IT Assignment 6: Developing Home Security Systems Literature Review

Verified

Added on  2019/11/26

|10
|3368
|365
Report
AI Summary
This report presents a literature review on the development of home security systems for domestic homes. It explores the various definitions of residential security and the benefits of using Blockchain technology in these systems, including crime prevention, protection against threats, and enhanced security for valuables. The report examines how modern systems allow remote monitoring and discusses the impact on homeowners' insurance. Furthermore, it explores the research methodology, including the use of secondary data analysis, case study approaches, and gap analysis to assess the feasibility, demand, and practicality of Blockchain domestic security systems. The report also discusses the sources of secondary data, including business, government, and academic sources, and the importance of understanding data collection methods. The gap analysis is used to address the gaps in the literature review by presenting the use of the feasibility study while assessing the demand, acceptability, implementation, practicality, efficacy potential, integration, and adaptation.
Document Page
Running Head: IT ASSIGNMENT 1
Developing home security systems for domestic homes
<Student ID>
<Student Name>
<University Name>
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT ASSIGNMENT 2
Literature Review
In this section of the research paper, the illustration and elaboration of the advantages and
future developments in regards to the development of home securities systems for domestic
homes are conducted. It has been observed that specialists don't concur with respect to what
constitutes residential security and diverse definitions have been put to use in earlier researches.
The difference on the definition tends to incorporate the concentration on the tasks of the
associated with the job, the influence on the clients and the profit along with the inclusion of the
products providing domestic services like distribution, manufacturing, and installation of
technology and equipment. Installing, disarming, arming and paying monthly fees along with
dealing with false alarms have been considered among all such things which are tied to the
Blockchain domestic security system s which also may result in making clients wonder whether
home security is worth to be used (Gunge & Yalagi, 2016).
One of the research studies states that domestic security includes all kinds of private
organizations and domestic clients who would desire of all kinds of security related services such
as investigation, patrol, guard, alarm, lie detection. One of the most common facilities and
benefits of using Blockchain Blockchain domestic security system is prevention and detection of
crime in houses (Korzyk, 1999). It has also been observed from previous studies that domestic
security services provide security and protection against crime along with different threats
accident, error, waste and unethical practice. Various instances in the researches also prove that
integration Blockchain Blockchain domestic security system also enhance protection to the
private valuables. This is definitely the most important benefits that people and clients look for.
The events of theft of electronics, jewelry and other items which are of great domestic
value in the cases of a home invasion can be very well monitored. It is found that the tragedy in
the household is aggravated when the profitable thing is a genuine vital treasure of the family.
Having a residential security framework incorporates an alert which drives away many hoodlums
and robbers who would be planning to approach the house premises. Moreover, the Blockchain
Blockchain domestic security system would also assist in notifying the local authorities
regarding the attempt made by the thieves and the burglars. It has been also observed according
to 20009 Study by Rutgers that in the instances where the number of Blockchain Blockchain
domestic security system increase in a particular area, there is a decrease in the cases of thefts
Document Page
IT ASSIGNMENT 3
and robberies in that specific area (Strom et al., 2010). It has proved to be beneficial for the
people residing in that area who are not even availing or have Blockchain domestic security
systems installed in their houses. It has been seen that having a Blockchain domestic security
system not only assists in protecting a single house but also helps the entire neighborhood to be a
safer place. Modern Blockchain domestic security system have been facilitating the clients to
remotely monitor the events and activities happening in their homes during their absence (Wuest
et al,2015).
Depending on the provider, the clients and consumers are able to regulate what is
happening through the cameras which are installed all throughout their home along with
controlling the thermostat, lights, doors and other devices present in their homes. It has been
observed through various research studies that despite the fact that the clients and consumers
have to pay a monthly and annual fee for the Blockchain domestic security systems, they are
finding their insurance regarding home owners to decrease by 20 percent by having the security
system on the premises (Ann Sykes, 2015).
The clients and the consumers of domestic security services have the facility of opting to
receive notifications is the carbon monoxide or smoke alarms go off in the absence of the client
or the consumer. Depending on the provider, the clients and the consumers can set it up as the
security service providers are notified regarding such emergencies instantly. It has also been a
great aspect of the Blockchain domestic security system that the clients and consumers can
incorporate the service into their mobile app (Dunn, Gerard & Grabski, 2016). The Blockchain
domestic security system users can use their mobile devices to observe what is happening in their
respective home through cameras which facilitate them to have an observance on their teen
children during their absence. In the case where the clients and consumers have automatic doors
installed in their homes, they can even remotely unlock the doors to let their children in after
completion of schools so they will not have to get worried regarding carrying or losing a key to
their house (Ekman, 2015).
The installation and utilization of the Blockchain domestic security system have been
observed in various research studies to be providing security regarding the smart outlets and
thermostats. The clients and consumers have been making use of the gadgets which allow them
to take the control over the thermostat on any kind of web-enabled device. Through various
Document Page
IT ASSIGNMENT 4
studies, it has been observed that the clients using domestic security services happen to gain a
sense of peace and security with the use of an alarm system which is one of the key benefits of
using such security which would help in gaining a technically advance home in the future. Being
safe and feeling confidence has been helping the consumers to be healthier, more productive and
focused lifestyles. Addition of Blockchain domestic security system provides the consumers with
an extra sense of defense against any sort of potential intruders (Li, Grundy & Hosking, 2014).
The use of Blockchain domestic security system has the potential to provide the Virtual
Training to the consumers with the development and advancement of technologies. Having such
kind of developed and advanced technology integrated within the domestic security service
would assist in creating an IT home of the future.
Research Methodology:
For obtaining effective literature review, analysis of secondary data was conducted which
serves two key purposes. First and foremost, it facilitates in determining what kind of
information can be utilized for making a comparison to the specified data that is planned to
collect. This has also provided a comprehension regarding how the other measures of the
literature review or define the main items (Murray, Spassov & Mitchell, 2017). Moreover, by
conducting an assessment of the information that is available, the analysis will be helpful in
identifying the gaps in the literature and providing with effective gap analysis.
Furthermore, the investigation of optional information encourages in regards to the
appraisals of the nature of information accessible in people in general space. Measures of value
incorporate to what degree the information are present or most recent; the technique utilized in
the collection of data includes the mode of collection of data, the identification of respondents
which includes the representative sofa the company or the individuals involved in an occupation
along with the response rate of the survey (Oba & Yamaguchi, 2014).
It also includes the definitions used while structuring the research studies like sampling
and target populations. This information can be utilized in the development of a survey structure
that uses approaches from the previous research studies which have a high and enhanced quality
of data.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT ASSIGNMENT 5
Sources of secondary data
This examination of auxiliary information endeavor to have a powerful audit of the
accessible information with respect to the local security administrations from different business
sources, an administration source, scholarly and look into sources. A word related approach for
the investigation of household security framework focused on the part of big business
frameworks. Particular occupations are classified into general segments for the information
gathering and testing purposes (Peiris, Jung and Gallupe, 2015).
For example, the Standard Occupational Classification (SOC) framework which is
characterized by the Department of Labor and is being used by every one of the wellsprings of
government incorporates the occupations and administrations in the meaning of security watches.
The obligations of the concerned security watches are delineated as watching, guarding, or
checking the household premises for counteractive action of brutality, infractions of principles
and robbery.
Information from word related approach is extremely helpful with respect to the
evaluation of data about the general parts of the security occupations and residential security
benefits as they happen to incorporate the security officers giving household security from both
the non-security and security firms. Additionally, this approach encourages the social affair of
information specifically from the people in the occupation; it can advantageously encourage the
acquisition of an itemized normal for representatives, for example, socioeconomics (Pollock and
Hyysalo, 2014). This is because of the individual is the measuring unit and only one out of every
odd data with respect to the local security specialist organization is known.
Case Study Approach
The next approach used in the methodology is the case study approach in which the
complexity of the single case regarding Blockchain domestic security system is captured. In the
given case its explain about the GHOST how it’s going to adapt the software and exploit to make
sure that no one going to tamper it (Blockchain making houses safer, 2017). This approach of
methodology enables the integration of social science in the subject like GHOST will do. This
approach also integrated the aspects of social sciences like psychology, sociology, and practice
oriented like studies of the environment (Rai & Hornyak, 2013). The use of case study approach
Document Page
IT ASSIGNMENT 6
also has facilitated in the subject of the study which involves the functioning unit that is complex
in nature. It helps to understand the thing like here how GHOST as new technology in
Blockchain service system will secure everyone house from outsiders. The entire scenario of
domestic security service is investigated in its most natural context with varying methods which
are contemporary in nature.
One of the major features of the using this approach of a methodology is that varying
methods are integrated with the purpose of focusing on the Blockchain domestic service system
from varying angles for the triangulation by combining the methodology (Soja, 2016). The
association between various research strategies in the field of a Blockchain domestic security
system is reflected in the similarities rather than the differences. Interpretive and qualitative
research has a holistic approach in common to the research subject along with having varying
perspective sofa time.
In addition to the comprehension of how every secondary source of data defines the
Blockchain domestic security system, it is similarly critical to comprehend the sort of system
utilized as a part of the gathering of information. This encourages an evaluation of the
information agents for the entire field of local security (Wang, et al., 2016). Framework, in
addition, the examination philosophy gives inside and out understanding into the information
quality in parts of a rate of reaction and different variables which may bring about the estimation
of blunder and one-sided gauges (Sykes, Venkatesh and Johnson, 2014).
This specific segment incorporates the philosophy of the accumulation of information
utilized by each wellspring of optional information (Walther, et al., 2013).
Justification of Method
The feasibility study in the case study pertains to the exploration of the intervention of
the specific issues, like research protocols and methods, relevance to the specific context and
practicality along with efficacy potential. However, undue emphasis is mostly placed on the
efficacy potential in the literature review. Lessons and outcomes regarding various aspects of the
feasibility of Blockchain domestic security systems such as implications or practicality for the
protocols of research are not widely shared (Themistocleous, Corbitt & da Cunha, 2017).
Document Page
IT ASSIGNMENT 7
The purpose of using the feasibility analysis of the Blockchain domestic security systems
as case study is to address the gaps in the literature review by presenting the use of the feasibility
study while assessing the demand, acceptability, implementation, practicality, efficacy potential,
integration, and adaptation.
Gap Analysis
Using the gap analysis in the methodology of the mentioned case facilitates in assessing
if the services providers of Blockchain domestic security can meet their needs of using the
current capabilities in the sector. The capabilities of the service provider may be further put for
examination in regards to future improvement which would include the facilities applications,
competencies of the staff, technical infrastructure, business lines, processes, etc, (Veiga, et al.,
2014).
There has been a comparison regarding the present scenario of the use of Blockchain
domestic security system and future advances that can assist in having IT home of the future.
The current scenario has been analyzed and with the help of gap analysis, the flaws in the
Blockchain domestic security system and its implications are reflected. The literature review
paper presents the concept of a Blockchain domestic security system in a more descriptive
method through which many justifiable aspects of using the system could be gained (Upadhyay,
et al., 2016). For the future work in this specific field, encouragement to consider the installation
of a Blockchain domestic security system is recommended which would help in the identification
and prevention of sophisticated and skilled intruders. Security is essential for the implementation
along with the development of lives. With the help of the literature review, various insights into
the significance of the use of such service are reflected.
References
Ann Sykes, T. (2015). Support structures and their impacts on employee outcomes: A
longitudinal field study of an enterprise system implementation. MIS quarterly, 39(2).
Blockchain making houses safer. (2017). M.techxplore.com. Retrieved 8 September 2017, from
https://m.techxplore.com/news/2017-08-blockchain-houses-safer.html#
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT ASSIGNMENT 8
Dunn, C. L., Gerard, G. J., & Grabski, S. V. (2016). Resources-Events-Agents Design Theory: A
Revolutionary Approach to Enterprise System Design. CAIS, 38, 29.
Ekman, P. (2015). The enterprise system revisited: how well does it capture the company’s
business network?. Journal of Business & Industrial Marketing, 30(2), 208-217.
Gunge, V. S., & Yalagi, P. S. (2016). Smart Home Automation: A Literature Review.
International Journal of Computer Applications, 6-10.
Korzyk Sr, A. D. (1999). Towards security of integrated enterprise systems management. In
22nd NISTNCSC National Information Systems Security Conference.
Li, L., Grundy, J., & Hosking, J. (2014). A visual language and environment for enterprise
system modelling and automation. Journal of Visual Languages & Computing, 25(4), 253-
277.
Murray, K. T., Spassov, M. I., & Mitchell, A. J. (2017). U.S. Patent No. 9,720,669. Washington,
DC: U.S. Patent and Trademark Office.
Oba, M., & Yamaguchi, T. (2014). A flexible and efficient system development approach for
enterprise system and smartphone application. WSEAS Transactions on
Communications, 13(9), 414-420.
Pathan, T. A., Tamboli, M. A., Shaikh, S. S., Jamadar, A. A., & Patil, J. M. Development of
Total Security System for Residential and Commercial Buildings.
Peiris, K. D. A., Jung, J., & Gallupe, R. B. (2015). Building and evaluating ESET: A tool for
assessing the support given by an enterprise system to supply chain management. Decision
Support Systems, 77, 41-54.
Pollock, N., & Hyysalo, S. (2014). The business of being a user: The role of the reference actor
in shaping packaged enterprise system acquisition and development. MIS quarterly, 38(2).
Document Page
IT ASSIGNMENT 9
Rai, A., & Hornyak, R. (2013). The impact of sourcing enterprise system use and work process
interdependence on sourcing professionals’ job outcomes. Journal of Operations
Management, 31(6), 474-488.
Strom, K., Berzofsky, M., Shook-Sa, B., Barrick, K., Daye, C., Horstmann, N., & Kinsey, S.
(2010). The private security industry: A review of the definitions, available data sources,
and paths moving forward. Washington DC: US Department of Justice.
Soja, P. (2016). Reexamining critical success factors for enterprise system adoption in transition
economies: Learning from Polish adopters. Information Technology for
Development, 22(2), 279-305.
Sykes, T. A., Venkatesh, V., & Johnson, J. L. (2014). Enterprise system implementation and
employee job performance: Understanding the role of advice networks. MIS
quarterly, 38(1).
Themistocleous, M., Corbitt, G., & da Cunha, P. R. (2017, January). Introduction to Enterprise
System Integration: Issues and Answers Minitrack. In Proceedings of the 50th Hawaii
International Conference on System Sciences.
Upadhyay, P., Upadhyay, P., Kundu, A., Kundu, A., Nair, S., & Nair, S. (2016). On managing
business, organization climate and enterprise system implementation: Insights from Indian
MSMEs. Journal of Workplace Learning, 28(8), 472-483.
Veiga, J. F., Keupp, M. M., Floyd, S. W., & Kellermanns, F. W. (2014). The longitudinal impact
of enterprise system users’ pre-adoption expectations and organizational support on post-
adoption proficient usage. European Journal of Information Systems, 23(6), 691-707.
Walther, S., Sedera, D., Sarker, S., & Eymann, T. (2013). Evaluating Operational Cloud
Enterprise System Success: An Organizational Perspective. In ECIS (p. 16).
Wang, H., Fu, Y., Huang, M., & Wang, J. (2016). Multiobjective optimisation design for
enterprise system operation in the case of scheduling problem with deteriorating
jobs. Enterprise Information Systems, 10(3), 268-285.
Document Page
IT ASSIGNMENT
10
Wuest, J., Merritt‐Gray, M., Dubé, N., Hodgins, M. J., Malcolm, J., Majerovich, J. A., ... &
Varcoe, C. (2015). The process, outcomes, and challenges of feasibility studies conducted
in partnership with stakeholders: a health intervention for women survivors of intimate
partner violence. Research in nursing & health, 38(1), 82-96.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]