If you are experiencing problems downloading PDF or HTML fulltext, our helpdesk recommend clearing your browser cache and trying again. If you need help in clearing your cache, please click here . Still need help? Email help@ingentaconnect.com

Comparison of Design and Delivery Approaches for Security System Projects

$17.50 plus tax (Refund Policy)

Buy Article:

Abstract:

Vulnerability Assessments conducted by both Water and Wastewater Utilities have highlighted the need for security improvements at various sites and have provided prioritization of the needed improvements. The next step for a Utility involves the determination of how to proceed with system design and implementation. This presentation focuses on the options available for design and delivery of security systems.

There are a number of generally available options to a Utility for system design and implementation. These are:



Utility Staff Design and Implementation: This approach tasks the Utility staff with responsibility for the system design, configuration and construction.


Traditional Architect / Engineer Design Approach: This approach uses a design firm with specialized security system expertise to develop plans and specifications for the improvements. These plans and specs are then advertised for bid by qualified contractors.


Design / Build Approach: This approach utilizes a design firm developing the system design, then that same firm takes the system design forward to participate in the procurement, installation and implementation process. This approach often teams an A/E firm with a construction or security firm. Modifications to this approach can also be used to comply with local conditions which may not allow a pure design/build process.


This presentation will examine the pro and con of each approach, with a focus on key success factors for a security implementation project. Some of the key factors for consideration will include:



System Design Issues, including an overview of a complete system.


Designer Qualifications


Speed of System Delivery and Implementation


Confidentiality issues associated with bid documents


Flexibility during Construction


Cost Control


Utility Staff Involvement


Operations and Maintenance “buy-in” to Project


Record Drawings


Each of the potential approaches can result in a successful project, and each carries its own set of positives and negatives. This presentation will provide “lessons learned” from successful security projects.

Document Type: Research Article

DOI: http://dx.doi.org/10.2175/193864704784341920

Publication date: January 1, 2004

More about this publication?
  • Proceedings of the Water Environment Federation is an archive of papers published in the proceedings of the annual Water Environment Federation® Technical Exhibition and Conference (WEFTEC® ) and specialty conferences held since the year 2000. These proceedings are not peer reviewed.

    WEF Members: Sign in (right panel) with your IngentaConnect user name and password to receive complimentary access.
  • Subscribe to this Title
  • Membership Information
  • About WEF Proceedings
  • WEFTEC Conference Information
  • ingentaconnect is not responsible for the content or availability of external websites

Tools

Favourites

Share Content

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more