Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

The Human Factor

By Bernard Scaglione
Business people looking at laptops
December 1, 2011

In today’s technological world, the focus of access control and identification are mainly electronic – utilizing identification cards, biometrics, numeric keypads and passwords. One critical component of access control and identification that is routinely over looked is the use of people.

Recently, my new employer reminded me of the role people play in securing facilities, places and entities. From screening persons entering a building to sitting and watching an x-ray machine or TV monitor, the role that people play in controlling access and authenticating identities is enormous, and so very important. This was evident when, recently, a security officer working in a south Florida courthouse identified what she thought was a gun through an X-ray machine and began to question the situation. The individual carrying the bag with the gun wasn’t able to provide any identification, so a deputy was asked to respond. At that same time a second security officer cleared the lobby area of all people. Two deputies checked the individual’s bag and found a loaded .40-caliber Smith & Wesson handgun, an additional loaded magazine and six boxes of ammunition. 

The task of providing personnel to control access and check identification is monumental, and it presents various challenges. Access control work can be very stressful and at times be monotonous for the people that conduct the screening. It takes a special type of person to become and work successfully as a screener, something that is not always considered when hiring a person to screen persons or packages.

In general, we take for granted the work that people do that tends to blend into the routine of our everyday lives until their actions impact us. Access control screeners affect our daily routine when we pack the wrong item into our carry-on suitcases or when we leave our identification at home. In my career I have seen countless people push, shove, kick, scream, spit and even assault access control personnel. I have seen people wave their finger in the access control officers face, threaten officer’s jobs and pull out a gun.

So what does it take to become an effective access control screener? Is it personality, birth order or a specific astrological sign? It could be any of those things, however, more likely, what is needed is knowledge of the job, experience in carrying out the job, perseverance doing the job, objectivity and a clear understanding of why the job is being conducted.

Knowledge means understanding the specific details of each function of the job and the details, such as knowing the procedure when a weapon is discovered, what to say to someone to keep them calm and to stop them from running away or pushing past an access point.

Proficiency entails learning how to deal with people, being comfortable greeting them, stopping them and double checking their credentials. It involves screening each person thoroughly enough to feel comfortable that the building is secure. It also means having enough experience to orient new people on the exact procedures to follow when conducting the screening process.

Perseverance includes consistently carrying out the job functions the exact same way no matter what occurs, even when you have stresses in your personal life.

Maintaining objectivity is important as well, as every person that enters the screening process needs to be treated the same. Sides cannot be taken, and everyone deserves a level of respect and courtesy as they go through the screening process.

Just as you wouldn't hire your next security executive without knowing whether or not he or she has the right skills to be an effective member of your team, successful access control screeners need to properly vetted, as well. Hiring someone who’s not right for the job could mean all the difference in the world. 

KEYWORDS: screening security officer security roles

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bernard J. Scaglione, CPP, CHPA, CHSP is the Director of Healthcare Security Services for G4S Secure Solutions. He has 30 years of experience in the healthcare security field including a Master’s Degree from Rutgers University School of Criminal Justice in New Jersey. Ben currently serves on the Board of the International Association for Healthcare Security and Safety (IAHSS). He served on IAHSS Education Council from 2005 until 2011. Ben is past Chairman of the ASIS International Healthcare Council and the Past President of the New York City Metropolitan Healthcare Safety and Security Directors Association. He has been a columnist for Security Magazine and contributing author for the Journal of Healthcare Protection Management. Ben was an adjunct faculty member at Pratt Institute in New York teaching engineers and architects in physical security. He taught at Interboro Institute in New York and at New Jersey City University. He was also an instructor at John Jay College Peace Officer Academy.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Ben Scaglione

    Lose the Stress, Keep Access Control Training Interactive

    See More
  • Ben Scaglione

    The Identification and Control of Fraudulent Behavior

    See More
  • Bernard J. Scaglione

    Metrics: The Evaluation of Access Control and Identification

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing