The Stealth Securities: Home Security System Project Report

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

The home is considered a place where there is privacy and one feels secure. This perception has been changed with the increase in insecurity. Vandals have breached the security of many homes leaving the inhabitants with fear. To prevent burglary, security measures have been adopted over the years. Surveillance in homes has been a trend in the world today using cameras and video recordings. With the advancement in technology, better systems are being developed. However, the vandals also improve their methods of hooliganism day and night. This has led to the development of personalized security systems that use information accessible to the owner only.

The development allows the security system to be customized to fit the owners’ requirements and ease of notification in case of a security breach. Engineers work around the latest technology to develop gadgets that can be used in the home for security. It has been established that one home is vandalized every minute in Australia. This is a shocking statistic that requires attention.

Technicians use personal gadgets such as cell phones and personal computers in the improvement of systems. These gadgets are readily available to most households making security available to homes.

Body

The Stealth Securities group developed a project to address the issue of security in homes. The project uses personal computers and sensors to develop the security system. These are affordable and reliable to most homes.

The project mission statement is: to make certain security is available and affordable to all homes in Australia.

The needs assessment has shown there is a need for security. However, like any other venture, the project is likely to encounter a number of risks. These should be dealt with before the project is implemented. The risks can be categorized into three as follows:

Risk itemLevelStatus of contingency plansDecision date
Performance risk
  1. Technology
  2. Goals
Medium
Low
Available,
Personal computers available
Highly qualified personnel with a consultant in software development
Goals are realistic
Before start of project
Management risks
  1. Resource allocation
  2. Planning
Low

Low

Available,
Technology and human resources are available
Before start of project
Organizational and external risks
  1. Priorities
  2. Regulatory
Medium
Medium
Available,
The team is ready and willing to take up the project
Regulation is to be sort after
Before start of project and during project implementation

From the analysis, the security project can be termed as possible. There is a need for security and one that is affordable. The risks have been analyzed and found to be medium or low. This means the risks can be addressed if they occur or show signs of occurring. The group has contingency plans that can be used in dealing with the project risks. The availability of qualified personnel and readily available technical equipment, allows the project to take off.

The performance risks are mixed and will depend on the response of the households. People should be made aware of the benefits and affordability of the project. This will make the sale of sensors possible after giving computers for free, hence reducing the risk of achieving goals. Technology failure by the computers or sensors can also affect the projects working, hence medium risk.

Management risks are considered low as the Stealth Securities team is dedicated to project success. The team has planned the project well, assigning qualified personnel to handle tasks. To give away free computers and not sell the sensors can be perceived as risky, but low risk. A strong team of qualified personnel will work on the project. This staff gives the project high chances of success as all areas are dealt with. There is good leadership and skilled persons who are to work professionally.

Organizational and external risks are analyzed as medium. The team is willing to take up the project but, being human, other commitments may come up. Persons may fall ill or get fatigue during project work. A constant shuffle of persons on duties will lower the risk of project stalling. Logistics and availability of people in the home for installation can be challenging. The regulations that can hinder the project success need to be adhered to and may hinder project success. There can be unfair competition by the other security providers.

Conclusion

Project success depends on how well it is executed. Projects have been carried out with different success rates. Risk analysis is paramount to project implementation. Risks are the factors that can hinder success if not checked and addressed properly. In the project, it was established that security in homes was needed. To install security was found to be costly leaving many homes without security. The project addresses the issue by use of affordable equipment. It uses personal computers already available to the households for a security system. The expectations of the project are realistic and achievable.

Stealth Securities has a good project that will enable them to attain their objectives. The team has objectives to transform Australian industries and safeguarding the country. This they will achieve with dedication to the project.

Work cited

Karl T. Ulrich and Steven D. Eppinger. Product Design and Development. 4th Edition, Irwin McGraw-Hill. 2007.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, November 13). The Stealth Securities: Home Security System Project. https://ivypanda.com/essays/the-stealth-securities-home-security-system-project/

Work Cited

"The Stealth Securities: Home Security System Project." IvyPanda, 13 Nov. 2021, ivypanda.com/essays/the-stealth-securities-home-security-system-project/.

References

IvyPanda. (2021) 'The Stealth Securities: Home Security System Project'. 13 November.

References

IvyPanda. 2021. "The Stealth Securities: Home Security System Project." November 13, 2021. https://ivypanda.com/essays/the-stealth-securities-home-security-system-project/.

1. IvyPanda. "The Stealth Securities: Home Security System Project." November 13, 2021. https://ivypanda.com/essays/the-stealth-securities-home-security-system-project/.


Bibliography


IvyPanda. "The Stealth Securities: Home Security System Project." November 13, 2021. https://ivypanda.com/essays/the-stealth-securities-home-security-system-project/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1