Skip to main content

Comparison of Design and Delivery Approaches for Security System Projects

The full text article is not available for purchase.

The publisher only permits individual articles to be downloaded by subscribers.

or click here to sign up for a free trial


Vulnerability Assessments conducted by both Water and Wastewater Utilities have highlighted the need for security improvements at various sites and have provided prioritization of the needed improvements. The next step for a Utility involves the determination of how to proceed with system design and implementation. This presentation focuses on the options available for design and delivery of security systems.

There are a number of generally available options to a Utility for system design and implementation. These are:

Utility Staff Design and Implementation: This approach tasks the Utility staff with responsibility for the system design, configuration and construction.

Traditional Architect / Engineer Design Approach: This approach uses a design firm with specialized security system expertise to develop plans and specifications for the improvements. These plans and specs are then advertised for bid by qualified contractors.

Design / Build Approach: This approach utilizes a design firm developing the system design, then that same firm takes the system design forward to participate in the procurement, installation and implementation process. This approach often teams an A/E firm with a construction or security firm. Modifications to this approach can also be used to comply with local conditions which may not allow a pure design/build process.

This presentation will examine the pro and con of each approach, with a focus on key success factors for a security implementation project. Some of the key factors for consideration will include:

System Design Issues, including an overview of a complete system.

Designer Qualifications

Speed of System Delivery and Implementation

Confidentiality issues associated with bid documents

Flexibility during Construction

Cost Control

Utility Staff Involvement

Operations and Maintenance “buy-in” to Project

Record Drawings

Each of the potential approaches can result in a successful project, and each carries its own set of positives and negatives. This presentation will provide “lessons learned” from successful security projects.

Document Type: Research Article


Publication date: January 1, 2004

More about this publication?
  • Proceedings of the Water Environment Federation is an archive of papers published in the proceedings of the annual Water Environment Federation® Technical Exhibition and Conference (WEFTEC® ) and specialty conferences held since the year 2000. These proceedings are not peer reviewed.

    WEF Members: Sign in (right panel) with your IngentaConnect user name and password to receive complimentary access.
  • Subscribe to this Title
  • Membership Information
  • About WEF Proceedings
  • WEFTEC Conference Information
  • Ingenta Connect is not responsible for the content or availability of external websites

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more