SlideShare a Scribd company logo
1 of 14
Security at Florida State University
Libraries: Adapting to Change
A presentation for the Florida Library
Association Security Preconference
February 29, 2016
Susannah Miller
Renaine Julian
Introductions
Susannah Miller
Associate Dean for Administrative Services
Renaine Julian
Data Research Librarian
Overview
1. History of Security at FSU
Libraries
2. Lessons Learned
3. Best Practices
4. Looking Ahead
source: wikipedia
History - Pre Security Dept
Unmediated access to building
No security personnel
24/5 Building
Checked for FSU IDs after 2am
Photo Source: gradschool.fsu.edu
History - The Card Access Team (CAT)
Sexual Assault in 2009
Hired OPS Positions to monitor exit and entrance
Visitor Sign In
Security Department formed in 2009
Staffing: Department head & 2 supervisors
source: fsucard.fsu.edu
History: The Turnstiles
1st floor remodeled in 2010 with turnstiles
Temporary cards issued to visitors or FSU students who do
not have their ID
Benefits:
1. Personal Accountability
2. Mediated Access
3. Statistics!
source: archive.fsunews.com
History: The Shooting
May parked his car a few blocks away from the library and walked in with a 380 semi-automatic handgun with “additional ammunition in his
pockets.”
Mr. May started shooting students in front of the Strozier Library.
“He then enters a front area of the library where he shoots one employee and tries to shoot another woman who’s affiliated with the university.
At 12:25 a.m., FSU police received the initial call that there was a gunman in the library
“He then reloads his gun. He never precedes past the security measures that are in place in the library. He never leaves the front lobby area.
“He then exits the library where he is confronted by FSU police officers and Tallahassee police department police officers. He refuses to
surrender and as a result of this encounter he is shot and killed by the officers.
At 12:27, police report that May has been killed outside.
(Klas & McGregory, 2014)
Lessons Learned
• “Security Measures” - utility of the turnstiles - saved lives!
• proactive vs. reactive - think ahead
• FSUPD security audit of building
– Lighting
– Parking
– Landscaping
– Natural Surveillance
– Territorial Reinforcement
– Natural Access Control
– Maintenance
Lessons Learned
PSO Training for all Security Personnel
Uniforms
Police Radios
Location and Height of Security Desk
“Panic Buttons”
Professional Staff
Stronger ties with FSU Police Department
Best Practices
De-escalation Skills
Relationship with the Police
Appropriate Staffing
Security is Everyone’s Job
Code of Conduct
Physical Environment
Access Practices
Security Cameras
Accompany to Parking Lot
Staff Training
Best Practices
Crime Prevention Techniques
Ask the following questions:
1) What would increase the effort to commit a crime?
2) What would increase the risk of committing the crime?
3) What would reduce the rewards?
4) What would reduce the provocations?
5) What would remove the excuses for criminal behavior?
(Cromwell, Alexander, & Dotson, 2008)
Looking Ahead
Literature Review
Scholarly collaboration with Criminology Department
ARL Spec Kit - Partnership with Auburn
Physical Changes to Desk
Hiring of Professional Security Staff
source: flickr/katerhar
Suggested Readings
Albrecht, S. (2015). Library security: better communication, safer facilities. Chicago: ALA Editions, an imprint of the American Library Association.
Bowman, A. C. (2013). 24-Hour Academic Libraries: Adjusting to Change. Journal of Access Services, 10(4), 217–239.
http://doi.org/10.1080/15367967.2013.842342
Cromwell, P., Alexander, G., & Dotson, P. (2008). Crime and incivilities in libraries: Situational crime prevention strategies for thwarting biblio-
bandits and problem patrons. Security Journal, 21(3), 147–158. http://doi.org/http://dx.doi.org/10.1057/palgrave.sj.8350033
Raffensperger, T. E. (2010). Safety and Security in Urban Academic Libraries: A Risk Assessment Approach to Emergency Preparedness. Urban
Library Journal, 16(1). Retrieved from http://ojs.gc.cuny.edu/index.php/urbanlibrary/article/view/1252
Reed, C. (2008). The Correct Mindset. Library & Archival Security, 21(2), 59–67. http://doi.org/10.1080/01960070802201334
Sanders, M. (2012). Creating a Safe Haven for University Students: How Are We Doing? Journal of Access Services, 9(4), 200–211.
http://doi.org/10.1080/15367967.2012.713228
Scarletto, E. A., Burhanna, K. J., & Richardson, E. (2013). Wide Awake at 4 AM: A Study of Late Night User Behavior, Perceptions and Performance
at an Academic Library. The Journal of Academic Librarianship, 39(5), 371–377. http://doi.org/10.1016/j.acalib.2013.02.006
Works Cited
Cromwell, P., Alexander, G., & Dotson, P. (2008). Crime and incivilities in libraries: Situational crime prevention strategies for thwarting
biblio-bandits and problem patrons. Security Journal, 21(3), 147–158. http://doi.org/http://dx.doi.org/10.1057/palgrave.sj.8350033
Klas, M.E., & McGregory, K. (2014). Gunman identified in FSU library shooting that wounded three. Retreived from
http://www.miamiherald.com/news/state/florida/article4030318.html, on November 8, 2015.
Questions
source: commons.wikimedia.org

More Related Content

Similar to Security at florida state university libraries adapting to change

Techno-Cheating: What's a Librarian to Do?
Techno-Cheating: What's a Librarian to Do?Techno-Cheating: What's a Librarian to Do?
Techno-Cheating: What's a Librarian to Do?Brian Gray
 
Protecting the Halls of Ivy
Protecting the Halls of IvyProtecting the Halls of Ivy
Protecting the Halls of IvyOCLRE
 
2010 Copyright Fair Use Resources
2010 Copyright Fair Use Resources2010 Copyright Fair Use Resources
2010 Copyright Fair Use ResourcesWCET
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengedmcmenemy
 
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG: connecting the knowledge community
 
Meyer Big Data SDP13
Meyer Big Data SDP13Meyer Big Data SDP13
Meyer Big Data SDP13Eric Meyer
 
W. Hope Resume 10-22-2016 short version
W. Hope Resume 10-22-2016 short versionW. Hope Resume 10-22-2016 short version
W. Hope Resume 10-22-2016 short versionBill Hope
 
A Mixed Methods Look at Self-Directed Online Learning: MOOCs, Open Educatio...
A Mixed Methods Look at Self-Directed Online Learning: MOOCs, Open Educatio...A Mixed Methods Look at Self-Directed Online Learning: MOOCs, Open Educatio...
A Mixed Methods Look at Self-Directed Online Learning: MOOCs, Open Educatio...cjbonk
 
Academic Integrity - What Does This Term Mean For Students? - University of M...
Academic Integrity - What Does This Term Mean For Students? - University of M...Academic Integrity - What Does This Term Mean For Students? - University of M...
Academic Integrity - What Does This Term Mean For Students? - University of M...Thomas Lancaster
 
W. Hope Resume 10.2015
W. Hope Resume 10.2015W. Hope Resume 10.2015
W. Hope Resume 10.2015Bill Hope
 
A brave new world - Student surveillance in higher education - Revisited
A brave new world - Student surveillance in higher education - RevisitedA brave new world - Student surveillance in higher education - Revisited
A brave new world - Student surveillance in higher education - RevisitedUniversity of South Africa (Unisa)
 
Crim 4384 statistics
Crim 4384 statisticsCrim 4384 statistics
Crim 4384 statisticsciakov
 
Plagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesPlagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesTurnitin User Experience Team
 
Student Safety Research Presentation
Student Safety Research PresentationStudent Safety Research Presentation
Student Safety Research PresentationDr. James Lake
 
Bridging the Gap: Providing Equal Access of Library Resources and Services to...
Bridging the Gap: Providing Equal Access of Library Resources and Services to...Bridging the Gap: Providing Equal Access of Library Resources and Services to...
Bridging the Gap: Providing Equal Access of Library Resources and Services to...Nancy Crabtree
 

Similar to Security at florida state university libraries adapting to change (20)

Techno-Cheating: What's a Librarian to Do?
Techno-Cheating: What's a Librarian to Do?Techno-Cheating: What's a Librarian to Do?
Techno-Cheating: What's a Librarian to Do?
 
Protecting the Halls of Ivy
Protecting the Halls of IvyProtecting the Halls of Ivy
Protecting the Halls of Ivy
 
523 assig 1
523 assig 1523 assig 1
523 assig 1
 
2010 Copyright Fair Use Resources
2010 Copyright Fair Use Resources2010 Copyright Fair Use Resources
2010 Copyright Fair Use Resources
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challenge
 
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
 
News and Events
News and EventsNews and Events
News and Events
 
Meyer Big Data SDP13
Meyer Big Data SDP13Meyer Big Data SDP13
Meyer Big Data SDP13
 
W. Hope Resume 10-22-2016 short version
W. Hope Resume 10-22-2016 short versionW. Hope Resume 10-22-2016 short version
W. Hope Resume 10-22-2016 short version
 
Delving into Distance Support: Instructional Design, Library Role, and Social...
Delving into Distance Support: Instructional Design, Library Role, and Social...Delving into Distance Support: Instructional Design, Library Role, and Social...
Delving into Distance Support: Instructional Design, Library Role, and Social...
 
A Mixed Methods Look at Self-Directed Online Learning: MOOCs, Open Educatio...
A Mixed Methods Look at Self-Directed Online Learning: MOOCs, Open Educatio...A Mixed Methods Look at Self-Directed Online Learning: MOOCs, Open Educatio...
A Mixed Methods Look at Self-Directed Online Learning: MOOCs, Open Educatio...
 
Academic Integrity - What Does This Term Mean For Students? - University of M...
Academic Integrity - What Does This Term Mean For Students? - University of M...Academic Integrity - What Does This Term Mean For Students? - University of M...
Academic Integrity - What Does This Term Mean For Students? - University of M...
 
W. Hope Resume 10.2015
W. Hope Resume 10.2015W. Hope Resume 10.2015
W. Hope Resume 10.2015
 
A brave new world - Student surveillance in higher education - Revisited
A brave new world - Student surveillance in higher education - RevisitedA brave new world - Student surveillance in higher education - Revisited
A brave new world - Student surveillance in higher education - Revisited
 
Crim 4384 statistics
Crim 4384 statisticsCrim 4384 statistics
Crim 4384 statistics
 
Plagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesPlagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front Lines
 
Student Safety Research Presentation
Student Safety Research PresentationStudent Safety Research Presentation
Student Safety Research Presentation
 
Stay Safe on Campus
Stay Safe on CampusStay Safe on Campus
Stay Safe on Campus
 
Stay Safe on Campus
Stay Safe on CampusStay Safe on Campus
Stay Safe on Campus
 
Bridging the Gap: Providing Equal Access of Library Resources and Services to...
Bridging the Gap: Providing Equal Access of Library Resources and Services to...Bridging the Gap: Providing Equal Access of Library Resources and Services to...
Bridging the Gap: Providing Equal Access of Library Resources and Services to...
 

More from Renaine Julian

You down with dmp yeah you know me!
You down with dmp  yeah you know me!You down with dmp  yeah you know me!
You down with dmp yeah you know me!Renaine Julian
 
Building and providing data management services a framework for everyone!
Building and providing data management services  a framework for everyone!Building and providing data management services  a framework for everyone!
Building and providing data management services a framework for everyone!Renaine Julian
 
The Power of Open Data!
The Power of Open Data!The Power of Open Data!
The Power of Open Data!Renaine Julian
 
The Stewardship of Scientific Datasets
The Stewardship of Scientific DatasetsThe Stewardship of Scientific Datasets
The Stewardship of Scientific DatasetsRenaine Julian
 
Sources and Applications for Open Economic Data
Sources and Applications for Open Economic DataSources and Applications for Open Economic Data
Sources and Applications for Open Economic DataRenaine Julian
 
Trends in data librarianship
Trends in data librarianshipTrends in data librarianship
Trends in data librarianshipRenaine Julian
 

More from Renaine Julian (6)

You down with dmp yeah you know me!
You down with dmp  yeah you know me!You down with dmp  yeah you know me!
You down with dmp yeah you know me!
 
Building and providing data management services a framework for everyone!
Building and providing data management services  a framework for everyone!Building and providing data management services  a framework for everyone!
Building and providing data management services a framework for everyone!
 
The Power of Open Data!
The Power of Open Data!The Power of Open Data!
The Power of Open Data!
 
The Stewardship of Scientific Datasets
The Stewardship of Scientific DatasetsThe Stewardship of Scientific Datasets
The Stewardship of Scientific Datasets
 
Sources and Applications for Open Economic Data
Sources and Applications for Open Economic DataSources and Applications for Open Economic Data
Sources and Applications for Open Economic Data
 
Trends in data librarianship
Trends in data librarianshipTrends in data librarianship
Trends in data librarianship
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Security at florida state university libraries adapting to change

  • 1. Security at Florida State University Libraries: Adapting to Change A presentation for the Florida Library Association Security Preconference February 29, 2016 Susannah Miller Renaine Julian
  • 2. Introductions Susannah Miller Associate Dean for Administrative Services Renaine Julian Data Research Librarian
  • 3. Overview 1. History of Security at FSU Libraries 2. Lessons Learned 3. Best Practices 4. Looking Ahead source: wikipedia
  • 4. History - Pre Security Dept Unmediated access to building No security personnel 24/5 Building Checked for FSU IDs after 2am Photo Source: gradschool.fsu.edu
  • 5. History - The Card Access Team (CAT) Sexual Assault in 2009 Hired OPS Positions to monitor exit and entrance Visitor Sign In Security Department formed in 2009 Staffing: Department head & 2 supervisors source: fsucard.fsu.edu
  • 6. History: The Turnstiles 1st floor remodeled in 2010 with turnstiles Temporary cards issued to visitors or FSU students who do not have their ID Benefits: 1. Personal Accountability 2. Mediated Access 3. Statistics! source: archive.fsunews.com
  • 7. History: The Shooting May parked his car a few blocks away from the library and walked in with a 380 semi-automatic handgun with “additional ammunition in his pockets.” Mr. May started shooting students in front of the Strozier Library. “He then enters a front area of the library where he shoots one employee and tries to shoot another woman who’s affiliated with the university. At 12:25 a.m., FSU police received the initial call that there was a gunman in the library “He then reloads his gun. He never precedes past the security measures that are in place in the library. He never leaves the front lobby area. “He then exits the library where he is confronted by FSU police officers and Tallahassee police department police officers. He refuses to surrender and as a result of this encounter he is shot and killed by the officers. At 12:27, police report that May has been killed outside. (Klas & McGregory, 2014)
  • 8. Lessons Learned • “Security Measures” - utility of the turnstiles - saved lives! • proactive vs. reactive - think ahead • FSUPD security audit of building – Lighting – Parking – Landscaping – Natural Surveillance – Territorial Reinforcement – Natural Access Control – Maintenance
  • 9. Lessons Learned PSO Training for all Security Personnel Uniforms Police Radios Location and Height of Security Desk “Panic Buttons” Professional Staff Stronger ties with FSU Police Department
  • 10. Best Practices De-escalation Skills Relationship with the Police Appropriate Staffing Security is Everyone’s Job Code of Conduct Physical Environment Access Practices Security Cameras Accompany to Parking Lot Staff Training
  • 11. Best Practices Crime Prevention Techniques Ask the following questions: 1) What would increase the effort to commit a crime? 2) What would increase the risk of committing the crime? 3) What would reduce the rewards? 4) What would reduce the provocations? 5) What would remove the excuses for criminal behavior? (Cromwell, Alexander, & Dotson, 2008)
  • 12. Looking Ahead Literature Review Scholarly collaboration with Criminology Department ARL Spec Kit - Partnership with Auburn Physical Changes to Desk Hiring of Professional Security Staff source: flickr/katerhar
  • 13. Suggested Readings Albrecht, S. (2015). Library security: better communication, safer facilities. Chicago: ALA Editions, an imprint of the American Library Association. Bowman, A. C. (2013). 24-Hour Academic Libraries: Adjusting to Change. Journal of Access Services, 10(4), 217–239. http://doi.org/10.1080/15367967.2013.842342 Cromwell, P., Alexander, G., & Dotson, P. (2008). Crime and incivilities in libraries: Situational crime prevention strategies for thwarting biblio- bandits and problem patrons. Security Journal, 21(3), 147–158. http://doi.org/http://dx.doi.org/10.1057/palgrave.sj.8350033 Raffensperger, T. E. (2010). Safety and Security in Urban Academic Libraries: A Risk Assessment Approach to Emergency Preparedness. Urban Library Journal, 16(1). Retrieved from http://ojs.gc.cuny.edu/index.php/urbanlibrary/article/view/1252 Reed, C. (2008). The Correct Mindset. Library & Archival Security, 21(2), 59–67. http://doi.org/10.1080/01960070802201334 Sanders, M. (2012). Creating a Safe Haven for University Students: How Are We Doing? Journal of Access Services, 9(4), 200–211. http://doi.org/10.1080/15367967.2012.713228 Scarletto, E. A., Burhanna, K. J., & Richardson, E. (2013). Wide Awake at 4 AM: A Study of Late Night User Behavior, Perceptions and Performance at an Academic Library. The Journal of Academic Librarianship, 39(5), 371–377. http://doi.org/10.1016/j.acalib.2013.02.006 Works Cited Cromwell, P., Alexander, G., & Dotson, P. (2008). Crime and incivilities in libraries: Situational crime prevention strategies for thwarting biblio-bandits and problem patrons. Security Journal, 21(3), 147–158. http://doi.org/http://dx.doi.org/10.1057/palgrave.sj.8350033 Klas, M.E., & McGregory, K. (2014). Gunman identified in FSU library shooting that wounded three. Retreived from http://www.miamiherald.com/news/state/florida/article4030318.html, on November 8, 2015.

Editor's Notes

  1. Susannah starts here.