Return to Article Details The use of GIS technology to monitor security threats Download Download PDF