information Security;Oct2009, Vol. 11 Issue 9, p32 

    The article offers suggestions to avoid unnecessary accidents and improve application security. Application and security teams are said to be partners in identifying the damage, implementing a quick fix to prevent further losses, and performing an analysis to determine the reason for the...

  • Games to Play. Cunningham, Gary; Wallace, Mike // Security: Solutions for Enterprise Security Leaders;Aug2006, Vol. 43 Issue 8, p62 

    The article reports on training and education for security executives, supervisors and officers. The first step in the process is the mental evaluation, and preparing a summary of the security events experienced in the area. The next consideration is the evaluation of the things that can happen,...

  • VSI-Viscount Systems Inc.  // Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p81 

    The article provides information on the products and services offered by Viscount Systems Inc. (VSI) in the U.S. The firm, which was regarded as leader in intelligent and edge device technology for physical access control, has created edge device facility protection systems. The software...

  • Rewarding the very best in the industry.  // SC Magazine: For IT Security Professionals (UK Edition);Nov/Dec2011, p14 

    The article offers information on Security Consultant (SC) Awards Europe in honour of professionals working to secure enterprises and vendors that deliver security technologies. It cites the process that information security professionals undergo through including a panel of industry judges that...

  • TOUGH STUFF. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Aug2007, Vol. 44 Issue 8, p20 

    The article presents a discussion among security practitioners concerning the security industry in the U.S. Bill Anderson of Ryder Systems Inc. said that corporate security must find ways to improve its performance and control expenses. Jack Dowling of JD Security Consultants LLC added that...

  • Securing a future in security requires diverse qualifications.  // Cabling Installation & Maintenance;Dec2004, Vol. 12 Issue 12, p26 

    The article reports that in January 2004, the electrical and voice/data communications distributor Graybar (www.graybar.com) entered the security arena when it unveiled a cadre of surveillance, access-control, and alarm-system products to its customers. The article presents the views of Karl...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics