Comparison of Design and Delivery Approaches for Security System Projects
Abstract:Vulnerability Assessments conducted by both Water and Wastewater Utilities have highlighted the need for security improvements at various sites and have provided prioritization of the needed improvements. The next step for a Utility involves the determination of how to proceed with system design and implementation. This presentation focuses on the options available for design and delivery of security systems.
There are a number of generally available options to a Utility for system design and implementation. These are:
Utility Staff Design and Implementation: This approach tasks the Utility staff with responsibility for the system design, configuration and construction.
Traditional Architect / Engineer Design Approach: This approach uses a design firm with specialized security system expertise to develop plans and specifications for the improvements. These plans and specs are then advertised for bid by qualified contractors.
Design / Build Approach: This approach utilizes a design firm developing the system design, then that same firm takes the system design forward to participate in the procurement, installation and implementation process. This approach often teams an A/E firm with a construction or security firm. Modifications to this approach can also be used to comply with local conditions which may not allow a pure design/build process.
This presentation will examine the pro and con of each approach, with a focus on key success factors for a security implementation project. Some of the key factors for consideration will include:
System Design Issues, including an overview of a complete system.
Speed of System Delivery and Implementation
Confidentiality issues associated with bid documents
Flexibility during Construction
Utility Staff Involvement
Operations and Maintenance “buy-in” to Project
Each of the potential approaches can result in a successful project, and each carries its own set of positives and negatives. This presentation will provide “lessons learned” from successful security projects.
Document Type: Research Article
Publication date: January 1, 2004
More about this publication?
- Proceedings of the Water Environment Federation is an archive of papers published in the proceedings of the annual Water Environment Federation® Technical Exhibition and Conference (WEFTEC® ) and specialty conferences held since the year 2000. These proceedings are not peer reviewed. WEF Members: Sign in (right panel) with your IngentaConnect user name and password to receive complimentary access.
- Subscribe to this Title
- Membership Information
- About WEF Proceedings
- WEFTEC Conference Information
- Ingenta Connect is not responsible for the content or availability of external websites