Citations &
Quotations
Bergman, Cory, et al, Factal Benchmarker, 4 March 2025
Rock, Amy, Weapons Detection in Schools and Healthcare: Experts Share 2025 Predictions, Campus Safety, 25 December 2024
Panelists to share how geopolitical conflicts manifest security issues, Security Magazine, 7 November 2024
Thorpe, James, Celebrating Leadership, International Security Journal, August 2024
Briggs, Rachel, The Business Value of Corporate Security, The Clarity Factor, December 2023
Booker, Lucy, What’s Next for AI in the Security Sector? IFSEC Insider, 13 December 2023
Emergence Technology Group Agrees to Acquire Revolutionary Voice Technology for Safety and Security, WWLP.com, 5 December 2023
Cody and Fletcher, The ROI of LOL (Harper Collins, 2023)
GLSA Has Rebranded as the Life Safety Alliance, Security Sales & Integration, September 20, 2023
Shifting Boundaries: Managing Security in the Age of Boundaryless Working, Brivo and Worktech Academy, June 2023
Protecting Your Workplace: 6 Essential Steps for Safety, Facilities.net, 9 June 2023
Managing Insider Risk During Mergers and Acquistions, Intelligence and National Security Alliance, April 2023
Redesigning Pandora’s Box: Another Reason to Leave Siloed Security Behind, Security Management, 13 February 2023
Top Physical Security Predictions for 2023, Security, January 2023
Inside the Mind of a Security Expert, Security Journal Americas, October 2022
Revealed: The IFSEC Global influencers in Security 2022, IFSEC Global, June 2022
Michael Gips Named President of GLSA, Securityinfowatch.com, 3 May 2022
Michael Gips earns Azbee award for his Security magazine column, Security, April 15, 2022
Voice technology startup Emergence taps Goldenberg and Gips as senior advisors, Securityinfowatch.com, 17 February 2022
The value of continuous learning for a security professional, International Security Journal, February 4, 2022
Managing the Insider Threat with Defensive Strategies, Security Management, September 28, 2021
The 20th anniversary of September 11: Reflections on the evolution of enterprise security, September 11, 2021
Understanding Access Control Challenges During the Pandemic, FacilitiesNet, September 2021
Providing Insights and Inspiration, International Security Journal, September 2021
Digital Building Ecosystem: Real Control in Access, Malaysiakini, 6/8/21
Henrik Söderlund, Access Control Solutions: This year’s market and technology trends, Security World Market, 4/27/21
Hau, Z., Demetriou, S., Muñoz-González, L., Lupu, E.C. (2021). Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing. In: Bertino, E., Shulman, H., Waidner, M. (eds) Computer Security – ESORICS 2021. ESORICS 2021.
Securing the Perimeter, Adam Stone, Security Magazine, 3/8/21
Lower Middle Market M&A in the Biden/COVID Era Security, Defense and Federal Services, Pickwick Capital Partners, February 2021
Visitor Management Systems Adapt to Healthcare, Securityinfowatch.com, 1/15/21
Willison, Who is responsible for protecting physical security systems from cyber-attacks?, Dark Reading, 1/14/21
Wakefield, Security and Crime: Converging Perspectives on a Complex World (2021)
The Realities of Launching A Security Startup, Suzanna Alsayed, Security Management, December 2020
Beyond a Cataclysmic 2020: Security’s New Opportunities to Address Workplace Risk, White paper, Thomson Reuters, 11/3/20
Off the Shelf: The Violent Nonstate Actor Drone Threat, Kerry Chavez and Dr. Ori Swed, Air & Space Power Journal, Fall 2020
Drone imagery in Islamic State propaganda: flying like a state, Durham University, July 2020
Billions of dollars in coronavirus pandemic aid for small businesses go unclaimed, Associated Press, 6/29/20
Michael Boyle, The Drone Age: How Drone Technology Will Change War and Peace (2020)
Using Blockchain for Effective Risk Management in Supply Chain: A Qualitative Study. Global Business and Management Research: An International Journal Vol. 12, No. 3 (2020)
Why It’s Time to Converge Physical Security and Cybersecurity, Buildings, 8/12/19
TechSec Solutions Bring Best and Brightest Together, Security Systems News (2/27/19)
Future of Physical Security: Extending Converged Digital Capabilities Across Logical and Physical Environments (Microsoft/Accenture)
Hesterman, J., Soft Target Hardening: Protecting People from Attack, Routledge (2018)
YouTube Shooting Ignites Debate Over Merging Physical & IT Security, Dark Reading (4/4/18
Private Security: An Introduction to Principles and Practices, By Charles Nemeth, CRC Press, 2017
Police Brutality, Misconduct, and Corruption: Criminological Explanations and Policy Implications (2017)
Orlando Attacks Renew Focus on Security at Smaller U.S. Businesses, Reuters, 6/17/16
Will Orlando Change Security Where We Work and Play? Marketplace, National Public Radio, 6/13/16
Fagel M. and Hesterman, J., Soft Targets and Crisis Management, CRC Press, 2016
Persuading Senior Management with Effective, Evaluated Security Metrics, ASIS Foundation (2014)
Tancredi, N. Improving the Image and Reputation of the Security Profession, IFPO (December 2013)
Atlas, 21st Century CPTED (2013)
Hesterman, The Terrorist-Criminal Nexus (2013)
An Identification of the "Rippling Effect" in the Transmission of Disruptions in Supply Chains. The Dilemmas of Theoretical Study and Empirical Research, The Central European Journal of Social Sciences and Humanities (2013)
Ekwall and Rolandsson, Security aspects on corporate culture in a logistics terminal setting, Journal of Transportation Security (October 2012)
Antagonistic threats against supply chain activities are wicked problems, Journal of Transportation Security (2012)
Sennewald, C. Effective Security Management (2011)
Ekwall, D. “Antagonistic threats against transports in EU in a supply chain risk perspective: an analysis of official statistics.” In proceedings of Nofoma, Kolding (2010)
Combating the Shoplifter: An Examination of Civil Recovery Laws, Journal of Applied Security Research (2009)
Karen Hess, Introduction to Private Security, 5th Edition (2009)
Fischer, Halibozek, and Green, Introduction to Security, 8th Edition (2008)
Supply Chain Risk (2008)
Sport Venue Security: Planning and Preparedness for Terrorist Related Incidents, The SMART Journal, Spring/Summer 2008
Clifford, Espionage and Intelligence (2007)
Nemati, Information Security and Ethics (2007)
Aleong, GREEN MEDICINE: USING LESSONS FROM TORT LAW AND ENVIRONMENTAL LAW TO HOLD PHARMACEUTICAL MANUFACTURERS AND AUTHORIZED DISTRIBUTORS LIABLE FOR INJURIES CAUSED BY COUNTERFEIT DRUGS, University of Pittsburgh Law Review (2007)
Hospital Safety: Not Child’s Play, Journal of Healthcare Protection Management (2007)
Voss, The Role of Security in the Supplier-Selection Decision (2006)
AWWA, Water Treatment Plant Design (2005)
Critical Infrastructure: Control Systems and the Terrorist Threat, Congressional Research Service (2004)
Agroterrorism in the US: key security challenge for the 21st century, Biosecurity & Bioterrorism (2004)
Craighead, G., High-Rise Security & Fire Life Safety, Butterworth-Heinemann (2003)
Jackson, B., et al., Evaluating Novel Threats to the Homeland: Unmanned Aerial Vehicles and Cruise Missiles, RAND Corporation (2008)
Connors, E., Planning and Managing Security for Major Special Events, U.S. Department of Justice (2007)
Exploring Moral Situations, Moral Emotions, and Moral Self as Predictors of Juvenile Delinquents' Global Self-Esteem, Youth Violence and Justice (10/1/06)
Potential Indicators of Terrorist Activity Infrastructure Category: Arenas and Stadiums, U.S. Department of Homeland Security (2004)
Nadel, B. Building Security: A Handbook for Architectural Planning and Design (2004)
Electronic workplace surveillance, Part 2: responses to electronic workplace surveillance - resistance and regulation" Privacy Law and Policy Reporter (2003)
The "Worst of Both Worlds": School Security and the Disappearing Fourth Amendment Rights of Students, Criminal Justice Review (2003)
Parker, H., Agricultural Bioterrorism: A Federal Strategy to Meet the Threat, Institute for National Strategic Studies, National Defense University (2002)
Hess, K., Introduction to Private Security, 5th Edition, Wadsworth (2009)
Gormley, D., On Not Confusing the Unfamiliar with the Improbable: Low-Technology Means of Delivering Weapons of Mass Destruction, Weapons of Mass Destruction Commission (2004)
SUPPLY CHAIN RISK MANAGEMENT: OUTLINING AN AGENDA FOR FUTURE RESEARCH, International Journal of Logistics, 2003
American Sports as a Target of Terrorism, Sport and the Law Journal, Volume 10, Issue 1 (2002)
Blake and Bradley, Premises Security (1999)
Coping With Systems Risk: Security Planning Models for Management Decision Making, MIS Quarterly, December 1998