Lloyd Sealy Library                                                                                                                    John Jay College of Criminal Justice


A Research Guide to the Lloyd Sealy Library
John Jay College of Criminal Justice

This list encompasses Reports, Manuals, Directories, Encyclopedias and Dictionaries, Periodicals, Indexes, and Internet Sites.

The Reports examine problems concerning relationships between security guards and the police, the regulating, licensing, and professionalization of workers in the security field, the growing uses of private security in crime control and prevention, and the growth of white-collar crime and the need for control measures.

The Manuals provide specific forms, instructions, illustrations, and checklists on the following: crime control and prevention methods, equipment selection, architectural design and crime prevention, access control, perimeter security, hiring and supervision of guards, prevention as well as recovery from different types of emergencies and disasters, executive protection, codes and standards, new technology, management techniques and principles, e.g.,budgeting, planning, implementation and evaluation, needs assessment and surveys, personnel training and motivation,etc., for making and carrying out security policy and job operations.

The Directories give telephone numbers and addresses of consultants, suppliers, services, and manufacturers as well as professional associations, relevant law enforcement agencies, and educational institutions offering security related courses, training workshops and seminars. Information is given regarding salary levels for some benchmark security jobs in business, industry, government, and other organizations. OSHA standards and guidelines as well as industrial safety, hygiene, and security are also covered in directories.

Encyclopedias and a Dictionary with information on security, and terrorism, terrorists, and a chronology of their activities.

The Periodicals cover a range of security topics: hospitals, hotel/motels, nursing homes, industrial sites, retail businesses, campus security, computer crime, executive protection, electronic surveillance, access and perimeter control, safety and industrial hygiene, hazardous materials and toxic chemicals, fire prevention and control, emergency/disaster management, supervisory/ administrative techniques, and product developments.

The Indexes and Abstracts provide access to information from periodicals, books, reports, and dissertations on a variety of topics: security administration, operations, and training in a wide range of security work, terrorism, fire prevention and control, emergency and disaster management, executive protection, computer and information security, white collar crime, risk management, safety, hazardous and toxic materials and spills.

The Internet Sites contain information relevant to security and safety management.


HV8290 .U6
.C86 1991
Cunningham, W.C. and Taylor, T. H. (1991). The Hallcrest report I: Private security and police in America. Stoneham, MA: Butterworth- Heinemann.

This work presents the results of a thirty-month research project from which the following recommendations were made: security forces and police need to cooperate, private security personnel should be trained, and security forces and services should be regulated. Discusses the impact of new technology on the work of police and private security. The appendix gives statutes, by state, which pertain to the regulating and licensing of guards, investigators, and alarm system contractors.

Cunningham, W.C. (1985). Crime and protection in America: A study of private security and law enforcement resources and relationships: Executive summary. Washington, DC: National Institute of Justice.

Summary of the Hallcrest Report: Private security and police in America.

HV 6791 .F53
The Figgie report on fear of crime: America afraid. (1980-88).(5 vols.). Willoughby, OH:A-T-O Inc. Volume 2 - The corporate response to fear of crime.

This report provides information on crimes against corporate executives and their families, the executives’ opinions about the effect that crime has had on corporate life and crime’s impact on the criminal justice system. The information is based on a survey of executives from forty Fortune 1000 companies.

HV 6769.R667
Rosoff, S.M., Pontell, H.N., & Tillman, R. (1998). Profit without honor: white-collar crime and the looting of America.

Analyzes the causes and reports on the types of fraud and espionage in business, banking, investment and securities, chemical and hazardous waste companies, automobile industry, health services, and the government and the military. Explores methods of prevention.

Wilkinson, P. (Ed.). (1993). Technology and terrorism.
London,UK: Frank Cass.

Terrorist groups have become aware of new weapons: chemical and biological weapons, and non-traditional or non-military types of explosives. To prevent and control terrorism, the superpowers must keep the edge in technology through cooperation and collaboration. The articles stress the importance of selecting and training personnel that have the ability and are motivated to learn how to use the new, advanced technology. Discusses the various types of technology available for use in airport security.


Anderson, S. & Sloan, S. (1995). Historical dictionary of terrorism. Metuchen, NJ: Scarecrow Press.

Profiles, in alphabetical order, of terrorists and terrorists groups, e.g., Carlos “the Jackal”, the Ayatollah Khomeini, the Ulster Defense Association, the Quebec Liberation Front, the Sandinistas, the Ku Klux Klan, and the Japanese Red Army. Contains a chronology of terrorism from the first century through 1994,e.g., the bombing of the World Trade Center - February 26, 1993.

1997 v. 1-3
Crenshaw, M. & Pimlott, J (Eds.). (1997). Encyclopedia of world terrorism. Armonk, NY: M.E. Sharpe.

Articles on terrorism and terrorists in ancient Greece and the Roman Republic, World War II, the Middle East, Latin America, the former Yugoslavia, and Colonial and post-Colonial Britain, Africa, Asia, and the United States. The index to terrorist organizations and individuals is the “Directory” in volume three, pp. 700-715. An example of an entry in the Directory: Branch Davidian cult I :253-4. The article on the Branch Davidian cult is in volume one on pp. 253-4. A chronology of terrorist activities from 1945-1996 is on pp. 687-699. Set contains illustrations and maps.

Fay, John J. (Ed.). (1993). Encyclopedia of security management: techniques and technology. Newton, MA:

Entries are in alphabetical order. Covers physical security and equipment, training, administration,budgeting, planning and evaluation of projects,screening of job applicants, guards,systems design, investigations, arson, risk management, computer and information security, polygraph, terrorism,espionage, executive protection, safety, fire prevention and control, disaster and emergency operations, and fraud.


Atkins, S.E. (1992). Terrorism: a reference handbook. Santa Barbara, CA: ABC-CLIO.

An explanation of terrorism by the state, by an organization, and by state-sponsored terrorists. Presents a chronology (dates and a brief description) of terrorists attacks (1894-1992). Gives biographical profiles of terrorists (1945-1992),e.g., Yitzhak Shamir (Israel), Robert Jay Matthews (United States), and Abu Nidal (Palestine), and terrorist organizations (1940-1992),e.g., the Red Brigade (Italy),and the Irish Republican Army.

RA969.95 .B56
Bing, D.D. & Sarrat, W.G. (1987). The Health care security survey/planning manual. Port Washington, New York: Rusting Publication.

How to conduct a security survey of a hospital by experts in this field. Checklists of what to look for and sample survey forms are included.

Bintliff, R.L. (1992). The Complete manual of corporate and industrial security. Englewood Cliffs, NJ: Prentice-Hall.

Security measures for company office buildings,staff, and shipments of goods and supplies. Information on screening, hiring,and training of security personnel.

TH9446 .H38
Davis, D.J., Davis, J.A., & Christianson, G.T. (1993). (2d ed.).
Firefighter’s hazardous materials reference book and index. New York: Van Nostrand Reinhold.

Provides the basic information that a first responder needs to know when reacting to a hazardous materials incident. The text has a chemical reference sheet that contains guidelines, such as the following, for responding to a chemical emergency: identification of the hazardous material, manufacturer’s name and telephone number, reportable level of spill, fire hazard including hazardous by-products from the material, types of extinguishing agents to use, reactivity of the chemical and what to expect if this occurs,and procedures to neutralize the spill. The index is arranged by name of chemical.

HV8290 .H345
Fennelly, L.J. (Ed.). (1996). Handbook of loss prevention and crime prevention. (3rd. ed.). Boston: Butterworth-Heinemann.

Presents management information, equipment standards,and loss prevention guidelines pertaining to security applications in a variety of security management jobs. Covers retail, hospital, hotel/motel, computer, banking, and campus security.

TH9446 .H38
Fire protection guide to hazardous materials. (1994). (11th ed.). Boston, MA: National fire Protection Association.

Chemical data sheets provide vital information on the chemical properties of hazardous chemicals used in industry. Gives information on the use and storage of chemicals, prevention of fires and spills,and the correct emergency procedures to employ when a fire, spill, or transportation accident occurs. Appendices A-C provide a full explanation of the information given on the Hazardous Chemical Data Sheets. Appendix D identifies the National Electrical Code’s classification for specific chemical requirements for locations where a fire/explosive hazard exist, e.g., flammable gases/vapors.

Fisher, B.S. & Sloan, J.J. III. (Comp.). (1995). Campus crime: Legal, social, and policy perspectives. Springfield, ILL: C.C. Thomas.

Discusses the measures used by the campus security departments to prevent crime and to aid victims. Examines the roles of the campus police and public law enforcement. Discusses the relationship between the community environment and campus crime.

HV7936 .R53 .H46
Hertig, C.A., & Bittner, G.E. (1991). Report writing for security personnel. Boston, MA: Butterworth-Heinemann.

How to write security reports ,e.g.,an emergency complaint, computer theft, slippery floor, blocked fire exit, accident investigation, etc., so that the report is a document of what actually happened and not one’s personal opinion.

Hutt, A.E., Bosworth, S., & Hoyt, D.B. (Eds.). (1995). (3rd.). Computer security handbook. New York: Wiley & Sons.

Gives security measures to prevent loss, destruction, and improper use of computer data, software, and hardware. Guidelines for what to do before and after the emergency.

TH9445 .P8 .L53
7th ed.
Life safety code handbook. (1997). (7th ed.). Quincy, MA: National Fire Protection Association, Inc.

The Life Safety Code emphasizes specific requirements that improve safety to life in new and existing structures. Minimum requirements are given but this level may be exceeded. The Code includes such types of buildings as the following: detention and correction facilities; educational academies, schools, and day-care; hotels and dormitories; healthcare facilities; and businesses including malls and showrooms, etc. Code requirements include the means and arrangement of egress; smoke proof enclosures; lighting; detection - alarm systems; flammability and rate of heat release under conbustion for furniture and furnishings,etc.

T 174.5.F86
Molak, V. (Ed.). (1997). Fundamentals of risk analysis and risk management. Boca Raton, FL: CRC Press.

Determining the vulnerability of a business, the workers, and the public to an industrial process, technology, chemical agent, or a natural disaster, and the steps to take to control and mitigate the risk.

HV 8291.U6 .N37a
National Industrial Security Program Operating Manual. (1995). Washington, DC: U.S. Dept. Of Defense.

Policies, practices, and procedures to protect classified information released to contractors ( educational institutions, industry, business,and foreign nationals). Explains appropriate actions to take when security has been breached and when an employee or site no longer has clearance.

HV 8290 .P62
Post, R.S. and Schachtsiek, D.A. (1986). Security managers’ desk reference. Boston: Butterworths.

Handbook for managers that explains how to set up and manage an effective security program. Gives techniques for evaluating equipment, and instructions for audits and surveys.

T55.3.H3 .Q54
Quigley, D.R. (1994). Handbook of emergency chemical management. Boca Raton, Fla: CRC Press.

Provides information on hazardous and less hazardous materials, physical properties and flammability of chemicals, symptoms from exposure to chemicals and first aid treatment. Text gives chemical abstract numbers; indexes arranged both by chemical names and by synonyms; and NIOSH numbers for the Registry of Toxic Effects of Chemical Substances (RTECS#). Procedures are given for the protection of personnel and the clean-up of hazardous materials. Contains a glossary of terms used in the text.

HV6773 .S54
Sieber, U. (1987). The International handbook on computer crime: Computer- related economic crime and the 1987 infringements of privacy. New York: Wiley.

Discusses security strategies for crime prevention, the difficulties in prosecuting this type of crime, the extent and future of computer-related crime, and suggestions for reform. Appendix #2 provides computer statutes by country.

.S55 1996
Sikich, G.W. (1996). Emergency management planning handbook. New York, N.Y. McGraw-Hill.

How to identify hazards and assess their impact upon the business, the clients, staff, and public. Provides guidelines for developing an emergency plan and manual.

Walsh, T.J. & Healy, R.J. (1984-). Protection of assets. (Vols. 1-4;monthly suppl.). Santa Monica,CA: Merrit.

A looseleaf service with frequent updates to the basic volumes plus monthly bulletins. This is the basic manual for security personnel and it covers a broad range of topics of concern to security professionals,e.g.,security needs inside and outside of the building, the screening, hiring, and training of security officers, budgeting, the safety and protection of staff and executives, the relationship between security forces and the police, the impact of technology, criminal and civil law,and how to handle a crisis or a disaster.

HV555.U6 .H35
Waugh, W.L. Jr., & Hy, R.J. (Eds.). (1990). Handbook of emergency management: Programs and policies dealing 1990 with major hazards and disasters. New York: Greenwood Press.

Guidelines for managing different types of disasters,e.g.,earthquakes, volcanic eruptions, floods, collapse of a bridge, a building or a roof, spills of hazardous materials, a public health crisis, and a nuclear reactor meltdown. Provides a list of emergency management organizations which includes telephone numbers and addresses. Explains the different types of resources and help provided by government agencies - Federal Emergency Management Agency, Occupational Safety, and Health Administration, and the Center for Disease Control and Hazardous Materials Information Exchange.


T55.A1 .B4
Best’s safety directory: Industrial safety, hygiene, security. (1986).(vols.1-2).(26th ed.). Oldwick, NJ: A.M. Best.

Information on the technology, equipment, clothing, and training necessary for the health and protection of security personnel as well as the loss prevention, safety, and health of the staff and resources of a business, organization, or institution. Gives the Occupational, Safety, and Health Administration’s standards and guidelines for equipment and clothing

HV8291.U6 .C66
Compensation in the security/loss prevention field. (1990). (6th.ed). Crete, IL: Abbot, Langer & Associates.

Salary levels and definitions of job titles in all areas of security are listed.

Security letter source book. (1983-). New York: Security letter.

A directory, published yearly, of leading security services, suppliers, and manufacturers. This work covers all types of sites,e.g., museums, retail businessses,and residential buildings.The directory includes all aspects of security including insurance, weapons, consultants, investigators, protection of high profile individuals, disaster and recovery sites, safes and vaults, armored cars, and security officers.


Articles related to private security can be found in a wide range of journals. Subject access to journal articles is best obtained through one of the specialized periodical indexes or abstracts. A list of useful indexes and abstracts appear after this section. The current periodicals for the current year are in the “new” periodical section. Back issues or past years of a journal might be on microfilm, microfiche, or in “bound” format. Check the John Jay Periodicals list at the reference desk for the type of format and the call number. Note: researchers might want to browse through current issues of periodicals to keep up with new developments or to explore the job market.
HF5001 .B89
Business Week.

Covers key management issues: security management in the global marketplace, electronic money, ethics and corporations, white collar crime, information technology and security measures,and profiles of key industries and companies.

HV7551 .C33
Campus Law Enforcement Journal.

Covers all areas of security work in Canada. Includes an annual directory issue of suppliers, products, and services.

HV6773 .C664
Computer Fraud & Security.

A United Kingdom journal featuring articles on computer and information technology security risks and appropriate prevention measures and software products. Gives profiles of hackers and the use of their expertise by organized crime and drug cartels, software piracy and prevention measures; cellular phone fraud and its control, banking and computer fraud and countermeasures, protection of data, encryption, and virus attacks and anti-virus products. Includes techniques for preventing the theft of a computer chip.

HV8290 .C7
Corporate security digest. (Merger of Computer crime digest and Security digest).

Weekly information on corporate, commercial, and industrial security. Provides timely and concise information on such issues as executive protection, aircraft security, drug testing in the workplace, and terrorism. Included are special sections on intelligence, security in the news media, and information about security personnel and companies.

HV8290 .A8
Data processing & communications security.

Contains articles on the control and prevention of computer crime, techniques of investigation, methods for auditing computer systems, and disaster recovery. Analyzes legal issues regarding the protection of software and documents. Reviews personnel screening and investigation techniques.

HV8079. A7 .F57
The fire and arson investigator.

Articles emphasize the new methods, processes, and techniques in fire and arson investigation, control, and prevention. Each article has a bibliography. Contains good material on the relationship between terrorism and arson.

HV 8290 .H67
Hospital security and safety management.

Monthly newsletter with information on crime and loss prevention as well as safety principles in a hospital setting. Explains how to defuse tempers of hospital patrons and their families/friends, effectively deploy the guards, and the use of different methods of access for the control of emergency room problems. Gives information on effective lighting for the safety of employees, patients,and visitors, fire safety procedures, the control of drugs and hospital supplies, and parking lot safety.

HV8290 .H68
Hotel/motel security and safety management.

Security tips, methods, and strategies for the use of equipment and staff to ensure the safety of guest and employees , protection of personal property, avoidance of liability, and prevention of violence. Provides information on the screening of potential employees.

HV8290 .I6
International security review

A general international security periodical with articles in English followed by abstracts in French, German and sometimes in Spanish. Includes book reviews and a calendar of conferences, congresses, and exhibits throughout the world.

INTERSEC (The Journal of international security)

UK based journal featuring articles on all aspects of security. Includes columns which give news from the United States, product reports, and summaries of security measures and terrorist attacks in different countries. Provides the dates of important security seminars, conferences,and exhibitions throughout the world.

HV8073 .I3
Journal of forensic identification. (Continues Identification news.)

This is the official journal of the International Association for Identification. Articles cover identification (of firearms, voice, documents, polygraph, and fingerprints) forensic photography, and crime scene investigations. Gives information about the latent print certification program as well as about training seminars and conferences.

HV8290 .J6
Journal of security administration.

Research articles on all aspects of security administration in different applications: business, the formulation of policy, program planning and evaluation, criminal justice, law, and the screening and training of personnel

HV 8078 .A1A5
Newsletter/American Polygraph Association

Provides local and national information for practitioners. Gives articles on how the polygraph detects deception, its various uses, e.g., pre-employment screening of law enforcement applicants, criminal justice cases, and private legal work. Provides information on the use of the polygraph as reported in the news and in court cases. Explains changes in the law and analyzes new legislation. Gives information on polygraph techniques, training and education, approved schools, relevant publications,as well as conference events and committees

HV8290 .P3
Parking security report: the newsletter of public safety, crime prevention, asset protection, liability avoidance.

A newsletter that provides material on security and safety applications (procedures, models, policies and equipment) for various types of parking facilities, malls, garages, lots, in different types of sites,e.g., hospitals, college campuses, schools, businesses,and airports.

HV 8078.A1 A44

Explains how the polygraph detects deception. Gives legal notes, policy and procedures to be aware of when using the polygraph. Explains the validity and reliability of polygraph testing. Provides information on how to conduct a polygraph examination and how to interpret the psychophysiological reactions of the subject. Contains research articles, and publications for further reading.

T55.A1 A418a
Professional safety.

Published by the American Society of Safety Engineers. Promotes safety in industry, the office,the home office,and prison. Covers environmental and chemical hazards,cleanup of spills, health and industrial hygiene, accident prevention programs, ergonomics, and the criteria for measuring safety performance. Discusses the safety standards of the Occupational, Safety, and Health Administration. Includes information on products and equipment, certification training, and conferences.

HV 8290 .P84
Protection news.

Articles on leadership, training, and supervisory skills for the security officer and the first-line supervisor. Gives information on loss control, safety, computer security, explosives, use of canines, basic alarm systems, security trends, physical fitness and self defense skills, and public relations. Good illustrations.

HV 8290 .R4

Published by the Factory Mutual System for its insureds and for fire departments. This journal contains articles on loss prevention and control in industrial properties.

HV 8290 .S4

Provides articles for managers on loss prevention and protection of assets, information, property, and personnel. Gives trends and forecasts useful for determining loss prevention needs. Includes interviews with successful managers, problem solving suggestions,and legal and legislative briefs. Includes product updates.

HV 8290 .S27
Security gazette.

A general security journal from England which provides articles on trends and new technology in the security field. Gives legal briefs, product reviews, security and industry news.

HV8290 .S3745
Security Journal.

An international journal featuring articles on all aspects of security management from the perspective of different job fields and job functions.

HV 8290 .S33
Security letter.

This newsletter includes articles on corporate planning and security, news about security trends and products, the industry’s financial performance, a calendar of continuing education, and book reviews.

HV 8290 .S25
Security Line.

Official newsletter of the Metropolitan Burglar Alarm Association of New York. Gives news and activities of the association, tips on building a successful business, discussion of alarm equipment and installation, legislation, reduction of false alarms, and legal issues. “From The Workbench” column offers practical tips for the security technician. Provides information on state licensing, laws, and regulations, certification, and training.

HV 8290 .S34
Security management.

Published by the American Society for Industrial Security this journal provides articles on security issues, management techniques, and the portrayal of security- related events or personnel in the media;gives judical decisions and pending federal legislation affecting the security industry. Provides industry news, information on conferences and seminars, product reviews, and ASIS activities.

HV8290 .S27
Security management & industry today. (Incorporating Security gazette)

A journal published in the United Kingdom which covers all types of security problems and applications,e.g., retail crime and violence against the store’s staff, public transportation and security, computer security, terrorism, warehouses and loss prevention,and cctv cameras in public areas. Provides announcements from the British Security Industry Association, and product reviews.

HV6431 .T4
Studies in conflict and terrorism.

International coverage of terrorism, violence, and insurgency. Gives profiles of terrorists, the types of conflicts that they wage, their motivation, strategies, and tactics, and the cause(s) (religious, ethnic, social, political,etc.) of their actions. Discusses the various types of equipment used to detect hidden weapons and explosives. Presents the experts’ recommendations on training and countermeasures necssary to prevent and control terrorism and violence. Articles cover all types of terrorism,e.g., aviation terrorism, eco-terrorism, and neo-nazism, etc.

HF 5549 .A2 .S8

Provides short, readable articles on employee theft and fraud, drug and alcohol abuse on the job, how to motivate and train employees, stress prevention, sexual harassment, violence on-the-job, workplace safety, and labor law.

HF5549.5 .T7 .T6
Training & Development.

Training business, industry, and government employees in important workplace issues and functions,e.g., e-mail -- security and encryption, company usage policy and employee privacy rights, legal and ethical issues of drug testing in the workplace, workplace violence,cultural diversity and cross culture communication.

Washington Crime News Services’ security director’s digest.

Provides brief reports on security issues, legislation, new technology, loss prevention measures, and legal cases and news events relevant to security management.

John Jay Reference Index Area

Articles related to private security can be found in a wide range of journals. Subject access to journal articles is best obtained through one of the specialized periodical indexes or abstracts listed below. After the journal article is located in the index or abstract, then check the John Jay Periodicals list at the reference desk for the journal’s format (microfilm, microfiche, bound, or current issue)and the call number. Back issues or past years of a journal might be on microfilm, microfiche, or in bound format. Check the John Jay Periodicals list at the reference desk for the type of format and the call number. The current periodicals for the current year are in the “new” periodical section.

Reference Index Area
AI 1. B9
1958 to the present.
Business periodicals index.

Index to articles on computer and information security, trademarks, trade secrets, security equipment, white-collar crime,and protection of executives. Also indexes articles on security administration in a variety of job environments,e.g., retail, corporations, entertainment, airline, sports, media, and petroleum.

Reference Index Area
AI 1 .C72
1977 to the present.
Criminal justice abstracts.

Index to articles on employee theft,computer crime, terrorism, environmental offenses, corporate crime, international crime,and crime prevention measures. Gives abstracts or short summaries of what the material is about for journal articles as well as books, reports (government and non-government), unpublished papers, and dissertations.

Reference Index Area
AI 1. C8
1975 to the present.
Criminal justice periodical index.

Index to articles on security administration, equipment, crime prevention and control measures, training, screening of job applicants, hazardous materials, safety and industrial hygiene, arson, terrorism, and security management in a variety of job areas,e.g.,retail, health, business, airport, museums, schools and colleges.

Reference Index Area
AI 1.S25
1987 to the present.
Corporate security digest. (Merger of Computer crime digest and Security digest).

Index to material on fire prevention and control, sprinklers, ergonomics, chemical releases, emergency preparedness, government regulations, pollution,safety in the environment and ecological system, industrial safety and hygiene, waste management, safety training, risk assessment, protective clothing and equipment, how to handle and what to do if exposed to hazardous materials and waste. Provides abstracts or summaries of what the material is about from journals, books, and reports.

Reference Index Area
AI 1.N4
1851 to the present.
The New York Times Index.

Index to the newspaper of the same name. Gives citations to the entries in the newspaper. Back years of the newspaper are on microfilm in the micofilm cabinet. Recent or current paper copies of the newspaper holdings are kept in the reserve room for six weeks, and a daily current copy is kept at the reference desk.

Reference Index Area
AI 1.N39
v. 1-23
Falk, B. A. Jr., & V.R. (Editors). (1976-1985). Personal name index to "The New York Times Index" Succasunna, NJ: Roxbury Data Interface.

Index to names collected from The New York Times Index from 1851 - 1974. Gives citations to the entries in The New York Times newspaper.

Reference Index Area
AI 1.N39
Suppl. v. 1-6
Falk, B.A. Jr. , & Falk, V. R. (Editors). (1984-). Personal name index to "The New York Times Index". Supplement. Verdi, Nev: Roxbury Data Interface.

Index to names collected from The New York Times Index from 1975-1993. Gives citations to the entries in The New York Times newspaper.

AI 1.S62
1974 to the present.
Social sciences index.

Indexes articles on white-collar crime, fraud, corporate crime, computer crime, terrorism, hazardous waste, pollution, disasters, environmental protection, and security applications in diverse job areas,e.g., banking, hotels, corporations, retail businesses, and the computer industry.

NOTE: The two indexes (A and B) listed below changed names and became the Social sciences index listed above.

(A) Reference Index Area            Social sciences & humanities index.
AI 1 .S6                                          April, 1965 - March, 1974

(B) Reference Index Area            International Index to periodicals.
AI 1 .S6                                           1907 - 1965

Reference Index Area           Trends in organized crime.
AI 1 .T7                                          1995 to the present.
Concentrates on national and international organized crime: research, trends,and countermeasures. Provides abstracts, excerpts, interviews, and general information on smuggling, fraud, white collar crime, computer security, encryption, cellular phone fraud, hacking, wiretapping,terrorism, and organized crime groups.

INDEXES and ABSTRACTS on CD-ROM Workstations
In the reference department

Criminal justice abstracts.
Library has 1968 to the present.
Provides abstracts or summaries of the contents of the sources and full bibliographic information. Indexes books, government reports, agency reports, magazines, dissertations, unpublished papers, and book review essays. Contains a subject and geographic index.

National criminal justice reference service document database.
Library has 1960's - 1996
Index to material in periodicals, books, book chapters, conferences proceedings , and reports. Provides an abstract and full bibliographic information for each document. Covers security administration, guards, crime prevention and control measures, and white collar crime.

Reference Department "LIMITED" PUBLIC PERSONAL COMPUTER WORKSTATIONS FOR Users of LEXIS-NEXIS and Info Trac SearchBank Databases

Provides full text reference sources, magazines, and newspapers
Gives information on corporations, white-collar crime,

Info Trac SearchBank
Index to magazines, journals,newspapers and books. Gives full text, abstracts, and citation with bibliographic information.


The American Polygraph Association
URL: http://www.polygraph.org
Goals of the association, membership dues and benefits, conference calendar, events, committees, accredited schools, training, certificates and awards, publications, and polygraph issues and answers.

ASIS (American Society for Industrial Security)
URL: http://www.asisonline.org
Articles from Security Management Online, information on security products and services, dates and sites of educational programs, certification, conferences and exhibits. Provides information on career development, employment, certification review courses, and educational programs.

ATSDR (Agency for Toxic Substances and Disease Registry)
URL: http://www.atsdr.cdc.gov/
An advisory agency which seeks to prevent the exposure of the public to hazardous substances (waste sites, spills, pollution of environment). The agency provides public health assessments of waste sites listed on the EPA National Priorities List, and individuals may request the agency to send staff to evaluate a site. Users may search the databases (ToxFAQs and Hazdat), a newsletter (Hazardous Substances & Public Health), and a list of the “Top 20 Hazardous Substances.” Searches may be done for such queries as the following: identification of a chemical, how humans are exposed to a chemical, the impact of a chemical upon human health, and the type of warning label given by the National Fire Protection Association to a chemical.

CIA (Central Intelligence Agency Home Page)
URL: http://www.odci.gov/cia/ciahome.html
Access to publications such as the following: The World Factbook which provides information on the countries of the world (people, geography, transportation, economy, defense,etc.); Directory of Chiefs of State and Cabinet Members of Foreign Governments which lists the names and positions of each individual as well as the governor, the ambassador to the United States, and the permanent representative to the United Nations in New York; Handbook of International Economic Statistics which provides a comparison of the economic growth of major countries and regions (labor statistics, trends and growth indicators, the environment, personal savings rate, energy, agriculture,and manfactured goods). Speeches by the director of the CIA as well as press releases from the agency are also presented.

EPA ( Environmental Protection Agency)
URL: http://www.epa.gov/
Environmental health, safety,law, regulations,and standards. Search database for information on topics such as toxic substances, environmental health, hazardous wastes, and pollution prevention.

FAA ( Federal Aviation Administration Home Page)
URL: http://www.faa.gov/
Gives security measures to prevent and control crime and terrorism in airports and aircraft. Discusses safety measures and standards, and the investigation of accidents. Provides information on FAA rules, regulations,and certification. Presents advisory circulars, technical reports, statistics,and press releases.

Fedstats ( Statistics from United States federal government agencies)
URL: http://www.fedstats.gov
Gives statistics from the Bureau of Justice, Bureau of Census, Bureau of Labor, Bureau of Transportation, and Environmental Protection Agency,etc.

FEMA Home Page (Federal Emergency Management Agency)
URL: http://www.fema.gov/
Provides information, resources, and help to states, communities, businesses, and individuals preparing for, responding to and recovering from emergencies and disasters of all types.

International Association of Campus Law Inforcement Administration
URL: http://www.iaclea.org
Campus security and safety information, training and education, issues, jobs, legislation, conferences and committees, and literature.

National Fire Data Center
URL: http://www.usfa.fema.gov/nfdc
Information on the occurrence, control, and prevention of fire. The Center maintains a National Fire Incident Reporting System,the largest collection in the world, which stores data sent annually by the participating 42 states plus the District of Columbia. The database provides access to material on standards, the nature and causes of injuries, death, and property loss from fires. Provides statistics and information on a particular vehicle or product involved in setting off a fire.

OSHA (The United States Department of Labor/Occupational Safety and Health Administration)
URL: http://www.osha.gov
Information and standards on the prevention of injuries and the protection of workers’ health and life through the establishment and maintainance of comprehensive workplace safety and health programs. Agency provides technical assistance, formulates and enforces protection standards,and sends out inspectors to investigate complaints.

State Department
URL: http://www.state.gov/
Travel advisory warnings, vital information for living overseas, and/or doing business abroad, background information about countries, personnel and their functions in embassies and consulates throughout the world, and procedures for sending mail to foreign service posts so that mail reaches the correct position or service. Material on terrorism and counterterrorism measures.

Terrorist Research Center,Inc.
URL: http:// www.terrorism.com
Information on terrorism and countermeasures, gives profiles of terrorists groups, and answers to frequently asked questions about terrorism. Provides full text documents, speeches, testimonies, reports, essays, and commentaries, from government officials and experts. Contains a calendar of terrorists’ actions, a discussion forum, and features monthly topics with essays and reponses by experts.

USFA Home Page ( United States Fire Administration and its National Fire Academy)
URL: http://www.usfa.fema.gov/
Information on the prevention and reduction of fire deaths and arson. Search the full text database, "Electronic Publications", for information on safety, fire prevention, equipment, and hazardous materials.

Unpublished work Copyright 1998 Marvie Brooks

Lloyd Sealy Library
John Jay College of Criminal Justice
899 10th Avenue
NY, NY 10019
Phone: (212) 237-8246
Fax: (212) 237-8221