(Response 1 need 250 words 1 reference)

Discussion Question: Select a current or emerging technology with security applications and provide a minimum of two pros and two cons for the technology you selected. The question is broad-based and can include technologies such as drones, artificial intelligence, bio-engineering, biometrics, etc.

Technology advances in video management system have come a long way over the last two decades. 9/11 was an important event that that played an important part in the changes that occurred in the security technology industry. Mass shootings and other terrorist events have created a market for the government and private industry to be able to investigate and in recent years, the focus has been to stop or prevent events before they occur. Video analytics have become tools that no longer only exist just in movies and at the government level.

Pros:

Facial recognition software has become an important and powerful tool in major transportation hubs around the world to help identify and track terrorist or people of interest. In the private industry , the facial software can be used to indentify unwanted visitors, ex employees and in the health care environment , children’s hospitals are using the software to upload photos of parental disputes suspects or even unload the entire children sexual child registry data base to alert security or law enforcement when these individuals present to the campus.

Weapons identification has become another advancement in video analytics that has been successful in indentifying people that are carrying weapons in the open or even concealed. Based on algorithms, object identification has been able to indentify behaviors and how a person walks or carries themselves in crowds while armed. This has become a major breakthrough in helping solve and also prevent a response to a mass shooting and has certainly enhanced post investigations. This helps organizations make sense of video data and adds an extra layer of protection by providing alerts to potential security risks before or as they occur (Meyer &Meyer, 2014).

Cons:

The cost of early entry in the video analytics software industry has been and continues to be a big risk and expensive to develop and purchase as an end user. The software continues to be explored to reduce flaws and also find markets that will ensure after development sales. A new video security system can be a large investment (Murphy, 2017). The cost of the software is labor intensive and requires sales that include reoccurring license fees per camera annually. The fees are often layered on top of existing cost of video management contacts to record and have a few months of video retention.

Facial and object identification, along with other cameras analytics software has become a very tricky business and requires a lot of research and trust in your video management system partner. Many of the VMS manufactures have developed exclusive partnership that allows these to be financial worthwhile. One provider might be able to do certain things well at one cost, but unwilling to develop other software advances. The relationship and cost become extremely important to evaluate funds needed upfront as well as future resources to maintain or add services.

Technology and the wave of improvements that have become common in the physical security industry have been a direct result of the desire of the computer industries to expand their relationships with security professionals. Not only can video analytics detect threats, alert to security breaches, and help enforce health and safety regulations, it can also do much more (Murphy, 2017). Large storage capacity needs, faster processing speeds and improved camera quality have increased opportunities with camera analytics. As with all technology , the pros and cons, will consistently require a leader or organization to remain current on what’s available and on the horizon As a senior leader for a large facility that includes a large camera foot print in northeast Ohio , I welcome the advances in technology but spend a lot of time managing the financial obligations of our choices.

References:

Meyer, C., & Meyer, C. (2014). Boosting Detection Potential with Video and Analytics. Security, 51(8), 38–40. Retrieved from http://search.proquest.com/docview/1620037393/

Murphy, S. (2017). Video Analytics for Security and Beyond. Security Technology Executive, 27(2), 32–34,36. Retrieved from http://search.proquest.com/docview/1912541086/

(Response 2 need 250 words 1 reference)

Discussion Question: Select a current or emerging technology with security applications and provide a minimum of two pros and two cons for the technology you selected. The question is broad-based and can include technologies such as drones, artificial intelligence, bio-engineering, biometrics, etc.

Technology advances in video management system have come a long way over the last two decades. 9/11 was an important event that that played an important part in the changes that occurred in the security technology industry. Mass shootings and other terrorist events have created a market for the government and private industry to be able to investigate and in recent years, the focus has been to stop or prevent events before they occur. Video analytics have become tools that no longer only exist just in movies and at the government level.

Pros:

Facial recognition software has become an important and powerful tool in major transportation hubs around the world to help identify and track terrorist or people of interest. In the private industry , the facial software can be used to indentify unwanted visitors, ex employees and in the health care environment , children’s hospitals are using the software to upload photos of parental disputes suspects or even unload the entire children sexual child registry data base to alert security or law enforcement when these individuals present to the campus.

Weapons identification has become another advancement in video analytics that has been successful in indentifying people that are carrying weapons in the open or even concealed. Based on algorithms, object identification has been able to indentify behaviors and how a person walks or carries themselves in crowds while armed. This has become a major breakthrough in helping solve and also prevent a response to a mass shooting and has certainly enhanced post investigations. This helps organizations make sense of video data and adds an extra layer of protection by providing alerts to potential security risks before or as they occur (Meyer &Meyer, 2014).

Cons:

The cost of early entry in the video analytics software industry has been and continues to be a big risk and expensive to develop and purchase as an end user. The software continues to be explored to reduce flaws and also find markets that will ensure after development sales. A new video security system can be a large investment (Murphy, 2017). The cost of the software is labor intensive and requires sales that include reoccurring license fees per camera annually. The fees are often layered on top of existing cost of video management contacts to record and have a few months of video retention.

Facial and object identification, along with other cameras analytics software has become a very tricky business and requires a lot of research and trust in your video management system partner. Many of the VMS manufactures have developed exclusive partnership that allows these to be financial worthwhile. One provider might be able to do certain things well at one cost, but unwilling to develop other software advances. The relationship and cost become extremely important to evaluate funds needed upfront as well as future resources to maintain or add services.

Technology and the wave of improvements that have become common in the physical security industry have been a direct result of the desire of the computer industries to expand their relationships with security professionals. Not only can video analytics detect threats, alert to security breaches, and help enforce health and safety regulations, it can also do much more (Murphy, 2017). Large storage capacity needs, faster processing speeds and improved camera quality have increased opportunities with camera analytics. As with all technology , the pros and cons, will consistently require a leader or organization to remain current on what’s available and on the horizon As a senior leader for a large facility that includes a large camera foot print in northeast Ohio , I welcome the advances in technology but spend a lot of time managing the financial obligations of our choices.

References:

Meyer, C., & Meyer, C. (2014). Boosting Detection Potential with Video and Analytics. Security, 51(8), 38–40. Retrieved from http://search.proquest.com/docview/1620037393/

Murphy, S. (2017). Video Analytics for Security and Beyond. Security Technology Executive, 27(2), 32–34,36. Retrieved from http://search.proquest.com/docview/1912541086/

(Response 3 need 250 words 1 reference)

Intellectual property is a unique creative product, and often a valuable asset for an organization. Unlike a physical asset such as a manufacturing plant or data center, intellectual property is an intangible asset. In the United States, intellectual property is protected by law under various methods, including copyrights, trademarks and patents. A copyright covers creative works such as books, music or art. Copyrights do not need to be registered, and are in effect for seventy years after the creator’s death (Stewart, Chapple, & Gibson, 2015). Trademarks cover logos, slogans or other items that define the brand of an organization. Patents cover inventions and are issued by the United States Patent and Trade Office (USPTO).

Many other countries also have Intellectual property laws. Intellectual property laws can be complex, as they can cover many jurisdictions, including local, regional and national laws, along with other judicial precedents and rulings. Intellectual property laws can also be addressed in international treaties, convention agreements, and directives (Yar, 2006).

The availability of Internet service has enabled the electronic illegal sharing of intellectual property, otherwise known as Internet piracy. Anyone with an Internet-connected device from anywhere in the world can share intellectual property via the Internet, which further complicates intellectual property law enforcement. The Internet does not have national or international borders, so it is easy to cross boundaries and access content that is available in another country, and share it out. It is also easy to share Intellectual property such as music, movies or games using an anonymous browser such as Tor and an encrypted connection, which makes it more difficult to identify offenders.

In the United States, studies and research on Internet piracy show the majority of offenders to be younger in age. In 2004, more than 50% of youths between the ages of 8 and 18 admitted to downloading music, 30% admitted to downloading games, and 25% admitted to downloading software (Yar, 2006). While Internet piracy is usually viewed by offenders as a harmless crime, it is costly to organizations, and especially to the music, movie, TV, and software industries. In 2016, the United States lost approximately $9 billion in film and television show revenue due to Internet piracy, and is forecasted to be over $11 billion in lost revenue by 2022 (Bevir, 2017). Decriminalizing Internet piracy would damage the entertainment and gaming industry further, most likely causing them to pass their higher costs onto the consumers who purchase their content through legitimate means.

To address Internet piracy, the Digital Millennium Act was passed in 1998 to prohibit the production and distribution of copyrighted works via the Internet, or to disable access controls that protect the copyrighted material (Stewart, Chapple, & Gibson, 2015). In 2000, the Department of U.S. Immigration and Customs Enforcement created the National Intellectual Property Rights Coordination Center (NIPRCC) in response to the rise of electronic intellectual property theft both nationally and internationally. NIPRCC coordinates enforcement of U.S. intellectual property laws and works with several other U.S. Federal agencies and international law enforcement organizations, including Department of Commerce, Federal Bureau of Investigation, U.S. Patent and Trade Office, and Interpol, among others.

References

Bevir, G. (2017, October 3). Cost of online piracy to hit $52bn. Retrieved from IBC: https://www.ibc.org/publish/cost-of-online-piracy-…

Stewart, J. M., Chapple, M., & Gibson, D. (2015). ISC2 Official CISSP Study Guide. Indianapolis: John Wiley and Sons.

Yar, M. (2006). Cybercrime and Society. London: Sage Publications.

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay