Featured Post

The Efficacy of Anacardic Acid from Anacarduim Occidentale Essay Example for Free

The Efficacy of Anacardic Acid from Anacarduim Occidentale Essay Lipids are one of the atoms utilized by angles for their physiological c...

Thursday, December 19, 2019

Personal Statement Mba University - 917 Words

Personal statement I take this opportunity to express my interest in joining your institution, Widener University. I hold a bachelor degree in accounting from King Saudi University where I graduated in 2010. Currently I am studying leadership and education for my masters at Concordia University. My GPA stands at 4.00. Education for me never stops and I believe the only time I will stop learning is when my life ends. This is why I am interested in joining your institution; in order to continue with my education, better my grades, and stand in society. Apart from learning, I also love discovering new things, working, and completing. In this front, I have taken part in different disciplines of which I hold certificates and trainings. I participated in organizations and challenges that have earned me a scholarship from the government. I have a certificate in differentiated instruction for diverse student population, which took place in 2014. In addition, I also have a certificate in complete portfolio requ irement for EDS 506, Community learning laboratory; furthermore, I also have other certificates in global education ISO, and distance education. My key research goals in my doctoral program are- guided by the following core objectives; to foster an understanding of theory and its relevance to problem solving , and the expansion of our knowledge base. To contribute towards the improvement of leadership by encouraging the spirit of critical inquiry and analysis throughShow MoreRelatedMy Personal Action Plan For 20171464 Words   |  6 PagesIncluded in my Personal Action Plan for 2017 are several goals that I need to achieve in order to reach my long-term personal objectives. They include, earning a promotion to Vice President, saving $3.5 million for retirement, maintaining my health, and attaining an MBA degree. All four long-term objectives are specific, relevant to me, in line with my life goals, and time-bound. Most importantly, they are attainable, so I can set new goals o nce these are met. Furthermore, I am cognizant of theRead MoreCollege Profile : Nebraska Wesleyan University986 Words   |  4 PagesJoy: School Profile: Nebraska Wesleyan University In 1887, Nebraska Wesleyan University was established as a private university directly affiliated with the United Methodist Church. This higher learning institution, which is conveniently located in the capital Lincoln, is one of the more popular liberal arts schools in the state. Nebraska Wesleyan University offers more than 100 majors, minors and professional programs. The most popular degrees for undergraduates include the B.S. degrees in businessRead MoreMba Statement of Purpose973 Words   |  4 PagesRunning head: PERSONAL STATEMENT TO PURSUE AN MBA Personal Statement to Pursue an MBA My personal statement begins with my American journey. A journey of faith and courage in the face of adversity that has taken me to where I am today. And it remains still a work in progress. And an MBA will surely help accelerate that. I was sixteen years old when my family left the Philippines, my birthplace and migrated to the United States to pursue the American dream that many in theRead MoreThe Mba Decision1525 Words   |  7 PagesThe MBA Decision Getting an MBA is one of these decisions that people at one point thought of as a level of education only few are able to attain. In time that perspective has changed and in recent calculations the number of MBA graduates has increased by 250% (Articlesbase, 2006). In the closing case, we address the questions below to help Ben with his MBA decision. Question 1 How does Ben’s age affect his decision to get an MBA? Time plays a huge factor in Ben’s decision to get his MBA and toRead MorePersonal Statement : The Sports Marketing Field795 Words   |  4 Pagesenrolled in the Master of Business Administration (MBA) program at Arkansas State University. My passion lies in promotion and marketing. I am particularly interested in social media marketing. I am scheduled to complete my degree in the spring of 2017. As graduation gets closer, I must focus on building my personal brand. It is vital that I capture the attention of successful and high profile companies. My target market is organizations that need MBA individuals with a focus in Marketing, specificallyRead More1. How does Bens age affect his decision to get an MBA?1426 Words   |  6 Pagesï » ¿ 1. How does Ben s age affect his decision to get an MBA?   Age will be an important factor affecting his decision of getting an MBA course in multiple ways. After graduated six years ago, time has been taken off from education and invested into his career. Keeping on risingwith age and six years break from education, it will not only be more difficultto concentrate and remain good attitude towards studies, but also keep family and work responsibilities. Moreover, he would have only approximatelyRead MoreAn Advanced Business Degree Essay1239 Words   |  5 Pages Three Pillars Essay There has been a number of years between completing my bachelor’s of science in engineering and my pursuit of an MBA degree. What began as a one-year break from school turned into marriage, raising a family and all of the responsibilities that accompany life. Nevertheless, the desire never left me and the opportunity to pursue this degree has been one of the best decisions I have made. Although my background is in engineering, one ofRead MoreCareer Objectives Of Queens Executive Mba1385 Words   |  6 PagesU of C: A written statement outlining - Career objectives and - Learning objectives. Queen’s: A cover letter outlining - Current responsibilities and assignments, - Career accomplishments, - Reasons for applying to Queen s Executive MBA, and - Professional and - Personal goals. I want to earn the MBA so I can - Have better career prospects - Earn more money - Secure my career - Finish what I wanted to accomplish 20 years ago, to serve my country, - Align my skills with the appropriateRead MoreAn Mba Program Through Application And Insight Of The Disciplines Taught Throughout The Program2206 Words   |  9 Pagesthat sink in a moment – MBA degree, let that sink in another moment. Many organizations actively recruit for qualified personnel with MBAs. Why is an MBA degree sought after? Some insight can be provided by Susan Miller (2011), author of The Essential MBA, â€Å"Few Masters degrees require a learner to have such a wide-ranging command of so many, often fairly disparate areas of enquiry† (p. 1). Another way to interpret the quote from Ms. Miller’s book is that obtaining an MBA degree is challenging andRead MoreEthics Reflection Paper1087 Words   |  5 Pageswhen planning one’s personal life or planning for the success of a business. When companies develop strategic plans, they must consider what role ethics will play and how social responsibility will affect the plan keeping stakeholders n eed at the forefront. If businesses and individuals are making a conscious effort to display ethical behavior, ethical perspectives and beliefs should evolve over time much like what has happened in the master’s of business administration (MBA) program. Role of Ethics

Wednesday, December 11, 2019

Research in Nursing for Heart Failure Disease- myassignmenthelp

Question: Discuss about theResearch in Nursing for Heart Failure Disease Management. Answer: Annotated Bibliography Gorthi, J., Huntera, C. B., Mooss , A. N., Alla, V. M., Hilleman, D. E. (2014). Reducing heart failure hospital readmissions: A systematic review of disease management programs. Cardiology Research, 5, 126-138. Gorthi et al. (2014) conducted a systematic review analysis of various researches that use different heart failure (HF) disease management programs (DMPs) to minimize hospital readmission of people suffering heart failure. The study aim was to evaluate available researches conducted to determine the efficiency of DMPs in controlling hospital readmission of people with chronic HF. The review data involved on-line authentic research studies randomly collected from reliable resources like PubMed, Cochrane library and EBSCOHost from the year 1975 to 2014. The research studies analyzing DMPs on more than 50 patients were included in review analysis. The efficiency was analyzed on the basis of hospital readmission or mortality outcomes. The DMPs analyzed in the review were outpatient clinic care, home visits, telemonitoring (invasive and non-invasive) and structured telephonic support. As per findings, telemanagement DMP showed potential to reach a wide range of patients at one time in cos t effective manner as well as structured telephone support DMP showed a control in HF hospital readmission. The home visits and outpatient clinic care were limited in terms of accessibility and cost to control hospital readmission. Thus, the review findings provide inconsistent results and cannot be considered potentially effective to interpret the effect of HF DMPs. Rees, K., Dyakova, M., Wilson, N., Ward, K., Thorogood, M., Brunner, E. (2013). Dietary advice for reducing cardiovascular risk. Cochrane Database of Systematic Reviews, 2013(12), 1-113. Ress et al. (2013) provided a review of various interventions that provide information on dietary advice to manage cardiovascular diseases and conditions. The study aims to provide effective dietary advice that can help to improve cardiovascular risk profile among adults 18 or above dwelling in the community. There were less than 25% participants diagnosed with cardiovascular disease. Only 10% participants were allowed to use pharmaceuticals as per essentiality. The participants included children, pregnant women and weight reducing people. The review method involved randomly controlled trails involving group or individual level studies on dietary intake and follow up of minimum three months to four years. The dietary interventions involved only advice related to diet like minimizing fat intakes, food modifications, vegetable and fruit intake etc. The outcome methods were biomarkers, cardiovascular risk factors and self-report by participants. The study findings indicated a remarkable change in cholesterol levels, triglyceride levels, blood pressure, urinary sodium excretion indicating the positive response of dietary advice provided in review studies. The self-report by participants indicated increase in fiber intake, development of healthy eating habits and increase in energy levels. Lastly, this review study provided lot information on the impact of changing dietary intake on cardiovascular risk. The results obtained are highlighting a positive change minimizing cardiovascular risk along with the change in cholesterol and blood pressure risk of the participants. Stromberg, A., Martensson, J., Fridlund, B., Levin, L-A., Karlsson, J-E., Dahlstrom, U. (2003). Nurse-led heart failure clinics improve survival and self-care behaviour in patients with heart failure: Results from a prospective, randomised trial. European Heart Journal, 24, 1014-1023. Stromberg et al. (2003) provide a study on clinical survival and self-care behaviour practices provided by nurses led to heart failure clinic. The study aim is to analyse the impact of nurse-led heart failure clinic on the self-care behaviour, mortality and morbidity of patients admitted to hospital due to heart failure. The research method involved 106 participants who were admitted to clinic affected by heart failure or having symptoms or risk of heart diseases. The follow-up from these patients was collected in visits performed after 2-3 weeks of discharge up to 12 months. Most educated and experienced nurses were provided responsibility to manage medication protocols, educate patients and provide treatment in follow-up visits. The research data was compared to control group data where participants getting usual care were the control group. The research findings indicated a positive impact of nurse-led care interventions on target population because the hospital admission due to d eath or chronic heart failure condition were very few among target participants when compared to control group getting usual interventions. There is 55% decrease detected after 12 months of implementing the intervention indicates a positive impact of self-care education and nurse-led clinic interventions. Further, study group even had higher self-care score of 3 compared to control group. Therefore, the study concludes that nurse-led heart failure clinical interventions can help to minimise the impact of risk developed after heart failure as well as help patient to develop a self-care attitude. Justification for selecting these references Gorthi et al. (2014) review on different researches conducted to analyze the impact of different Heart failure (HF) disease management programs (DMPs) can be considered as a reliable source of information because the database is collected from most authentic websites providing reliable information. This information about hospital readmission DMPs can be used to manage the condition of Charlie because he is confronting hospital readmission as an outcome of chronic heart failure he had 2 years before. Heidenreich et al. (2013) indicated that nursing interventions in managing the chronic condition like heart failure, stroke, kidney disease, infection etc. play a very important role to minimize the ruthlessness of that condition. This review study can be considered as a reliable resource in terms of quality because study data is collected from most reliable online websites. Secondly, the methodology, sample researches and analysis tools are crucially analysed to gather best possible outcomes. The review findings include the use of proper statistics that provided most authentic outcomes. The review clearly mentions that the outcome obtained about studied DMPs are not sufficient to determine the efficiency of HF disease management program proves its reliability. In the review different DMPs working on wide range of population are compared to analyze the effect on hospital readmission after heart failure incidence. Out of these DMPs, telemonitoring and structured telephone support are considered as effective DMPs to control hospital readmission. These DMPs can be used as a part of the nursing care plan to manage Charlie condition in provided case. According to Yancy et al. (2013) studies diet is an important factor for chronic heart disease because diet helps to manage body cholesterol, triglyceride and fatty acids, which minimizes the risk of cardiovascular arrest or attack. This review study provided by Ress et al. (2013) is a best-suited example to study the impact of dietary advice in chronic heart risk because 44 trials were reviewed in this study with both individuals and groups as participants of the study. There were many interventions on dietary management provided by professionals or dieticians. The study involves analysis the impact each and every dietary intervention on the health of participants. The variation in dietary intervention intensity is helpful to get best health results because the impact of dietary intervention changes from person to person having different body type (Aiken et al. 2014). Therefore, best intervention is detected by such study because the intervention providing maximum positive response can be considered as universally suitable for all body types (Stewart et al. 2012). This review study provides this information about best suitable dietary intervention to control chronic heart disease risk. The study quality is refined, specific and reliable information sufficient for provided case analysis. The study involves statistical analysis to get authentic and measurable results understanding the impact of dietary change on cardiovascular risk. The study involves each and every possible detail sufficient enough to implement it as a beneficial reference resource in the study. This review analysis on dietary intake shall help to manage the overweight condition of Charlie in provided case scenario. According to Drewes et al. (2012) studies weight issues in old age people is a tough task to handle along with other health risk conditions. This review is a very detailed account of different dietary interventions and their impact on health. Therefore, this review will work as a beneficial resource to manage the health condition of Charlie to develop best nursing interventions related to weight management issues developing chronic heart failure risk. The nurse-led heart failure clinics improve survival and self-care behaviour development study provided by Stromberg et al. (2003), is a proper scientific research based on evidence to study the impact of nursing care on patient outcome. The study is effective and accurate in terms of participating population, calculation tools and statistical analysis providing strength and authenticity to findings. The quality of data is impactful containing every bit of detail about research performed in the study. However, the only limitation is the time duration of research, which is only 12 months. Stamp, Machado Allen (2014) indicated that 12 months is a very small duration to analyze the long-term impact of lifetime condition life heart failure. In contrast, Heidenreich et al. (2013) opine that a comparison between control group and study group provides reliable results even in short duration time of any research. Therefore, this study can be considered as a beneficial resource for developing nursing interventions in provided case scenario. As Charlie in the present case is a 75-year-old man requiring management of his chronic heart failure condition, this research will help the involved nurse to develop best contemporary practices to develop self-care behaviour for Charlie to manage his health condition at home. Recommendations for clinical practice Chronic heart failure and its consequences remain a major health hazard to contemporary people irrespective of significant management, care and treatments the risk still remains high (Feltner et al. 2014). In the provide scenario, 75 years old Mr. Charlie is also facing consequences of his chronic heart failure during his readmission to hospital after 2 years of incidence. This indicates a lack of care interventions for Mr. Charlie after his first chronic heart failure (Aiken et al. 2014). According to Siouta et al. (2016) studies about multidisciplinary care principles for chronic heart failure (CHF) that are used in Australia to provide high-quality nursing care. These principles are the list of specific guidelines and strategies that can benefit patients suffering CHF. Further, Riegel, Jaarsma Strmberg (2012) indicated that nutritional therapy provided by nurses that involves sodium restriction in patient diet can help to control pulmonary congestion. This intervention would help to manage the peripheral oedema of Mr. Charlie. Radhakrishnan, Topaz Creber (2014) studied about controlling heart risk in old age patient where most workable interventions included managing fluid intake, maintaining activity tolerance and establish a powerful connection with the patient. This study would be beneficial to be used in the provided case because Charlie is also an old age male suffering similar chronic condition. References Aiken, L. H., Sloane, D. M., Bruyneel, L., Van den Heede, K., Griffiths, P., Busse, R., ... McHugh, M. D. (2014). Nurse staffing and education and hospital mortality in nine European countries: a retrospective observational study.The Lancet,383(9931), 1824-1830. Drewes, H. W., Steuten, L. M., Lemmens, L. C., Baan, C. A., Boshuizen, H. C., Elissen, A. M., ... Vrijhoef, H. J. (2012). The Effectiveness of Chronic Care Management for Heart Failure: Meta?Regression Analyses to Explain the Heterogeneity in Outcomes.Health services research,47(5), 1926-1959. Feltner, C., Jones, C. D., Cen, C. W., Zheng, Z. J., Sueta, C. A., Coker-Schwimmer, E. J., ... Jonas, D. E. (2014). Transitional care interventions to prevent readmissions for persons with heart failure: a systematic review and meta-analysis.Annals of internal medicine,160(11), 774-784. Heidenreich, P. A., Albert, N. M., Allen, L. A., Bluemke, D. A., Butler, J., Fonarow, G. C., ... Nichol, G. (2013). Forecasting the impact of heart failure in the United States: a policy statement from the American Heart Association.Circulation: Heart Failure,6(3), 606-619. Radhakrishnan, K., Topaz, M., Creber, R. M. (2014). Adapting heart failure guidelines for nursing care in home health settings: challenges and solutions.The Journal of cardiovascular nursing,29(4), E1. Riegel, B., Jaarsma, T., Strmberg, A. (2012). A middle-range theory of self-care of chronic illness.Advances in Nursing Science,35(3), 194-204. Siouta, N., van Beek, K., Preston, N., Hasselaar, J., Hughes, S., Payne, S., ... Hodiamont, F. (2016). Towards integration of palliative care in patients with chronic heart failure and chronic obstructive pulmonary disease: a systematic literature review of European guidelines and pathways.BMC palliative care,15(1), 18. Stamp, K. D., Machado, M. A., Allen, N. A. (2014). Transitional care programs improve outcomes for heart failure patients: an integrative review.Journal of Cardiovascular Nursing,29(2), 140-154. Stewart, S., Carrington, M. J., Marwick, T. H., Davidson, P. M., Macdonald, P., Horowitz, J. D., ... Scuffham, P. A. (2012). Impact of home versus clinic-based management of chronic heart failure: the WHICH?(Which Heart Failure Intervention Is Most Cost-Effective Consumer Friendly in Reducing Hospital Care) multicenter, randomized trial.Journal of the American College of Cardiology,60(14), 1239-1248. Yancy, C. W., Jessup, M., Bozkurt, B., Butler, J., Casey, D. E., Drazner, M. H., ... Johnson, M. R. (2013). 2013 ACCF/AHA guideline for the management of heart failure: executive summary: a report of the American College of Cardiology Foundation/American Heart Association Task Force on practice guidelines.Journal of the American College of Cardiology,62(16), 1495-1539.

Tuesday, December 3, 2019

Security Planning and Assessment Emerging Technologies in Physical Security

Running head: security â€Å" Security Planning and Assessment: Emerging Technologies in Physical Security Customer Inserts His/her NameAdvertising We will write a custom term paper sample on Security Planning and Assessment: Emerging Technologies in Physical Security specifically for you for only $16.05 $11/page Learn More Customer Inserts Grade Course Customer Inserts Tutor’s Name 8th June 2011 Introduction Physical security involves the security measures undertaken to restrict people’s access to facilities, buildings, or stored information. The essence of the physical security measures is to protect the facilities or sites from human intrusion, catastrophic damage including floods, earthquake, or fire and malfunctioning of the utility due to power loss. A suitable physical security should comprise of four fundamental aspects, which aims at providing defense to a facility or a site (Kendall, 1999, p. 42). It should primarily deter and de lay human intrusion and in case of intrusions, it should be able to detect the intrusion and respond appropriately often by denying access. The technology used in physical security has undergone significant changes to meet the security needs of the current facilities such as webhosting sites and data centers.Advertising Looking for term paper on social sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More The traditional physical security systems involved identification cards and security guards. , Advanced technologies such as biometric identification that provide positive identification of people entering facilities are however replacing the traditional systems (Branscomb, 1993, p. 115). However, most of these security systems are often costly and may be prone to risk such as security breach by the facility personnel. The security measures should have features that provide security while allowing limited access by the facility personnel . Before investing in the new security measures, it is important to consider the specific security demands of the facility and the cost-effectiveness of implementing such security technologies. Considerations in Physical Security Systems Before implementing a particular security system, facilities consider a variety of factors. The cost of the equipment is fundamental to any physical security design. Often the budget constraints would limit investment in expensive technologies, which offer high confidence. The identification equipments in technologies such as iris and fingerprint recognition are usually expensive and not all facilities can afford them. The most appropriate approach under these circumstances is to employ a wide range of security measures, which offer varied levels of security as per the security requirements of the facility. Another strategy is to combine technologies such as video surveillance and biometric technologies to make the identification more reliable. Comb ining the lower-cost security technologies can be effective.Advertising We will write a custom term paper sample on Security Planning and Assessment: Emerging Technologies in Physical Security specifically for you for only $16.05 $11/page Learn More It involves equipping of the outer perimeters and inner levels of a facility with video surveillance, which have high security needs, with combined technologies such as fingerprint/iris identification and the video surveillance system. Under this strategy, the innermost level has a combined protection technologies from all the outer perimeters making it more secure. Physical security systems should also be user-friendly and acceptable to users. The ease of use of a new security system reduces the user’s frustrations in case of the security measures and lowers the temptations to subvert the security systems. In addition, the security systems should provide reliable identification to reduce subversion. The new security design should also be compatible with the already existing security systems. This reduces loss of information on replacement with new technologies. It also prevents interruption of business ensuring that the replacement of the old security systems does not affect corporate productivity. The security managers should consider the scalability of the new security measures. The new design implementation should be in phases depending on the security needs of the facility, availability of funds and the reliability of the security measures. In addition, assessment is critical for each area that needs protection. The assessment depends on the information or items protected and the personnel who should access the facility. Biometric Technologies Biometric technologies employ automated methods to identify an individual based on his/her biological/physiological and behavioral characteristics. The common biometric modalities integrated in biometric technologies include fingerpri nt recognition, whereby security agents use fingerprint scanners to verify an individual’s identity by searching on a fingerprint database.Advertising Looking for term paper on social sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More Iris recognition is another emerging technology, whereby a picture of an infrared illuminated iris stored in a database helps to identify the individual (Kendall, 1999, p. 45). The other technologies include hand/finger geometry, which measures the hand digits and compares them with the ones stored in biometric database. Gait recognition is also another identification modality. It measures the appearance of a person when walking. The retina recognition identifies the structure of the back of the eye and compares it with existing data in order to identify the person. Facial recognition is another important biometric technology, which employs automated methods to identify faces based on the facial characteristics. Humans have trouble in identifying unfamiliar faces. However, with the new facial recognition technology that uses high-resolution 2D and 3D images, identification of unfamiliar persons is now possible (Ratha, Connell, Bolle, 2001, 614). Other modalities measured by biometr ic technologies include voice recognition, which the physical characteristics of the voice box of an individual influences, dynamic signature, which measures the pressure applied when signing and the keystroke dynamics, which measures an individual’s typing patterns. Facial thermograph technology measures the facial temperature of an individual and compares with the existing data. A biometric security system consists of five main components. The first component is the sensor often located at the entry points to a facility. The sensor functions in a simplified manner by picking patient’s biological account and puts the info digital format. The second component is the algorithm that processes the signal from the sensor and develops a digital template. The third component, the data storage database, stores information used when comparing with new biometric templates. By using the already stored information in the database, a corresponding algorithm equates the new templat e. When the new template has a matching algorithm, the decision process commences and this results into restriction of an individual without a match in the database and access by an authorized person whose data corresponds to database templates. However, before carrying out the biometric techs, it is important to weigh different elements concerning the technology. The location of the facility would determine the security risks of exposure of the facility and warrant the need for a biometric system. The task of the biometric system i.e. identification or verification determines the biometric technology requirement of a facility. The expected number of users and the amount of existing data influences the effectiveness of the biometric implementation process. Biometric technologies, when effectively implemented can offer high-level security to facilities. However, biometric identification technologies often experience two types of failures. The technologies may fail to identify a legit imate user causing frustrations to individuals. In addition, the systems may erroneously recognize an imposter as a legitimate user, which can compromise the security of facilities or sites. Camera Surveillance Stationary cameras can record the registration number plates of vehicles when placed at strategic entry points. Closed Circuit TV (CCTV) cameras can provide an effective monitoring and surveillance of a facility (Black, Ellis, Makris, 2003, p. 25). The CCTV cameras when exposed or hidden can provide monitoring and review of past incidences. They can be remote-controlled or fixed recording exterior or interior events in a facility. This deters them from criminal activities. When implementing camera surveillance, the security manager should consider various factors. The images recorded by the camera should be easily identifiable by use of the other identification techniques such as the biometric technologies. In addition, addressing issues such as the indexing and cataloguing the tapes is important to allow easy retrieval. Among the pertinent issues are procedures of retrieving the tapes as well as the persons mandated to access the tapes. The storage duration of the tapes before destroying them is also important. Previously, most of the video recording involved use of VCR to record images, but the emerging trends in the surveillance system involves digital recording using digital video records (DVRs). The DVRs unlike the VCRs, which recorded images in tapes, record images into hard drives. In addition, DVRs enhance quality of the stored image compared to the analogue VCR tape. The DVR provides fast and efficient reviewing of the video incidences compared to the analogue VCR system. However, the digitization and the closed circuit codes used by the DVRs are nonstandard making integrated monitoring by the security companies difficult. A better format involving the IP video allows centralized recording and monitoring by the security companies. In this way, the IP videos offer an easier way of management of security systems situated in multiple locations (Gilliom, 2001, p. 127). Convergence security technologies allow control of many security functions including IP videos and intrusion detection in a facility. Additionally, only a single infrastructure is required to facilitate security functions hence cost-effective. Latest formats used include the motion JPEG and MPEG4 allow web browser viewing overcoming the heavy bandwidth problems experienced by the IPTV security system (Monahan, 2000, p. 77). The security camera records allow investigators to have a more critical look into the evidence involving a crime, emergencies, and fire outbreaks. These new technologies are efficient in improving the security system of a facility. However, implementation of a camera surveillance system and the maintenance of the whole security system are often costly. Motion Sensors The systems installed in buildings and facilities integrate motion sensors into the alarm system to notify security guards of intrusion. The sensors integrated into alarm systems may be footstep sensors, vibration sensors, touch sensors, and laser beam barriers (Cai, Agrarian, 1996, p. 67). In most cases, the sensors are network enabled, allowing monitoring from a central management system. Motion sensors integrate other devices that alert the user of any movement within a particular area. The motion sensors are important components of business or home security systems. Motion sensors are of three types; the infrared sensors, which use body heat to detect the presence of a person, the microwave sensors that uses microwave pulses to detect a moving object and the ultrasonic motion sensors, which uses pulses to detect the presence of a moving object. A standard security system in a residential or commercial place involves a motion detector, an interior siren, and security locks. The interior siren acts as a deterrent to intrusion by notifying the owner whe n an intruder is present. The position of the motion detectors is often strategic, especially at common entry points to homes or commercial buildings. For the motion sensors to work, the security system has to be active. However, arming the security system at night would trigger the alarm by even the residents or workers moving around the area. On the other hand, disabling the security system when the owner is present only makes the residence vulnerable. Motion sensors are expensive to implement and the security system consisting of motion sensors alone cannot be reliable. Motion sensors need in-built alarm systems to deter security breaches. Motion Tracking Cameras Motion tracking cameras involve using a system of cameras to track the image of a person tracked in a large area over a specific duration. A moving camera with a high degree of rotation, with a high coverage area, is more effective in tracking individuals. In most security systems, multiple fixed cameras placed at strate gic locations track motion of individuals (Lyon, 2007, p. 56). The motion tracking cameras have motion detectors that detect movement and follow it. Once the tracking camera has detected motion, it locks into the particular object and even zooms in the object closely for a better view. The camera can follow the movement of the object within its coverage area. If the there is a tracking connected to a recording device, a video of the movement of the object can be obtained. In motion tracking, one camera automatically transfers the track object to another camera, which allows for effective tracking of the object. The motion tracking assumes that given time, the tracked object will follow similar routes as the inter camera routes. Since the motion tracking requires the use of a system of cameras, it requires a centralized management system, which is expensive to establish and manage. Radio Frequency Identification The radio frequency identification (RFID) describes an automatic securit y system that uses radio waves to convey the identity. The RFID has an antenna that gives out radio signals that detects the tag and reads the data on it allowing tracking of tagged objects. An RFID system allows transmission of data from tag to the RFID reader that reads and processes the information (Gilliom, 2001, p. 129). The data transmitted by the RFID provides information about location or identity of an object or person. They are important in tracking and identification of moving objects. The RFID tag has an integrated microchip read by a device called the reader. The reader transmits the information in form of radio waves to a computer system, which processes the information to identify or locate the object or person. The RFID technology has currently enhanced control access to office buildings, which employed low frequency RFID tags. The RFID technology is convenient compared to the other identification measures, as it requires the employee to hold up the entry badge to ga in access. In addition, there is less wear and tear of the tag as there is no exposure of the card to the reader and therefore less maintenance costs. Conclusion As the number of webhosting sites and data management centers increase, the physical security needs continue to increase. Human intrusion into these sites can cause substantial damage through software attack when the computers are not password protected. Mistakes from the personnel can also affect the operations as it can cause the disabling of essential equipment. The emerging technologies offer restricted access by allowing essential personnel to the webhosting sites and the data centers. Implementation of the evolving technologies is often expensive. When implementing these security measures, the security needs, the cost effectiveness and the potential of the technology to offer a broad range of solutions and need consideration. Through an assessment of the emerging technologies, realization of a realistic balance betwee n protection and cost is possible. Reference List Black, J., Ellis, T., Makris, D. (2003). Wide Area Surveillance with a Multi-Camera Network. Intelligent Distributed Surveillance Systems, 21, 25-28. Branscomb, L. (1993). Empowering technology: Implementing a U.S. strategy. Cambridge, Mass: MIT Press. Cai, Q., Agrarian, J. (1996) Tracking Human Motion using Multiple Cameras.  International Conference on Pattern Recognition, 4, 67-69. Gilliom, J. (2001). Overseers of the Poor: Surveillance, Resistance, and the Limits of  Privacy. New York: University Of Chicago Press. Kendall, K. (1999). Emerging information technologies: Improving decisions,  cooperation and infrastructure. Calif: Sage Publications. Lyon, D. (2007) Surveillance Studies: An Overview. Cambridge: Polity Press. Monahan, T. (2000). Surveillance and Security: Technological Politics and Power in  Everyday Life New York: Routledge. Ratha, N., Connell, J., Bolle, R. (2001). Enhancing security and privacy in biomet rics-based authentication systems. IBM systems Journal, 40(6), 614-616. This term paper on Security Planning and Assessment: Emerging Technologies in Physical Security was written and submitted by user Zeke Beasley to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.