The perimeter security approach chosen will be influenced by the nature of the facility, the setting, activity around the site, perceived threats, weather, and other factors. At least 22 intrusion detection sensor technologies are available. Decision-makers should consider other users' experience with the technology, the availability of parts, the warranty, and many other factors when assessing a perimeter security system. Communications technologies include smart cards, personal locator devices, personal duress alarms, panic buttons, vehicle radios, and walkie-talkies. Communications technology must be customized for a specific site and flexible enough to meet changing conditions. Decision-makers should review comparative information, consult with communications experts, and consider 25 specific issues when purchasing a communications system. Monitoring and surveillance systems include global positioning satellites, access control systems, closed-circuit television, motion detectors, and audio monitors. System planning should incorporate both a facility's security needs and staff requirements into the design process. The agency should retain specialized personnel and consider 16 issues ranging from maintenance and repair to staff training. Having a formal research and evaluation process and discussing technology with other corrections agencies improve the chances of success and satisfaction with the technology. Photographs
Downloads
Similar Publications
- Expanding on the factor structure and construct validity of the Short-Term Assessment of Risk and Treatability (START) in a general correctional sample
- Forever Free Substance Abuse Program at the California Institute for Women in Frontera, California
- Assessing the Impact of a County Operated Boot Camp: Evaluation of the Los Angeles County Regimented Inmate Diversion Program