- 500+ Experts Online to help you 24x7
- Guaranteed Grade or Get Money Back!
- Rated 4.8/5 Out of 5087 Reviews
Login or Sign Up With Your Email to Complete the Order ProcessGet Additional $5 Cashback on Sign Up
Login or Sign Up With Your Email to Complete the Order ProcessGet Additional $5 Cashback on Sign Up
Get Your Assignments at the Best Prices NOW!!
2652 Downloads1 I Published: 12 Apr ,2019
To develop a decision matrix for the selection of electronic physical access control devices.
Physical security is considered as protection of personnel, information and property with property including hardware, programs, networks and data against circumstances which may cause harm or loss to an organisation or individual (Boran, 2009). It has been noticed that by having improved focus on physical security the institutions and organisations can attain effective protection from fire, theft, terrorism, etc. (Scherer, 2011). Physical security systems are framed in order to meet the diverse significant protective activities. At the initial level, security systems were designed to provide protection to ongoing assets. However, security systems are now framed to protect human resource, buildings, equipments, etc. It means by having use of system, it can be make sure that only authorised person is having access to the assets (Mahdavi, 2008). Within the physical security domain this can be achieved through a variety of methods ranging from a simple sign and systematic process. It is also essential to focus on procedures, environmental aspects and other values that may improve protection. Biometric readers and electronic locking devices installation in offices also promote physical security.
For better assurance about security, doors and gates can be used so that barriers can be created. Along with this, better control device can be established through making sure that limited access is being offered. Guards, locks and electronic access systems must be placed at right place so that issues can be overcome in desired way. If these values are not well structured then it will be considered as weakness of security system (Stadler, 2009). It clearly reflects that security manager requires to implement strategies that improve standards and offer effective access device. Barriers framed in the structure must be well designed so that better strength can be offered to overall security system.
Call Now :+61 879 057 034
Decision Making is considered as a process that focuses on the formation of important decisions. It can be said that a structured decision process allows for the effective selection of logical choices from the list of available options (Turban, 2011). As per the detailed study, security manager need to take number of decisions on daily basis for improvement in services. It is significant for members to have decision according to consideration of diverse factors that are associated with risk management. It means on the basis of risk the security manager must take decisions so that goals and objectives can be accomplished (Stadler, 2009). Security domain also need to be referred for continuous improvement in security measures. Effective focus on formal systematic process allows to have identification of risk that are associated with environment. While having participation in decision making process the management must focus on diverse methods that allows to meet objectives. Evaluation of methods to manage risk is significant section and it helps in decision making process. Application of treatment strategies is also dependent upon the monitoring of existing process (O'neill, 2009). It means in order to have effective decisions security manager must evaluate number of methods that helps in meeting standards.
Decisions must be taken into account by having focus on key elements of organisational security controls (Strack, 2008). In addition to this, decisions are also needed to be taken according to damages that may impact the overall development. By having improved focus on such values the issues might get overcome in desired way. If standards are also followed in appropriate manner then it will allow to take decisions that are beneficial to recover from damages.
Existing study is framed on the basis of theories of security science domain. It is beneficial to deal with specific kind of crime prevention and ensure that better support is being provided to Defence in depth. With an assistance of this, relationship between security and risk management can be improved. It also plays a key role in exploring the risk management so that decision making process can be accomplished effectively.
In addition to this, there diverse theories that may be used to have support in regard to access control. It helps in improving physical security system for continuous improvement. Many organisations adopt a physical security program to protect against fire, theft, terrorism, etc. There are various crime prevention frameworks that can be used to reduce the opportunities of criminal activities (Velis, 2012). The reduction of opportunity aspect of the framework involves measures that provide better protection so by focusing on the study, learning can be improved about these measures. By having a proper use of number of physical security devices can assist in meeting target. It is necessary to make sure that para-centric profiles must be well maintained so that issues can be overcome. Use of electronic access control readers will secure essential elements. Encryption of information is one of key factor that support the security system (Rangel, 2009). It is also significant for security manager to have better control over access so that potential targets can be accomplished. By having improved focus on exclude potential offenders the efficiency of security system can be advanced. It also helps to ensure that area is protected from potential attackers.
Decision making process is a non-linear, recursive activity which is framed to have improvement in services. It is necessary for security executive to have consideration of criteria and characteristics of choice so that issues can be overcome. Along with this, identification and evaluation of diverse alternative ways is also significant because it allows to have improvement in protection (Flick, 2011). In order to have appropriate understanding about decision making theory there are supportive theories that need to be consider in appropriate manner. In addition to this, utility theory is considered as policy that allow decision makers to accomplish goals and objectives in appropriate manner. With an assistance of this, alternative ways can be chose in desired way. Proper values can be provided to system by having improved focus on key guidelines.
Expected utility theory is also a critical aspect that helps in meeting objectives. It allows to have combined used of activities and add on values. Proper course of action must be designed to make sure that expected utility can be offered. The course of action or alternative with the highest expected utility should be chosen and that the decision is consistent (Goddard and Melville, 2014). It is significant for members to have decisions as per preferences so that issues can be overcome in desired way. It has been noticed that there are number of standards and criteria that must be considered for effective selection of an access control devices. It also facilitates in overcome issues and improve the overall working. Complex issues in respect to decisions are mostly related with diverse aspects. Traditional and logical belief must be referred to improve work conditions (Daniel and Sam, 2011). Approach of multi criteria decision making is beneficial to meet the objectives and offering opportunity to improve mathematical framework. It is advantageous for self consistent analysis so that decisions can be taken into account.
Literature review is considered as most significant aspect for the study and it provides better learning in respect to subject by analysing number of secondary sources. It means literature in regard to decision making and its methodologies will be beneficial to understand the key measures of the study. It will also indicate the information about security and application of policies for effective selection of tools. The literature shows a trend of positive outcomes from the use of a structured decision-making approach.
Decision making theory is one of critical aspect that helps individual to make decisions in desired way. In this respect, it has been noticed that individual must improve decision making process by appropriate selection of tools. By having improved focus on decision making theory the security executive may have effective application of policies. Lee (2011) identified a number of decision making approaches that can be adopted by security practitioners for the appropriate selection of tools. In addition to this, it can be said that the decision making tool provides a great support to accomplishment of systematic decision making (Lee, 2011). By having assistance of this, security professional can ensure about the funding and need of new technological tools (Davis, 2012).
Bradley (2013) has contended that study on security managers is also beneficial because it provides a great support to learning process. By having improved understanding of security manager and their behaviour better outcomes can be attained in desired way. Behavioural learning also assist in use of decision making tool so that objectives can be accomplished. Study of secondary sources also indicates that security managers have limited access to tools that creates issues in systematic decision making. It is also one of key reason that most of decisions taken by security managers are according to their experience. Using their experience number of drawbacks are also identified that helps in decision making process. Along with this, decisions taken must meet the key needs of stakeholders.
If your dream is to get top grades, get a rewarding assignment service from us.Brilliant Assignment Services
The study will adopt a qualitative research technique. In this, number of qualitative tools will be adopted by members to construct an essential assortment criterion in the selection of tangible physical access control devices (Bradley, 2013). Exploratory research design will be employed by researcher to provides more accurate knowledge and information about research topic and evaluator can compile several kinds of data without any problems. With the help of qualitative research approach better support will be provided to the study in order to have better outcomes (Creswell, 2013). In addition to this, it can be said that sampling methods also need to be referred as per need of organisation. Random sampling method will be employed by researcher to accomplish the objectives. It is a method that helps in primary research accomplishment. Interviews, questionnaire and surveys are also key methods that are mostly adopted by researcher in order to make sure that key standards are properly maintained. For accomplishment of current investigation, questionnaire method has been used to have appropriate collection of information.
As per the detailed study, it has been identified that literature study is considered as initial level study that offers appropriate learning about subject. In this section, the detailed will be gathered and analysed in respect to selection of access control devices. Journals, books and other sources will be used to gather information about decision making process. Data is accessed on the basis of keywords so that better support can be provided to study. For having effective collection of information, researcher will focus on primary and secondary sources. In primary sources the questionnaire will be designed with consideration of motive of the study. It will assist in gathering responses and testing the designed decision matrix. In respect to secondary sources, number of secondary material will be accessed by experts (Daniel and Sam, 2011). Books, journals, magazines and online sources will be considered as critical aspect that will assist in effective collection of information. Information will also be presented in literature format so that proper interpretation can be provided. In order to provide appropriate explanation of collected information different themes will be designed. It means information will be presented in form of decision matrix and physical security.
It is a stage in which interview will be considered as critical aspect for appropriate collection of information. It is beneficial to provide better support to primary research and accomplish goals and objectives. In this, interview will be conducted for target sample audience. Participants of the interview will be security professionals so that better outcome can be attained. Along with this, interview will be conducted on the basis of key criteria that allows to meet objectives. Key motive is to understand professionals preferences towards selection of physical access control devices. Questions asked to participants must reflect the motive or purpose behind the interview. On the basis of collected information, different themes will be framed so that better support can be provided to literature extraction. Broad themes are being framed implicit knowledge of other relevant selection criteria particular to their field of physical security. It indicates that understanding in respect to physical security and other aspects can be attained in desired way.
It is a third stage where interview will be developed on the basis of decision matrix. Survey has been created to take responses from participants so that learning can be improved in regard to subject of the study. Online survey will be created with a use of google forms. Different kind of online tools are there that helps data collection and storage so researcher will focus on such aspects. It will provide a great support to overall process and allows to accomplish goals and objectives in low cost. It provides ability to have rapid development of survey that helps in meeting objectives. Online survey method is more effective as compared to traditional once so management need to ensure about it. With an assistance of this, proper outline can be framed so that optimistic outcome can be attained. Purpose of the survey will also be shared with the online forums so that participants may provide accurate and valid response to survey. It will assist in decision making process so that appropriate tool of physical security can be selected.
In addition to this, proper selection of sampling is also essential because it helps in meeting objectives. For current study, sampling size will be 70 security professionals. In this, questionnaire will be presented to participants in order to take the responses in regard to the subject (Flick, 2011). By having consideration of this, information can be collected effectively. Along with this, the testing of decision matrix will also be considered by the researcher in order to ensure about the decisions. It will also require an assistance of sampling size. With an assistance of this, suggestions can be taken into account because it will assist in continuous improvement. On the basis of outcome of testing the decisions can be framed in desired way. It means in depth learning can be gained in respect to electronic access control and its application (Chui, 2007). It is beneficial to improve security measures and lead business to impressive level of success.
In respect to present investigation, experts will focus on qualitative aspects of data analysis. For effective analysis and interpretation of the gathered information, researcher will focus on thematic approach. With an assistance of this, themes will be designed by the members as per consideration of gathered responses (Jackson, 2008). It will also allow to present information in tables and graphs so that overall findings can be presented in appropriate manner (Goddard and Melville, 2014). Appropriate analysis of literature expansion is also significant because it allows to meet objectives. With an assistance of themes will be framed to attain better outcomes from the study.
In addition to this, it can be said that every research study requires an appropriate consideration of content validity so that accurate outcomes can be attained. By having improved focus on validity the research outcomes can be improved in order to meet objectives. If these aspects are not properly maintained then critical issue might be faced. Researcher must focus on effective application of reliability and validity so that proper support can be offered to all research methods (Philips and Clark, 2012).
Limitations of the study is that the values and belief of researcher may get influenced due to mechanical security solutions. It may also affect the overall outcomes of the study. Along with this, allocation of finance for completion of study is also significant (Daniel and Sam, 2011). If allocation of finance is not appropriate, then effectiveness of the study may get influenced in negative manner. One of limitation of the study might be that it focuses on random sampling. If researcher has not considered key principles of random sampling then it might be possible that random selection has not accomplished in authentic way. It might affect the overall development of results in diverse manner. Access to security professionals is not easy that also impacts the effectiveness of study (Merriam, 2009). Overall process of data collection might be delay because of lack of availability of security professionals who are ready for survey and interview. Moreover, lack of information in context to decision matrix may also impact the results of overall study. It is significant for researcher to ensure about key principles in order to make sure about the limitations and maintain effectiveness of the study.
Getting Top Grades is No Longer a Dream for You.
It is necessary for researcher to make sure that the results must be presented in such manner that overall outcome will be useful of public. If data interpretation is not understandable then process of interpretation can not be rate in appropriate manner. An example of the interpretation of data is the condensing of various access device functions. In addition to this, it can be said that interpretation of information must provide learning about diverse factors that are related with physical security (Gibaldi, 2010). The context in which these terms were located assisted in the development of the weighting documents question assist materials. It means end user and reader must understand the key values so that study objectives can be accomplished in desired way.
In present study, development of decision matrix will be presented in appendix so that selection of physical access devices within context of asset protection can be taken into account. In this, information gathered from primary and secondary sources will also provide assistance in designing of decision matrix (Flick, 2011). Physical Security Access Device Decision Matrix is systematic method that helps in appropriate selection so it will be considered as significant aspect. It is also advantageous to have efficient selection of electronic security tool so that level of physical security can be improved.
As per above study, it can be concluded that in order to have designing of decision matrix the key aspects like physical security, biometric tools has been considered in effective manner. Along with this, information about wide range of physical security access devices has been gathered from secondary sources. It has also assisted in effective designing of decision matrix. By having improved focus on AHP the security practitioners has also designed a spread sheet that renders information about security aspects. It facilitates in decision making process for sustainable improvement. AHP is a matrix tool that provide appropriate evaluation of key values. Decision making theory is one of critical aspect that helps individual to make decisions in desired way.
Books and Journals
Type: Assignment I
Published: 30 Jan ,2019 I
Introduction An information system can be considered as an organized system for the collecting, storing, organizing and communicating the information. It is based on the study of complementary networks that use by organizations and their personnel to gather, process, create and distribute the data...ReadMore
Type: Assignment I
Published: 10 Dec ,2018 I
Introduction to IT Ethics In modern era, technologies has increased the unethical issues and practices at work place. The technology is increasing the risk of unethical and illegal business practices which are performing by many organisations (Fromm, 2013). The using and spreading of information...ReadMore
If the samples impressed you and you want to place an order with us just submit your queries with us and place your order.Chat With Expert