Global Security Glossary – E –

E

 

Electromagnetic interference (EMI): interference caused by disturbances in the atmosphere, such as lightning, or in the immediate vicinity, such as power lines or electric motors.

Electromagnetic pickup: the interception of radiation generated by a computer’s control processor, telephone and teleprinter lines, or its microwave communications. The intercepted radiation can be revealing as to information communicated through such equipment.

Electronic countermeasures: defensive techniques designed to detect, prevent, or expose the use of electronic audio or visual surveillance devices.

Electronic security system (ESS): that part of physical security concerned with the safeguarding of personnel and property by use of electronic systems. These systems include, but are not limited to, intrusion detection systems (IDS), automated entry control systems (AECS), and video assessment systems.

Embezzlement: the misappropriation, misapplication, or illegal disposal of entrusted property with intent to defraud the owner or beneficiary.

Emotion-evoking question: a question usually inserted as the last question in a polygraph test. It is designed to elicit a response that will assist the examiner in determining the subject’s reaction capacity.

Empathetic questioning: a technique that empathizes and identifies with the subject’s situation. The questioner may (1) describe the crime as being less serious than it is, (2) suggest that many people, the questioner included, have been in similar situations, (3) suggest that the subject is the victim of circumstances that need to be fully explained in order to be understood, or (4) allow the subject an opportunity to pass moral or ethical (but not legal) blame on the victim or others.

Employee Dishonesty:  estimates reveal that between 40% and 50% of all business losses can be attributed to employee theft. Employers cannot afford to ignore this large-scale problem and should do everything in their power to create a workplace atmosphere that promotes honesty and encourages and rewards good behavior. They need to make it clear that dishonest behavior will be quickly detected and severely punished.

 

Enterprise risk management: is the process by which a business organization anticipates, prevents, and responds to uncertainties associated with the organization’s strategic objectives.

 

Enveloping question: in polygraphy, a question inserted at the beginning and end of a probing peak of tension test. An enveloping question is beyond the realm of possibility concerning the issue being evaluated, i.e., it is neutral or irrelevant.

Espionage: is the use of illegal means (spying) to collect Information, more particularly secret or unpublished information. Offences may range from trespass and theft to treason.

 

Errors and omissions excepted: a notation often seen on invoices, especially those originating in Canada and England. It means that the company issuing the invoice reserves the right to correct any errors appearing therein.

Expatriate employee: person engaged in services for wages or salary by an organization and physically located in a country that is not his/her native country.

Expectancy theory: a management theory which holds that an employee’s beliefs will influence the performance goals selected by the employee and the extent of effort made to attain them. For example, if an employee believes that punctuality will result in a promotion and the employee desires a promotion, the employee will strive to be punctual.

Extortion: unlawful demanding or receiving of favors, money, or property through the use of fear or force or the authority of office; unlawfully obtaining or attempting to obtain something of value from another by compelling the other person to deliver it by threat of eventual physical injury or other harm to that person or his property, or a third person. Ransom demands and threats are forms of extortion.

Main Glossary Page

One Response to “Global Security Glossary – E –”

  1. ostrov Says:

    Thank you,
    very interesting article


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: