On National Teacher Day, meet the 2024-25 Kenan Fellows
The Ohio State University Law Enforcement Agencies and Emerging Technology.docx
1. (Mt) – The Ohio State University Law Enforcement Agencies and Emerging
Technology
I’m working on a Management exercise and need support.Discussion Question: Select a
current or emerging technology with security applications and provide a minimum of two
pros and two cons for the technology you selected. The question is broad-based and can
include technologies such as drones, artificial intelligence, bio-engineering, biometrics,
etc.Technology advances in video management system have come a long way over the last
two decades. 9/11 was an important event that that played an important part in the
changes that occurred in the security technology industry. Mass shootings and other
terrorist events have created a market for the government and private industry to be able to
investigate and in recent years, the focus has been to stop or prevent events before they
occur. Video analytics have become tools that no longer only exist just in movies and at the
government level.Pros:Facial recognition software has become an important and powerful
tool in major transportation hubs around the world to help identify and track terrorist or
people of interest. In the private industry , the facial software can be used to
indentify unwanted visitors, ex employees and in the health care environment , children’s
hospitals are using the software to upload photos of parental disputes suspects or
even unload the entire children sexual child registry data base to alert security or law
enforcement when these individuals present to the campus.Weapons identification has
become another advancement in video analytics that has been successful in indentifying
people that are carrying weapons in the open or even concealed. Based on algorithms,
object identification has been able to indentify behaviors and how a person walks or carries
themselves in crowds while armed. This has become a major breakthrough in helping solve
and also prevent a response to a mass shooting and has certainly enhanced post
investigations. This helps organizations make sense of video data and adds an extra layer of
protection by providing alerts to potential security risks before or as they occur (Meyer
&Meyer, 2014).Cons:The cost of early entry in the video analytics software industry has
been and continues to be a big risk and expensive to develop and purchase as an end
user. The software continues to be explored to reduce flaws and also find markets that will
ensure after development sales. A new video security system can be a large investment
(Murphy, 2017). The cost of the software is labor intensive and requires sales that include
reoccurring license fees per camera annually. The fees are often layered on top of existing
cost of video management contacts to record and have a few months of video
2. retention.Facial and object identification, along with other cameras analytics software has
become a very tricky business and requires a lot of research and trust in your video
management system partner. Many of the VMS manufactures have developed exclusive
partnership that allows these to be financial worthwhile. One provider might be able to do
certain things well at one cost, but unwilling to develop other software advances. The
relationship and cost become extremely important to evaluate funds needed upfront as well
as future resources to maintain or add services.Technology and the wave of improvements
that have become common in the physical security industry have been a direct result of the
desire of the computer industries to expand their relationships with security professionals.
Not only can video analytics detect threats, alert to security breaches, and help enforce
health and safety regulations, it can also do much more (Murphy, 2017). Large storage
capacity needs, faster processing speeds and improved camera quality have increased
opportunities with camera analytics. As with all technology , the pros and cons, will
consistently require a leader or organization to remain current on what’s available and on
the horizon As a senior leader for a large facility that includes a large camera foot print in
northeast Ohio , I welcome the advances in technology but spend a lot of time managing
the financial obligations of our choices.References:Meyer, C., & Meyer, C. (2014). Boosting
Detection Potential with Video and Analytics. Security, 51(8), 38–40. Retrieved from
http://search.proquest.com/docview/1620037393/Murphy, S. (2017). Video Analytics for
Security and Beyond. Security Technology Executive, 27(2), 32–34,36. Retrieved from
http://search.proquest.com/docview/1912541086/(Response 2 need 250 words 1
reference)Discussion Question: Select a current or emerging technology with security
applications and provide a minimum of two pros and two cons for the technology you
selected. The question is broad-based and can include technologies such as drones, artificial
intelligence, bio-engineering, biometrics, etc.Technology advances in video management
system have come a long way over the last two decades. 9/11 was an important event that
that played an important part in the changes that occurred in the security technology
industry. Mass shootings and other terrorist events have created a market for the
government and private industry to be able to investigate and in recent years, the focus has
been to stop or prevent events before they occur. Video analytics have become tools that no
longer only exist just in movies and at the government level.Pros:Facial recognition
software has become an important and powerful tool in major transportation hubs around
the world to help identify and track terrorist or people of interest. In the private industry ,
the facial software can be used to indentify unwanted visitors, ex employees and in the
health care environment , children’s hospitals are using the software to upload photos of
parental disputes suspects or even unload the entire children sexual child registry data
base to alert security or law enforcement when these individuals present to the
campus.Weapons identification has become another advancement in video analytics that
has been successful in indentifying people that are carrying weapons in the open or even
concealed. Based on algorithms, object identification has been able to indentify behaviors
and how a person walks or carries themselves in crowds while armed. This has become a
major breakthrough in helping solve and also prevent a response to a mass shooting and
has certainly enhanced post investigations. This helps organizations make sense of video
3. data and adds an extra layer of protection by providing alerts to potential security risks
before or as they occur (Meyer &Meyer, 2014).Cons:The cost of early entry in the video
analytics software industry has been and continues to be a big risk and expensive to
develop and purchase as an end user. The software continues to be explored to reduce
flaws and also find markets that will ensure after development sales. A new video security
system can be a large investment (Murphy, 2017). The cost of the software is labor
intensive and requires sales that include reoccurring license fees per camera annually. The
fees are often layered on top of existing cost of video management contacts to record and
have a few months of video retention.Facial and object identification, along with other
cameras analytics software has become a very tricky business and requires a lot of research
and trust in your video management system partner. Many of the VMS manufactures have
developed exclusive partnership that allows these to be financial worthwhile. One provider
might be able to do certain things well at one cost, but unwilling to develop other software
advances. The relationship and cost become extremely important to evaluate funds needed
upfront as well as future resources to maintain or add services.Technology and the wave of
improvements that have become common in the physical security industry have been a
direct result of the desire of the computer industries to expand their relationships with
security professionals. Not only can video analytics detect threats, alert to security
breaches, and help enforce health and safety regulations, it can also do much more (Murphy,
2017). Large storage capacity needs, faster processing speeds and improved camera quality
have increased opportunities with camera analytics. As with all technology , the pros and
cons, will consistently require a leader or organization to remain current on what’s
available and on the horizon As a senior leader for a large facility that includes a large
camera foot print in northeast Ohio , I welcome the advances in technology but spend a
lot of time managing the financial obligations of our choices.References:Meyer, C., & Meyer,
C. (2014). Boosting Detection Potential with Video and Analytics. Security, 51(8), 38–40.
Retrieved from http://search.proquest.com/docview/1620037393/Murphy, S. (2017).
Video Analytics for Security and Beyond. Security Technology Executive, 27(2), 32–34,36.
Retrieved from http://search.proquest.com/docview/1912541086/(Response 3 need 250
words 1 reference)Intellectual property is a unique creative product, and often a valuable
asset for an organization. Unlike a physical asset such as a manufacturing plant or data
center, intellectual property is an intangible asset. In the United States, intellectual property
is protected by law under various methods, including copyrights, trademarks and patents. A
copyright covers creative works such as books, music or art. Copyrights do not need to be
registered, and are in effect for seventy years after the creator’s death (Stewart, Chapple, &
Gibson, 2015). Trademarks cover logos, slogans or other items that define the brand of an
organization. Patents cover inventions and are issued by the United States Patent and Trade
Office (USPTO).Many other countries also have Intellectual property laws. Intellectual
property laws can be complex, as they can cover many jurisdictions, including local, regional
and national laws, along with other judicial precedents and rulings. Intellectual property
laws can also be addressed in international treaties, convention agreements, and directives
(Yar, 2006).The availability of Internet service has enabled the electronic illegal sharing of
intellectual property, otherwise known as Internet piracy. Anyone with an Internet-
4. connected device from anywhere in the world can share intellectual property via the
Internet, which further complicates intellectual property law enforcement. The Internet
does not have national or international borders, so it is easy to cross boundaries and access
content that is available in another country, and share it out. It is also easy to share
Intellectual property such as music, movies or games using an anonymous browser such as
Tor and an encrypted connection, which makes it more difficult to identify offenders.In the
United States, studies and research on Internet piracy show the majority of offenders to be
younger in age. In 2004, more than 50% of youths between the ages of 8 and 18 admitted to
downloading music, 30% admitted to downloading games, and 25% admitted to
downloading software (Yar, 2006). While Internet piracy is usually viewed by offenders as a
harmless crime, it is costly to organizations, and especially to the music, movie, TV, and
software industries. In 2016, the United States lost approximately $9 billion in film and
television show revenue due to Internet piracy, and is forecasted to be over $11 billion in
lost revenue by 2022 (Bevir, 2017). Decriminalizing Internet piracy would damage the
entertainment and gaming industry further, most likely causing them to pass their higher
costs onto the consumers who purchase their content through legitimate means.To address
Internet piracy, the Digital Millennium Act was passed in 1998 to prohibit the production
and distribution of copyrighted works via the Internet, or to disable access controls that
protect the copyrighted material (Stewart, Chapple, & Gibson, 2015). In 2000, the
Department of U.S. Immigration and Customs Enforcement created the National Intellectual
Property Rights Coordination Center (NIPRCC) in response to the rise of electronic
intellectual property theft both nationally and internationally. NIPRCC coordinates
enforcement of U.S. intellectual property laws and works with several other U.S. Federal
agencies and international law enforcement organizations, including Department of
Commerce, Federal Bureau of Investigation, U.S. Patent and Trade Office, and Interpol,
among others.ReferencesBevir, G. (2017, October 3). Cost of online piracy to hit $52bn.
Retrieved from IBC: https://www.ibc.org/publish/cost-of-online-piracy-…Stewart, J. M.,
Chapple, M., & Gibson, D. (2015). ISC2 Official CISSP Study Guide. Indianapolis: John Wiley
and Sons.Yar, M. (2006). Cybercrime and Society. London: Sage Publications.