(Mt) – The Ohio State University Law Enforcement Agencies and Emerging Technology Discussion Response

I’m working on a Management exercise and need support.
Discussion Question: Select a current or emerging technology with security applications and provide a minimum of two pros and two cons for the technology you selected. The question is broad-based and can include technologies such as drones, artificial intelligence, bio-engineering, biometrics, etc.
Technology advances in video management system have come a long way over the last two decades. 9/11 was an important event that that played an important part in the changes that occurred in the security technology industry. Mass shootings and other terrorist events have created a market for the government and private industry to be able to investigate and in recent years, the focus has been to stop or prevent events before they occur. Video analytics have become tools that no longer only exist just in movies and at the government level.
Pros:
Facial recognition software has become an important and powerful tool in major transportation hubs around the world to help identify and track terrorist or people of interest.  In the private industry , the facial software  can be used to indentify  unwanted visitors, ex employees  and in the health care environment , children’s hospitals are using the software to upload photos of parental disputes suspects or even  unload the entire children sexual child registry data base to alert  security or law enforcement  when these individuals present to the campus.
Weapons identification has become another advancement in video analytics that has been successful in indentifying people that are carrying weapons in the open or even concealed.  Based on algorithms, object identification has been able to indentify behaviors and how a person walks or carries themselves in crowds while armed.  This has become a major breakthrough in helping solve and also prevent a response to a mass shooting and has certainly enhanced post investigations. This helps organizations make sense of video data and adds an extra layer of protection by providing alerts to potential security risks before or as they occur (Meyer &Meyer, 2014).
Cons:
The cost of early entry in the video analytics software industry has been and continues to be a big risk and expensive to develop and purchase as an end user.  The software continues to be explored to reduce flaws and also find markets that will ensure after development sales. A new video security system can be a large investment (Murphy, 2017). The cost of the software is labor intensive and requires sales that include reoccurring license fees per camera annually.  The fees are often layered on top of existing cost of video management contacts to record and have a few months of video retention.
Facial and object identification, along with other cameras analytics software has become a very tricky business and requires a lot of research and trust in your video management system partner.  Many of the VMS manufactures have developed exclusive partnership that allows these to be financial worthwhile.  One provider might be able to do certain things well at one cost, but unwilling to develop other software advances. The relationship and cost become extremely important to evaluate funds needed upfront as well as future resources to maintain or add services.
Technology and the wave of improvements that have become common in the physical security industry have been a direct result of the desire of the computer industries to expand their relationships with security professionals. Not only can video analytics detect threats, alert to security breaches, and help enforce health and safety regulations, it can also do much more (Murphy, 2017). Large storage capacity needs, faster processing speeds and improved camera quality have increased opportunities with camera analytics.  As with  all technology , the pros and cons, will consistently require a leader or organization to remain current  on what’s available and on the horizon  As a senior leader for a large facility that includes  a large camera  foot print  in northeast Ohio , I welcome the advances  in technology  but  spend a lot of time managing the financial  obligations  of our choices.
References:
Meyer, C., & Meyer, C. (2014). Boosting Detection Potential with Video and Analytics. Security, 51(8), 38–40. Retrieved from http://search.proquest.com/docview/1620037393/
Murphy, S. (2017). Video Analytics for Security and Beyond. Security Technology Executive, 27(2), 32–34,36. Retrieved from http://search.proquest.com/docview/1912541086/
(Response 2 need 250 words 1 reference)
Discussion Question: Select a current or emerging technology with security applications and provide a minimum of two pros and two cons for the technology you selected. The question is broad-based and can include technologies such as drones, artificial intelligence, bio-engineering, biometrics, etc.
Technology advances in video management system have come a long way over the last two decades. 9/11 was an important event that that played an important part in the changes that occurred in the security technology industry. Mass shootings and other terrorist events have created a market for the government and private industry to be able to investigate and in recent years, the focus has been to stop or prevent events before they occur. Video analytics have become tools that no longer only exist just in movies and at the government level.
Pros:
Facial recognition software has become an important and powerful tool in major transportation hubs around the world to help identify and track terrorist or people of interest.  In the private industry , the facial software  can be used to indentify  unwanted visitors, ex employees  and in the health care environment , children’s hospitals are using the software to upload photos of parental disputes suspects or even  unload the entire children sexual child registry data base to alert  security or law enforcement  when these individuals present to the campus.
Weapons identification has become another advancement in video analytics that has been successful in indentifying people that are carrying weapons in the open or even concealed.  Based on algorithms, object identification has been able to indentify behaviors and how a person walks or carries themselves in crowds while armed.  This has become a major breakthrough in helping solve and also prevent a response to a mass shooting and has certainly enhanced post investigations. This helps organizations make sense of video data and adds an extra layer of protection by providing alerts to potential security risks before or as they occur (Meyer &Meyer, 2014).
Cons:
The cost of early entry in the video analytics software industry has been and continues to be a big risk and expensive to develop and purchase as an end user.  The software continues to be explored to reduce flaws and also find markets that will ensure after development sales. A new video security system can be a large investment (Murphy, 2017). The cost of the software is labor intensive and requires sales that include reoccurring license fees per camera annually.  The fees are often layered on top of existing cost of video management contacts to record and have a few months of video retention.
Facial and object identification, along with other cameras analytics software has become a very tricky business and requires a lot of research and trust in your video management system partner.  Many of the VMS manufactures have developed exclusive partnership that allows these to be financial worthwhile.  One provider might be able to do certain things well at one cost, but unwilling to develop other software advances. The relationship and cost become extremely important to evaluate funds needed upfront as well as future resources to maintain or add services.
Technology and the wave of improvements that have become common in the physical security industry have been a direct result of the desire of the computer industries to expand their relationships with security professionals. Not only can video analytics detect threats, alert to security breaches, and help enforce health and safety regulations, it can also do much more (Murphy, 2017). Large storage capacity needs, faster processing speeds and improved camera quality have increased opportunities with camera analytics.  As with  all technology , the pros and cons, will consistently require a leader or organization to remain current  on what’s available and on the horizon  As a senior leader for a large facility that includes  a large camera  foot print  in northeast Ohio , I welcome the advances  in technology  but  spend a lot of time managing the financial  obligations  of our choices.
References:
Meyer, C., & Meyer, C. (2014). Boosting Detection Potential with Video and Analytics. Security, 51(8), 38–40. Retrieved from http://search.proquest.com/docview/1620037393/
Murphy, S. (2017). Video Analytics for Security and Beyond. Security Technology Executive, 27(2), 32–34,36. Retrieved from http://search.proquest.com/docview/1912541086/
(Response 3 need 250 words 1 reference)
Intellectual property is a unique creative product, and often a valuable asset for an organization. Unlike a physical asset such as a manufacturing plant or data center, intellectual property is an intangible asset. In the United States, intellectual property is protected by law under various methods, including copyrights, trademarks and patents. A copyright covers creative works such as books, music or art. Copyrights do not need to be registered, and are in effect for seventy years after the creator’s death (Stewart, Chapple, & Gibson, 2015). Trademarks cover logos, slogans or other items that define the brand of an organization. Patents cover inventions and are issued by the United States Patent and Trade Office (USPTO).
Many other countries also have Intellectual property laws. Intellectual property laws can be complex, as they can cover many jurisdictions, including local, regional and national laws, along with other judicial precedents and rulings. Intellectual property laws can also be addressed in international treaties, convention agreements, and directives (Yar, 2006).
The availability of Internet service has enabled the electronic illegal sharing of intellectual property, otherwise known as Internet piracy. Anyone with an Internet-connected device from anywhere in the world can share intellectual property via the Internet, which further complicates intellectual property law enforcement. The Internet does not have national or international borders, so it is easy to cross boundaries and access content that is available in another country, and share it out. It is also easy to share Intellectual property such as music, movies or games using an anonymous browser such as Tor and an encrypted connection, which makes it more difficult to identify offenders.
In the United States, studies and research on Internet piracy show the majority of offenders to be younger in age. In 2004, more than 50% of youths between the ages of 8 and 18 admitted to downloading music, 30% admitted to downloading games, and 25% admitted to downloading software (Yar, 2006). While Internet piracy is usually viewed by offenders as a harmless crime, it is costly to organizations, and especially to the music, movie, TV, and software industries. In 2016, the United States lost approximately $9 billion in film and television show revenue due to Internet piracy, and is forecasted to be over $11 billion in lost revenue by 2022 (Bevir, 2017). Decriminalizing Internet piracy would damage the entertainment and gaming industry further, most likely causing them to pass their higher costs onto the consumers who purchase their content through legitimate means.
To address Internet piracy, the Digital Millennium Act was passed in 1998 to prohibit the production and distribution of copyrighted works via the Internet, or to disable access controls that protect the copyrighted material (Stewart, Chapple, & Gibson, 2015). In 2000, the Department of U.S. Immigration and Customs Enforcement created the National Intellectual Property Rights Coordination Center (NIPRCC) in response to the rise of electronic intellectual property theft both nationally and internationally. NIPRCC coordinates enforcement of U.S. intellectual property laws and works with several other U.S. Federal agencies and international law enforcement organizations, including Department of Commerce, Federal Bureau of Investigation, U.S. Patent and Trade Office, and Interpol, among others.
References
Bevir, G. (2017, October 3). Cost of online piracy to hit $52bn. Retrieved from IBC: https://www.ibc.org/publish/cost-of-online-piracy-…
Stewart, J. M., Chapple, M., & Gibson, D. (2015). ISC2 Official CISSP Study Guide. Indianapolis: John Wiley and Sons.
Yar, M. (2006). Cybercrime and Society. London: Sage Publications.

Order from Academic Writers Bay
Best Custom Essay Writing Services

QUALITY: 100% ORIGINAL PAPER NO PLAGIARISM – CUSTOM PAPER

Why Choose Us?

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee
SATISFACTION

How It Works

  • Click on the “Place Your Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the “PAPER DETAILS” section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.

About AcademicWritersBay.com

AcademicWritersBay.com is an easy-to-use and reliable service that is ready to assist you with your papers 24/7/ 365days a year. 99% of our customers are happy with their papers. Our team is efficient and will always tackle your essay needs comprehensively assuring you of excellent results. Feel free to ask them anything concerning your essay demands or Order.

AcademicWritersBay.com is a private company that offers academic support and assistance to students at all levels. Our mission is to provide proficient and high quality academic services to our highly esteemed clients. AcademicWritersBay.com is equipped with competent and proficient writers to tackle all types of your academic needs, and provide you with excellent results. Most of our writers are holders of master’s degrees or PhDs, which is an surety of excellent results to our clients. We provide assistance to students all over the world.
We provide high quality term papers, research papers, essays, proposals, theses and many others. At AcademicWritersBay.com, you can be sure of excellent grades in your assignments and final exams.

NO PLAGIARISM