1st Edition

Futures in Mechanics of Structures and Materials

    Futures in Mechanics of Structures and Materials is a collection of peer-reviewed papers presented at the 20th Australasian Conference on the Mechanics of Structures and Materials (ACMSM20, University of Southern Queensland, Toowoomba, Queensland, Australia, 2 – 5 December 2008) by academics, researchers and practicing engineers mainly from Australasia and the Asia-Pacific region. The topics under discussion include:

    - Composite structures and materials

    - Computational mechanics

    - Earthquake and wind engineering

    - Fire engineering

    - Geomechanics and foundation engineering

    - Mechanics of materials

    - Rehabilitation of structures

    - Reinforced and prestressed concrete structures

    - Reliability and sustainability of structures

    - Shock and impact loading

    - Steel structures

    - Structural dynamics

    - Structural health monitoring

    - Structural mechanics

    - Timber engineering

    Futures in Mechanics of Structures and Materials will be a valuable reference for academics, researchers and practicing engineers working in structural and material engineering and mechanics.

    THE EVOLVING ROLE OF SECURITY MANAGEMENT
    The Risk and Loss Challenges to Modern Enterprise

    Super-Ordinate Directive: Protecting People, Property and Ideas
    Ensuring Continuity of Service
    Examination of Specific Environments:
    Governance and Compliance: Internal Threats and Stakeholder Confidence
    Litigation and Legislation
    Globalization
    IT/Network Infrastructure

    Total Enterprise Security: Protecting Organizational Assets
    Human Assets
    Physical Assets
    Intellectual Property
    Brand Identity and Reputation
    Financial Integrity and Accountability
    Information Technology and Networks
    Business Continuity and Succession Planning

    The Security Manager as a Team Leader
    Expectations of the Modern Manager
    Supervision and Management: Roles and Responsibilities
    Identifying Management Style
    Effective Team Dynamics
    Critical Distinctions: Management and Leadership
    Identifying and Meeting Goals
    Security Manager's Human Resource Responsibilities

    The Security Manager as a Business Leader
    The Role of Security in Modern Enterprise
    Business Metrics and Total Quality Management
    Overcoming "Overhead" Perception: Quantifying Averted Loss and Building Value
    Added Services
    Establishing Executive Buy-in
    Key Business Partners:

    THE EVOLVING ROLE OF SECURITY, RISK MANAGEMENT AND LOSS PREVENTION

    The Art & Science of Security
    Historical Concepts of Security
    Two Traditional Postures: "Denial and Hysteria"
    Operating in a "Fishbowl"
    The Security Manager as Chess Player
    Detect, Deter, Disrupt, Deny
    The Five Components of an Effective Security Program:
    Managing Risk
    The Risk Management Formula
    Risk Analysis and Modeling
    Selling your Solutions

    Security Operations in the Modern Enterprise
    Credential Management
    Access Control and Alarm Management
    Surveillance: Detection and Deterrence
    Fire/Life Safety Prevention and Containment
    Surveys and Measurement
    Audits and Compliance
    Prevention through Design
    Incident Reporting and Case Management
    IT Authentication, Security and Monitoring
    Public Agency Interface

    Budgeting
    Defining the Security Budget
    Anticipating Costs and Forecasting Expenditures
    Fixed Costs vs. Variable Costs
    One Time Expenditures, Amortization and Depreciation
    Personnel Expenditures
    Technology Expenditures
    Vehicle and Equipment Expenditures
    "Marketing "/Security Awareness Expenditures
    Administrative Expenditures
    Training Expenditures
    Cost Efficienciesl Economies of Scale
    Value-Added Opportunities

    The Intelligence Cycle and Due Diligence
    Planning and Direction
    Collection
    Processing
    Analysis and Production
    Dissemination
    Due Diligence Investigations
    Communications and Media
    Organizational Media Policy
    Public Information Officers
    Press Access and Free Speech Areas
    Establishing Good Media Relations
    Information Management

    Security Ethics
    Expectations and Rights
    Illegitimate or Unlawful Directives
    Limits of Surveillance
    Unfair Labor Practices
    Profiling
    Use of Force

    COMPONENTS OF THE ENTERPRISE SECURITY PROGRAM
    People (Personnel)
    Determining Needs: In-House vs. Outsourced Functions
    The Modem Security Officer:
    Establishing Post and Patrol Requirements
    Selecting Vendors
    Contract Management
    The Hiring and Selection Process
    Developing Supervisors and Grooming Your Replacement
    Training and Professional Development
    Career Path Development

    Technology
    Access Control and Alarm Monitoring Systems (ACAMS)
    Network Architecture
    Security Cameras
    Surveillance Monitoring
    Control Center Design
    Network Access Authentication
    Network Protection and Encryption
    Lighting
    Screening and Detection
    Biometrics
    Fire and Life Safety
    RFP and Vendor Selection
    Contract Management
    Specifications, Drawings and System Design Standards
    Test and Verification

    Environment
    SWOT (Strengths, Weaknesses, Opportunities, and Threats) Analysis
    Defensible Space
    Integrating Security into Design
    Project Management
    Target Hardening
    Natural Barriers
    Natural Lighting
    Visibility and Line- of- Sight
    Psychological Deterrents

    Process
    Vision and Mission Statement for Security
    Organizational Policies and Procedures
    Executive Buy-In
    Post Orders
    Emergency Response Procedures
    Legislation and Regulation
    Survey, Audit and Compliance
    Training
    Periodic Evaluation and Modification
    Continuous Process Improvement

    Awareness
    Defining Security Awareness
    Intelligence and Threat Assessment
    Training, Educating and Empowering the Workforce
    Engineering Good Habits
    "JDLR"- Just Doesn't Look Right
    Creative Awareness Strategies
    Marketing Security
    Executive Buy-In
    Security Awareness Focus

    DEFINING AND MITIGATING THE THREATS TO ENTERPRISE SECURITY

    Internal Investigations
    Discretion and Privacy
    Rights and Abilities in Private vs. Public Investigations
    Shopkeeper's Privilege
    Involving Key Business Partners

    Internal Threats
    Financial Misconduct I White Collar Crime
    Corporate and Vicarious Liability
    Policy Violations
    Unauthorized DisclosurelViolations of Privacy
    Theft

    Criminal and Civil Threats
    Shoplifting
    Trespassing
    Burglary
    Vandalism
    Slips, Trips and Falls
    Civil Disobedience
    Assault and Battery
    Domestic Violence
    Arson and Sabotage
    Narcotics and Substance Abuse
    Gangs and Organized Crime
    Coordinating with Law Enforcement

    Workplace Violence
    Definitions
    Hostile Work Environment
    Weapons Policies
    The Warning Signs
    Intervention
    Mitigation and Employee Assistance
    Response Plans
    Fire and Life Safety Emergencies
    Fire Protection and Life Safety
    Monitoring and Inspection
    Prevention
    Containment
    Early Detection and Response
    Interagency Coordination
    Evacuation Training and Education
    Standardized Emergency Management System (SEMS)
    Communications Interoperability

    Catastrophic Event and Business Continuity Planning
    Natural Disaster
    Terrorism
    Civic Unrest
    Pandemic
    CBRNE Events
    Unintended Release, Toxins, Explosions
    Cyber-attack, Denial of Service, Network Failure
    Threats to Executives, Disruption of Decision Making
    Elements of BCP

    Competitive Intelligence and Industrial Espionage
    Compare and Contrast CI and Espionage
    Operational Security (OPSEC)
    Defining, Controlling and Destroying Sensitive Information
    Counter Intelligence Programs
    Methods of Intelligence Gathering
    Electronic Intelligence and Countermeasures

    Operating in a Global Environment
    Regional Analysis
    Identifying Public and Private Regional Partners
    Global Centralized Monitoring
    Piracy, Kidnap and Ransom, and Extortion

    Information and Network Security
    Partnering with IT and Network Administrator
    Cross-functionality: physical and IT security
    Understanding Threats
    Authentication and Verification
    Monitoring and Measurement
    Intrusion Detection and Network Analyzers
    Antivirus
    Firewalls and Proxy

    CASE STUDIES

    Biography

    Aravinthan, Thiru; Karunasena, Warna (Karu); Wang, Hao