1st Edition
Futures in Mechanics of Structures and Materials
Futures in Mechanics of Structures and Materials is a collection of peer-reviewed papers presented at the 20th Australasian Conference on the Mechanics of Structures and Materials (ACMSM20, University of Southern Queensland, Toowoomba, Queensland, Australia, 2 – 5 December 2008) by academics, researchers and practicing engineers mainly from Australasia and the Asia-Pacific region. The topics under discussion include:
- Composite structures and materials
- Computational mechanics
- Earthquake and wind engineering
- Fire engineering
- Geomechanics and foundation engineering
- Mechanics of materials
- Rehabilitation of structures
- Reinforced and prestressed concrete structures
- Reliability and sustainability of structures
- Shock and impact loading
- Steel structures
- Structural dynamics
- Structural health monitoring
- Structural mechanics
- Timber engineering
Futures in Mechanics of Structures and Materials will be a valuable reference for academics, researchers and practicing engineers working in structural and material engineering and mechanics.
THE EVOLVING ROLE OF SECURITY MANAGEMENT
The Risk and Loss Challenges to Modern Enterprise
Super-Ordinate Directive: Protecting People, Property and Ideas
Ensuring Continuity of Service
Examination of Specific Environments:
Governance and Compliance: Internal Threats and Stakeholder Confidence
Litigation and Legislation
Globalization
IT/Network Infrastructure
Total Enterprise Security: Protecting Organizational Assets
Human Assets
Physical Assets
Intellectual Property
Brand Identity and Reputation
Financial Integrity and Accountability
Information Technology and Networks
Business Continuity and Succession Planning
The Security Manager as a Team Leader
Expectations of the Modern Manager
Supervision and Management: Roles and Responsibilities
Identifying Management Style
Effective Team Dynamics
Critical Distinctions: Management and Leadership
Identifying and Meeting Goals
Security Manager's Human Resource Responsibilities
The Security Manager as a Business Leader
The Role of Security in Modern Enterprise
Business Metrics and Total Quality Management
Overcoming "Overhead" Perception: Quantifying Averted Loss and Building Value
Added Services
Establishing Executive Buy-in
Key Business Partners:
THE EVOLVING ROLE OF SECURITY, RISK MANAGEMENT AND LOSS PREVENTION
The Art & Science of Security
Historical Concepts of Security
Two Traditional Postures: "Denial and Hysteria"
Operating in a "Fishbowl"
The Security Manager as Chess Player
Detect, Deter, Disrupt, Deny
The Five Components of an Effective Security Program:
Managing Risk
The Risk Management Formula
Risk Analysis and Modeling
Selling your Solutions
Security Operations in the Modern Enterprise
Credential Management
Access Control and Alarm Management
Surveillance: Detection and Deterrence
Fire/Life Safety Prevention and Containment
Surveys and Measurement
Audits and Compliance
Prevention through Design
Incident Reporting and Case Management
IT Authentication, Security and Monitoring
Public Agency Interface
Budgeting
Defining the Security Budget
Anticipating Costs and Forecasting Expenditures
Fixed Costs vs. Variable Costs
One Time Expenditures, Amortization and Depreciation
Personnel Expenditures
Technology Expenditures
Vehicle and Equipment Expenditures
"Marketing "/Security Awareness Expenditures
Administrative Expenditures
Training Expenditures
Cost Efficienciesl Economies of Scale
Value-Added Opportunities
The Intelligence Cycle and Due Diligence
Planning and Direction
Collection
Processing
Analysis and Production
Dissemination
Due Diligence Investigations
Communications and Media
Organizational Media Policy
Public Information Officers
Press Access and Free Speech Areas
Establishing Good Media Relations
Information Management
Security Ethics
Expectations and Rights
Illegitimate or Unlawful Directives
Limits of Surveillance
Unfair Labor Practices
Profiling
Use of Force
COMPONENTS OF THE ENTERPRISE SECURITY PROGRAM
People (Personnel)
Determining Needs: In-House vs. Outsourced Functions
The Modem Security Officer:
Establishing Post and Patrol Requirements
Selecting Vendors
Contract Management
The Hiring and Selection Process
Developing Supervisors and Grooming Your Replacement
Training and Professional Development
Career Path Development
Technology
Access Control and Alarm Monitoring Systems (ACAMS)
Network Architecture
Security Cameras
Surveillance Monitoring
Control Center Design
Network Access Authentication
Network Protection and Encryption
Lighting
Screening and Detection
Biometrics
Fire and Life Safety
RFP and Vendor Selection
Contract Management
Specifications, Drawings and System Design Standards
Test and Verification
Environment
SWOT (Strengths, Weaknesses, Opportunities, and Threats) Analysis
Defensible Space
Integrating Security into Design
Project Management
Target Hardening
Natural Barriers
Natural Lighting
Visibility and Line- of- Sight
Psychological Deterrents
Process
Vision and Mission Statement for Security
Organizational Policies and Procedures
Executive Buy-In
Post Orders
Emergency Response Procedures
Legislation and Regulation
Survey, Audit and Compliance
Training
Periodic Evaluation and Modification
Continuous Process Improvement
Awareness
Defining Security Awareness
Intelligence and Threat Assessment
Training, Educating and Empowering the Workforce
Engineering Good Habits
"JDLR"- Just Doesn't Look Right
Creative Awareness Strategies
Marketing Security
Executive Buy-In
Security Awareness Focus
DEFINING AND MITIGATING THE THREATS TO ENTERPRISE SECURITY
Internal Investigations
Discretion and Privacy
Rights and Abilities in Private vs. Public Investigations
Shopkeeper's Privilege
Involving Key Business Partners
Internal Threats
Financial Misconduct I White Collar Crime
Corporate and Vicarious Liability
Policy Violations
Unauthorized DisclosurelViolations of Privacy
Theft
Criminal and Civil Threats
Shoplifting
Trespassing
Burglary
Vandalism
Slips, Trips and Falls
Civil Disobedience
Assault and Battery
Domestic Violence
Arson and Sabotage
Narcotics and Substance Abuse
Gangs and Organized Crime
Coordinating with Law Enforcement
Workplace Violence
Definitions
Hostile Work Environment
Weapons Policies
The Warning Signs
Intervention
Mitigation and Employee Assistance
Response Plans
Fire and Life Safety Emergencies
Fire Protection and Life Safety
Monitoring and Inspection
Prevention
Containment
Early Detection and Response
Interagency Coordination
Evacuation Training and Education
Standardized Emergency Management System (SEMS)
Communications Interoperability
Catastrophic Event and Business Continuity Planning
Natural Disaster
Terrorism
Civic Unrest
Pandemic
CBRNE Events
Unintended Release, Toxins, Explosions
Cyber-attack, Denial of Service, Network Failure
Threats to Executives, Disruption of Decision Making
Elements of BCP
Competitive Intelligence and Industrial Espionage
Compare and Contrast CI and Espionage
Operational Security (OPSEC)
Defining, Controlling and Destroying Sensitive Information
Counter Intelligence Programs
Methods of Intelligence Gathering
Electronic Intelligence and Countermeasures
Operating in a Global Environment
Regional Analysis
Identifying Public and Private Regional Partners
Global Centralized Monitoring
Piracy, Kidnap and Ransom, and Extortion
Information and Network Security
Partnering with IT and Network Administrator
Cross-functionality: physical and IT security
Understanding Threats
Authentication and Verification
Monitoring and Measurement
Intrusion Detection and Network Analyzers
Antivirus
Firewalls and Proxy
CASE STUDIES
Biography
Aravinthan, Thiru; Karunasena, Warna (Karu); Wang, Hao