Topic(s) for the Physical Security Research Paper and Presentation:Topic: Physical Security Practices on National BordersCompare the Physical Security (technology, methods, etc.) used at the national

Topic (s) for the Physical Security Research Paper and Presentati on The majority of the paper MUST address the highlighted topic (s) below as it relates to Physical Security . Specific case studies, individual hardware, software, service or systems may be used as short exam ples but should only represent a small portion of the total paper. Topic: Physical Security Practices on National Borders Compare the Physical Secur ity ( technology , methods, etc.) used at the national borders of at least 3 countries . Focus on Information Technology but can include Safety, Equ ipment, Assessment and/or Policies/Procedures . This research paper should include approximately 7 -10 Cited Works but MUST have at least 5 Cited Works of which 2 must be Peer Reviewed . Highlight in YELLOW the Peer -Reviewed works on the Reference page. Also, i nclude all References as the last page of the Powerpoint Presentation ( start by creating a heading called “Peer -Reviewed works”, followed by the Peer - Reviewed works . Then create a heading called “All Other works”, followed by the other works). This research paper should be approximately 10 double -spaced pages ( but must be at least 5 pages ), using 12 -font Times -Roman or Calibri -Body . The Cover Page, Reference Page and any space needed for pictures/imag es are not included in the required page s. Once the paper is completed, add an Overview to the start of the paper. The Overview must contain at least one Hypothesis (see Rubric) and a Synopsis of what is contained in the paper. Include the Hypothesis, un der the title, on the 1 st page of the Powerpoint presentation. For this paper, a Hypothesis is a statement you believe to be true based on the research you conducted. As an example: “Small businesses are less likely to provide adequate physical security”. The quality and thoroughness of the paper , as defined in the rubric, will determine the grade assigned . Papers containing the minim um number of references and/or minimum number of pages will most likely not earn a high grade. Go to http:// i nside.ucumberlands.edu/library and search the Databases/Journals Other sources include : Academic Search Complete Google Scholar ERIC ProQuest Dissertations & Theses ACM Digital Library IEEE Xplore Computing Research Repository (CoRR) Microsoft Academic CiteSeerX Find White Papers ScienceDirect Web of Science (and InCites ESI & JCR) Computers & Applied Sciences Complete Computing Database (1998 -current) Homeland Security Digital Library Journals include : Security Technology Executive Journal of P hysical Security Security Management Journal of Applied Security Research Security Journal Computer World Security Technology & Design Technology Executive iSecurity Information Security Security = = = = = = = = > M.E.A.L. Plan : There are many ways to write this paper but you might consider one of these as a fr amework : Option #1: Create MAIN -Topics for each Country identified and then Sub -Topics for the Physical Security components identified in the re search OR Option #2: Create MAIN -Topics for each Ph ysical Security component identified in the research and then Sub - Topics for each Country identified: Phy sical Security compo nents might include any of the topics discussed in the textbook or in your research : Environmental Design , Ph ysical Barriers and Signage , Lock s & Biometrics , Illumination, Surveillance, Alarm Systems, Fire S uppression, Acc ess Control and Identifi cati on , Security Forces, Netw ork Architectures, Risks/Threats/Countermeasures