Response In Physical Security

Using Resources to Promote Critical Thinking

Critical thinking is an integral part of any educational program

At UC, we encourage and provide applicable resources for the promotion of critical thinking

In order to properly research and complete course papers, proper resources must be utilized

Critical Thinking helps us to:

Understand the links between ideas.

Determine the importance and relevance of arguments and ideas.

Recognize, build and appraise arguments.

Identify inconsistencies and errors in reasoning.

Approach problems in a consistent and systematic way.

Reflect on the justification of their own assumptions, beliefs and values.

http://www.skillsyouneed.com/learn/critical-thinking.html

Researching Using the Critical Questions

When using research resources, it is imperative to review the six critical questions and implement that data into your writings.

Proper Resources for Research

When asked to completed a research paper in the UC School for Computer and Information Sciences, you must use scholarly, peer-reviewed articles.

A peer-reviewed article is one that has “been evaluated by several researchers or subject specialist in the academic community prior to accepting it for publication” and is “also known as scholarly or refereed.”

Your professor or the UC Librarian team can help you determine whether or not an article is peer-reviewed.

Proper Resources for Research

Examples of sites with peer-reviewed resources

UC Library Site

EBSCOhost

JSTOR

Google Scholar

Examples of sites with unacceptable resources

PC Magazine

Cisco

Ars Technica

Reddit

Proper Format is Important

All papers written for courses within the School for Computer and Information Sciences must follow the American Psychological Association (APA) writing style.

University Resources

The UC Library provides a myriad of online resources to assist students with proper research

Resources referring to Information Security can be found inside the UC Library site

www.ucumberlands.edu/library

Groups

Group 1

Group Topic: Deterrence in Physical Security

Members:

kyedluri25546@ucumberlands.edu

ngottimukkala55701@ucumberlands.edu

rreddy28526@ucumberlands.edu

mdandamudi22364@ucumberlands.edu

yvejella7321@ucumberlands.edu

hbalusu8766@ucumberlands.edu

hfatima6055@ucumberlands.edu

Group 2

Group Topic: Delay in Physical Security

Members:

skota19701@ucumberlands.edu

jmohammed9421@ucumberlands.edu

rkethipally6753@ucumberlands.edu

kchebolu7529@ucumberlands.edu

vnulu14976@ucumberlands.edu

ayeruva1501@ucumberlands.edu

sgeddada9319@ucumberlands.edu

Group 3

Group Topic: Detection in Physical Security

Members:

vghelani18036@ucumberlands.edu

aingilela4019@ucumberlands.edu

kkanchi28066@ucumberlands.edu

kdantla6837@ucumberlands.edu

vkonda3439@ucumberlands.edu

vgantam25977@ucumberlands.edu

Group 4

Group Topic: Assessment in Physical Security

Members:

vgoli7615@ucumberlands.edu

bmannam2163@ucumberlands.edu

vravi14844@ucumberlands.edu

nkanikaram36946@ucumberlands.edu

rshaik24342@ucumberlands.edu

mmettu27132@ucumberlands.edu

Group 5

Group Topic: Response in Physical Security

Members:

spashapu11112@ucumberlands.edu

schennareddy37084@ucumberlands.edu

smirza8981@ucumberlands.edu

rvotti14835@ucumberlands.edu

psirasapalli1841@ucumberlands.edu

saleti8141@ucumberlands.edu

Group 6

Group Topic: Recovery in Physical Security

Members:

knulu22366@ucumberlands.edu

yponnam60353@ucumberlands.edu

hdasara7532@ucumberlands.edu

hdaruvuri22828@ucumberlands.edu

vmaisigari6663@ucumberlands.edu

aveeramalla7361@ucumberlands.edu

Group 7

Group Topic: Physical Security during a Pandemic

Members:

eshaik36381@ucumberlands.edu

cmunigala18517@ucumberlands.edu

zmohammed9773@ucumberlands.edu

aadulla6723@ucumberlands.edu

statineni7088@ucumberlands.edu

rmylapilli39307@ucumberlands.edu

Group 8

Group Topic: Physical Security during Political/Social Unrest

Members:

bneelam3439@ucumberlands.edu

spratapuram8620@ucumberlands.edu

pbhandekar17122@ucumberlands.edu

spatel5943@ucumberlands.edu

ajadhav39514@ucumberlands.edu

schalamalasetty18725@ucumberlands.edu

Research

Research Paper

10-12 pages (not including title, TOC, references, and any appendices)

Double spaced APA style

At least 10 references

At least 5 of your references must be scholarly peer-reviewed articles

Research Paper

The purpose of the research paper is to associate controls (administrative, technical, and physical) with your assigned physical security goal.

Some items that need to be addressed are:

Associated Threats

Policies

Procedures

Plans

Guidelines and standards

Appropriate controls

Issues and concerns for different industries

Business continuity and risk mitigation

Budgetary concerns

Research Paper

Find and review peer-reviewed scholarly articles concerning the access control and the associated industry

Find and review other information that associates with your topic area

Apply research from articles on chosen topic area to create research paper

Research Topic

DO

Provide a working knowledge physical security

Compare and contrast your assigned goal with others

Deeply research the use of physical security to meet your assigned goal

Tie your research back to recommendations for physical security controls

DO NOT

Get lost and broaden the topic too far

Disassociate your peer-reviewed scholarly research from the topic

Plagiarize and copy/paste from sites

Forget the topic of our course

Research Presentation

Goal is to summarize your research and recommendations

Must present for at least 20 minutes but no more than 30 minutes

Your group will be randomly selected for presentation

All group members need to participate in the presentation

Rubric

Please visit the “Residency” folder and select the specific dropbox to view the associated rubric

The rubrics will be used when grading the paper and presentation

ISOL531 | Access Control

Dr. Justin O. Hensley

School of Computer and Information Sciences

24

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"