Introduction
The constant development in almost every aspect of the society has led to a lot of new inventions, needs, and growing trends. With growing population all around the world, new businesses have been formed while the existing business has grown. Security issues have also been in the spotlight with different incidences and threat on different aspect demanding for an improved security system (Wilson, & McCreight, 2012). There has always been the need to advance security measure throughout history as security issues are prone to societal changes and advancement of technology and know-how. Currently, most security measures that were being used in the past decades are considered obsolete and new systems have been put in place with better performance and more advanced technology (Trimmer, 1981). In order to ensure that security at any instances is maintained security system needs to be designed and produced ahead of time. This mainly means that a security solution is expected to be available for future and new ways of committing a crime. With time, security has been handled through the use of different systems and approaches but all with the same aim of protecting and ensuring the safety of property and people within different communities. Even with diverse and ever-changing security issues, which are distinct to different geographical locations and societies, electronic security system approach has proved its efficiency and reliability. It has become a norm in almost every secure location that the use of electronic security system has much to offer as compared to other traditional and non-conventional security approaches (Trimmer, 1981). This has also steered different companies to undertake initiatives that are aimed at improving the current electronic security systems and offer lasting security solution to the world. The world and almost every institution and individual have undertaken different measure in ensuring a secure environment at the time and this has led to a lot of investment being made in the security industry. The has been new security threats that have emerged in almost all front of the society, a notion that has led to massive improvement and integration of new security system that are meant to fight off any threat. The definition of security has also advanced to include more recent issues that were not categorized or even thought to affect security (Walker, 1985).
Principles of Security with the Electronic Development
Electronic Security System (ESS) has been an approach undertaken to ensure in-depth security protection since security has always been compromised by human weakness through intentional or unintentional acts. Hence, electronic systems are utilized as tools to assist human beings in ensuring the intended use of overall security systems. Electronic systems are also able to generate audit log like user’s movement, operator’s action forensic video etc. that can be used later for reference purposes. Considering the design and operation of electronic security systems, they are considered to be integrated electronic systems with exterior and interior IDS, ACS, response time, procedures, policies, display, control, monitoring capabilities, alarm response, and even CCTV systems (Wilson, & Mccreight, 2012). All these elements are needed in a single ESS to ensure it works effectively and stays within the recommended requirement as per the current time. ESS works hand in hand with other physical protection systems like gates, fences, doors, barriers, light system and windows etc. any effective ESS operates on a detect, delay and respond protocol to ensure that time between intrusion and response is less than the needed time to undertake any form of damages or to compromise any assets (Walker, 1985). When designing a secure electronic security system some principle to consider may include accountability, defense-in-depth, and economy of mechanism, non-secrecy of design, failsafe defaults, least privilege, privilege separation and complete mediation. This principle may at times differ with a different design of security system but they tend to guide any design in the most effective way possible. Security system design is basically reliant on the idea of security issue being tackled at the moment. This has even been illustrated from the past security system that was designed in the past decades as they highlight the nature of security issues at the time (Trimmer, 1981).
The Closed Circuit Television (CCTV) system is widely used part of electronic security system that is used in almost all security applications all over the world. The CCTV is a closed system and its use is intended to monitor any area where it is installed. When undertaking security surveillance using the ESS, the system will require a CCTV camera, recorder, monitor and connectivity that ensure all element are connected to a control room to declare the surveillance system complete (Wilson, & Mccreight, 2012). ESS in the contemporary environment is deployed as the main security systems in facilities, institutions, and even home. Basically, the ESS is utilized since the system is able to offer round the clock security and even ensures that the control room is not expected to be manned at all time (Trimmer, 1981). Also, the system is not susceptible to downtime that is commonly attributed to human efforts of changing shifts. Electronic security system acts like a deterrence where to potential perpetrator it creates a form of psychological barrier. Mostly, CCTV cameras are placed in some strategic locations within premises that are well visible to the general public. Through sighting a CCTV camera, any person feels like they are being watched at all time even if the CCTV camera is not pointing in their direction or even active. Development of security system has been advance through electronics to even come up with new measures and techniques of boosting security. In some situation, electronic systems are used to combine more than one system in order to archive maximum security at time. Some security systems are combined with another sensor like fire sensor, heat sensors, and even movement sensors to ensure a fully integrated security system that offers more to security personnel and purposes (Walker, 1985). Electronic security is more reliable as opposed to a mechanical system as they are able to give accurate data and are more user-friendly. There is no particular ESS able to accommodate all different purposes and requirements of identification, accessibility, determination, detection, and deterrence. This calls for security personnel to try and match any ESS to different uses to avoid risking having multiple and smaller ESS systems that fail to be synergized. Also, at times, it requires that security personnel have some form of knowledge or training on integrating and using ESS systems to accomplish their main task (Walker, 1985). Lack of knowledge to utilize and even manage ESS systems is just like not utilizing the system in the first place. Electronic development has resulted in providing a wide range of security system to choose from, with some having more capabilities when compared to others. This has brought the issue of cost and systems feasibility to its application location (Wilson, & Mccreight, 2012).
Development of Security Alarm
Recent years have seen a shift in the deadbolt locks and simple control panels to a more sophisticated high-tech electronic security alarm gadgets that are composed of many security attributes. Recent alarm attributes their current status from the past groundwork undertaken under smart security system. The idea of having alarms as security gadget was introduced long ago and alarm were developed with the available technology then and served its purpose. The end of World War 1 saw an increase in crime in almost every region in the world that was affected by the war (Walker, 1985). This led to most Americans becoming sensitive towards security issues and they tried to find a lasting solution to protect themselves from harm and safeguard their property. The insurance industry boosted the alarm idea by providing a discount on premium made by any subscriber with an alarm system (Trimmer, 1981). The demand by consumers for alarm system grew rapidly in America and later reached other regions in the world. Installed alarm during this time operated through an electromagnetic contact on the doors and windows that fastened the contact to improve on security. The electromagnet contact run from a battery and had a bell that could sound to alert the owner. A guard used to monitor these alarm system from a central point and responded in case of the bell rung.
George Orwell in 1949 published his book “1984” and for the first time introduced the idea of video surveillance which was much talked about and this brought the development of video surveillance. However, it was not till the 1970s that video surveillance was fully developed and used for security measures at homes. A video surveillance system at this time consisted of a large camera that was motorized to move down a track. Grainy images were transmitted by the video camera to a stationary television which was the control panel at the time (Wilson, & Mccreight, 2012). Homeowners were able to control the movements of the camera. An alarm was also fitted so that the home owners could be able to alert guard of any insecurity issue that they viewed from their monitor. Fire alarm technology also evolved with rest of security system technology. It was not till 1962, that a group of Canadian researchers on a study published an article on smoke and heat detectors’ lifesaving potential. The study had a followed a detailed research of many home fires that had happened in Ontario and the conclusion on the need for a fire and smoke detectors was established. The study led to new standards being developed on the making of smoke detectors and their existence in residencies. From 1975 to 1998, the invented smoke and fire detectors alarm had resulted in a 50 percent decrease in fire deaths in the US. With time development of these alarms continued to what the industry has at this particular moment (Walker, 1985).
In today’s world, electromagnetic contact doors and windows have been replaced with some sophisticated and automated electronic security systems. Doors are now locked remotely through the latest web-enabled devices regardless of the geographical position of homeowners. Video surveillance development has led to cameras being less than a square with powerful lenses able to capture high definition videos while streaming them online. This development is so helpful and provokes people to imagine what will be available in the next 50 years to come.
The Future of Security in the 21st century
Security concerns have for a long time been changing with new threat being developed and new ways of committing crimes being established. This is mainly attributed to the growth of technology which has enabled people to commit crimes in some unexpected and very well thought out ways (Trimmer, 1981). Challenges of committing a crime in the current society will not be the same challenges in future as criminals are able to find a way through security system with improved technology. This has prompted security personnel to continue big a step ahead of criminals by developing more advanced security systems that will counteract crime even before it happens. The future of 21st-century security will be more advanced and capable able to fight the current crimes being committed (Wilson, & Mccreight, 2012). There has been an attempt to develop a virtual system that can be able to detect crime even before it happens and then stop them in advances. The virtual security system is mainly a computer program that is provided with the day to day data of what is going on in the world and also some personal information around the world. Different variables that are considered to be part of criminal activities will also be used by the system to analyze all the information present within the virtual system while making a conclusion. It is believed that a person who is about to undertake any criminal activity can be recognized through different crime variables and their environment which prompt them to commit a crime as a response to external and internal stimuli (Trimmer, 1981). Hence, the future security system will utilize these different variables and pin-point people who are planning, intending and even committing a crime (Walker, 1985).
Communication
This research on electronic security system is extremely crucial in improving communication within the different sectors involved in the design and manufacture of electronic systems. Over time, the development of electronic security system has been riddled with different gaps between the designer, manufacturers and the end users. This has led to designers making design that may not be feasible to manufactures while the end product may also not be tailored towards the different needs of the end user (Walker, 1985). These issues have mainly been referred as communication issues that affect the industry and there has been a growing need to provide solution to these communication issues. Through proper communication, the end user can communicate their security needs to manufacturers and designer in order to influence the entire process.
Problem management / research
Just like any other electronic systems in the market, electronic security systems have been faced with different problem that can only be solved through proper management. The gap between the needs of end users, and manufacturers and designers concerns needs are critical problem that needs problem management and research in order to find out the best solution while keeping the situation in check (Walker, 1985). The gap between the needs will then be reduced and finally breached to present lasting solutions to present problem.
Reflection on practice
The practice of ensuring security using electronic system is a practice with more hope and future solution as opposed to other security systems that are considered to be traditional methods. It is also critical to take note that the practice of using electronic system for security purposes is only meant to compliment other physical form of security. These includes fences, doors, windows, walls etc. electronic security systems cannot be implemented as the only security measure in a premises. Guards may be needed to compliment the electronic security system and ensure its efficiency.
Innovation
Security systems will also be upgraded in the future where a new invention will be used. A good example is given with x-ray imaging security systems which are able to see through concealed objects and spot any illegal item. Security systems that are being designed to with the polygraph concept will be used to ascertain whether people at a certain location like airports poses a threat through asking some simple question while being monitored to determine the truth (Wilson, & Mccreight, 2012). The system will be able to identify any lies and ill motive spelled out by an individual and make direct reports to the relevant security personnel. For further security and reduction of human casualties, there has been an idea of adopting robots to undertake law enforcement and fight crime at different levels (Walker, 1985). The robots will be installed with advance security system where they will be able to undertake video surveillance of all operation on real-time basis while reporting to a command center. Actions to be implemented by the robots law enforcers will also be procedural as they will be utilizing developed programmes that ensure they undertake their duties in the best way possible. Such drastic future response to security will be necessitated by the development and sophistication of crime which has already shown a worrying trend already. Future measures are extremely needed to combat crime and tackle security concerns as the failure to improve the current security system will only be resulting in welcoming chaos and anarchy in the future. However, with the progress made by different security system companies in the globe, the global security prospect seem to be very promising (Wilson, & Mccreight, 2012).
Evaluate different Types of Alarms Efficiency
Alarm efficiency can be attributed to different capabilities undertaken by the alarm system and what seems to be more special on any alarm. An alarm efficiency will be measured by how effective the alarm is able to deter, derail and report any wrong doing to the specific authorities (Trimmer, 1981). The perfect alarm will be considered to automatically alert law enforcement personnel on any security issues without wasting any times. With different applications of alarms in the field, choosing an alarm will be first subjected to its cost and ease applications of its targeted area (Walker, 1985). This means that when purchasing an alarm, the cost of the alarm should be right with the organizational demand and target of the respective item. Alarm efficiency is also portrayed by the surveillance needed by any alarm being used by the organization where some alarm need more support than others especially when it comes to alarm response.
Alarm efficiency is subject to the design date and indicated date before expiry. With changing trends in crime and how criminal undertakes their operations, one cannot afford to install an alarm that has been passed with time. Current alarm systems are required and need to be installed in different guarded location to boost hopes of a fully functional alarm system and enhanced security (Trimmer, 1981). Old technology in alarm is extremely critical for security reason as most criminal are able to understand old technology and have already figured out a way to bypass such outdated systems.
Critical Thinking
The field of security and associated electronic systems require me to have sufficient critical thinking while deliberating on the most appropriate design of alarms. While researching and studying the information on security systems, I will develop and improve my critical thinking capability. To attain an effective and cost effective alarm system, it is imperative that I need to organize and present information in a logical manner, evaluate various points of views or arguments, and detect inconsistencies in the interrelations of ideas. Finally, the concepts of security and electronic system require systematic analysis and solving of problems, and drawing of accurate inferences. These two attributes are core features of critical thinking. Thus, at the end of the course, I will have perfected my critical thinking skills.
Conclusion
Security systems are quite crucial entities in every human undertaking especially with the ever-growing threat of insecurity on almost all fronts. The electronic security system has been identified and well-illustrated to be the only most instrumental approach to fighting insecurity and also provide a lasting solution to such cases. Different steps have been undertaken to improve security systems in order to remain relevant in the war against crime and electronic security system have also portrayed the ability to be the best future security system that can be relied on and undertaken in the most effective way possible. Alarms which are a crucial part of any security system structure have been outlined to have had a long history that promoted their advanced development while giving hope to users. The psychological effect of being watched when anyone spots a CCTV camera has also been attributed to be an effective way on how electronic security systems affect the psychological capacity of people and in a real sense promoting security. The main aim of using different security system is all aimed at reducing and even preventing the chances of any crime being committed.
References
Trimmer, H. (1981). Understanding and Servicing Alarm Systems. Stoneham Butterworth.
Walker, (1985). Electronic Security Systems. Cambridge, UK: University Press.
Wilson, L., & McCreight, R. (2012). Public Emergency Laws & Regulations: Understanding
Constraints & Opportunities. Journal of Homeland Security and Emergency Management.