[go: up one dir, main page]

Features Submission, 1982 - Google Patents

ELECTRONIC SECURITY

Features Submission, 1982

Document ID
6974456695688637386
Author
Features Submission H
Publication year
Publication venue
Library & Archival Security

External Links

Snippet

Electronic security systems are not the panacea that some have declared them to be. Technical and legal considerations complicate their use. It is these considerations that have prompted Alice Harrison Bahr to say in Book Theft and Library Security Systems: 1978 …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2408Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using ferromagnetic tags
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/08Mechanical actuation by opening, e.g. of door, of window, of drawer, of shutter, of curtain, of blind
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • G08B15/02Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives with smoke, gas, or coloured or odorous powder or liquid

Similar Documents

Publication Publication Date Title
US6774782B2 (en) Radio frequency personnel alerting security system and method
US3859652A (en) Method and apparatus for detecting the theft of articles
US4975680A (en) Local-field type article removal alarm
Ewing Library security in the UK: are our libraries of today used or abused?
US3534358A (en) Apparatus for detecting objects
Features Submission ELECTRONIC SECURITY
McDonald Book detection systems
Meacham The Perfect Storm: How Narrowing of the State Action Doctrine, Inconsistency in Fourth Amendment Caselaw, and Advancing Security Technologies Converge to Erode Our Privacy Rights
Mansfield Reducing book theft at university libraries
Revill Library security
Chavez Library Crime and Security in Academic Libraries in Texas
Brawner et al. Improving security and safety for libraries
Komut Library Security in Changing Environment: An Overview
Christman et al. Guidelines on Dealing With Suspected Shoplifters
US20190122518A1 (en) Personal safety device
Kimiecik Loss prevention guide for retail businesses
Hearnden et al. The handbook of business security: a practical guide to managing the security risk
Allberry II Search and Seizure: The Detection of Marijuana by Trained Dogs
Scobey On Booknapping and Other Headaches
Meacham The Perfect Storm: How Narrowing of the State Action Doctrine, Inconsistency in Fourth Amendment Caselaw, and Advancing Security Technologies Converge to Erode Our Privacy Rights
Shenk Surveillance society: Openness is the best defence against intrusions into our private realms
Allbery III Search and Seizure: The Detection of Marijuana by Trained Dogs
Guthrie Integrated Screening Systems in the 1990s
CZ124096A3 (en) Piezoelectric detection system for a safety device
Kaperonis Industrial espionage