SlideShare a Scribd company logo
1 of 4
(Mt) – The Ohio State University Law Enforcement Agencies and Emerging
Technology
I’m working on a Management exercise and need support.Discussion Question: Select a
current or emerging technology with security applications and provide a minimum of two
pros and two cons for the technology you selected. The question is broad-based and can
include technologies such as drones, artificial intelligence, bio-engineering, biometrics,
etc.Technology advances in video management system have come a long way over the last
two decades. 9/11 was an important event that that played an important part in the
changes that occurred in the security technology industry. Mass shootings and other
terrorist events have created a market for the government and private industry to be able to
investigate and in recent years, the focus has been to stop or prevent events before they
occur. Video analytics have become tools that no longer only exist just in movies and at the
government level.Pros:Facial recognition software has become an important and powerful
tool in major transportation hubs around the world to help identify and track terrorist or
people of interest. In the private industry , the facial software can be used to
indentify unwanted visitors, ex employees and in the health care environment , children’s
hospitals are using the software to upload photos of parental disputes suspects or
even unload the entire children sexual child registry data base to alert security or law
enforcement when these individuals present to the campus.Weapons identification has
become another advancement in video analytics that has been successful in indentifying
people that are carrying weapons in the open or even concealed. Based on algorithms,
object identification has been able to indentify behaviors and how a person walks or carries
themselves in crowds while armed. This has become a major breakthrough in helping solve
and also prevent a response to a mass shooting and has certainly enhanced post
investigations. This helps organizations make sense of video data and adds an extra layer of
protection by providing alerts to potential security risks before or as they occur (Meyer
&Meyer, 2014).Cons:The cost of early entry in the video analytics software industry has
been and continues to be a big risk and expensive to develop and purchase as an end
user. The software continues to be explored to reduce flaws and also find markets that will
ensure after development sales. A new video security system can be a large investment
(Murphy, 2017). The cost of the software is labor intensive and requires sales that include
reoccurring license fees per camera annually. The fees are often layered on top of existing
cost of video management contacts to record and have a few months of video
retention.Facial and object identification, along with other cameras analytics software has
become a very tricky business and requires a lot of research and trust in your video
management system partner. Many of the VMS manufactures have developed exclusive
partnership that allows these to be financial worthwhile. One provider might be able to do
certain things well at one cost, but unwilling to develop other software advances. The
relationship and cost become extremely important to evaluate funds needed upfront as well
as future resources to maintain or add services.Technology and the wave of improvements
that have become common in the physical security industry have been a direct result of the
desire of the computer industries to expand their relationships with security professionals.
Not only can video analytics detect threats, alert to security breaches, and help enforce
health and safety regulations, it can also do much more (Murphy, 2017). Large storage
capacity needs, faster processing speeds and improved camera quality have increased
opportunities with camera analytics. As with all technology , the pros and cons, will
consistently require a leader or organization to remain current on what’s available and on
the horizon As a senior leader for a large facility that includes a large camera foot print in
northeast Ohio , I welcome the advances in technology but spend a lot of time managing
the financial obligations of our choices.References:Meyer, C., & Meyer, C. (2014). Boosting
Detection Potential with Video and Analytics. Security, 51(8), 38–40. Retrieved from
http://search.proquest.com/docview/1620037393/Murphy, S. (2017). Video Analytics for
Security and Beyond. Security Technology Executive, 27(2), 32–34,36. Retrieved from
http://search.proquest.com/docview/1912541086/(Response 2 need 250 words 1
reference)Discussion Question: Select a current or emerging technology with security
applications and provide a minimum of two pros and two cons for the technology you
selected. The question is broad-based and can include technologies such as drones, artificial
intelligence, bio-engineering, biometrics, etc.Technology advances in video management
system have come a long way over the last two decades. 9/11 was an important event that
that played an important part in the changes that occurred in the security technology
industry. Mass shootings and other terrorist events have created a market for the
government and private industry to be able to investigate and in recent years, the focus has
been to stop or prevent events before they occur. Video analytics have become tools that no
longer only exist just in movies and at the government level.Pros:Facial recognition
software has become an important and powerful tool in major transportation hubs around
the world to help identify and track terrorist or people of interest. In the private industry ,
the facial software can be used to indentify unwanted visitors, ex employees and in the
health care environment , children’s hospitals are using the software to upload photos of
parental disputes suspects or even unload the entire children sexual child registry data
base to alert security or law enforcement when these individuals present to the
campus.Weapons identification has become another advancement in video analytics that
has been successful in indentifying people that are carrying weapons in the open or even
concealed. Based on algorithms, object identification has been able to indentify behaviors
and how a person walks or carries themselves in crowds while armed. This has become a
major breakthrough in helping solve and also prevent a response to a mass shooting and
has certainly enhanced post investigations. This helps organizations make sense of video
data and adds an extra layer of protection by providing alerts to potential security risks
before or as they occur (Meyer &Meyer, 2014).Cons:The cost of early entry in the video
analytics software industry has been and continues to be a big risk and expensive to
develop and purchase as an end user. The software continues to be explored to reduce
flaws and also find markets that will ensure after development sales. A new video security
system can be a large investment (Murphy, 2017). The cost of the software is labor
intensive and requires sales that include reoccurring license fees per camera annually. The
fees are often layered on top of existing cost of video management contacts to record and
have a few months of video retention.Facial and object identification, along with other
cameras analytics software has become a very tricky business and requires a lot of research
and trust in your video management system partner. Many of the VMS manufactures have
developed exclusive partnership that allows these to be financial worthwhile. One provider
might be able to do certain things well at one cost, but unwilling to develop other software
advances. The relationship and cost become extremely important to evaluate funds needed
upfront as well as future resources to maintain or add services.Technology and the wave of
improvements that have become common in the physical security industry have been a
direct result of the desire of the computer industries to expand their relationships with
security professionals. Not only can video analytics detect threats, alert to security
breaches, and help enforce health and safety regulations, it can also do much more (Murphy,
2017). Large storage capacity needs, faster processing speeds and improved camera quality
have increased opportunities with camera analytics. As with all technology , the pros and
cons, will consistently require a leader or organization to remain current on what’s
available and on the horizon As a senior leader for a large facility that includes a large
camera foot print in northeast Ohio , I welcome the advances in technology but spend a
lot of time managing the financial obligations of our choices.References:Meyer, C., & Meyer,
C. (2014). Boosting Detection Potential with Video and Analytics. Security, 51(8), 38–40.
Retrieved from http://search.proquest.com/docview/1620037393/Murphy, S. (2017).
Video Analytics for Security and Beyond. Security Technology Executive, 27(2), 32–34,36.
Retrieved from http://search.proquest.com/docview/1912541086/(Response 3 need 250
words 1 reference)Intellectual property is a unique creative product, and often a valuable
asset for an organization. Unlike a physical asset such as a manufacturing plant or data
center, intellectual property is an intangible asset. In the United States, intellectual property
is protected by law under various methods, including copyrights, trademarks and patents. A
copyright covers creative works such as books, music or art. Copyrights do not need to be
registered, and are in effect for seventy years after the creator’s death (Stewart, Chapple, &
Gibson, 2015). Trademarks cover logos, slogans or other items that define the brand of an
organization. Patents cover inventions and are issued by the United States Patent and Trade
Office (USPTO).Many other countries also have Intellectual property laws. Intellectual
property laws can be complex, as they can cover many jurisdictions, including local, regional
and national laws, along with other judicial precedents and rulings. Intellectual property
laws can also be addressed in international treaties, convention agreements, and directives
(Yar, 2006).The availability of Internet service has enabled the electronic illegal sharing of
intellectual property, otherwise known as Internet piracy. Anyone with an Internet-
connected device from anywhere in the world can share intellectual property via the
Internet, which further complicates intellectual property law enforcement. The Internet
does not have national or international borders, so it is easy to cross boundaries and access
content that is available in another country, and share it out. It is also easy to share
Intellectual property such as music, movies or games using an anonymous browser such as
Tor and an encrypted connection, which makes it more difficult to identify offenders.In the
United States, studies and research on Internet piracy show the majority of offenders to be
younger in age. In 2004, more than 50% of youths between the ages of 8 and 18 admitted to
downloading music, 30% admitted to downloading games, and 25% admitted to
downloading software (Yar, 2006). While Internet piracy is usually viewed by offenders as a
harmless crime, it is costly to organizations, and especially to the music, movie, TV, and
software industries. In 2016, the United States lost approximately $9 billion in film and
television show revenue due to Internet piracy, and is forecasted to be over $11 billion in
lost revenue by 2022 (Bevir, 2017). Decriminalizing Internet piracy would damage the
entertainment and gaming industry further, most likely causing them to pass their higher
costs onto the consumers who purchase their content through legitimate means.To address
Internet piracy, the Digital Millennium Act was passed in 1998 to prohibit the production
and distribution of copyrighted works via the Internet, or to disable access controls that
protect the copyrighted material (Stewart, Chapple, & Gibson, 2015). In 2000, the
Department of U.S. Immigration and Customs Enforcement created the National Intellectual
Property Rights Coordination Center (NIPRCC) in response to the rise of electronic
intellectual property theft both nationally and internationally. NIPRCC coordinates
enforcement of U.S. intellectual property laws and works with several other U.S. Federal
agencies and international law enforcement organizations, including Department of
Commerce, Federal Bureau of Investigation, U.S. Patent and Trade Office, and Interpol,
among others.ReferencesBevir, G. (2017, October 3). Cost of online piracy to hit $52bn.
Retrieved from IBC: https://www.ibc.org/publish/cost-of-online-piracy-…Stewart, J. M.,
Chapple, M., & Gibson, D. (2015). ISC2 Official CISSP Study Guide. Indianapolis: John Wiley
and Sons.Yar, M. (2006). Cybercrime and Society. London: Sage Publications.

More Related Content

Similar to The Ohio State University Law Enforcement Agencies and Emerging Technology.docx

Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape mercatoradvisory
 
The How of Biometrics
The How of BiometricsThe How of Biometrics
The How of BiometricsPeachy Essay
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docxvickeryr87
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperMarc St-Pierre
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Emily Brady
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
CS Org Ldrshp Poster
CS Org Ldrshp PosterCS Org Ldrshp Poster
CS Org Ldrshp PosterTurner Sparks
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic ChallengesCSCJournals
 

Similar to The Ohio State University Law Enforcement Agencies and Emerging Technology.docx (20)

Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
The How of Biometrics
The How of BiometricsThe How of Biometrics
The How of Biometrics
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) Whitepaper
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
CS Org Ldrshp Poster
CS Org Ldrshp PosterCS Org Ldrshp Poster
CS Org Ldrshp Poster
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic Challenges
 

More from write5

This week we are going to participate in a.docx
This week we are going to participate in a.docxThis week we are going to participate in a.docx
This week we are going to participate in a.docxwrite5
 
This week begins an overview of the Research In.docx
This week begins an overview of the Research In.docxThis week begins an overview of the Research In.docx
This week begins an overview of the Research In.docxwrite5
 
This week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxThis week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxwrite5
 
Watch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxWatch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxwrite5
 
The value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxThe value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxwrite5
 
The Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docxThe Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docxwrite5
 
This will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docxThis will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docxwrite5
 
The Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docxThe Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docxwrite5
 
The Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docxThe Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docxwrite5
 
This assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docxThis assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docxwrite5
 
The Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docxThe Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docxwrite5
 
The next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docxThe next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docxwrite5
 
Two general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxTwo general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxwrite5
 
Two of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docxTwo of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docxwrite5
 
XYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docxXYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docxwrite5
 
Write at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docxWrite at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docxwrite5
 
You mention in your post that you will be.docx
You mention in your post that you will be.docxYou mention in your post that you will be.docx
You mention in your post that you will be.docxwrite5
 
to in which you draw from the assigned.docx
to in which you draw from the assigned.docxto in which you draw from the assigned.docx
to in which you draw from the assigned.docxwrite5
 
Title Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docxTitle Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docxwrite5
 
Write a to paper in APA format that.docx
Write a to paper in APA format that.docxWrite a to paper in APA format that.docx
Write a to paper in APA format that.docxwrite5
 

More from write5 (20)

This week we are going to participate in a.docx
This week we are going to participate in a.docxThis week we are going to participate in a.docx
This week we are going to participate in a.docx
 
This week begins an overview of the Research In.docx
This week begins an overview of the Research In.docxThis week begins an overview of the Research In.docx
This week begins an overview of the Research In.docx
 
This week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxThis week you are exploring what it means to have.docx
This week you are exploring what it means to have.docx
 
Watch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxWatch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docx
 
The value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxThe value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docx
 
The Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docxThe Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docx
 
This will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docxThis will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docx
 
The Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docxThe Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docx
 
The Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docxThe Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docx
 
This assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docxThis assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docx
 
The Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docxThe Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docx
 
The next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docxThe next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docx
 
Two general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxTwo general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docx
 
Two of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docxTwo of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docx
 
XYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docxXYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docx
 
Write at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docxWrite at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docx
 
You mention in your post that you will be.docx
You mention in your post that you will be.docxYou mention in your post that you will be.docx
You mention in your post that you will be.docx
 
to in which you draw from the assigned.docx
to in which you draw from the assigned.docxto in which you draw from the assigned.docx
to in which you draw from the assigned.docx
 
Title Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docxTitle Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docx
 
Write a to paper in APA format that.docx
Write a to paper in APA format that.docxWrite a to paper in APA format that.docx
Write a to paper in APA format that.docx
 

Recently uploaded

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Recently uploaded (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

The Ohio State University Law Enforcement Agencies and Emerging Technology.docx

  • 1. (Mt) – The Ohio State University Law Enforcement Agencies and Emerging Technology I’m working on a Management exercise and need support.Discussion Question: Select a current or emerging technology with security applications and provide a minimum of two pros and two cons for the technology you selected. The question is broad-based and can include technologies such as drones, artificial intelligence, bio-engineering, biometrics, etc.Technology advances in video management system have come a long way over the last two decades. 9/11 was an important event that that played an important part in the changes that occurred in the security technology industry. Mass shootings and other terrorist events have created a market for the government and private industry to be able to investigate and in recent years, the focus has been to stop or prevent events before they occur. Video analytics have become tools that no longer only exist just in movies and at the government level.Pros:Facial recognition software has become an important and powerful tool in major transportation hubs around the world to help identify and track terrorist or people of interest. In the private industry , the facial software can be used to indentify unwanted visitors, ex employees and in the health care environment , children’s hospitals are using the software to upload photos of parental disputes suspects or even unload the entire children sexual child registry data base to alert security or law enforcement when these individuals present to the campus.Weapons identification has become another advancement in video analytics that has been successful in indentifying people that are carrying weapons in the open or even concealed. Based on algorithms, object identification has been able to indentify behaviors and how a person walks or carries themselves in crowds while armed. This has become a major breakthrough in helping solve and also prevent a response to a mass shooting and has certainly enhanced post investigations. This helps organizations make sense of video data and adds an extra layer of protection by providing alerts to potential security risks before or as they occur (Meyer &Meyer, 2014).Cons:The cost of early entry in the video analytics software industry has been and continues to be a big risk and expensive to develop and purchase as an end user. The software continues to be explored to reduce flaws and also find markets that will ensure after development sales. A new video security system can be a large investment (Murphy, 2017). The cost of the software is labor intensive and requires sales that include reoccurring license fees per camera annually. The fees are often layered on top of existing cost of video management contacts to record and have a few months of video
  • 2. retention.Facial and object identification, along with other cameras analytics software has become a very tricky business and requires a lot of research and trust in your video management system partner. Many of the VMS manufactures have developed exclusive partnership that allows these to be financial worthwhile. One provider might be able to do certain things well at one cost, but unwilling to develop other software advances. The relationship and cost become extremely important to evaluate funds needed upfront as well as future resources to maintain or add services.Technology and the wave of improvements that have become common in the physical security industry have been a direct result of the desire of the computer industries to expand their relationships with security professionals. Not only can video analytics detect threats, alert to security breaches, and help enforce health and safety regulations, it can also do much more (Murphy, 2017). Large storage capacity needs, faster processing speeds and improved camera quality have increased opportunities with camera analytics. As with all technology , the pros and cons, will consistently require a leader or organization to remain current on what’s available and on the horizon As a senior leader for a large facility that includes a large camera foot print in northeast Ohio , I welcome the advances in technology but spend a lot of time managing the financial obligations of our choices.References:Meyer, C., & Meyer, C. (2014). Boosting Detection Potential with Video and Analytics. Security, 51(8), 38–40. Retrieved from http://search.proquest.com/docview/1620037393/Murphy, S. (2017). Video Analytics for Security and Beyond. Security Technology Executive, 27(2), 32–34,36. Retrieved from http://search.proquest.com/docview/1912541086/(Response 2 need 250 words 1 reference)Discussion Question: Select a current or emerging technology with security applications and provide a minimum of two pros and two cons for the technology you selected. The question is broad-based and can include technologies such as drones, artificial intelligence, bio-engineering, biometrics, etc.Technology advances in video management system have come a long way over the last two decades. 9/11 was an important event that that played an important part in the changes that occurred in the security technology industry. Mass shootings and other terrorist events have created a market for the government and private industry to be able to investigate and in recent years, the focus has been to stop or prevent events before they occur. Video analytics have become tools that no longer only exist just in movies and at the government level.Pros:Facial recognition software has become an important and powerful tool in major transportation hubs around the world to help identify and track terrorist or people of interest. In the private industry , the facial software can be used to indentify unwanted visitors, ex employees and in the health care environment , children’s hospitals are using the software to upload photos of parental disputes suspects or even unload the entire children sexual child registry data base to alert security or law enforcement when these individuals present to the campus.Weapons identification has become another advancement in video analytics that has been successful in indentifying people that are carrying weapons in the open or even concealed. Based on algorithms, object identification has been able to indentify behaviors and how a person walks or carries themselves in crowds while armed. This has become a major breakthrough in helping solve and also prevent a response to a mass shooting and has certainly enhanced post investigations. This helps organizations make sense of video
  • 3. data and adds an extra layer of protection by providing alerts to potential security risks before or as they occur (Meyer &Meyer, 2014).Cons:The cost of early entry in the video analytics software industry has been and continues to be a big risk and expensive to develop and purchase as an end user. The software continues to be explored to reduce flaws and also find markets that will ensure after development sales. A new video security system can be a large investment (Murphy, 2017). The cost of the software is labor intensive and requires sales that include reoccurring license fees per camera annually. The fees are often layered on top of existing cost of video management contacts to record and have a few months of video retention.Facial and object identification, along with other cameras analytics software has become a very tricky business and requires a lot of research and trust in your video management system partner. Many of the VMS manufactures have developed exclusive partnership that allows these to be financial worthwhile. One provider might be able to do certain things well at one cost, but unwilling to develop other software advances. The relationship and cost become extremely important to evaluate funds needed upfront as well as future resources to maintain or add services.Technology and the wave of improvements that have become common in the physical security industry have been a direct result of the desire of the computer industries to expand their relationships with security professionals. Not only can video analytics detect threats, alert to security breaches, and help enforce health and safety regulations, it can also do much more (Murphy, 2017). Large storage capacity needs, faster processing speeds and improved camera quality have increased opportunities with camera analytics. As with all technology , the pros and cons, will consistently require a leader or organization to remain current on what’s available and on the horizon As a senior leader for a large facility that includes a large camera foot print in northeast Ohio , I welcome the advances in technology but spend a lot of time managing the financial obligations of our choices.References:Meyer, C., & Meyer, C. (2014). Boosting Detection Potential with Video and Analytics. Security, 51(8), 38–40. Retrieved from http://search.proquest.com/docview/1620037393/Murphy, S. (2017). Video Analytics for Security and Beyond. Security Technology Executive, 27(2), 32–34,36. Retrieved from http://search.proquest.com/docview/1912541086/(Response 3 need 250 words 1 reference)Intellectual property is a unique creative product, and often a valuable asset for an organization. Unlike a physical asset such as a manufacturing plant or data center, intellectual property is an intangible asset. In the United States, intellectual property is protected by law under various methods, including copyrights, trademarks and patents. A copyright covers creative works such as books, music or art. Copyrights do not need to be registered, and are in effect for seventy years after the creator’s death (Stewart, Chapple, & Gibson, 2015). Trademarks cover logos, slogans or other items that define the brand of an organization. Patents cover inventions and are issued by the United States Patent and Trade Office (USPTO).Many other countries also have Intellectual property laws. Intellectual property laws can be complex, as they can cover many jurisdictions, including local, regional and national laws, along with other judicial precedents and rulings. Intellectual property laws can also be addressed in international treaties, convention agreements, and directives (Yar, 2006).The availability of Internet service has enabled the electronic illegal sharing of intellectual property, otherwise known as Internet piracy. Anyone with an Internet-
  • 4. connected device from anywhere in the world can share intellectual property via the Internet, which further complicates intellectual property law enforcement. The Internet does not have national or international borders, so it is easy to cross boundaries and access content that is available in another country, and share it out. It is also easy to share Intellectual property such as music, movies or games using an anonymous browser such as Tor and an encrypted connection, which makes it more difficult to identify offenders.In the United States, studies and research on Internet piracy show the majority of offenders to be younger in age. In 2004, more than 50% of youths between the ages of 8 and 18 admitted to downloading music, 30% admitted to downloading games, and 25% admitted to downloading software (Yar, 2006). While Internet piracy is usually viewed by offenders as a harmless crime, it is costly to organizations, and especially to the music, movie, TV, and software industries. In 2016, the United States lost approximately $9 billion in film and television show revenue due to Internet piracy, and is forecasted to be over $11 billion in lost revenue by 2022 (Bevir, 2017). Decriminalizing Internet piracy would damage the entertainment and gaming industry further, most likely causing them to pass their higher costs onto the consumers who purchase their content through legitimate means.To address Internet piracy, the Digital Millennium Act was passed in 1998 to prohibit the production and distribution of copyrighted works via the Internet, or to disable access controls that protect the copyrighted material (Stewart, Chapple, & Gibson, 2015). In 2000, the Department of U.S. Immigration and Customs Enforcement created the National Intellectual Property Rights Coordination Center (NIPRCC) in response to the rise of electronic intellectual property theft both nationally and internationally. NIPRCC coordinates enforcement of U.S. intellectual property laws and works with several other U.S. Federal agencies and international law enforcement organizations, including Department of Commerce, Federal Bureau of Investigation, U.S. Patent and Trade Office, and Interpol, among others.ReferencesBevir, G. (2017, October 3). Cost of online piracy to hit $52bn. Retrieved from IBC: https://www.ibc.org/publish/cost-of-online-piracy-…Stewart, J. M., Chapple, M., & Gibson, D. (2015). ISC2 Official CISSP Study Guide. Indianapolis: John Wiley and Sons.Yar, M. (2006). Cybercrime and Society. London: Sage Publications.