27 Dec Please prepare a response to each of the attached documents for total of 2 responses. The responses need to be at least 150 words each. The responses should be as if you are talking dir
Please prepare a response to each of the attached documents for total of 2 responses. The responses need to be at least 150 words each. The responses should be as if you are talking directly to the person.
Due in 24 hrs.
Wild-card events are significant events that fall outside the realms of probability and plausibility. They tend to fall into the “possible” realm, which often is overlooked when considering future impacts to security. Aliens attack or a meteor strikes the Earth are examples. These events might be considered possible, but spending time developing a plan to mitigate them are not a good business practice. A wild card might be something not even predictable. One wild card that might be considered is Artificial Intelligence (AI) in the form of robots in control access and security response is a “wild-card” worth considering. This could have an immense impact on the security industry. The security professional might address initially by keeping up to date on the technology. Making professional contacts in the AI industry is a must. If a development is on the horizon, the security manager would be better prepared to mitigate or even take advantage of it. In addition, being prepared to act when the AI movement happens is essential. The security manager should be prepared to reach out to his/her contacts when the time arises. When a wild card event happens, innovation happens, or you fall behind. The security manager can preempt this AI wild card event by collaborating with other key parts of the organization in brainstorming sessions to help promote innovation and creativity.
One of the primary areas of weakness is about perception. It is not uncommon to see a security professional as a security guard. The traditional bumbling idiot that is easily duped, out of shape, and unaware of his surroundings. This perception is perpetrated in the movie and television industry. In life, perception is everything. If the security industry is perceived as a group of bumbling idiots, then they will not get the recognition needed to be a competent professional. To change this perception, those in the security industry my strive to select those individuals that will represent the field in a professional manner and demand respect from those that which the service is provided for.
This final forum brings our collaborative effort in SCMT 390 Security Administration to and end. Thank you all for your input and responses. Good luck in your courses and in life.
Marc
References
Smith, C., & Brooks, D. (2013). Security Science: The Theory and Practice of Security. Chapters 8 & 9. Retrieved from http://ezproxy.apus.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=485991&site=ehost-live&scope=site&ebv=EB&ppid=pp_177
Good day, Professor and Class;
As we come to the end of this course, we now understand that a security manager’s position is more than just managing the guard force, as many people think this is the primary function of a security manager. Security management is more than a profession; it is a science. Science is an ever-changing field, as so is security management. Many security and business continuity professionals never thought the world would shut down due to a global pandemic, a wild-card no one ever thought of. As technology evolves, threats and challenges evolve; therefore, making the job of a security manager more challenging with ongoing opportunities, not obstacles. A wild-card, I see coming in the upcoming years, is the merge of IT Security and physical security and the development of “bots.” A bot is a software that conducts the usual tasks a human does, like making reservations and fetching information from an email to add to your calendar. In some cases, bots have been designated to assist in the customer service field in replying to customers and act as if a human was replying to the customer. Bots are just a simple example of the development of AI. (Wagner, 2016) As AI continues to evolve, the challenge continues to grow. We have seen many movies like the terminator, her, and transcendence, where machines developed human-like thoughts and decided the human race was dangerous or, in the case of the movie “her”, developed a personality to make a human fall in love with her. Such a wild-card will be something new to the security manager to deal with and figure a way to overcome the threat or the challenge. Security managers need to ensure there will be a way to control the AI system in case if it develops its own thoughts to mitigate any risks accompanied with that developed thinking.
The security industry is evolving and relying more and more on IT security. (ASIS, 2015)This should give the security industry professionals the idea that having knowledge of only the physical part of security will soon not be enough to have a good security program to address all threats and vulnerabilities. Security managers should broaden their knowledge and start acquiring more education and certification in the IT field to float when the flood comes. Certification such as CISM will be much desired shortly, in addition to ASIS certifications like PSPS and CPP, even for security managers.
References
ASIS International, Knoke, M. E., C., & Peterson, K. E. (2015a). Physical Security Principles (First ed.). ASIS International.
Wagner, K. (2016, April 11). Bots, explained. Vox. from https://www.vox.com/2016/4/11/11586022/what-are-bots
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Wridemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.