files.transtutors.com€¦  · web viewthis article describes the fundamental notion of security...

62
Security Management of Commercial Building 1

Upload: others

Post on 04-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

1

Page 2: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Table of ContentsExecutive summary (abstract)...............................................................................41. Introduction.....................................................................................................4

1.1 Problem statement....................................................................................51.2 Significance of atomization.......................................................................6

1.2.1 Pervasive and Ubiquitous Computing.................................................62. Literature Review............................................................................................63. Challenges and Further Directions (gap).......................................................164. Functional and management aspects............................................................17

4.2.1 Safety...............................................................................................171.3 Compliance requirements.......................................................................18

1.3.1 Security.............................................................................................181.3.23.1 Human Based Security Strategy....................................................22

1.4 4.2 Technology Based Security Strategy.................................................224.2.1 Application of Security Robots..............................................................224.2.2 Application of Security Access Control Systems...................................234.2.3 Application of CCTV’s...........................................................................244.2.4 Application of Sensor Technology in Security.......................................244.2.5 Automated Lighting and Power System................................................26

4.3 Security Management Using Integrated Techniques..................................261.5 Services..................................................................................................26

1.5.1 Future security systems:...................................................................271.5.2 Functionality.....................................................................................30

5. 5.0 Methodology............................................................................................334.1 Research Design.........................................................................................33

6. 6.0 Data Collection and Analysis...................................................................356.1 Cost Reduction Techniques for Security Measures.....................................38

7. 7.0 Outcomes and Limitations.......................................................................408. 8.0 Timelines and Resource Allocation..........................................................409. Discussion and conclusions...........................................................................4110. Recommendations.....................................................................................42

10.2.1 Future work..........................................................................................4211. Schedule of activities.................................................................................4312. Bibliography...............................................................................................44

2

Page 3: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Executive summary (abstract)

3

Page 4: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

This article describes the fundamental notion of Security of a commercial building. Enterprise is always prioritized to protect the people and the assets within the setup and the elements of the management of commercial buildings. It examines the recent developments in associated techniques and explains the difficulties of owners of commercial buildings to apply different security management strategies to provide maximum level of security possible. The security management strategies adopted by commercial enterprises can broadly be classified into three main categories namely; human based security management system, technology-based and integrated security management. It is thought that the growth trend of functional and leadership atomization is significantly affected by IT and communication networks advancing and flourishing. The building automation and control scheme requires to be developed and applied efficiently to accomplish intelligent facility management and improve general building performance, considering appropriate technologies, real project requirements and imaginations. The choice of a security management system is determined mostly by the cost associated with its adoption and its response time towards a security threat. However, other factors such as size of the commercial setup, the level of security required, and the location of the building always should also be considered while selecting a security management strategy. To incorporate expertise from different fields more efficiently into practice, it is also essential to have efficient system specification and proper education. This article will also look at economic feasibility, efficiency, and concentrate on comparing standard and fully automated systems. But most importantly is “The Internet of Things” which is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

Keywords: Security management, management strategies, cost management systems, economic feasibility, automation systems commercial building management aspects, IOT.

1. IntroductionWith the advent of growing technology, or the rise in globalisation, the need to come term with the growing technology is beneficial and hence, this report is an acknowledgement of that. Security is always a key concern in any commercial setup. When appropriate security measures the safety of the people and the assets house within a commercial building is always guaranteed (Loosemore,2012). Owners of commercial setups employ different methods to ensure that security within their facilities is maximum. The purpose of the paper is to present different security strategies that commercial entities employ to protect people, infrastructure and assets. Moreover, the paper analyses different strategies of security management using primary and secondary data to determine under what circumstances are different security management strategies effective and efficient.

1.1 Problem statementThere is not much deliberation on the day-to-day risks facing security guards. The primary task of a security guard is to deter crime. Security Guard robots could be used to help keep Security Guards safe using risk-free surveillance and patrolling areas. Security Guard robots can benefit security companies Just like drones in the military, robot Security Guards can offer surveillance photos and video without any threat, harm or injury to a human Security Guard. Robot security guards can patrol without breaks on an ongoing basis and can help a

4

Page 5: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

security guard to cover more ground. A security guard's presence, especially an armed guard, can spur violence and rebellion. A robot security guard's short-term and long-term cost is much lower than a human's wage. Which in any case robots are far more efficiency in both financial feasibility and Consciousness cannot be created in a physical machine (robots) - whereas humans’ function via their emotions.

An automated building needs a broad spectrum of requirements that must be fulfilled, i.e., providing comfort, assistance, safety and security to users; energy efficient operation; and flexibility in operation and maintenance (Dietmar Bruckner, 2012). The security managemnt process would cover many aspects for commercial buildings, including the following functions:

o Security and safetyo LOT- Internet of thingso Access control.

1.1.1 Significance of Security Wang, et al. (Wang, 2007) highlighted two major challenges in Smart Building (IB) integration research: (a) how to overcome incompatibilities and limited opportunities for BACS integration among different vendor products, and (b) how to integrate BACS with the Internet and business applications. Three key aspects of future developments of BACS and their practical design considerations are described below to respond to these challenges. Future directions and implementation of BACS are believed to be dictated by appropriate technologies, real project requirements and imaginations

1.1.2 Pervasive and Ubiquitous Computing"Pervasive and omnipresent computing" is about moving beyond the traditional model of desktop computing into embedding and integrating computing into everyday objects and everyday activities so that intelligence can be integrated into the things we already use (Dillon, Februray 2006). The vision is that the virtual (computing) space will be integrated seamlessly with our physical environment, so that we as individuals will cease to notice computing artifacts. Two examples of its concepts are sensor webs and microelectromechanical systems (MEMS). Supporters of this idea believe that embedding computation into the environment and everyday objects would allow people to interact more naturally and casually with information-processing devices than they do at present, and in ways that suit any location or context in which they are.The future approach to computing is revolutionary (Sinclair, May, 2001) and innovative (Doherty, 2002). Imagine that building materials and components can eventually become "smart" themselves, with the ability to measure temperature and light level for environmental control purposes such as wall paint and ductwork itself. Future buildings could also be aware of the tenants and their actions, taking appropriate comfort and safety measures, possibly using an agent-based model. In pipework’s and light fittings, chips could be embedded to monitor fire hazard, health hazard and safety.

5

Page 6: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Some omnipresent devices, such as palm-tops, personal digital assistants (PDAs), wireless sensors, wireless monitoring systems, radio frequency identification (RFID) and global positioning system (GPS), have already been used in practice. It will offer tremendous opportunities to improve efficiency, productivity, safety, and reliability when applied to BACS and related fields. On the other hand, with technical, social and ethical implications, they may also raise some conflicting issues. Software infrastructure, battery life, mobility, data security, privacy issues are likely to ariseEffective implementation of automated facility management technology requires culture and process change (Keller, 2005). In most of the successful projects, technology is treated as a catalyst and a tool for process improvement. Knowledge and skills from various disciplines are needed to understand the technology trends and manage the development process. There are no universal rules for selecting appropriate technologies and guaranteeing a successful project. However, the practical experience in BACS projects around the world shows that the knowledge from different disciplines can be integrated more efficiently in practice, if effective system specification and proper professional education are established.

2. Literature ReviewSmart Building automation and security systems play a central role in achieving these goals, since they are today intelligent systems capable of complex communication and control tasks. Novel research is required that includes the whole life cycle of a building, for example, automated design and commissioning. During operation novel sensors and actuators are needed together with the necessary intelligence on all levels of building automation to successfully process the information. Communication is partly becoming wireless, especially in refurbishment. The increasing system complexity in buildings requires advanced data models, better building controls and approaches to complex system modelling inspired by other disciplines.

6

Page 7: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Figure 1: building automation and control system (Sources (Anon., 2019)).

Integrated Intelligent Buildings (IB) technologies have become a major factor in the design and construction of commercial buildings over the past two centuries. There is also a trend towards retrofitting current structures in growing numbers, where there are favourable price returns for stakeholders. For instance, an embedded IB was built by the Empire State building to reduce power consumption by 40% (Schneider, 2010). IB's are mainly concerned with generating the operational efficiency and effectiveness of the various and disparate structures that constitute a contemporary business construction. These systems may include standard and emergency lighting, safety systems for fire and life, heating, ventilation and air conditioning Intercommunication and emergency warning, elevators and communications. The list of embedded construction parts, including all safety systems, is comprehensive and increasing.Modern IB's have been widely accepted on the commercial property marketplace and are generally described as ' computer-based building automation control systems predominate in most business and industrial buildings, lowering energy expenses while enhancing system efficiency, operability and reliability' (Langston, (2002).). However, IB's can also be known by various names including building management system, smart building, building automation system, high-performance building, and energy-efficient building.

7

Page 8: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Figure 2: Intelligent buildings management (Sources (Anon., 2019)).

The core component of the automated buildings relies on the effective communication. The automated buildings, we see now a days is armoured with a range of connectivity protocols including wireless, wired, and cellular. The presence of various networking protocols such as Bluetooth Low Energy (BLE), Wi-Fi, and others renders it critical to employ a provider that has a robust, reliable and secure network (Sullivan, 2018). (Sinclair, May, 2001) identified 11 revolutionary automation trends in large buildings and as the first point he put the World Wide Web. The Web influences every other industry in the world and affects many aspects of our daily lives. The Web can act as a catalyst to accelerate the process of system integration and standardization, as technologies converge on the Web for all businesses and exploit the market potential it represents (McGowan, 2001). The capability of the Web interface makes data building available to everyone in the organization and this function will allow a host of advances in management. Control based on real-time data from anywhere on the Web is exciting, with creativity being the only limitation (McGowan, 2001). (Hartman, 2001)believed that an Integrated Network of Facilities (IFN) would generate many benefits for owners, managers and operators of buildings. It will also enable effective management of the entire building and multiple buildings by remote operation & maintenance (O&M). In principle, today's smart building not only features automation and control systems but is also capable of generating and sharing data among systems to enhance the efficiency and efficiency of the entire facility. In a study report, (CABA, 2002) defines a smart building as ' a building and-its infrastructure that provides a flexible, efficient, comfortable and secure environment for owners, operators and occupants using integrated technological building systems, communications and controls. ' In fact, under the influence of various social and

8

Page 9: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

economic factors, the concepts and expectations of people on smart building and BACS are changing.

Figure 3 Control, Measuring, & Automation Systems: Off-grid & Sustainable Living (Sources (Anon.,2019)).

In Smart Building (IB) (Wang, 2007) highlighted two major challenges:a) how to overcome incompatibilities and limited opportunities for BACS

integration between various vendor products, and b) how to integrate BACS with the Internet and business applications. To

meet these challenges, three key aspects of BACS ' future developments and their practical design considerations are described below. Appropriate technologies, real project requirements and imaginations are supposed to dictate future directions and implementation of BACS.

Wireless technology can be a cost-effective solution for BACS and can offer many conveniences (Edler, 2006). For example, building operators and maintenance staff can track construction operations wherever they are with wireless mobility. Mobile phones are well established today, enabling many other forms of mobile communications. This technology has value for applications that are built-in. Mobile technologies can deliver substantial efficiencies for occupants / tenants and operators. As mobile devices are changing rapidly, these evolving concepts will lead to applications that are not yet on the drawing board for f-building automation and control system (BACS).

9

Page 10: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Figure 4: Building Automation and Control System (BACS) (Sources (Anon., 2019)).

A ubiquitous and reliable communications infrastructure is needed to effectively integrate these systems and exchange information (CABA, 2002) Obviously, integration is much easier when joining systems speak the same language. Unified presentation, for example, is achieved in this way without any additional engineering effort, potentially reducing investment costs. Other advantages of integration of systems include sharing information, space, infrastructure and operating staff across various building systems. For example, the status and control information of all available systems will be recognized by a single operator interface. BACS' scope has expanded over the past decades to include information from all types of building systems, moving towards the goal of "intelligent buildings," a market buzzword (Clements-Croome, 2004. ).The design and management of SBE generally focus on two aspects: service and sensing. The service refers to that provided by SBE to support users in their daily lives. The authors in (Van der Meer, December 2003.) discuss the service life cycle and design principles for a management framework to effectively manage autonomous and adaptive services in smart spaces. In (Umakoshi, 18–21 July2011.), a smart shadow system was proposed to provide home users with real-world services, defined as services that affect the real world by changing the user’s environmental factors, such as air conditioning and lighting, and to dynamically detect and resolve service conflicts.Theoretically, benefits will be maximized in terms of both life-cycle cost and functionality as more systems are combined (Kastner, June 2005). This requires the combination of expertise from various fields. Due to the high demands on their reliability, the integration of fire alarm and security functions is particularly challenging. (Gray, 2006) found that building intelligence discussions now extend far beyond building automation to issues such as security, communication, user friendliness, and monitoring and control of the environment, and focus as much on how facilities use their technology as they possess it.

10

Page 11: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Traditionally, building control has been organized into autonomous subsystems such as lighting and control of HVAC. These formerly independent subsystems are interconnected to provide integrated services as buildings are automated. Subsystem interconnection is enabled by equipping each subsystem with data communication facilities. In fact, ASHRAE expanded its coverage of building systems to include access control, lighting, life-safety and network security when developing new addenda for the BACnet protocol (Turner, 2006). The only disadvantage/ shortcoming with the automated buildings is the higher consumption of energy. Recent researches have addressed the issues and the concept of zero energy/ off-grid buildings are being developed (A.J. Marszala,2011). Some omnipresent devices have already been used in practice, such as palm tops, personal digital assistants (PDAs), wireless sensors, wireless monitoring systems, radio frequency identification (RFID) and global positioning system (GPS). It will offer tremendous opportunities when applied to BACS and related fields to improve efficiency, productivity, safety and reliability. On the other hand, they can also raise some conflicting issues with technical, social and ethical implications. Software infrastructure, battery life, mobility, data security and privacy.

Figure 5: Singapore’s Construction ITM aims to use cloud and digital technology to integrate stakeholders in the building life cycle (Sources (Anon., 2019)).

Based on physical or behavioural characteristics, the science of acknowledging a person is defined as biometrics. It's starting to gain recognition as a lawful way to determine an individual's identity. (Al, (2006)) supplied and debated a biometric overview that required to be resolved to make biometric technology an effective tool for providing information security. The overview's primary input

11

Page 12: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

included apps where the biometric scan can address real-world applications problems related to secure data and difficulties encountered by a biometric scheme. Despite these problems, biometric technology emerges as a guaranteed technology Alternative to traditional systems such as passwords, intelligent cards, etc. (Al, (2009))provided a biometric fingerprint based on self-authentication and deniable authentication systems that allowed the receiver to identify the origin of the text but not to prove the identity of the sender to a third party. Two-level securities were given using both his / her own biometric and passwords. Security analysis showed that, in the safety of the previous schemes, the systems overcome the pitfalls. Growth in electronic transactions has led to increased demand for quick and precise identification and authentication of users. For identification and safety clearances, access codes for structures, bank accounts and computer systems often use personal identification numbers (PIN's). It is not entirely reliable to use the conventional identification method based on possession of ID cards or exclusive information such as a social security number or password. Biometric fingerprint authentication system for automated teller machine (ATM) banking systems. In this system, to enhance the level of safety, a biometric fingerprint method is combined with the ATM for person authentication. The technique of unobtrusive and quick authentication that used only frontal electrodes about another one on the ear lobe. The system uses multi-stage fusion architecture to improve system efficiency. Authentication is the essence of the safe scheme, but most instances are based on approaches to identity recognition. The biometric system will provide the alternative to ensure that only a valid customer and no one else can access rendering facilities. This biometric scheme identifies the user based on features of physiology or behaviour.Explored haptics-related issues as a mechanism to extract behavioural characteristics that characterized a scheme of biometric identification. One of the latest biometric methods is today studied vein pattern recognition.

(Lee, (2012) ) provided a palm vein pattern that is one of the authentication approaches to accurate and robust private identification. In this job, Lee regarded the palm vein as a textured piece and applied methods for palm vein authentication based on texture. 2D Gabor filter supplied optimized resolution in both the spatial and frequency domain and was therefore the foundation for palm vein recognition to extract local characteristics. This technique acquired high precision and velocity for real-time palm vein recognition was fast enough for the technique. The experimental findings showed the strategy to palm vein recognition was efficient and viable.

12

Page 13: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Figure 6: Why Do Biometrics Improve Security (Sources (Anon., 2019)

In 2013, four technicians - Jaydev P. Desai, Gregory Dudek, Oussama Khatib, and Vijay Kumar- edited a book called Experimental Robotics, a collection of essays compiled from the 13th International Symposium on Experimental Robotics trials. The primary focus of many of these parts is the issue of human and robotic interaction and collaboration, and it is often argued that the efficacy and safety of this collaboration may rely on technical alternatives such as the use of artificial pneumatic muscles (Daerden, 2015). In addition, there are benefits and disadvantages for each technical device. One can achieve efficiency, for instance, but lose safety.Robots- physical and virtual systems involved in embodied behaviour- are now being used in organisations to substitute and complement people (You and Robert, 2018a). This needs robots to communicate with staff and clients of an organization. To facilitate these interactions more effectively, many scientists have attempted to define factors that encourage human-robotic interactions. In terms of the results connected with these interactions, interactions between humans and robots can be described (You and Robert 2017). Such results include robot recognition, confidence, or emotional attachment. In understanding these relationships, personality is a crucial factor (Gockley, 2006.). (Goetz,2002), (Syrdal, 2007) ; Personality includes the behaviours, cognitions and feelings of someone obtained from biological as well as social variables (Hall,1957).

13

Page 14: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Figure 7: Robots in the workplace (Sources (Anon., 2019)).

(Oxford University, 2013) conducted a study on the future of employment predicted that security guards have an 84 percent chance of their jobs being automated over the next 20 years. That possibility and the evolution of robotics technology- has resulted to a fresh crop of businesses such as Cobalt and Knightscope engineering and leasing out safety robots: person-sized devices that roll around corporate headquarters, fitted with heat sensors, facial detection and worker badge scanners. The robots roam independently in search of indications of trouble, like an unrecognized individual entering the building late at night. But the bots are also used for detection of safety and maintenance, noticing anomalies such as unusual heat. At Slack, the firm regularly runs a physical readiness check on its robots in conference rooms - visually scanning for items like the presence of chairs and turning on the video conference screens. The bots then send the facilities team a weekly report of any issues they encounter.Travis Deyle, Cobalt's co-founder and CEO, says the machines are best suited for picking up signals that could reveal a bigger issue, such as having an employee or visitor somewhere they shouldn't be. But the bots are also used for detection of safety and maintenance, noticing anomalies such as unusual heat. At Slack, the firm regularly runs a physical readiness check on its robots in conference rooms — visually scanning for items like the presence of chairs and turning on

14

Figure 9: How Robots Can Help You “Work Smarter” (Sources (Anon., 2019)).

Figure 8: Living with Robots (Sources (Anon., 2019)).

Page 15: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

the video conference screens. The bots then send the facilities team a weekly report of any issues they encounter.

Acts of insecurity such as terrorism, vandalism, unwarranted intrusions and theft always pose a threat to the development and sustainability of enterprises, organizations and businesses situated in a commercial building setting (Craighead, 2009). As a result, Security is always prioritized in any commercial infrastructure to limit the possibility of the above acts. However, commercial building owners always find it challenging to tackle the security threats due to the diversity related to handling the security issues (Rihar, 2019).Commercial buildings employ different strategies of security management. Some employ one of the many available strategies while others integrate different strategies to achieve the highest level of security possible. Some of security management strategies employed by commercial buildings can be categorized into three classes namely: Human-based strategies, technology-based strategies, and integrated security management systems.

1.2 Research questionsResearch questions Based on the literature review that I have conducted in chapter 3 about the topic, security issues in IoT-based in commercial building, I see that more research must be performed on highlighting possible security threats that may harm people who live in building and then suggest possible solutions to them. To research this gap, the following research questions are defined: 1. What are the emerging security threats from IoT-based Smart commercial buildings? 2. What are the consequences of these threats (Impacts)? 3. Are there suitable countermeasures to propose? 4. What to recommend the users? By identifying threats and the impacts we can derive risks because risk consists of both threats and the impacts. It is very important to do research on security issues in IoT-based Smart buildings for better understanding and avoiding serious consequences. Without security risk assessment or highlighting threats, it is impossible to provide assurance for the system and justify security measures taken. Further, this new technology, IoT, in order to get broad acceptance among users, security must be better, and trust is essential to implement this technology in their homes because if consumers lack confidence in the technology, they will not use it. Thus, security is one of the areas that must be put into the highest priority when implementing the smart home technology.

3. Aim(s) and scope of the projectSmart buildings integrate technology and the Internet of things (IoT) to provide solutions to the age-old issues of overspend and inefficiency in building

15

Page 16: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

construction and use. Within a smart building all the systems are connected, from air conditioning to security and lighting.With the use of sensors, such as occupancy and people counters, actionable data about how the buildings are really used can be gathered to enable it to perform better. These are five of the key benefits of smart buildings:

1. Reduce energy consumption: Figures vary depending on systems and buildings, but you could reduce the energy consumption in a building by around 5% -35% with the use of smart technology. This translates into significant financial savings, as well as a much more efficient and effective approach to meeting green goals.

2. Improve building efficiency: Unobtrusive sensors provide anonymous data about how the building is being used. This enables smart systems to adjust about where heat and light are required, for example, and on the use of infrastructure such as air conditioning. Sensors also help to identify overused and underused areas in the building, providing the opportunity to optimise space utilisation, which in turn can facilitate growth.

3. Predictive maintenance: Maintenance costs can be substantial when handled manually. However, without maintenance building equipment requires far more frequent replacement, which takes chunks out of budgets. Smart buildings enable simpler predictive maintenance. Sensors can detect building performance and activate maintenance procedures before an alert is triggered. When you have a more insightful overview of how the building is operating – and used - it’s far easier to implement maintenance at the right time.

4. Increase productivity: Smart buildings have been specifically designed to deliver a more comfortable experience for their occupants. They can raise standards and ensure that health and safety considerations are being met, as well as ensure that this is implemented in a cost efficient way.

5. Smart buildings make people more productive by continually monitoring building use and adjust systems to ensure that occupants have the facilities that they need.

6. Better use of resources: The data generated by a smart building provides key insights that can be fed into planning and make use of resources more efficient. There removes the need to rely on guesswork or anecdotal data as this can be informed by real-time, genuine intelligence.

16

Page 17: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Figure 10: 5 Key Benefits of Smart Buildings (source: (Bell, 2019))

1.2.1 Smart Buildings That Cost LessYour biggest dilemma involves managing decreasing budgets against increasing requirements. Intelligent buildings help to create and maintain a safer and more secure, productive and comfortable environment — as cost-effectively as possible with holistic approach to building, security and life safety management systems (BuildingSolutions, 2018)

1.2.2 Efficiency and management Transforming the landscape of facilities’ efficiency and management, smart buildings deliver useful, integrated and smart services that make occupants productive at the lowest cost and environmental impact over the building life cycle. Fundamentally, technology enables the convergence of siloed systems and processes into an integrated workplace management and operations framework. In simple terms, smart buildings are buildings that: Are equipped with smart networked sensors, meters, materials and devicesUse automated processes to control, monitor and manage building assets and services

17

Page 18: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Are linked with an energy and sustainability management program. Are connected to a network of intelligent systems, infrastructure and technology platforms This new breed of buildings leverages information technology for real time data exchange and system interoperability, empowering occupants with visibility and actionable insights through unified information generated by a platform of Internet of Things (IoT), Artificial Intelligence (AI), machine learning and analytics technologies.

Figure 11: Things (IoT), Artificial Intelligence (AI), machine learning and analytics technologies ( source: (See, 2018)).

4. Functional and management aspects1.2.3 Safety

These systems protect people, equipment, and building assets by detecting fire, smoke, and heat and activating equipment in response. The key features of these systems are (Anon., 2019):Systems will either activate audible alarms or signals or send pre-recorded messages directing occupants to smoke-free areas or escape routes. Highly sophisticated systems can control individual or select audible device groups. Most systems are also equipped for live announcements with microphones. Also, a good system will inform the operator of the alarm's exact location from the console. In order of priority, the screen should display alarms.To open exhaust dampers and close supply and return-air dampers, the fire management system can be programmed in each fire zone. At the same time, it can open fresh air dampers in adjacent areas. To accommodate specific procedures dictated by local building codes, the program should be flexible enough. When a fire alarm is activated, stairwells, elevator shafts and areas around the fire should be positively pressured by the system to prevent smoke from entering these spaces. The program can also bring fresh air to the refugee areas of the occupants.To be able to close elevator doors and return cars to the lobby for firefighters use, the building automation system should be interconnected with elevator controls. In the upper-floor elevator lobbies, smoke detectors can signal

18

Page 19: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

elevators not to stop there. To contain smoke and flame, the system should automatically close fire doors and unlock building exits for occupants and firefighters.Advertiser panels, most often located in the front lobby, provide start / stop control over a combination of fire, security, and HVAC points. During a fire, the main console should allow for easy interpretation of alarm data by building personnel and firefighters and provide enough control over critical construction systems. It should provide both on the terminal screen and in hard copy information about the source and spread of the fire. A hard copy provides a permanent record of each alarm sensed by the system for use by firefighters, building officials, and insurance carriers for the time, date, and description. Communication between floors or remote building areas for efficient firefighting may be necessary in large buildings. Comprehensive fire management systems provide two-way station-to-floor communication, mechanical equipment rooms, elevator machine rooms, and air handling rooms. Some systems have intelligent field units that allow local operation of critical fire management functions. This capability provides the facility with reliable, uninterrupted fire protection even when major systems are disabled (Anon., 2019).Building automation starts with our innovative building management, power management systems and small building control products that enable smart buildings that inspire productivity for the occupants and deliver optimum energy and operating efficiency.

1.2.4 Compliance requirements1.2.5 Security

Facial recognition is a biometric software category that mathematically maps the facial characteristics of an individual and stores the data as a faceprint. The software uses deep learning algorithms to compare a live capture or digital image to the stored faceprint to verify an individual's identity. (Rouse, 2018).

19

Figure 12: An example of Building automation behind the scene (Sources: (Anon.,n.d.))

Page 20: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Over the past few years, security building has improved significantly, evolving to cope with the threats of terrorism, fraud, theft and unauthorized entry. It is an area ripe for innovation, as access to a building is often managed through security passes, with security guards responsible for monitoring the process and getting in when they see something suspicious. Managing such a system is not an easy job and catching everything is impossible. For example, in a large building, how does a security guard know who and who is not supposed to be there? What about former employees who kept their old passes through the door? Will any security guard know how to look for them? Even the best-trained and vigilant security staff will be faced with breaks or distracted from other issues. This leaves the possibility of unauthorized access to the building. Security checks can, of course, be stepped up. But the danger here is that it will become a laborious process that annoys employees while slowing down entry and exit flow. Facial recognition offers a way to process and track visitors faster and more efficiently. For example, the Smart Gate airport security system in Australia uses facial recognition to “handle as many as 150 passengers an hour – that’s one person being processed through immigration every 24 seconds.”. (Ded, 2018).

1.2.6 Pervasive and Ubiquitous Computing:"Pervasive and omnipresent computing" is about moving beyond the traditional model of desktop computing into embedding and integrating computing into everyday objects and everyday activities to integrate intelligence into the things we already use (Dillon, Februray 2006) The vision is to seamlessly integrate the virtual (computing) space with our physical environment so that we as

individuals cease to notice computing artefact. Sensor webs and microelectromechanical systems (MEMS) are two examples of their concepts. Supporters of this idea believe that embedding computation into the environment and everyday objects would allow people to interact with information-processing devices more naturally and casually than they currently do, and in ways that suit any location or context in which they are.1.2.6.1 Access controlFor facial recognition, the most obvious use is that it can act as the future security pass. While it is possible to stolen, borrow or copy security passes, a person cannot change their face. By swapping security passes for facial recognition technology and using a whitelist system, a building can only be accessed by those individuals registered for entry. Better yet, you can add granular control to restrict access to key floors or rooms by people. Recognition of the face is faster and easier than also using a card. Employees do not need to pull out a security identification (or hunt for one in their bag) and are ready to be scanned immediately. This speeds up a building's entry and ensures that this can only be done by those authorized. Using facial recognition also gives you the

20

Page 21: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

ability to maintain a blacklist, a database of people banned from a building. By using automated monitoring, security cameras can identify those banned from access, warning security staff immediately. This will help prevent someone from sneaking into the building, coming in via a back entrance, or following someone through security gates (Anon., 2018).Who is at any point inside your building? While visitors can be signed in, and employees may have to tag in with a security card, not everybody tap or sign out. This can make it difficult to know at any time who is exactly in the building, which not only can pose a security risk, but can also pose a health and safety issue. For instance, in the case of a fire alarm, you need to know when the building was cleared and whether there is anyone left inside. With facial recognition, it is possible to automatically track who enters and who leaves a building and show where they are located depending on camera placement.1.2.6.2 PhysiognomyPhysiognomy is a pseudoscience based on associating personal characteristics and traits with physical differences and especially with elements of people's faces. The word is derived from the ancient Greek word for nature, physics, and the one for judge, gnomon (Rouse, 2018).1.2.6.3 BiometricFor body measurements and calculations, biometrics is the technical term. It refers to human characteristics related metrics. Authentication of biometrics is used as a form of identification and access control in computer science. It is also used in groups that are under surveillance to identify individuals.In corporate and public security systems, consumer electronics, and point-of-sale applications, authentication by biometric verification is becoming increasingly common. The driving force behind biometric verification was convenience, as there are no passwords to remember or security tokens to carry. Some biometric methods can operate, such as measuring the gait of a person with no direct contact with the person being authenticated. Components of biometric devices include (Rouse, 2017):

o A reader or scanning device to record the biometric factor being authenticated

o Software to convert the scanned biometric data into a standardized digital format and to compare match points of the observed data with stored data

o A database to securely store biometric data for comparison Biometric data can be stored in a centralized database, although modern biometric implementations often rely instead on collecting biometric data locally and then hashing it cryptographically so that authentication or identification can be achieved without direct access to biometric data itself. Factor stability may also be important for factor acceptance. Over a lifetime, fingerprints do not change, while facial appearance can drastically change with age, disease, or other factors. The biggest issue of biometrics privacy is that physical attributes such as fingerprints and patterns of retinal blood vessels are generally static and cannot be modified. This contrasts with nonbiometric factors such as passwords (something you know) and tokens (something you have), which can be replaced if breached or otherwise compromised, including more than 20 million people

21

Page 22: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

whose fingerprints have been compromised in the U.S. in 2014. Infringement of personal management office data. The increasing ubiquity of high-quality cameras, microphones and fingerprint readers in many of today's mobile devices means that biometrics will continue to become a more common method for user authentication, especially as Fast ID Online (FIDO) has set new standards for biometric authentication that support biometric authentication with two-factor factors. While the quality of biometric readers continues to improve, they can still produce false negatives -- when an authorized user is not recognized or authenticated -- and false positives -- when an unauthorized user is recognized and authenticated (Rouse, 2017).Biometric vulnerabilities: While high-quality cameras and other sensors help enable the use of biometrics, they can also enable attackers. Because people do not shield their faces, ears, hands, voice or gait, attacks are possible simply by capturing biometric data from people without their consent or knowledge (Rouse,2017).1.2.6.4 Security and privacy issues of biometrics: Biometric identifiers depend on consideration of the uniqueness of the factor. Fingerprints, for example, are generally considered highly unique to everyone. Fingerprint recognition is the first widely used mass market application of a biometric authentication factor, especially as implemented in Apple's iPhone Touch ID- just as fig 1 below shows biometric authentication for smartphones. Other biometric factors, including retina, iris, vein, voice and facial scans, have not been widely adopted so far, partly because there is less confidence in the identification uniqueness or the factors are easier to spoof.

For all types of businesses, access control technology has become vital. Access control is essential as a form of risk management to limit the potential of unauthorized individuals entering your facility. Every business should have an access control risk management plan in place. If the access control technology is not used by your location, it is not secure. Furthermore, if your technology is not safe, it will not be effective. Access control can be used in nearly any industry or

22

Figure 14: An example of Building automation behind the scene (Sources: (Rouse,2019))

Page 23: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

setting. It offers additional security, which is becoming increasingly important. This includes the following benefits (Anon., 2016):

o Ensure the security of a building, room or location.o Protect buildings from unauthorised access.o Ensure the security of private information and assets.o Increase the security of the location for employees.

There are three stages to the security of an access control system. If any errors occur during these stages, then the access control system may not be entirely secure. The three stages are: identification, authentication and authorisation.

1. Identification: Identification is the first stage of access control. During this stage, to access the system, the user must provide some form of identification – be it a door, turnstile, locker, gate, or some other type of object. To track usage, the most basic systems use a card or key fob. Others may need a token or key. The use of turnstiles includes this. Biometric readers and keypad entry systems are used to require specific identification of users for additional security. This is used for locations that are safer.

2. Authentication: the system will authenticate the information provided once the identification has been provided. The system will verify that the user is authorized to access the system with user access control. The system checks that the input method is acceptable with a turnstile – such as ensuring that the correct token or card has been used.

3. Authorization: the access control system will then grant or deny the system authorization after authentication the identity or input method. The security of an access control technology depends on the first stage security. The following steps are handled electronically, whereas manual entry is required for the first stage.

The technology of security and access control works together. When these technologies can be misused or abused by people, they become worthless. For this reason, it is essential to test the security of their access controls for businesses and government facilities that use regularly.A building's security is limited by the systems being put in place. The more room is available for human error, the more room is available for a breach of security. Proper access control systems need to be put in place when security is a problem. This is not a slight decision to be taken.

1.2.7 Human Based Security StrategyThis is a strategy that strictly involves the use of human beings to provide the services required in countering security threats. Human beings perform all the activities ranging from basic monitoring and surveillance to dealing directly dealing with a security threat when it occurs (Ungar, 2012). The method is reliable and highly adaptable to any form of security threat than can occur. However, is not economical. The security guards are hired in numbers and spend huge junks of their time performing basic monitoring and surveillance duties and when a major threat occurs, there is always needed to employ external measures to counter the threat resulting to a lot of resource consumed without meeting the required security expectations (Villeneuve, 2019). In Circumstances

23

Page 24: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

where the threat of the security issue is adverse, the use of human beings does not seem to be efficient and effective since they are alleviated from the risk to prevent physical harm or death. As a result, a lot of assets are stolen or destroyed with

1.2.8 Technology Based Security StrategyThese are security management systems that are applied in commercial buildings with an aim of eliminating the need for the use of human beings in security applications. They adopted to minimize the cost, increase the response time and reduce the impacts of security threats onto human beings (Pearson,2011). The most common security management strategy that involve the use technology are:

1.2.9 Application of Security RobotsThis strategy is employed with an aim to completely do away with the human factor in security services. It involves the use well programmed and automated security and surveillance robots or drones that perform the basic monitoring and surveillance activities as well as countering any possible security threat (Brumson, 2011). The robots apply a combination of different technologies to provide top notch surveillance and security services. They are made of sensors, microphones, and cameras which collect security information form the environment in which they are situated. The security information collected is sent to control panel within or outside the robot so that necessary measures such as sending the robot to counter the threat are undertaken (Alami, 2018).

Figure 15: Security Robot

Most commercial buildings have adopted the use of robots as a security measure counter the need of hiring the relatively expensive security guards who use most of their time performing basic monitoring duties and to alleviate the possible risk to human beings in circumstances where the potential threat of the security issue is adverse and could lead to physical harm or even death (Markman, 2018).

24

Page 25: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

1.2.10Application of Security Access Control Systems

Security access control systems are installed in commercial buildings to prevent unwarranted intrusion or interference of property by people without authority. The access control systems are installed on entrance of the commercial building and on individual doors contained within the building. They can also be installed on other sets of infrastructures inhabited within the project such as elevator’s and lifts to ensure only people with permission can use them (Kloppenburg,2018).

Figure 16: Typical Security Access Control Systems

Security in access control systems is facilitated using PIN numbers, passwords, fingerprint biometrics, facial detection, and iris detection (Malathi, 2016). Only individuals whose necessary credential can have access to whatever infrastructure they are installed. Access control security systems provide high levels of security with an easy management system at an affordable price and maximum flexibility. They can be manned by only a single individual and therefore minimize the necessity to hire many guards.

1.2.11Application of Sensor Technology in Security

In the recent years, most commercial buildings have embraced the sensor technology as a means of promoting security. The sensors commonly used are the motion detectors, smoke sensors, fire detectors and the metal detector sensors. The sensors are installed in strategic positions within the building to detect their respective parameters and send the information collected to the control centre so that the necessary actions can be taken either manually or automatically (Nanzer, 2012). The application of sensors is relatively cheap since it reduces the work load that could be performed by human beings. However, they are not entirely reliable since they can fail during operations, during power black outs or may convey information inaccurately.

The table below presents the most commonly used sensors in security provision.

25

Page 26: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Hand Metal Detector: Its hand operated by the security guard.

Automated metal detector: Its controlled remotely.

Smoke and Fire detectors: To detect the presence of smoke or fire within the building

Motion detectors: To detect movements within unauthorized areas of a building.

Figure 17: Sensors Used in Security Systems

26

Page 27: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

1.2.12Security Management Using Integrated Techniques

These are security management strategies that is applied in commercial buildings with an aim of integrating different systems of security management to work as a unit in delivering the required security services. The strategy combines the best characteristics and performances of the different security systems to develop a single security system that is more efficient, effective, highly responsive and capable of providing high level security without comprising on cost and other safety factors (Spang, 2011).The system included in an integrated security management system work as unit during the periods of insecurity. For example, in case of a fire accidents or terrorism activity, the sensors and the robots collect information on the ground and send to the control centre where the security guard or the control devices trigger an action to be undertaken by the people and the other devices on the ground (Reinharz, 2017). The robots are usually sent to fight the security issue in areas where human effort cannot reach. On the other hand, the sensors are triggered to actuate other systems such burglar alarms, valves, taps and door closure systems designed to counter the security issue.The use of integrated system provides high level of security that is reliable and quick to respond when called to action. However, the strategy initial investment and operational cost is high and the it is required that the personnel operating the system be well versed with the correct practices and skills of operation, a factor that can result into utilization of more resources in training of the guard and limitation of its use to a limited group of individuals (Ludwig, 2015).

1.2.13Services When it comes to the Security Industry, the mention of robots from the Security Guard may stir to automation the anxiety of future job losses. Companies like Knightscope and SMP Robotics and Robotic Assistance Devices (RAD) are discovering opportunities to use their creativity and technology knowledge to provide security industry assistance and protection. The robot manufacturers want to send the message that they are here to help the industry and not seek to completely replace human safety.Benefits of Robot Security Guards: There is not much debate on the day-to-day risks facing security guards. The primary task of a security guard is to deter crime. Robots from the Security Guard could be used to help keep Security Guards safe using risk-free areas of surveillance and patrolling.Some other reason to why the Security Guard robots can benefit security companies: (Insurance, 2017)

o Just like drones in the military, robot Security Guards can offer surveillance photos and video without any threat of harm or injury to a human Security Guard.

o Robot Security Guards can continuously patrol without needing breaks and can help a Security Guard cover more ground

o The presence of a Security Guard, especially an armed one, can incite violence and rebellion. This could test a human Security Guard’s own

27

Page 28: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

emotion whereas a robot Security Guard would not be affected by such things.

o The short term and long-term cost of a robot Security Guard are much lower than the wage of a human one. Robot manufacturers can rent their robots to companies for as low prices.

Smart technologies are not just changing our homes; they embrace their numerous industries and disrupt the workplace. Artificial Intelligence (AI) has the potential to improve productivity, efficiency and accuracy across an organization – but is this entirely beneficial? (Marria, 2019) Many fears that the rise of AI will result in the replacement of human workers by machines and robots and view this technological progress as a threat rather than a tool for improving ourselves.

5. Significance of the projectTHE IoT is a suite of technologies and applications that equip devices and locations to generate all kinds of information—and to connect those devices and locations for instant data analysis and, ideally, “smart” action. Conceptually, the IoT implies physical objects being able to utilize the Internet backbone to communicate data about their condition, position, or other attributes.2 (For more information on the technologies that power the IoT, see our primer, Inside the Internet of Things. CRE companies may find it most relevant to understand how various types of sensors can track features such as motion, air pressure, light, temperature, and water flow and then— with the Internet backbone—enable the BMS to autonomously sense, communicate, analyse, and act or react to people or other machines in a nonintrusive manner. With the cost of sensors, data storage, and connectivity all falling, we expect more CRE firms to move forward in adopting IoT applications. A recent Deloitte Centre for Financial Services study suggests that IoT technology What is the IoT? has huge potential in CRE: In fact, sensor deployment in the sector is likely to grow at a compound annual growth rate of 78.8 percent between 2015 and 2020 to nearly 1.3 billion (SurabhiKejriwal, 2018). Using such sensors, the IoT promises to turn any object into a source of information about that object and its environment. This creates both a new way to differentiate products and services and a new source of value that can be managed. Realizing the IoT’s full potential motivates a framework that captures the series and sequence of activities by which organizations create

28

Figure 18: An example of Building automation behind the scene (Sources: (Anon., 2014))

Page 29: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

value from information: The Information Value Loop. In the CRE context, the value created from the information generated by IoT-enabled buildings has the potential to widen the lens on value creation beyond location through a level of efficiency and effectiveness that could distinguish buildings within a marketplace from a desirability and profitability standpoint.

The significance of our project is to cover the aspects below:o Optimized building performance and functionalityo Automated monitoring and control through a single, manageable platform o Maximized energy and operational efficiencyo Better decision-making abilitieso Strategic control of your facility and reduced risko Lower life cycle costso Increased safety and security for greater occupant comforto Improved Return on investment (ROI) over the life span of your building

Processes and optimize building performance.

o Leverage and integrate the individual strengths of separate building systems into one platform for greater control of building, security, energy and life safety systems

o Increase productivity and flexibility while reducing operational, energy and maintenance costso Enable increased efficiency and decision-making capabilities, and gain a better understanding

of your entire facility using a single operator interface

Enhance safety, security and comfort for building occupants Customize the system to meet your facility’s needs, and gain a scalable and flexible platform

to allow for changes over time Support for mobile devices and web browser access for higher productivity and response Reduce risk with clearly defined migration paths, improved functionality and cost reduction

6. Methodology

The following answers the research question by outlining an overview of the different research methodologies and the broad research design, and then justifying the methods and techniques selected. This also includes the conceptual framework that shapes the paper. It provides a detailed explanation of how the research was conducted and the way the data were collected. In addition, there will be details of the main strengths and weaknesses associated with the chosen approach. Research can be defined as "an activity that involves finding out in a more or less systematic way, things you did not know". Methodology can be described as "the philosophical framework within which the research is conducted or the foundation upon which the research is based".

29

Page 30: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

To perform a comparison of the most efficient and effective security strategy that is worth being adopted in commercial set-ups, the research was designed in such a manner that would ensure that appropriate data was collected from the right sample of commercial buildings with the correct tools and within the bound time limits. The section explains the research design and the target population in the research. Building need to examine the energy efficiency of each product and system entering a project, including vertical transportation systems- elevators and escalators. Facility managers under pressure to reduce energy consumption and increase building efficiency find that modernizing and upgrading elevators are one of the most cost-effective solutions. Many of the same technological advances are being applied to escalators that improve energy efficiency in elevators. The result is vertical transport systems that reduce the operating costs of a building and enhance sustainability.

The latest machine-room-less elevators are designed specifically for low-rise buildings. More advanced destination dispatch technology saves energy and allows building owners to

deliver a higher level of personalized elevator service and security. LED lighting in cabs reduces heat loss and increases lifespan. Urea formaldehyde-free elevator panels improve indoor air quality. Regenerative drives transfer unused energy back into the building’s electrical grid for other

uses. Remote monitoring ensures seamless adjustments and repairs and minimizes costly elevator

down time. Variable-speed escalators conserve energy by automatically slowing down during off-peak

usage periods.1.2.14 Research Design

To facilitate the process of data collection the security strategies were divided into three major classes based on the equipment’s and infrastructures that were used. The categories were; Human based security, technology-based Security, and application of security using integrated method. Data will be collected on different commercial building to ascertain the costs of establishment of a security management strategy and the response time of the adopted strategy. The data from the different commercial buildings were compared and averages done to ascertain which strategy was the most effective. The cost determination criterion was broken down into four categories indicating the average cost that different facilities used in installing and running the security strategy. The cost categories were; Initial Investment cost, operational cost, maintenance cost and miscellaneous cost. On the other hand, the response time of a security strategy was examined based on the time the measure adopted took to detect a security threat and the time that was taken to counter the and clear the threat. The classification of the most effective security strategy based on the response time followed the algorithm illustrated below.

30

Page 31: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Figure 6: Flowchart of Research Design (methodology)

From the above response time classification algorithm, a security threat is simulated for each commercial building under observation. The time taken to detect the threat and respond accordingly is collected using stop watches and compared with a bench mark time for classification on whether it’s effective or not. The data collected was filled into two separate tables shown in the next section for further analysis. The result of the analysis provided the most effective method that would provide high level of reliable and efficient security for a commercial building.

Figure 19: Response Time Classification Algorithm

31

Start

Time taken to complete each step in

Minutes

Is the time within the required threshold

Classify as effective

Classify as Not effective

Stop

NoYes

Time taken to detect and Act on a simulated

threat

Page 32: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

1.2.15Research Approach This research aims to understand users’ privacy and security concerns and or apprehensions when it comes to new technologies, the IoT. The research examined users’ perceptions of security and privacy issues of IoT smart devices. The intention of the research is to identify what IoT companies and manufacturers need to implement to assist in a more secure technology and to help future research in the area.

BMS include industry-specific sensors, actuators and controllers, that are expensive, and can only be acquired through specific channels. With the advent of the IoT, sensors (e.g., for presence, humidity or temperature) and basic dedicated controllers (e.g., thermostats like Nest) are available in consumer shops. They are much cheaper than industry-specific devices and far easier to install. In addition, they offer remote management via wireless connections (Wi-Fi or Bluetooth) but, because of their fast time-to-market, they often lack security features5. This situation directly affects the security of smart buildings: a vulnerability to an IoT sensor might let the attacker into a more critical (and far more fragile) network where great damage can be carried out.

1.2.16 Types of Analytics

A state-of-the-art smart building typically will have analytics as part of the software suite along with the IBMS and dashboards. Once data is available in a building, the next step is to analyse the data and then determine how to improve the building performance using that data. This analysis is achieved through dedicated analytics software. Such software will help organize, manage, analyse data collected from various building systems and present them in a clear and concise manner via the dashboard. This provides a good insight into the operational performance of the building. Analytics enables the operations and facilities teams of the building to find patterns and issues that they were not aware of, patterns that were not anticipated, expected or even imagined. Analytics provide results that show how the building operates versus how it was either designed to operate or expected to operate. Examples of benefits include immediate notification of system anomalies for proactive maintenance, building equipment lifecycle extension, reduction in energy consumption, identification of energy savings opportunities, and validation of energy savings. IoT analytics applications can help companies understand the Internet of Things data at their disposal, with an eye toward reducing maintenance costs, avoiding equipment failures and improving business operations. In addition, retailers, restaurant chains and makers of consumer goods can use data from smartphones, wearable technologies and in-home devices to do targeted marketing and promotions -- the business side of the IoT's futuristic world of connected consumer gear.

BMS include industry-specific sensors, actuators and controllers that are expensive, and can only be acquired through specific channels. With the advent of the IoT, sensors (e.g., for presence, humidity or temperature) and basic dedicated controllers (e.g., thermostats like Nest). They are much cheaper than industry-specific devices and far easier to install. In addition, they offer remote management via wireless connections (Wi-Fi or Bluetooth) but, because of their fast time-to-market, they often lack security features. This situation directly

32

Research Design

literature Review: Our comprehensive summary of previous research on a

topic.

Assessment of exististing secuirty

Comparison between all

types secuirty

Investigation Part: The record the issues of the

matter, analyze the evidence, and formulate a

conclusion.

Application: Internet of things (iot)

Data Collection:

Security solutions to

protect critical assets

Page 33: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

affects the security of smart buildings: a vulnerability to an IoT sensor might let the attacker into a more critical (and far more fragile) network where great damage can be carried out.

Figure 20: Smart building security requires a new approach( source: (Costante, 2017)).

In order to be able to answer the research questions stated above, there is a need to choose an appropriate research methodology. The approach is aimed to produce robustness in results, allowing comprehensive risk assessment, focusing mainly on information assets. The approach analyses how the information is used by the users or systems. Further, it focuses on the location where the information lives and on how it is exposed to risks. Other critical assets can be identified and assessed by finding the connection between them and the information asset.

33

Page 34: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Figure 21: OCTAVE Allegro Roadmap (source: (Ali, 2016)).

Proposal one:

7. Data Collection and Analysis/ Main body of project

Sample Questions: the below table presents sample questions that organisations may use in a broader questionnaire as part of their information review.

1.3 Cost Reduction Techniques for Security MeasuresApart from determination of the efficiency of a security technique based on the cost of adoption and the response time, analysis was also done to determine what measures are undertaken to reduce the cost of application of the security measures. The cost reduction measures for the different security strategies are

highlighted in the table below.

34

Figure 22: Sample questions and example information (source: (Protection, June 2016)

Page 35: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Security strategies involve both cyber security and information security merged with organizational controls. Cyber-security strategy is always aligned with business strategy not only to maximize the revenue, but also protect the organization’s assets as well as its reputation.Employees may bring their own device (such as a smartphone, tablet, or laptop) to the workplace and connect to the Internet. New complicated threats and attackers emerge every day. With security strategy and transformation, your organization’s software assets and intellectual property will be protected alongside your reputation.

Figure 23: Why do you need Security Strategy and Transformation? (source: (EC-Council, n.d.))

35

Page 36: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Figure 24: ''Internet of Things" paradigm as a result of the convergence of different visions. Source: (Luigi Atzori, 2010)

1.4 Data Collection

As part of the data collection, a survey was conducted

8. Outcomes and Limitations

The data analysis and interpretation above indicate that the choice of the best security management system is affect by two major factors namely cost and response time. The cost defines how economical a security management strategy is while the response time defines the effectiveness and efficiency of a security management strategy. The cost and response time are not directly related. Just because a method has the least cost it doesn’t mean it’s the least

36

Page 37: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

efficient or highly efficient. If an organization was to adopt a strategy based on cost, technology-based system would be the most preferable while the least preferable would be the integrated system. On the other hand, if an organization was to adopt a strategy based on the response time, the integrated management system would be best while human-based system would be the least preferable.The limitation of the study is that it considers only two factors as the determinants of what security measure an organization should adopt. However, there are factors that affect the security system of an organization. The other factors that affect the security system of an organization are: the size of the commercial building, the number of units within the commercial building to be protected, the environment surrounding the commercial entity, regulatory obligations applicable to a mode and set-up and the value of the asset to be protected (Blyth, 2012). The choice of a security management system should be based on all these factors and not only cost and response time (Fickes, 2016).

9. Timelines and Resource AllocationBenefits of Robot Security Guards: The everyday threats facing security guards are not much discussed. A security guard's primary task is to deter crime. Security Guard robots could be used to help keep Security Guards secure using risk-free monitoring and patrolling areas.Another explanation why robots from the Security Guard could help security companies: (Insurance, 2017). A robot security guard's short-term and long-term price is much smaller than a human's salary. Manufacturers of robots can lease their robots as low prices to companies. Not only do smart technology transform our homes; we accept their multiple sectors and disrupt the workplace. Artificial Intelligence (AI) has the potential to improve an organization's profitability, performance, and accuracy — but is that truly beneficial? (Marria, 2019) Many fears that the rise of AI will result in the replacement of human workers by machines and robots and view this technological progress as a threat rather than a tool for improving ourselves. Robot Security Guards: One-day robots worry about replacing human work. This fear can be exacerbated by science fiction novels and Hollywood. It is definitely not an unfounded concern today as more companies find ways to automate their productivity-enhancing processes and rising financial waste. Another analysis shows that 38% of U.S. workers will be automated in 15 years. This is in comparison to 30% in Britain, 35% in Germany and 21% in Japan (Insurance, 2017). In addition, we are living in an age where technology is advancing at an incredible rate. One person can dream up a concept one day and then make it a reality the next (Insurance, 2017).The above data analysis and interpretation suggest that two major factors, namely cost and response time, influence the selection of the best security management system. The price determines how efficient a security management strategy is while the response time defines a security management strategy's efficacy and performance. It is not directly related to the price or response time. Just because the least cost of a process does not mean it is the least effective or highly efficient

37

Page 38: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

10. Discussion and conclusions

As evidenced by the many pages of researched findings, building automation is very ben-eficial to theAs evidenced by the many pages of researched findings, building automation is very ben-eficial to theFrom management’s perspective, reliability, availability, efficiency, productivity and performance are powerful arguments for adopting an operations automation solution. The safety, security, services and the functionality of the commercial buildings have been discussed in depth to only show how advanced todays modern technology is. When spoken of voice commands alarms, the automated technology is designed to control individuals to help them navigate their way to smoke-free area, also the fact that they will have live announcement to inform them of their next move. The management advanced system is programmed to accommodate the fire alarms. Also, how fire with the new technology the smoke control is automated in each fire alarm zone. With the new automation of

38

Page 39: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

elevator control, it is designed to help people getting around the building in a safety and efficient way. With the development of automated elevators, its purpose is to restrain the danger. The latest trends in automation of elevators revolve around the safety. With the growth of automated elevators, firefighters’ control and communication has a purpose of danger restriction and fire expansion. even when the system is disabled the facility should be reliable and protected. The power management systems are designed nowadays to enable smart buildings productivity and deliver the enough operating efficiency. Facial recognition is a software-based part of automation which uses deep learning algorithms to compare a live capture or digital image to the stored face print to verify an individual's identity. With the development of modern-day technology facial recognition offers a way to process and track visitors faster and more efficiently. Access control helps with facial recognition technology security passes and using a whitelist scheme, only those people who are registered for entry can access a building. Security cameras can recognize those prohibited from access by using automated surveillance, immediately warning safety personnel. Physiognomy helps with the element of facial expression and being able to “read” what’s on the face. From having this advanced technology, it will only not just help the who enters and exits the building the building, but also keep track of every individuals inspected behaviour. A “crime” record of an induvial is also an asset in this automated technology. The biometrics is one of highly reliable way to identification in spite of all the shortcomings and problems attached so far. The shortcomings are being addressed with the technological advancements, like two factors verifications etc, however, it can be concluded that the biometrics will not only replace the other verification methods but will also be the fast and only reliable way of recognition and will boost the atomization process in more secure and efficient way. Biometric data can be stored in a centralized database, although contemporary biometric implementations often depend instead on local collection and cryptographic hazing of biometric data so that authentication or identity can be accomplished without immediate access to biometric data. Knightscope’s K1, K5 and K7 Models and their assist in our society as a security guard. These advanced robots are taking over our society as we speak. By adapting these robots as security guards were limiting the events of human error and their nature of emotions out of business. Being a security for a commercial building, the last thing that should occur is minor events- such as an individual’s consciousness. Modern BAS can also control indoor and outdoor lighting as well as security, fire alarms, and basically everything else that is electrical in the building. With the smart lights, led innovations and high efficiency ballasts, technology is an important topic and in the lighting industry. It’s not just financially efficiency but also suitability friendly. With the new trends of vertical transportation, the technological advances are being applied to escalators that improve energy efficiency in elevators. The Smart Grid is a global effort to enhance electrical power delivery. It is supported and driven by national governments with industry goals and requirements set. It is invested in fostering and forging new projects to demonstrate the benefits of fresh technologies. These automated Tenant telecommunications shifts have given way to the next generation of tenant engagement platforms in what forms a successful, modern working environment. The automated trends of Communication system have given way to the next generation occupants in the building to receive important announcement. The automated trends are being of an impact of digital technology on the shape and behaviour of our cities especially in the increased use of mobile technologies, significant changes in both social interaction and public behaviour have occurred over the past decade or so. FIDO is an important way of authentication- which

39

Page 40: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

stores personal identification information. With the automated advanced technology this is an asset to be used in any commercial building to stay on track with the different profile of people accessing the building. Being fully automated patrol station is where our generation is reaching for- because it’s driven by digital natives, will continue to trigger transformations, there are four radical trends re-casting the fuel retail future: zero-emission vehicles, connected vehicles, autonomous vehicles, and pump technology and station formats. Cybersecurity, digital- only bank, and open banks should be entirely transitioned to being automated facility because it will be a major asset for it to being successfully functional. An advancement is needed to achieve the highest level of security especially when dealing with finances. This Report addresses each need in the requirement of atomization of functional and management aspects of commercial buildings.

11. Conclusion1.4.1 Recommendation

The advanced technology of our modern society is up to date and for a matter of fact; with all the advanced knowledge and technology still, the management aspects weren’t carried out as efficiently as it should have been. The theories and designs lacked the desired functioning aspects as well.In saying that, our recommendation is to focus on efficient managing aspects.

1.4.2 VisionThe ultimate vision of an intelligent building is one in which a very small group of individuals can monitor, manage, diagnose (and sometimes correct) most building operational issues without ever leaving their desks which are equipped with little more than a computer screen. Individuals given the right tools can monitor the security, the temperature, the lighting, the occupancy, the safety, the ventilation and the electrical consumption of the building. There is no longer a need for a patrol guard to move through the building in order to investigate if all individual doors are properly locked. As these systems become more trusted and more reliable the vision is that a smaller group of people can manage a large building autonomously, reliably and with traceability. The economies of reduced staffing, immediate response and operational statistics are significant. The ability to perform maintenance based on actual hours used or defects which have been identified, will provide considerable savings. The ability to use electronic controls which ensure smooth starting and stopping of all machines, the gradual activation of luminaires and the smooth shutdown of luminaires all lead to significantly reduced operational failures and significantly extended operational life thereby providing further economies.

1.4.3 Future Consideration It should be noted that in our future work that will be conducted based on Security Management of Commercial Building our experimental results will agree with the theoretical equations discussed above. The aim of our upcoming research is to design a fully automated patrol station. By having our advanced technology and the trends this will assist us in achieving a desired automated patrol station that will prove that atomization is where the advancement of technology is leading to its efficiency and suitability.  Future security systems:

40

Page 41: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Robot Security Guards: One-day robots are afraid to replace human jobs. Science fiction novels and Hollywood can amplify this fear. It is certainly not an unrealistic fear today as more companies find ways to automate their processes to increase productivity and reduce financial waste.  One analysis shows in 15 years 38% of the jobs in the U.S will be automated. This is in comparison to 30% in Britain, 35% in Germany and 21% in Japan (Insurance, 2017). In addition, we are living in an age where technology is advancing at an incredible rate. One person can dream up a concept one day and then make it a reality the next (Insurance, 2017).BAS connects mechanical and electrical systems and equipment with microprocessors that communicate with each other and possibly with a computer. In the building automation system, this computer and controllers can be connected to the internet or serve only as a stand-alone system for the local peer to peer controller network. In addition, the BAS controllers do not need a computer to process the control functions themselves as the controllers have their own internal processors.Facility managers and occupants (of allowed by response to demand) can make changes to improve the comfort of the occupant. Typically, the facility manager has the most control over the system along with permitted operators. Integration into HVAC systems and lighting controls saves energy from building over older control systems.Key areas that need to be addressed to gain the full benefit of intelligent building include:Understanding the goal of design and operation of an intelligent building.Is it more important that the building be more efficient, i.e. that the operating costs are reduced? Is it more important that the effectiveness of individual occupants in the building are put as the most important objective Adoption of an appropriate communications protocol to operate with each of the ICT sub-systems through cooperation between all the design engineers. Visioning a greater benefit in all aspects will accrue if a single building can enjoy the benefits of joining one building into multiple buildings thereby forming a community, a campus, or possibly even a city.The provision and ability to communicate over a common IP infrastructure, is a mechanism by which an intelligent building can be implemented. However, depending on the jurisdiction, there may be a need that some of the systems require special considerations in order to comply with all aspects of the building code, fire safety code or electrical code. Base building systems that are designed in a manner which permits their intercommunication, and which also allows for communication between the building and individual tenant improvements. Intelligent and sustainable buildings can form one of the pillars of a smart sustainable city. Buildings are a major contributor to global Greenhouse gas

41

Page 42: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

(GHG) emissions and the implementation of intelligence within our building stock can provide a method for reducing these emissions. The International Triathlon Union (ITU) has a role to play in determining and facilitating the development of standards and protocols to ensure the intercommunication and interoperability of the ICT systems that make up an intelligent building which forms on of the foundations for a smart sustainable city. The ITU should continue to interact with other bodies and industry groups to ensure that the required standards for intelligent and sustainable buildings are developed. These standards need to be developed in concert with other "smart sustainable city" standards to ensure compatibility and seamless adoption ( (Group, 2015)

12. Schedule of activities

42

Page 43: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

13. BibliographyA.J. Marszala, P. H. J. B. E. M. K. V. I. S. d. A. N., 2011. Zero Energy Building – A review of definitions and calculation methodologies. Energy and Buildings 43, pp. 971-979.Alami,  . C. a. A., 2018. Distributed autonomous robotic system.. Berlin: s.n.al, E. e., (2007). BIOMETRIC SYSTEM. [Online] [Accessed 17 June 2019].Al, J. e., (2006). BIOMETRIC SYSTEM. [Online] [Accessed 16 June 2019].Al, K. e., (2009). BIOMETRIC SYSTEM. [Online] [Accessed 16 June 2019].al, O. e., (2012). BIOMETRIC SYSTEM. [Online] [Accessed 2019 June 2019].al, R. e., (2008). BIOMETRIC SYSTEM. [Online] [Accessed 2019 06 17].Anon., 2008. Building Automation Systems | HVAC Control. [Online] Available at: https://highperformancehvac.com/building-automation-systems-hvac-control/Anon., 2014. Figure 4: An exaple of Robots Replacing Humans. [Online] Available at: https://www.slideshare.net/b2bSEO/robots-replacing-humans-automationAnon., 2016. How secure is your company’s access control technology?. [Online] Available at: http://www.engineersjournal.ie/2016/10/04/secure-access-control-technology/Anon., 2016. The utilization of BMS in BIM for facility management. 4 May.Anon., 2018. Improving Building Security with Facial Recognition. Anon., 2019. BIM News. [Online] Available at: https://www.bimcommunity.com/news/load/870/singapore-s-construction-itm-aims-to-use-cloud-and-digital-technology-to-integrate-stakeholders-in-the-building-life-cycle[Accessed 20 June 2019].Anon., 2019. BUILDING AUTOMATION AND CONTROL SYSTEM MARKET (BACS). [Online] Available at: https://www.openpr.com/news/1611656/BUILDING-AUTOMATION-AND-CONTROL-SYSTEM-MARKET-BACS-Market-Till-2025-Top-Global-Key-Players-Honeywell-Building-Solutions-Siemens-Building-Tech-Schneider-Systems-Services-Johnson-Controls-Building-Efficiency.html[Accessed 20 June 2019].Anon., 2019. Control, Measuring, & Automation Systems: Off-grid & Sustainable Living. [Online] Available at: https://www.google.com/search?

43

Page 44: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

q=automation+and+control+systems&rlz=1C1CHBF_en-GBAU692AU692&source=lnms&tbm=isch&sa=X&ved=0ahUKEwiYkNaglvjiAhUSbisKHVdDDWwQ_AUIECgB&biw=1536&bih=754&dpr=1.25#imgrc=QBEPY8BjAqCMsM:[Accessed 20 June 2019].Anon., 2019. FMLINK. [Online] Available at: https://fmlink.com/articles/building-automation-functionality-in-emergency-situations/Anon., 2019. What is BIM?. [Online] Available at: https://www.lodplanner.com/what-is-bim/[Accessed 20 June 2019].Anon., 2019. Why Do Biometrics Improve Security?. [Online] Available at: https://www.veridiumid.com/blog/biometrics-improve-security/[Accessed 20 June 2019].Anon., n.d. 4 Reasons Why Robots Won’t Be Replacing Human Security Guards Anytime Soon. http://www.1stchoicesystems.com/4-reasons-why-robots-wont-be-replacing-human-security-guards-anytime-soon/ ed. s.l.:s.n.Anon., n.d. Figure 2: An example of The World’s Fastest and Most Accurate Enterprise Face Recognition Platform. [Online] Available at: https://www.facefirst.com/solutions/surveillance-face-recognition/Anon., n.d. kmccontrols. [Online] Available at: http://www.kmccontrols.com.hk/products/Understanding_Building_Automation_and_Control_Systems.htmlAshby,  ., 2017. The value of CCTV surveillance cameras as an investigative tool: An empirical analysis. European journal on criminal policy and research. s.l.:s.n.Bady, S., 2011. Vertical Transportation Systems Reach New Heights. [Online] Available at: https://www.bdcnetwork.com/vertical-transportation-systems-reach-new-heightsBlog, T., 2019. 3 ADVANCEMENTS IN LIGHTING TECHNOLOGY. [Online] Available at: http://shopthelightinggallery.com/3-advancements-in-lighting-technology/Blyth,  ., 2012. Risk and security management: Protecting people and sites worldwide.. Hoboken, NJ: s.n.Brumson,  ., 2011. Robotics in security and military applications.. [Online] Available at: https://www.robotics.org/content-detail.cfm/Industrial-Robotics-Industry-Insights/Robotics-in-Security-and-Military-Applications/content_id/3112[Accessed 2019 8 15].CABA, 2002. Technology Roadmap for Intelligent Buildings, National Research Council Canada, Ottawa, Ontario, Canada. [Online] Available at: www.caba.org/trm. Choudhury, S., n.d. dawn of digital new age technologies to usher in an era of smart gas station. [Online]

44

Page 45: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Available at: https://www.wipro.com/en-AU/oil-and-gas/dawn-of-digital--new-age-technologies-to-usher-in-an-era-of-smar/Clements-Croome, D., 2004. . Intelligent Buildings: Design, Management and Operation,. London: Dr. Sam C. M. Hui .Craighead, G. 2., 2009. High-rise security and fire life safety.. Oxford, England: Butterworth-Heinemann..Daerden, F. a. D. L. 2., 2015. Pneumatic artificial muscles: Actuators for robotics and automation. [Online] Available at: http://lucy.vub.ac.be/publications/Daerden_Lefeber_EJMEE.pdf[Accessed 9 June 2019].Damnjanovic,  . a. R., 2018. Engineering and construction project risk management.. Basingstoke England Springer: s.n.Ded, E., 2018. Improving Building Security with Facial Recognition. [Online] Available at: https://www.viatech.com/en/2018/08/building-security-facial-recognition/Dietmar Bruckner, J. H. P. P. s. G. Z., 2012. Latest trends in integrating building automation and smart grids. Montréal, IEEE, pp. 6285-6290.Dillon, T., Februray 2006. Pervasive and ubiquitous computing, Futurelab - Viewpoint Article,. [Online] Available at: http://www.futurelab.org.uk/viewpoint/art71.htm.Doherty, P., 2002. The future of controls is wireless and small, Network Controls. [Online].Edler, J. a. W. W., 2006. Wireless! building automation unwired, AutomatedBuildings.com. [Online] Available at: www.automatedbuildings.comEMSD, 2002. Guidelines on Application of Central Control and Monitoring Systems. [Online] Available at: www.emsd.gov.hk[Accessed 4 3 2019].Fickes,  ., 2016. Nine keys to building security.. [Online] Available at: https://www.buildings.com/article-details/articleid/20606/title/9-keys-to-building-security[Accessed 6 10 2019].Ghaffary, S., 2018. Is this robot really going to replace a security guard?. [Online]

Available at: https://www.vox.com/2018/10/8/17913420/security-robot-cobalt-robotics-knightscope-slack-yelp[Accessed 10 June 2019].Gockley, R. a. M. M. J., 2006.. “Encouraging Physical Therapy Compliance with a Hands-off Mobile Robot,”. In: s.l.:In Proceedings of the 1st ACM SIGCHI/SIGART Conference on Human-Robot Interaction,, pp. pp. 150-155. .

45

Page 46: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Gockley, R. a. M. M. J., 2006. “Encouraging Physical Therapy Compliance with a Hands-off Mobile Robot,” in Proceedings of the 1st ACM SIGCHI/SIGART Conference on Human-Robot Interactio. Salt Lake City, UT, : pp. 150-155. .Goetz, J. a. K., 2002. “Cooperation with a Robotic Assistant,”. In: In Proceedings of the CHI'02 Extended Abstracts on Human Factors in Computing Systems, Minneapolis, MN. s.l.:s.n., pp. pp. 578-579. .Gray, A., 2006. How smart are intelligent buildings?, Building Operation and Management,. [Online] Available at: www.facilitiesnet.com/bom. Guinard, A., McGibney, A. & Pesch, D. A., 2009. Wireless Sensor Network Design Tool to Support Building Energy Management. In Proceedings of the First ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings, Berkeley,. CA, USA: s.n.Hall, C. a. L. G., 1957. Theories of Personality, Hoboken, NJ: John Wiley & Sons Inc.. [Online] Available at: https://deepblue.lib.umich.edu/bitstream/handle/2027.42/143811/Robert%202018.pdf?sequence=1&isAllowed=y[Accessed 11 June 2019].Hartman, T., 2001. Whole building networks - beyond HVAC, Network Controls: A Supplement to HPAC Engineering,. 3 3.pp. pp. 36-43. .Hyangsook Lee, T. Z. M. B. S. T. S. C., 2013. Designing an Integrated Logistics Network in a Supply Chain System. KSCE Journal of Civil Engineering, pp. 806-814.Insurance, E. D., 2017. Future Security Systems: Robot Security Guards. [Online] Available at: https://www.eldoradoinsurance.com/security-industry-news/future-security-systems-security-robots/Julia,  ., 2015. Security role in property management.. [Online] Available at: https://perfectconnectionsinc.com/securitys-role-in-property-management/[Accessed 1 10 2019].Kastner, W., June 2005. Communication systems for building automation and control, In Proceedings of the IEEE,. Volume 93, Issue 6, page 1178- 1203 ed. s.l.:Sam C M Hui.Keller, C., 2005. Effective implementation of automated facility management technology demands culture, process change, Building Operation and Management,. [Online] Available at: www.facilitiesnet.com/bomKirralie Houghton  , n.d. Augmenting public urban spaces: The impact of the digital future on the  design of public urban spaces . [Online] Available at: https://www.planning.org.au/documents/item/2196

46

Page 47: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Kloppenburg,  . a. P., 2018. Securing identities: Bio-metric technologies and the enactment of human bodily differences. Science as Culture, 1-20.. s.l.:s.n.Langston, C. &. L.-K. R., (2002).. Strategic management of built facilities.. Boston: s.n.Law, J., 2010 . Cybertechure,. [Online] Available at: http://www.jameslawcybertecture.com/[Accessed 16 June 2019].Lee, (2012) . BIOMETRIC SYSTEM. LITERATURE REVIEW, Volume Chapter 2, p. Anna University.Loosemore, M. R. J. R. C. a. H. D., 2012. Risk management in projects. 2nd ed.. London, England: Routledge.Ludwig,  ., 2015. Finding the balance in property management security.. [Online] Available at: https://www.securitymagazine.com/articles/86079-finding-the-balance-in-property-management-security[Accessed 22 9 2019].M., D. S. C., 2007. Latest Trends in Building Automation and Control Systems. [Online] Available at: https://www.researchgate.net/publication/281903357_Latest_trends_in_building_automation_and_control_systems[Accessed 11 June 2019].Malathi,  . a. J., 2016. An integrated approach of physical bio-metric authentication system. Procedia Computer Science, 85, 820-826.. s.l.:s.n.Markman, J., 2018. Security robot works at intersection of AI and crime.. [Online] Available at: https://www.forbes.com/sites/jonmarkman/2018/10/31/security-robot-works-at-intersection-of-ai-and-crime/#22479244e5ed[Accessed 2019 8 18].Marous, J., 2019. 8 Technology Trends the Banking Industry Must Act On In 2019. [Online] Available at: https://thefinancialbrand.com/80496/financial-technology-trends-data-ai-digital-blockchain-cloud/Marria, V., 2019. The Future of Artificial Intelligence In The Workplace. [Online] Available at: https://www.forbes.com/sites/vishalmarria/2019/01/11/the-future-of-artificial-intelligence-in-the-workplace/#2915c77d73d4Mashrik, T. Z. H. a. K. M. F. 2., 2017 . Design and implementation of security patrol robot using android application.. Asia modelling symposium (AMS): s.n.McCarthy, C., 2018. Lights On New Technologies for a Smart Distribution Grid. [Online] Available at: https://electricenergyonline.com/show_article.php?mag=62&article=476McGowan, J. J., 2001. DDC’s Future 1-01, AutomatedBuildings.com. [Online] Available at: www.automatedbuildings.com

47

Page 48: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Nanzer,  .  ., 2012. Microwave and millimeter-wave remote sensing for security applications. Artech House.. s.l.:s.n.Nigel J. Smith, T. M. P. J., P. 2014. Managing risk in construction projects. Hoboken, NJ: John Wiley & Sons.. s.l.:s.n.Norris,  . a. A., 2017. CCTV and the social structuring of surveillance. Surveillance, crime and social Control, 81-102.. s.l.:s.n.Oxford University (2013) study on the future of employment. Pearson,  ., 2011. Electronic security systems: A manager guide to evaluating and selecting. s.l.:s.n.Protection, C. f. P. a. D., June 2016. INFORMATION SECURITY MANAGEMENT COLLECTION. [Online] Available at: https://ovic.vic.gov.au/wp-content/uploads/2018/07/VPDSF-Information-Security-Management-Collection-V1.1.pdf[Accessed 14 9 2019].Quirk, V., 2012. A Brief History of BIM. [Online] Available at: https://www.archdaily.com/302490/a-brief-history-of-bimReinharz, S., 2017. Robotic Assistance Devices, Combining man and machine.. [Online] Available at: https://www.securityindustry.org/2017/09/01/robots-guards/[Accessed 16 8 2019].Rihar, L. Z. T. B. T. a. K. J. 2., 2019. Standard risk management model for infrastructure Projects. Risk Management in Construction Projects. s.l.:s.n.Roll, J., 2015. Communication in the public space: Attention and media use. [Online] Available at: http://www.researchingcommunication.eu/book11chapters/C15_ROLL201516.pdfRouse, M., 2015. FIDO (Fast Identity Online). [Online] Available at: https://searchsecurity.techtarget.com/definition/FIDO-Fast-Identity-OnlineRouse, M., 2017. What is biometric?- define from whatls.com. [Online] Available at: https://searchsecurity.techtarget.com/definition/biometricsRouse, M., 2018. physiognomy. [Online] Available at: https://whatis.techtarget.com/definition/physiognomyRouse, M., 2018. What is facial recognition?. SearchEnterpriserAI.

Rouse, M., 2019. Figure 2: An example of IA. [Online] Available at: https://searchsecurity.techtarget.com/definition/biometricsSchneider, D. &. R. P., 2010. Energy renaissance. High Performance Building Magazine, . In: s.l.:s.n., pp. 13-16..Sinclair, K., May, 2001. Revolutionary automation trends in large buildings. [Online] Available at: www.automatedbuildings.com.

48

Page 49: files.transtutors.com€¦  · Web viewThis article describes the fundamental notion of Security of a commercial building . Enterprise is always prioritized to protect the people

Security Management of Commercial Building

Spang,  ., 2011. Integrated risk management in infrastructure projects. Modern Methods and Advances in Structural Engineering and Construction.. s.l.:s.n.Sullivan, F. &., 2018. Smart Buildings: Driving Energy Efficiency, Improving Security and Enabling Sustainability, Santa Clara: s.n.Syrdal, D. S. D. K. W. S. N. W. M. L. a. K. K. L., 2007. “Looking Good? Appearance Preferences and Robot Personality Inferences at Zero Acquaintance,” in AAAI Spring Symposium: Multidisciplinary Collaboration for Socially Assistive Robotics. In: International Symposium on Robot and Human Interactive Communication. Hatfield, UK,: s.n., pp. pp. 86-92.TIM JOHNSON, M. W. B., 2017. Can Robots Replace Human Security Guards?. [Online] Available at: Security guards are often emergency first responders. Guards are taught to maintain order, to assist individuals remain calm, to reassure them, and to take responsibility in challenging circumstances. In the evacuation of an office building or terrorist a[Accessed 10 06 2019].Turner, F., 2006. BACnet today, ASHRAE Journal. p. 48 (11): 5. .Umakoshi, K. K. T. Y. M. T. M. M. M., 18–21 July 2011.. Smart Shadow System for Real World Service and Its Evaluation with Users. In Proceedings of the IEEE/IPSJ11th International Symposium on Applications and the Internet. Germany: s.n.Ungar,  . 2., 2012. Building security: Security responsibilities for federally owned and leased. s.l.:s.n.Van der Meer, S. J. B. B. K. C. R., December 2003.. Design Principles for Smart Space Management. In Proceedings of the 1st International Workshop on Managing Ubiquitous Communications and Services (MUCS), M-Zones. Ireland: s.n.Verma, U., 2018 . 3 ways to improve commercial building security and cost efficiencies. [Online] Available at: https://inbuildingtech.com/security/commercial-building-security/[Accessed 31 July 2019].Villeneuve, A., 2019. Four things to look for to achieve physical security in real estate.. s.l.:s.n.Wang, S., 2007. Integration and interoperation of intelligent building systems, Automation in Construction. [Online] Available at: 16 (1): 112-121Yusuf Arayici, F. K. A. M. P. S. M., May 20-22, 2009. (Eastman et al, 2008, Mihindu and Arayici, 2008).. [Online] Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.398.9527&rep=rep1&type=pdf[Accessed 11 June 2019].

49